[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: [Ipsec] Proposed Last Call based revisions to IKEv2



The risks that William Dixon mentions wrt to the exposure of sensitive
information in certificates or certificate requests can be eliminated
through the use of "Hidden Credentials".  The HC method
allows both sides (authenticatee and authenticator) in the
authentication exchange to keep their requirements and credentials
secret unless there is a match that will allow authentication to
succeed.

I presented this at an IPSec meeting a few IETF's ago.  The only known
implementation relies on Identity-Based Encryption (IBE) which is
patented IPR, and IBE relies on elliptic curve groups, which have some
associated IPR.  Despite these drawbacks, Hidden Credentials do solve
an important trust problem for protocols like IKE, and might be worth
some thought for IKEng.

Hilarie

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec