On 09/18/2014 06:49 AM, Markus Stenberg wrote:
On 18.9.2014, at 16.05, Ted Lemon <mel...@fugue.com> wrote:
On Sep 18, 2014, at 7:38 AM, STARK, BARBARA H <bs7...@att.com> wrote:
X.509 certificates can be self-signed. That is, the device acts as its own CA. 
In fact, this is the recommended approach.
Of course.   But if there is never going to be a CA-signed key, there is no 
reason to have a cert at all.   Self-signed certs are essentially a way of 
carrying a bare key in a cert, unless you install your signer key as a CA key, 
in which case you have an administratively configured CA key that is signing 
the cert, and it’s no longer really a self-signed cert.
On the other hand, use of certificates facilitates also use of something like 
(hardware bound) device certificates, that would be much harder to generate on 
demand (and therefore blacklisting them might actually make sense in 
opportunistic scheme).



With device certificates, you still have the original authz problem. That is, just because I can identify you reliably tells me nothing about whether I want to participate with routing updates with you. So in that
way, they not any more useful than naked keys.

Mike

_______________________________________________
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet

Reply via email to