Re: [Model-t] What are we trying to protect

Dominique Lazanski <dml@lastpresslabel.com> Sun, 04 August 2019 07:14 UTC

Return-Path: <dml@lastpresslabel.com>
X-Original-To: model-t@ietfa.amsl.com
Delivered-To: model-t@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 11321120077 for <model-t@ietfa.amsl.com>; Sun, 4 Aug 2019 00:14:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.896
X-Spam-Level:
X-Spam-Status: No, score=-1.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=lastpresslabel-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dteQo0Wq7juj for <model-t@ietfa.amsl.com>; Sun, 4 Aug 2019 00:14:30 -0700 (PDT)
Received: from mail-wr1-x431.google.com (mail-wr1-x431.google.com [IPv6:2a00:1450:4864:20::431]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5285D12001A for <model-t@iab.org>; Sun, 4 Aug 2019 00:14:30 -0700 (PDT)
Received: by mail-wr1-x431.google.com with SMTP id y4so81253163wrm.2 for <model-t@iab.org>; Sun, 04 Aug 2019 00:14:30 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=lastpresslabel-com.20150623.gappssmtp.com; s=20150623; h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=Vw2msbVEnxZAVwyXIsNfBrxUsf3dYVQUQ/tqNQMm7gM=; b=qbl+qUMCGgqlOq57rkaqoqYGiGAjNWHHZTuo581MtU97dSrgdq0nLP8HKykzaGDrf+ fIm8IyvvbkwH0xgaeBf++RTeh8U4zS4oBHg3nP6KuW07ApM5gpavfC7EKux2hrqqDOkg bdV37aQHSjm2X54gpd7nGnV4fxQhRSilF9neyChNwgq7HL99T1nO+za9Gd1u/kdEiU0N ZRIqXBW/4kjE5aWJ4VLg4ROgRkIPqdieyVAkKRwxlK1YCUvAq27W3AoNLrhsa254zHif EYVhXhsKz3FuEvMHW5l3s5F+63MonM5MAqq7fP5trVYafUrrsD5LnRXFwRRn6N4hPWPK BAsw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=Vw2msbVEnxZAVwyXIsNfBrxUsf3dYVQUQ/tqNQMm7gM=; b=ZM0nCdEuYVMdphMgn2E25bg6wRbhTKpkRkurWjqjVi3TvQ699pA7giU1NN3Pisy1HG 10nJrHEDuYEs3o1bAJasV6sPSUFa7ZstZ5l7ycRgluzXyFLy+NcnWHbHNBgj0xTA4S4X 5Y7VhK8R3YdJOPi4ohU4kYJjPpt75DLWdxsSd9FlpEsbjVR/lcnLlMlFvPMFVEjsvHXB bjy3HwvDkuFlAE+VQaxR/9pHf3ZO4KOGZ4Zut7ltAx2vLKjd2P2YOBZ7XxPK7g+/8WKs 8hNKMX0SsNCfCZBxhEqms5RXMwy9hpSKkpUzKZLoBYBdCtFW2lQSC/FDk/cX9Az/yKj9 5uDw==
X-Gm-Message-State: APjAAAWreO9V3ggYCPIy+m5/fAzp6wlw2qj9aK8ru5td+oG4iDZlkQKf WvCh8pyPUtyKI3SadcWVSjHXY8Ln
X-Google-Smtp-Source: APXvYqwQATGnCTXZhzweX/vyAxCZuqeELM+U69TmPui5Q4ftTh9xI1ZOx41UGBsa/zmWQcOWQe0s+g==
X-Received: by 2002:a05:6000:12c8:: with SMTP id l8mr63142749wrx.72.1564902868349; Sun, 04 Aug 2019 00:14:28 -0700 (PDT)
Received: from [192.168.1.2] (host-92-28-250-246.as13285.net. [92.28.250.246]) by smtp.gmail.com with ESMTPSA id z1sm83027558wrp.51.2019.08.04.00.14.23 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Sun, 04 Aug 2019 00:14:27 -0700 (PDT)
Content-Type: multipart/alternative; boundary="Apple-Mail-D737FFC7-6278-4659-85D5-AABF54F796C2"
Mime-Version: 1.0 (1.0)
From: Dominique Lazanski <dml@lastpresslabel.com>
X-Mailer: iPhone Mail (16F203)
In-Reply-To: <CABcZeBOKnaa7t3Nc=uq4sB2OQ+uKp=+_LHqX3bBBmpy3RY3dCA@mail.gmail.com>
Date: Sun, 04 Aug 2019 08:14:14 +0100
Cc: Bret Jordan <jordan.ietf@gmail.com>, Christian Huitema <huitema@huitema.net>, model-t@iab.org
Content-Transfer-Encoding: 7bit
Message-Id: <86157132-D401-4033-A72B-AD4859DB6696@lastpresslabel.com>
References: <c3a112ba-baab-1cb0-97ad-21ff9999a637@cs.tcd.ie> <29756028-95f1-e6e5-b3ea-562cbc635df0@sandelman.ca> <5ef15ad2-5b20-e871-0d01-17cf906051c1@cs.tcd.ie> <22633.1564768705@localhost> <e7c02d44-353f-406c-818e-06a2e49ee212@www.fastmail.com> <5879878A-7CEA-4030-BB72-108CC4122719@gmail.com> <d253231a-d35d-e7c9-e3ae-5c7d7915566e@bluepopcorn.net> <06F0AE14-4413-4022-A804-C1B58E2702CE@fugue.com> <52BAC141-CB25-4072-B556-6325912F1ADD@gmail.com> <9a1555ca-6699-75f1-683e-2a3a2a539a11@cs.tcd.ie> <fbb6866d-87af-abea-42b4-8bb45959ea6a@huitema.net> <A8ABBBFF-9967-4F3B-974F-2DC5953D5DD9@gmail.com> <CABcZeBOKnaa7t3Nc=uq4sB2OQ+uKp=+_LHqX3bBBmpy3RY3dCA@mail.gmail.com>
To: Eric Rescorla <ekr@rtfm.com>
Archived-At: <https://mailarchive.ietf.org/arch/msg/model-t/h5ldx-3SffTav1tl9gNoCzXyeZc>
Subject: Re: [Model-t] What are we trying to protect
X-BeenThere: model-t@iab.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Discussions of changes in Internet deployment patterns and their impact on the Internet threat model <model-t.iab.org>
List-Unsubscribe: <https://www.iab.org/mailman/options/model-t>, <mailto:model-t-request@iab.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/model-t/>
List-Post: <mailto:model-t@iab.org>
List-Help: <mailto:model-t-request@iab.org?subject=help>
List-Subscribe: <https://www.iab.org/mailman/listinfo/model-t>, <mailto:model-t-request@iab.org?subject=subscribe>
X-List-Received-Date: Sun, 04 Aug 2019 07:14:33 -0000


> On 4 Aug 2019, at 06:08, Eric Rescorla <ekr@rtfm.com> wrote:
> 
> his seems like a reasonable problem statement for the overall problem of computer security, but not really for IETF.
> 

But computer security is Internet security. It is rare that ‘things’ are not connected to the Internet  (with the exception of intranets however the same type of devices are connected to both). 

If some attacks are initiated at the pint of ‘things’ in order to compromise the Internet I don’t see why this shouldn’t be in scope?

FWIW I think Christian and Bret’s emails outline issues that should be included in scope. 

> To take a concrete example memory reading attacks like Spectre are a threat to user data and something that browser vendors spend a fair amount of energy working on, but they're mostly not in scope for IETF [0]. There's nothing wrong with that, it's just division of labor.
> 
> -Ekr
> 
> [0] I say "mostly" because (a) we need to take the security implications of these kinds of attacks in our protocol designs and (b) there might be some small pieces of IETF work like CORB, though that seems to be mostly being done elsewhere.
> 
>> On Sat, Aug 3, 2019 at 2:47 PM Bret Jordan <jordan.ietf@gmail.com> wrote:
>> Protection of end users’ data
>> 
>> Protection of an organization’s data
>> 
>> Protection of devices owned by an end user or an organization 
>> 
>> Protection of network equipment 
>> 
>> Protection of SCADA system
>> 
>> Protection of critical infrastructure 
>> 
>> Protection of IoT and soon to be released 5G devices 
>> 
>> Protection of cost optimized controllers
>> 
>> 
>> The problem we have had in the past is we want to call this one of the following, but each one does not encompass the full picture.
>> 1) Computer security
>> 2) Data security 
>> 3) Information security 
>> 4) Communication security 
>> 5) Network security 
>> 6) Application security 
>> Etc, etc, 
>> 
>> So if you way we are just dealing with communication security or information security we are missing a significant piece of the pie. 
>> 
>> 
>> Thanks,
>> Bret
>> PGP Fingerprint: 63B4 FC53 680A 6B7D 1447  F2C0 74F8 ACAE 7415 0050
>> "Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg."
>> 
>>>> 
>>> Reading this thread, I think that we are missing a step. We cannot
>>> define attacks without defining first the assets that need to be
>>> protected.. Different actors probably have different views on that, such as:
>>> 
>>> 1) Continuous operation of the Internet
>>> 
>>> 2) Continuous operation of a specific Internet provider
>>> 
>>> 3) Continuous availability of an Internet Service
>>> 
>>> 4) Continuous connectivity for a given user
>>> 
>>> 5) Protection of databases used by services and enterprises
>>> 
>>> 6) Protection of the personal data of users
>>> 
>>> Do we have agreement on what we are trying to protect?
>>> 
>>> -- Christian Huitema
>>> 
>>> 
>>> -- 
>>> Model-t mailing list
>>> Model-t@iab.org
>>> https://www.iab.org/mailman/listinfo/model-t
>> 
>> -- 
>> Model-t mailing list
>> Model-t@iab.org
>> https://www.iab.org/mailman/listinfo/model-t
> -- 
> Model-t mailing list
> Model-t@iab.org
> https://www.iab.org/mailman/listinfo/model-t