Re: [secdir] secdir review of draft-ietf-slim-negotiating-human-language-22

Taylor Yu <tlyu@mit.edu> Thu, 11 January 2018 20:14 UTC

Return-Path: <tlyu@mit.edu>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 11C5F12EC3D; Thu, 11 Jan 2018 12:14:35 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.21
X-Spam-Level:
X-Spam-Status: No, score=-4.21 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oOfXuYX_tX3a; Thu, 11 Jan 2018 12:14:33 -0800 (PST)
Received: from dmz-mailsec-scanner-1.mit.edu (dmz-mailsec-scanner-1.mit.edu [18.9.25.12]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EA3DC12EC3C; Thu, 11 Jan 2018 12:14:32 -0800 (PST)
X-AuditID: 1209190c-1ffff70000001268-d7-5a57c5a7fda1
Received: from mailhub-auth-1.mit.edu ( [18.9.21.35]) (using TLS with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by dmz-mailsec-scanner-1.mit.edu (Symantec Messaging Gateway) with SMTP id FE.93.04712.7A5C75A5; Thu, 11 Jan 2018 15:14:31 -0500 (EST)
Received: from outgoing.mit.edu (OUTGOING-AUTH-1.MIT.EDU [18.9.28.11]) by mailhub-auth-1.mit.edu (8.13.8/8.9.2) with ESMTP id w0BKEUCN030830; Thu, 11 Jan 2018 15:14:31 -0500
Received: from localhost (nyc-02.triskelion.com [162.243.175.178]) (authenticated bits=0) (User authenticated as tlyu@ATHENA.MIT.EDU) by outgoing.mit.edu (8.13.8/8.12.4) with ESMTP id w0BKESB0019421; Thu, 11 Jan 2018 15:14:29 -0500
From: Taylor Yu <tlyu@mit.edu>
To: Randall Gellens <rg+ietf@randy.pensive.org>
Cc: iesg@ietf.org, secdir@ietf.org, draft-ietf-slim-negotiating-human-language.all@ietf.org
References: <p06240600d67d2e5fcbb7@[99.111.97.136]>
Date: Thu, 11 Jan 2018 20:14:28 +0000
In-Reply-To: <p06240600d67d2e5fcbb7@[99.111.97.136]> (Randall Gellens's message of "Thu\, 11 Jan 2018 07\:10\:43 -0800")
Message-ID: <ldvwp0o40gr.fsf@ubuntu-1gb-nyc1-01.localdomain>
Lines: 22
MIME-Version: 1.0
Content-Type: text/plain
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFnrPIsWRmVeSWpSXmKPExsUixCmqrLv8aHiUwfkjZhYrzmlazPgzkdni +/MuRosPCx+yOLB4LFnyk8lj653HLAFMUVw2Kak5mWWpRfp2CVwZbz/1MBfMY69Ycns3WwPj HdYuRk4OCQETiX+TH7J3MXJxCAksZpLY92ctC4SzkVHizPobUJlvjBKv+lYAZTg42ATkJC7f CgbpFhHQl/j3+yobiM0skCWxs28mE4gtLOAt8fvYYrC4kICxxJ3W6YwgNouAqsTs8zfA4pwC VRLvV11mB7F5BWwktnx8A3YRjwCnRO/hqawQcUGJkzOfsEDMl5A4+OIF8wRG/llIUrOQpBYw Mq1ilE3JrdLNTczMKU5N1i1OTszLSy3SNdTLzSzRS00p3cQIDkVJnh2MZ954HWIU4GBU4uF9 kBseJcSaWFZcmXuIUZKDSUmUd086UIgvKT+lMiOxOCO+qDQntfgQowQHs5IIb003UI43JbGy KrUoHyYlzcGiJM7rbqIdJSSQnliSmp2aWpBaBJOV4eBQkuCVOwLUKFiUmp5akZaZU4KQZuLg BBnOAzT8+2GQ4cUFibnFmekQ+VOMxhxtK5+0MXPcePG6jVmIJS8/L1VKnLcRpFQApDSjNA9u GiidLPq8ftMrRnGg54R55UGW8gBTEdy8V0CrmIBWnd8YCrKqJBEhJdXA6FXl8WjrzJ+VETsP 23wq2bjgz4vcsprpXrs1Fz/f8cniTs22prifaX/4vJ7/Er41JSN15xoOGxvJotgSdeubE904 tBf+sY3QWLVHYrK0ra+BGk/k4yNGeRsvHNH5Wn9Q4+Vflb9CU0UOvJw13UHgcYmgh6WFyZI5 twwKGcV5z539ub5oJcM1HiWW4oxEQy3mouJEAKukdSUCAwAA
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/lAypMQsj2DNqJYlcXcFMr9ogNZo>
Subject: Re: [secdir] secdir review of draft-ietf-slim-negotiating-human-language-22
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Jan 2018 20:14:35 -0000

Randall Gellens <rg+ietf@randy.pensive.org> writes:

> Thanks for your review.  In response to Alissa's comments, I reworded
> the Security Considerations section to read:
>
>    The Security Considerations of BCP 47 [RFC5646] apply here.  An
>    attacker with the ability to modify signaling could prevent a call
>    from succeeding by altering any of several crucial elements,
>    including the 'hlang-send' or 'hlang-recv' values.  RFC 5069
>    [RFC5069] discusses such threats.  Use of TLS or IPSec can protect
>    against such threats.  Emergency calls are of particular concern; RFC
>    6881 [RFC6881], which is specific to emergency calls, mandates use of
>    TLS or IPSec (in ED-57/SP-30).
>
> I think this also addresses your concern regarding integrity, as it
> specifically calls out "modification" as a principal threat.

Hi Randall,

Thanks.  This new text seems reasonable.

-Taylor