Re: [sacm] Fwd: I-D Action: draft-handt-sacm-asset-identifiers-00.txt
Sean Turner <turners@ieca.com> Fri, 26 July 2013 10:17 UTC
Return-Path: <turners@ieca.com>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6569921F91CA for <sacm@ietfa.amsl.com>; Fri, 26 Jul 2013 03:17:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.265
X-Spam-Level:
X-Spam-Status: No, score=-102.265 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, IP_NOT_FRIENDLY=0.334, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6b-yhKhursqx for <sacm@ietfa.amsl.com>; Fri, 26 Jul 2013 03:17:15 -0700 (PDT)
Received: from gateway05.websitewelcome.com (gateway05.websitewelcome.com [67.18.125.8]) by ietfa.amsl.com (Postfix) with ESMTP id 4EEDD21F85B8 for <sacm@ietf.org>; Fri, 26 Jul 2013 03:17:15 -0700 (PDT)
Received: by gateway05.websitewelcome.com (Postfix, from userid 5007) id 3AA9CEF0EDAC1; Fri, 26 Jul 2013 05:17:14 -0500 (CDT)
Received: from gator1743.hostgator.com (gator1743.hostgator.com [184.173.253.227]) by gateway05.websitewelcome.com (Postfix) with ESMTP id 2EF53EF0EDA9A for <sacm@ietf.org>; Fri, 26 Jul 2013 05:17:14 -0500 (CDT)
Received: from [198.180.150.142] (port=49258 helo=eb-ef.conference.fu-berlin.de) by gator1743.hostgator.com with esmtpsa (TLSv1:DHE-RSA-AES256-SHA:256) (Exim 4.80) (envelope-from <turners@ieca.com>) id 1V2f5F-0005am-L8; Fri, 26 Jul 2013 05:17:13 -0500
Message-ID: <51F24CA8.5060200@ieca.com>
Date: Fri, 26 Jul 2013 12:17:12 +0200
From: Sean Turner <turners@ieca.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv:17.0) Gecko/20130620 Thunderbird/17.0.7
MIME-Version: 1.0
To: Adam Montville <Adam.Montville@cisecurity.org>
References: <20130711165015.29939.87432.idtracker@ietfa.amsl.com> <51DEE295.3050403@ieca.com> <05BCCEB107AF88469B9F99783D47C1D6737A4F@CISEXCHANGE1.msisac.org.local> <05BCCEB107AF88469B9F99783D47C1D6737A73@CISEXCHANGE1.msisac.org.local> <9904FB1B0159DA42B0B887B7FA8119CA12881D69@AZ-FFEXMB04.global.avaya.com>
In-Reply-To: <9904FB1B0159DA42B0B887B7FA8119CA12881D69@AZ-FFEXMB04.global.avaya.com>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - gator1743.hostgator.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - ieca.com
X-BWhitelist: no
X-Source:
X-Source-Args:
X-Source-Dir:
X-Source-Sender: (eb-ef.conference.fu-berlin.de) [198.180.150.142]:49258
X-Source-Auth: sean.turner@ieca.com
X-Email-Count: 1
X-Source-Cap: ZG9tbWdyNDg7ZG9tbWdyNDg7Z2F0b3IxNzQzLmhvc3RnYXRvci5jb20=
Cc: "Romascanu, Dan (Dan)" <dromasca@avaya.com>, "sacm@ietf.org" <sacm@ietf.org>
Subject: Re: [sacm] Fwd: I-D Action: draft-handt-sacm-asset-identifiers-00.txt
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "Discussion List for IETFers interested in the Security Content Automation Protocol \(SCAP\)." <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sacm>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 26 Jul 2013 10:17:20 -0000
Dan beat me to it. It's a tree structure that may or may not have meaning at each "node". It depends on what we're looking for. spt On 7/26/13 9:25 AM, Romascanu, Dan (Dan) wrote: > OIDs are basically a tree structure. One can design the tree so that OIDs belonging to the same class are grouped under the same node. > > Would this be sufficient? > > Regards, > > Dan > > > > >> -----Original Message----- >> From: sacm-bounces@ietf.org [mailto:sacm-bounces@ietf.org] On Behalf Of >> Adam Montville >> Sent: Thursday, July 25, 2013 8:37 PM >> To: Sean Turner; sacm@ietf.org >> Subject: Re: [sacm] Fwd: I-D Action: draft-handt-sacm-asset-identifiers- >> 00.txt >> >> I may have answered my own question actually digging into it. So, if >> I'm understanding this right, it seems like we'd be seeing arcs that >> would have OIDs that are named, which would have some node that acts as >> a class of the instances found below... Maybe I'm still wrong. More >> digging. >> >>> -----Original Message----- >>> From: sacm-bounces@ietf.org [mailto:sacm-bounces@ietf.org] On Behalf >>> Of Adam Montville >>> Sent: Thursday, July 25, 2013 10:04 AM >>> To: Sean Turner; sacm@ietf.org >>> Subject: Re: [sacm] Fwd: I-D Action: >>> draft-handt-sacm-asset-identifiers- >>> 00.txt >>> >>> Being the transcriber of NISTS Asset Identification standard to an I-D >>> format (now expired), I have some questions about this proposal. >>> First, however, I like the way this reads and flows and I enjoyed >>> reading it, much like I enjoyed reading the alternate architecture >> document. >>> >>> It seems that draft-handt-sacm-asset-identifiers-00 is squarely >>> focused on instance-level identity, identification, and identifiers. >>> I believe, that we have several levels of "identification" >>> requirements. We do want instance-level identification, and I believe >>> OIDs, as proposed, could be a good solution. I believe we also want >>> class-level identification, for which we have been considering CPE. >>> >>> For example, I may have several OIDs, one for each of a Windows Server >>> 2008 instance, RHEL 6 instance, Windows Server 2012 instance, and >>> Solaris 9 instance. Now, I want to find all the assets in the >>> "Windows" class, which would be the set of two OIDs representing the >>> WS2008 and WS2012 instances. We could leave it up to implementers to >>> provide this type of functionality, but would it not be useful to have >>> some standardized way to represent that class? >>> >>> An honest question: How would this proposal handle class-level >>> identification? Or, do we collectively believe there is no such need? >>> >>> Adam >>> >>>> -----Original Message----- >>>> From: sacm-bounces@ietf.org [mailto:sacm-bounces@ietf.org] On Behalf >>>> Of Sean Turner >>>> Sent: Thursday, July 11, 2013 9:51 AM >>>> To: sacm@ietf.org >>>> Subject: [sacm] Fwd: I-D Action: >>>> draft-handt-sacm-asset-identifiers-00.txt >>>> >>>> More food for thought. >>>> >>>> spt >>>> >>>> -------- Original Message -------- >>>> Subject: I-D Action: draft-handt-sacm-asset-identifiers-00.txt >>>> Date: Thu, 11 Jul 2013 09:50:15 -0700 >>>> From: internet-drafts@ietf.org >>>> Reply-To: internet-drafts@ietf.org >>>> To: i-d-announce@ietf.org >>>> >>>> >>>> A New Internet-Draft is available from the on-line Internet-Drafts >>> directories. >>>> >>>> >>>> Title : sacm: Asset Identifier >>>> Author(s) : Russ Housley >>>> Sean Turner >>>> Filename : draft-handt-sacm-asset-identifiers-00.txt >>>> Pages : 7 >>>> Date : 2013-07-11 >>>> >>>> Abstract: >>>> This document examines the asset identifiers available for sacm >> and >>>> it proposes that OIDs (Object Identifiers) be selected as the >> asset >>>> identifier format. >>>> >>>> >>>> The IETF datatracker status page for this draft is: >>>> https://datatracker.ietf.org/doc/draft-handt-sacm-asset-identifiers >>>> >>>> There's also a htmlized version available at: >>>> http://tools.ietf.org/html/draft-handt-sacm-asset-identifiers-00 >>>> >>>> >>>> Internet-Drafts are also available by anonymous FTP at: >>>> ftp://ftp.ietf.org/internet-drafts/ >>>> >>>> _______________________________________________ >>>> I-D-Announce mailing list >>>> I-D-Announce@ietf.org >>>> https://www.ietf.org/mailman/listinfo/i-d-announce >>>> Internet-Draft directories: http://www.ietf.org/shadow.html or >>>> ftp://ftp.ietf.org/ietf/1shadow-sites.txt >>>> >>>> >>>> >>>> _______________________________________________ >>>> sacm mailing list >>>> sacm@ietf.org >>>> https://www.ietf.org/mailman/listinfo/sacm >>>> >>>> ... >>> >>> This message and attachments may contain confidential information. If >>> it appears that this message was sent to you by mistake, any >>> retention, dissemination, distribution or copying of this message and >>> attachments is strictly prohibited. Please notify the sender >>> immediately and permanently delete the message and any attachments. >>> _______________________________________________ >>> sacm mailing list >>> sacm@ietf.org >>> https://www.ietf.org/mailman/listinfo/sacm >>> >>> ... >> >> This message and attachments may contain confidential information. If >> it appears that this message was sent to you by mistake, any retention, >> dissemination, distribution or copying of this message and attachments >> is strictly prohibited. Please notify the sender immediately and >> permanently delete the message and any attachments. >> _______________________________________________ >> sacm mailing list >> sacm@ietf.org >> https://www.ietf.org/mailman/listinfo/sacm > _______________________________________________ > sacm mailing list > sacm@ietf.org > https://www.ietf.org/mailman/listinfo/sacm >
- [sacm] Fwd: I-D Action: draft-handt-sacm-asset-id… Sean Turner
- Re: [sacm] Fwd: I-D Action: draft-handt-sacm-asse… Adam Montville
- Re: [sacm] Fwd: I-D Action: draft-handt-sacm-asse… Adam Montville
- Re: [sacm] Fwd: I-D Action: draft-handt-sacm-asse… Gunnar Engelbach
- Re: [sacm] Fwd: I-D Action: draft-handt-sacm-asse… Romascanu, Dan (Dan)
- Re: [sacm] Fwd: I-D Action: draft-handt-sacm-asse… Sean Turner
- Re: [sacm] Fwd: I-D Action: draft-handt-sacm-asse… Baker, Jon