> I may have missed something, but I think that in the case of the first 
> notify, it does actually start at the Itr. 
>  Specifically, it starts with an ItR sending a subscribe request.  The MS 
> responds to that with a notify.  What I am suggesting is that (when security 
> is desired) the Itr includes the same kind of information in its subscribe 
> that goes into lisp-sec.  And that the reply, instead of going directly from 
> the MS back to the ITR goes through the ETR so that the rest of the lisp-sec 
> procedures can be applied.

Yes, and in that Subscribe-Request you can include an OTK. But that 
one-time-key would be used more than one time. To send the Map-Notify to reply 
with the RLOC-set to the ITR as well as acknowledger from the Map-Server that 
subscription has been accepted. But then the one-time-key would have to be 
*stored* in the Map-Server and then used later when the RLOC-set changes to 
send an unsolicited Map-Notify. So the one-time-key would be “two time” and we 
would set a precedent to make it no longer ephemeral. In previous cases, the 
OTK was not stored anywhere.

> I would then use that as a bootstrap, putting necessary secrets to create the 
> key information so that the MS can sign and the ITR can verify future 
> notifies that go directly from the MS to the ITR.

If the working group believes that the OTK should be stored and then used 
again, then both the Map-Server and ITR would have to store it. In the original 
case, the ITR stores the OTK only until the time a Map-Reply or Map-Notify is 
received. But the Map-Server would have to store it indefinintely (per ITR that 
subscribes).

Dino

> 
> Yours,
> Joel
> 
> On 3/31/2020 1:33 PM, Dino Farinacci wrote:
>>> thinking about Alberto's request, and reading the document, I wondered if 
>>> the security could be improved by sending the first notify back via the 
>>> ETR, and coupling it to LISP-SEC to protect the information and provide 
>>> needed keys for further messages? It seems like we do need a way to protect 
>>> the notifications, and requiring associations from every ITR to every MS 
>>> who may provide notifications seems impossible.
>> You can’t use LISP-SEC because the transactional nature of it starts with an 
>> ITR and a one-time-key, that is used to signed Map-Replies returning to it.
>> For Map-Notify messages send from Map-Server via ETR, there would be no ITR 
>> one-time-key. And if the Map-Server used its own one-time-key, the ITR 
>> couldn’t derive it. Note with LISP-SEC the map-server one-time-key is 
>> derived from the ITR’s one-time-key in the Map-Request.
>> Dino

_______________________________________________
lisp mailing list
lisp@ietf.org
https://www.ietf.org/mailman/listinfo/lisp

Reply via email to