[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: how secure mh should be? Re: identifiers and security



Hi Iljitsch,

i think we agree more than i thought :-)

El 01/07/2004, a las 12:23, Iljitsch van Beijnum escribió:

On 1-jul-04, at 11:46, marcelo bagnulo braun wrote:

imho is important to reach a common criteria here.

Yes. But in order to do that, we need to analyze the situation so we can make a proper decision.


i think that the minimum goal should be that the resulting solution should be as secure as current fixed, single homed IPv6 internet.

As you say, i wouldn't mind if the result is a bit more secure, but i wouldn't require it

I think the first statement doesn't really provide much guidance:

Well, i think it in the following way.
In the new environment, where multihomed sites implement the proposed solution, is it possible to launch new attacks that were not possible in the previous Internet (i.e. the internet without the multi6 solution)?


If the answer is yes, then we have to carefully understand the scope of these attacks and see if this is acceptable

whatever we do, multihoming makes things different, and whether that's worse or not isn't necessarily something we automatically agree on.

agree that there is no automatic agreeing when evaluating the new possible attacks


That is, unless multihoming actually makes everything more secure. Now that can't be a bad thing, can it? Actually: yes. Too much security is harmful. In order to be secure, you must either implement additional mechanisms, which requires additional complexity, bandwidth and/or computation. In many cases that's just fine: if my email message becomes 7k rather than 4k and it takes 50 ms to decode it, who cares? But if I want to transmit a 8 Gbps stream from my radio astronomy observatory to a remote computing facilty, I don't have the luxury to do even an MD5 over that data. Insisting on security when the necessary mechanisms aren't available or can't be applied means making communication impossible.

agree with this point.
again, the cost of the enhanced security has to be evaluated in each case



(BTW, that's one of my issues with Secure BGP / secure origin BGP: if you require everything to be signed there WILL be times when "good" communications will be impossible because of certificate problems. And it's not like there are never problems with certificates...)


Remember, most traffic flowing over the internet is completely unprotected and people don't seem to be bothered by that too much.

Going back to Erik's analogy of someone looking through the window into your office. I think we can agree that giving such a person the opportunity to install a device that allows her to keep observing what happens long after she's left is unacceptable. On the other hand, the owner of the office does have papers out that are visible through the window, so they are taking a risk and it's not our place to take exception to that. What I've been saying for a while now is that redirecting individual unprotected sessions isn't really worse than what an attacker can do today.

agree
redirection of a single connection by an on path attacker may be acceptable, but redirecting all future connection is not acceptable


Bottom line: the goal is to preserve actual security: anything more or less secure has to be evaluated in particular, agree?

Regards, marcelo

In our analogy: today someone can look through the window and read (for instance) the pages of a book that is open in our proverbial office. Redirecting individual sessions would be comparable to someone being able to read the entire book rather than only the pages that are visible at that moment. Now it's possible to argue that this is worse, but my position is that if the book was confidential, it shouldn't have been open in front of the window so people could read a couple of pages in the first place. So there are three possible cases:

1. The book is confidential and the user wants to keep it that way = IPsec/TLS. Our MH mechanisms should protect these against redirection.
2. The book is confidential but the user has it open in view of the window anyway = no IPsec/TLS and wireless. It doesn't make sense to consider this situation as there is leakage of confidential information regardless, the only question is whether it's going to be a bit more.
3. The contents of the book aren't confidential = redirecting isn't worse than breaking (if they can steal your book, why bother making sure they can't read it if they can pick it up at the bookstore anyway?).