Applying a cryptographic namespace to applications
DIN '05 Proceedings of the 1st ACM workshop on Dynamic interconnection of networks
Resilient connections for SSH and TLS
ATEC '06 Proceedings of the annual conference on USENIX '06 Annual Technical Conference
Hi-index | 0.00 |
Host mobility presents a challenge for security protocols. For example, many proposals exist for integrating IPsec to Mobile IP. However, the existing approaches are cumbersome to configure and contain many round trips for security and mobility updates. The Host Identity Protocol (HIP) is being developed in the IETF to provide secure host mobility and multihoming. The default way to operate the protocol is that the connection initiator knows the peer's public key or a hash of the public key. This requires either infrastructure support or preconfiguration which introduces difficulties for deploying the protocol. In this paper, we present an implementation and evaluation of HIP that creates leap-of-faith security associations. The implemented approach establishes end-to-end security without requiring any new infrastructure to be deployed. We argue that since worldwide PKI is nowhere near, and seems to nearly impossible to deploy in practice, leap-of-faith security is enough for Internet access and mobility. In our view, the deployment of opportunistic HIP even makes the deployment of DNSSEC unnecessary for most applications.