Re: [sacm] ECP, SWID M&A for PA-TNC, and OVAL Internet-Drafts Now Available

"Haynes, Dan" <dhaynes@mitre.org> Tue, 29 March 2016 20:16 UTC

Return-Path: <dhaynes@mitre.org>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0EC6312DBCB for <sacm@ietfa.amsl.com>; Tue, 29 Mar 2016 13:16:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.209
X-Spam-Level:
X-Spam-Status: No, score=-4.209 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, T_RP_MATCHES_RCVD=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=mitre.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FriEVMtQC_L6 for <sacm@ietfa.amsl.com>; Tue, 29 Mar 2016 13:16:50 -0700 (PDT)
Received: from smtpvmsrv1.mitre.org (smtpvmsrv1.mitre.org [192.52.194.136]) by ietfa.amsl.com (Postfix) with ESMTP id 0B77312DBE6 for <sacm@ietf.org>; Tue, 29 Mar 2016 12:41:57 -0700 (PDT)
Received: from smtpvmsrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id D3B706C401B for <sacm@ietf.org>; Tue, 29 Mar 2016 15:41:55 -0400 (EDT)
Received: from imshyb02.MITRE.ORG (imshyb02.mitre.org [129.83.29.3]) by smtpvmsrv1.mitre.org (Postfix) with ESMTP id BC87973C018 for <sacm@ietf.org>; Tue, 29 Mar 2016 15:41:55 -0400 (EDT)
Received: from imshyb02.MITRE.ORG (129.83.29.3) by imshyb02.MITRE.ORG (129.83.29.3) with Microsoft SMTP Server (TLS) id 15.0.1130.7; Tue, 29 Mar 2016 15:41:55 -0400
Received: from gcc01-CY1-obe.outbound.protection.outlook.com (10.140.19.249) by imshyb02.MITRE.ORG (129.83.29.3) with Microsoft SMTP Server (TLS) id 15.0.1130.7 via Frontend Transport; Tue, 29 Mar 2016 15:41:55 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mitre.onmicrosoft.com; s=selector1-mitre-org; h=From:To:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=DjGQz1jFIanVkjPVcJmHAom9iasimvfyim3MOZyx8Kw=; b=Uu/oOa6fZYJTM8OqgngAkHk2lPG/k01Qi6Vedx826HklDFtu6ylyWY7+xezgH//1cCnxYAeFvCJm8jUr9iD6XgSXZYIidtpUZZxkYOZLME3HvL/i5i6ijcZ5Iabkk4aKX3TJzHt4nWlhF93X1A0S5KpK5Ldr+pp8zKqdGbSNO/Q=
Received: from CY1PR09MB0939.namprd09.prod.outlook.com (10.163.89.145) by CY1PR09MB0939.namprd09.prod.outlook.com (10.163.89.145) with Microsoft SMTP Server (TLS) id 15.1.447.15; Tue, 29 Mar 2016 19:41:48 +0000
Received: from CY1PR09MB0939.namprd09.prod.outlook.com ([10.163.89.145]) by CY1PR09MB0939.namprd09.prod.outlook.com ([10.163.89.145]) with mapi id 15.01.0447.023; Tue, 29 Mar 2016 19:41:48 +0000
From: "Haynes, Dan" <dhaynes@mitre.org>
To: "Haynes, Dan" <dhaynes@mitre.org>, "sacm@ietf.org" <sacm@ietf.org>
Thread-Topic: [sacm] ECP, SWID M&A for PA-TNC, and OVAL Internet-Drafts Now Available
Thread-Index: AdGJ8l6+sriKgpg/RXKlWbMPyQqeSw==
Date: Tue, 29 Mar 2016 19:41:47 +0000
Message-ID: <CY1PR09MB0939876DF407EA336754A920A5870@CY1PR09MB0939.namprd09.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: mitre.org; dkim=none (message not signed) header.d=none;mitre.org; dmarc=none action=none header.from=mitre.org;
x-originating-ip: [192.160.51.86]
x-ms-office365-filtering-correlation-id: eee20ff5-5e48-4479-feb8-08d3580a2ae0
x-microsoft-exchange-diagnostics: 1; CY1PR09MB0939; 5:B4XDyDtJbIBYrQZWzceZeIfgIUPqwueHVwI1wHWRQ7KB9bilwkA/LrqWiASe6dUCzAjUpxGRlfPrfhNT7Cu5+//+/GX4iGHRdKlx33fJjKEGv4ie7deUaG/abYsRiy3ADH9Ok6RfhEuwQ73coYBv5g==; 24:tUsF11UkSG+2/AFp5bDMWOMb2ccoHe0E0fT6B7nHLMxMbbLPeHPN1YEWEili9ZD62K0nbmQxqFP46nomku6YExJc0bxCirq8uUzNYMG6FYo=
x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:CY1PR09MB0939;
x-microsoft-antispam-prvs: <CY1PR09MB09391A0934A4A64480C3DF10A5870@CY1PR09MB0939.namprd09.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:;
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(601004)(2401047)(8121501046)(5005006)(10201501046)(3002001); SRVR:CY1PR09MB0939; BCL:0; PCL:0; RULEID:; SRVR:CY1PR09MB0939;
x-forefront-prvs: 0896BFCE6C
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(377454003)(53754006)(164054003)(243025005)(6116002)(790700001)(19617315012)(102836003)(19580405001)(76576001)(3846002)(11100500001)(5008740100001)(19580395003)(74316001)(5004730100002)(87936001)(5002640100001)(586003)(92566002)(66066001)(5003600100002)(19625215002)(2900100001)(99286002)(189998001)(122556002)(81166005)(3660700001)(16236675004)(2501003)(15975445007)(77096005)(86362001)(575784001)(10400500002)(107886002)(19300405004)(54356999)(1096002)(33656002)(1220700001)(450100001)(5001770100001)(3280700002)(2906002)(50986999); DIR:OUT; SFP:1101; SCL:1; SRVR:CY1PR09MB0939; H:CY1PR09MB0939.namprd09.prod.outlook.com; FPR:; SPF:None; MLV:sfv; LANG:en;
spamdiagnosticoutput: 1:23
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_CY1PR09MB0939876DF407EA336754A920A5870CY1PR09MB0939namp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-originalarrivaltime: 29 Mar 2016 19:41:47.9177 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: c620dc48-1d50-4952-8b39-df4d54d74d82
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY1PR09MB0939
X-OriginatorOrg: mitre.org
Archived-At: <http://mailarchive.ietf.org/arch/msg/sacm/E9fJBK1u099E3I8o3JWELExObZU>
Subject: Re: [sacm] ECP, SWID M&A for PA-TNC, and OVAL Internet-Drafts Now Available
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 29 Mar 2016 20:16:54 -0000

Hi Everyone,



You may recall that the planned roadmap for work in IETF SACM (see below) includes the submission of the TNC IF-IMC [1] and IF-IMV [2] specifications. While we continue to feel that IF-IMC and IF-IMV are valuable components in the overall SACM solution, in light of the recent deluge of I-Ds we unloaded on the WG :), we thought it might make sense to delay the release of those specifications until the group has had more time to make progress on the current set of I-Ds. To support this, we are proposing that we remove normative requirements to IF-IMC and IF-IMV from the ECP [3] and SWID Message and Attributes for PA-TNC [4] specifications to avoid references to non-existing I-Ds.



In ECP, this removes general requirements to "conform to IF-IMC and IF-IMV". The only specific functionality cited in either of these specs is the procedure for extracting an endpoint ID from a machine certificate sent via PT-TLS or PT-EAP. (Section 5.1.2) In SWID Message and Attributes for PA-TNC, IF-IMV/IF-IMC are referenced with regard for requirements for the use of unique identifiers for Posture Collectors and Posture Validators. In fact, PB-TNC specifies rules regarding the creation and conveyance of these identifiers. The only role of IF-IMC and IF-IMV is to specify the functions by which those identifiers are conveyed from the PB layer to the PA layer on a client or server, respectively.



In both cases, we feel that dropping the normative requirements to use IF-IMV and IF-IMC does not have any impact on interoperability between devices. (Not surprising since IF-IMV and IF-IMC as written standardize intra-device communication.)



Does this seem like a reasonable approach?  Are there any concerns with this approach?  Please let me know if you have any questions.



Thanks,



Danny



[1] http://www.trustedcomputinggroup.org/resources/tnc_ifimc_specification

[2] http://www.trustedcomputinggroup.org/resources/tnc_ifimv_specification

[3] https://datatracker.ietf.org/doc/draft-haynes-sacm-ecp/

[4] https://datatracker.ietf.org/doc/draft-coffin-sacm-nea-swid-patnc/


From: sacm [mailto:sacm-bounces@ietf.org] On Behalf Of Haynes, Dan
Sent: Monday, March 07, 2016 2:47 PM
To: sacm@ietf.org
Subject: [sacm] ECP, SWID M&A for PA-TNC, and OVAL Internet-Drafts Now Available

Internet-Drafts (I-Ds) for the Endpoint Compliance Profile (ECP) [1], SWID Message and Attributes for PA-TNC [2], and the Open Vulnerability and Assessment Language (OVAL)[3-10] have just been submitted to SACM.
These I-Ds represent the first round of protocols and data models necessary to repurpose the Network Endpoint Assessment (NEA) architecture [11] from its original comply-to-connect focus to an extensible framework for collecting, communicating, and evaluating endpoint information as described in the Endpoint Compliance Standard [12]. Furthermore, these I-Ds support critical functionality in the SACM Vulnerability Assessment Scenario [13] and the "Endpoint Posture Attribute Value Collection" and "Define, Publish, Query, and Retrieve Security Automation Data" use cases from the SACM Endpoint Security Posture Assessment: Enterprise Use Cases [14].
Additional I-Ds based on existing work in the Trusted Computing Group's (TCG) Trusted Network Communications (TNC) subgroup, and which build upon the IETF's Network Endpoint Assessment (NEA) standards are currently being converted to I-Ds and will be submitted as soon as they are ready. The specific I-Ds and expected submission dates are as follows.

*         PC-TNC: An interface between NEA Posture Collectors and a NEA Posture Broker Client based on the TCG TNC IF-IMC specification [15] (Virtual Interim after IETF 95)

*         PV-TNC: An interface between NEA Posture Validators and a NEA Posture Broker Server based on the TCG TNC IF-IMV specification [16] (IETF 96)

*         Server Discovery and Validation: A protocol that enables endpoints to discover servers and ensure that they are trusted based on the TCG TNC PDP Discovery and Validation specification [17] (Virtual Interim after IETF 96)
The ECP describes how the NEA architecture can be used to collect software inventory from endpoints and make it available for later use by other security tools. These steps play a critical role in the operations described in the SACM Vulnerability Assessment Scenario. The ECP identifies specific Network Endpoint Assessment (NEA) capabilities that are used in support of these actions.
The SWID Message and Attributes for PA-TNC I-D is an extension to PA-TNC that describes a specific data-gathering capability that supports monitoring and collection of SWID tags on an endpoint. This capability is referenced in the ECP. The SWID Message and Attributes for PA-TNC I-D not only fulfills the role of standardizing the collection and delivery of this type of endpoint information, but it also provides a concrete example of the flexible collection capabilities supported by the NEA architecture. NEA provides an extensible framework for collectors on an endpoint. As new types of information are needed from an endpoint, new collectors and data models can be incorporated into the existing NEA collection protocol framework. This allows a single framework by which all endpoint information of interest can be delivered, instead of the current practice of requiring multiple endpoint agents, each responsible for their own types of data.
The OVAL I-Ds provide data models that support the assessment of endpoint posture attributes. More specifically, it provides concepts and lessons learned to inform the development of simpler, more scalable data models critical to SACM including: guidance to drive collectors; posture attributes to represent endpoint configuration information; guidance to drive evaluators; and results to express the outcome of the analysis between collected endpoint information and evaluation guidance. While not explicitly referenced in the ECP, the data models that evolve out of OVAL are complementary and simply represent another type of information that can be transported via PA-TNC and the NEA architecture, although full integration would require a new extension to PA-TNC.
In summary, the recent submissions:

-          Provide standardized means to meet important SACM use cases and scenarios

-          Support functionality through the use of existing IETF standards rather than through the creation of new, duplicative capabilities

-          Demonstrate the critical NEA feature of extensible collection capabilities
Please consider this message as a formal request for the WG to review these I-Ds, provide feedback, and help us develop them to address SACM's needs. Given the number of I-Ds that have been submitted, we would suggest reviewing them in the following order.

1.       Endpoint Compliance Profile

2.       SWID Message and Attributes for PA-TNC

3.       OVAL and the SACM Information Model Mapping

4.       OVAL Definitions Model

5.       OVAL System Characteristics Model

6.       OVAL Processing Model

7.       OVAL Common Model and OVAL Variables Model

8.       OVAL Results Model and OVAL Directives Model
Please let me know if you have any questions.
Thanks,

Danny

[1] https://datatracker.ietf.org/doc/draft-haynes-sacm-ecp/
[2] https://datatracker.ietf.org/doc/draft-coffin-sacm-nea-swid-patnc/
[3] https://datatracker.ietf.org/doc/draft-hansbury-sacm-oval-info-model-mapping/
[4] https://datatracker.ietf.org/doc/draft-cokus-sacm-oval-common-model/
[5] https://datatracker.ietf.org/doc/draft-haynes-sacm-oval-definitions-model/
[6] https://datatracker.ietf.org/doc/draft-rothenberg-sacm-oval-sys-char-model/
[7] https://datatracker.ietf.org/doc/draft-cokus-sacm-oval-results-model/
[8] https://datatracker.ietf.org/doc/draft-haynes-sacm-oval-variables-model/
[9] https://datatracker.ietf.org/doc/draft-rothenberg-sacm-oval-directives-model/
[10] https://datatracker.ietf.org/doc/draft-haynes-sacm-oval-processing-model/
[11] https://datatracker.ietf.org/doc/rfc5209/
[12] https://datatracker.ietf.org/doc/draft-fitzgeraldmckay-sacm-endpointcompliance/
[13] https://datatracker.ietf.org/doc/draft-coffin-sacm-vuln-scenario/
[14] https://datatracker.ietf.org/doc/rfc7632/
[15] http://www.trustedcomputinggroup.org/resources/tnc_ifimc_specification
[16] http://www.trustedcomputinggroup.org/resources/tnc_ifimv_specification
[17] http://www.trustedcomputinggroup.org/files/resource_files/3D59FB5E-1A4B-B294-D0F322A08B48E02E/Server_Discovery_And_Validation_v1_0r19-PUBLIC%20REVIEW.pdf