home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!elroy.jpl.nasa.gov!swrinde!network.ucsd.edu!ucsbcsl!spectrum.CMC.COM!lars
- From: lars@spectrum.CMC.COM (Lars Poulsen)
- Newsgroups: comp.protocols.tcp-ip
- Subject: Re: Secure TCP-IP
- Message-ID: <1992Sep3.041238.14958@spectrum.CMC.COM>
- Date: 3 Sep 92 04:12:38 GMT
- References: <1992Aug28.083228.16663@hplb.hpl.hp.com>
- Organization: CMC Network Systems (Rockwell DCD), Santa Barbara, CA, USA
- Lines: 37
-
- In article <1992Aug28.083228.16663@hplb.hpl.hp.com>
- paola@hplb.hpl.hp.com (paola fulchignoni) writes:
- >Does anyone know whether a "secure TCP" or "secure IP" exist (providing
- >security
- >services such as access control, source authentication, integrity, etc.)?
-
- To secure traffic at the IP level requires a trusted physical network.
- The military people have made some efforts in this direction, and some
- of these efforts have been picked up by the financial community.
- Esentially, you put a transmogrifier (authenticator/encryptor) between
- your machine and the real network. The machines on the "red" side of the
- encryptor box now form a closed network of trusted hosts, and the boxes
- may optionally talk to a central control center which may potetially
- open windows to talk to specific hosts attached directly to the
- underlying insecure "black" network in a controlled manner. Such boxes
- have been seen between a host's X.25/V.35 connector and the CSU/DSU.
- They have also been spotted between the host's ethernet AUI connector
- and its transceiver. This technology is expensive. And of course you
- have to trust the people who sold you the box.
-
- The transport level could easily be modified to perform an
- authentication handshake with a control center at connection startup
- time, but then (of course) it would not be TCP any more. The US Air
- Force has done some studies of variations of this concept. (Mostly with
- parallel protocol modules sitting ARP-like between TCP and IP). I don't
- think this has led to any large scale implementation.
-
- Most people put this in the application layer. Maybe the best known
- example is Kerberos. There is also work being done on a secure RPC
- mechanism, and thus a secure NFS. Several workstation vendors have
- formed a Trusted Systems Interoperability Group to ensure that the
- multiple implementations of this spec really will be interoperable.
- TSIG is loosely affiliated with IETF. HP is a major participant.
- --
- / Lars Poulsen, SMTS Software Engineer Internet E-mail: lars@CMC.COM
- CMC Network Products / Rockwell Int'l Telephone: +1-805-968-4262
- Santa Barbara, CA 93117-3083 TeleFAX: +1-805-968-8256
-