In message <[EMAIL PROTECTED]>, 
"Dawson, Peter D" writes:
>
>
>->-----Original Message-----
>->From: Harald Tveit Alvestrand [mailto:[EMAIL PROTECTED]]
>->Sent: Friday, May 26, 2000 6:27 PM
>->To: [EMAIL PROTECTED]
>->Cc: [EMAIL PROTECTED]
>->Subject: RE: Storage over Ethernet/IP 
>
>->The point being made, remade and made again here is:
>->- Any protocol that offers no means of countering such 
>->security threats is 
>->broken, and should not be considered for standardization.
>
>->It is perfectly possible that after conducting a threat and modality 
>->analysis, one ends up with saying that hardware-accelerated 
>->IPsec using 
>->host identities is adequate for the scenarios involving 
>->otherwise-unprotected Internet links, and that a mode with no 
>->protection is 
>->adequate when the media is physically secured.
>->
>->But the analysis MUST BE DONE.
>->
>
>is vulnerability and threat analysis part of the 
>standardization process ??
>
Yes, in order to come up with a reasonable security considerations 
section.  (Clearly, much of it is site-specific.  But the protocol 
developers can't ignore it.)


                --Steve Bellovin


Reply via email to