[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: draft-ietf-v6ops-cpe-simple-security: filtering encapsulated flows



On Aug 24, 2009, at 11:33, Mark Baugher wrote:

The node that accepts the IKE phase 1 presumably has some acl or credential requirement to control access - or could have. I thought that this was the idea behind the original recommendation.

I'm always getting confused about whether we're presuming that the interior node is well secured or that the interior node has some hypothetical vulnerability that can be remotely exploited to obtain access to the rest of the interior network. I'm often making the wrong assumption in the wrong context, and I suspect I just don't have sufficient network security expertise to know which assumption to make in what scenario.

Hence, my tendency to defer to the people with more credible claims to such expertise. Let them take the heat for mistakes of that category. That's what they get paid to do.


--
james woodyatt <jhw@apple.com>
member of technical staff, communications engineering