[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: CPE equipments and stateful filters



On Jul 23, 2007, at 2:36 PM, Jun-ichiro itojun Hagino wrote:
Fred raised concerns about DoS attack, but if you run secure OS you do not have to worry about that.

Part of this relates to the concept of a "secure OS". I think the security experts in the room will tell you that the only truly secure devices is one in which no electrons are moving. One cannot actually say that "there is no way to successfully attack X"; one can only say that any such exploits are currently unknown for a system at the appropriate patch level and with the right configuration. That said, my observation was not limited to DOS attacks, although those are part of the discussion. My comment had to do with the integrity of networks people provide for themselves, and the view of the network as something to secure in its own right.

In my view, people in residences and in companies provide for themselves the things they think they need. Not everyone provides the same things, and not everyone views the things they provide the same way. For example, my wife's mother would happily give up her kitchen and eat out; my wife provides a kitchen in our home because she wants to be able to cook for herself.

In my home, I provide two wired networks and two wireless ones. One pair is for me (Cisco information security guidelines require my home office to be separate from my home), and the other pair is for my family. They meet at an Ethernet hub and a cable modem, the latter being my ISP's service demarc. My company makes similar provisions for itself, including 8 DMZs worldwide, an extensive internal network that would rival many ISPs, and interconnections with a large number of providers. Those networks are my and my company's property, just as much as the grass in my lawn covers my physical property.

Yes, the integrity of any device, physical or virtual, is in the final analysis its own concern, and computers need to be hardened to provide good computational security. A large percentage of attacks, I am told, come from within one's own organization. That said, it is also appropriate for a family or company to expect its neighbors to observe their property boundaries, and it is very reasonable for them to provide a first line of defense at those boundaries. As I said in the meeting, this should not preclude services that they have agreed should be offered in their homes or on their premises, and should not preclude business-to-business communications under appropriate governance. I will agree with Alain that a customer of an ISP should be able to easily let the ISP provide the services they have contracted, and this should be accomplished with a minimum of fuss and bother. But my home is not an extension of my ISP any more than my company is an extension of its ISPs. It is a network and there is a defined NNI between them. For services that the ISP has not contracted with me, I see no reason to allow the ISP into my home.

That's not an unfriendly statement, by the way. My neighbors come into my home after knocking on the door too. They are both welcome in my home and expected to knock.

I compare this to the defenses of the human body. One could argue that if every cell were robust enough, disease would be unknown, and in the presence of assistants like white blood cells, T-cells, and so on, they body has no need of a prophylactic defense. All true, and the fact is that those systems work pretty well. Even so, the body is provided with a skin - a firewall - that keeps a good percentage of the obvious out of it and in so doing exposes and uses those defenses less. I suspect that it does so both because defense in depth is a proven strategy and because keeping the junk out is less costly than curing the ills it creates.

I think the right solution is an authenticated access protocol. If UPnP is publicly documented, fine, if James' protocol is the best bet, fine, and if it is something else, so be it. But a protocol that allows one to identify oneself and gain admittance on authorization provides for the concerns that you have. Someone from within can access out, the governing contract being the authorization to do so, and on AAA confirmation access in is granted, which enables someone with legitimate access privileges to access what they are authorized to access.

Someone once said that "good fences make good neighbors". I think they were wise.

If in your home you want to provide open access - no doors and no locks - no problem. That's your policy. It's just not mine, and not that of very many of my customers.