At 10:48 PM -0400 3/20/12, Eric Osterweil wrote:
On Mar 20, 2012, at 4:50 PM, Stephen Kent wrote:
...

For one: pedantic compilers are often helpful when it comes to static analysis. By extension, _sometimes_ one can make the same argument (about static analysis) to justify being pedantic for technical discussions... I'm kinda surprised that you didn't know that... ;)

I am not familiar with the term in the compiler context, only in the context of people, i.e., are being referred to as teachers, i.e., to be a pedagogue.
...

Indeed, I was attempting to paraphrase. To clarify, this was how I interpreted your words, but our audit trail should clearly indicate that you did _not_ say these things and that I was merely paraphrasing the message I interpreted from you. Please accept my apologies for any misunderstanding about this.

OK.

> Let me try another, more concise phrasing. When one adds secruity to a protocol, the goal is to enable it to operate in a hostile environment with the same semantics that it offered in a non-hostile environment. Of course a secure version of a protocol will exhibit some differences in its operation from an insecure version, especially when one compares the two version in attacks scenarios.

Exactly!  This is exactly what a semantic difference is! :)

I think I see how we disagree. Historically (here comes those annoying 30+ years of experience again) designers of most protocols have not considered how assumed a benign (or at least non-adversarial) environment for protocol operation. In the today's world that is not a good assumption. So, when we add security mechanisms to a protocol to try to allow it to operate successfully in a hostile environment, one ought to expect the behavior to differ in attacks scenarios. I assert that this does not change the semantics, because protocol behavior outside of the benign environment was out of scope for the non-secure protocol design.


If that were not the case, we would not bother adding security to a protocol.

Very debatable. I wouldn't necessarily impugn the addition of security semantics to a protocol (sometimes additional expressiveness is needed).

impugn? I am not assailing the addition of secruity semantics. I am asserting that the semantics associated with the additional of security mechanisms does not constitute a violation of the semantics associated with the original, non-secure version of a protocol.


The relevant question is whether the fundamental nature of the protocol is altered by the addition of security.

That may be a question you care about... It might even be one that the rest of us care about, but that is different than claiming you have not added semantics (which is where this started). This comment is changing the subject.

OK, where we started, to be brutally honest, was an attempt by you and Brian to find a way for Brian's proposal on route leaks to be considered in scope for SIDR. The SIDR charter is clear about the scope, and route leaks are not part of what we are currently chartered to do. So we really ought not be having this discussion. I'll do my part to help, by not replying to further messages on this topic.

 > And, yes, maybe it is just you.

Or maybe a line of thought (``thinking'' as you put it) that has gone unchanged in over 30 years is overdue for having its assumptions challenged. Security (in particular) is a field in which the landscape changes, and stale vision can lead to myopia... Many things in the Internet security theater have obviously changed in 30 years, so the age of lessons does not necessarily correlate with their relevance. :)

Your comment suggests that no wisdom has accrued, at least to me, with 30 years of experience. I beg to differ. When someone proposes an approach that has been proposed and rejected previously, I usually ask myself "why did we reject this before, and what has changed that might make the decision be different this time?" Usually the answer is that the reasons for rejecting an approach are still valid, but the proposer of the "new" approach was unaware of the history. On some occasions the answer is yes, we ought to revisit the decision (which may of may not still be correct). I am fortunate to have had firsthand experiences over the last 3 decades that allow me to have this perspective.

Steve
_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to