Yes, that is the most common way to do it. Of course, we need to consider the implications of using self-issued certificates – just as we do today for SSH – versus certificates issued by some other trusted verifying authority. All of this will develop over time and I expect that groups of meshers will have different solutions to the same problem. That is a good thing – provided that approach has documented their rules for what constitutes an acceptable credential and the uses for each type. That way we can compare the rules and possibly derive a rule-set that is usable across wider areas and larger meshes.
Setting up and running a certificate infrastructure is another complication. This needs to be designed carefully to both provide the flexibility we need in our environment (many diverse groups with differing requirements including rapid ad hoc responses) and avoid the complexity and assumptions of typical corporate enterprise implementations.
There should always be a place for issuing and using simple passwords as we are doing now. The simple, cheap solution should always have a place as a valid credential for many uses.
In addition to your suggestions, we might want to use authentication to differentiate among people or devices that have access to:
- Specific parts of a local mesh network, like a command post versus a tactical team which focuses on a specific area
- Specific services where some people are allowed to view a camera and others not.
- Specific sub-services, where all participants can use the phone services but only within specific call groups.
- Limiting the geographical reach of a mesh network. It makes sense to develop and test with networks across many states, but it would probably be a distraction, at best, to allow a network in Texas that is supporting an emergency operation to be visible in California, New Jersey or Europe. We might want to turn geographical limits on and off at will, and do so quickly as the need arises, and the local authorities decide.
- Prevention and detection of abuse or misuse.
All the best,
Randy WU2S
On Behalf Of Darryl Quinn Sent: Wednesday, December 03, 2014 22:40 Subject: Re: QoS and directory services
Interesting ideas. Are you thinking about using a public/private key pair (ie. the ssh certs that we all use) to drive the authentication that would control "secure features" of the mesh.
Consider the following potential "authenticated features":
- internet gateway routing
- tunnel server connections
- QoS
|