Joe> Sure, but the changes need to be a little more careful. In
Joe> particular, most of BTNS focuses on what your own side
Joe> does. Finding another side that is willing to do BTNS matters
Joe> only if your own cert is not signed by a well-known CA; it has
Joe> nothing to do with your decision to proceed with the cert of
Joe> the other side without checking its CA.
Yes, I agree.
The section in question is relating to other work. I'm sending text,
because you have mis-stated what OE does.
The original text:
Opportunistic Encryption (OE) is a system for automating authentication
infrastructure by leveraging the existing use of the DNS
Your proposed text:
Opportunistic Encryption (OE) is a system for automatic discovery of
hosts willing to do a BTNS-like encryption, with authentication being
exchanged by leveraging existing use of the DNS
Agreed as to the text change.
The point is that BTNS doesn't do discovery, nor does it matter,
because of what you just said.
Joe> How does this 'automatic discovery' work, and how is it a
Joe> variant of OE? (can you explain?)
System about to send packet looks in reverse DNS for a specific kind
of RR (TXT RR in the current draft, to be changed to IPSECKEY soon in a
future revision of the specification).
If the key exists, it initiates. If the key doesn't exist, it fails,
and may fall-back to something else (pass or block).
Why would we want to depend on a predeployed infrastructure to detect
whether the other end was willing to do something? Wouldn't the success
of an IKE exchange with an un-CA'd certificate be proof, and wouldn't
that be more direct (and less dependent on infrastructure)?
This is described in draft-richardson-ipsec-opportunistic-17.txt
http://www.sandelman.ottawa.on.ca/SSW/freeswan/oeid/draft-richardson-ipsec-opportunistic.html
sections 2.3, 3.1, 3.2, 4.2, 4.4, 5.2, 10.1.
Joe> Finally, there's no need to use the DNS to exchange
Joe> authentication in BTNS; that just inserts an extra intermediary
Joe> to attack, and possibly a worse delay.
Nor was it suggested.
Yes, but even checking to see whether it exists introduces a delay,
doesn't it?
Joe
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 250 bytes
Desc: OpenPGP digital signature
Url : http://www.postel.org/pipermail/anonsec/attachments/20051106/0ab7ac0e/signature.bin