Pekka Nikander wrote:
[Dropping IPv6 as this has nothing to do with IPv6 any more]

Jari and Erik,

My assumption is that anybody that cares about security of the content being communicated applies some security to that content; IPsec, TLS, whatever. And if folks care about www.example.com really mapping to an IP address and the routes pointing in that direction, we need DNSsec and some routing security.

AFAICT we need this even if HIP is used (even though HIP helps to get IPsec end-to-end).


Yes. One of the reasons why this is needed is that
the specific issues in applications typically need specific
security support that is easier to provide in application
or transport layer. Secondly, historically, we have struggled
in providing meaningful and universal information from IP
layer security mechanisms to applications. I do not
see any reason why the world would change in this regard,
particularly given the already developed and deployed
mechanisms.


I think you may be missing one aspect of CGAs/KHIs/HITs/whatever, which is implicit channel bindings and the ability to continue identifiers for security purposes.

I suspect neither Jari or I have missed that.
I guess I don't understand what you are responding to; this particular part was about the need for DNSsec and routing security. I don't think you are arguing that we don't need those if we have HIP, thus I don't understand what point you are making relative to what I and Jari said.

Hence, the security I was referring to is the strength of the cryptographic binding from the IPv6-look-alike identifier to the public key. If the hash is short, the binding is weak. Even the currently-proposed 120-bits hash will become vulnerable during the lifetime of many of us, and using 128 bits doesn't help much there. Consequently, in the long run, I think there is some incentive to move using full public keys (or something similar) as host or end- point identifiers.

The impact of the above was what I explicitly disclaimed in my email yesterday. But to understand the security of the system, one would presumably need to start with a FQDN and take into account DNSsec and routing security, and see what the different threats are.

For instance, how would HIP (with its binding by having the hash in the HIT) compare with getting both AAAA and IPSECKEY RRs from (the secured) DNS?
I certainly don't understand all the tradeoffs to make such a comparison.

   Erik

_______________________________________________
Int-area mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/int-area

Reply via email to