--On Sunday, December 07, 2008 12:18:37 PM -0700 Cullen Jennings <[EMAIL PROTECTED]> wrote:


I find the claim that attacks are easier to do with "VoIP Configuration
Server Address" than the "TFTP Server Name" to be pretty dubious.

Me too.



That said, I think this security discussion is going the wrong direction.
What is common practice, and what I think this should suggest, is that
DHCP can be spoofed in some cases. The correct thing to do is to secure
the object that is retrieved via tftp.

I'm inclined to agree with this, in principle.
In practice, that requires either preconfiguration, which sort of defeats the point of using DHCP, or a closed system like firmware updates signed by a device manufacturer, where not only the network but also the user and DHCP server operator are untrusted.

If we're talking about an option which will only ever be used to tell phones where to download new firmware, then this is fine. If we're talking about an option which will be used by network operators to provide configuration to phones (in order to avoid manual configuration), or in general to provide a TFTP server address for whatever is the next step in the boot process, then "secure the object" sounds like good advice but IMHO is less practical than "configure your network to prevent DHCP spoofing".

There are ways to mitigate DHCP spoofing but
discussion of those is outside scope of this draft.

I agree that discussion of how to mitigate DHCP spoofing is out of scope. However, I think recommending that operators do so is appropriate.


_______________________________________________
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf

Reply via email to