One advantage of using X.509 certs is that the code to support them is widely 
available with multiple implementations.

Another is that the same cert can be used for TLS negotiation in embedded web 
services, etc. to each device.

And of course if the registration mechanism is integrated into client OS's then 
those X.509 certs can easily participate in the usual trust policy stuff 
supported by those OS's.


On Sep 18, 2014, at 6:34 AM, Ted Lemon <mel...@fugue.com> wrote:

> On Sep 18, 2014, at 4:27 AM, STARK, BARBARA H <bs7...@att.com> wrote:
>> UPnP Device Protection uses X.509 certificates (which can be self-signed, 
>> and in order not to assume a WAN connection, really should be self-signed) 
>> and TLS.
> 
> I think that something like this, in combination with the promiscuous 
> registration mechanism that I think Michael described earlier, would do the 
> trick.   It's not clear that we need X.509 certs, since I have trouble 
> imagining that the keys these devices have would ever be signed by a CA.   A 
> bare key might be plenty.   But I think this is a better option than trying 
> to shoehorn this functionality into IPsec, which was designed for a _very_ 
> different security context.
> 
> _______________________________________________
> homenet mailing list
> homenet@ietf.org
> https://www.ietf.org/mailman/listinfo/homenet

_________________________________________________________
Michael Sweet, Senior Printing System Engineer, PWG Chair

_______________________________________________
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet

Reply via email to