Guidelines for Authors of Security Considerations Sections or How not to freak out the Security ADs

8/7/02


Click here to start


Table of Contents

Guidelines for Authors of Security Considerations Sections or How not to freak out the Security ADs

Background

The General Idea

The Internet threat model

Easier to mount attacks

Security Services

Rules of Thumb

Object vs. channel security

Some inappropriate choices

Perfection not required

Bottom line

Read the draft (in IESG-WAIT)

Author: Eric Rescorla