Re: [Model-t] model-t@iab.org list description

Bret Jordan <jordan.ietf@gmail.com> Sat, 03 August 2019 17:39 UTC

Return-Path: <jordan.ietf@gmail.com>
X-Original-To: model-t@ietfa.amsl.com
Delivered-To: model-t@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7AA0A120058 for <model-t@ietfa.amsl.com>; Sat, 3 Aug 2019 10:39:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.997
X-Spam-Level:
X-Spam-Status: No, score=-1.997 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id d04j58Hqa3UZ for <model-t@ietfa.amsl.com>; Sat, 3 Aug 2019 10:39:47 -0700 (PDT)
Received: from mail-pf1-x435.google.com (mail-pf1-x435.google.com [IPv6:2607:f8b0:4864:20::435]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6E51D12000E for <model-t@iab.org>; Sat, 3 Aug 2019 10:39:47 -0700 (PDT)
Received: by mail-pf1-x435.google.com with SMTP id y15so37590869pfn.5 for <model-t@iab.org>; Sat, 03 Aug 2019 10:39:47 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:message-id:mime-version:subject:date:in-reply-to:cc:to :references; bh=/MOeg0PpkhEd6klNdSUHV9nUxj4YU8jl8FAxk4WqWLY=; b=tkbCWXAtZOAaLdSyVHlvpwzO6QgyY8GhmoBnhfD1e31YRfpmdMV2dixM17o/r8sy4Y +KVxfXFI0PRzqMHV2Zga/XMOg/q0SRFmS0zhecvIt5lGPy0xuRly79JrQJ9vJWdVmKui iuywDLxlbsEe1znfPCvcVqTsy/yr6+Vp9QDEw7tNDwB5XgLxrrp0LIXhEw28Svk5S6Mq hAzqMd37CNLHFMVVWleM8f6DlsttZSJun/OJ6VXwSxIKiZBm7VRqPRy6VmEGdZ0oFibK zmF43mh+6DCpvni9X/TPXkfrQFSbLf/gfMhIdOgHBZhaaNV383UMDaPUeBqIfabET+eN p8Iw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:message-id:mime-version:subject:date :in-reply-to:cc:to:references; bh=/MOeg0PpkhEd6klNdSUHV9nUxj4YU8jl8FAxk4WqWLY=; b=hiEypOX5aDLXo3rKgGaAYXu01VvgytFGOnNRLmDe0UIGZUOtOOvo4YWLqs16UQzJeq HWmtGValf7TanzhBd6zrnP3H56Xz8KG7xQsyyDZXM7xiT9LSYdZPJyeKBuoQcsLCYHHr ap/H2atr2u62grHvk50P+PgppFGiFxHS2ykgxh2gAw87lat3uwhpwAm/Xwaz02PPVeJY Dn9biEiHGMl3L4hkbr/D0SxGxSSxltkQTQ9cCZBtp+0Dsz4kPHKeKJcB+fOLuiRHSQMo MEu7M7FTmA86hpJRywqobnmgzfwnVuo1zPRiJDsD9NBtHo4Z43pMy1k/OyYoW16fojeu Rj6A==
X-Gm-Message-State: APjAAAVlKS6pzaM4BxUhFhEJ6DghftfcvKwqa9EsJ2SGPPRxlsleiugG vCpE43YDQUHt7OQofLfiTOq/WoEf
X-Google-Smtp-Source: APXvYqycJxQXvmL2mInvQZojoAV+HPXbTK9iVMMilAMZjiZTQ4cm63ceKWZpIra0GvYTk3lctsaKPA==
X-Received: by 2002:a63:d04e:: with SMTP id s14mr123395013pgi.189.1564853986922; Sat, 03 Aug 2019 10:39:46 -0700 (PDT)
Received: from [10.128.64.149] ([136.60.227.81]) by smtp.gmail.com with ESMTPSA id b30sm110744251pfr.117.2019.08.03.10.39.45 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Sat, 03 Aug 2019 10:39:46 -0700 (PDT)
From: Bret Jordan <jordan.ietf@gmail.com>
Message-Id: <52BAC141-CB25-4072-B556-6325912F1ADD@gmail.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_F6756757-AC73-4141-B9B2-12AD9A0D12E2"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
Date: Sat, 03 Aug 2019 11:39:43 -0600
In-Reply-To: <06F0AE14-4413-4022-A804-C1B58E2702CE@fugue.com>
Cc: Jim Fenton <fenton@bluepopcorn.net>, model-t@iab.org
To: Ted Lemon <mellon@fugue.com>
References: <c3a112ba-baab-1cb0-97ad-21ff9999a637@cs.tcd.ie> <29756028-95f1-e6e5-b3ea-562cbc635df0@sandelman.ca> <5ef15ad2-5b20-e871-0d01-17cf906051c1@cs.tcd.ie> <22633.1564768705@localhost> <e7c02d44-353f-406c-818e-06a2e49ee212@www.fastmail.com> <5879878A-7CEA-4030-BB72-108CC4122719@gmail.com> <d253231a-d35d-e7c9-e3ae-5c7d7915566e@bluepopcorn.net> <06F0AE14-4413-4022-A804-C1B58E2702CE@fugue.com>
X-Mailer: Apple Mail (2.3445.104.11)
Archived-At: <https://mailarchive.ietf.org/arch/msg/model-t/15VogWpc7qgLd9sNODlyTKAPkK4>
Subject: Re: [Model-t] model-t@iab.org list description
X-BeenThere: model-t@iab.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Discussions of changes in Internet deployment patterns and their impact on the Internet threat model <model-t.iab.org>
List-Unsubscribe: <https://www.iab.org/mailman/options/model-t>, <mailto:model-t-request@iab.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/model-t/>
List-Post: <mailto:model-t@iab.org>
List-Help: <mailto:model-t-request@iab.org?subject=help>
List-Subscribe: <https://www.iab.org/mailman/listinfo/model-t>, <mailto:model-t-request@iab.org?subject=subscribe>
X-List-Received-Date: Sat, 03 Aug 2019 17:39:49 -0000

Ted,

This is not jargon, this is the language that is used in this space. If we are going to write a document or come up with text to help improve a document that deals with this domain, then we should probably know and understand the domain. Attacks against network connected devices (endpoints, network equipment, IoT devices, etc) are all in scope.  So when we work on designing solutions for interconnected systems, we need to understand this space.  Designing technologies without taking this space into consideration is very problematic.  

We have many in this group that work in this space and have very detailed knowledge of it.  If you have specific questions, I am sure many of us would be willing to help fill in the gaps.  

IMO, the key to our work is to help improve the IETF’s understanding of risks, threat actor TTPs, attack surface, etc.  This space has evolved a lot recently, and has definitely changed since 3552 was first written.  Further, given the upcoming market shift to 5G enabled devices and its changing attack surface, this work is prudent at this time.  Gone are the days of “Escargot Model” (a term I started using back in the late 80s / early 90s) of security. 

Thanks,
Bret
PGP Fingerprint: 63B4 FC53 680A 6B7D 1447  F2C0 74F8 ACAE 7415 0050
"Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg."

> On Aug 3, 2019, at 11:12 AM, Ted Lemon <mellon@fugue.com> wrote:
> 
> Yes. It would also be good to avoid domain-specific jargon. Presumably the goal here is to provide something of value to the whole community, not something that only people who are familiar with a very specific vernacular can use. 
> 
> Of course, I might be mistaken about the intended scope of this work, so if this sounds wrong it would be good to get consensus on that. 
> 
> Sent from my iPhone
> 
>> On Aug 3, 2019, at 12:52 PM, Jim Fenton <fenton@bluepopcorn.net> wrote:
>> 
>>> On 8/2/19 9:24 PM, Bret Jordan wrote:
>>> 
>>> To borrow your words…  “If we are going to take security seriously”…
>>> we need to understand and document the full attack surface.  So let
>>> us start listing them out.  Here are four.
>>> 
>>> 
>>> Attack: Active remote attack
>>> Exposure: Full compromise of system and data
>>> Client Knowledge: Potential indicators may be visible
>>> Protection Possibilities: Deploy both client and network level protections
>>> Headwinds: Client based protections are usually inadequate
>>> Severity: High
>>> Kill-Chain Phase: Lateral Movement
>> 
>> [etc.]
>> 
>> Perhaps we need to decide what we consider a threat model to be. I see
>> Bret's list as a collection of specific attacks (tactics), while I
>> consider a threat model to be at a higher level than that, e.g., whether
>> nation-states, or supply chain threats, should be part of that model.
>> 
>> When I was working on the draft that became RFC 4686 (DKIM Threat
>> Analysis), Russ Housley gave me some very good coaching about how to
>> structure that. He suggested that it should describe:
>> 
>> - The nature and location of the bad actors
>> - What the bad actors' capabilities are
>> - What they intend to accomplish via their attacks
>> 
>> How do we want to define threat model?
>> 
>> -Jim
>> 
>> 
>> 
>> -- 
>> Model-t mailing list
>> Model-t@iab.org
>> https://www.iab.org/mailman/listinfo/model-t