HIP issue
Andrei Gurtov
gurtov at cs.helsinki.fi
Mon Oct 23 11:39:09 UTC 2006
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Watson Ladd wrote:
> What *exactly* are we talking about using HIP for? Node-to-node
> connections, or the connections the client makes to tunnel traffic?
I would say, both.
> For the first one we have TLS.
Various arguments can be made on HIP vs. TLS discussion. Some people
prefer end-to-end IPsec rather than TLS.
> For the second one, HIP solves the wrong
> problem. We want to authenticate nodes to users, not each to the other.
It is possible to use "anonymous identities" from node side that are not
publicly announced and/or frequently regenerated. There has been
significant work on HIP privacy extensions.
> While HIP is more efficient then TLS, we could use SSH for the
> connections to gain on efficiency.(Talking about the first problem).
> SSH is one of the most scrutinized protocols in existence, so it could
> be a good choice.
Might be so, though TLS/SSH does not support mobility and multihoming,
Denial-of-service protection, and so on. With HIP e.g. IPv6-only Tor
client in China could talk to IPv4 client in EU.
Andrei
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iD8DBQFFPKndP7jp0uceFkQRAmn4AJ40kw4LJE/oGyKwlDKFyWqV/v74GgCg2Dhn
b+i/3GCNTwx2f3CjSlsnQnw=
=bsbE
-----END PGP SIGNATURE-----
More information about the tor-dev
mailing list