Re: [Model-t] What are we trying to protect

Christian Huitema <huitema@huitema.net> Mon, 05 August 2019 05:52 UTC

Return-Path: <huitema@huitema.net>
X-Original-To: model-t@ietfa.amsl.com
Delivered-To: model-t@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ECDEE120134 for <model-t@ietfa.amsl.com>; Sun, 4 Aug 2019 22:52:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level:
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UsOVRh-vvbss for <model-t@ietfa.amsl.com>; Sun, 4 Aug 2019 22:52:29 -0700 (PDT)
Received: from mx36-out10.antispamcloud.com (mx36-out10.antispamcloud.com [209.126.121.30]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 035C0120059 for <model-t@iab.org>; Sun, 4 Aug 2019 22:52:28 -0700 (PDT)
Received: from xse199.mail2web.com ([66.113.196.199] helo=xse.mail2web.com) by mx35.antispamcloud.com with esmtp (Exim 4.89) (envelope-from <huitema@huitema.net>) id 1huVuz-0006Sm-2f for model-t@iab.org; Mon, 05 Aug 2019 07:52:26 +0200
Received: from xsmtp21.mail2web.com (unknown [10.100.68.60]) by xse.mail2web.com (Postfix) with ESMTPS id 4626Nj6WZVz2h3y for <model-t@iab.org>; Sun, 4 Aug 2019 22:52:21 -0700 (PDT)
Received: from [10.5.2.17] (helo=xmail07.myhosting.com) by xsmtp21.mail2web.com with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:256) (Exim 4.92) (envelope-from <huitema@huitema.net>) id 1huVuv-0004GA-Pl for model-t@iab.org; Sun, 04 Aug 2019 22:52:21 -0700
Received: (qmail 28546 invoked from network); 5 Aug 2019 05:52:21 -0000
Received: from unknown (HELO [192.168.1.103]) (Authenticated-user:_huitema@huitema.net@[172.58.46.251]) (envelope-sender <huitema@huitema.net>) by xmail07.myhosting.com (qmail-ldap-1.03) with ESMTPA for <model-t@iab.org>; 5 Aug 2019 05:52:21 -0000
To: Eric Rescorla <ekr@rtfm.com>, Dominique Lazanski <dml@lastpresslabel.com>
Cc: Bret Jordan <jordan.ietf@gmail.com>, model-t@iab.org
References: <c3a112ba-baab-1cb0-97ad-21ff9999a637@cs.tcd.ie> <29756028-95f1-e6e5-b3ea-562cbc635df0@sandelman.ca> <5ef15ad2-5b20-e871-0d01-17cf906051c1@cs.tcd.ie> <22633.1564768705@localhost> <e7c02d44-353f-406c-818e-06a2e49ee212@www.fastmail.com> <5879878A-7CEA-4030-BB72-108CC4122719@gmail.com> <d253231a-d35d-e7c9-e3ae-5c7d7915566e@bluepopcorn.net> <06F0AE14-4413-4022-A804-C1B58E2702CE@fugue.com> <52BAC141-CB25-4072-B556-6325912F1ADD@gmail.com> <9a1555ca-6699-75f1-683e-2a3a2a539a11@cs.tcd.ie> <fbb6866d-87af-abea-42b4-8bb45959ea6a@huitema.net> <A8ABBBFF-9967-4F3B-974F-2DC5953D5DD9@gmail.com> <CABcZeBOKnaa7t3Nc=uq4sB2OQ+uKp=+_LHqX3bBBmpy3RY3dCA@mail.gmail.com> <86157132-D401-4033-A72B-AD4859DB6696@lastpresslabel.com> <CABcZeBPBy+6W-Yg4vMF1aCyNkE7XAJ81HaM75hKa--gRnpUVbg@mail.gmail.com>
From: Christian Huitema <huitema@huitema.net>
Openpgp: preference=signencrypt
Autocrypt: addr=huitema@huitema.net; prefer-encrypt=mutual; keydata= mQENBFIRX8gBCAC26usy/Ya38IqaLBSu33vKD6hP5Yw390XsWLaAZTeQR64OJEkoOdXpvcOS HWfMIlD5s5+oHfLe8jjmErFAXYJ8yytPj1fD2OdSKAe1TccUBiOXT8wdVxSr5d0alExVv/LO I/vA2aU1TwOkVHKSapD7j8/HZBrqIWRrXUSj2f5n9tY2nJzG9KRzSG0giaJWBfUFiGb4lvsy IaCaIU0YpfkDDk6PtK5YYzuCeF0B+O7N9LhDu/foUUc4MNq4K3EKDPb2FL1Hrv0XHpkXeMRZ olpH8SUFUJbmi+zYRuUgcXgMZRmZFL1tu6z9h6gY4/KPyF9aYot6zG28Qk/BFQRtj7V1ABEB AAG0J0NocmlzdGlhbiBIdWl0ZW1hIDxodWl0ZW1hQGh1aXRlbWEubmV0PokBOQQTAQIAIwUC UhFfyAIbLwcLCQgHAwIBBhUIAgkKCwQWAgMBAh4BAheAAAoJEJNDCbJVyA1yhbYH/1ud6x6m VqGIp0JcZUfSQO8w+TjugqxCyGNn+w/6Qb5O/xENxNQ4HaMQ5uSRK9n8WKKDDRSzwZ4syKKf wbkfj05vgFxrjCynVbm1zs2X2aGXh+PxPL/WHUaxzEP7KjYbLtCUZDRzOOrm+0LMktngT/k3 6+EZoLEM52hwwpIAzJoscyEz7QfqMOZtFm6xQnlvDQeIrHx0KUvwo/vgDLK3SuruG1CSHcR0 D24kEEUa044AIUKBS3b0b8AR7f6mP2NcnLpdsibtpabi9BzqAidcY/EjTaoea46HXALk/eJd 6OLkLE6UQe1PPzQC4jB7rErX2BxnSkHDw50xMgLRcl5/b1a5AQ0EUhFfyAEIAKp7Cp8lqKTV CC9QiAf6QTIjW+lie5J44Ad++0k8gRgANZVWubQuCQ71gxDWLtxYfFkEXjG4TXV/MUtnOliG 5rc2E+ih6Dg61Y5PQakm9OwPIsOx+2R+iSW325ngln2UQrVPgloO83QiUoi7mBJPbcHlxkhZ bd3+EjFxSLIQogt29sTcg2oSh4oljUpz5niTt69IOfZx21kf29NfDE+Iw56gfrxI2ywZbu5o G+d0ZSp0lsovygpk4jK04fDTq0vxjEU5HjPcsXC4CSZdq5E2DrF4nOh1UHkHzeaXdYR2Bn1Y wTePfaHBFlvQzI+Li/Q6AD/uxbTM0vIcsUxrv3MNHCUAEQEAAYkCPgQYAQIACQUCUhFfyAIb LgEpCRCTQwmyVcgNcsBdIAQZAQIABgUCUhFfyAAKCRC22tOSFDh1UOlBB/94RsCJepNvmi/c YiNmMnm0mKb6vjv43OsHkqrrCqJSfo95KHyl5Up4JEp8tiJMyYT2mp4IsirZHxz/5lqkw9Az tcGAF3GlFsj++xTyD07DXlNeddwTKlqPRi/b8sppjtWur6Pm+wnAHp0mQ7GidhxHccFCl65w uT7S/ocb1MjrTgnAMiz+x87d48n1UJ7yIdI41Wpg2XFZiA9xPBiDuuoPwFj14/nK0elV5Dvq 4/HVgfurb4+fd74PV/CC/dmd7hg0ZRlgnB5rFUcFO7ywb7/TvICIIaLWcI42OJDSZjZ/MAzz BeXm263lHh+kFxkh2LxEHnQGHCHGpTYyi4Z3dv03HtkH/1SI8joQMQq00Bv+RdEbJXfEExrT u4gtdZAihwvy97OPA2nCdTAHm/phkzryMeOaOztI4PS8u2Ce5lUB6P/HcGtK/038KdX5MYST Fn8KUDt4o29bkv0CUXwDzS3oTzPNtGdryBkRMc9b+yn9+AdwFEH4auhiTQXPMnl0+G3nhKr7 jvzVFJCRif3OAhEm4vmBNDE3uuaXFQnbK56GJrnqVN+KX5Z3M7X3fA8UcVCGOEHXRP/aubiw Ngawj0V9x+43kUapFp+nF69R53UI65YtJ95ec4PTO/Edvap8h1UbdEOc4+TiYwY1TBuIKltY 1cnrjgAWUh/Ucvr++/KbD9tD6C8=
Message-ID: <f8782dce-970a-fb11-372b-bc122878308b@huitema.net>
Date: Sun, 04 Aug 2019 22:52:19 -0700
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.8.0
MIME-Version: 1.0
In-Reply-To: <CABcZeBPBy+6W-Yg4vMF1aCyNkE7XAJ81HaM75hKa--gRnpUVbg@mail.gmail.com>
Content-Type: multipart/alternative; boundary="------------45800DA9E1445904AA33E28E"
Content-Language: en-US
X-Originating-IP: 66.113.196.199
X-Spampanel-Domain: xsmtpout.mail2web.com
X-Spampanel-Username: 66.113.196.199/32
Authentication-Results: antispamcloud.com; auth=pass smtp.auth=66.113.196.199/32@xsmtpout.mail2web.com
X-Spampanel-Outgoing-Class: unsure
X-Spampanel-Outgoing-Evidence: Combined (0.15)
X-Recommended-Action: accept
X-Filter-ID: Mvzo4OR0dZXEDF/gcnlw0QR3kh8pms4IGrDTloUGIkypSDasLI4SayDByyq9LIhVUZbR67CQ7/vm /hHDJU4RXkTNWdUk1Ol2OGx3IfrIJKywOmJyM1qr8uRnWBrbSAGDXz6Yli32IJdAuJ3ivsC2SsRX qYbtEQV1z/L435ZRxFQCa0LOvdOFtO2Z/KHFaYV++rYZvu7UEJiU3s27VgKHO7lwS3dBJTnTxDoD vBGGxpgwWbxrOZCJSMpTl/yE2fo2JEfuJ9gSFfTKKwEFu+5zXgZ6weYgSzquK2hxskqXvy8woCTx LKweTbuJ+19zsyHVGVmhMAaQ/AfCRwRe7yHm5oY+NYmsSGn+svMubxnbgm1cr18FZBEPC2/c16Xd 7sC9aC4xteE1WLqGS9YoqrsZ2DyteN0e+ECCv9/f+GPymkgDVo7QBKA4MctKq4ifYPcXFRL2K3LA EfDXVOdt7wDbuhdxf5Dwg9wMBX5ckCo48ayVGvgdM/14NhEhsQ0jllqEE9ykbJ7I9co1MAEE3ruN Xsm8UJsAPvDcVSKtDCYkioPY5Qx4fJOk03R5fJtf/Dv/dkIzS7m4GUpXCY1Y3j3ilf/1/CIOWq29 UgEgDh1b6yeWVWdV2W7hq7U7UWTh8BhYKFm0DUyZgqQosPMTO+6tlmd/2OQ9AkFsCsUY9+pkOFsM 7OYFXYdC3tRq275m/U3VdWUm2m6mst+P8CxH8HAlP7dCp3Zd9clP8wSiJZWbJCj+xRrjVmRxpGtS cvUmgj1Lr01izUyD8wjVNGx1nPmAyl2jZAOanSBpz6Rja2u/0jIF0vKKEbSiCs8bR9dBdwfMGKWH 9GPtOJAg3m9xzvVGh/ysta6u1iHEyuS7GD1uvcoc+Nxrih3bPtw6kmziz7oqJOYIJd4MvQ0Nf4Ec bvHO1diDanHV9KirFAIIecsyj+YNTo81GR+jDXFsz/ZQnbbTizvwlZsrbltGiZoUh+c+5pFVgpT1 b21uZVckGp0ccOa2XhkGbmsUNPNkere1WheNsVXmhO8BzADiszcWR9bz/SDtF09JpSbuuCeiIDK0 C/0=
X-Report-Abuse-To: spam@quarantine9.antispamcloud.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/model-t/T5p4v8jez822H9ps8BMC_YbcnyY>
Subject: Re: [Model-t] What are we trying to protect
X-BeenThere: model-t@iab.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Discussions of changes in Internet deployment patterns and their impact on the Internet threat model <model-t.iab.org>
List-Unsubscribe: <https://www.iab.org/mailman/options/model-t>, <mailto:model-t-request@iab.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/model-t/>
List-Post: <mailto:model-t@iab.org>
List-Help: <mailto:model-t-request@iab.org?subject=help>
List-Subscribe: <https://www.iab.org/mailman/listinfo/model-t>, <mailto:model-t-request@iab.org?subject=subscribe>
X-List-Received-Date: Mon, 05 Aug 2019 05:52:32 -0000

On 8/4/2019 2:09 AM, Eric Rescorla wrote:

> On Sun, Aug 4, 2019 at 12:14 AM Dominique Lazanski
> <dml@lastpresslabel.com <mailto:dml@lastpresslabel.com>> wrote:
>
>
>
>     On 4 Aug 2019, at 06:08, Eric Rescorla <ekr@rtfm.com
>     <mailto:ekr@rtfm.com>> wrote:
>
>>     his seems like a reasonable problem statement for the overall
>>     problem of computer security, but not really for IETF.
>>
>
>     But computer security is Internet security. It is rare that
>     ‘things’ are not connected to the Internet  (with the exception of
>     intranets however the same type of devices are connected to both). 
>
>     If some attacks are initiated at the pint of ‘things’ in order to
>     compromise the Internet I don’t see why this shouldn’t be in scope?
>
>
> Well, I didn't say anything about "things" one way or the other.
>
> However, my point is that while compromise of endpoints necessarily
> negatively affects the Internet, actually protecting those endpoints
> against compromise is outside the scope of the IETF. That's not to say
> it's not important, it's just not IETF work. To provide two examples
> perhaps closer to home:
>
> - Even though compromise of the Web is bad for the Internet, the IETF
> has largely punted the security of the Web itself to W3C and WHATWG.
> - Compromise of the WebPKI would obviously be very bad for many
> protocols the IETF has designed, but the management of the WebPKI is
> done by CABF, not IETF.

In my previous job, we were routinely doing lots of threat modelling. (I
you think of smart-ass comments about target rich environments you
should rather consider the rich target that we have in front of us.) The
main lesson is that you should be organized, and not just rush to
listing a bunch of attacks. The steps we pretty much agreed on were
relatively simple:

1) List the assets that you do want to protect.

2) Get an architecture diagram of the system, and from that look at the
interfaces that could be used for attacks

3) Brainstorm a list of the attacks you can think of on these interfaces

4) Check whether these attacks can be reasonably mitigated, and if they
cannot think harder. Or at least document known vulnerabilities.

Eric, I get your point about the limited scope of the IETF. There are
obviously attacks that are out of scope for us, such as identifying
users by the radio signatures of their mobile devices or creatively
using JavaScript in a web page for fun and profit. The IEEE or the 3GPP
might do something on the first one, the W3C may do something about the
other, and still other organizations may address other problems. But it
does not follow that we should not start by listing the assets that we
want to protect. For example, mobile user location privacy or generally
Internet user privacy are assets in our model, even if we cannot
possibly be the sole keepers of the fortress.

So we need pruning at some point. But I think that pruning should come
at the second stage: identify the interfaces through which the assets
can be attacked. In my example, we should not consider the radio level
interface or even the JavaScript API as interfaces that we worry about.
With one caveat, though. We know by experience that clients, servers and
routers can be pwned. This is an avenue of attack against other Internet
access, as shown in recent attacks that use penetration of a DNS
provider server to attack clients of that server. We may want to look at
these kind of "network based dependencies" when we enumerate the interfaces.

-- Christian Huitema