Yep, that fills in the details nicely. I started from "we should be able to bootstrap the security through lisp-sec".

Yours,
Joel

On 3/31/2020 8:27 PM, Dino Farinacci wrote:
Sorry, yes, it is the MS, not the MR, who provides the information to construct 
the key, since it is the MS who is generating the notifies. Sorry I still cross 
them up.

Oh good. That is more clear now. So if you are saying this:

(1) Use LISP-sec as defined today.
(2) Have the MS wrap some new key material with the MS-OTK and pass it to the 
ETR.
(3) The ETR replies as it does today but we have new protected key material in 
the Map-Reply.
(4) The MS stores the new key-material.
(5) The ITR generates the new key-material because it can unwrap the MS-OTK 
that is derived from the ITR-OTK.
(6) Any subsequent unsolicited Map-Notify messages from the MS (for an 
RLOC-change) are signed with the new key-material. Which the ITR can verify 
since it has the new key-material from step (5).

That is a shared-key created with the pair of OTKs. I think that can work. 
Fabio needs to verify.

I know you didn’t say all these details but I’m progressing your point, for 
discussion.

Dino


_______________________________________________
lisp mailing list
lisp@ietf.org
https://www.ietf.org/mailman/listinfo/lisp

Reply via email to