Re: [Model-t] What are we trying to protect

Eric Rescorla <ekr@rtfm.com> Sun, 04 August 2019 09:10 UTC

Return-Path: <ekr@rtfm.com>
X-Original-To: model-t@ietfa.amsl.com
Delivered-To: model-t@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C72A112004F for <model-t@ietfa.amsl.com>; Sun, 4 Aug 2019 02:10:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=rtfm-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id L5iCJ8gsYOx1 for <model-t@ietfa.amsl.com>; Sun, 4 Aug 2019 02:10:28 -0700 (PDT)
Received: from mail-lf1-x12d.google.com (mail-lf1-x12d.google.com [IPv6:2a00:1450:4864:20::12d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 52AF712002E for <model-t@iab.org>; Sun, 4 Aug 2019 02:10:28 -0700 (PDT)
Received: by mail-lf1-x12d.google.com with SMTP id z15so51508648lfh.13 for <model-t@iab.org>; Sun, 04 Aug 2019 02:10:28 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rtfm-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=WFNDsFaO4QfIFDb8tSPAf4dTD4CjVhzacZ+FqKSAdns=; b=OMaJnHOAQzlmtnJdYTXz4kPg728Dt1A/yoH5RiYdsdL9tcxfukNGH/IL8hbXrE4b4n 04SY4PEqfp3g64zBtsYa82uOhL22hjVFemqsmLte0q3DuzgYHC7QeAi12sLeB4EjwUBQ 23cRus7DMsDmF8R4SIsHS+drYo2gtivvxys2NFHFujzrxuCkaT1LObRzGedo6L1JUw7k LRLJTJcdK55LtmjThYa0ZiUOYLyKHWjML+z88KVBgDWcgK8x46phhrmA17VXQgn86gw2 vn9pkGNZy/5H87tZ09l1PamWGYCurNnXDBzfVoQRk4puBADAuQ0MNHfB3AUCXREAntHp cAOg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=WFNDsFaO4QfIFDb8tSPAf4dTD4CjVhzacZ+FqKSAdns=; b=dIRkW3shFEZ34EcdWtaAi/Rlxqj85ZMOFBRzFftf13NQH7fgl1rJzFe7XbzLgnGgAd u/+AEqbaa1VdhPRMiIzvCDDGIppgYr5V9LkdHaxdFNLqpSNPmE0Cb6kMZ+Ywzs0nFgBB LJhaWw6yHt6DzS8aHSWO9L2Uno5OpYtRTCdPtX6UWRFfO8nxDuwhjOAM97J7tgklDez+ KwqjpPfJIG5qJ2vqv2CkJJsT+Iipat67S7IOx5Q5cOpPGFrgYzghj0GInLKhhygReuuv hXRp1wcSay0ySm2KWsos5eD54NOZmcbNrkYjLOrNR0urORBZJDI66SZ1mLQnNIifCb6a 5jbA==
X-Gm-Message-State: APjAAAV1/MPRwS+Muxy0ywON4lpcLKDLbWirvY1sgo3vRWnXZIJVxV+c NDyiOIX3UEIhpZmx4nlC1mbKNyIlv459Ia5Wt1I=
X-Google-Smtp-Source: APXvYqyHJ3CUGhNIksaBCyRFDEhJSYPbmQCD49jsdot2PFEqalf2zO276u9HKOMglFAVOA4idK2uAlSryIv8pUMoCU0=
X-Received: by 2002:a19:4a50:: with SMTP id x77mr23842377lfa.91.1564909826530; Sun, 04 Aug 2019 02:10:26 -0700 (PDT)
MIME-Version: 1.0
References: <c3a112ba-baab-1cb0-97ad-21ff9999a637@cs.tcd.ie> <29756028-95f1-e6e5-b3ea-562cbc635df0@sandelman.ca> <5ef15ad2-5b20-e871-0d01-17cf906051c1@cs.tcd.ie> <22633.1564768705@localhost> <e7c02d44-353f-406c-818e-06a2e49ee212@www.fastmail.com> <5879878A-7CEA-4030-BB72-108CC4122719@gmail.com> <d253231a-d35d-e7c9-e3ae-5c7d7915566e@bluepopcorn.net> <06F0AE14-4413-4022-A804-C1B58E2702CE@fugue.com> <52BAC141-CB25-4072-B556-6325912F1ADD@gmail.com> <9a1555ca-6699-75f1-683e-2a3a2a539a11@cs.tcd.ie> <fbb6866d-87af-abea-42b4-8bb45959ea6a@huitema.net> <A8ABBBFF-9967-4F3B-974F-2DC5953D5DD9@gmail.com> <CABcZeBOKnaa7t3Nc=uq4sB2OQ+uKp=+_LHqX3bBBmpy3RY3dCA@mail.gmail.com> <86157132-D401-4033-A72B-AD4859DB6696@lastpresslabel.com>
In-Reply-To: <86157132-D401-4033-A72B-AD4859DB6696@lastpresslabel.com>
From: Eric Rescorla <ekr@rtfm.com>
Date: Sun, 04 Aug 2019 02:09:50 -0700
Message-ID: <CABcZeBPBy+6W-Yg4vMF1aCyNkE7XAJ81HaM75hKa--gRnpUVbg@mail.gmail.com>
To: Dominique Lazanski <dml@lastpresslabel.com>
Cc: Bret Jordan <jordan.ietf@gmail.com>, Christian Huitema <huitema@huitema.net>, model-t@iab.org
Content-Type: multipart/alternative; boundary="00000000000050f2c1058f46f635"
Archived-At: <https://mailarchive.ietf.org/arch/msg/model-t/K80kE-Mryn02uZ0lWmNd49ACb9M>
Subject: Re: [Model-t] What are we trying to protect
X-BeenThere: model-t@iab.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Discussions of changes in Internet deployment patterns and their impact on the Internet threat model <model-t.iab.org>
List-Unsubscribe: <https://www.iab.org/mailman/options/model-t>, <mailto:model-t-request@iab.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/model-t/>
List-Post: <mailto:model-t@iab.org>
List-Help: <mailto:model-t-request@iab.org?subject=help>
List-Subscribe: <https://www.iab.org/mailman/listinfo/model-t>, <mailto:model-t-request@iab.org?subject=subscribe>
X-List-Received-Date: Sun, 04 Aug 2019 09:10:31 -0000

On Sun, Aug 4, 2019 at 12:14 AM Dominique Lazanski <dml@lastpresslabel.com>
wrote:

>
>
> On 4 Aug 2019, at 06:08, Eric Rescorla <ekr@rtfm.com> wrote:
>
> his seems like a reasonable problem statement for the overall problem of
> computer security, but not really for IETF.
>
>
> But computer security is Internet security. It is rare that ‘things’ are
> not connected to the Internet  (with the exception of intranets however the
> same type of devices are connected to both).
>
> If some attacks are initiated at the pint of ‘things’ in order to
> compromise the Internet I don’t see why this shouldn’t be in scope?
>

Well, I didn't say anything about "things" one way or the other.

However, my point is that while compromise of endpoints necessarily
negatively affects the Internet, actually protecting those endpoints
against compromise is outside the scope of the IETF. That's not to say it's
not important, it's just not IETF work. To provide two examples perhaps
closer to home:

- Even though compromise of the Web is bad for the Internet, the IETF has
largely punted the security of the Web itself to W3C and WHATWG.
- Compromise of the WebPKI would obviously be very bad for many protocols
the IETF has designed, but the management of the WebPKI is done by CABF,
not IETF.

-Ekr



> FWIW I think Christian and Bret’s emails outline issues that should be
> included in scope.
>
> To take a concrete example memory reading attacks like Spectre are a
> threat to user data and something that browser vendors spend a fair amount
> of energy working on, but they're mostly not in scope for IETF [0]. There's
> nothing wrong with that, it's just division of labor.
>
> -Ekr
>
> [0] I say "mostly" because (a) we need to take the security implications
> of these kinds of attacks in our protocol designs and (b) there might be
> some small pieces of IETF work like CORB, though that seems to be mostly
> being done elsewhere.
>
> On Sat, Aug 3, 2019 at 2:47 PM Bret Jordan <jordan.ietf@gmail.com> wrote:
>
>> Protection of end users’ data
>>
>> Protection of an organization’s data
>>
>> Protection of devices owned by an end user or an organization
>>
>> Protection of network equipment
>>
>> Protection of SCADA system
>>
>> Protection of critical infrastructure
>>
>> Protection of IoT and soon to be released 5G devices
>>
>> Protection of cost optimized controllers
>>
>>
>> The problem we have had in the past is we want to call this one of the
>> following, but each one does not encompass the full picture.
>> 1) Computer security
>> 2) Data security
>> 3) Information security
>> 4) Communication security
>> 5) Network security
>> 6) Application security
>> Etc, etc,
>>
>> So if you way we are just dealing with communication security or
>> information security we are missing a significant piece of the pie.
>>
>>
>> Thanks,
>> Bret
>> PGP Fingerprint: 63B4 FC53 680A 6B7D 1447  F2C0 74F8 ACAE 7415 0050
>> "Without cryptography vihv vivc ce xhrnrw, however, the only thing that
>> can not be unscrambled is an egg."
>>
>>
>> Reading this thread, I think that we are missing a step. We cannot
>> define attacks without defining first the assets that need to be
>> protected.. Different actors probably have different views on that, such
>> as:
>>
>> 1) Continuous operation of the Internet
>>
>> 2) Continuous operation of a specific Internet provider
>>
>> 3) Continuous availability of an Internet Service
>>
>> 4) Continuous connectivity for a given user
>>
>> 5) Protection of databases used by services and enterprises
>>
>> 6) Protection of the personal data of users
>>
>> Do we have agreement on what we are trying to protect?
>>
>> -- Christian Huitema
>>
>>
>> --
>> Model-t mailing list
>> Model-t@iab.org
>> https://www.iab.org/mailman/listinfo/model-t
>>
>>
>> --
>> Model-t mailing list
>> Model-t@iab.org
>> https://www.iab.org/mailman/listinfo/model-t
>>
> --
> Model-t mailing list
> Model-t@iab.org
> https://www.iab.org/mailman/listinfo/model-t
>
>