Minutes from RIPE43
---------- Forwarded message ---------- Date: 21 Aug 2002 13:53:25 -0000 From: owner-techsec-wg@ripe.net To: techsec-wg-approval@ripe.net Subject: BOUNCE techsec-wg@ripe.net: Non-member submission from [RIPE NCC WebMaster <webmaster@ripe.net>] Received: (qmail 32077 invoked by uid 0); 21 Aug 2002 13:53:24 -0000 Received: from birch.ripe.net (193.0.1.96) by postman.ripe.net with SMTP; 21 Aug 2002 13:53:24 -0000 Received: from ripe.net (penguin.ripe.net [193.0.1.232]) by birch.ripe.net (8.12.5/8.11.6) with ESMTP id g7LDrOBG002147 for <techsec-wg>; Wed, 21 Aug 2002 15:53:24 +0200 Message-Id: <200208211353.g7LDrOBG002147@birch.ripe.net> To: techsec-wg@ripe.net Subject: Draft Minutes RIPE 42 From: RIPE NCC WebMaster <webmaster@ripe.net> X-Organization: RIPE Network Coordination Centre X-Phone: +31 20 535 4444 X-Fax: +31 20 535 4445 Date: Wed, 21 Aug 2002 15:53:24 +0200 Sender: webmaster@ripe.net X-RIPE-Spam-Status: NONE ; -985 X-RIPE-Spam-Level: Dear All, On behalf of Rene, here are the Draft minutes of the TechSec Working Group sessions at RIPE 42. ==================================== RIPE42 Techsec working group Minutes ==================================== Agenda; 1st slot: 0. Administrativia 1. Minutes of previous meeting 2. DISI status update 3. NLnet Labs reports on securing .nl 4. TF-CSIRT update, news about IODEF development, 5. IRT object in the RIPE Database: current status 2nd slot 6. Hugh Daniel reports on FreeS/WAN and issues around authentication/privacy and user perceptions. 7. A.O.B. 1. Minutes of previous meeting ------------------------------ ... were approved. 2. Olaf DISI update ------------------- http://www.ripe.net/ripe/meetings/archive/ripe-42/presentations/ripe42-disi/... ml Olaf presented an update on the work done in the framework of the DISI project. Comment from Daniel Karrenberg: the idea behind deploying DNSSEC in the the RIPE NCC, the in-addr tree, is to set an example, write up how its done. 3. Miek Gieben .nl.nl experiment -------------------------------- http://www.ripe.net/ripe/meetings/archive/ripe-42/presentations/ripe42-techs... ing-nl.html Miek presented experience with implementing DNSSEC in the .nl zone. The tests were done with a shadow name server, not listed as an official server for the .nl zone. Question: do you sign zones once a day? Answer: signature validity time is one or two days; parent needs to sign often. Randy Bush: should not be so short that operational problems cause key and data to go invalid; make lifetime 3-4 times longer in the beginning 4. Yuri Demchenko TF-CSIRT update --------------------------------- http://www.ripe.net/ripe/meetings/archive/ripe-42/presentations/ripe42-techs... irt/index.html Yuri presented an updated of Terena's TF-CSIRT activity. 5. Andreii Robachesky IRT object in RIPE Database -------------------------------------------------- http://www.ripe.net/ripe/meetings/archive/ripe-42/presentations/ripe42-db-op... -update/sld017.html Andreii reported support for the IRT object has been added to RIPE Database 6. Hugh Daniel Free/SWAN ------------------------ Introduction: General security on the internet: IP and related protocols (DNS, BGP, Snmp, etc.) are _still_ not secured in very meaningfull ways. To secure someting you need to make a set of links from some known axiom to something that gets work done; Currently the known axiom a is a text name typed in to a browser or hard coded into a script, table program etc. On the net we need to start with a DNS name , link that to an IP then link to each packet of data. If either of the links is broken, you do not have security. In Free/SWAN: Use emerging tools dnssec and ipsec to secure tcp/ip packets; dnssec secures name to resource record lookups, ipsec secures the packets from the address that dsnsec returned. Your layer of the infrastructure thus gets secured. Opportunistic Encryption (OE); automatically setup IPsec connections between any two machines on the net when they start talking to each other. whenever an OE host is about to send a packet to a new host it has not talked to recently, it first checks the reverse DNS entry for that IP address; if there is a key there use it to setup an IPSec session. OE works with both DNS and DNSsec, with DNS you are now protected from passive listening attacks with DNSSEC you are protected from active attacks. (protected as best as things can be designed this week and only as well as people run their hosts ...) Questions/Discussion: Q You are using key recoreds? A. Yes, though not perfect; complexity comes whith hosts that do IPsec or OE for themselvev or for a subnet, gateway PCs, security for all stuff behing id. Would need equivalent of MX recored, this is my key, but this is the host who will do IPsec for me. Missing in DNSSEC Randy Bush: AT&T uses this technology internally, ~1000 hosts couple of PCs talk to 500-1000 pcs at emplyoees homes provide 16bit address from emplyoee to office and nothing else. box @home doesn't talkk to anything but AT&T servers gateways, etc. Can have machines @home inside and outside at&t, but no need for leased line. freeSwan running in VPM mode Hugh asks: would it work you in your organisation? comments: - was considering Free/SWAN as frontend, need to encrypt the packets, wavesec - could be interesting, we have two kinds of home users, techies, and others who even with a recipe don't know if they can do it correctly. OE soltuion for AT&T, sigaret size box to do OE 7. A.O.B. No AOB Regards Jeroen Bet RIPE NCC WEBMASTER ==================
participants (1)
-
Henk Uijterwaal (RIPE-NCC)