Communications security: Difference between revisions

From OLPC
Jump to navigation Jump to search
m (New page: This page documents work that has been done to formulate a good description of OLPC's goals in the field of communications security. To this end, we will begin with some paraphrases and qu...)
 
mNo edit summary
Line 3: Line 3:
== Reflections from Bitfrost ==
== Reflections from Bitfrost ==


* ...the intent of our complete software security model is that it "tries to prevent software from doing bad things": e.g., attempt to damage the
* ...the intent of our complete software security model is that it "tries to prevent software from doing bad things": e.g., attempt to damage the machine, compromise the user's privacy, damage the user's information, do "bad things" to people other than the machine's user, and lastly, impersonate the user
machine, compromise the user's privacy, damage the user's information, do "bad things" to people other than the machine's user, and lastly, impersonate the user
* there's no trust mapping between people and software: trusting a friend isn't, and cannot be, the same as trusting code coming from that friend
* there's no trust mapping between people and software: trusting a friend isn't, and cannot be, the same as trusting code coming from that friend
* the security of the laptop cannot depend on the user's ability to remember a password (though passwords may be used by more advanced users)
* the security of the laptop cannot depend on the user's ability to remember a password (though passwords may be used by more advanced users)

Revision as of 06:59, 16 March 2008

This page documents work that has been done to formulate a good description of OLPC's goals in the field of communications security. To this end, we will begin with some paraphrases and quotes from Bitfrost that seem appropriate, then offer a subdivision of the term "communications security" into more primitive notions, and finally, we will present and reflect on some simple use cases.

Reflections from Bitfrost

  • ...the intent of our complete software security model is that it "tries to prevent software from doing bad things": e.g., attempt to damage the machine, compromise the user's privacy, damage the user's information, do "bad things" to people other than the machine's user, and lastly, impersonate the user
  • there's no trust mapping between people and software: trusting a friend isn't, and cannot be, the same as trusting code coming from that friend
  • the security of the laptop cannot depend on the user's ability to remember a password (though passwords may be used by more advanced users)
  • authentication of laptops or users will not depend upon identifiers that are sent unencrypted over the network
  • ...users will be identified... without a certified chain of trust

Security Properties of Communications

"Secure communications" can be thought of in terms of

  • the logical security of communications channels (e.g. can I forge messages, read confidential messages, perform traffic analysis, ...),
  • the isolation properties of the network/node interface, and
  • the physical security of a human carrying a networked laptop (e.g. can the laptop be physically located by analyzing its communications).