[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: how secure mh should be? Re: identifiers and security



On 1-jul-04, at 11:46, marcelo bagnulo braun wrote:

imho is important to reach a common criteria here.

Yes. But in order to do that, we need to analyze the situation so we can make a proper decision.


i think that the minimum goal should be that the resulting solution should be as secure as current fixed, single homed IPv6 internet.

As you say, i wouldn't mind if the result is a bit more secure, but i wouldn't require it

I think the first statement doesn't really provide much guidance: whatever we do, multihoming makes things different, and whether that's worse or not isn't necessarily something we automatically agree on. That is, unless multihoming actually makes everything more secure. Now that can't be a bad thing, can it? Actually: yes. Too much security is harmful. In order to be secure, you must either implement additional mechanisms, which requires additional complexity, bandwidth and/or computation. In many cases that's just fine: if my email message becomes 7k rather than 4k and it takes 50 ms to decode it, who cares? But if I want to transmit a 8 Gbps stream from my radio astronomy observatory to a remote computing facilty, I don't have the luxury to do even an MD5 over that data. Insisting on security when the necessary mechanisms aren't available or can't be applied means making communication impossible.


(BTW, that's one of my issues with Secure BGP / secure origin BGP: if you require everything to be signed there WILL be times when "good" communications will be impossible because of certificate problems. And it's not like there are never problems with certificates...)

Remember, most traffic flowing over the internet is completely unprotected and people don't seem to be bothered by that too much.

Going back to Erik's analogy of someone looking through the window into your office. I think we can agree that giving such a person the opportunity to install a device that allows her to keep observing what happens long after she's left is unacceptable. On the other hand, the owner of the office does have papers out that are visible through the window, so they are taking a risk and it's not our place to take exception to that. What I've been saying for a while now is that redirecting individual unprotected sessions isn't really worse than what an attacker can do today. In our analogy: today someone can look through the window and read (for instance) the pages of a book that is open in our proverbial office. Redirecting individual sessions would be comparable to someone being able to read the entire book rather than only the pages that are visible at that moment. Now it's possible to argue that this is worse, but my position is that if the book was confidential, it shouldn't have been open in front of the window so people could read a couple of pages in the first place. So there are three possible cases:

1. The book is confidential and the user wants to keep it that way = IPsec/TLS. Our MH mechanisms should protect these against redirection.
2. The book is confidential but the user has it open in view of the window anyway = no IPsec/TLS and wireless. It doesn't make sense to consider this situation as there is leakage of confidential information regardless, the only question is whether it's going to be a bit more.
3. The contents of the book aren't confidential = redirecting isn't worse than breaking (if they can steal your book, why bother making sure they can't read it if they can pick it up at the bookstore anyway?).