Re: [OPSEC] [tcpm] draft-gont-tcp-security

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1



Smith, Donald wrote:
...
>>>> The classic tenets for computer security is:
>>>> CIA -> Confidentiality, Integrity and Availability.
>>>> TCP doesn't attempt to address Confidentiality.
>>>> However it was designed to address integrity and availability so 
>>>> failures in those areas should be documented and addressed in some
>>>> fashion.
> Can you explain this? Where is the integrity protection? Where is the
> availability specified?
> 
>> Checksumming in tcp/ip is intended to provide intregrity protection.

Error protection != integrity protection. Anyone can reconstitute the
checksum, so it is not an integrity mechanism.

>> Mind you it is NOT tamper proof but that is the intent.

What is your definition of integrity? Mine means some assurance that
what was sent is what is received. Anything that any intermediary can
reconstitute trivially is not protected.

>> Detection of lost packets, retransmitions, reassembly of fragments,
>> congestion notification, dynamic routing and many other tcp/ip features
>> are intended to address availablity.

The first group (loss detection, retransmission, reassy) address links
with errors, not 'availability' in the usual sense. The second set might
apply, but aren't part of TCP per se (TCP uses the absence of info to
indicate congestion, not the presence, at least in the required base of
the protocol).

> ...
>>>>> It's security/resiliency can be improved. After all, if 
> that were not
>>>>> the case, I guess you're wasting your time with TCP-AO. Or 
> is it that
>>>>> you believe the only way to improve a protocol is to throw 
>>>>> crypto at it?
>>>> Adding crypto improves confidentiality and integrity but is counter
>>>> productive to availability as most
>>>> crypto engines are prone to fairly low pps resource exhaustion
>>>> attacks.
> All prevention methods are susceptible to computational resource
> attacks, since all increase the operations performed on a 
> packet. 
>> GTSM is a valuable exception to this statement but other then that I tend to agree:)
> 
> It is
> commonly assumed that this is a desirable tradeoff, and that the
> computational resources can be totally protected with line-rate
> dedicated computation (e.g., hardware assist).
>> I believe that is a common assumption however I don't believe that assumption is correct.
>> I do a fair amount of router testing and although some portions of
>> ipv4 are hardware assisted and therefore line-rate there are still many
>> paths to the "slow path". IPv6 has many more routes to the slow path:(

First, I'm speaking of hardware crypto assist. I'm assuming fast-path
packets. Slow-path packets are self-correcting in many routers - they're
dumped when their queue overflows, or are simply processed *very*
slowly. If you care about computational resources, you put in line-rate
hardware, period.

Joe
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAknju0MACgkQE5f5cImnZruVggCguJGkydTXB9yWgK+nPfpBqQy8
izAAoIT+9Tmof98TX+0WLdYkCFcj4Ikx
=ac+U
-----END PGP SIGNATURE-----
_______________________________________________

Ietf@xxxxxxxx
https://www.ietf.org/mailman/listinfo/ietf

[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Fedora Users]