Kevin C. Almeroth wrote:
>>>Multicast is necessarily a LOT weaker:
>>>
>>>     1) I can get a copy of packets by normal operation
>>>     (join a group). there is no equivalent for UDP,
>>>     notably for paths that aren't shared.
>>
>
> Again, not in all cases.  You over-simplify the effectiveness of scoping.

Scoping, like TTL, can limit the visibility of packet outside a
boundary, but cannot do much about other users inside that boundary.

PS - how can you know that the scope of ALL multicast exit paths have
been properly scoped to limit access outside of some physical locale?

> You can't have it both ways.  Yes, there is a situation where you can obtain
> a copy of a multicast packet through standard operation.  But the fact
> that scoping and addressing make it non-trivial and the fact that "normal"
> operation doesn't prevent you from snooping UDP packets shrinks the
> gap from a "LOT" weaker.  And as I said before, if data security is important,
> effectively there is no gap.

Users without root can run programs that listen to multicast addresses.
If that user is inside the scope boundary, game over.

As I said, weakER. IMO, still quite a lot weaker than unicast.

>>>     2) UDP has application, network, and tunnel encryption that
>>>     is both widely deployed and widely used. there is
>>>     no equivalent for multicast.
>
> I disagree...  a number of commercial multicast apps have encryption.
> Don't try and argue now that some relative percentage of multicast apps
> have less encryption than unicast apps.  You're comparing a protocol that
> has been around a lot longer than multicast and trying to make an
> apples-to-apples comparison based on less availability.

I can argue relative percentages just fine; we're talking about strength
today, not 'strength after X years of deployment'.

> And for the record, multicast is UDP.

As I was using it, agreed. (there are other protocols that use multicast
as well)

Joe


Reply via email to