[This message was posted by Ryan Pierce of CME Group <ryan.pie...@cmegroup.com> to the "Information Security" discussion forum at http://fixprotocol.org/discuss/3. You can reply to it on-line at http://fixprotocol.org/discuss/read/810b99e6 - PLEASE DO NOT REPLY BY MAIL.]
Hi Russell, > I think we're both on the same page - I'm also happy to agree with any number > of your points on this. I didn't mean to denigrate anything you had said in > an earlier post - my point is that you are taking a big risk when you rely on > a firm that doesn't specialize in security to provide you with a solution for > a security problem. Ditto to most of the above. I'm likewise not meaning to denigrate anything you say, and I think that this kind of dialogue is particularly valuable in that it is bringing to light quite a lot of issues around FIX and security. > Granted, this hinges on how critical this is for someone - if you just need > to check the 'secure' box to make the lawyers happy and you don't really > care, then anybody's product is going to fit the bill. Again, I agree strongly. Hardware and software encryption both add measurable latency to messaging, and, at least in the pre-trade and trade space, low latency is critical. As was mentioned in the FPL White Paper, many firms will say that a leased line is good enough and not bother with any of this. > Most people don't have the resources to perform in-house audits to determine > the level of security provided by product X, Y, or Z. You have to take a > vendor's word on it, so the key thing here is that if you tell me your > product supports SSL, but I can't audit it and you can't provide me with an > exhaustive audit from a trusted third-party, then I'm really forced to choose > between the known quantity of a product from a reputable security firm and a > product from a guy who assures me everything is ok, but can't really > demonstrate it apart from waving his hands... Ability to audit security is an excellent point. I'm willing to assume for this discussion that the encrypting router is audited and fully 100% secure. But a chain is only as secure as its weakest link. What happens between the FIX engine and the router? This can be difficult to audit. As I've said, networks often use dynamic routing protocols to provide resiliency. I'll admit that the bulk of my networking experience came from over a decade ago. But in that time I've seen my fair share of weird things, where well meaning network admins wanted data to take one path, and it really took another. Or multiple paths. Or asymmetric paths going there and coming back. Or network topology changed, and data suddenly found a new path. In these cases, the application sometimes still worked. How do you go about auditing this? It takes a lot of technical knowledge. And, even if you use traceroute and a packet sniffer on each end of the connection, and make sure the path is right today, who says it will be right tomorrow when network topology and routing tables change? And what if the encrypted link goes down? Will any dynamic rerouting happen, sending the data over a non-secure link? Contrast this with TLS and OpenSSL. FIX is an open standard. There is no guarantee that each side will use the same software. So my counterparty and I configure our FIX engines to accept a TLS session, limited to a particular certificate for ourselves and each other, and allow only certain secure cyphersuites. The act of successfully connecting is a form of audit. Either we both have it wrong, or we're both probably using TLS properly. We can also try replacing both our own certificate, and our counterparty's certificate, with the wrong one, and validate that the connection is refused. Interoperability with other TLS-enabled FIX engines is a very good sign. Yes, none of this is perfect. There still are risks. In a perfect world, should security flaws be found with OpenSSL, my FIX engine provider would send me an urgent software update. Then again, even routers have security vulnerabilities, and network admins need to upgrade firmware from the vendors when they are discovered. Thanks for this interesting discussion. Ryan [You can unsubscribe from this discussion group by sending a message to mailto:unsubscribe+10093...@fixprotocol.org] -- You received this message because you are subscribed to the Google Groups "Financial Information eXchange" group. To post to this group, send email to fix-protocol@googlegroups.com. To unsubscribe from this group, send email to fix-protocol+unsubscr...@googlegroups.com. For more options, visit this group at http://groups.google.com/group/fix-protocol?hl=en.