Dear Xiaofeng Qiu,

Indeed, if protection against eavesdropping from inside the overlay is not an issue, encryption by means of public/private key pairs is unnecessary. However, eavesdropping is only one of the numerous threats a peer-to-peer overlay may face. Overlay routing attacks and attacks on the structure of the overlay depend on the exploitation of knowledge regarding the logical topology. This knowledge is easily gained via the unprotected messages exchanged in P2PSIP. The interesting part is that in p2p networks, many challenging threats originate from peers that are already members of the overlay. Of course, the security levels P2PSIP should provide is up to the WG. Our motivation stems from the fact that P2PSIP may be used in communication scenarios with strict security constraints (for example communication between authorities).
What is your opinion about the refreshment of the peers' certificates?

Konstantinos Birkos
University of Patras _______________________________________________
P2PSIP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/p2psip

Reply via email to