SORT BY:

LIST ORDER
THREAD
AUTHOR
SUBJECT


SEARCH

IPS HOME


    [Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

    RE: Security Use Requirements



    
    
    Bernard,
    
    This is becoming an interesting thread.
    
    The reason we went after TLS is that it can be used for session
    authentication with stronger schemes than
    and it is very popular for software implementations.
    
    As for the cost of the hardware - the figures you quote are for 100Mbs (and
    even there the NIC numbers are higher).
    The low-end iSCSI adapters will cost well under $100 (at 1GBbs).
    
    I don't envision all the options becoming necessary for hardware
    implementations.  The pieces we wanted from TLS can be implemented in
    software.
    
    If we where forced to select one I would too go for IPsec (and that is what
    we have in the current draft) but then we have
    to specify session authentication on our own and keep updating it as new
    schemes enter the world.  It seems far better
    to rely on a specialized standard and TLS fits the bill.
    
    Regards,
    Julo
    
    "Bernard Aboba" <aboba@internaut.com> on 06/02/2001 23:21:14
    
    Please respond to "Bernard Aboba" <aboba@internaut.com>
    
    To:   Julian Satran/Haifa/IBM@IBMIL
    cc:   Black_David@emc.com, ips@ece.cmu.edu, "RJ Atkinson" <rja@inet.org>,
          "Smb@Research. Att. Com" <smb@research.att.com>, Ofer
          Biran/Haifa/IBM@IBMIL
    Subject:  RE: Security Use Requirements
    
    
    
    
    >Both IPSec and TLS will be in the standard.
    
    Including *both* IPSEC and TLS as options will probably result
    in both much higher cost to customers as well as fewer vendors
    implementing either. Choosing one or the other (IPSEC is my
    preference) would be a better choice.
    
    In general, it is a bad idea to have too many security options in
    a standard. Options are bad because you have to implement them
    to be able to interoperate with those people who do, yet you cannot
    guarantee that the work will be used. In particular, including both
    IPSEC and TLS would cause vendors to try to implement both on
    the same NIC, since they could never be sure which security scheme
    would be used on a given iSCSI target. This would drive up the cost
    enormously since the acceleration architectures are very different
    between the protocols.
    
    >As we are talking about speeds that will be in excess of 1GBs
    >even on modest disk controllers we were all hesitant if to make
    >anything in this category mandatory to implement today.
    
    As Ran noted, making implementation mandatory doesn't mean that
    users have to turn it on. But not making it mandatory will probably
    ensure that security will not be available in most cases. Given
    the modest cost of adding IPSEC acceleration hardware (today
    IPSEC accelerated NICs are available for around $100) it is hard
    to see how this would be a worthwhile tradeoff.
    
    Right now, SSL/TLS acceleration hardware is a lot more expensive than
    IPSEC accelerators (at least $2000), so I could understand if SSL/TLS
    were left out of the standard.
    
    >We assume that all those who require security beyond CRC
    
    CRC provides only integrity protection, but since it is not keyed,
    there is no per-packet authentication or protection against spoofing
    or modification. CRC therefore has little or no security value.
    
    > session authentication
    
    All session authentication does is guarantee the user identity
    at the beginning of the session. Unless you have per-packet
    authentication and integrity protection, all bets are off after
    that. In particular, session authentication provides no protection
    against TCP session hijacking.
    
    >However those that build a Storage Area Newtork within a
    >small enterprise completely isolated from the
    >internet will not have to pay for what they do not need.
    
    Actually, the decision made above will guarantee that all users
    will need to pay a huge incremental cost for security, because
    of the over abundance of security options. In reality, given the
    projected cost of 1+ Gbps iSCSI accelerated adapters, the incremetal
    cost of implementing IPSEC security would be minimal.
    
    
    
    


Home

Last updated: Tue Sep 04 01:05:35 2001
6315 messages in chronological order