[Detnet] I-D Action: draft-ietf-detnet-security-12.txt
internet-drafts@ietf.org Sat, 03 October 2020 02:53 UTC
Return-Path: <internet-drafts@ietf.org>
X-Original-To: detnet@ietf.org
Delivered-To: detnet@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 7822F3A041B; Fri, 2 Oct 2020 19:53:41 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
Cc: detnet@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 7.19.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: detnet@ietf.org
Message-ID: <160169362137.19114.5349279627498190906@ietfa.amsl.com>
Date: Fri, 02 Oct 2020 19:53:41 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/detnet/3od9mOAJbt0ZriA73lA0pLMB0GE>
Subject: [Detnet] I-D Action: draft-ietf-detnet-security-12.txt
X-BeenThere: detnet@ietf.org
X-Mailman-Version: 2.1.29
List-Id: Discussions on Deterministic Networking BoF and Proposed WG <detnet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/detnet>, <mailto:detnet-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/detnet/>
List-Post: <mailto:detnet@ietf.org>
List-Help: <mailto:detnet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/detnet>, <mailto:detnet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 03 Oct 2020 02:53:42 -0000
A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Deterministic Networking WG of the IETF.
Title : Deterministic Networking (DetNet) Security Considerations
Authors : Ethan Grossman
Tal Mizrahi
Andrew J. Hacker
Filename : draft-ietf-detnet-security-12.txt
Pages : 47
Date : 2020-10-02
Abstract:
A DetNet (deterministic network) provides specific performance
guarantees to its data flows, such as extremely low data loss rates
and bounded latency. As a result, securing a DetNet requires that in
addition to the best practice security measures taken for any
mission-critical network, additional security measures may be needed
to secure the intended operation of these novel service properties.
This document addresses DetNet-specific security considerations from
the perspectives of both the DetNet system-level designer and
component designer. System considerations include a threat model,
taxonomy of relevant attacks, and associations of threats versus use
cases and service properties. Component-level considerations include
ingress filtering and packet arrival time violation detection. This
document also addresses DetNet security considerations specific to
the IP and MPLS data plane technologies thereby complementing the
Security Considerations sections of the various DetNet Data Plane
(and other) DetNet documents.
The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-detnet-security/
There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-detnet-security-12
https://datatracker.ietf.org/doc/html/draft-ietf-detnet-security-12
A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-detnet-security-12
Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.
Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/
- [Detnet] I-D Action: draft-ietf-detnet-security-1… internet-drafts