[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
RE: Time shifitng/future redirection attacks
Brian,
Brian E Carpenter wrote:
> > My point is that the final decision of some security threats
> > belongs to the
> > application. As the multi6 solution is at network/transport
> > layer, we should
> > strive to be flexible in negotiating security mechanisms or
> > lack of it. We
> > should learn the lesson from the deployment and operation of IPsec.
>
> I agree for attacks (even MitM attacks) against the application
> layer. But there
> may be MitM attacks that are directed at lower layers. It would
> be hard to explain
> to the IESG that we chose to ignore those.
>
Security is always a double edges sword.
I agree with you 100% on the "right way" to do networking and multi6
should be compatible with architectural approaches to these
problems, which is going to be part of future Internet. I also
understand the sensitivity with IESG if we are perceived to be
ignoring some attacks in our proposals.
I am not suggesting to ignore those attacks. But considering that
we have been deploying equipments to do IP networking the
"wrong" way" for last 15 years, the architecture documents
should provide a balance view on those problems, such that the
protocol designer would put knobs in their mechanisms to allow
some security features being turn on/off by applications or
operators, which would facilitate incremental deployment.
If we don't consider these knobs in the architecture, we might come
out a super-secure multi6 solution then wondering why there
is deployment and operation difficulty.
------------
Kanchei Loa
loa@ieee.org