Host authentication

By name or address

DNS name, IP address, MAC address, and others.

Extremely weak, no cryptographic proofs.

  • Nevertheless, used by many services.

  • e.g. NFS, TCP wrappers.

With cryptographic keys

Keys shared among peers.

  • With a history of usual interaction.

Per-host asymmetric key pair.

  • Pre-shared public keys with usual peers.

  • Certified public keys with any peer.

Last updated