70 likes | 83 Views
ECRIT Security Considerations. IETF 65 Status Report Tom Taylor. Status of Document. draft-taylor-ecrit-security-threats-03 accepted as WG work item Resubmitted as draft-ietf-ecrit-security-threats-00 Deleted unused definitions Deleted term ASP/VSP as proposed on the list.
E N D
ECRIT Security Considerations IETF 65 Status Report Tom Taylor
Status of Document • draft-taylor-ecrit-security-threats-03 accepted as WG work item • Resubmitted asdraft-ietf-ecrit-security-threats-00 • Deleted unused definitions • Deleted term ASP/VSP as proposed on the list
Threats To Emergency Identifier • Threat of fraud identified • Misuse of identifier for ordinary calls • Call signalling does not necessarily carry location information • Now part of security considerations for emergency identifier draft • Further threat of use as probe to identify entities for further attack
Threats To Mapping • Denial of service attacks • Flooding • Interception • Replay • Alteration • Impersonation of mapping server • Database corruption • Reflection attacks • Breach of confidentiality
Recommendations • Requirements proposed • Some affect ECRIT work directly • Others are requirements for discussions in Security Considerations sections
Major Issue • Major issue is strength of requirements on mapping protocol design • MUST provide authentication, confidentiality • or • MUST allow authentication, provision of connfidentiality
Future Of Document • Should document be published as a stand-alone item? • Alternative: • Content gets taken up into Security Considerations sections of other work items • This document remains open as working document when new work items added