Re: [sacm] Review on draft-ietf-sacm-ecp-02

"Haynes Jr., Dan" <dhaynes@mitre.org> Tue, 28 August 2018 19:13 UTC

Return-Path: <dhaynes@mitre.org>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 105C8129C6A for <sacm@ietfa.amsl.com>; Tue, 28 Aug 2018 12:13:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.309
X-Spam-Level:
X-Spam-Status: No, score=-4.309 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_DKIMWL_WL_MED=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=mitre.onmicrosoft.com header.b=cZgo3i8h; dkim=pass (1024-bit key) header.d=mitre.org header.b=n3dNRRLw
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yYCeoUUOYznd for <sacm@ietfa.amsl.com>; Tue, 28 Aug 2018 12:13:22 -0700 (PDT)
Received: from smtpvmsrv1.mitre.org (smtpvmsrv1.mitre.org [192.52.194.136]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 54819128B14 for <sacm@ietf.org>; Tue, 28 Aug 2018 12:13:22 -0700 (PDT)
Received: from smtpvmsrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id A62D26C0063; Tue, 28 Aug 2018 15:13:21 -0400 (EDT)
Received: from imshyb01.MITRE.ORG (unknown [129.83.29.2]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by smtpvmsrv1.mitre.org (Postfix) with ESMTPS id 896C46C0066; Tue, 28 Aug 2018 15:13:21 -0400 (EDT)
Received: from imshyb01.MITRE.ORG (129.83.29.2) by imshyb01.MITRE.ORG (129.83.29.2) with Microsoft SMTP Server (TLS) id 15.0.1263.5; Tue, 28 Aug 2018 15:13:20 -0400
Received: from GCC01-DM2-obe.outbound.protection.outlook.com (10.140.19.249) by imshyb01.MITRE.ORG (129.83.29.2) with Microsoft SMTP Server (TLS) id 15.0.1263.5 via Frontend Transport; Tue, 28 Aug 2018 15:13:20 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mitre.onmicrosoft.com; s=selector1-mitre-org; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=ps1YAeDjfUY7Qeh82q/vlVwrSOH2tHZRaVAY/XA82hg=; b=cZgo3i8hbqDkO+G0e7CIZwcvxj/8igBexcP0rNkg+uKaFJMJFMhUzZ0uGJ/inRPp0qJ1cpDe6GHfNcgXZMpovTd1R+w7xq11q7ooyBHpfajgHJFoEKlDLAuv2ubUD9b0Sp0E5UZHgF/xxzPqzTTrvNLWT9L+MijSozSfAZp5htE=
Received: from DM6PR09MB2714.namprd09.prod.outlook.com (20.176.97.148) by DM6PR09MB2716.namprd09.prod.outlook.com (20.176.97.150) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1080.14; Tue, 28 Aug 2018 19:13:19 +0000
Received: from DM6PR09MB2714.namprd09.prod.outlook.com ([fe80::a095:9859:26bb:93f1]) by DM6PR09MB2714.namprd09.prod.outlook.com ([fe80::a095:9859:26bb:93f1%4]) with mapi id 15.20.1080.015; Tue, 28 Aug 2018 19:13:19 +0000
From: "Haynes Jr., Dan" <dhaynes@mitre.org>
To: "Montville, Adam W" <adam.w.montville@gmail.com>, "<sacm@ietf.org>" <sacm@ietf.org>
Thread-Topic: [sacm] Review on draft-ietf-sacm-ecp-02
Thread-Index: AQHUOvXME4Hpue8dVEyi3uwt10Xm+qTVjLQw
Date: Tue, 28 Aug 2018 19:13:19 +0000
Message-ID: <DM6PR09MB27146985B91839BB090516D5A50A0@DM6PR09MB2714.namprd09.prod.outlook.com>
References: <8662CDE7-A821-4C4C-B003-A12252F94550@gmail.com>
In-Reply-To: <8662CDE7-A821-4C4C-B003-A12252F94550@gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=dhaynes@mitre.org;
x-originating-ip: [192.160.51.87]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; DM6PR09MB2716; 6:Wcog+do83EDqTdfVTCCamKWbnzcFUV4aWJPuGBI7O8g6E9dtngX/ys7TUBqJKuqQcfvszrzuGP1ESJDsOzpmCQlWYg1j0tk5tgwlIjbG7vnEM4WzoJhY7o0ryJsJRiZrUzgB6TKgCI9v+a8nyNgMgHEVWhVYGYajWw8I3zOHOZ6fiQuzEz+SHmWMrTkk6/E3l1ubXoOdjjWHow4nms48gAnO2qhqi3C1D2CMnzWST6umBozMMUJPX3M4xab0+uE1zXjHQ0CbHNdFHCLB5BnpHfPRD71UmyOqMBvbAFWiTqdpIDMxb0o4/aDKjHJNny8N6FS3+Y6fAIshfEsZX9/2PZc6nu68eu091wDK+tP1N0TCvFW1OriwZyJu/d5FYegi42Py7phuY0hh/F8mwtburolrc9uAe0BLI26OHSYPzR8BjQQOHg51B6w4ID/yIUWxfl4F2xZsU/ZNejQCOuW4cA==; 5:ISliwzQfqY+RZX6H0Tn/gA03N4bYFiLWx2DS9H11T5LBFt0Bs01Z21Ez9tQpoW5eEUA1mksJT4lWJeUjXmQtQqvCR0K8AgBX5MCodz+U8wD6ayAKATwMFaRIXreL/8Lqtmca2nxkq9TgZFG949xXPK0dy6PnTx88tUX+jvNrXXY=; 7:LGP4saL9vfFdrxeex7yhnOySt/pkj16PsEHsgbpcY1T1s2Vt8xnh1f7udv/QyE7IH34dv+O1aHUEujwb6zY/MBJ06RgPK9nOruc7rQ1/jDkDGp7gX/msWbShBiznDjQiQQdTl9JJDjL2Aioh1AoZuAvsJJXhaHFDQ0X+VtCFdvm1LnPf08j+DM8fe7q794PSa7qKQoWNgU5LW+GMZnz67Y/S5xw4MHOUynUX3Nm3DlWqkcch48aLkuUVdqRKKHHM
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: 8b6d185a-f7ee-47cc-f9be-08d60d1a50da
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989137)(4534165)(4627221)(201703031133081)(201702281549075)(8990107)(5600074)(711020)(4618075)(2017052603328)(7153060)(7193020); SRVR:DM6PR09MB2716;
x-ms-traffictypediagnostic: DM6PR09MB2716:
x-ld-processed: c620dc48-1d50-4952-8b39-df4d54d74d82,ExtAddr
x-microsoft-antispam-prvs: <DM6PR09MB2716F2ECB7FB3F6AD385510CA50A0@DM6PR09MB2716.namprd09.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(28532068793085)(158342451672863)(192374486261705)(21748063052155);
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040522)(2401047)(8121501046)(5005006)(3002001)(93006095)(93001095)(10201501046)(3231311)(944501410)(52105095)(6055026)(149027)(150027)(6041310)(20161123558120)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123564045)(20161123560045)(20161123562045)(201708071742011)(7699016); SRVR:DM6PR09MB2716; BCL:0; PCL:0; RULEID:; SRVR:DM6PR09MB2716;
x-forefront-prvs: 077884B8B5
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(376002)(136003)(39860400002)(366004)(396003)(346002)(57704003)(199004)(189003)(186003)(39060400002)(97736004)(966005)(606006)(7696005)(76176011)(478600001)(99286004)(14454004)(2906002)(86362001)(6506007)(53546011)(105586002)(102836004)(19609705001)(25786009)(8676002)(6246003)(26005)(14444005)(53936002)(446003)(256004)(5250100002)(316002)(33656002)(110136005)(2900100001)(5660300001)(8936002)(11346002)(229853002)(81166006)(476003)(68736007)(81156014)(236005)(790700001)(6116002)(3846002)(54896002)(55016002)(66066001)(9686003)(53946003)(6436002)(6306002)(486006)(74316002)(7736002)(106356001)(491001)(579004)(559001); DIR:OUT; SFP:1101; SCL:1; SRVR:DM6PR09MB2716; H:DM6PR09MB2714.namprd09.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: mitre.org does not designate permitted sender hosts)
x-microsoft-antispam-message-info: d2MwmO5fVlfqAPtuiuSt2M4OmZaWDg/g4AG8ihEYBPZT0iXfaW65F809qwccyNM8XP0R4fM3QGKFL4o8VqloOZTQrwjVSeRtQ/1Ds4VRM9AWMiAfKjalU632J2+TQYF555kV2tjSuyMJXEnbE2qXLVannbB7iiJFE2wHpIXMxdcbZn3Ck/9enbKk5E4mX/mNn8m04nbOmQii66OYHP3onbi+4Ed8kDj6FDdm6GPduuEFmiNPaD/UsjdtDRskKWfydYP6ErqCjc3yobULa/D+qir9778ITTeenIl7ukOitEbLA3rlNvw8kbCkcsIFguNWJf6Tis57Xg7khhovlkuHJEKNnB4yusYudQxX7puCeSA=
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_DM6PR09MB27146985B91839BB090516D5A50A0DM6PR09MB2714namp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 8b6d185a-f7ee-47cc-f9be-08d60d1a50da
X-MS-Exchange-CrossTenant-originalarrivaltime: 28 Aug 2018 19:13:19.4936 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: c620dc48-1d50-4952-8b39-df4d54d74d82
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR09MB2716
X-OriginatorOrg: mitre.org
X-MITRE: 8GQsMWxq66rxk57w
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mitre.org; h=from:to:subject:date:message-id:references:in-reply-to:content-type:mime-version; s=selector1; bh=ps1YAeDjfUY7Qeh82q/vlVwrSOH2tHZRaVAY/XA82hg=; b=n3dNRRLwGU+gxp2myCP7pFNU2HFvVbL+iYS4V3GihjcreT+4fCtGq2OjXJ4C+REw+2PN8h4uJgjQYHaGhcL9jokmLqVhAXED0XaDVbkGTVpe1/VNFVp/DCJIqodp/XN+dB3mBJHa3VFZKL1liN5qymKojmgjkMpwU9n3GdBRYl0=
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/1-tvXQReAMZIC-FFGwOHUL-Jgww>
Subject: Re: [sacm] Review on draft-ietf-sacm-ecp-02
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 28 Aug 2018 19:13:25 -0000

Thanks Adam! I pulled your comments out and have addressed them in-line.

  *   Abstract: Add reference for ECP 1.0.
[Danny]: Addressed.

  *   Section 1.1: Change control "4" to "3" and ". [CIS]" to "[CIS]."
[Danny]: Addressed.

  *   Section 1.1: EPCP not previously defined.
[Danny]: EPCP is expanded in the first sentence of Section 1. Were you looking for something more?

  *   Section 4.2: Does it filter? That's partial evaluation.
[Danny]: The only filtering occurs in the Posture Broker Server component of the Posture Collection Manager which receives a batch of attributes from the Posture Collection Engine and routes the attributes to the appropriate Posture Validator. With that said, I noticed we have text that says the Posture Collection Manager does not do any evaluation (4.2) as well as text that says the SWID Posture Validator can do evaluation (6.1.5.3.2). We need to update the SWID Posture Validator section to just say it can do some sanity checking and processing of data before storing it in the repository to make it consistent.

  *   Section 4.4: Normative MAY? There MAY be other instances of these :).
[Danny]: In this particular instance, it is non-normative because it's just discussing the different components and what they can do at a high-level if that makes sense. It might be difficult to make this text normative because for the Posture Collection Engine and Posture Collection Manager components they won't likely support the same capabilities given the technologies (i.e., data models, protocols, and interfaces) used across endpoint types (e.g., traditional vs. IoT). With that said, there is room to provide normative text for components in the EPCP Implementations section. Given all that, do you think it is okay to leave this text non-normative?

  *   Section 5: When is the target endpoint told what attributes matter and their tolerance ranges?
[Danny]: Wouldn't it be determined by the data models that are called out in the EPCP Implementations section?

  *   Section 5.1: NOTE: TO BE EXPANDED before WGLC?
[Danny]: Yes, we will update this in the next draft.

  *   Section 5.6: It feels odd to allow authorized repo access w/o specifying an interface. That said...may have a good idea for such a draft down the road a place.
[Danny]: Given that we don't actually have a protocol or interface for this, I think it's more of a note of what we want when we develop one. So, I think we are in agreement here?

  *   Section 6.2.4: Why not support fetch/polling via NETCONF and RESTCONF now?

[Danny]: This should be supported through NETCONF and RESTCONF now. This text is just trying to say that we also want to support the self-reporting capabilities provided by Yang Push once it's an RFC.

  *   Section 6.3: Change "Update the policy..." to "Establish and update the policy..."

[Danny]: Addressed.

  *   Section 6.3: Why shouldn't the API offer commands and policy interaction?

[Danny]: Are you asking why the API shouldn't offer endpoints the ability to issue commands and policy interactions?

  *   Section 7.2/7.3: Aren't vulnerability searches part of vulnerability management?

[Danny]: I don't see any reason why these two sections can't be combined.

  *   Section 13: First paragraph in Security Considerations feels superfluous.

[Danny]: Seems reasonable to remove the first paragraph.

  *   Section 13.1: Do we need to discuss benefits? Feels introductory.
  *   Section 13.1: Says "A second security consideration...". Unclear what the first was.

[Danny]: Seems reasonable to just remove this section. If there is anything we really feel we need, let's just succinctly work it into the Introduction section.

  *   Section 13.2: This is where I usually expect Security Considerations to start.
[Danny]: Agree. RFC 3552 states the purpose of the Security Considerations section is "...to encourage document authors to consider security in their designs and to inform the reader of relevant security issues...".

  *   Section 13.2.1: "....a certain percentage of endpoints will always get compromised...". This could be clarified. There will always be a certain percentage compromised.
[Danny]: Addressed. Reworded to "While the EPCP provides substantial improvements in endpoint security as described in Section 13.1, endpoints can still be compromised. For this reason, all parties must regard data coming from endpoints as potentially unreliable or even malicious...".

  *   Section 13.3: A lot of the countermeasures read like CIS Controls. Could get some love for CIS as a reference even Benchmarks. Really like the idea of referencing CIS Controls and NIST 800-53 controls.
[Danny]: Great idea! Would you be will to include the references? We will gladly give you authorship credits for it :).

  *   Section 14: Not sure how Privacy Considerations will be received, but, it is the sane to me.
[Danny]: Great.

  *   All: Various editorial changes (add/remove words, commas, etc.)
[Danny]: Addressed.
Thanks,

Danny



From: sacm [mailto:sacm-bounces@ietf.org] On Behalf Of Adam Montville
Sent: Thursday, August 23, 2018 11:25 AM
To: <sacm@ietf.org> <sacm@ietf.org>
Subject: [sacm] Review on draft-ietf-sacm-ecp-02

All:

Over the past few weeks I've been reviewing this draft and providing comments along the way to the draft authors. Now that I'm through the entire draft, I'm posting it here for the entire group to see. I apologize in advance if you have difficulty reading my annotations in the PDF.

Kind regards,

Adam
_______________________________________________
sacm mailing list
sacm@ietf.org<mailto:sacm@ietf.org>
https://www.ietf.org/mailman/listinfo/sacm