Re: [sacm] WGLC for draft-ietf-sacm-ecp

Ira McDonald <blueroofmusic@gmail.com> Tue, 02 July 2019 16:07 UTC

Return-Path: <blueroofmusic@gmail.com>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3BB2312027B for <sacm@ietfa.amsl.com>; Tue, 2 Jul 2019 09:07:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.997
X-Spam-Level:
X-Spam-Status: No, score=-1.997 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id K2KcaYWBUWkP for <sacm@ietfa.amsl.com>; Tue, 2 Jul 2019 09:07:54 -0700 (PDT)
Received: from mail-yb1-xb2c.google.com (mail-yb1-xb2c.google.com [IPv6:2607:f8b0:4864:20::b2c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 40F3D1203C2 for <sacm@ietf.org>; Tue, 2 Jul 2019 09:07:54 -0700 (PDT)
Received: by mail-yb1-xb2c.google.com with SMTP id x4so1523195ybk.0 for <sacm@ietf.org>; Tue, 02 Jul 2019 09:07:54 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=UtXbnZkmPTumaeZ4xsINDLzmaYkobRbk8u0n0Hw7vV4=; b=sWnOjGu2cPheffv1z/saqIWkTu6Q+4cYPtsNy2/TnjHO6+7y7Yk6by7NZJBC5DfGtX XlAnvpiaC/RyrqB4g1FiOUM9G8A4RihWhml+tKo0SKu2xvBVuC3ds5ygC4VrrRDXmDKy os8UW9b7NH7NDYsViI4QqRGJjIUDC+diH3vYZw4qMLc4OJpno3kemlHWkMFPRpbwxwmq OewuB2ZB6spHJs0ua2220BUB/wMW8uv8AGfYA0r4UbEbsYxmpzAshwWCjZJ1EgFaUV82 0yYApgfu6RsSnQIfjY4GDoh4GWhVhAVYw+KtB2GUCa7vwVzNIMG8DJRWeqvqGFENEINw WXoA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=UtXbnZkmPTumaeZ4xsINDLzmaYkobRbk8u0n0Hw7vV4=; b=RE/srSd6bc7Nibk1e/dn8gbHRLL7Ev5erZcLHW6EhWUo6xOMT6aWaVrMSvpd1tNJvx zzOF1j1pRwTI5TqWWjByabGvMqiRCz7tCH3WdeodYQAiUw44fKUxCW3tkvnCR61K3nr/ KeVFMsNKl3awqQ7cFJsfcpOKwiZnEVvIdIIs0YZ+i6ajthH07fOzN270ozs+Itc968Rj JC8vwp2+RmrB08gF48NSjeQAJOYlvSKHm6tRqQ/V82HqSr5/twB36apFgcKZ+/sMivBl TUA4vYE4/CxJ2kG8gDcPJPFKJBff08pzIRyug6P+g7qxgqSy61LXwy6oVa8EfGgq4aT2 BQsg==
X-Gm-Message-State: APjAAAVF2D4Lifrj2zIRALXXaI2a0n7l4jS8ZH/kCNa8zC/3QFpxomAO yT2NFGpe/27JbfOVrJEp0MF+BzmqvXNmL0ZEbp8=
X-Google-Smtp-Source: APXvYqzzhFU0zroGipSg9jnxrmHA32isWYxemrxJvEqVxT+wed6CnL+90pMuuHI+VBs7uzCV5+PrUtpFBfDKzIrjTVI=
X-Received: by 2002:a25:8309:: with SMTP id s9mr16308798ybk.361.1562083673386; Tue, 02 Jul 2019 09:07:53 -0700 (PDT)
MIME-Version: 1.0
References: <5B73FDDD-680A-4596-99FA-920B0776D862@isoc.org>
In-Reply-To: <5B73FDDD-680A-4596-99FA-920B0776D862@isoc.org>
From: Ira McDonald <blueroofmusic@gmail.com>
Date: Tue, 02 Jul 2019 12:07:41 -0400
Message-ID: <CAN40gStnjDOxSNJ8e3+kNwzB8N7z7KD79qqnEexKx9OgPaW8iw@mail.gmail.com>
To: Karen O'Donoghue <odonoghue@isoc.org>, Jessica Fitzgerald-McKay <jmfmckay@gmail.com>, Ira McDonald <blueroofmusic@gmail.com>
Cc: "sacm@ietf.org" <sacm@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000763800058cb4f2e6"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/viEdzMWOwsQIxirCRTd9bvYcMAc>
Subject: Re: [sacm] WGLC for draft-ietf-sacm-ecp
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Jul 2019 16:07:57 -0000

Hi,

Ira's comments on <draft-ietf-sacm-ecp-05>

3.2.1.  Provisioning

- Describes one-time setup examples of serial numbers (immutable),
hardware certificates (long-lived), and device MAC addresses, which
are NOT immutable and *should* be changing for Random MAC address
usage over time, per recent IEEE 1609 (WAVE), IEEE 802.11 (Wi-Fi),
and Common Criteria protection profile recommendations.

- Recommend removing the MAC address example from this clause.

6.  Future Work

   "Reassess the use of MAC addresses, including market research to
   determine if MAC addresses continue to be a widely implemented
   device identifier among network tools."

- Market research showing the continued unwise use of fixed MAC
addresses in Enterprise networks is not a valid criteria.  This is
one of many bad security practices that are hard to stamp out.

- Recommend changing to:
   "Reassess the use of MAC addresses, based on technical research
   into current security best practices in IoT, automotive, mobile,
   and other privacy sensitive market domains."

10.  Privacy Considerations

   "The EPCP specifically addresses the collection of posture data from
   enterprise endpoints by an enterprise network.  As such, privacy is
   not going to often arise as a concern for those deploying this
   solution."

- Stongly disagree.  If enterprise (or cloud) servers with endpoint
posture metadata are successfully hacked (they're an attractive target),
then major privacy issues arise with location/time-of-day association
with PII for mobile users.  In the EU, GDPR protections definitely do
apply to enterprise networks.

- Recommend changing to:

   "The EPCP specifically addresses the collection of posture data from
   enterprise endpoints by an enterprise network.  As such, privacy is
   a fundamental concern for those deploying this ECP solution, given
   EU GDPR, California CCPA, and many other privacy regulations.  The
   enterprise SHOULD implement and enforce their duty of care."

   "An enterprise network should limit access to endpoint posture and
   identification information to authorized users."

- Very weak statement.  Potentially large number of network admins and
IT support people may have access to endpoint posture metadata.  They
should always have training about the importance of protecting this
endpoint posture metadata.

- Recommend changing to:

   "An enterprise network SHOULD limit access to endpoint posture and
   identification information to authorized users and SHOULD enforce
   policies that prevent export of endpoint posture metadata to third
   parties (except duly authorized law enforcement personnel)."


Cheers,
- Ira

Ira McDonald (Musician / Software Architect)
Co-Chair - TCG Trusted Mobility Solutions WG
Co-Chair - TCG Metadata Access Protocol SG
Chair - Linux Foundation Open Printing WG
Secretary - IEEE-ISTO Printer Working Group
Co-Chair - IEEE-ISTO PWG Internet Printing Protocol WG
IETF Designated Expert - IPP & Printer MIB
Blue Roof Music / High North Inc
http://sites.google.com/site/blueroofmusic
http://sites.google.com/site/highnorthinc
mailto: blueroofmusic@gmail.com
PO Box 221  Grand Marais, MI 49839  906-494-2434



On Thu, Jun 27, 2019 at 4:34 PM Karen O'Donoghue <odonoghue@isoc.org> wrote:

> Folks,
>
> As discussed at our virtual interim on Tuesday, this begins a three week
> working group last call for:
> Endpoint Posture Collection Profile
> https://datatracker.ietf.org/doc/draft-ietf-sacm-ecp/
>
> Please reply to this email thread with an indication that you have read
> the document, any comments you may have, and your assessment of whether or
> not it is ready to proceed to publication.
>
> DEADLINE: Please reply by Friday 19 July 2019.
>
> Thanks!
> Karen and Chris
>
> _______________________________________________
> sacm mailing list
> sacm@ietf.org
> https://www.ietf.org/mailman/listinfo/sacm
>