-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Okay, so I layed out the problem in the my previous email. Now for some thoughts on the solution.

Essentially, we need a distributed way of uniquely identifying a site that cannot be spoofed, and does not get tripped up by the many possible network configurations that occur out in the wild.

I think the way to go is public key cryptography.

Sites would be uniquely identified by their public key (or more likely, a key fingerprint). VOS will use this site id internally and in all its communication. Only when VOS encounters a site id that it doesn't recognize, it asks its peers for the connection information for that site. When it connects, it verifies that a) the site's public key matches the key fingerprint, and b) uses a challenge-response protocol to verify that the site actually has the corresponding private key for the public key.

This has a number of advantages:

1. There is now only a single valid URL for a site, based on the site public key fingerprint.

2. Different hosts can communicate with a site using multiple protocols, but between them still use the same URL for that site. (Currently VOS doesn't support more than one protocol at once because vip:// and vop:// are considered different URLs...)

3. Spoofing is incredibly difficult. The key fingerprint is basically a hashed-down version of the full public key. In order to forge an identity, the attacker must discover a public/private key pair where the public key matches the key fingerprint, then successfully pass the challenge/response protocol.

4. A public key infrastructure is essential for bootstrapping digitally signed messages and/or encrypted connections, which is something we need eventually to support to ensure connection integrity.


The details still need to be fleshed out, and I want to postpone this until after the 0.23 release (which has now been delayed going on 4 months, what is this, Windows Vista?). However, judging by fact that Lalo with no coaching has already jumped in with basically the same idea I'm outlining here, I think it's a winner :-)

[   Peter Amstutz   ][ [EMAIL PROTECTED] ][ [EMAIL PROTECTED]  ]
[Lead Programmer][Interreality Project][Virtual Reality for the Internet]
[ VOS: Next Generation Internet Communication][ http://interreality.org ]
[ http://interreality.org/~tetron ][ pgpkey:  pgpkeys.mit.edu  18C21DF7 ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFEJ4BNaeHUyhjCHfcRAnJoAJoCLtDNdcA1WEkJ715kOvHbTc6m/QCdEVs4
ykMRE1QHO+hbd7ubkvCTprQ=
=Xj5b
-----END PGP SIGNATURE-----


_______________________________________________
vos-d mailing list
[email protected]
http://www.interreality.org/cgi-bin/mailman/listinfo/vos-d

Reply via email to