Brian E Carpenter <brian.e.carpen...@gmail.com> wrote:
    > It's not quite that.

    > We sell X's. We cannot control how the X's are used. But if they are
    > used without calling home to our MASA, we cannot certify that they are
    > genuine X's. They might be counterfeit X's.

Or, they might be genuine X's running trojaned's software.

The fact that between leaving seller A and buyer C, they were activated by
attacker M will be in the MASA's audit log, if buyer C looks.

{Can attacker M replace software via serial console without leaving a trace?
Not BRSKI's problem exactly, but it's certainly a concern}

    > BRSKI is a way of proving that the X announcing its identity as X12345
    > really is the one and only X12345.

    > If you sell it to someone who doesn't care about that, they can use it
    > anyway.

Depending upon the software in X, you may be able to hook up a craft/serial
console and just configure it the way you want, just like you do today.

Or it might be some new-fangled SDN switch that won't operate with a
controller attached, and it doesn't even have a serial console.  Nothing I
can do will change that.

--
]               Never tell me the odds!                 | ipv6 mesh networks [
]   Michael Richardson, Sandelman Software Works        | network architect  [
]     m...@sandelman.ca  http://www.sandelman.ca/        |   ruby on rails    [

Attachment: signature.asc
Description: PGP signature

_______________________________________________
Anima mailing list
Anima@ietf.org
https://www.ietf.org/mailman/listinfo/anima

Reply via email to