Re: [saag] draft-moore-iot-bcp-00 (Best Current Practices for Securing Internet of Things (IoT) Devices)

Ari Keränen <ari.keranen@ericsson.com> Tue, 08 November 2016 14:44 UTC

Return-Path: <ari.keranen@ericsson.com>
X-Original-To: saag@ietfa.amsl.com
Delivered-To: saag@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0F5B7129C6D for <saag@ietfa.amsl.com>; Tue, 8 Nov 2016 06:44:17 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.221
X-Spam-Level:
X-Spam-Status: No, score=-4.221 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IO0dmx-VrtMx for <saag@ietfa.amsl.com>; Tue, 8 Nov 2016 06:44:14 -0800 (PST)
Received: from sesbmg23.ericsson.net (sesbmg23.ericsson.net [193.180.251.37]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 37C40129526 for <saag@ietf.org>; Tue, 8 Nov 2016 06:44:14 -0800 (PST)
X-AuditID: c1b4fb25-bf4b398000005623-61-5821e4bcbb81
Received: from ESESSHC005.ericsson.se (Unknown_Domain [153.88.183.33]) by (Symantec Mail Security) with SMTP id BA.84.22051.CB4E1285; Tue, 8 Nov 2016 15:44:12 +0100 (CET)
Received: from m46.nomadiclab.com (153.88.183.153) by smtp.internal.ericsson.com (153.88.183.35) with Microsoft SMTP Server id 14.3.319.2; Tue, 8 Nov 2016 15:43:45 +0100
To: Keith Moore <moore@network-heretics.com>, saag@ietf.org
References: <63ae04d9-9a31-498c-3333-2801a72338f0@network-heretics.com>
From: Ari Keränen <ari.keranen@ericsson.com>
Message-ID: <ff6dae39-a277-ea87-9b1a-643400c8742b@ericsson.com>
Date: Tue, 08 Nov 2016 16:43:45 +0200
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:45.0) Gecko/20100101 Thunderbird/45.4.0
MIME-Version: 1.0
In-Reply-To: <63ae04d9-9a31-498c-3333-2801a72338f0@network-heretics.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 7bit
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFlrKLMWRmVeSWpSXmKPExsUyM2K7ou6eJ4oRBlOPqlhM+nqOzWJKfyeT A5PHkiU/mTwmnQgLYIrisklJzcksSy3St0vgynjV+5Wt4BdrxZopU5gaGF+ydDFycEgImEhs f+rSxcjFISSwjlFi1vIfbBDOWkaJa8sWMHcxcnIICxRL9C6cAGaLCNhKzPv8ih3EFhJwl3j4 +xALiM0GFP/dvocJZCivgL3EhMN8IGEWARWJm31zGUFsUYE0iZWPfjGB2LwCghInZz4Bu4FT wEPi1CsjkDCzgIXEzPnnGSFseYntb+cwQ2xSlbj67xXjBEb+WUi6ZyFpmYWkZQEj8ypG0eLU 4qTcdCNjvdSizOTi4vw8vbzUkk2MwMA7uOW36g7Gy28cDzEKcDAq8fB+mKYQIcSaWFZcmXuI UYKDWUmEd98NxQgh3pTEyqrUovz4otKc1OJDjNIcLErivGYr74cLCaQnlqRmp6YWpBbBZJk4 OKUaGHVVMs4ktvVt3b/a6Ce3u+fTq1XvGi7yfT7s0q+ydY72mdXci0K7g99xKfarRaxYYOTI N3d52y5lG+WYS2ocUl2FTznuzrAx4o+uqphaY9XYKz5HaQ+TqlDN1tLozN7kgienH+9hNv++ Zv+mjdlZK48r/Lhy3EJcISd1we/7S3YulQkQPVLwTYmlOCPRUIu5qDgRAKveLkw4AgAA
Archived-At: <https://mailarchive.ietf.org/arch/msg/saag/xy6wdViyBxhogjKbIfrhoXrC-Jo>
Subject: Re: [saag] draft-moore-iot-bcp-00 (Best Current Practices for Securing Internet of Things (IoT) Devices)
X-BeenThere: saag@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Security Area Advisory Group <saag.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/saag>, <mailto:saag-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/saag/>
List-Post: <mailto:saag@ietf.org>
List-Help: <mailto:saag-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/saag>, <mailto:saag-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 08 Nov 2016 14:44:17 -0000

Hi,

Also at the Thing-to-Thing Research Group we have a draft about security 
considerations for IoT:
https://tools.ietf.org/html/draft-irtf-t2trg-iot-seccons


Cheers,
Ari

On 05/11/16 03:25, Keith Moore wrote:
> Stephen Farrell suggested I bring this draft to your attention. This was
> a rush job as the authors just started talking about this last Friday,
> but it was written in response to recent DDoS attacks that utilized
> easily-compromised IoT devices.   I'm sure there are missing pieces
> (I've identified a few since -00) and sections that could be stated
> better (like the title of section 2.3.2), but hopefully this is a useful
> start.
>
> https://datatracker.ietf.org/doc/draft-moore-iot-security-bcp/
>
> Keith
>
>