isoc panel at ietf 90 - internet security and privacy: ten years later
DESCRIPTION
How have Internet security and privacy landscapes changed since the Internet’s inception? What challenges do we still need to address, and will we still be using the same building blocks (TLS, DNSSEC, etc.) ten years from now? If not, what’s next? Andrei Robachevsky moderated the panel, as four distinguished experts discussed the nature of Internet security and its evolution. The speakers were: • Lucy Lynch • Danny McPherson • Dave Oran • Wendy SeltzerTRANSCRIPT
![Page 1: ISOC Panel at IETF 90 - Internet Security and Privacy: Ten years later](https://reader034.vdocuments.us/reader034/viewer/2022042607/5598ecc41a28ab74118b4676/html5/thumbnails/1.jpg)
www.internetsociety.org
Internet Security and Privacy:Ten years later
Andrei Robachevsky, moderator.
The Internet Society
1
![Page 2: ISOC Panel at IETF 90 - Internet Security and Privacy: Ten years later](https://reader034.vdocuments.us/reader034/viewer/2022042607/5598ecc41a28ab74118b4676/html5/thumbnails/2.jpg)
The Internet Society
We are…
2
Not at the IETF
Taking discussion up a level
Taking any identified work items to the appropriate IETF WGs
“On the air”
Streaming
Recording
Stopping at 12:45pm so you can all get back to the IETF…
![Page 3: ISOC Panel at IETF 90 - Internet Security and Privacy: Ten years later](https://reader034.vdocuments.us/reader034/viewer/2022042607/5598ecc41a28ab74118b4676/html5/thumbnails/3.jpg)
The Internet Society
Agenda outline
3
Introduction
Framing discussion
Open mic
![Page 4: ISOC Panel at IETF 90 - Internet Security and Privacy: Ten years later](https://reader034.vdocuments.us/reader034/viewer/2022042607/5598ecc41a28ab74118b4676/html5/thumbnails/4.jpg)
The Internet Society
The Panel
Andrei Robachevsky (Moderator)
Lucy Lynch (Internet Society)
Danny McPherson (Verisign)
Dave Oran (Cisco)
Wendy Seltzer (W3C)
![Page 5: ISOC Panel at IETF 90 - Internet Security and Privacy: Ten years later](https://reader034.vdocuments.us/reader034/viewer/2022042607/5598ecc41a28ab74118b4676/html5/thumbnails/5.jpg)
The Internet Society
Today’s discussion
Ten years later – a random point in the future
No magic – just extrapolation
A checkpoint – are we in a good shape?
The Internet is changing
And Security and Privacy are changing with it
How are our approaches change?
Main threats and critical elements
Our focus today is tomorrow’s security and privacy
5
![Page 6: ISOC Panel at IETF 90 - Internet Security and Privacy: Ten years later](https://reader034.vdocuments.us/reader034/viewer/2022042607/5598ecc41a28ab74118b4676/html5/thumbnails/6.jpg)
The Internet Society
Facets of Evolution: the edge
6
![Page 7: ISOC Panel at IETF 90 - Internet Security and Privacy: Ten years later](https://reader034.vdocuments.us/reader034/viewer/2022042607/5598ecc41a28ab74118b4676/html5/thumbnails/7.jpg)
The Internet Society
Facets of Evolution: the edge
7
![Page 8: ISOC Panel at IETF 90 - Internet Security and Privacy: Ten years later](https://reader034.vdocuments.us/reader034/viewer/2022042607/5598ecc41a28ab74118b4676/html5/thumbnails/8.jpg)
The Internet Society
Facets of Evolution: the edge
8
![Page 9: ISOC Panel at IETF 90 - Internet Security and Privacy: Ten years later](https://reader034.vdocuments.us/reader034/viewer/2022042607/5598ecc41a28ab74118b4676/html5/thumbnails/9.jpg)
The Internet Society
Facets of Evolution: the edge
9
![Page 10: ISOC Panel at IETF 90 - Internet Security and Privacy: Ten years later](https://reader034.vdocuments.us/reader034/viewer/2022042607/5598ecc41a28ab74118b4676/html5/thumbnails/10.jpg)
The Internet Society
Facets of Evolution: locality
10
![Page 11: ISOC Panel at IETF 90 - Internet Security and Privacy: Ten years later](https://reader034.vdocuments.us/reader034/viewer/2022042607/5598ecc41a28ab74118b4676/html5/thumbnails/11.jpg)
The Internet Society
Facets of Evolution: threats and attacks
11
![Page 12: ISOC Panel at IETF 90 - Internet Security and Privacy: Ten years later](https://reader034.vdocuments.us/reader034/viewer/2022042607/5598ecc41a28ab74118b4676/html5/thumbnails/12.jpg)
The Internet Society
Security of elements –Security of the ecosystem
12
?
Technology
Coffee
People
Money
![Page 13: ISOC Panel at IETF 90 - Internet Security and Privacy: Ten years later](https://reader034.vdocuments.us/reader034/viewer/2022042607/5598ecc41a28ab74118b4676/html5/thumbnails/13.jpg)
The Internet Society
Trade-offs, cooperation and dependencies
13
Security
Privacy
Ops
Regulation
Anonymity
Authenticity
Integrity
Availability
Cooperation
![Page 14: ISOC Panel at IETF 90 - Internet Security and Privacy: Ten years later](https://reader034.vdocuments.us/reader034/viewer/2022042607/5598ecc41a28ab74118b4676/html5/thumbnails/14.jpg)
The Internet Society
Ten years from now – what do we want to know?
14
What are the critical elements that will shape the state of security and privacy in ten years?
![Page 15: ISOC Panel at IETF 90 - Internet Security and Privacy: Ten years later](https://reader034.vdocuments.us/reader034/viewer/2022042607/5598ecc41a28ab74118b4676/html5/thumbnails/15.jpg)
The Internet Society
What are the critical elements that will shape the state of security and privacy in ten years?
Ten years from now – what do we want to know?
15
![Page 16: ISOC Panel at IETF 90 - Internet Security and Privacy: Ten years later](https://reader034.vdocuments.us/reader034/viewer/2022042607/5598ecc41a28ab74118b4676/html5/thumbnails/16.jpg)
The Internet Society
Seeds of future security and privacy
What unconventional or new approaches we see that have potential for solution of future problems?
Ten years from now – what do we want to know?
16
![Page 17: ISOC Panel at IETF 90 - Internet Security and Privacy: Ten years later](https://reader034.vdocuments.us/reader034/viewer/2022042607/5598ecc41a28ab74118b4676/html5/thumbnails/17.jpg)
The Internet Society
ICN – Internet Security Savior?
Content security replaces channel security
Cryptographic Integrity built in a fundamental level Provenance and origin authentication too Encryption layered on top (application function)
Source anonymity (no source addresses) But content names are visible (since they are used for routing)
Most attack vectors in IP mapped to a small set of DoS vectors (all flooding related)
No magic Trust management unsolved Business models still often depend on abandoning privacy
![Page 18: ISOC Panel at IETF 90 - Internet Security and Privacy: Ten years later](https://reader034.vdocuments.us/reader034/viewer/2022042607/5598ecc41a28ab74118b4676/html5/thumbnails/18.jpg)
The Internet Society
New Crypto – Internet Security Saviour?
Functional Encryption and its family of Homomorphic transforms allows computation on encrypted data
General functions are about 14 orders of magnitude too slow
Restricted functions (like boolean expressions) about 7 orders of magnitude too slow
Some useful things (equality, range testing) actually practical now but very expensive- e.g. CryptDB
Privacy-preserving query systems Can perform queries against databases without leaking
information
![Page 19: ISOC Panel at IETF 90 - Internet Security and Privacy: Ten years later](https://reader034.vdocuments.us/reader034/viewer/2022042607/5598ecc41a28ab74118b4676/html5/thumbnails/19.jpg)
The Internet Society
Security and Privacy - a tussle or a cooperation?
As the Internet evolves will they become more antagonistic, leading to harder trade-offs, or mutually supportive, allowing more comprehensive solutions?
Ten years from now – what do we want to know?
19