80 likes | 333 Views
Security and the Internet (circa 1980-1990). Dr. Stephen Kent Chief Scientist- Information Security BBN Technologies. Popular Misconceptions re Security. No thought given to security in the design of the Internet
E N D
Security and the Internet (circa 1980-1990) Dr. Stephen Kent Chief Scientist- Information Security BBN Technologies
Popular Misconceptions re Security • No thought given to security in the design of the Internet • Kerberos was the first network security system to use a key distribution center • PGP was the first secure e-mail protocol • It’s all about passwords, … • Adding security mechanisms to a system will make the system more secure
DoD Internet Security Assumptions • “Man in the middle” attacks are real • Trojan Horse attacks are real • Encrypt, authenticate, and integrity protect traffic from source to destination whenever possible • Rely on cryptographic key management technology to securely identify peer entities • Label traffic based on sensitivity • Use trusted operating systems, but require inline crypto devices for COMSEC
Your Taxpayer Dollars at Work? • BCR (1976-81): encrypted TCP connections using DES, KDC, central access controller • Fig Leaf: (early 80s): fast BCRs, at IP layer • BLACKER (1981-90): BCR with high grade crypto, A1 assurance • CANEWARE: (1983-95?): BLACKER public key management, B2 assurance • IPLI (1983-86): high grade, secure IP, for tactical environments (backup for BLACKER) • SDNS (1987-91): SP3, SP4, MSP
Shortcomings of the DoD Model • No cryptographic support for applications • No Internet infrastructure security • DNS • routing protocols • network management protocols • Not much thought about denial of service • Secure operating systems were not deployed • Inline crypto hardware too expensive, especially because end systems are so cheap
IETF Security Work (in the 80’s) • Privacy Enhanced Mail (PEM): • RFC1989 (2/87), RFC 1040 (1/88), RFCs 1113/4 (8/89) • produced by the Privacy Task Force, not an IETF WG • the first Internet secure e-mail standard, soon followed by the first PKI standard • not widely deployed, but served as the foundation for later systems (S/MIME, MSP, Defense Message System PKI, …) • IP Security Option (IPSO) • RFC 1038-1/88 • in draft form at this stage, later standardized in RFC 1108 • not of much general interest, mostly for BLACKER and CMWs • produced by a DoD employee • No security WGs!
Summary • The DoD was an early adopter of TCP/IP and did have a model for high quality security, but that model was not widely known, did not anticipate some important security issues, and was too costly for most users to implement • Market problems • The commercial Internet was just beginning to develop, e.g., no e-commerce, and thus no significant demand • The academic Internet community did not place a high priority on security • No IETF security WGs, just the Privacy Task Force