Re: [Detnet] Benjamin Kaduk's Discuss on draft-ietf-detnet-architecture-11: (with DISCUSS and COMMENT)

Benjamin Kaduk <kaduk@mit.edu> Mon, 04 March 2019 02:46 UTC

Return-Path: <kaduk@mit.edu>
X-Original-To: detnet@ietfa.amsl.com
Delivered-To: detnet@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E8476130EE4; Sun, 3 Mar 2019 18:46:07 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.7
X-Spam-Level:
X-Spam-Status: No, score=-1.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_INVALID=0.1, DKIM_SIGNED=0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=fail (1024-bit key) reason="fail (body has been altered)" header.d=mit.edu
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id flT6ZtdMiH1c; Sun, 3 Mar 2019 18:46:05 -0800 (PST)
Received: from NAM03-BY2-obe.outbound.protection.outlook.com (mail-eopbgr780127.outbound.protection.outlook.com [40.107.78.127]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DD1BA130EDA; Sun, 3 Mar 2019 18:46:04 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mit.edu; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=9A+N1SwnfQ7+q5S38YzYFCbptAtVX0GtOh3E9yinqFE=; b=uqsIlnvYuh8aoJE30nw8hOW55c3vuHm0EEhjQW7EA/x8DEVDZjt704uEXi0zGGTCX7ygtyd8hZW+r23OKkbkil43OxVnViK7/sBC//tAMDse7rXw7Q/diAfaOPZ1zxj1Rr/0HIu/egAlnbhOTcv5b/Ru+Vs2tk8pZxvQabGGoIE=
Received: from MN2PR01CA0029.prod.exchangelabs.com (2603:10b6:208:10c::42) by MN2PR01MB5616.prod.exchangelabs.com (2603:10b6:208:11c::31) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1665.16; Mon, 4 Mar 2019 02:46:02 +0000
Received: from BY2NAM03FT023.eop-NAM03.prod.protection.outlook.com (2a01:111:f400:7e4a::200) by MN2PR01CA0029.outlook.office365.com (2603:10b6:208:10c::42) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.1665.16 via Frontend Transport; Mon, 4 Mar 2019 02:46:02 +0000
Authentication-Results: spf=pass (sender IP is 18.9.28.11) smtp.mailfrom=mit.edu; ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=bestguesspass action=none header.from=mit.edu;
Received-SPF: Pass (protection.outlook.com: domain of mit.edu designates 18.9.28.11 as permitted sender) receiver=protection.outlook.com; client-ip=18.9.28.11; helo=outgoing.mit.edu;
Received: from outgoing.mit.edu (18.9.28.11) by BY2NAM03FT023.mail.protection.outlook.com (10.152.84.226) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.1643.13 via Frontend Transport; Mon, 4 Mar 2019 02:46:01 +0000
Received: from kduck.mit.edu (24-107-191-124.dhcp.stls.mo.charter.com [24.107.191.124]) (authenticated bits=56) (User authenticated as kaduk@ATHENA.MIT.EDU) by outgoing.mit.edu (8.14.7/8.12.4) with ESMTP id x242jvcO004242 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Sun, 3 Mar 2019 21:45:59 -0500
Date: Sun, 03 Mar 2019 20:45:57 -0600
From: Benjamin Kaduk <kaduk@mit.edu>
To: "Grossman, Ethan A." <eagros@dolby.com>
CC: "draft-ietf-detnet-architecture@ietf.org" <draft-ietf-detnet-architecture@ietf.org>, "detnet@ietf.org" <detnet@ietf.org>, The IESG <iesg@ietf.org>, "detnet-chairs@ietf.org" <detnet-chairs@ietf.org>
Message-ID: <20190304024557.GK53396@kduck.mit.edu>
References: <155063426136.20704.6779201119170972943.idtracker@ietfa.amsl.com> <cb52062a-b4fb-b51a-2dc3-ca7f161c8f89@labn.net> <20190220160743.GD69562@kduck.mit.edu> <36c4ce97-5c4a-89ab-d648-3e7705a6acd3@labn.net> <20190220212104.GK69562@kduck.mit.edu> <30e27625-da32-7e67-6e3a-a923830b9e5c@labn.net> <BYAPR06MB4325DC91AE78DC38CD0A74B6C47A0@BYAPR06MB4325.namprd06.prod.outlook.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <BYAPR06MB4325DC91AE78DC38CD0A74B6C47A0@BYAPR06MB4325.namprd06.prod.outlook.com>
User-Agent: Mutt/1.10.1 (2018-07-13)
X-EOPAttributedMessage: 0
X-Forefront-Antispam-Report: CIP:18.9.28.11; IPV:CAL; SCL:-1; CTRY:US; EFV:NLI; SFV:NSPM; SFS:(10019020)(396003)(136003)(346002)(376002)(39860400002)(2980300002)(189003)(199004)(129404003)(13464003)(51444003)(229853002)(14444005)(5660300002)(30864003)(26005)(186003)(53546011)(76176011)(23756003)(104016004)(86362001)(6246003)(356004)(2870700001)(88552002)(55016002)(4326008)(6306002)(1076003)(7696005)(6916009)(305945005)(33656002)(478600001)(26826003)(8676002)(486006)(956004)(126002)(476003)(446003)(2906002)(106002)(54906003)(58126008)(336012)(426003)(8936002)(246002)(316002)(786003)(36906005)(93886005)(50466002)(966005)(11346002)(106466001)(53416004)(47776003)(75432002); DIR:OUT; SFP:1102; SCL:1; SRVR:MN2PR01MB5616; H:outgoing.mit.edu; FPR:; SPF:Pass; LANG:en; PTR:outgoing-auth-1.mit.edu; MX:1; A:1;
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: bcf1663b-9915-4550-bb2a-08d6a04b8a20
X-Microsoft-Antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600127)(711020)(4605104)(4608103)(4709054)(2017052603328)(7153060); SRVR:MN2PR01MB5616;
X-MS-TrafficTypeDiagnostic: MN2PR01MB5616:
X-MS-Exchange-PUrlCount: 1
X-Microsoft-Exchange-Diagnostics: 1; MN2PR01MB5616; 20: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
X-Microsoft-Antispam-PRVS: <MN2PR01MB5616F19717AD92F28A8AD2B1A0710@MN2PR01MB5616.prod.exchangelabs.com>
X-Forefront-PRVS: 09669DB681
X-Microsoft-Exchange-Diagnostics: 1; MN2PR01MB5616; 23:9lucA/hJ/swkxwhCu90p9RCjsvGm+5uSQe1Lrj/lxOcyGEX14frQOl3PjWV74jFlLcaI/vio+0pVshV5Ycf5M/MF1bvjBJVIZ+Ec320qdcrXBEHfBE9FZE8CCr87o0pNJMfn/3zhHywQPR1f62M8qaquCm6HRy4be+1W6dtUPHPEZCjlqk4zQzinewQxYCkicc1ju2OB37047B6pEKP0v1D+9dIaHt7xFTrvaWxEsKOinicdGbE4zU9H8SzaiaoLYwvj9eNV+AxUPU1so8HI4mbE453kB3KIRDInmQVBdPC49LjenO84JhReAI/aN8SsOZDRG1TUhjdm9hVU0D+aDZ7gsdTeQSOcu5USEC/pRTbqWCAgtm4smD42y3yI56KE2wcOa+7gMjf6TeXRCDzmU+ffz0Xy+M7qe8ZMXAyf/eZlXe8e3I2bDGhiKfx3M95mj2NdKOjmHoWsJt6EQEUpiAH88ZwIN2fpkscHFZ6bOUb48whrhfk+nrA8c/bBeDg7eSWIN3BzuWPPs0AVd0nfFvS2t3Pen3mTYtt9+LqGAOjKqxZB+gplajo90M6YPsRue9GwGyCbl2+LESQELzO695tg31IGIp8A8WdQ94KGtLk3cfg7RnUfehXitphqSvGjpU9qg9jL1zhEgl9ffXZZl9GtLpIC9Lq20VJZVmTFfWtGsxLZM8izs8fxVW65qySJaDHkQ0yGhGZTgEdzF2zCVsj5yK/UVH1bQjZ1srBJa8FIyrMaTkR5hOBVhfUV7pm87QdusWZzYQhaztyW6F+g1eodU+UG5xeiN7lII+QOF6zMsu4fQGCxjdWfmKH+h0i8Ny/HnZsLWa15wE00m9jr1Aassjs6mpD/eJi30lP8B5zenMqmeg10kn+kjIuncI1xtudZAIS3mlzk0Se2NAiwgadj+Dm/TwkK5f55I+IkFKi5I69LfrN685tVyQpl+Pc0iWdKru0tJjjZbc5UHfw7YECNJ+CToXtxGaGEaS6K0yIuv+FXAwZQUpPvYpq5T4CNXCsNvL93FJtqT1hiDReic/ypvhgVygHW0ouNmUnIv4lwcW/NRUdMfxj8LAX0SaoZwixpDCltD3gWXrez+Lz2dcGAZvSmR+N+k5SY4wEWZ1nU9wBeoLi2/q4RDySlTGulZcO/eYw8c40izQ5fKuzDJI90eBNpEuyFVGqDLK8CvVMuy4OgS3qftxA9kRmmFPi4OwFn2dPLz0qKa3xGBvF5ArvWohrdcQry6ILUPFNx5eDoubn7LbBMAOI2swnpRZQxJrMCxBXErqPcau4SLlwmFf15+5sFGfw4rXT5kQNqbFpHJPeR3rz5K4cBoktHy3rY
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam-Message-Info: PsMzf8eoO98ZORl82LO09aAnehQ+ZdukSr1q/XddoNg9VhPuKOaa40ZFwWTfLac5L99ex0tZAcZkXPBAoOi+jnol7ShJzwlJx5LY0F/hOvl66sMPLjxYylwGwKTWnoixX+inDNkI7Xj7bDwTMuJ/b1rd+URh+a1GGzigdYefij6aJEYX0ZypFIp/2/0mSvwsuxMK+FKszqWZVbrNnfudvHls3OBF7YB6Bp4LHDyGDMHF9AEBW5hGn/8SF0uytJYhLUbQaEldH17OtgDqIiItZ2f5YBa6xAIddVIPnGxyHpT3+Rl1XYmk70f/xyHqk8RrvGTIVeSH6c7xxklXSKKL21xj3ke8Bwy1aeQz38v3fmCl3s150Ez0lnns0pcIY9LiOV3CUhUNxxDzB/fJMfIh2lNq+UfjZol0ZZYHFp3hnj8=
X-OriginatorOrg: mit.edu
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Mar 2019 02:46:01.5099 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: bcf1663b-9915-4550-bb2a-08d6a04b8a20
X-MS-Exchange-CrossTenant-Id: 64afd9ba-0ecf-4acf-bc36-935f6235ba8b
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=64afd9ba-0ecf-4acf-bc36-935f6235ba8b; Ip=[18.9.28.11]; Helo=[outgoing.mit.edu]
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR01MB5616
Archived-At: <https://mailarchive.ietf.org/arch/msg/detnet/CY5l_rFEyx_KH0uWGgs8j06GF5Y>
Subject: Re: [Detnet] Benjamin Kaduk's Discuss on draft-ietf-detnet-architecture-11: (with DISCUSS and COMMENT)
X-BeenThere: detnet@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Discussions on Deterministic Networking BoF and Proposed WG <detnet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/detnet>, <mailto:detnet-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/detnet/>
List-Post: <mailto:detnet@ietf.org>
List-Help: <mailto:detnet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/detnet>, <mailto:detnet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Mar 2019 02:46:08 -0000

Hi Ethan,

On Mon, Feb 25, 2019 at 06:31:16AM +0000, Grossman, Ethan A. wrote:
> Hi Benjamin,
> As editor and co-author of the DetNet Security draft, I thank you very much for your comments regarding the security aspects of the DetNet Architecture and Security draft. Indeed it is our intent to ensure that security is considered throughout the design process and not "bolted on" at the end; this is why we have been developing the Security draft in parallel with the Architecture, Data Plane and other drafts.  Here are a couple of my initial thoughts on your comments; I present them for discussion, not as a defense of a pre-determined outcome. 

Understood.

> I follow your concern that we have not made a distinction between the laundry list of possible threats versus those threats that designs based on the architecture must address in order to satisfy the security requirements of the architecture. Excellent point, in that I for one have not considered the topic in that light before, and I appreciate the need to do so now. 
> 
> Up until this point, i.e. prior to your comments, we have been working
> based on at least two guiding principles. One is that we are only
> addressing security considerations which are specific to time-sensitive,
> routed, centrally-administered networks, so anything that could be
> considered to be "covered elsewhere" we have intentionally omitted. For
> example you cite "using HMAC for message integrity protection without
> mention of infrastructure for distributing the keys for keying the HMAC";
> I would expect that this topic could be regarded as "covered elsewhere",
> but please correct me if I'm missing something here. 

I think it's fine to say that DetNet only needs to provide solutions for
addressing security considerations that are specific to these
time-sensitive networks, but that doesn't necessarily mean that we can
completely ignore the more mundane "generic" considerations.  That is, we
can and should still be aware of what security properties we expect of the
traffic flowing through detnet installations, and choose the other
technologies that are used to build solutions accordingly.  As a complete
example, not necessarily even relevant to detnet, we can say that if we
want confidentiality protection for IP traffic, IPsec is an option, but we
also would need to know that to actually use IPsec we'd either need to pull
in IKE or have pre-established shared keys to use.  Similarly for HMAC to
provide integrity protection -- the underlying technology and its usage is
well-understood, but comes with the caveat that the participants need some
way to share the secret keys it uses.  The idea is not necessarily to say
that detnet must specify a single way of doing things, but rather to be
clear about what it does (and does not!) require, and to have pointers for
how a solution *could* be built using existing technologies, without
requiring it to be done in that way.

> Another main thread running through almost every aspect of DetNet is that as noted in the Use Cases draft, there are many and diverse applications for DetNet, spanning networks contained within a single machine all the way through networks spanning a nation. As such it is difficult to make generalizations about almost anything in DetNet - everything has to be framed as "scalable" so that we don't mandate something that makes sense for one use case but not for another. 
> 
> So the intent of the Security draft (in conjunction with security text in the other DetNet drafts) thus far has been to provide some insights into the aspects of security that are introduced with time-sensitivity to routed networks, with a nod as to how they might be addressed, while being almost completely non-prescriptive about it, leaving the details as an exercise for the reader based on their particular use case. 
> 
> In other words, as soon as we say "a DetNet must include [any specific security property]", someone will inevitably come up with a use case for which that didn't make sense (insufficient time, insufficient CPU cycles, not required in this case because blah, etc.) For example when I look at your questions like "Do we need to provide integrity protection for the marking, or confidentiality protection, too?  Does  authentication/integrity need to be provided for in-line or are out-of-band considerations in play?" my thought would be to say "well it depends on the use case, i.e. the specific implementation". 

In a similar vein to what I note above, I think that at the architectural
level the questions we want to ask are things like "does the architecture
need to support use cases where the deterministic traffic is given
confidentiality protection by the network?"  We don't need to require that
it be used, and potentially not even require that every instantiation of
the architecture have the ability to provide it (though for confidentiality
protection in particular that will definitely be a discussion to have), but
we establish it as something that we need to think about in the protocol
design.  The flip side of this, of course, is that we also have the ability
to explicitly disclaim responsibility for some types of protection, and not
have to worry about that in the protocol design, thus leaving any
protections for that threat to be at a different layer.

> So at this point I don't know whether this stance is valid, or whether it is an abdication of our responsibility, or whether there are some stakes in the ground that we can actually claim will fit all use cases, and thus we should be stating as mandatory. Certainly we would like to avoid the outcome that the architecture leaves open questions as to whether a given implementation satisfies its security requirements. We also want to avoid being overly prescriptive such that "exceptions" would need to be made to accommodate diverse use cases. 

At this point I'm not necessarily looking for hard security requirements,
but rather a requirement for things that we include in the security
analysis of the system.  The answer may well be that (e.g.) it's hard to
defend against an attacker that can delay packets, so all we can do is
document the threat and move on; there could be other cases where a
technical defense is possible, but expensive, so we can provide an optional
mechanism and document the tradeoffs, so that individual use cases can make
their own decisions.

Hope this helps,

Benjamin

> Please let us know how this line of thinking affects your assessment of our situation, if at all. My short term goal here is to unblock publication of the Architecture draft, but not at the expense of adequate coverage and integration of security. 
> 
> Thanks again for your review, 
> Sincerely,
> Ethan (as editor and co-author of the DetNet Security draft and the DetNet Use Cases draft). 
> 
> 
> -----Original Message-----
> From: detnet <detnet-bounces@ietf.org> On Behalf Of Lou Berger
> Sent: Thursday, February 21, 2019 12:32 PM
> To: Benjamin Kaduk <kaduk@mit.edu>
> Cc: draft-ietf-detnet-architecture@ietf.org; detnet@ietf.org; The IESG <iesg@ietf.org>; detnet-chairs@ietf.org
> Subject: Re: [Detnet] Benjamin Kaduk's Discuss on draft-ietf-detnet-architecture-11: (with DISCUSS and COMMENT)
> 
> Hi Benjamin,
> 
> On 2/20/2019 4:21 PM, Benjamin Kaduk wrote:
> > Hi Lou,
> >
> > On Wed, Feb 20, 2019 at 11:34:11AM -0500, Lou Berger wrote:
> >> On 2/20/2019 11:07 AM, Benjamin Kaduk wrote:
> >>> On Wed, Feb 20, 2019 at 09:33:34AM -0500, Lou Berger wrote:
> >>>> On 2/19/2019 10:44 PM, Benjamin Kaduk wrote:
> >>>>> I note that the DETNET WG is explicitly chartered with a work item 
> >>>>> for the "overall architecture: This work encompasses ... and security aspects".
> >>>>> It seems incomplete to specify an architecture for a topic such as 
> >>>>> deterministic networking without specifically considering what 
> >>>>> threats are and are not in scope to be protected against.
> >>>> The working group certainly recognizes that security is an 
> >>>> important topic and necessary part of the work. The WG's  approach 
> >>>> to ensure that this significant topic is sufficiently covered is to 
> >>>> have a  document dedicated to the topic.  As you note below this 
> >>>> work, draft-ietf-detnet-security, is not at the same level maturity 
> >>>> - so please stay tuned.  Of course, the WG would welcome any input 
> >>>> on this security draft now or even a full early-review or security area advisor.
> >>> I do appreciate that the WG has taken the time to work on a 
> >>> dedicated security document, that goes through the (tedious!) effort 
> >>> to tabulate the various known attacker capabilities, threats, and their interactions.
> >>>
> >>> What I think is missing from the high-level architecture document is 
> >>> a sense for what security goals the architecture intends to achieve.  
> >>> It's fine to have this be separate from the nitty-gritty stuff in 
> >>> the separate document, but these high-level questions can have an 
> >>> impact on the high-level design of the protocol ecosystem as a 
> >>> whole.  We have mounds of examples of "come up with a design; bolt security on as an afterthought"
> >>> working poorly or being nigh-impossible, and I haven't seen any 
> >>> attempt at justification for why doing so here is likely to be any different.
> >>> Including the security concepts from the start and wholly 
> >>> integrating them into the system tends to produce a much more 
> >>> elegant design and smoother outcomes all around.
> >> We went back and forth on how much of the security topic to include 
> >> in the architecture document and settled on the current text of 
> >> section 5 where just high level security requirements are identified.  
> >> From your list below, the architecture covers the points you raise 
> >> (non-detnet traffic impacting detnet traffic, and detnet traffic 
> >> trying to use more than its allocation) mainly from a service 
> >> delivery perspective.  It does mention "shaping" as a security 
> >> concern, the document could expand these if helpful. But I think the 
> >> real discussion point is how much of the security details should be 
> >> in the base (vs dedicated) document  -- and that you disagree with 
> >> where the WG has drawn the line.  Is this correct?
> > Well, it's not as much that I disagree about where the line is drawn, 
> > as that I disagree with the characterization as "high level security 
> > requirements".
> >
> > The first paragraph covers topics worth including here, certainly -- 
> > an attacker that can introduce delay can inherently break the DetNet 
> > guarantees, and there is no further defense.  But the text could 
> > probably go further than its current version and explicitly call out 
> > that no technical measures can defend against such delay, other than 
> > by rerouting/avoiding the compromised position.
> >
> > The second paragraph also covers a topic worth noting, that entropy 
> > and Murphy as as important of risks to consider as active attacks.
> >
> > The rest of the section/list don't seem to match up with the 
> > high-level view, though -- "protection of the signaling protocol", but 
> > protection against what?  Authentication and authorization are 
> > important parts of security, but authorization is tied to actions and 
> > entities, not just entities in vacuo.  For "identification and shaping 
> > of DetNet flows", if security must cover them, what security 
> > properties are needed.  Do we need to provide integrity protection for 
> > the marking, or confidentiality protection, too?  Does 
> > authentication/integrity need to be provided for in-line or are out-of-band considerations in play?
> >
> > The rest of the document presents a good high level picture of what 
> > pieces will be involved in a system, and how they fit together.  I'm 
> > hoping to see a high-level picture of what attacks/failures the 
> > architecture does and does not aim to protect against.  It's somewhat 
> > implied that we need to protect against the failure of any single node 
> > or link (except at the
> > boundary) due to random faults; explicitly saying this would be a 
> > perfect hting to include in the security considerations here!  Once we 
> > get beyond entropy as an attack, into more active attack scenarios, 
> > though, we need to consider what capabilities an attacker might have.  
> > Do we protect against an entity with the ability to inject various 
> > forms of traffic?  Modify or drop valid traffic?  Are there any 
> > (classes of) credentials that we assume must be securely held, or will 
> > we attempt to protect against attackers that have some privilege 
> > within the system?  (Note that misbehaving hardware can sometimes 
> > present as similar or identical to such an attacker.)
> >
> > Does this give a better picture of what I'm thinking of as "high-level 
> > security requirements"?  I don't necessarily need details of specific 
> > hardware or credentials at play, and certainly not for the solutions, 
> > but I want to have a clear picture of what the scope of future 
> > security analysis will be.  "How will I be able to tell if the actual 
> > protocols meet the security requirements of the architecture?"
> 
> I'll get with authors (of both the architecture and security docs) and see how much they think can be reasonably be added to this document -- to be clear you *are* asking for a change in how the WG decide to address this topic and what would go in which document.
> 
> Lou
> 
> > -Benjamin
> >
> > _______________________________________________
> > detnet mailing list
> > detnet@ietf.org
> > https://www.ietf.org/mailman/listinfo/detnet
> >
> 
> _______________________________________________
> detnet mailing list
> detnet@ietf.org
> https://www.ietf.org/mailman/listinfo/detnet