Markus Stenberg <markus.stenb...@iki.fi> wrote:
    markus> What the draft does not cover is what is the assumption about
    markus> security of protocols within it. If HNCP is run only over either
    markus> physically or cryptographically secured link layer, there are no
    markus> real extra requirements for HNCP.

    markus> So, question time:

    markus> 1) Can we assume secure L2 and/or appropriate device
    markus> configuration by the manufacturer/ISP(/user)? (This is what I can
    markus> assume in my own home.)

I think that we can assume that wired links are secure.
The only time we care if wireless is secured is when we want to form an
adjacency over the wireless link.   I think it is acceptable to refuse
to form an adjancency over an insecured wireless link.

I think it is acceptable to do some kind of TOFU (using IPsec with IKEv2
even)  point to point across wired links, and having done that, if there
is an adjancy later possible between those two devices over what would
otherwise be an insecure link,  that the previously exchanged keys work.
That means one can plug two routers together with a cable, and then
separate them, knowning that the two routers will remain "entangled"
(I'm making allusions to http://en.m.wikipedia.org/wiki/Quantum_entanglement)

I  further suggest that if two routers have wireless that they might well
have a WPA2/PSK available to them, and that they can and SHOULD use something
derived from that key to authenticate each other.  Could be over IKEv2, yes.

    markus> 2) If not, should the solution be some sort of pre-shared key
    markus> scheme? (If not, please explain your alternative solution.)

If we assume the abovekey, we could use it to derive a pre-shared key for a
multicast IPsec SA using AH.  Can we assume, declare, that if you don't know
the key, that you skip the AH header, and process the HNCP that is inside as
if it wasn't secured at all?  We wanted to do that for SEND, but there were
IPsec implementations that could do that, because we overspecified AH back in
2401.  Given that home routers are purpose built boxes, and not generic
random hosts, perhaps we can specify this behaviour.

    markus> 2.1) And if so, should it be manually keyed IPsec (multicast
    markus> prevents e.g. IKE)? (This is what is in the draft currently.)

Yes, if we can make this AH assumption of skipping, so that we can get TOFU
to work.

    markus> 2.2) Or should we roll our own in-HNCP scheme?

No.

I realize that there is an issue with cable modems and FTTH systems such that
the ISP boundary can be hard to recognize.  I propose that HNCP use scope-5
multicast, and that we try to convince the Broadband forum that it's cable
modems should drop scope-5 multicast, if they see it.  Further, we have the
heuristic that if we saw DHCPv6PD on that interface, it might be an ISP.
(If we also saw DHCPv6PD, and we saw authenticated HNCP, then it is internal)

--
]               Never tell me the odds!                 | ipv6 mesh networks [
]   Michael Richardson, Sandelman Software Works        | network architect  [
]     m...@sandelman.ca  http://www.sandelman.ca/        |   ruby on rails    [


--
Michael Richardson <mcr+i...@sandelman.ca>, Sandelman Software Works
 -= IPv6 IoT consulting =-



Attachment: pgpqn07qm0khx.pgp
Description: PGP signature

_______________________________________________
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet

Reply via email to