How Not To Write About Network Security – And I'm Speaking From Experience
Systems Approach In 1996, Larry Peterson and I published the first edition of Computer Networks: A Systems Approach in the hope that it would become a widely adopted textbook in networking classes. Our draft manuscripts had been reviewed by a number of professors so we had a decent amount of feedback regarding the content and overall structure of the book.
But once the book was out in the world and the sales team at our publisher Morgan Kaufmann were given the task of driving course adoptions, we started to get a much greater volume of feedback.
Opinion was divided about the value of including the x-kernel as an instructional tool. Most people liked the fact that real, running code was included in the book to illustrate many networking concepts, which was central to our claim to having taken a systems approach to the field. However, many instructors also felt that the startup cost to get students using a very niche research operating system was too high. The x-kernel would move to an online appendix in the second edition.
The most consistent piece of feedback was not about the x-kernel, however, but about our total failure to include security in the first edition.
There were a few reasons for this, including our lack of specific expertise in security and the fact that security had long been something of an afterthought in networking – just ask Vint Cerf, who has over the years given various reasons why the internet had little to no security baked in when it was developed. So we set about filling that gap in the second edition.
The way I recall learning about security was from attending IETF meetings in the early-mid 1990s. (In retrospect this is a poor way to learn about almost anything other than the standards process.) The IETF was in the midst of defining the requirements for “IP Next Generation (IPng)” or what would become IPv6. (Thirty years later IPv6 is, er, well on its way to widespread adoption.) For example, noted security expert Steve Bellovin in 1994 contributed RFC 1675 to the IPng process, which contains the following:
and:
The “starting to experiment” comment is telling: The first IPSEC protocols would appear in RFCs a year later than Bellovin’s document. And firewalls were in the category (not yet named) of middle boxes, which many internet people wished would go away, since they seemed to violate the end-to-end arguments [PDF] on which TCP/IP was based. Bellovin in the quote above is displaying the same realism (and forward thinking) that Paul Francis advocated in his 1995 talk on NAT.
A related memory that I have from this time is that IPng was viewed as a once-in-a-lifetime opportunity to “fix” much that was wrong with IPv4. The list of things to fix was long, headed by the address space but included a laundry list of items such as confidentiality, authentication, mobility support, plug-and-play configuration, and so on.
Interestingly, as each of these issues was addressed in IPng, the equivalent capability was invariably developed for IPv4. Thus, while IPng added headers for encryption (to support confidentiality), message integrity and authentication, the same capabilities were being developed for IPv4.
Expertise
The key problem with my approach to learning about network security via IETF meetings was that I got a very bottom-up view: You learn about specific mechanisms when you hear people proposing them for standardization (and read the drafts and RFCs), but there is very little architectural discussion. This was deliberate, with the IETF having been split out from the Internet Architecture Board in 1992. So when I look back now on the security chapter we produced for the second edition, I see a lot of mechanisms and not much systems thinking.
On top of that, I was definitely not a security expert by any stretch, and nor was my co-author Larry, and while I have learned a lot more about security since then, I still don’t think you can claim security expertise unless you’ve really worked in the field for a long time.
There is a whole style of thinking that’s required in security to put yourself in the shoes of the attacker, who needs to find only one flaw, or perhaps a cascading collection of flaws, in your system to render it insecure.
I also made one pretty serious mistake (in describing message authentication codes) that was picked up by a reader soon after the second edition went into print. We were fortunately able to correct it in the next printing, but it’s embarrassing to publish errors that are easily spotted by an expert reader.
- Why securing East-West network traffic is so important – and how it can be done
- For those with zero trust in zero-trust networks, this industry alliance may help
- US cybersecurity chief: Software makers shouldn't lawyer their way out of security responsibilities
- Pushers of insecure software in Biden's crosshairs
All of this brings me to our current project, which is a book with the working title of Network Security: A Systems Approach. In a similar vein to our book on TCP Congestion Control, our starting point is the relevant chapter of our big textbook. But compared to TCP congestion control, we’re dealing with a chapter where we are less expert, and honestly I’d say that I can see plenty of room for improvement in the existing chapter.
Sure, we have had four editions in which to improve the chapter already but there’s always so much competing for our attention when we do a complete textbook revision.
The nice thing about tackling this subject as a standalone project is that it will have our full attention. Also, recognizing our relative lack of expertise, we’ll be getting help from a few actual security experts this time. Brad Karp, who teaches a course on Distributed Systems and Security at University College London in the UK, has agreed to help us get our story straight. (He fixed some bugs in this piece, too.)
One thing I appreciate much more now than I did when writing our second edition is how much security is a systems story.
Partly I think this is related to my prior point about how an attacker only needs to find one flaw. So you can’t just go and optimize individual components and then assemble them. There are systems principles to follow, such as the principle of least privilege (which would take another article to fully explain).
The original end-to-end argument uses a security example to illustrate a systems principle. And security has performance implications; addressing them requires a systems approach, as illustrated in the cross-layer design of QUIC, for example. So my hope is that, in our new book, we will more successfully apply the systems lens to the problems of network security, and perhaps, with the benefit of external help and 25 more years of experience, we can make fewer mistakes as well. ®
Larry Peterson and Bruce Davie are the authors behind Computer Networks: A Systems Approach and the related Systems Approach series of books. All their content is open source and available for free on GitHub. You can find them on Mastodon, their newsletter right here, and past The Register columns here.
From Chip War To Cloud War: The Next Frontier In Global Tech Competition
The global chip war, characterized by intense competition among nations and corporations for supremacy in semiconductor ... Read more
The High Stakes Of Tech Regulation: Security Risks And Market Dynamics
The influence of tech giants in the global economy continues to grow, raising crucial questions about how to balance sec... Read more
The Tyranny Of Instagram Interiors: Why It's Time To Break Free From Algorithm-Driven Aesthetics
Instagram has become a dominant force in shaping interior design trends, offering a seemingly endless stream of inspirat... Read more
The Data Crunch In AI: Strategies For Sustainability
Exploring solutions to the imminent exhaustion of internet data for AI training.As the artificial intelligence (AI) indu... Read more
Google Abandons Four-Year Effort To Remove Cookies From Chrome Browser
After four years of dedicated effort, Google has decided to abandon its plan to remove third-party cookies from its Chro... Read more
LinkedIn Embraces AI And Gamification To Drive User Engagement And Revenue
In an effort to tackle slowing revenue growth and enhance user engagement, LinkedIn is turning to artificial intelligenc... Read more