Re: [Last-Call] Last Call: <draft-gont-numeric-ids-sec-considerations-06.txt> (Security Considerations for Transient Numeric Identifiers Employed in Network Protocols) to Best Current Practice

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




On 12/17/2020 7:02 PM, Fernando Gont wrote:
Joe,

I think we have gone through this before. Folks (including you) raise objections. I note that the claim has no basis or ask a question which clearly shows the objection has no basis, and they omit the question, stop responding, or switch to something else.

Or they consider that they have made their point, and don't want to read through lengthy repetitions of the same counter-argument. Silence does not mean assent.

To be clear, the point is not that security risks should be ignored. Nobody is saying that. The point is that the proper way to conduct risk analysis is by looking at attack areas such as information disclosure, risks of spoofing, etc. These analyses will vary depending on circumstances, and the responses are not always the same. They are definitely not the same for information inside and outside the encryption envelope. They are also not the same for all parameters in a system. To give an example, consider the stream offset indicating the position of the message bytes in a file. Randomizing that would be ridiculous.

Analysis of weaknesses is good. Prescription of one-size-fit-all remedies, on the other hand, does more harm than good.

-- Christian Huitema

--
last-call mailing list
last-call@xxxxxxxx
https://www.ietf.org/mailman/listinfo/last-call



[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux