Re: [hrpc] from “Security Considerations” to “Threat Model Considerations”?

hannes.tschofenig@gmx.net Mon, 06 November 2023 12:44 UTC

Return-Path: <hannes.tschofenig@gmx.net>
X-Original-To: hrpc@ietfa.amsl.com
Delivered-To: hrpc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ADB31C1CB019 for <hrpc@ietfa.amsl.com>; Mon, 6 Nov 2023 04:44:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.801
X-Spam-Level:
X-Spam-Status: No, score=-2.801 tagged_above=-999 required=5 tests=[BAD_ENC_HEADER=0.001, BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmx.net
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qRpzmC1DqjPN for <hrpc@ietfa.amsl.com>; Mon, 6 Nov 2023 04:44:12 -0800 (PST)
Received: from mout.gmx.net (mout.gmx.net [212.227.15.15]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3C9C4C17C896 for <hrpc@irtf.org>; Mon, 6 Nov 2023 04:36:17 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gmx.net; s=s31663417; t=1699274173; x=1699878973; i=hannes.tschofenig@gmx.net; bh=g+pLdgaNnnZ2sU2iatCiPNSQGrjJK4wJCnf5IMVWGXg=; h=X-UI-Sender-Class:From:To:Cc:References:In-Reply-To:Subject: Date; b=m0OQFYHIuKNCVMi9dSW3gQdOZzux57/Vb3Ug1plNFwE3/xm0OeylOhdVAydmgE+K 0W6L4vP3cVoIbclPzEUwqZdldyw4kDVwtwVvGYAWg5kpPvbIueqSvFnrae4yQpCt0 PnX82RGpmyhwAVFh07JRufiIcbcThZXmSUsf1zOWraUMIc79poCtA9H1mEwfYQnEY IyZafNXwWfKA08Z3Pz09e+FU0LiawZdct1UlVwbDvCI1VCvnuVQ6839dUd2R9iFj5 fjxwCLdyZEYM0tupU/KzvKKOm3BkF4scFWu5x0/KrLtzAG2C0bchYbY6m/YUBFleo /pQ59cWUPHgZdr1jSg==
X-UI-Sender-Class: 724b4f7f-cbec-4199-ad4e-598c01a50d3a
Received: from Surface ([90.181.163.50]) by mail.gmx.net (mrgmx004 [212.227.17.190]) with ESMTPSA (Nemesis) id 1N63Ra-1rSNdc3igq-016Sku; Mon, 06 Nov 2023 13:36:12 +0100
From: hannes.tschofenig@gmx.net
To: 'Eric Rescorla' <ekr@rtfm.com>, 'Cory Francis Myers' <cfm@acm.org>
Cc: hrpc@irtf.org
References: <50c88604c932b712b71eb5bd8034550c@acm.org> <CABcZeBPBqXEvXV6E1NRSw4hLjZ7UWOFA2bXT-cgC6udG5TMNQA@mail.gmail.com>
In-Reply-To: <CABcZeBPBqXEvXV6E1NRSw4hLjZ7UWOFA2bXT-cgC6udG5TMNQA@mail.gmail.com>
Date: Mon, 06 Nov 2023 13:36:11 +0100
Message-ID: <01d901da10ad$d39e6250$7adb26f0$@gmx.net>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_01DA_01DA10B6.35638DA0"
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQH+A4JTuTF1jMhRD26KCLBz7DuzwQGyxpZvsBe827A=
Content-Language: de-at
X-Provags-ID: V03:K1:8JtGhAZKk2xHfQWqKrhlwZXMHBbKZ3+tqMNTCioOl3Y0dEISnS7 ncLS3pNLgU0dMBA31G3sG/o4GXVuOGZtCEgwVw+2mjdKPpljcOp1RjU4i+zoQG70rR8+Oy7 haMyTsZr/bvExRXUd9wgSqBm9XJWkwKmIS0tHU5BHmL24r17J8hQwccaQLdXcZNCK4Ec7A5 2n6UKqvw9J6JBK8RJfH4A==
UI-OutboundReport: notjunk:1;M01:P0:lIrNgxCJ2zQ=;qJ2UQBcxSV7Lr0Ku9NlicJ8tuPq PbMAbORulvcvc1FT1+1TX0tx7P9aUArpvGS94x8JiuKMPJwlwl/FsqhCyfcNuPjiCLAJ1v6oj 4c4aAUZGq/zuZtVgV5w414YR4O7ZLe5nM66Ly+d4fC5aS67XAxBX/xCrY6ag4ohXiLJz8wWPE 5yaE2NYHQOoWN49tjYzi47sgLsy5MHHkkVZNeFVtFnSuNSYOzMuNtyFPUuD/shf6EuEJSfaik f2xvet6jdi5VYkOtDcH79YCwNIWnl5xNE4FbZLJXHUTNvDIlSboyIFuSDPqkhLdHKcG5U1X+P J6gHfBrDNehp9IqSyc8slC9YXx24/fDYaelLVuSkKws6GTuDGFx/t7GkZVVkbZ5UAqrna5GDQ xIXYlDQe3I/55sZo8X/RjKjkKbKJbIM+lw+TkNvgrrEmL21VS2smlxEtx7TeqeMdnTMUYZ3NY yyjuLMG1dEfQscjrv+VC1uoVq3aYYAXELdGPKSL3kOKA1HiAkoeW8FMAGl5HH7CWpTVJOzH1B IHji+AZ2MbqzwfQDJj8X4zFPyTen0XVwDcjXz5i+XzVMna6IwH50LkACYzvSI+jJwz/4es8dL RLUbovxsGP3a4tJIVlBI/0XOFZfQMe6J2qtJKDsRCU1MxuWyELU0vUTV1RqM02CMrzIU6R/mg NKRHWJ4ykt3n5KLLNHufdErC+tYaIEisoqirMmsAbJyDjat4Ko+JA4J5Iyha3gAFNV+a6L6+1 YX1NWeFAKNIxQWO34UwDhRnjQ3BV+fJ9EruxPGsd5SGUcVXYO+qw55CVTZy6KJlGvS6KfX5xS tBXYoM8/ufClN8IxI52/th3yRmpHQjGzSbdCcEHi9k7o8Orxc+/jZsPIAquUvQsZQrby0zbxp i3ZE07IhyY77KgsaX3tSsCgU0WnO/me0ZEpdy6oh2qOPq9cHQEc7NNpfWRGcNjVCVpC1+zhPI Cwp20uBNP9jWaUBJfK6GqbypJlA=
Archived-At: <https://mailarchive.ietf.org/arch/msg/hrpc/DoDmvq4TjSQnrbyUXJ-7oLOK3ig>
Subject: Re: [hrpc] from “Security Considerations” to “Threat Model Considerations”?
X-BeenThere: hrpc@irtf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: hrpc discussion list <hrpc.irtf.org>
List-Unsubscribe: <https://mailman.irtf.org/mailman/options/hrpc>, <mailto:hrpc-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/hrpc/>
List-Post: <mailto:hrpc@irtf.org>
List-Help: <mailto:hrpc-request@irtf.org?subject=help>
List-Subscribe: <https://mailman.irtf.org/mailman/listinfo/hrpc>, <mailto:hrpc-request@irtf.org?subject=subscribe>
X-List-Received-Date: Mon, 06 Nov 2023 12:44:15 -0000

Hi Cory, 

 

I am not a big fan of adding “mandatory” considerations sections to drafts. The reason is simple: If the considerations are valuable enough then authors will add them anyway.

Hence, I would focus on writing meaningful guidance instead of spending time to make them mandatory. 

 

As Ekr said, it is also quite difficult to get an agreement. I still think it was the right decision to not make the privacy consideration section mandatory.

 

Ciao

Hannes

 

From: hrpc <hrpc-bounces@irtf.org> On Behalf Of Eric Rescorla
Sent: Montag, 6. November 2023 13:18
To: Cory Francis Myers <cfm@acm.org>
Cc: hrpc@irtf.org
Subject: Re: [hrpc] from “Security Considerations” to “Threat Model Considerations”?

 

 

 

On Mon, Nov 6, 2023 at 3:46 AM Cory Francis Myers <cfm@acm.org <mailto:cfm@acm.org> > wrote:

The requirement for a “Security Considerations” section originates in 
RFC 2223 “Requirements to RFC Authors”.  The RFC 7322 style guide adds 
sections for IANA and internationalization considerations.

draft-irtf-hrpc-guidelines (how to think about human-rights 
considerations) is not quite like RFC 3552 (how to write “Security 
Considerations” sections)—because the *need* to think about as well as 
articulate the latter is taken for granted.  What would it take to:

1. Add a “Human Rights Considerations” section?

2. Add a “Privacy Considerations” *and* a “Safety Considerations” 
section (per Stephanie Mikkelson‘s slide today on safety, privacy, 
security by design[1])?

3. Broaden “Security Considerations” into “Threat Model 
Considerations”?[2]


I’m oversimplifying on purpose!  My goal in asking this question is to 
understand the obstacles to establishing the parity of these criteria 
with security considerations.

 

It would require a Standards Track RFC, which is to say that the work

would need to happen in IETF, not in HRPC.

 

With that said, I don't think it's very likely that the IETF will require either

of these. When RFC 6793 was written there was an explicit decision not

to require Privacy Considerations in RFCs and I suspect that a Human Rights

Considerations Section would be even more difficult to come to consensus

on.

 

-Ekr

 

 


If I’m retreading old or fraught ground, as I suspect I may be, I’d 
welcome pointers into the archives.


Sincerely,

Cory Myers.


[1]: 
https://datatracker.ietf.org/meeting/118/materials/slides-118-hrpc-unfpa-gbv-tech-guidance-00.pdf 
(slide 15)

[2]: Although this risks framing all of these considerations as strictly 
meliorative of harms, rather than affirmative protections of affirmative 
rights.

_______________________________________________
hrpc mailing list
hrpc@irtf.org <mailto:hrpc@irtf.org> 
https://mailman.irtf.org/mailman/listinfo/hrpc