Brian,


I personally would definitely want to see a stronger statement that hosts 
should be implementing means sufficient to perform end 2 end communication 
securely on any network, without requiring additional protections from outside. 
But I guess a few people would then argue that some hosts can't implement the 
same degree of security protection as  the degree e.g. tablets and PC can - and 
that guess led to the current lanuage.



If you think it should be changed to some stronger statement, do you have 
something specific in mind?



-Dmitry





________________________________

From: Cameron Byrne [cb.li...@gmail.com]
Sent: Tuesday, March 27, 2012 8:29 PM
To: Brian E Carpenter
Cc: Mark Townsley; Dmitry Anipko; homenet@ietf.org Group
Subject: Re: [homenet] Security goals


On Mar 27, 2012 6:53 PM, "Brian E Carpenter" 
<brian.e.carpen...@gmail.com<mailto:brian.e.carpen...@gmail.com>> wrote:
>
> On 2012-03-28 11:58, Dmitry Anipko wrote:
> > As someone who works for a host software vendor, I'd like to add couple of 
> > points. I agree with Mark that in general the security topic is wider than 
> > only filtering on the borders of the realms of the traffic destined to 
> > hosts, and I support the efforts to figure out the right set of knobs for 
> > the former. That said, for the latter, I'd like to see something along the 
> > below lines in the requirements
> > (some of which may already be in the text in some form, putting it here 
> > just for fluency of this piece of the story).
> >
> > 1. Homenet hosts MUST implement their own security policies in accordance 
> > to their computing capabilities.
>
> I think we know from some famous cases that SCADA systems are highly
> insecure, mainly due to following this principle (translated as
> "security is too hard and this device will always be on a private
> network anyway"). I'm a bit nervous that this policy will encourage
> low-end device designers to classify their devices as not having
> enough resource to deal with security.
>

This category should / will be eliminated by market forces, too much liability 
associated with being willfully insecure.  There are famous cases for this too.

If internet segmentation is all that is required, there are address types that 
facilitate local only access.

Cb
>    Brian
> _______________________________________________
> homenet mailing list
> homenet@ietf.org<mailto:homenet@ietf.org>
> https://www.ietf.org/mailman/listinfo/homenet
_______________________________________________
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet

Reply via email to