[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: IKEV2: Issue #4 Revised Identity
Michael Richardson <mcr@sandelman.ottawa.on.ca> writes:
> >>>>> "Eric" == Eric Rescorla <ekr@rtfm.com> writes:
> Eric> Michael Richardson <mcr@sandelman.ottawa.on.ca> writes:
> >> That's really not a problem for IKE. If the right goop isn't there,
> >> you loose.
>
> Eric> Uh, then why bother having caching at all? If you're going to have
> Eric> caching you have to have cache invalidation.
>
> Don't all these fancy certificates come with expiry dates?
Not all rollovers or reconfigurations happen on expiry dates.
> >> That's why we want to just send the URL (or URN if you want) where the
> >> certificate, whatever chain you need, and maybe the CRL, can be found.
>
> Eric> And if the implementation can't do HTTP you're completely SOL--or
> Eric> rather you have to send the whole chain over UDP, which is what you
> Eric> say you're trying to avoid.
>
> No, if the implementation can't do HTTP, then I buy another implementation,
> or I preconfigure the appropriate chain, or I simplify the trust model.
Why not just get the design right in the first place?:
> The problem that people doing certificates keep running into is that they
> keep thinking that they are building the "global PKI" and run into how do
> two random people communicate securely, even though there isn't a global PKI.
>
> This is why you say things like this - you assume that the two parties are
> random people and don't have any clue about each other's situation. So far,
> there isn't anyone that wants to do this kind of thing that is using pkix
> certificates.
This works just fine with TLS.
-Ekr
--
[Eric Rescorla ekr@rtfm.com]
http://www.rtfm.com/