13.09.2014 Views

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

trusted environment. These protocols either had very weak security (ARPA services) or no<br />

security at all (IP, UDP, TCP). As the Internet grew and evolved <strong>in</strong>to an untrusted environment,<br />

the security provisions of the IETF’s protocols improved. Security enhancements (i.e., Internet<br />

protocol security (IPsec) for IP, transport layer security (TLS) for TCP) and protocol<br />

replacement Secure Shell (SSH version (v)2 replaces the file transfer protocol (<strong>FTP</strong>), trivial file<br />

transfer protocol (T<strong>FTP</strong>), and Telnet ARPA services) were devised so that most of the orig<strong>in</strong>al<br />

protocols could be secured. The security provisions of the newer IETF protocols reflect the<br />

security knowledge of the era when the protocol was designed. Certa<strong>in</strong> protocols, therefore,<br />

were designed with what proved over time to have security limitations that thwarted their ability<br />

to evolve as best current practice network security evolved. Other protocols do not have these<br />

limitations and thus are able to use Federal Information Process<strong>in</strong>g Standard (FIPS)-compliant<br />

encryption algorithms and key<strong>in</strong>g material.<br />

In all cases, the security provisions of IETF protocols are optional. Secured protocol<br />

deployments are unable to <strong>in</strong>teroperate with unsecured protocol deployments. Orig<strong>in</strong>ally, few, if<br />

any, deployments deployed IETF protocols with their security features turned on. More<br />

deployments have been configur<strong>in</strong>g their systems to use these security features s<strong>in</strong>ce network<br />

attacks have become <strong>in</strong>creas<strong>in</strong>gly common.<br />

An attribute def<strong>in</strong><strong>in</strong>g the IETF work <strong>in</strong> general is that they did not design their protocols <strong>in</strong> terms<br />

of a common top-down systems perspective. They were designed <strong>in</strong> a piecemeal fashion to<br />

resolve specific technology needs as they were identified over time. Until recently, lessons<br />

learned from the development of one protocol were <strong>in</strong>completely applied to the development of<br />

other protocols. The lessons learned were not completely applied because the work<strong>in</strong>g group<br />

develop<strong>in</strong>g that protocol was composed of specialists for that particular technology, who may or<br />

may not be aware of how similar problems were addressed by other IETF work<strong>in</strong>g groups. Also<br />

until recently, the security provisions of protocols were designed <strong>in</strong> isolation, usually without<br />

reference to the security provisions used by other IETF protocols. As of mid 2006, the IETF has<br />

yet to beg<strong>in</strong> try<strong>in</strong>g to orchestrate the key management requirements of the various protocols that<br />

populate the IP family. As a result, the cumulative key management requirements for the IP<br />

family are varied and extraord<strong>in</strong>arily complex, with most protocols approach<strong>in</strong>g key<br />

management <strong>in</strong> a unique and idiosyncratic manner. Worse, different implementations of the<br />

same protocol on different platforms usually have devised key management mechanisms that are<br />

unique to that implementation only. Thus, a very large diversity of key management approaches<br />

currently exist across the COTS Internet products. However, a few general patterns can be<br />

abstracted. These patterns are:<br />

• Router-to-router protocols (e.g., open shortest path first (OSPF), BGP, and multicast<br />

open shortest path first (MOSPF)) generally need to be configured with identical<br />

passwords and symmetric keys for their communicat<strong>in</strong>g <strong>in</strong>terfaces. The specific<br />

mechanism for accomplish<strong>in</strong>g this varies widely between differ<strong>in</strong>g implementations of<br />

the same protocol. Although these protocols have similar algorithms, they are<br />

implemented differently on each protocol. For example, although OSPF and BGP use<br />

common password and symmetric keys, on OSPF, this is done on an area basis, while on<br />

BGP, it is done on a per <strong>in</strong>terface basis. Please note from table 1 that the L<strong>in</strong>ux<br />

implementations of BGP do not support MD5 authentication as of 2005.<br />

42

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!