[Model-t] What are we trying to protect
Bret Jordan <jordan.ietf@gmail.com> Sat, 03 August 2019 21:47 UTC
Return-Path: <jordan.ietf@gmail.com>
X-Original-To: model-t@ietfa.amsl.com
Delivered-To: model-t@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E081E120144 for <model-t@ietfa.amsl.com>; Sat, 3 Aug 2019 14:47:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.997
X-Spam-Level:
X-Spam-Status: No, score=-1.997 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id t-KIJBP_-RwG for <model-t@ietfa.amsl.com>; Sat, 3 Aug 2019 14:47:18 -0700 (PDT)
Received: from mail-pf1-x429.google.com (mail-pf1-x429.google.com [IPv6:2607:f8b0:4864:20::429]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D7575120143 for <model-t@iab.org>; Sat, 3 Aug 2019 14:47:17 -0700 (PDT)
Received: by mail-pf1-x429.google.com with SMTP id f17so33737269pfn.6 for <model-t@iab.org>; Sat, 03 Aug 2019 14:47:17 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:message-id:mime-version:subject:date:in-reply-to:cc:to :references; bh=Mjz8+hHXfwh/Oeq6GFmXb0yVL6NpstwW49e5hKNsaHk=; b=G2I6Cd+k52CxDI7FwPdxUOCtmi12CaMRtvUs7StuEMKSPqOQFX7XufYHKKtSYXxzRV ymnajHuyziVKknUlZkJ2e7MqKEm6Ij/4XZ7ADDNtfZel/w9fCJDgvp60+G15hvp/ewOJ JJCRhmwrjY1JJu3shG6XKj8A8GZty1SLskSMOLCuNJlIby+sZH/xF1BnI7HPttLfp5F9 dNXfZvLL451ZwAn5fAcgYdmAaQLoyAtMlSbWhi+0S5O6+NVcjTo/I+2P3ZpK4enxOEuA 8P/wqsCI6ytyT6V1ntgrIHJ5rE6iH7Wz752CjNPZwuiPHgnlxkAj8QT0HU24owRxjZtr pfAA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:message-id:mime-version:subject:date :in-reply-to:cc:to:references; bh=Mjz8+hHXfwh/Oeq6GFmXb0yVL6NpstwW49e5hKNsaHk=; b=U87QcExvEa8ePu0DO3ZxnfpjZHGBmaseLxoCr6loMc+GBbZ69pmsrJRSYnWc6Gn6Tm AE96wTDcR6osBatft2PB47zWc7gLEvSGmV5+BDFHvhPbEyJOPexxTmfY9o+QaB/PxdEE UcBsDOLnILTBeNCnPDupV3cJMHxdyxykp2Y0xrazYHy1x9OwHSQd3vVV3EXoLtYaKE4p FHrimVjmX6Haxss/GZruMobsxREoqAd6m4xfe/sYbR4tGfRo5co4vjpQhUKgJC78axr3 Pm+iQ0tS9kIDjfxLObEXWgAWsZT9XyGuGlGoboX0iLWHyFAGSyADt5cZy55RLl1t9E4e ZZjQ==
X-Gm-Message-State: APjAAAXe09wSvP46J24R6eiHdLAiEReHYBsYltpjKBuKecXooGf4cq8O f0QSCFSWnNLjQEOgLW261Wo=
X-Google-Smtp-Source: APXvYqxkq2/hmdOjPm7QwtiMYYMLM61Qqvud/JfcHbK8sY1aiziuEQOMznsIljRRq1Cmck/EQdp5nQ==
X-Received: by 2002:a17:90a:26ef:: with SMTP id m102mr10825920pje.50.1564868837201; Sat, 03 Aug 2019 14:47:17 -0700 (PDT)
Received: from [10.128.64.149] ([136.60.227.81]) by smtp.gmail.com with ESMTPSA id q63sm103051269pfb.81.2019.08.03.14.47.15 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Sat, 03 Aug 2019 14:47:16 -0700 (PDT)
From: Bret Jordan <jordan.ietf@gmail.com>
Message-Id: <A8ABBBFF-9967-4F3B-974F-2DC5953D5DD9@gmail.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_942A8948-8254-4534-B6EB-2AE2677EBF4D"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
Date: Sat, 03 Aug 2019 15:47:13 -0600
In-Reply-To: <fbb6866d-87af-abea-42b4-8bb45959ea6a@huitema.net>
Cc: model-t@iab.org
To: Christian Huitema <huitema@huitema.net>
References: <c3a112ba-baab-1cb0-97ad-21ff9999a637@cs.tcd.ie> <29756028-95f1-e6e5-b3ea-562cbc635df0@sandelman.ca> <5ef15ad2-5b20-e871-0d01-17cf906051c1@cs.tcd.ie> <22633.1564768705@localhost> <e7c02d44-353f-406c-818e-06a2e49ee212@www.fastmail.com> <5879878A-7CEA-4030-BB72-108CC4122719@gmail.com> <d253231a-d35d-e7c9-e3ae-5c7d7915566e@bluepopcorn.net> <06F0AE14-4413-4022-A804-C1B58E2702CE@fugue.com> <52BAC141-CB25-4072-B556-6325912F1ADD@gmail.com> <9a1555ca-6699-75f1-683e-2a3a2a539a11@cs.tcd.ie> <fbb6866d-87af-abea-42b4-8bb45959ea6a@huitema.net>
X-Mailer: Apple Mail (2.3445.104.11)
Archived-At: <https://mailarchive.ietf.org/arch/msg/model-t/OBo_5RG5o7NLkZKxdI-y1d5JxwA>
Subject: [Model-t] What are we trying to protect
X-BeenThere: model-t@iab.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Discussions of changes in Internet deployment patterns and their impact on the Internet threat model <model-t.iab.org>
List-Unsubscribe: <https://www.iab.org/mailman/options/model-t>, <mailto:model-t-request@iab.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/model-t/>
List-Post: <mailto:model-t@iab.org>
List-Help: <mailto:model-t-request@iab.org?subject=help>
List-Subscribe: <https://www.iab.org/mailman/listinfo/model-t>, <mailto:model-t-request@iab.org?subject=subscribe>
X-List-Received-Date: Sat, 03 Aug 2019 21:47:20 -0000
Protection of end users’ data Protection of an organization’s data Protection of devices owned by an end user or an organization Protection of network equipment Protection of SCADA system Protection of critical infrastructure Protection of IoT and soon to be released 5G devices Protection of cost optimized controllers The problem we have had in the past is we want to call this one of the following, but each one does not encompass the full picture. 1) Computer security 2) Data security 3) Information security 4) Communication security 5) Network security 6) Application security Etc, etc, So if you way we are just dealing with communication security or information security we are missing a significant piece of the pie. Thanks, Bret PGP Fingerprint: 63B4 FC53 680A 6B7D 1447 F2C0 74F8 ACAE 7415 0050 "Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg." >> > Reading this thread, I think that we are missing a step. We cannot > define attacks without defining first the assets that need to be > protected. Different actors probably have different views on that, such as: > > 1) Continuous operation of the Internet > > 2) Continuous operation of a specific Internet provider > > 3) Continuous availability of an Internet Service > > 4) Continuous connectivity for a given user > > 5) Protection of databases used by services and enterprises > > 6) Protection of the personal data of users > > Do we have agreement on what we are trying to protect? > > -- Christian Huitema > > > -- > Model-t mailing list > Model-t@iab.org > https://www.iab.org/mailman/listinfo/model-t
- [Model-t] model-t@iab.org list description Stephen Farrell
- Re: [Model-t] model-t@iab.org list description Michael Richardson
- Re: [Model-t] model-t@iab.org list description Stephen Farrell
- Re: [Model-t] model-t@iab.org list description Stephen Farrell
- Re: [Model-t] model-t@iab.org list description Joseph Lorenzo Hall
- Re: [Model-t] model-t@iab.org list description Michael Richardson
- Re: [Model-t] model-t@iab.org list description Martin Thomson
- Re: [Model-t] model-t@iab.org list description Bret Jordan
- Re: [Model-t] model-t@iab.org list description Stephen Farrell
- Re: [Model-t] model-t@iab.org list description Stephen Farrell
- Re: [Model-t] model-t@iab.org list description Eric Rescorla
- Re: [Model-t] model-t@iab.org list description Bret Jordan
- Re: [Model-t] model-t@iab.org list description Stephen Farrell
- Re: [Model-t] model-t@iab.org list description Jim Fenton
- Re: [Model-t] model-t@iab.org list description Ted Lemon
- Re: [Model-t] model-t@iab.org list description Bret Jordan
- Re: [Model-t] model-t@iab.org list description Bret Jordan
- Re: [Model-t] model-t@iab.org list description Bret Jordan
- Re: [Model-t] model-t@iab.org list description Stephen Farrell
- Re: [Model-t] model-t@iab.org list description Christian Huitema
- Re: [Model-t] model-t@iab.org list description Watson Ladd
- Re: [Model-t] model-t@iab.org list description Carsten Bormann
- Re: [Model-t] model-t@iab.org list description Ted Lemon
- [Model-t] What are we trying to protect Bret Jordan
- Re: [Model-t] model-t@iab.org list description Bret Jordan
- Re: [Model-t] model-t@iab.org list description Watson Ladd
- Re: [Model-t] What are we trying to protect Eric Rescorla
- Re: [Model-t] What are we trying to protect Dominique Lazanski
- Re: [Model-t] What are we trying to protect Eric Rescorla
- Re: [Model-t] What are we trying to protect Dominique Lazanski
- Re: [Model-t] What are we trying to protect Stephen Farrell
- Re: [Model-t] What are we trying to protect Eric Rescorla
- Re: [Model-t] What are we trying to protect Bret Jordan
- Re: [Model-t] What are we trying to protect Watson Ladd
- Re: [Model-t] What are we trying to protect Ted Lemon
- Re: [Model-t] What are we trying to protect Dominique Lazanski
- Re: [Model-t] What are we trying to protect Bret Jordan
- Re: [Model-t] What are we trying to protect Bret Jordan
- Re: [Model-t] What are we trying to protect Ted Lemon
- Re: [Model-t] What are we trying to protect Stephen Farrell
- Re: [Model-t] What are we trying to protect Bret Jordan
- Re: [Model-t] What are we trying to protect Bret Jordan
- Re: [Model-t] What are we trying to protect Stephen Farrell
- Re: [Model-t] What are we trying to protect Bret Jordan
- Re: [Model-t] What are we trying to protect Stephen Farrell
- Re: [Model-t] What are we trying to protect Christian Huitema
- Re: [Model-t] What are we trying to protect Ted Lemon
- [Model-t] Primer Bret Jordan
- Re: [Model-t] What are we trying to protect Bret Jordan
- Re: [Model-t] What are we trying to protect Christian Huitema
- Re: [Model-t] Primer Bret Jordan
- Re: [Model-t] What are we trying to protect Bret Jordan
- Re: [Model-t] What are we trying to protect Watson Ladd
- Re: [Model-t] What are we trying to protect Thomas Hardjono
- Re: [Model-t] What are we trying to protect Ira McDonald
- Re: [Model-t] What are we trying to protect Thomas Hardjono
- Re: [Model-t] What are we trying to protect Watson Ladd
- Re: [Model-t] What are we trying to protect Thomas Hardjono