@@ -2,9 +2,6 @@ Chapter 1. Introduction
22=========================
33
44
5- .. New effort from Bruce
6-
7-
85Security has been a focus of system designers for
96as long as we have had time-shared computers. If two users can share a
107computer, then it is necessary to have protections in place to limit
@@ -131,25 +128,26 @@ and can be implemented in both hosts and routers. By 1994 they were
131128common enough that applications such as FTP (the file transfer
132129protocol) were adapted to work with them.
133130
134- Also in the early 1990s, the Internet was growing quickly enough to make it clear
135- that IP version 4 (IPv4), with 32-bit addresses, would eventually run
136- out of address space. The effort to create a new version of IP, known
137- as IPng (next generation) before being officially labeled as IPv6, had
138- a much larger scope than a simple increase in the address space. There
139- was a sense that this was perhaps the last opportunity to
140- significantly change the IP layer, and thus the time to address
141- perceived shortcomings of the Internet. High on the list of such
142- shortcomings to be addressed was security.
131+ Also in the early 1990s, the Internet was growing quickly enough to
132+ make it clear that IP version 4 (IPv4), with 32-bit addresses, would
133+ eventually run out of address space. The effort to create a new
134+ version of IP, known as IPng (next generation) before being officially
135+ labeled as IPv6, had a much larger scope than a simple increase in the
136+ address space. Among those working on IPv6 requirements, some argued
137+ that this was perhaps the last opportunity to significantly change the
138+ IP layer, and thus the time to address perceived shortcomings of the
139+ Internet. High on the list of such shortcomings to be addressed was
140+ security.
143141
144142The security features that were proposed for IPv6 included headers to
145143support encryption, message integrity and authentication. However, it
146144became clear that such features did not require a new version of IP,
147145only a way to add optional information to the packet
148146header, and so these capabilities also made their way into IPv4. These
149- extensions became known collectively as *IPSEC (IP security) * and are
147+ extensions became known collectively as *IPsec (IP security) * and are
150148described in several dozen RFCs. We discuss them in a later chapter.
151149
152- It is worth noting that, even if IPSEC had
150+ It is worth noting that, even if IPsec had
153151existed in 1988, it would probably have had minimal impact on the
154152spread of the Morris Worm. This is because the worm spread among
155153hosts that were *supposed * to connect to each other (e.g., to exchange
@@ -297,25 +295,25 @@ adversary. Critical systems ranging from healthcare delivery to the
297295power grid are at risk of disruption from various forms of attack.
298296
299297
300- A simple and familiar example of threats and mitigations is the secure use of the web. Suppose
301- you are a customer using a credit card to order an item from a website.
302- An obvious threat is that an adversary could eavesdrop on your network
303- communication, reading your messages to obtain your credit card
304- information. How might that eavesdropping be accomplished? It is trivial
305- on a broadcast network such as an Ethernet or Wi-Fi, where any node can
306- be configured to receive all the message traffic on that network. More
307- elaborate approaches include wiretapping or planting spy software on
308- any of the chain of nodes involved. The insertion of monitoring
309- software might be performed by an operator with physical or
310- remote access to a router (e.g., an employee of an Internet service
311- provider). A vulnerability in the router's software might be exploited
312- by an attacker
313- to gain remote access. And in recent years there have been examples of
314- "supply chain attacks" in which malicious software is inserted in some
315- code, either open source or proprietary, that is subsequently used in
316- another vendor's products. In other words, there are a *lot * of ways
317- that the data in flight from your browser to the website might end up
318- in the hands of an attacker.
298+ A simple and familiar example of threats and mitigations is the secure
299+ use of the web. Suppose you are a customer using a credit card to
300+ order an item from a website. An obvious threat is that an adversary
301+ could eavesdrop on your network communication, reading your messages
302+ to obtain your credit card information. How might that eavesdropping
303+ be accomplished? It is trivial on a broadcast network such as an
304+ Ethernet or Wi-Fi, where any node can be configured to receive all the
305+ message traffic on that network. More elaborate approaches include
306+ wiretapping or planting spy software on any of the chain of nodes
307+ involved. The insertion of monitoring software might be performed by
308+ an operator with physical or remote access to a router (e.g., an
309+ employee of an Internet service provider). A vulnerability in the
310+ router's software might be exploited by an attacker to gain remote
311+ access. And in recent years there have been examples of "supply chain
312+ attacks" in which malicious software is inserted in some code, either
313+ open source or proprietary, that is subsequently used in another
314+ vendor's products. In other words, there are a *lot * of ways that the
315+ data in flight from your browser to the website might end up in the
316+ hands of an attacker.
319317
320318While various steps can be taken to secure the devices along the path
321319traveled by your data, it is relatively straightforward today to
0 commit comments