100 likes | 177 Views
Security Work in the IETF. Scott Bradner Harvard University sob@harvard.edu. Syllibus. IETF security “rules” security at the IP layer security above the IP layer key distribution applications summary. IETF Security Rules.
E N D
Security Work in the IETF Scott Bradner Harvard University sob@harvard.edu
Syllibus • IETF security “rules” • security at the IP layer • security above the IP layer • key distribution • applications • summary
IETF Security Rules • all RFCs must have a meaningful (in context) Security Considerations section • not always the case with old RFCs • most IETF charters say that security must be addressed as a basic issue • security ADs carefully review security issues with documents offered for publication as RFCs • note: “security” includes integrity, confidentiality, privacy, scalability, reliability, ...
IETF Security Rules, contd. • most applications must have a mandatory-to-implement security option • can negotiate alternatives • working group can not assume that the technology will be only used in a confined environment • e.g., IP storage - not just the glass house anymore • authentication & confidentially must be addressed • can not overload TCP port 80 • can not piggyback on the web getting through a firewall • by the way RFC 3093 is a joke
Security at the IP Layer • IPsec • IETF packet-level authentication & encryption • best implemented in OS Kernel • can provide protection to all applications • can live under legacy applications • mostly used in VPN applications and between firewall products
Security above Transport • SSL/TLS • TLS: IETF “Transport Layer Security” protocol • can be implemented in an application • does not require OS support • comes from history - Netscape could not depend on OS • perhaps the most used security technology on the Internet • used by browsers everyday to do commerce on the Internet
SSL/TLS, contd. • integration into Browser makes it invisible to end-users • this is a Good Thing ™ • TLS is "good enough” to have displaced “better” solutions • e.g., Secure Electronic Transaction (SET) standard designed by Visa and Mastercard
Key Distribution, a Big Problem • “big” in that it requires infrastructure • infrastructure is hard to deploy • IETF PKIX Group is profiling X.509 for use in the Internet • largest user: TLS • DNS Security may also be used for Key Distribution some day • problems deploying it so far • will DNS be our Key Management System or will PKIX? • jury still out
Applications • secure mail: SMIME & PGP/MIME • Key Distribution is still a problem • user applications are available, but hard to use • hope to see some real deployment as people realize the need to secure email • SMIME & TLS used to secure IETF VoIP signaling • TLS used for many applications • PKIX, LDAP, BEEP, SASL, L2TP, SMTP, ...
Summary & Problems • IETF demands “good” security • standard development community is reluctant sometimes • users seen as not wanting security • tell that to the feds