Hi,

In an earlier thread, David A. Bryan asked about implementation experience of this draft. Two things pop out immediately from my head (they both feel like reinventing the wheel):

1. Digital signature related requirements seem rehashing what's being done in TLS and DTLS.
2. Fragmentation handling seems to be reinventing TCP using UDP.

The second one may be unfounded, but I like to toss around an idea while implementing the first. What if this draft mandates the following regarding TLS and DTLS connections:

A. Client authentication is required for all TLS and DTLS connections;
B. Both parties (peers) in a D/TLS connection uses the same digital credentials (certificates and public/private keys) for the DHT overlay.

For example, say peer X connects to peer Y via TLS. X will get Y's overlay certificates and public key during the first part of the TLS handshake. Then Y request X (the 'client') to send its certificates and public key during client authentication. The TLS session will be honored if and only if the overlay information in the certificates are validated on both sides. This is fully supported by TLS and DTLS (plus a few callbacks).

The level of trust established this way is equivalent to that provided by the current draft-03. The intend is that with these mandates, the RELOAD protocol itself can be simplified by removing all certificate and signature related requirements. For example, in my earlier post, an overhead of 1292 bytes can be trimmed down to only 69 bytes!!! (removing the security block and the STORE signature).

I still need to think about messages forwarded by instead of originated from a peer, but let the discussion begin.

Thanks

--Michael

_______________________________________________
P2PSIP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/p2psip

Reply via email to