Re: [paws] WG Review: Protocol to Access White Space database (paws)

Glen Zorn <gwz@net-zen.net> Fri, 22 April 2011 01:35 UTC

Return-Path: <gwz@net-zen.net>
X-Original-To: ietf@ietfc.amsl.com
Delivered-To: ietf@ietfc.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfc.amsl.com (Postfix) with ESMTP id D1403E0773 for <ietf@ietfc.amsl.com>; Thu, 21 Apr 2011 18:35:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level:
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([208.66.40.236]) by localhost (ietfc.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ohCMpVj8oevf for <ietf@ietfc.amsl.com>; Thu, 21 Apr 2011 18:35:34 -0700 (PDT)
Received: from smtpauth21.prod.mesa1.secureserver.net (smtpauth21.prod.mesa1.secureserver.net [64.202.165.38]) by ietfc.amsl.com (Postfix) with SMTP id 8D42CE0756 for <ietf@ietf.org>; Thu, 21 Apr 2011 18:35:34 -0700 (PDT)
Received: (qmail 23221 invoked from network); 22 Apr 2011 01:35:33 -0000
Received: from unknown (124.120.98.54) by smtpauth21.prod.mesa1.secureserver.net (64.202.165.38) with ESMTP; 22 Apr 2011 01:35:32 -0000
Message-ID: <4DB0DB5F.8020806@net-zen.net>
Date: Fri, 22 Apr 2011 08:35:27 +0700
From: Glen Zorn <gwz@net-zen.net>
Organization: Network Zen
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.15) Gecko/20110303 Thunderbird/3.1.9
MIME-Version: 1.0
To: scott.probasco@nokia.com
Subject: Re: [paws] WG Review: Protocol to Access White Space database (paws)
References: <20110419165634.CD24CE07CF@ietfc.amsl.com> <4DADFE6D.3050107@cs.tcd.ie> <88BE24FD9280884487DEAE0CE1FD3A5B060F1B@008-AM1MPN1-023.mgdnok.nokia.com> <F4035489-7D81-47C9-BE99-3D9DCF1637FA@cdt.org> <88BE24FD9280884487DEAE0CE1FD3A5B06182F@008-AM1MPN1-023.mgdnok.nokia.com>
In-Reply-To: <88BE24FD9280884487DEAE0CE1FD3A5B06182F@008-AM1MPN1-023.mgdnok.nokia.com>
X-Enigmail-Version: 1.1.1
Content-Type: multipart/mixed; boundary="------------050405030501010207010101"
Cc: paws@ietf.org, iesg@ietf.org, ietf@ietf.org
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 22 Apr 2011 01:35:38 -0000

On 4/21/2011 8:05 PM, scott.probasco@nokia.com wrote:

> Hi,
> 
> I agree with the concept, just want to be sure the PAWS is not expected to develop these security mechanisms (i.e. the tools) as contrasted to including or using in PAWS the security tools developed by appropriate expert groups.
> 

I agree.

> "Inclusion of robust security mechanisms is required:..."
> ??
> 
> Regards,
> Scott
> 
> 
> 
> -----Original Message-----
> From: ext Alissa Cooper [mailto:acooper@cdt.org] 
> Sent: Thursday, April 21, 2011 6:01 AM
> To: Probasco Scott (Nokia-CIC/Dallas)
> Cc: stephen.farrell@cs.tcd.ie; ietf@ietf.org; paws@ietf.org; iesg@ietf.org
> Subject: Re: [paws] WG Review: Protocol to Access White Space database (paws)
> 
> On Apr 20, 2011, at 3:41 PM, <scott.probasco@nokia.com> <scott.probasco@nokia.com> wrote:
> 
>> Hi Stephen, All,
>>
>> I believe the current wording
>>>> Robust security mechanisms are required to prevent:
>>>> device identity spoofing, modification of device requests, modification
>>>> of channel enablement information, ...
>> is acceptable because "mechanisms are required" means they should be in the protocol, it does not mean they cannot be optional. PAWS should support Regulator requirements globally, and thus I believe there will be procedures or capabilities which are "required" to be in the protocol but will be "optional" during run time. Thus different or conflicting requirements from different regions of the world can be supported. (Several regulatory groups around the world are still developing their views and requirements).
>>
> 
> Agreed on this point, although I think the charter could make it a little less ambiguous by saying "Development of robust security mechanisms is required . . .," that way it's not indicating that the actual mechanisms themselves will always be required.
> 
> Given that device identity will have to be shared in some circumstances, I would also add its protection to the end of the list of mechanisms: 
> 
> Development of security mechanisms is required to prevent:
> device identity spoofing, modification of device requests, modification
> of channel enablement information, impersonation of registered database
> services and unauthorized disclosure of a user's location and/or device identity.
> 
> Alissa
> 
>> It's not the time to dig deep into proposed solutions, just my opinion is the current proposed wording is an acceptable definition to allow a Work Group to get started defining the details.
>>
>> Regards,
>> Scott
>>
>> -----Original Message-----
>> From: paws-bounces@ietf.org [mailto:paws-bounces@ietf.org] On Behalf Of ext Stephen Farrell
>> Sent: Tuesday, April 19, 2011 4:28 PM
>> To: IETF-Discussion
>> Cc: paws@ietf.org; iesg@ietf.org
>> Subject: Re: [paws] WG Review: Protocol to Access White Space database (paws)
>>
>>
>> I think this is a good and timely thing for the IETF to do.
>>
>> One part of this where I think it might be useful to get
>> some broader input (which may have happened already, I'm not
>> sure) is the following:
>>
>> On 19/04/11 17:56, IESG Secretary wrote:
>>> The protocol must protect both the channel enablement process and the
>>> privacy of users. 
>>
>> That part is fine but it goes on to say:
>>
>>> Robust security mechanisms are required to prevent:
>>> device identity spoofing, modification of device requests, modification
>>> of channel enablement information, ...
>>
>> I'm told (and believe) this in response to (at least) US
>> FCC requirements that call for a device ID and sometimes
>> serial number to be (securely, for some value of securely)
>> sent with the query.
>>
>> Those appear to be real regulatory requirements in the
>> US, presumably so the regulator can stomp on someone who
>> messes about in the wrong spectrum at the wrong time.
>> (The link below [1] may be to the right or wrong bit of
>> those US regulations, I'm not at all sure, not being
>> from there;-)
>>
>> So my questions:
>>
>> Are there may be similar (or conflicting!) requirements
>> elsewhere?
>>
>> Does this bit of the charter text need changes to work
>> well for other regions?
>>
>> Separately, I'm not sure how to square those kinds of
>> regulatory requirements with protecting privacy where the
>> device is carried by a person and has some FCC device ID
>> (which lots do I guess) and the person might not want
>> the database operator to know who's asking. But I think
>> that's ok as something for the WG to figure out since
>> the charter already calls for respecting privacy.
>>
>> I'm more concerned in case e.g. some other regional regulation
>> called for this protocol to be completely anonymous or
>> something, in which case the current charter text might
>> be problematic.
>>
>> Cheers,
>> Stephen.
>>
>> [1]
>> http://ecfr.gpoaccess.gov/cgi/t/text/text-idx?c=ecfr&sid=3e9c322addf1f7e897d8c84a6c7aca78&rgn=div8&view=text&node=47:1.0.1.1.14.8.243.9&idno=47
>> _______________________________________________
>> paws mailing list
>> paws@ietf.org
>> https://www.ietf.org/mailman/listinfo/paws
>> _______________________________________________
>> Ietf mailing list
>> Ietf@ietf.org
>> https://www.ietf.org/mailman/listinfo/ietf
>>
> 
> 
> _______________________________________________
> Ietf mailing list
> Ietf@ietf.org
> https://www.ietf.org/mailman/listinfo/ietf
> 
>