Skip to content

Commit f6888b7

Browse files
committed
originality -> freshness; formatting of citations
1 parent 4622484 commit f6888b7

File tree

7 files changed

+35
-38
lines changed

7 files changed

+35
-38
lines changed

authentication.rst

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -15,15 +15,16 @@ could be replayed, appearing to the website as though you had ordered
1515
more of the same. Even though it wasn’t the original incarnation of
1616
the message, its authentication code would still be valid; after all,
1717
the message was created by you, and it wasn’t modified. Clearly, we
18-
need a solution that ensures *originality*.
18+
need a solution that ensures *freshness*.
1919

2020
In a variation of this attack called a *suppress-replay attack*, an
2121
adversary might merely delay your message (by intercepting and later
2222
replaying it), so that it is received at a time when it is no longer
2323
appropriate. For example, an adversary could delay your order to buy
2424
stock from an auspicious time to a time when you would not have wanted
25-
to buy. Although this message would in a sense be the original, it
26-
wouldn’t be timely. So we also need to ensure *timeliness*. Originality
25+
to buy. Although this message would in a sense be fresh (it hasn't
26+
been sent before), it
27+
wouldn’t be timely. So we also need to ensure *timeliness*. Freshness
2728
and timeliness may be considered aspects of integrity. Ensuring them
2829
will in most cases require a nontrivial, back-and-forth protocol.
2930

@@ -32,7 +33,7 @@ key. A session key is a secret-key cipher key generated on the fly and
3233
used for just one session. This too involves a nontrivial protocol.
3334

3435
What these two issues have in common is authentication. If a message is
35-
not original and timely, then from a practical standpoint we want to
36+
not fresh and timely, then from a practical standpoint we want to
3637
consider it as not being authentic, i.e., not being from whom it claims to be.
3738
And, obviously, when you are arranging to share a new session key with
3839
someone, you want to know you are sharing it with the right person.
@@ -47,15 +48,15 @@ Diffie-Hellman key exchange in its simplest form does not provide
4748
authentication, but in practical usage it is almost always combined
4849
with an authentication protocol.
4950

50-
There is a core set of techniques used to ensure originality and
51+
There is a core set of techniques used to ensure freshness and
5152
timeliness in authentication protocols. We describe those techniques
5253
before moving on to particular protocols.
5354

54-
5.1 Originality and Timeliness Techniques
55+
5.1 Freshness and Timeliness Techniques
5556
-------------------------------------------
5657

5758
We have seen that authentication codes alone do not enable us to detect
58-
messages that are not original or timely. One approach is to include a
59+
messages that are not fresh or timely. One approach is to include a
5960
timestamp in the message. Obviously the timestamp itself must be
6061
tamperproof, so it must be covered by the message authentication code. The primary
6162
drawback to timestamps is that they require distributed clock

firewall.rst

Lines changed: 6 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -422,8 +422,8 @@ we recommend our companion book on software-defined networks.
422422
.. admonition:: Further Reading
423423

424424
L. Peterson, C. Cascone, B. O’Connor, T. Vachuska,
425-
and B. Davie. `Software-Defined Networks: A Systems
426-
Approach <https://sdn.systemsapproach.org>`__.
425+
and B. Davie. `Software-Defined Networks: A Systems
426+
Approach <https://sdn.systemsapproach.org>`__.
427427

428428
9.4 Zero Trust Security
429429
-------------------------
@@ -545,17 +545,13 @@ and authorization” although it's less memorable.
545545
.. admonition:: Further Reading
546546

547547
S. Rose, O. Borchert, S. Mitchell, S. Connelly. `Zero Trust
548-
Architecture
549-
<https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-207.pdf>`__. NIST, 2020.
548+
Architecture <https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-207.pdf>`__. NIST, 2020.
550549

551-
C. Cunningham. `A Look Back At Zero Trust: Never Trust, Always
552-
Verify
553-
<https://www.forrester.com/blogs/a-look-back-at-zero-trust-never-trust-always-verify/>`__. Forrester, 2020.
550+
C. Cunningham. `A Look Back At Zero Trust: Never Trust, Always Verify
551+
<https://www.forrester.com/blogs/a-look-back-at-zero-trust-never-trust-always-verify/>`__. Forrester, 2020.
554552

555553
R. Ward and B. Beyer. `BeyondCorp: A New Approach to Enterprise
556-
Security
557-
<https://www.usenix.org/system/files/login/articles/login_dec14_02_ward.pdf>`__.
558-
;login:, Usenix, 2014.
554+
Security <https://www.usenix.org/system/files/login/articles/login_dec14_02_ward.pdf>`__. ;login:, Usenix, 2014.
559555

560556
9.5. Intrusion Detection and Prevention
561557
--------------------------------------------

infra.rst

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -108,13 +108,13 @@ more difficult to address.
108108
.. _reading_threat:
109109
.. admonition:: Further Reading
110110

111-
G. Huston. `A Survey on Securing Inter-Domain Routing Part 1 –
112-
BGP: Design, Threats and Security Requirements
113-
<https://labs.apnic.net/index.php/2021/08/03/a-survey-on-securing-inter-domain-routing-part-1-bgp-design-threats-and-security-requirements/>`__.
111+
S. Murphy. `BGP Security Vulnerabilitiess
112+
Analysis <https://www.rfc-editor.org/info/rfc4272>`__. RFC 4272, January 2006.
113+
114+
G. Huston. `A Survey on Securing Inter-Domain Routing Part 1.
115+
BGP: Design, Threats and Security Requirements <https://labs.apnic.net/index.php/2021/08/03/a-survey-on-securing-inter-domain-routing-part-1-bgp-design-threats-and-security-requirements/>`__.
114116
APNIC Blog, August 2021.
115117

116-
S. Murphy. `BGP Security Vulnerabilities Analysis <https://www.rfc-editor.org/info/rfc4272>`__. RFC 4272, 2006.
117-
118118
L. Peterson and B. Davie. `Computer Networks: A Systems Approach. Interdomain
119119
Routing <https://book.systemsapproach.org/scaling/global.html#interdomain-routing-bgp>`__.
120120

intro.rst

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -255,8 +255,8 @@ applicable to system security.
255255

256256
.. admonition:: Further Reading
257257

258-
B. Schneier. Beyond Fear: Thinking Sensibly About Security in an
259-
Uncertain World. Copernicus Books, 2003.
258+
B. Schneier. Beyond Fear: Thinking Sensibly About Security in an
259+
Uncertain World. Copernicus Books, 2003.
260260

261261
It is also important to recognize that threats and trust are two sides
262262
of the same coin. A threat is a potential failure scenario that you
@@ -397,8 +397,8 @@ challenge. Security is easiest when the answer is always "no".
397397

398398
.. admonition:: Further Reading
399399

400-
J. Saltzer and F. Kaashoek. `Principles of Computer System Design: An
401-
Introduction. Chapter 11
402-
<https://ocw.mit.edu/courses/res-6-004-principles-of-computer-system-design-an-introduction-spring-2009/pages/online-textbook/>`__. Morgan
403-
Kaufmann Publishers, 2009.
400+
J. Saltzer and F. Kaashoek. `Principles of Computer System Design: An
401+
Introduction. Chapter 11
402+
<https://ocw.mit.edu/courses/res-6-004-principles-of-computer-system-design-an-introduction-spring-2009/pages/online-textbook/>`__. Morgan
403+
Kaufmann Publishers, 2009.
404404

key-distro.rst

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -308,9 +308,9 @@ revocation can be found in the blog post below.
308308
.. admonition:: Further Reading
309309

310310
J. Schank. `CRLite: Fast, private, and comprehensive certificate
311-
revocation checking in Firefox
312-
<https://hacks.mozilla.org/2025/08/crlite-fast-private-and-comprehensive-certificate-revocation-checking-in-firefox/>`__. Mozilla
313-
blog, August 2025.
311+
revocation checking in Firefox
312+
<https://hacks.mozilla.org/2025/08/crlite-fast-private-and-comprehensive-certificate-revocation-checking-in-firefox/>`__. Mozilla
313+
blog, August 2025.
314314

315315
4.2 Distribution of Secret Keys
316316
------------------------------------

principles.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ whom we wish to communicate? Or how does a banking system know that
5656
the person behind a particular HTTP request is actually the account
5757
holder?
5858

59-
Integrity also requires messages be *original* and *timely*, which is
59+
Integrity also requires messages be *fresh* and *timely*, which is
6060
threatened by the possibility data is captured and then retransmitted
6161
at some later time. This is known as a *replay attack*, where for
6262
example, we want to protect against an attacker repeatedly adding an

systems.rst

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -98,7 +98,7 @@ the need for any prior message exchange (and sidestepping some of the
9898
complexities described in the earlier chapter). Alice’s digital
9999
signature suffices to authenticate her. Although there is no proof
100100
that the message is timely, legitimate email isn’t guaranteed to be
101-
timely either. There is also no proof that the message is original,
101+
timely either. There is also no proof that the message is fresh,
102102
but Bob is an email user and probably a fault-tolerant human who can
103103
recover from duplicate emails (which, again, are not out of the
104104
question under normal operation anyway). Alice can be sure that only
@@ -292,7 +292,7 @@ three degrees of freedom. First, it is highly modular, allowing users
292292
(or more likely, system administrators) to select from a variety of
293293
cryptographic algorithms and specialized security protocols. Second,
294294
IPsec allows users to select from a large menu of security properties,
295-
including access control, integrity, authentication, originality, and
295+
including access control, integrity, authentication, freshness, and
296296
confidentiality. Third, IPsec can be used to protect narrow streams
297297
(e.g., packets belonging to a particular TCP connection being sent
298298
between a pair of hosts) or wide streams (e.g., all packets flowing
@@ -479,8 +479,8 @@ you to the paper.
479479
.. admonition:: Further Reading
480480

481481
J. Donenfeld. `WireGuard: Next Generation Kernel Network Tunnel
482-
<https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/WireGuard-next-generation-kernel-network-tunnel/>`__.
483-
NDSS, 2017.
482+
<https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/WireGuard-next-generation-kernel-network-tunnel/>`__.
483+
NDSS, 2017.
484484

485485
One of these types of tunnels plus a gateway or concentrator to
486486
terminate them is pretty much all that is needed to deliver a remote
@@ -646,7 +646,7 @@ networking, a topic we discuss in chapter 9.
646646
.. admonition:: Further Reading
647647

648648
A. Pennarun. `How Tailscale Works <https://tailscale.com/blog/how-tailscale-works>`__.
649-
Tailscale blog, 2020.
649+
Tailscale blog, 2020.
650650

651651

652652
7.5 Web Authentication and Passkeys
@@ -957,7 +957,7 @@ a companion book.
957957
.. admonition:: Further Reading
958958

959959
L. Peterson, O. Sunay, and B. Davie. `Private 5G: A Systems
960-
Approach. <https://5g.systemsapproach.org>`__.
960+
Approach. <https://5g.systemsapproach.org>`__.
961961

962962
Assuming the AMF recognizes the IMSI, it initiates an authentication
963963
protocol with the device. There are a set of options for

0 commit comments

Comments
 (0)