[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

minutes of cdi threat model call 08-16 monday



Enclosed some comments:

Abbie Barbir writes:
 > 
 > 
 > About scope of this work:
 > Is limited to developing a threat model for CDI
 > (not providing solutions).
 > Q: Is the threat model limited to CDI or should we
 > also cover theats related to CDNs in general?
 > Might be difficult to understand the additional
 > threats posed by CDI without understanding
 > the threat model for CDNs.
 > 
 > Things specifically considered out of scope:
 > - Gaurantees regarding content integrity in case
 > of content transformations in the network.
 > - The security of CDN such as surrogates (i.e. can not improve
 > on the security of the original system)
 > 

I think this is fine as long as we state that at the beginning. 

 > Threats fall in two categories namely,
 > network level threats and content level threats.
 > Within both of these the distinction can be made between
 > threats from outsiders (parties not taking part
 > in the content peering arrangement) and from insiders
 > (those taking part in content peering).
 > This breakdown covers both intentional threats (i.e.
 > malicious attacks) as well as unintentional threats
 > (i.e. those due to system malfunction, programming error,
 > configuration error etc).

I am not quite sure what an outsider content level thread would be.
Is not by definition a content level thread always done by an insider
since s/he needs network level connectivity to execute that thread.

 > 
 > Threats from outsiders can be mitigated by using strong
 > authentication and encryption.
 > Q: Is this sufficient protection?
 > Q: Do we want to make strong authentication and encryption
 > a requirement?
 > Q: Is both IPSec and TLS appropriate/scalable?
 > Q: Should we (at this point) decide/debate above point?


If my above statement holds by definition all outsider threads are
network level threads which can be addresses by above means. At
this point I don't think we have to decide how to solve it 
(TLS/IPSEC) but we can require that the solution has to scale.

 > 
 > Threats from insiders are harder to deal with because
 > of the trust relationship required for content internetworking.
 > 
 > - Treatment of malformed messages: following the BGP model
 > it is suggested that receival of a malformed message result
 > in termination of peering relationship with the gateway
 > involved. Malformed message could be as result of gateway
 > being compromised, buggy implementation etc. Since it is
 > impossible to tell the difference terminating this peer-to-peer
 > relationship appears to be the only safe way to handle this.

Does that mean terminate it alltogether or just that connection?
What I mean is are the two sides allowed to reastablish a new
peering relationship automatically? 

Does that not lead to easy DOS attacks? If all I have to 
do is send you a mailformed IPSEC packet to terminate
your peering relationship then I don't think that is acceptable. So 
I would at least limit that to mailformed on the application level.

 > 
 > --- point the difference between "termination of 
 > peering relationship with the gateway involved" and terminating 
 > peer-to-peer relationship with the CDN involved.
 > 
 > - A peer can always (intentionally or unintentionally)
 > send incorrect advertisements which might lead to incorrect
 > selections being made. E.g. a CDN might incorrectly advertise low load,
 > low cost and good coverage and therefore attract a large
 > proportion of traffic. This problem can be somewhat mitigated
 > through filtering of advertisements and local policies but
 > ultimately comes down to a trust relationship between
 > peers.
 > 
 > Migration of policy (might be generic CDN issue not CDI):
 > If there is a certain trust relationship between content
 > provider and consumer this relationship should be maintained
 > when content is distributed via a CDN. (example from CDI arch
 > draft).
 >  - This relationship should also be preserved when content moves 
 > between peering CDNs (policy migration).
 > 
 > Authoritative:
 > Q: Do we need a mechanism to allow a CDN to prove that it
 > is authoritative to distribute content?

I don't think we do. That should be done by the above mentioned 
policy and trust relationships. In BGP there is also no proof
required that an particular AS origins a prefix.

 > 
 > Q: What does it mean to be authorized to distribute content?

I would say it means you talk to somebody who trusts you and
you advertise it. I think all the policy part has to be
done in a legal fashion similar to BGP peering.



Q: Are there any DOS attacks we have to consider?
Q: Do we need some way of querying the view of our peers?
 

Oliver