Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA
Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA
Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
trusted environment. These protocols either had very weak security (ARPA services) or no<br />
security at all (IP, UDP, TCP). As the Internet grew and evolved <strong>in</strong>to an untrusted environment,<br />
the security provisions of the IETF’s protocols improved. Security enhancements (i.e., Internet<br />
protocol security (IPsec) for IP, transport layer security (TLS) for TCP) and protocol<br />
replacement Secure Shell (SSH version (v)2 replaces the file transfer protocol (<strong>FTP</strong>), trivial file<br />
transfer protocol (T<strong>FTP</strong>), and Telnet ARPA services) were devised so that most of the orig<strong>in</strong>al<br />
protocols could be secured. The security provisions of the newer IETF protocols reflect the<br />
security knowledge of the era when the protocol was designed. Certa<strong>in</strong> protocols, therefore,<br />
were designed with what proved over time to have security limitations that thwarted their ability<br />
to evolve as best current practice network security evolved. Other protocols do not have these<br />
limitations and thus are able to use Federal Information Process<strong>in</strong>g Standard (FIPS)-compliant<br />
encryption algorithms and key<strong>in</strong>g material.<br />
In all cases, the security provisions of IETF protocols are optional. Secured protocol<br />
deployments are unable to <strong>in</strong>teroperate with unsecured protocol deployments. Orig<strong>in</strong>ally, few, if<br />
any, deployments deployed IETF protocols with their security features turned on. More<br />
deployments have been configur<strong>in</strong>g their systems to use these security features s<strong>in</strong>ce network<br />
attacks have become <strong>in</strong>creas<strong>in</strong>gly common.<br />
An attribute def<strong>in</strong><strong>in</strong>g the IETF work <strong>in</strong> general is that they did not design their protocols <strong>in</strong> terms<br />
of a common top-down systems perspective. They were designed <strong>in</strong> a piecemeal fashion to<br />
resolve specific technology needs as they were identified over time. Until recently, lessons<br />
learned from the development of one protocol were <strong>in</strong>completely applied to the development of<br />
other protocols. The lessons learned were not completely applied because the work<strong>in</strong>g group<br />
develop<strong>in</strong>g that protocol was composed of specialists for that particular technology, who may or<br />
may not be aware of how similar problems were addressed by other IETF work<strong>in</strong>g groups. Also<br />
until recently, the security provisions of protocols were designed <strong>in</strong> isolation, usually without<br />
reference to the security provisions used by other IETF protocols. As of mid 2006, the IETF has<br />
yet to beg<strong>in</strong> try<strong>in</strong>g to orchestrate the key management requirements of the various protocols that<br />
populate the IP family. As a result, the cumulative key management requirements for the IP<br />
family are varied and extraord<strong>in</strong>arily complex, with most protocols approach<strong>in</strong>g key<br />
management <strong>in</strong> a unique and idiosyncratic manner. Worse, different implementations of the<br />
same protocol on different platforms usually have devised key management mechanisms that are<br />
unique to that implementation only. Thus, a very large diversity of key management approaches<br />
currently exist across the COTS Internet products. However, a few general patterns can be<br />
abstracted. These patterns are:<br />
• Router-to-router protocols (e.g., open shortest path first (OSPF), BGP, and multicast<br />
open shortest path first (MOSPF)) generally need to be configured with identical<br />
passwords and symmetric keys for their communicat<strong>in</strong>g <strong>in</strong>terfaces. The specific<br />
mechanism for accomplish<strong>in</strong>g this varies widely between differ<strong>in</strong>g implementations of<br />
the same protocol. Although these protocols have similar algorithms, they are<br />
implemented differently on each protocol. For example, although OSPF and BGP use<br />
common password and symmetric keys, on OSPF, this is done on an area basis, while on<br />
BGP, it is done on a per <strong>in</strong>terface basis. Please note from table 1 that the L<strong>in</strong>ux<br />
implementations of BGP do not support MD5 authentication as of 2005.<br />
42