The example applications here are mobility, multicast, and anycast, but from my reading, in principle one could create a firewall. I'm not sure about NAT-like machinery, however.
The thing I liked best about this paper is that the basic algorithm is very simple, and allows both senders and receivers to define intermediaries that are composable. With some additional complexity, a few optimizations can be introduced.
However, like the previous paper, the security concerns are many. The paper considers protection against some of the possible attacks, but any time we introduce a level of indirection into the network, the potential attack vectors must increase. I think some of the issues they bring up can be resolved pretty easily, but things like having to check for loops in the routing makes insertion of triggers take much longer since you need to check if the insertion creates a loop.
Overall, this paper has a simpler algorithm, but the security issues remain.
1 comment:
I agree about the simplicity and generality of i3 mechanism. DOA does a better job of addressing the authentication and security issues. The bottom line is that the operational issues for any of these schemes is really quick large, It won't be easy making these things work at Internet
Post a Comment