One advantage of using X.509 certs is that the code to support them is widely 
available with multiple implementations.
I guess then you could go all the way and use the whole DTLS for HNCP unicast traffic (and keep MC unencrypted since its more or less a signaling channel for UC and doesn't contain sensitive data). This would then avoid the need to redefine and reimplement most of the DTLS features in HNCP anyway.

Cheers,

Steven


Another is that the same cert can be used for TLS negotiation in embedded web 
services, etc. to each device.

And of course if the registration mechanism is integrated into client OS's then 
those X.509 certs can easily participate in the usual trust policy stuff 
supported by those OS's.


On Sep 18, 2014, at 6:34 AM, Ted Lemon <[email protected]> wrote:

On Sep 18, 2014, at 4:27 AM, STARK, BARBARA H <[email protected]> wrote:
UPnP Device Protection uses X.509 certificates (which can be self-signed, and 
in order not to assume a WAN connection, really should be self-signed) and TLS.
I think that something like this, in combination with the promiscuous 
registration mechanism that I think Michael described earlier, would do the 
trick.   It's not clear that we need X.509 certs, since I have trouble 
imagining that the keys these devices have would ever be signed by a CA.   A 
bare key might be plenty.   But I think this is a better option than trying to 
shoehorn this functionality into IPsec, which was designed for a _very_ 
different security context.

_______________________________________________
homenet mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/homenet
_________________________________________________________
Michael Sweet, Senior Printing System Engineer, PWG Chair

_______________________________________________
homenet mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/homenet

_______________________________________________
homenet mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/homenet

Reply via email to