Document 13214167

advertisement
IETF Security Activities and
Collaboration
Tim Polk
National Institute of Standards and Technology
tim.polk@nist.gov
Geneva, 6-7 December 2010
Addressing security challenges on a global scale
2
Two Excerpts from IETF Mission Statement

The mission of the IETF is to make the Internet
work better …
 by
producing high quality, relevant technical
documents that influence the way people design,
use, and manage the Internet.

One of the Cardinal Rules is Protocol
Ownership
 When
the IETF takes ownership of a protocol or
function, it accepts the responsibility for all
aspects of the protocol ....
Geneva, 6-7 December 2010
Addressing security challenges on a global scale
3
Responsibilities of IETF Security Area

Security-centric standards development


Contributing “security-clue” to standards developed in
other IETF areas


IETF Security Area includes between ten and eighteen
working groups devoted to a particular mechanism or
technology
Recruiting security participants to contribute to other IETF
standards areas, and monitoring those efforts to ensure
we are actually helpful
Cross-SDO collaboration


Providing Internet specific details (X.509)
Supporting Security requirements from other SDOs (mikey
modes for W3C)
Geneva, 6-7 December 2010
Addressing security challenges on a global scale
4
Security-Centric Standards Development

These standards are intended as essential building
blocks

Key Management Infrastructures


Secure Transport


S/MIME, DKIM, NEA, sasl
Authentication Technologies


Transport Layer Security (TLS and DTLS), Secure Shell
Secure Applications


Kerberos, X.509, multicast security, hokey, new DNSSEC based key
distribution work
EAP methods, federated authentication
Most exciting new work is leveraging DNSSEC to
securely distribute key material
Geneva, 6-7 December 2010
Addressing security challenges on a global scale
5
Collaborative Initiatives

Many IETF activities are inherently tied to technologies
developed outside the security area, but security clue
is essential to success

Worked examples include DNSSEC (Internet area) and TCPAO (Transport area)


Current activities are focused in the Routing area and
include secure inter-domain routing (sidr) and key
management for routing protocols (karp)


Understanding DNS and the TCP state machine were critical
aspects
Routing protocols demand a very specific background
Cross-SDO activities include X.509 and the XML Digital
Signature Standard
Geneva, 6-7 December 2010
Addressing security challenges on a global scale
6
High-Priority Opportunities

Ongoing/Emerging IETF activities
Leveraging DNSSEC for secure key or certificate
distribution
 Securing routing protocols
 Security for the “Internet of Things”
 Privacy-enhancing technologies


Other Opportunities
Security Automation
 Application of current protocols to emerging sectors

 Health care,
Geneva, 6-7 December 2010
smart grid, etc.
Addressing security challenges on a global scale
7
Personal Observations on Collaboration

Collaborations starts with Sound Architecture and
Engineering Decisions




Good protocols lend themselves to use as building blocks
Well engineered protocols are extensible to solve other
problems
If a protocol needs major surgery to satisfy a new effort, it
may be the wrong protocol
Collaboration within the IETF and between SDOs is
fundamentally the same problem

Success demands that committed individuals regularly
participate in the activities of both IETF working groups (or
both SDOs)
Geneva, 6-7 December 2010
Addressing security challenges on a global scale
8
Download