[Detnet] I-D Action: draft-ietf-detnet-security-12.txt

internet-drafts@ietf.org Sat, 03 October 2020 02:53 UTC

Return-Path: <internet-drafts@ietf.org>
X-Original-To: detnet@ietf.org
Delivered-To: detnet@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 7822F3A041B; Fri, 2 Oct 2020 19:53:41 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
Cc: detnet@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 7.19.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: detnet@ietf.org
Message-ID: <160169362137.19114.5349279627498190906@ietfa.amsl.com>
Date: Fri, 02 Oct 2020 19:53:41 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/detnet/3od9mOAJbt0ZriA73lA0pLMB0GE>
Subject: [Detnet] I-D Action: draft-ietf-detnet-security-12.txt
X-BeenThere: detnet@ietf.org
X-Mailman-Version: 2.1.29
List-Id: Discussions on Deterministic Networking BoF and Proposed WG <detnet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/detnet>, <mailto:detnet-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/detnet/>
List-Post: <mailto:detnet@ietf.org>
List-Help: <mailto:detnet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/detnet>, <mailto:detnet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 03 Oct 2020 02:53:42 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Deterministic Networking WG of the IETF.

        Title           : Deterministic Networking (DetNet) Security Considerations
        Authors         : Ethan Grossman
                          Tal Mizrahi
                          Andrew  J. Hacker
	Filename        : draft-ietf-detnet-security-12.txt
	Pages           : 47
	Date            : 2020-10-02

Abstract:
   A DetNet (deterministic network) provides specific performance
   guarantees to its data flows, such as extremely low data loss rates
   and bounded latency.  As a result, securing a DetNet requires that in
   addition to the best practice security measures taken for any
   mission-critical network, additional security measures may be needed
   to secure the intended operation of these novel service properties.

   This document addresses DetNet-specific security considerations from
   the perspectives of both the DetNet system-level designer and
   component designer.  System considerations include a threat model,
   taxonomy of relevant attacks, and associations of threats versus use
   cases and service properties.  Component-level considerations include
   ingress filtering and packet arrival time violation detection.  This
   document also addresses DetNet security considerations specific to
   the IP and MPLS data plane technologies thereby complementing the
   Security Considerations sections of the various DetNet Data Plane
   (and other) DetNet documents.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-detnet-security/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-detnet-security-12
https://datatracker.ietf.org/doc/html/draft-ietf-detnet-security-12

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-detnet-security-12


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/