Re: [secdir] SECDIR review of draft-ietf-soc-load-control-event-package-11.txt

Charles Shen <qs2005@columbia.edu> Wed, 04 December 2013 16:32 UTC

Return-Path: <charles.newyork@gmail.com>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 249C21AE167; Wed, 4 Dec 2013 08:32:18 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.277
X-Spam-Level:
X-Spam-Status: No, score=-1.277 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FM_FORGED_GMAIL=0.622, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bzfrDJfkEFZl; Wed, 4 Dec 2013 08:32:16 -0800 (PST)
Received: from mail-ob0-x229.google.com (mail-ob0-x229.google.com [IPv6:2607:f8b0:4003:c01::229]) by ietfa.amsl.com (Postfix) with ESMTP id 4C5A91AE08C; Wed, 4 Dec 2013 08:32:16 -0800 (PST)
Received: by mail-ob0-f169.google.com with SMTP id wm4so16352493obc.14 for <multiple recipients>; Wed, 04 Dec 2013 08:32:13 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:in-reply-to:references:from:date:message-id :subject:to:cc:content-type; bh=/cbCXamB/D5mk3leb0owfHwSADhZPk9z3exZCAc/QJo=; b=T7xyqwwVQGqVyN8S9gPWJ9Jpaw5ZkjiGAmmOPOQ/jcgY4rvEZ+rRq+iwENM0Ea3k2L fg/yLoK6tUxjCG+yET+I0Xn0sEVIf/t2mo/AOXCt+Oni3oftpgh6hbEBuoHp36fGs+QQ DrcTtKzAlGD2+iqEfzNutRI0Ngh/qDYEqUqMsQvEro8hxJQYyPLiNccwBTXK9HtjE6hf OSFg7EKG6XFy9TpIdfyA5xeXssKxHfN2Wekm/w+X4iwQK1FPUqo5mKA+fFUv02W/by5o pfi72SoErHKNQaQUsymOCKyeDYxdSZk0ri3iMly97MVytg8B0J7xfrdvTYslW/dxQhju 0N1Q==
X-Received: by 10.182.220.99 with SMTP id pv3mr14908990obc.37.1386174733068; Wed, 04 Dec 2013 08:32:13 -0800 (PST)
MIME-Version: 1.0
Sender: charles.newyork@gmail.com
Received: by 10.182.27.9 with HTTP; Wed, 4 Dec 2013 08:31:51 -0800 (PST)
In-Reply-To: <CAF4+nEFOwAk4Ei9vd3GgsywmpSdzKfUD5EyOXwYmUMzMRkrSxw@mail.gmail.com>
References: <CAF4+nEFOwAk4Ei9vd3GgsywmpSdzKfUD5EyOXwYmUMzMRkrSxw@mail.gmail.com>
From: Charles Shen <qs2005@columbia.edu>
Date: Thu, 05 Dec 2013 00:31:51 +0800
X-Google-Sender-Auth: kMu903mGVqOAtlmMD6SseYDcHCc
Message-ID: <CAPSQ9ZXP5nbZ+Uzk_3F29Pjp38BQqfYA=cV4MzwJZuEGdWm=Qw@mail.gmail.com>
To: Donald Eastlake <d3e3e3@gmail.com>
Content-Type: multipart/alternative; boundary="14dae9399ab98faf0104ecb7f42a"
X-Mailman-Approved-At: Thu, 05 Dec 2013 06:14:25 -0800
Cc: "draft-ietf-soc-load-control-event-package.all@tools.ietf.org" <draft-ietf-soc-load-control-event-package.all@tools.ietf.org>, "iesg@ietf.org" <iesg@ietf.org>, "secdir@ietf.org" <secdir@ietf.org>
Subject: Re: [secdir] SECDIR review of draft-ietf-soc-load-control-event-package-11.txt
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 04 Dec 2013 16:32:18 -0000

Hi Donald, thanks for reviewing, please see responses inline:


On Tue, Dec 3, 2013 at 6:31 AM, Donald Eastlake <d3e3e3@gmail.com> wrote:

> I have reviewed this document as part of the security directorate's
> ongoing effort to review all IETF documents being processed by the
> IESG.  Document editors and WG chairs should treat these comments just
> like any other last call comments.
>
> This draft provides SIP capabilities (a load control event package)
> for filtering calls with the intent of better handling overload
> conditions. As you might expect for an extension to an existing
> protocol, there are many references to existing SIP RFCs.
>
> The Security Considerations Section appears to be adequate. It
> references RFCs 6665 and other sections of the draft and seems to
> summarize relevant threats.
>
> Minor points:
>
> The introductions (Section 1) give examples of anticipatable and
> unanticipatable causes of overload. I find it curious that denial of
> service attacks are not listed as a possible cause of unanticipated
> overload.
>


Interestingly that thought occurred to me before. I think the ones we are
listing now is slightly different from DoS in the sense that they are more
real-people-calling overload vs. DoS where machine-made calling can be
common. Also DoS is usually seen as an attack, while those listed examples
seem all have legitimate causes. That said, I do think the network server
still observes the fact of overload during DoS, so I have no problem adding
it to the list.


>
> In Section 10, in answer to REQ 17, there is a reference to Section 10
> that, I believe, should be to Section 11.
>

Good catch!


>
> Editorial:
>
> Section 4 begins with what is said to be a list of requirements. And I
> think almost all of them are. But the first item is just not worded as
> a requirement. It says "... we focus ...". To be a requirement on the
> solution it should talk about the solution, not the authors. I think,
> it should be more like "For simplicity, the solution should focus on a
> method of controlling SIP load, rather than a generic application
> layer mechanism."
>
>
Done.



> Misc:
>
> The document contains lots of XML that I did not run through any
> formal syntax check.
>


I ran them through xmlvalidation.com.

thanks!

Charles




>
> Thanks,
> Donald
> =============================
>  Donald E. Eastlake 3rd   +1-508-333-2270 (cell)
>  155 Beaver Street, Milford, MA 01757 USA
>  d3e3e3@gmail.com
>