ietf
[Top] [All Lists]

Re: Storage over Ethernet/IP

2000-05-29 11:00:01
In message 
<C7091526C06AD211A7450004AC384A350C35D21E(_at_)mwabs035(_dot_)emeryworld(_dot_)com>,
 
"Dawson, Peter D" writes:


->-----Original Message-----
->From: Harald Tveit Alvestrand [mailto:Harald(_at_)Alvestrand(_dot_)no]
->Sent: Friday, May 26, 2000 6:27 PM
->To: Brian(_dot_)Rubarts(_at_)BORN(_dot_)COM
->Cc: ietf(_at_)ietf(_dot_)org
->Subject: RE: Storage over Ethernet/IP 

->The point being made, remade and made again here is:
->- Any protocol that offers no means of countering such 
->security threats is 
->broken, and should not be considered for standardization.

->It is perfectly possible that after conducting a threat and modality 
->analysis, one ends up with saying that hardware-accelerated 
->IPsec using 
->host identities is adequate for the scenarios involving 
->otherwise-unprotected Internet links, and that a mode with no 
->protection is 
->adequate when the media is physically secured.
->
->But the analysis MUST BE DONE.
->

is vulnerability and threat analysis part of the 
standardization process ??

Yes, in order to come up with a reasonable security considerations 
section.  (Clearly, much of it is site-specific.  But the protocol 
developers can't ignore it.)


                --Steve Bellovin




<Prev in Thread] Current Thread [Next in Thread>