In message <[EMAIL PROTECTED]>, Erik Nordm
ark writes:
>
>Steve,
>
>I think this is a very good writeup, but it's missing
>the security considerations section :-)/2
>
>Thinking for 5 minutes about intermediaries vs. not and security
>it isn't obvious to me that one is better than the other.
>A few points:
> - A solution with an intermediary requires on the order of N + M trust
>   relationships for N clients and M services. A solution without requires
>   N * M. Are there fundamental differences in how to do key management in
>   the two cases?

Yes and no, and a lot depends on the trust relationships between seeker 
S, intermediary I, and target T.  And whether or not N*M is a 
significant issue depends on the relative values of N and M, and the 
frequency of contact.

The latter is easier to see.  If a member of set S has comparatively 
infrequent contact with a member of T, and N ~= M, there isn't a 
serious problem with the number of security associations -- there won't 
be many at any one time, so it won't be much of a load.  And trust 
isn't much of an issue, either -- if S is trying to talk to T and T 
isn't trustworthy, it doesn't matter much if T is lying about the 
needed info or in the actual service response.  In other words, if we 
can manage direct responses, we're in much better shape.

If N>>M, then setting up many security associations is a considerable 
burden on T.  (This is one of the many reasons one can't use 
transmission security instead of DNSSEC.)

With an intermediary, the question of how much S trusts I is crucial.  
If S trusts I implicitly, the situation is relatively simple. If there 
can be more than one intermediary -- i.e., the situation in today's DNS 
-- S has no idea whether or not it can trust the chain, and hence 
doesn't know if the response comes from the real T (or the info server 
for T).  This is the major reason that DNSSEC works by protecting 
objects instead of transmission -- the records are digitally signed by the 
ultimate source, thus rendering the trustworthiness of the transmission
chain irrelevant.

In other words, we can't really make any security statements until we 
can define our terms better.

> - An intermediary would imply putting all the security eggs in one basket.

Yes, though that's not always bad:  "The fool says ``Don't put all of your
eggs in one basket,'' but the wise man says ``put all your eggs in one basket
and watch that basket!''"  (Puddin'head Wilson's Calendar)

>
>I think it is important to think about this some more. While the devices
>in a single home can rely on physical security combined with firewalls
>I think the fact that folks are talking about DNS discovery as 
>reaching from the home networks into the ISP means that we need to
>take security a bit more seriously in this space.

The crucial question for security is how a node decides what other 
nodes to trust.  My light switch might decide to trust everyone, on the 
assumption that no one else has access to the house wiring.  I don't 
think I want my burglar alarm to make the same assumption, since those 
wires do appear outside my house, both at the service entrance and at 
the nice, convenient outlets on my porch.  (I would note that the U.S. 
National Electrical Code (adopted by most, though not all, 
municipalities) *requires* a few outdoor outlets.)  In other words, you 
have to pick your threat model, too.

                --Steve Bellovin, http://www.research.att.com/~smb (me)
                http://www.wilyhacker.com ("Firewalls" book)


--------------------------------------------------------------------
IETF IPng Working Group Mailing List
IPng Home Page:                      http://playground.sun.com/ipng
FTP archive:                      ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]
--------------------------------------------------------------------

Reply via email to