Document Action: Content Internetworking (CDI) Scenarios to Informational

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




The IESG has approved the Internet-Draft 'Content Internetworking (CDI)
Scenarios' <draft-ietf-cdi-scenarios-01.txt> as an Informational RFC.
This document is the product of the Content Distribution 
Internetworking Working Group. The IESG contact persons are Ned Freed 
and Ted Hardie.

Technical Summary

This document presents scenarios for content internetworking,
in order to provide concrete examples of what may happen
when two content networks interconnect. This work was originally
intended to be part of the evaluation process for a standards-track
protocol for content internetworking. While the IETF does not
foresee pursuing continued work on content internetworking
at this time, this document provides both useful scenarios for 
understanding the rational behind the original work and a record of 
the working group's thinking.

Working Group Summary

There was consensus in the working group for this as
an Informational document.

Protocol Quality

This document was reviewed for the IESG by Ted Hardie.

RFC Editor Note:

Dear RFC Editor,
     Please update the text of draft ietf-cdi-scenarios,
recently approved as an informational RFC, so that the reference
to draft-ietf-cdi-architecture is removed entirely and the
existing Security Considerations section is replaced with
the following text. My apologies for such a long adjustment;
I would normally ask the authors for a replacement draft,
but that was not practical in this case.
                            regards,
                                Ted Hardie



5. Security Considerations

     Security concerns with respect to Content Internetworking can be
     generally categorized into trust within the system and protection of
     the system from threats. The trust model utilized with Content
     Internetworking is predicated largely on transitive trust between
     the ORIGIN, REQUEST-ROUTING PEERING SYSTEM, DISTRIBUTION PEERING
     SYSTEM, ACCOUNTING PEERING SYSTEM and SURROGATES. Network elements
     within the Content Internetworking system are considered to be
     "insiders" and therefore trusted.

5.1 Threats to Content Internetworking

     The following sections document key threats to CLIENTs, PUBLISHERs,
     and CNs. The threats are classified according to the party that they
     most directly harm, but, of course, a threat to any party is
     ultimately a threat to all. (For example, having a credit card
     number stolen may most directly affect a CLIENT; however, the
     resulting dissatisfaction and publicity will almost certainly cause
     some harm to the PUBLISHER and CN, even if the harm is only to those
     organizations' reputations.)

5.1.1 Threats to the CLIENT

5.1.1.1 Defeat of CLIENT's Security Settings

     Because the SURROGATE's location may differ from that of the ORIGIN,
     the use of a SURROGATE may inadvertently or maliciously defeat any
     location-based security settings employed by the CLIENT. And since
     the SURROGATE's location is generally transparent to the CLIENT, the
     CLIENT may be unaware that its protections are no longer in force.
     For example, a CN may relocate CONTENT from a Internet Explorer
     user's "Internet Web Content Zone" to that user's "Local Intranet
     Web Content Zone." If the relocation is visible to the Internet
     Explorer browser but otherwise invisible to the user, the browser
     may be employing less stringent security protections than the user
     is expecting for that CONTENT. (Note that this threat differs, at
     least in degree, from the substitution of security parameters threat
     below, as Web Content Zones can control whether or not, for example,
     the browser executes unsigned active content.)

5.1.1.2 Delivery of Bad Accounting Information

     In the case of CONTENT with value, CLIENTs may be inappropriately
     charged for viewing content that they did not successfully access.
     Conversely, some PUBLISHERs may reward CLIENTs for viewing certain
     CONTENT (e.g. programs that "pay" users to surf the Web). Should a
     CN fail to deliver appropriate accounting information, the CLIENT
     may not receive appropriate credit for viewing the required CONTENT.



5.1.1.3 Delivery of Bad CONTENT

     A CN that does not deliver the appropriate CONTENT may provide the
     user misleading information (either maliciously or inadvertently).
     This threat can be manifested as a failure of either the
     DISTRIBUTION SYSTEM (inappropriate content delivered to appropriate
     SURROGATEs) or REQUEST-ROUTING SYSTEM (request routing to
     inappropriate SURROGATEs, even though they may have appropriate
     CONTENT), or both. A REQUEST-ROUTING SYSTEM may also fail by
     forwarding the CLIENT request when no forwarding is appropriate, or
     by failing to forward the CLIENT request when forwarding is
     appropriate.

5.1.1.4 Denial of Service

     A CN that does not forward the CLIENT appropriately may deny the
     CLIENT access to CONTENT.

5.1.1.5 Exposure of Private Information

     CNs may inadvertently or maliciously expose private information
     (passwords, buying patterns, page views, credit card numbers) as it
     transits from SURROGATEs to ORIGINs and/or PUBLISHERs.

5.1.1.6 Substitution of Security Parameters

     If a SURROGATE does not duplicate completely the security facilities
     of the ORIGIN (e.g. encryption algorithms, key lengths, certificate
     authorities) CONTENT delivered through the SURROGATE may be less
     secure than the CLIENT expects.

5.1.1.7 Substitution of Security Policies

     If a SURROGATE does not employ the same security policies and
     procedures as the ORIGIN, the CLIENT's private information may be
     treated with less care than the CLIENT expects. For example, the
     operator of a SURROGATE may not have as rigorous protection for the
     CLIENT's password as does the operator of the ORIGIN server. This
     threat may also manifest itself if the legal jurisdiction of the
     SURROGATE differs from that of the ORIGIN, should, for example,
     legal differences between the jurisdictions require or permit
     different treatment of the CLIENT's private information.

5.1.2 Threats to the PUBLISHER

5.1.2.1 Delivery of Bad Accounting Information

     If a CN does not deliver accurate accounting information, the
     PUBLISHER may be unable to charge CLIENTs for accessing CONTENT or
     it may reward CLIENTs inappropriately. Inaccurate accounting
     information may also cause a PUBLISHER to pay for services (e.g.
     content distribution) that were not actually rendered.) Invalid
     accounting information may also effect PUBLISHERs indirectly by, for
     example, undercounting the number of site visitors (and, thus,
     reducing the PUBLISHER's advertising revenue).

5.1.2.2 Denial of Service

     A CN that does not distribute CONTENT appropriately may deny CLIENTs
     access to CONTENT.

5.1.2.3 Substitution of Security Parameters

     If a SURROGATE does not duplicate completely the security services
     of the ORIGIN (e.g. encryption algorithms, key lengths, certificate
     authorities, client authentication) CONTENT stored on the SURROGATE
     may be less secure than the PUBLISHER prefers.

5.1.2.4 Substitution of Security Policies

     If a SURROGATE does not employ the same security policies and
     procedures as the ORIGIN, the CONTENT may be treated with less care
     than the PUBLISHER expects. This threat may also manifest itself if
     the legal jurisdiction of the SURROGATE differs from that of the
     ORIGIN, should, for example, legal differences between the
     jurisdictions require or permit different treatment of the CONTENT.

5.1.3 Threats to a CN

5.1.3.1 Bad Accounting Information

     If a CN is unable to collect or receive accurate accounting
     information, it may be unable to collect compensation for its
     services from PUBLISHERs.

5.1.3.2 Denial of Service

     Misuse of a CN may make that CN's facilities unavailable, or
     available only at reduced functionality, to legitimate customers or
     the CN provider itself. Denial of service attacks can be targeted at
     a CN's ACCOUNTING SYSTEM, DISTRIBUTION SYSTEM, or REQUEST-ROUTING
     SYSTEM.

5.1.3.3 Transitive Threats

     To the extent that a CN acts as either a CLIENT or a PUBLISHER (such
     as, for example, in transitive implementations) such a CN may be
     exposed to any or all of the threats described above for both roles.


[Index of Archives]     [IETF]     [IETF Discussion]     [Linux Kernel]

  Powered by Linux