Re: [homenet] Working Group draft adoptions

2014-09-19 Thread Mark Townsley
On Sep 16, 2014, at 2:12 PM, normen.kowalew...@telekom.de wrote: Hi, Regarding * draft-mglt-homenet-front-end-naming-delegation * draft-mglt-homenet-naming-architecture-dhc-options I think this is useful work and support its adoption. However, I’d like to see these drafts

[homenet] I-D Action: draft-ietf-homenet-front-end-naming-delegation-00.txt

2014-09-19 Thread internet-drafts
A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the Home Networking Working Group of the IETF. Title : Outsourcing Home Network Authoritative Naming Service Authors : Daniel Migault

[homenet] I-D Action: draft-ietf-homenet-naming-architecture-dhc-options-00.txt

2014-09-19 Thread internet-drafts
A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the Home Networking Working Group of the IETF. Title : DHCP Options for Homenet Naming Architecture Authors : Daniel Migault

Re: [homenet] HNCP security?

2014-09-19 Thread Mark Townsley
On Sep 18, 2014, at 12:34 PM, Ted Lemon mel...@fugue.com wrote: On Sep 18, 2014, at 4:27 AM, STARK, BARBARA H bs7...@att.com wrote: UPnP Device Protection uses X.509 certificates (which can be self-signed, and in order not to assume a WAN connection, really should be self-signed) and TLS.

Re: [homenet] HNCP security?

2014-09-19 Thread Markus Stenberg
On 19.9.2014, at 11.18, Mark Townsley m...@townsley.net wrote: My own experience attempting to use IPsec as an add-on security solution (a.k.a. pixie dust) for a protocol isn't all that positive. We tried that with L2TP, and in the process failed to kill off PPTP on windows clients. I can't

[homenet] I-D Action: draft-ietf-homenet-prefix-assignment-00.txt

2014-09-19 Thread internet-drafts
A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the Home Networking Working Group of the IETF. Title : Prefix and Address Assignment in a Home Network Authors : Pierre Pfister

Re: [homenet] HNCP security?

2014-09-19 Thread Mark Baugher
On Sep 19, 2014, at 3:25 AM, Ted Lemon mel...@fugue.com wrote: On Sep 18, 2014, at 6:46 PM, Mark Baugher m...@mbaugher.com wrote: The retail model works here. I can imagine a compliant CPE might allow the use to take ownership of an interior HNCP interface. That's only if the provider of

Re: [homenet] HNCP security?

2014-09-19 Thread Michael Thomas
On 09/19/2014 01:18 AM, Mark Townsley wrote: Another lesson learned was exposing two passwords to the user vs. one. In a retail/wholesale LAC/LNS deployment model, it made perfect sense for the L2TP tunnel to have a password separate from the PPP user password (and L2TP fully supplanted L2F

Re: [homenet] HNCP security?

2014-09-19 Thread Steven Barth
Am 19.09.2014 um 16:00 schrieb Michael Thomas: And it's extremely unlikely that DTLS will be a one-sentence solution even if it gets adopted because DTLS, IPsec, etc say nothing about enrollment and authorization. Those are by far the hard problems with homenent security. I wouldn't really

Re: [homenet] HNCP security?

2014-09-19 Thread Michael Thomas
On 09/19/2014 07:52 AM, Steven Barth wrote: Am 19.09.2014 um 16:29 schrieb Michael Thomas: Punting on one of the hardest problems would be a travesty. There are plenty of people in IETF that are plenty smart about this subject; we will never get an opportunity to do the right thing again if we

Re: [homenet] HNCP security?

2014-09-19 Thread Ted Lemon
On Sep 19, 2014, at 10:52 AM, Steven Barth cy...@openwrt.org wrote: That was not my point. I'm totally happy with having a standardized way of doing this but I don't think that HNCP is the place where it should be defined since we will probably not be the only user. HNCP won't be the only

Re: [homenet] HNCP security?

2014-09-19 Thread Mark Baugher
On Sep 19, 2014, at 8:54 AM, Ted Lemon mel...@fugue.com wrote: On Sep 19, 2014, at 10:52 AM, Steven Barth cy...@openwrt.org wrote: That was not my point. I'm totally happy with having a standardized way of doing this but I don't think that HNCP is the place where it should be defined since

Re: [homenet] HNCP security?

2014-09-19 Thread Ted Lemon
On Sep 19, 2014, at 11:59 AM, Mark Baugher m...@mbaugher.com wrote: How could it happen? Isn't that what we've been discussing? ___ homenet mailing list homenet@ietf.org https://www.ietf.org/mailman/listinfo/homenet

Re: [homenet] HNCP security?

2014-09-19 Thread Douglas Otis
On Sep 19, 2014, at 7:17 AM, Steven Barth cy...@openwrt.org wrote: Am 19.09.2014 um 16:00 schrieb Michael Thomas: And it's extremely unlikely that DTLS will be a one-sentence solution even if it gets adopted because DTLS, IPsec, etc say nothing about enrollment and authorization. Those are

Re: [homenet] HNCP security?

2014-09-19 Thread Randy Turner
A cert by itself is more or less a wrapper ­ but that¹s not the way PKI works (certs by themselves) - you have certs and trust anchors ­ the anchors being the method by verifying the identity of the person presenting the cert ­ you can do proof of possession as well to very the identity

Re: [homenet] HNCP security?

2014-09-19 Thread Ted Lemon
On Sep 19, 2014, at 1:22 PM, Mark Baugher m...@mbaugher.com wrote: AFAICT, we've been discussing key format or DLTS vs IPsec. That discussion presumes that you have some way for a CPE from ISP-a to securely accept HNCP from ISP-b, or the user's new AP/router, and so forth. How does that

Re: [homenet] HNCP security?

2014-09-19 Thread Michael Thomas
On 9/19/14, 12:38 PM, Ted Lemon wrote: On Sep 19, 2014, at 1:22 PM, Mark Baugher m...@mbaugher.com wrote: AFAICT, we've been discussing key format or DLTS vs IPsec. That discussion presumes that you have some way for a CPE from ISP-a to securely accept HNCP from ISP-b, or the user's new

Re: [homenet] HNCP security?

2014-09-19 Thread Ted Lemon
On Sep 19, 2014, at 4:54 PM, Michael Thomas m...@mtcc.com wrote: I guess that's kind of what I've been getting at: should we capture all of this in a threats document? I'm a little uncomfortable with the formality, but I'm even more uncomfortable with the seeming desire by some to sweep