+1
Robert Cragie <robert.cra...@gridmerge.com> wrote: >I like the idea of developing a generic threat model for homenets. This >should frame what we are up against and make it clearer what the >appropriate countermeasures should be and where they are best placed. > >Robert > >On 28/03/2012 8:42 PM, Brian E Carpenter wrote: >> Maybe we should add a statement that device designers must assume >> that DDoS and other forms of malicious traffic are present on >> the homenet, as well as a statement that all traffic may be visible >> to unknown third parties. A sort of generic threat model for homenets. >> >> Regards >> Brian >> >> On 2012-03-29 00:20, Robert Cragie wrote: >>> I think there are two orthogonal aspects here. There is one regarding >>> the ability for host to perform end to end communication securely (i.e >>> with integrity and/or confidentiality). This goes without saying and I >>> agree there needs to be a strong statement regarding this. However this >>> is orthogonal to a host's ability to handle all manner of traffic which >>> could be directed to it, especially malicious traffic. Ideally hosts >>> would be able to handle this and the recommendation would still be to >>> require hosts to firewall their own data. When a host is implemented on >>> a platform with plenty of storage and processing power, this is not >>> really an issue. However, in the LLN case, hosts may be running on >>> platforms which have very little storage and processing power by >>> comparison with limited ability to firewall. I do not think we should be >>> precluding these type of devices. >>> >>> Robert >>> >>> On 28/03/2012 6:47 AM, Dmitry Anipko wrote: >>>> Brian, >>>> >>>> I personally would definitely want to see a stronger statement that >>>> hosts should be implementing means sufficient to perform end 2 end >>>> communication securely on any network, without requiring additional >>>> protections from outside. But I guess a few people would then argue >>>> that some hosts can't implement the same degree of security protection >>>> as the degree e.g. tablets and PC can - and that guess led to the >>>> current lanuage. >>>> >>>> If you think it should be changed to some stronger statement, do you >>>> have something specific in mind? >>>> >>>> -Dmitry >>>> >>>> ------------------------------------------------------------------------ >>>> *From:* Cameron Byrne [cb.li...@gmail.com] >>>> *Sent:* Tuesday, March 27, 2012 8:29 PM >>>> *To:* Brian E Carpenter >>>> *Cc:* Mark Townsley; Dmitry Anipko; homenet@ietf.org Group >>>> *Subject:* Re: [homenet] Security goals >>>> >>>> >>>> On Mar 27, 2012 6:53 PM, "Brian E Carpenter" >>>> <brian.e.carpen...@gmail.com<mailto:brian.e.carpen...@gmail.com>> wrote: >>>>> On 2012-03-28 11:58, Dmitry Anipko wrote: >>>>>> As someone who works for a host software vendor, I'd like to add >>>> couple of points. I agree with Mark that in general the security topic >>>> is wider than only filtering on the borders of the realms of the >>>> traffic destined to hosts, and I support the efforts to figure out the >>>> right set of knobs for the former. That said, for the latter, I'd like >>>> to see something along the below lines in the requirements >>>>>> (some of which may already be in the text in some form, putting it >>>> here just for fluency of this piece of the story). >>>>>> 1. Homenet hosts MUST implement their own security policies in >>>> accordance to their computing capabilities. >>>>> I think we know from some famous cases that SCADA systems are highly >>>>> insecure, mainly due to following this principle (translated as >>>>> "security is too hard and this device will always be on a private >>>>> network anyway"). I'm a bit nervous that this policy will encourage >>>>> low-end device designers to classify their devices as not having >>>>> enough resource to deal with security. >>>>> >>>> This category should / will be eliminated by market forces, too much >>>> liability associated with being willfully insecure. There are famous >>>> cases for this too. >>>> >>>> If internet segmentation is all that is required, there are address >>>> types that facilitate local only access. >>>> >>>> Cb >>>>> Brian >>>>> _______________________________________________ >>>>> homenet mailing list >>>>> homenet@ietf.org<mailto:homenet@ietf.org> >>>>> https://www.ietf.org/mailman/listinfo/homenet >>>> >>>> >>>> _______________________________________________ >>>> homenet mailing list >>>> homenet@ietf.org >>>> https://www.ietf.org/mailman/listinfo/homenet >>> >>> ------------------------------------------------------------------------ >>> >>> _______________________________________________ >>> homenet mailing list >>> homenet@ietf.org >>> https://www.ietf.org/mailman/listinfo/homenet >> _______________________________________________ >> homenet mailing list >> homenet@ietf.org >> https://www.ietf.org/mailman/listinfo/homenet >> > > >_______________________________________________ >homenet mailing list >homenet@ietf.org >https://www.ietf.org/mailman/listinfo/homenet _______________________________________________ homenet mailing list homenet@ietf.org https://www.ietf.org/mailman/listinfo/homenet