[mile] Security alert reporting - the firstMILE
Robert Moskowitz <rgm-sec@htt-consult.com> Tue, 22 March 2016 15:38 UTC
Return-Path: <rgm-sec@htt-consult.com>
X-Original-To: mile@ietfa.amsl.com
Delivered-To: mile@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0EFA412D8D7 for <mile@ietfa.amsl.com>; Tue, 22 Mar 2016 08:38:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.202
X-Spam-Level:
X-Spam-Status: No, score=-4.202 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hqvalSVgmSnj for <mile@ietfa.amsl.com>; Tue, 22 Mar 2016 08:38:05 -0700 (PDT)
Received: from z9m9z.htt-consult.com (z9m9z.htt-consult.com [50.253.254.3]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0825912D889 for <mile@ietf.org>; Tue, 22 Mar 2016 08:38:02 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by z9m9z.htt-consult.com (Postfix) with ESMTP id 1E26162179 for <mile@ietf.org>; Tue, 22 Mar 2016 11:38:01 -0400 (EDT)
X-Virus-Scanned: amavisd-new at htt-consult.com
Received: from z9m9z.htt-consult.com ([127.0.0.1]) by localhost (z9m9z.htt-consult.com [127.0.0.1]) (amavisd-new, port 10024) with LMTP id gmXno2AWd4EI for <mile@ietf.org>; Tue, 22 Mar 2016 11:37:57 -0400 (EDT)
Received: from lx120e.htt-consult.com (unknown [192.168.160.20]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by z9m9z.htt-consult.com (Postfix) with ESMTPSA id D826A6217A for <mile@ietf.org>; Tue, 22 Mar 2016 11:37:50 -0400 (EDT)
To: mile@ietf.org
From: Robert Moskowitz <rgm-sec@htt-consult.com>
Message-ID: <56F166CC.4020103@htt-consult.com>
Date: Tue, 22 Mar 2016 11:37:48 -0400
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.5.0
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/mile/Rv3U6jyLPrL16ZOfZq4wT3jHrag>
Subject: [mile] Security alert reporting - the firstMILE
X-BeenThere: mile@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "Managed Incident Lightweight Exchange, IODEF extensions and RID exchanges" <mile.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mile>, <mailto:mile-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mile/>
List-Post: <mailto:mile@ietf.org>
List-Help: <mailto:mile-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mile>, <mailto:mile-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 22 Mar 2016 15:38:12 -0000
The MILE charter starts off with: "The Managed Incident Lightweight Exchange (MILE) working group develops standards to support computer and network security incident management" So even though further down it says: "The MILE WG is focused on two areas: IODEF, the data format and extensions to represent incident and indicator data, and RID, the policy and transport for structured data." I have been puzzled by the lack of a standardized security alert reporting process. After a few discussions and a lot of thought on the problem, I have come up with firstMILE: https://www.ietf.org/internet-drafts/draft-moskowitz-firstmile-00.txt Which proposes a sub/pub model including initial registration for security alerts reporting. At this point the draft is more a skeleton for hanging how the three components: Registration of security device to monitor(s). Subscription of monitors for specific reporting. Publication of security reports to subscribed monitors. I have covered some of the requirements for these components. I bring this to the MILE workgroup for: Is this something the MILE wg should talk on? And am I correct that currently security alert reporting is not covered within the IETF. How much coordination for this should there be with DOTS and I2NSF? Note that I have proposed a DOTS messaging protocol and parts of firstMILE overlap with i2rs. For the pub portion, I hold that the requirements align with the DOTS requirements, other than the bi-directional communications needs. Do others agree? If so, I have a DOTS draft: https://www.ietf.org/internet-drafts/draft-moskowitz-dots-ssls-02.txt DOTS Secure Session Layer Services This introduces a real session layer, something really not present in the IETF stack, that provides a set of services. SSLS and its services are laid out in: https://www.ietf.org/internet-drafts/draft-hares-i2nsf-ssls-00.txt Sue (and I) put the design for SSLS in i2nsf, as it is broadly applicable in a number of areas under i2nsf. Two other drafts that fit into this architecture are: https://www.ietf.org/internet-drafts/draft-moskowitz-sse-03.txt and https://www.ietf.org/internet-drafts/draft-moskowitz-gpcomp-00.txt SO..... I open the floor to discussion. I would be interested in how others see this part of the security defense environment. I am interested in how others see SLS and particularly SSLS and its use for firstMILE pub. I have a slot in the meeting to cover my work.
- Re: [mile] Security alert reporting - the firstMI… Robert Moskowitz
- [mile] Security alert reporting - the firstMILE Robert Moskowitz
- Re: [mile] Security alert reporting - the firstMI… Tony Rutkowski
- Re: [mile] Security alert reporting - the firstMI… Tony Rutkowski
- Re: [mile] Security alert reporting - the firstMI… Robert Moskowitz
- Re: [mile] Security alert reporting - the firstMI… Panos Kampanakis (pkampana)
- Re: [mile] Security alert reporting - the firstMI… Robert Moskowitz
- Re: [mile] Security alert reporting - the firstMI… Nancy Cam-Winget (ncamwing)
- Re: [mile] Security alert reporting - the firstMI… Robert Moskowitz
- Re: [mile] Security alert reporting - the firstMI… Takeshi Takahashi
- Re: [mile] Security alert reporting - the firstMI… Robert Moskowitz