[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: minutes of cdi threat model call 08-16 monday



Comments enclosed ...

> 
> Enclosed some comments:
> 
> Abbie Barbir writes:
>  > 
>  > 
>  > About scope of this work:
>  > Is limited to developing a threat model for CDI
>  > (not providing solutions).
>  > Q: Is the threat model limited to CDI or should we
>  > also cover theats related to CDNs in general?
>  > Might be difficult to understand the additional
>  > threats posed by CDI without understanding
>  > the threat model for CDNs.

So, as we have done thus far, maybe we should have a document that
documents current CDN threat models and then expand on that within
the framework of the existing documents we have to document threat
models for CDI.  Just a .01 thought.

>  > 
>  > Things specifically considered out of scope:
>  > - Gaurantees regarding content integrity in case
>  > of content transformations in the network.
>  > - The security of CDN such as surrogates (i.e. can not improve
>  > on the security of the original system)
>  > 
> 
> I think this is fine as long as we state that at the beginning. 

I agree with this approach.  Beyond this, has anybody done an analysis
of the threats that caches/proxies/replicas come under beyond the
the threats to the underlying system?

> 
>  > Threats fall in two categories namely,
>  > network level threats and content level threats.
>  > Within both of these the distinction can be made between
>  > threats from outsiders (parties not taking part
>  > in the content peering arrangement) and from insiders
>  > (those taking part in content peering).
>  > This breakdown covers both intentional threats (i.e.
>  > malicious attacks) as well as unintentional threats
>  > (i.e. those due to system malfunction, programming error,
>  > configuration error etc).
> 
> I am not quite sure what an outsider content level thread would be.
> Is not by definition a content level thread always done by an insider
> since s/he needs network level connectivity to execute that thread.
> 
>  > 
>  > Threats from outsiders can be mitigated by using strong
>  > authentication and encryption.
>  > Q: Is this sufficient protection?
>  > Q: Do we want to make strong authentication and encryption
>  > a requirement?
>  > Q: Is both IPSec and TLS appropriate/scalable?
>  > Q: Should we (at this point) decide/debate above point?
> 
> 
> If my above statement holds by definition all outsider threads are
> network level threads which can be addresses by above means. At
> this point I don't think we have to decide how to solve it 
> (TLS/IPSEC) but we can require that the solution has to scale.

One thing that seems to be missing here is the notion of a trust model.
Is it okay to assume that content peering nodes have a trust relationship
with a a peer in the neighboring CDN?  Is there something we can learn
from Network Peering today?

> 
>  > 
>  > Threats from insiders are harder to deal with because
>  > of the trust relationship required for content internetworking.
>  > 
>  > - Treatment of malformed messages: following the BGP model
>  > it is suggested that receival of a malformed message result
>  > in termination of peering relationship with the gateway
>  > involved. Malformed message could be as result of gateway
>  > being compromised, buggy implementation etc. Since it is
>  > impossible to tell the difference terminating this peer-to-peer
>  > relationship appears to be the only safe way to handle this.
> 
> Does that mean terminate it alltogether or just that connection?
> What I mean is are the two sides allowed to reastablish a new
> peering relationship automatically? 
> 
> Does that not lead to easy DOS attacks? If all I have to 
> do is send you a mailformed IPSEC packet to terminate
> your peering relationship then I don't think that is acceptable. So 
> I would at least limit that to mailformed on the application level.
> 
>  > 
>  > --- point the difference between "termination of 
>  > peering relationship with the gateway involved" and terminating 
>  > peer-to-peer relationship with the CDN involved.
>  > 
>  > - A peer can always (intentionally or unintentionally)
>  > send incorrect advertisements which might lead to incorrect
>  > selections being made. E.g. a CDN might incorrectly advertise low load,
>  > low cost and good coverage and therefore attract a large
>  > proportion of traffic. This problem can be somewhat mitigated
>  > through filtering of advertisements and local policies but
>  > ultimately comes down to a trust relationship between
>  > peers.
>  > 
>  > Migration of policy (might be generic CDN issue not CDI):
>  > If there is a certain trust relationship between content
>  > provider and consumer this relationship should be maintained
>  > when content is distributed via a CDN. (example from CDI arch
>  > draft).
>  >  - This relationship should also be preserved when content moves 
>  > between peering CDNs (policy migration).
>  > 
>  > Authoritative:
>  > Q: Do we need a mechanism to allow a CDN to prove that it
>  > is authoritative to distribute content?
> 
> I don't think we do. That should be done by the above mentioned 
> policy and trust relationships. In BGP there is also no proof
> required that an particular AS origins a prefix.
> 
>  > 
>  > Q: What does it mean to be authorized to distribute content?
> 
> I would say it means you talk to somebody who trusts you and
> you advertise it. I think all the policy part has to be
> done in a legal fashion similar to BGP peering.
> 
> 
> 
> Q: Are there any DOS attacks we have to consider?
> Q: Do we need some way of querying the view of our peers?
>  
> 
> Oliver
> 

Michael