100 likes | 194 Views
Learn about key security rules in IETF, covering areas like IP layer security, key distribution, application security, and more. Understand the importance and challenges of implementing security across different layers and applications.
E N D
Security Work in the IETF Scott Bradner Harvard University sob@harvard.edu
Syllibus • IETF security “rules” • security at the IP layer • security above the IP layer • key distribution • applications • summary
IETF Security Rules • all RFCs must have a meaningful (in context) Security Considerations section • not always the case with old RFCs • most IETF charters say that security must be addressed as a basic issue • security ADs carefully review security issues with documents offered for publication as RFCs • note: “security” includes integrity, confidentiality, privacy, scalability, reliability, ...
IETF Security Rules, contd. • most applications must have a mandatory-to-implement security option • can negotiate alternatives • working group can not assume that the technology will be only used in a confined environment • e.g., IP storage - not just the glass house anymore • authentication & confidentially must be addressed • can not overload TCP port 80 • can not piggyback on the web getting through a firewall • by the way RFC 3093 is a joke
Security at the IP Layer • IPsec • IETF packet-level authentication & encryption • best implemented in OS Kernel • can provide protection to all applications • can live under legacy applications • mostly used in VPN applications and between firewall products
Security above Transport • SSL/TLS • TLS: IETF “Transport Layer Security” protocol • can be implemented in an application • does not require OS support • comes from history - Netscape could not depend on OS • perhaps the most used security technology on the Internet • used by browsers everyday to do commerce on the Internet
SSL/TLS, contd. • integration into Browser makes it invisible to end-users • this is a Good Thing ™ • TLS is "good enough” to have displaced “better” solutions • e.g., Secure Electronic Transaction (SET) standard designed by Visa and Mastercard
Key Distribution, a Big Problem • “big” in that it requires infrastructure • infrastructure is hard to deploy • IETF PKIX Group is profiling X.509 for use in the Internet • largest user: TLS • DNS Security may also be used for Key Distribution some day • problems deploying it so far • will DNS be our Key Management System or will PKIX? • jury still out
Applications • secure mail: SMIME & PGP/MIME • Key Distribution is still a problem • user applications are available, but hard to use • hope to see some real deployment as people realize the need to secure email • SMIME & TLS used to secure IETF VoIP signaling • TLS used for many applications • PKIX, LDAP, BEEP, SASL, L2TP, SMTP, ...
Summary & Problems • IETF demands “good” security • standard development community is reluctant sometimes • users seen as not wanting security • tell that to the feds