[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

ULE Security Requirements : NiTs on text



Dear authors,

I have the following NiTs/Comments on the text.

Best wishes,

Gorry


----
Page 7:
/(e.g. by an Encapsulation Gateway) or other device to/
/(e.g. by an Encapsulation Gateway or other device) to/
                                                  ^
--
/these messages are broadcasted/
                             ^^
/these messages are broadcast/
---
/is out of scope for ULE security/
--  [ID.ule.ext] describes a method where they could be encapsulated using
ULE, allowing ULE security methods to also be used in these cases.
----
/eliminates the need to consider/
-- Well you do need to consider them in this document, but securing these
elements is an orthogonal issue...
---
/ The PID associated with an Elementary Stream can be modified /
/ The PID associated with an Elementary Stream can therefore be modified/
                                                   ^^^^^^^^^
---
/a passive threat. It includes/
/a passive threat. This includes/
                   ^^^^
----
Section 3.2
-- perhaps a forward pointer to a later section that ³masquerading and
modification² are more difficult on a specific link, than they are in the
general internet, and will be described more in section 3.
----

/defines services for Internet Protocol (IP)/
/defines services for the Internet Protocol (IP)/
                      ^^^
---
/There is an extra overheads associated /
/There is an extra transmission overhead associated /
                   ^^^^^^^^^^^^^^^^^^^^^^
- is this what is meant?
---
At the end of section 5, I would also like to say that any defined method
must also be capable of operating with ULE extension headers - specifically
it should allow encryption of a compressed SNDU payload...
---
/   This method does not preclude the use of IPsec at L3 (or TLS [RFC4346]
at L4)./
 - True, but I would have preferred to be stronger and continued further to
state that IPsec and TLS can provide strong authentication
of the end-points in the communication. This authentication is desirable in
many scenarios to ensure the information the information
is being exchanged between the correct trusted entities. Layer 2 methods can
not provide this guarantee.

- I¹d also prefer to break the final para into two,the  re-use of
established techniques is desirable, but distinct from the advantages of
 IPsec/TLS, etc.

----
/ 2 NPA address. In broadcast networks this can /
/ 2 NPA address. In broadcast networks this protection can /
                                            ^^^^^^^^^^
---
/Case 2 is likely to a lesser degree within certain network configurations./
- Can you provide one of two concrete examples?
/Therefore case  3 is not considered further in this document. /
- Is it therefore assumed that the MPEG-2 transmission equipment
(multiplexors, etc) are secure? I think this was suggested on the list?

---