Skip to content

Commit d83634b

Browse files
committed
initial pass
1 parent 043f9de commit d83634b

File tree

1 file changed

+25
-5
lines changed

1 file changed

+25
-5
lines changed

intro.rst

Lines changed: 25 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -146,11 +146,11 @@ became clear that such features did not require a new version of IP,
146146
only a way to add optional information to the packet
147147
header, and so these capabilities also made their way into IPv4. These
148148
extensions became known collectively as IPSEC (IP security) and are
149-
described in several dozen RFCs. We will discuss them in a later chapter.
149+
described in several dozen RFCs. We discuss them in a later chapter.
150150

151151
It is worth noting that, even if IPSEC had
152152
existed in 1988, it would probably have had minimal impact on the
153-
spread of the Morris Worm, because the worm spread among
153+
spread of the Morris Worm. This is because the worm spread among
154154
hosts that were *supposed* to connect to each other (e.g., to exchange
155155
email using the sendmail program). Encrypting and authenticating traffic
156156
between hosts doesn't prevent the spread of malware
@@ -170,7 +170,7 @@ such piece of infrastructure is the domain name system (DNS). DNS
170170
replaced static hostname-to-address mapping files in the 1980s and subsequently
171171
become critical to the operation of the Internet. Clearly the
172172
information served up by DNS needs to be robust against manipulation
173-
by adversaries, and hence there has been a multi-decade effort to add
173+
by adversaries, and hence, there has been a multi-decade effort to add
174174
security to the DNS. The fact that this continues to roll on
175175
illustrates some of the challenges in making incremental updates to
176176
the distributed infrastructure of the Internet.
@@ -217,7 +217,7 @@ It is common to talk about security as a "negative goal". That is, we
217217
are trying to ensure that a set of undesirable things cannot
218218
happen. That set of undesirable things is large, making security
219219
particularly challenging. Over the years, a number of principles have
220-
been developed to try to manage this challenging landscape; we will
220+
been developed to help manage this challenging landscape; we will
221221
consider many of them in subsequent chapters.
222222

223223
Noted security expert Bruce Schneier points out in his book
@@ -257,6 +257,21 @@ applicable to system security.
257257
B. Schneier. Beyond Fear: Thinking Sensibly About Security in an
258258
Uncertain World. Copernicus Books, 2003.
259259

260+
Finally, it is important to recognize that trust and threats are two
261+
sides of the same coin. A threat is a potential failure scenario that
262+
you design your system to avoid, and trust is an assumption you make
263+
about how external actors and internal components you build upon will
264+
behave. For example, if you plan to transmit messages over Wi-Fi on an
265+
open campus, you would likely identify an eavesdropper that can
266+
intercept messages as a threat (and adopt some of the methods
267+
discussed in this book as a countermeasure). But if you are planning
268+
to transmit messages over a fiber link between two machines in a
269+
locked datacenter, you might trust that channel is secure, and so take
270+
no additional steps. Every system makes trust assumptions. The key is
271+
to be as explicit as possible about those assumptions, because they
272+
may change over time.
273+
274+
260275

261276
1.3 Threats to Network Security
262277
-------------------------------
@@ -352,7 +367,12 @@ to inflict further harm, such as launching DoS attacks.
352367
We will look further into these various classes of threats and the
353368
measures developed to mitigate them in the following chapters. For a
354369
solid introduction to system security we recommend the chapter below
355-
from Saltzer and Kaashoek.
370+
from Saltzer and Kaashoek. Their perspective is grounded in Operating
371+
System (OS) design, which is the context for much of the foundational
372+
work in security. In that setting, finding the right balance between
373+
sharing (so users can access each other's files) and security (so you
374+
can keep users from accessing your private data) is a central
375+
challenge. Security is easiest when the answer is always "no".
356376

357377

358378
.. admonition:: Further Reading

0 commit comments

Comments
 (0)