Re[2]: Security for various IETF services

mohammed serrhini <serrhini@mail.ru> Mon, 07 April 2014 00:40 UTC

Return-Path: <serrhini@mail.ru>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CDB4F1A055D for <ietf@ietfa.amsl.com>; Sun, 6 Apr 2014 17:40:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 3.15
X-Spam-Level: ***
X-Spam-Status: No, score=3.15 tagged_above=-999 required=5 tests=[BAYES_50=0.8, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, FROM_EXCESS_BASE64=0.979, HELO_EQ_RU=0.595, HOST_EQ_RU=0.875, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6XLyW7LNTPlD for <ietf@ietfa.amsl.com>; Sun, 6 Apr 2014 17:40:23 -0700 (PDT)
Received: from f126.i.mail.ru (f126.i.mail.ru [94.100.178.189]) by ietfa.amsl.com (Postfix) with ESMTP id 63C671A018D for <ietf@ietf.org>; Sun, 6 Apr 2014 17:40:22 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=mail.ru; s=mail2; h=References:In-Reply-To:Content-Type:Message-ID:Reply-To:Date:Mime-Version:Subject:Cc:To:From; bh=ZpbII0lto0BW4R7hUj/d/x53PGnyxYiJESRjCDAisc0=; b=Ax6VJNTuW4Q4sULhRKecY+Vd5ufOF7jgcYUgqKteC4qXUiz+yt22MsrBuCH/wWz/WXuVX655+kCAQRpHAXqzrwlwVv9sCaO391X2673hhQ49ECV+F4dhS6edlQlSokDUBnQl44WVZH8za8ErMOWz1zows6Pa9xC45K+UQ9T5zXM=;
Received: from mail by f126.i.mail.ru with local (envelope-from <serrhini@mail.ru>) id 1WWxbj-000688-E6; Mon, 07 Apr 2014 04:40:15 +0400
Received: from [41.137.68.112] by e.mail.ru with HTTP; Mon, 07 Apr 2014 04:40:15 +0400
From: =?UTF-8?B?bW9oYW1tZWQgc2Vycmhpbmk=?= <serrhini@mail.ru>
To: =?UTF-8?B?Q2hyaXN0aWFuIEh1aXRlbWE=?= <huitema@microsoft.com>
Subject: =?UTF-8?B?UmVbMl06IFNlY3VyaXR5IGZvciB2YXJpb3VzIElFVEYgc2VydmljZXM=?=
Mime-Version: 1.0
X-Mailer: Mail.Ru Mailer 1.0
X-Originating-IP: [41.137.68.112]
Date: Mon, 07 Apr 2014 04:40:15 +0400
X-Priority: 3 (Normal)
Message-ID: <1396831215.88792064@f126.i.mail.ru>
Content-Type: multipart/alternative; boundary="--ALT--2TPB6QXn1396831215"
X-Mras: Ok
X-Spam: undefined
In-Reply-To: <ecabb0a4080548d99ab083c0ff0c27ee@BLUPR03MB424.namprd03.prod.outlook.com>
References: <533D8A90.60309@cs.tcd.ie> <alpine.LRH.2.01.1404061602580.14892@egate.xpasc.com> <ecabb0a4080548d99ab083c0ff0c27ee@BLUPR03MB424.namprd03.prod.outlook.com>
Archived-At: http://mailarchive.ietf.org/arch/msg/ietf/7wEUuxFzNkL6LVrQBAuWcYMXEKw
Cc: =?UTF-8?B?aWV0ZkBpZXRmLm9yZw==?= <ietf@ietf.org>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: =?UTF-8?B?bW9oYW1tZWQgc2Vycmhpbmk=?= <serrhini@mail.ru>
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 07 Apr 2014 00:40:28 -0000

I agree, The Security and Risk Analysis  is major looks at how to redesign systems that are secure, how to measure risk, and how ensure that proper levels of privacy are maintained for individual  users.  Remember that security is a process, not a
product. not all security and privacy are resolved technically,  without forgeting that User is Weak node of chain. 
HSTS ,  TLS ,HTTPS  FTPS  or NSS / GnuTLS / OpenSSL  .   can  break  the IETF web site old tools.  but provide  levels of privacy and security . 
The delivery and maintenance team is responsible for on-going updating and monitoring, including security measures for access control and information confidentiality.  when there are mechanisms in place to establish
privacy and trust  .

Serrhini Mohammed

Sun, 6 Apr 2014 23:30:11 +0000 от Christian Huitema <huitema@microsoft.com>om>:
>> I agree with those who've said a threat analysis is needed before
>> deciding access is limited to TLS or other secure alternative.
>
>But we have that threat analysis, and the recommended mitigation is precisely "encrypt everything." The "pervasive monitoring" threat is analyzed by a number of perpass drafts, and Stephen has merely followed the conclusions of that analysis. There is no need to repeat that analysis for each and every tool that the IETF produces, and there is indeed a need for the IETF as a whole to "lead by example."
>
>-- Christian Huitema
>
>
>


С уважением,
mohammed serrhini
serrhini@mail.ru