Re: [dtn-security] Re(2): Re(2): Re(2): Is there a "secure" reference implementation of the DTN stack?

"Ivancic, William D. (GRC-RHN0)" <william.d.ivancic@nasa.gov> Fri, 10 July 2009 12:58 UTC

Received: from ndjsnpf02.ndc.nasa.gov (ndjsnpf02.ndc.nasa.gov [198.117.1.122]) by maillists.intel-research.net (8.13.8/8.13.8) with ESMTP id n6ACwgfq032740 for <dtn-security@maillists.intel-research.net>; Fri, 10 Jul 2009 05:58:43 -0700
Received: from ndjsppt02.ndc.nasa.gov (ndjsppt02.ndc.nasa.gov [198.117.1.101]) by ndjsnpf02.ndc.nasa.gov (Postfix) with ESMTP id 59395A840B; Fri, 10 Jul 2009 07:57:46 -0500 (CDT)
Received: from ndjshub03.ndc.nasa.gov (ndjshub03.ndc.nasa.gov [198.117.4.162]) by ndjsppt02.ndc.nasa.gov (8.14.3/8.14.3) with ESMTP id n6ACvkpH012474; Fri, 10 Jul 2009 07:57:46 -0500
Received: from NDJSSCC03.ndc.nasa.gov ([198.117.4.170]) by ndjshub03.ndc.nasa.gov ([198.117.4.162]) with mapi; Fri, 10 Jul 2009 07:57:46 -0500
From: "Ivancic, William D. (GRC-RHN0)" <william.d.ivancic@nasa.gov>
To: Peter Lovell <plovell@mac.com>, "Graham Keellings (Leonix Solutions Pte Ltd)" <Graham@leonixsolutions.com>
Date: Fri, 10 Jul 2009 07:57:37 -0500
Thread-Topic: [dtn-security] Re(2): Re(2): Re(2): Is there a "secure" reference implementation of the DTN stack?
Thread-Index: AcoBWCAe/3WnkmYMRjGj5vz8dXWOrAABUtQg
Message-ID: <3A5AA67A8B120B48825BFFCF5443856137E3ACCE99@NDJSSCC03.ndc.nasa.gov>
References: <89E48AE60E64EF4E8EB32B0B7EC74920A1B0F5@EVS-EC1-NODE2.surrey.ac.uk> <4A12195A.6000207@LeonixSolutions.com> <3A5AA67A8B120B48825BFFCF5443856137E0B06196@NDJSSCC03.ndc.nasa.gov> <4A1DD73F.50000@bbn.com> <023601c9df2a$694fd5b0$3bef8110$@com> <4A2DF7FD.5020104@LeonixSolutions.com> <3A5AA67A8B120B48825BFFCF5443856137E3553C4B@NDJSSCC03.ndc.nasa.gov> <029d01c9e925$1e354880$5a9fd980$@com> <4A46C257.3040006@LeonixSolutions.com> <20090628050243.1566215671@smtp.mac.com> <4A46FBB2.3080205@LeonixSolutions.com> <20090628052255.640550503@smtp.mac.com> <4A470CD7.4010502@LeonixSolutions.com> <20090628141313.1532044204@smtp.mac.com> <4A4878A6.7010707@LeonixSolutions.com> <20090629123400.1726285002@smtp.mac.com> <4A56D108.9050303@LeonixSolutions.com> <20090710113509.2057557181@smtp.mac.com>
In-Reply-To: <20090710113509.2057557181@smtp.mac.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
X-Proofpoint-Virus-Version: vendor=fsecure engine=1.12.7400:2.4.4, 1.2.40, 4.0.166 definitions=2009-07-10_09:2009-07-03, 2009-07-10, 2009-07-10 signatures=0
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by maillists.intel-research.net id n6ACwgfq032740
Cc: "dtn-security@maillists.intel-research.net" <dtn-security@maillists.intel-research.net>
Subject: Re: [dtn-security] Re(2): Re(2): Re(2): Is there a "secure" reference implementation of the DTN stack?
X-BeenThere: dtn-security@maillists.intel-research.net
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: DTN Security Discussion <dtn-security.maillists.intel-research.net>
List-Unsubscribe: <http://maillists.intel-research.net/mailman/listinfo/dtn-security>, <mailto:dtn-security-request@maillists.intel-research.net?subject=unsubscribe>
List-Archive: <http://maillists.intel-research.net/pipermail/dtn-security>
List-Post: <mailto:dtn-security@maillists.intel-research.net>
List-Help: <mailto:dtn-security-request@maillists.intel-research.net?subject=help>
List-Subscribe: <http://maillists.intel-research.net/mailman/listinfo/dtn-security>, <mailto:dtn-security-request@maillists.intel-research.net?subject=subscribe>
X-List-Received-Date: Fri, 10 Jul 2009 12:58:43 -0000

There appear to be so many ways to put security together with bundles that interoperability will be interesting.

Pictures would help greatly, but internet drafts and pictures as complex as those needed to show what parts of bundles are included in the crypto algorithms and what parts might change and are therefore not include are too complex for Ascii art.

If someone had some funding to provide to a student or entry level engineer, perhaps they could create such diagrams and put them on the DTNRG wiki (once blessed).

/Will

******************************

>-----Original Message-----
>From: dtn-security-bounces@maillists.intel-research.net [mailto:dtn-
>security-bounces@maillists.intel-research.net] On Behalf Of Peter Lovell
>Sent: Friday, July 10, 2009 7:35 AM
>To: Graham Keellings (Leonix Solutions Pte Ltd)
>Cc: dtn-security@maillists.intel-research.net
>Subject: [dtn-security] Re(2): Re(2): Re(2): Is there a "secure"
>reference implementation of the DTN stack?
>
>On Fri, Jul 10, 2009, Graham Keellings (Leonix Solutions Pte Ltd)
><Graham@LeonixSolutions.com> wrote:
>
>>Peter Lovell wrote:
>>> Hi Graham,
>>>
>>> the best document at this time is the Bundle Security Protocol
>>> Specification, available at <http://tools.ietf.org/id/draft-irtf-
>dtnrg-
>>> bundle-security-08.txt>
>>>
>>wow, that did take some reading (and I doubt that I truly understood
>>half of it ;-)
>>
>>Is there no similar document which covers the whole system, describing
>>security measures at each layer, or each stage of the transaction?
>>
>
>
>Hi Graham,
>
>at the moment that is as good as it gets.
>
>Maybe I should write a "BSP for Dummies" book (I assume that you're
>familiar with that series)  :)
>
>Cheers.....Peter
>
>_______________________________________________
>dtn-security mailing list
>dtn-security@maillists.intel-research.net
>http://maillists.intel-research.net/mailman/listinfo/dtn-security