[rbridge] Threat and security analysis?
touch at isi.edu
Fri May 28 08:18:50 PDT 2010
Jukka Manner wrote:
> I was wondering, has anyone done a detailed analysis of the threats
> associated with deploying and using TRILL? All the WG documens basically
> just go around the topic by comparing and refering to other similar
> technologies and saying that TRILL should not be worse.
While I realize that such analyses are currently popular, what exactly
is worth stating beyond "we're not worse than Ethernet"? Does that need
to be shown in detail, e.g., in regards to the protocols/mechanisms we add:
which we now depend on, rather than STP
- edge label tables
which should have the same issues as ARP
It would be useful to point us to a similar threat analysis of Ethernet
to build upon, but the key question I would have is:
what do you expect in this doc that isn't already in
the Security Considerations of the RFCs?
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 195 bytes
Desc: OpenPGP digital signature
Url : http://mailman.postel.org/pipermail/rbridge/attachments/20100528/6a60d8dd/signature.bin
More information about the rbridge