[homenet] hncp-security-trust

2014-11-15 Thread Michael Richardson
section 6.3.3 contemplates sending out verdicts for a period of time until a decision can be rendered, giving up after 10 minutes. I think, that since hncp is using trickle, it can just rely on trickle saying that we haven't got any new information, so just don't say anything. I assume that

Re: [homenet] I-D Action: draft-barth-homenet-hncp-security-trust-01.txt

2014-10-22 Thread Ray Bellis
On 22 Oct 2014, at 02:02, Brian E Carpenter brian.e.carpen...@gmail.com wrote: Up one more level: the charter looks pretty out of date in general. Hi Brian, The charter itself still reflects our primary focus. I believe it still accurately reflects the constraints on our scope. The

Re: [homenet] I-D Action: draft-barth-homenet-hncp-security-trust-01.txt

2014-10-22 Thread Brian E Carpenter
On 22/10/2014 23:54, Ray Bellis wrote: On 22 Oct 2014, at 02:02, Brian E Carpenter brian.e.carpen...@gmail.com wrote: Up one more level: the charter looks pretty out of date in general. Hi Brian, The charter itself still reflects our primary focus. I believe it still accurately

Re: [homenet] I-D Action: draft-barth-homenet-hncp-security-trust-01.txt

2014-10-22 Thread Michael Thomas
On 10/22/14, 12:46 PM, Brian E Carpenter wrote: On 22/10/2014 23:54, Ray Bellis wrote: On 22 Oct 2014, at 02:02, Brian E Carpenter brian.e.carpen...@gmail.com wrote: Up one more level: the charter looks pretty out of date in general. Hi Brian, The charter itself still reflects our primary

Re: [homenet] I-D Action: draft-barth-homenet-hncp-security-trust-01.txt

2014-10-21 Thread Brian E Carpenter
Hi, I agree with whoever it was that said there is not enough explanation of the threat model in this draft. The result is that I really can't evaluate whether the proposed solution is complete or adequate. The other thing that bothers me is that we need a secure homenet, not just a secure HNCP.

Re: [homenet] I-D Action: draft-barth-homenet-hncp-security-trust-01.txt

2014-10-21 Thread Steven Barth
I agree with whoever it was that said there is not enough explanation of the threat model in this draft. The result is that I really can't evaluate whether the proposed solution is complete or adequate. From my point of view there are two vectors through which you can attack HNCP - as

Re: [homenet] HNCP Security Trust Draft

2014-10-14 Thread Steven Barth
I just pushed a new revision of the draft. http://tools.ietf.org/html/draft-barth-homenet-hncp-security-trust-01 Most notable changes: * Some clarifications to the consensus based trust scheme * PSK-management now supports key-derivation for different protocols (IGPs, ...) * Underlying crypto

Re: [homenet] HNCP Security Trust Draft

2014-10-14 Thread Michael Thomas
. http://tools.ietf.org/html/draft-barth-homenet-hncp-security-trust-01 Most notable changes: * Some clarifications to the consensus based trust scheme * PSK-management now supports key-derivation for different protocols (IGPs, ...) * Underlying crypto scheme changed to DTLS for now * Some

Re: [homenet] HNCP Security Trust Draft

2014-10-06 Thread Mikael Abrahamsson
On Fri, 3 Oct 2014, Steven Barth wrote: Please note that this draft is in a very early stage so please help to make additions, provide feedback and point out mistakes. Being a crypto novice, let me write some text and please tell me if it makes sense in the context of your draft (thanks for

Re: [homenet] HNCP Security Trust Draft

2014-10-06 Thread Steven Barth
Hi Mikael, thanks for your feedback. Being a crypto novice, let me write some text and please tell me if it makes sense in the context of your draft (thanks for writing it, it looks like a good summary). I do not consider myself to be a crypto expert either which is one of the reasons I'd