On Fri, 3 Jun 2011, Uma Chunduri wrote:



....


True, privacy through SSH is overkill but strong AUTH is *critical*, I feel:
  - TCP-MD5 should not be considered (as it is any ways deprecated and it's MD5)
  - TCP-AO has only slight advantage as it has less overhead than ipsec-AH even 
when
    deployed with manual keys
  - but it's better if it is "MUST support authentication of nodes with TCP-AO or 
ipsec-AH" because

Just to be sure:

Did you understand the part about implementations of TCP-AO and ipsec-AH not being available at present?

I.e., you recognize this forces a delay in implementation of the protocol (and accept the consequent impact on deployment of the RPKI)?

--Sandy, speaking as wg co-chair


    as both support
          - strong auth algos
          - algo agility
          - can be deployed with manual and auto key management
           (auto key probably required eventually, once with lot of connections 
at
            cache/global RPKI/server side and for automatic key
            changes periodically)
          - key changes for existing sessions

   One would get flexibility with this.
   Also Section 7 (page 16)
   "It is assumed that the router and cache have exchanged keys out of band by some 
reasonably secured means"
   This will be still applicable but only if TCP-AO/ipsce-AH are deployed with 
manual keys.

2 cents,
-Uma


_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to