Ron, I am having trouble with the question.

The threats document describes the threats as they exist today, without the adoption of either document that Roger pointed to. Thus, I do not see any dependence.

If there is a threat that is not well described in the base spec or this document, then we should add it. We should add it even if there are proposals to remediate it. But if there is a clear proposal of a missing threat, I missed it.

Yours,
Joel

On 5/13/14, 1:31 PM, Ronald Bonica wrote:
Hi Roger,

Or asked more explicitly, can the level of security claimed by the threats 
document be achieved without implementing the protocol extensions described in 
lisp-sec and lisp-crypto?

                                                           Ron


-----Original Message-----
From: Ronald Bonica
Sent: Tuesday, May 13, 2014 1:22 PM
To: 'Roger Jørgensen'; Ross Callon
Cc: [email protected]
Subject: RE: [lisp] Restarting last call on LISP threats

Hi Roger,

Can this draft stand on its own, without integrating content from the
documents that you reference?

                                                                                
              Ron


There exist two draft that are relevant to what you address.

You have https://datatracker.ietf.org/doc/draft-farinacci-lisp-crypto/
where the payload of a LISP encapsulated packet are encrypted. None of
the keys for encrypting/decrypting are stored in the mapping system
but is calculated by the xTR's involved.
Then you have https://datatracker.ietf.org/doc/draft-ietf-lisp-sec/
that attempts to secure the xTR to xTR relationship.



--


_______________________________________________
lisp mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/lisp


_______________________________________________
lisp mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/lisp

Reply via email to