Re: [Architecture-discuss] Re: 8+8 history (Re: Sources of architectural change)

David Meyer <dmm@1-4-5.net> Wed, 02 November 2005 17:26 UTC

Received: from localhost.cnri.reston.va.us ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1EXMNR-0008NW-9P; Wed, 02 Nov 2005 12:26:21 -0500
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1EXMNP-0008Me-JR for architecture-discuss@megatron.ietf.org; Wed, 02 Nov 2005 12:26:19 -0500
Received: from ietf-mx.ietf.org (ietf-mx [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA23261 for <architecture-discuss@ietf.org>; Wed, 2 Nov 2005 12:25:58 -0500 (EST)
Received: from m106.maoz.com ([205.167.76.9]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1EXMc1-000549-ML for architecture-discuss@ietf.org; Wed, 02 Nov 2005 12:41:27 -0500
Received: from m106.maoz.com (localhost.localdomain [127.0.0.1]) by m106.maoz.com (8.13.4/8.13.4) with ESMTP id jA2HQ9aF015325; Wed, 2 Nov 2005 09:26:09 -0800
Received: (from dmm@localhost) by m106.maoz.com (8.13.4/8.12.11/Submit) id jA2HQ4IY015322; Wed, 2 Nov 2005 09:26:04 -0800
X-Authentication-Warning: m106.maoz.com: dmm set sender to dmm@1-4-5.net using -f
Date: Wed, 02 Nov 2005 09:26:04 -0800
From: David Meyer <dmm@1-4-5.net>
To: Jari Arkko <jari.arkko@piuha.net>
Subject: Re: [Architecture-discuss] Re: 8+8 history (Re: Sources of architectural change)
Message-ID: <20051102172604.GA15294@1-4-5.net>
References: <CF6037C6-175B-4439-AECA-F5A7A5996356@tony.li> <4368482B.2020808@thinkingcat.com> <33C7305E-DCCB-4094-B8BD-1F3BDEFFBC63@tony.li> <4368580A.4040607@thinkingcat.com> <E3B3196D-23E1-4EC0-9979-C8AE75E57EC6@tony.li> <6FD12FDCBB470881DF31DCEC@svartdal.hjemme.alvestrand.no> <4F300850-1672-4CC9-96E3-84B1D9CC8282@tony.li> <6.2.3.4.2.20051102154554.04495310@mail.jefsey.com> <05C8A2EA-1B8D-45F6-AD81-EB7632CCAA18@tony.li> <4368E4C8.3050308@piuha.net>
Mime-Version: 1.0
In-Reply-To: <4368E4C8.3050308@piuha.net>
User-Agent: Mutt/1.4.1i
X-public-key: http://www.1-4-5.net/~dmm/public-key.asc
X-gpg-fingerprint: 2409 8B50 B389 A307 BA5C 2A16 3918 03D6 A099 D8A7
X-philosophy: "I find your lack of faith disturbing." -- Darth Vader, Star Wars Episode IV.
X-Spam-Score: 0.0 (/)
X-Scan-Signature: f4c2cf0bccc868e4cc88dace71fb3f44
Cc: architecture-discuss@ietf.org
X-BeenThere: architecture-discuss@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: open discussion forum for long/wide-range architectural issues <architecture-discuss.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/architecture-discuss>, <mailto:architecture-discuss-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/architecture-discuss>
List-Post: <mailto:architecture-discuss@ietf.org>
List-Help: <mailto:architecture-discuss-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/architecture-discuss>, <mailto:architecture-discuss-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============0597311621=="
Sender: architecture-discuss-bounces@ietf.org
Errors-To: architecture-discuss-bounces@ietf.org

On Wed, Nov 02, 2005 at 06:09:44PM +0200, Jari Arkko wrote:
> Tony Li wrote:
> 
> >There is much more to it than that.  Basically, GSE was the last and  
> >best effort to create an architecture that separated
> >the address into both a 'locator'  (where is the host) and  
> >'identifier' (the ESD in the draft). 
> 
> I think some modern architectures such as HIP appear
> to do a more thorough job and consider the whole problem. (Or at
> least a larger problem, I think HIP NAT support needs improvement.)
> 
> >Security would not cover the locator and security associations would  
> >only be between ESDs.
> 
> There's a lot more to security than allowing IPsec SAs to work over
> communications in such architectures. Marcelo pointed to some
> issues in his mail; you'd probably want to avoid other people hijacking
> your communications etc.
> 
> I wanted to see if GSE had dealt with these issues, but here's what
> the security consideration section from the GSE draft says:
> 
> >17. Security Considerations
> >
> >  More than can be imagined.

	Please review

	 http://www3.ietf.org/proceedings/99nov/I-D/draft-ietf-ipngwg-esd-analysis-05.txt

	and

	 http://www.cs.columbia.edu/~smb/papers/esd-secure.txt


	Dave
_______________________________________________
Architecture-discuss mailing list
Architecture-discuss@ietf.org
https://www1.ietf.org/mailman/listinfo/architecture-discuss