>> Powerline Ethernet devices have built in encryption,

> Same thing with WPA* too of course. So I’m very tempted to assume L2
> takes care of security.. ;)

Guest networks?

However, I think it is premature to define a secure variant of HNCP before
we have some operational experience with the protocol.  It's only after
we've played with it for some time that will we get a feel for what are
reasonable and unreasonable operations to perform.

> just use e.g. IPsec with manual keying

Vulnerable to replay if done naively.  Not sure about the configuration
protocol, but definitely an issue for a routing protocol -- just capture
a default route announcement with a low metric, and you've won.

> [S4-3] HNCP-level PSK shared among all routers. Same bootstrap issues as
> [S4-2], may be able to get rid of manually keyed IPsec dependency.

It appears that you are only looking at hop-to-hop security.

I'm speaking off the top of my head here, so I'm probably saying something
stupid.  What about end-to-end solutions, where only routers with
a trusted key can originate configuration information?  This could perhaps
be combined with a leap-of-faith model (a la ssh).

> Looking at Babel, the routing protocol spec is 45 pages, and draft
> specification of HMAC security scheme for it is 55 pages.

Yeah, wouldn't it be nice if we had a common layer 3 security protocol?
(We would make sure that it's actually usable before standardisation, of
course.)

-- Juliusz

_______________________________________________
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet

Reply via email to