.. and in the bad form of following-up to my own post.


On 29/07/2008, at 11:10 PM, Terry Manderson wrote:
>
> The ubiquity of HTTP provides a strong platform for both server and  
> client development. I'm not sure it would expose an attack surface  
> by adding http. It may be that specifying just https may eliminate  
> additional vectors. Do you have any in mind?

I had the opportunity on the weekend to catch up with an old colleague  
who now spends her time dealing with banking sector network security.  
After the usual banter about the selection of red wine we 'talked shop'.

She was quite immovable in her view that regardless of the validation  
constructs of RPKI, the end to end fetching and publishing MUST be  
over a path that covers confidentiality, integrity, and availability.

So in her eyes the important things are:
        - That when you establish a discussion with endpoint you are (to the  
best of current technology) certain it really is the endpoint.
        - That you are talking (unmolested) to the endpoint you think you are  
for the entirety of the session.
        - That what is retrieved by the client is audit-able at both the  
server and the client.
        - That retrievals are predictable, and perfectly repeatable.
        - That the client _never_ permits a downgrade, or unsecured retrieval  
of information
        - That Trust anchor management for both the client ssl and the PRKI  
is considered in such a way that it minimises the fact there is no  
such thing as trusted computing (her words).

I asked for situations that she could identify (ie problems) and after  
the expected Kaminsky DNS issue discussion, I was showed the secret  
decoder ring and she suggested that I wasn't being paranoid enough  
given we are dealing with and constructing operational systems which  
affect the control plane.

I'm not sure how this might reflect in the ARRRM draft yet, but I  
thought it worthwhile to share.

Cheers,
Terry
_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to