On 20/09/2014 08:05, Michael Thomas wrote:
> 
> On 9/19/14, 12:38 PM, Ted Lemon wrote:
>> On Sep 19, 2014, at 1:22 PM, Mark Baugher <m...@mbaugher.com> wrote:
>>> AFAICT, we've been discussing key format or DLTS vs IPsec.  That
>>> discussion presumes that you have some way for a CPE from ISP-a to
>>> securely accept HNCP from ISP-b, or the user's new AP/router, and so
>>> forth.  How does that happen?
>> Michael Richardson had some suggestions back on the 17th.   There's
>> definitely been more talk of keys than mechanisms since then, but that
>> is precisely why I said what I did about the HNCP key discussion.
>>
> 
> I think the larger implication is that if HNCP has implications of
> needing to deal with
> multiple different trust boundaries and how they interact, asking
> whether we need "IPsec
> or DTLS and then are we done?" is profoundly premature. A home network
> is a vulnerable
> and very complicated environment even today, and adding a lot more
> functionality without
> plumbing the depths of the security implications will only make a bad
> situation much worse.

I agree. I think there are a number of steps to consider, and how
to secure an individual point-to-point communication is late in the
list. Even without a threat analysis, I can see:

1. Establish the boundary (and Tim's recent power-line story
   underlines that this isn't trivial).
2. Establish the trust anchor (you're bound to need one).
3. Establish (trusted identity + public key) for every device.
4. Authorise each device for selected roles.
5. Distribute public keys accordingly.

Do that, and it becomes a relatively minor point which crypto
protocol you choose.

   Brian

_______________________________________________
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet

Reply via email to