
From julienl@qualcomm.com  Mon Jan  3 11:03:44 2011
Return-Path: <julienl@qualcomm.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 8F1633A6ADA; Mon,  3 Jan 2011 11:03:44 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.401
X-Spam-Level: 
X-Spam-Status: No, score=-106.401 tagged_above=-999 required=5 tests=[AWL=0.198, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lSSeVkvHXJOG; Mon,  3 Jan 2011 11:03:43 -0800 (PST)
Received: from wolverine01.qualcomm.com (wolverine01.qualcomm.com [199.106.114.254]) by core3.amsl.com (Postfix) with ESMTP id A3A823A6ADE; Mon,  3 Jan 2011 11:03:35 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=qualcomm.com; i=julienl@qualcomm.com; q=dns/txt; s=qcdkim; t=1294081543; x=1325617543; h=from:to:cc:date:subject:thread-topic:thread-index: message-id:references:in-reply-to:accept-language: content-language:x-ms-has-attach:x-ms-tnef-correlator: acceptlanguage:content-type:content-transfer-encoding: mime-version; z=From:=20"Laganier,=20Julien"=20<julienl@qualcomm.com> |To:=20Peter=20Saint-Andre=20<stpeter@stpeter.im>|CC:=20" secdir@ietf.org"=20<secdir@ietf.org>,=20"iesg@ietf.org" =20<iesg@ietf.org>,=0D=0A=09"draft-loreto-http-bidirectio nal.all@tools.ietf.org"=0D=0A=09<draft-loreto-http-bidire ctional.all@tools.ietf.org>|Date:=20Mon,=203=20Jan=202011 =2011:05:38=20-0800|Subject:=20RE:=20SecDir=20review=20of =20draft-loreto-http-bidirectional-05|Thread-Topic:=20Sec Dir=20review=20of=20draft-loreto-http-bidirectional-05 |Thread-Index:=20AcureMj+40ab8lvDQEyyVHCDDKK0IwAACR0g |Message-ID:=20<BF345F63074F8040B58C00A186FCA57F7E273BBF4 A@NALASEXMB04.na.qualcomm.com>|References:=20<BF345F63074 F8040B58C00A186FCA57F29F6FBFE5D@NALASEXMB04.na.qualcomm.c om>=0D=0A=20<4D221D21.40107@stpeter.im>|In-Reply-To:=20<4 D221D21.40107@stpeter.im>|Accept-Language:=20en-US |Content-Language:=20en-US|X-MS-Has-Attach: |X-MS-TNEF-Correlator:|acceptlanguage:=20en-US |Content-Type:=20text/plain=3B=20charset=3D"utf-8" |Content-Transfer-Encoding:=20base64|MIME-Version:=201.0; bh=wn7NwDXyjsdyAgqATvEFDlGta9m0yw5AX2U3PUFpnQ4=; b=jXEBY4uYTQ0m0sfzDs9inFSE4zQIkvtwcJBv4dydrvRcrt+e7QWfrhz3 xDzPs22YuWVyJ4mzNza9u0qVKLDRivM27/uM0VuLQjIU8ECbMVQ6T4md3 Zh2KE5tWIbNojYMDA9iamJYNUuiP8Kd/yczRjyDzcl1gx20e4PQ3VdjXN w=;
X-IronPort-AV: E=McAfee;i="5400,1158,6215"; a="69080052"
Received: from ironmsg02-r.qualcomm.com ([172.30.46.16]) by wolverine01.qualcomm.com with ESMTP; 03 Jan 2011 11:05:40 -0800
X-IronPort-AV: E=Sophos;i="4.60,266,1291622400"; d="scan'208";a="104748375"
Received: from nasanexhub02.na.qualcomm.com ([10.46.143.120]) by ironmsg02-R.qualcomm.com with ESMTP/TLS/RC4-MD5; 03 Jan 2011 11:05:40 -0800
Received: from nalasexhub02.na.qualcomm.com (10.47.130.89) by nasanexhub02.na.qualcomm.com (10.46.143.120) with Microsoft SMTP Server (TLS) id 8.3.83.0; Mon, 3 Jan 2011 11:05:40 -0800
Received: from NALASEXMB04.na.qualcomm.com ([10.47.7.118]) by nalasexhub02.na.qualcomm.com ([10.47.130.89]) with mapi; Mon, 3 Jan 2011 11:05:40 -0800
From: "Laganier, Julien" <julienl@qualcomm.com>
To: Peter Saint-Andre <stpeter@stpeter.im>
Date: Mon, 3 Jan 2011 11:05:38 -0800
Thread-Topic: SecDir review of draft-loreto-http-bidirectional-05
Thread-Index: AcureMj+40ab8lvDQEyyVHCDDKK0IwAACR0g
Message-ID: <BF345F63074F8040B58C00A186FCA57F7E273BBF4A@NALASEXMB04.na.qualcomm.com>
References: <BF345F63074F8040B58C00A186FCA57F29F6FBFE5D@NALASEXMB04.na.qualcomm.com> <4D221D21.40107@stpeter.im>
In-Reply-To: <4D221D21.40107@stpeter.im>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Cc: "draft-loreto-http-bidirectional.all@tools.ietf.org" <draft-loreto-http-bidirectional.all@tools.ietf.org>, "iesg@ietf.org" <iesg@ietf.org>, "secdir@ietf.org" <secdir@ietf.org>
Subject: Re: [secdir] SecDir review of draft-loreto-http-bidirectional-05
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Jan 2011 19:03:44 -0000
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From tlyu@mit.edu  Mon Jan  3 11:58:46 2011
Return-Path: <tlyu@mit.edu>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 014AC3A6B54; Mon,  3 Jan 2011 11:58:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.125
X-Spam-Level: 
X-Spam-Status: No, score=-101.125 tagged_above=-999 required=5 tests=[AWL=1.474, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bREY+0MX9nfZ; Mon,  3 Jan 2011 11:58:45 -0800 (PST)
Received: from dmz-mailsec-scanner-1.mit.edu (DMZ-MAILSEC-SCANNER-1.MIT.EDU [18.9.25.12]) by core3.amsl.com (Postfix) with ESMTP id B6ABC3A6B53; Mon,  3 Jan 2011 11:58:44 -0800 (PST)
X-AuditID: 1209190c-b7ba9ae0000009f8-7f-4d222af3e6c5
Received: from mailhub-auth-3.mit.edu ( [18.9.21.43]) by dmz-mailsec-scanner-1.mit.edu (Symantec Brightmail Gateway) with SMTP id FA.FE.02552.3FA222D4; Mon,  3 Jan 2011 15:00:51 -0500 (EST)
Received: from outgoing.mit.edu (OUTGOING-AUTH.MIT.EDU [18.7.22.103]) by mailhub-auth-3.mit.edu (8.13.8/8.9.2) with ESMTP id p03K0mCd027974;  Mon, 3 Jan 2011 15:00:48 -0500
Received: from cathode-dark-space.mit.edu (CATHODE-DARK-SPACE.MIT.EDU [18.18.1.96]) (authenticated bits=56) (User authenticated as tlyu@ATHENA.MIT.EDU) by outgoing.mit.edu (8.13.6/8.12.4) with ESMTP id p03K0jGh005006 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Mon, 3 Jan 2011 15:00:46 -0500 (EST)
Received: (from tlyu@localhost) by cathode-dark-space.mit.edu (8.12.9.20060308) id p03K0jQg002512; Mon, 3 Jan 2011 15:00:45 -0500 (EST)
To: Fred Baker <fred@cisco.com>
References: <ldvhbdv29lz.fsf@cathode-dark-space.mit.edu> <64AE925C-9A79-433C-A3A7-90FF523C0321@cisco.com>
From: Tom Yu <tlyu@MIT.EDU>
Date: Mon, 03 Jan 2011 15:00:45 -0500
In-Reply-To: <64AE925C-9A79-433C-A3A7-90FF523C0321@cisco.com> (Fred Baker's message of "Wed, 29 Dec 2010 23:44:24 -0800")
Message-ID: <ldvzkrhsqoi.fsf@cathode-dark-space.mit.edu>
Lines: 42
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
X-Brightmail-Tracker: AAAAAA==
Cc: IPv6 Operations Chairs <v6ops-chairs@tools.ietf.org>, "iesg@ietf.org IESG" <iesg@ietf.org>, secdir@ietf.org
Subject: Re: [secdir] secdir review of draft-ietf-v6ops-tunnel-loops-01
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Jan 2011 19:58:46 -0000

Fred Baker <fred@cisco.com> writes:

> Question for you. I have left the authors off the paper for the moment.
>
> Mr Gont has recently posted a draft:
>
> http://tools.ietf.org/html/draft-gont-6man-teredo-loops
>   "Mitigating Teredo Rooting Loop Attacks", Fernando Gont, 7-Sep-10,
>   <draft-gont-6man-teredo-loops-00.txt>
>
> and is pushing for adoption as a working group draft. When asked to
> consider merging his paper with this or another draft, he has been
> unwilling. The chairs have basically told him to discuss his draft
> on the list "and we'll see where it goes".

The draft filename implies 6man, not v6ops; which working group was
asked to consider it?  By "his paper", do you mean the following item
in the Informative References of draft-gont-6man-teredo-loops-00?

   [CPNI-IPv6]
              Gont, F., "Security Assessment of the Internet Protocol
              version 6 (IPv6)",  UK Centre for the Protection of
              National Infrastructure, (to be published).

The Teredo attacks and the protocol-41 attacks appear to be mostly
separate, and probably don't interact, with the possible exception of
using a protocol-41 tunnel to initiate a Teredo routing loop attack.

> One of your criticisms of this draft is that it doesn't cover his
> USENIX material. Would you prefer that this and Mr Gont's draft be
> merged?

A reader of this draft might erroneously conclude that it adequately
addresses all of the attacks described in the USENIX paper.  However,
I think it's sufficient to mention the existence of the Teredo
attacks, citing the USENIX paper and the Teredo routing loop draft,
because someone who reads draft-ietf-v6ops-tunnel-loops might not be
aware of the related attacks without reading the actual USENIX paper.

It would also be a good idea to briefly state that the Teredo attacks
are mostly separate from the protocol-41 attacks, and are therefore
treated in another document.

From fred@cisco.com  Mon Jan  3 12:18:19 2011
Return-Path: <fred@cisco.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D1CE73A6B65; Mon,  3 Jan 2011 12:18:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -110.149
X-Spam-Level: 
X-Spam-Status: No, score=-110.149 tagged_above=-999 required=5 tests=[AWL=-0.150, BAYES_00=-2.599, J_CHICKENPOX_13=0.6, RCVD_IN_DNSWL_HI=-8, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lxlDRs5kevd9; Mon,  3 Jan 2011 12:18:18 -0800 (PST)
Received: from sj-iport-5.cisco.com (sj-iport-5.cisco.com [171.68.10.87]) by core3.amsl.com (Postfix) with ESMTP id 7A7343A6A34; Mon,  3 Jan 2011 12:18:18 -0800 (PST)
Authentication-Results: sj-iport-5.cisco.com; dkim=neutral (message not signed) header.i=none
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AvsEAIW+IU2rR7Ht/2dsb2JhbACkNXOibJkRhUoEhGWGH4MdiBU
Received: from sj-core-1.cisco.com ([171.71.177.237]) by sj-iport-5.cisco.com with ESMTP; 03 Jan 2011 20:15:52 +0000
Received: from stealth-10-32-244-218.cisco.com (stealth-10-32-244-218.cisco.com [10.32.244.218]) by sj-core-1.cisco.com (8.13.8/8.14.3) with ESMTP id p03KFlVB024684; Mon, 3 Jan 2011 20:15:52 GMT
Received: from [127.0.0.1] by stealth-10-32-244-218.cisco.com (PGP Universal service); Mon, 03 Jan 2011 12:15:52 -0800
X-PGP-Universal: processed; by stealth-10-32-244-218.cisco.com on Mon, 03 Jan 2011 12:15:52 -0800
Mime-Version: 1.0 (Apple Message framework v1082)
From: Fred Baker <fred@cisco.com>
In-Reply-To: <ldvzkrhsqoi.fsf@cathode-dark-space.mit.edu>
Date: Mon, 3 Jan 2011 12:15:38 -0800
Message-Id: <47825793-8744-47D4-A453-24821A269F3A@cisco.com>
References: <ldvhbdv29lz.fsf@cathode-dark-space.mit.edu> <64AE925C-9A79-433C-A3A7-90FF523C0321@cisco.com> <ldvzkrhsqoi.fsf@cathode-dark-space.mit.edu>
To: Tom Yu <tlyu@MIT.EDU>
X-Mailer: Apple Mail (2.1082)
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: quoted-printable
Cc: IPv6 Operations Chairs <v6ops-chairs@tools.ietf.org>, "iesg@ietf.org IESG" <iesg@ietf.org>, secdir@ietf.org
Subject: Re: [secdir] secdir review of draft-ietf-v6ops-tunnel-loops-01
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Jan 2011 20:18:19 -0000

On Jan 3, 2011, at 12:00 PM, Tom Yu wrote:

> Fred Baker <fred@cisco.com> writes:
>=20
>> Question for you. I have left the authors off the paper for the =
moment.
>>=20
>> Mr Gont has recently posted a draft:
>>=20
>> http://tools.ietf.org/html/draft-gont-6man-teredo-loops
>>  "Mitigating Teredo Rooting Loop Attacks", Fernando Gont, 7-Sep-10,
>>  <draft-gont-6man-teredo-loops-00.txt>
>>=20
>> and is pushing for adoption as a working group draft. When asked to
>> consider merging his paper with this or another draft, he has been
>> unwilling. The chairs have basically told him to discuss his draft
>> on the list "and we'll see where it goes".
>=20
> The draft filename implies 6man, not v6ops; which working group was
> asked to consider it?  By "his paper", do you mean the following item
> in the Informative References of draft-gont-6man-teredo-loops-00?

True. he has none-the-less been asking me to make it a v6ops working =
group draft.

>   [CPNI-IPv6]
>              Gont, F., "Security Assessment of the Internet Protocol
>              version 6 (IPv6)",  UK Centre for the Protection of
>              National Infrastructure, (to be published).
>=20
> The Teredo attacks and the protocol-41 attacks appear to be mostly
> separate, and probably don't interact, with the possible exception of
> using a protocol-41 tunnel to initiate a Teredo routing loop attack.

>> One of your criticisms of this draft is that it doesn't cover his
>> USENIX material. Would you prefer that this and Mr Gont's draft be
>> merged?
>=20
> A reader of this draft might erroneously conclude that it adequately
> addresses all of the attacks described in the USENIX paper.  However,
> I think it's sufficient to mention the existence of the Teredo
> attacks, citing the USENIX paper and the Teredo routing loop draft,
> because someone who reads draft-ietf-v6ops-tunnel-loops might not be
> aware of the related attacks without reading the actual USENIX paper.

So you're simply looking for a reference? OK.

> It would also be a good idea to briefly state that the Teredo attacks
> are mostly separate from the protocol-41 attacks, and are therefore
> treated in another document.

OK.=

From tlyu@mit.edu  Mon Jan  3 13:27:36 2011
Return-Path: <tlyu@mit.edu>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id BDAFA3A6C50; Mon,  3 Jan 2011 13:27:36 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.207
X-Spam-Level: 
X-Spam-Status: No, score=-101.207 tagged_above=-999 required=5 tests=[AWL=1.392, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JmRyjKlSmoDy; Mon,  3 Jan 2011 13:27:36 -0800 (PST)
Received: from dmz-mailsec-scanner-1.mit.edu (DMZ-MAILSEC-SCANNER-1.MIT.EDU [18.9.25.12]) by core3.amsl.com (Postfix) with ESMTP id C32453A6C4F; Mon,  3 Jan 2011 13:27:35 -0800 (PST)
X-AuditID: 1209190c-b7ba9ae0000009f8-37-4d223fc56625
Received: from mailhub-auth-3.mit.edu ( [18.9.21.43]) by dmz-mailsec-scanner-1.mit.edu (Symantec Brightmail Gateway) with SMTP id 85.43.02552.5CF322D4; Mon,  3 Jan 2011 16:29:41 -0500 (EST)
Received: from outgoing.mit.edu (OUTGOING-AUTH.MIT.EDU [18.7.22.103]) by mailhub-auth-3.mit.edu (8.13.8/8.9.2) with ESMTP id p03LTffG005494;  Mon, 3 Jan 2011 16:29:41 -0500
Received: from cathode-dark-space.mit.edu (CATHODE-DARK-SPACE.MIT.EDU [18.18.1.96]) (authenticated bits=56) (User authenticated as tlyu@ATHENA.MIT.EDU) by outgoing.mit.edu (8.13.6/8.12.4) with ESMTP id p03LTdSV024689 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Mon, 3 Jan 2011 16:29:40 -0500 (EST)
Received: (from tlyu@localhost) by cathode-dark-space.mit.edu (8.12.9.20060308) id p03LTdnY002938; Mon, 3 Jan 2011 16:29:39 -0500 (EST)
To: Fred Baker <fred@cisco.com>
References: <ldvhbdv29lz.fsf@cathode-dark-space.mit.edu> <64AE925C-9A79-433C-A3A7-90FF523C0321@cisco.com> <ldvzkrhsqoi.fsf@cathode-dark-space.mit.edu> <47825793-8744-47D4-A453-24821A269F3A@cisco.com>
From: Tom Yu <tlyu@MIT.EDU>
Date: Mon, 03 Jan 2011 16:29:39 -0500
In-Reply-To: <47825793-8744-47D4-A453-24821A269F3A@cisco.com> (Fred Baker's message of "Mon, 3 Jan 2011 12:15:38 -0800")
Message-ID: <ldvd3odr7zw.fsf@cathode-dark-space.mit.edu>
Lines: 14
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
X-Brightmail-Tracker: AAAAAA==
Cc: IPv6 Operations Chairs <v6ops-chairs@tools.ietf.org>, "iesg@ietf.org IESG" <iesg@ietf.org>, secdir@ietf.org
Subject: Re: [secdir] secdir review of draft-ietf-v6ops-tunnel-loops-01
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Jan 2011 21:27:36 -0000

Fred Baker <fred@cisco.com> writes:

>> A reader of this draft might erroneously conclude that it adequately
>> addresses all of the attacks described in the USENIX paper.  However,
>> I think it's sufficient to mention the existence of the Teredo
>> attacks, citing the USENIX paper and the Teredo routing loop draft,
>> because someone who reads draft-ietf-v6ops-tunnel-loops might not be
>> aware of the related attacks without reading the actual USENIX paper.
>
> So you're simply looking for a reference? OK.

And sufficient text that the reader will be aware that not all of the
attacks (Teredo) described in the USENIX paper are addressed in this
document.

From vincent.roca@inrialpes.fr  Tue Jan  4 06:56:55 2011
Return-Path: <vincent.roca@inrialpes.fr>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id F1EBB3A6C57; Tue,  4 Jan 2011 06:56:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.249
X-Spam-Level: 
X-Spam-Status: No, score=-10.249 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, HELO_EQ_FR=0.35, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MSf6N5HnUU85; Tue,  4 Jan 2011 06:56:53 -0800 (PST)
Received: from mail3-relais-sop.national.inria.fr (mail3-relais-sop.national.inria.fr [192.134.164.104]) by core3.amsl.com (Postfix) with ESMTP id 47AC83A6BA5; Tue,  4 Jan 2011 06:56:53 -0800 (PST)
X-IronPort-AV: E=Sophos;i="4.60,272,1291590000"; d="scan'208";a="71761123"
Received: from demeter.inrialpes.fr ([194.199.24.102]) by mail3-relais-sop.national.inria.fr with ESMTP/TLS/DHE-RSA-CAMELLIA256-SHA; 04 Jan 2011 15:58:59 +0100
Message-ID: <4D2335B2.9030803@inrialpes.fr>
Date: Tue, 04 Jan 2011 15:58:58 +0100
From: Vincent Roca <vincent.roca@inrialpes.fr>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; fr; rv:1.9.2.13) Gecko/20101207 Thunderbird/3.1.7
MIME-Version: 1.0
To: "secdir@ietf.org" <secdir@ietf.org>, "iesg@ietf.org" <iesg@ietf.org>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Cc: draft-ietf-pim-group-rp-mapping.all@tools.ietf.org
Subject: [secdir] SecDir review of draft-ietf-pim-group-rp-mapping-08
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 04 Jan 2011 14:56:55 -0000

Hello,

I have reviewed this document as part of the security directorate's
ongoing effort to review all IETF documents being processed by the
IESG. These comments were written primarily for the benefit of the
security area directors. Document editors and WG chairs should treat
these comments just like any other last call comments.

The current security consideration section is extremely limited.
I understand that the additional risks introduced by the current
specification are limited. I also understand that securing PIM is a
problem by itself, that is well beyond the goals of this section
(e.g. it is currently being considered in the KARP WG).

However I'd appreciate if the authors can improve the current section:

** clarify that the main risk is the fact different RPs be selected for the
same group. Is there anything else? E.g. can forged control messages
lead PIM routers to point to a non existing RP for some (all?) groups
which would cause a DoS? (I have no idea if this is feasible or not, it's
just an example).

** the following sentence is ambiguous.
   "The updated algorithm will not completely prevent the possibility of
    different routers selecting different group-to-rp mappings for the
    same group."
It suggests (but does not say explicitly) that the updated algorithm
reduces the possibility of selecting different RP for the same group.
Is it the case?

** the last sentence is the key sentence and it MUST be developed.
What does:
"if various mechanisms [...] are secure and consistent across the network"
mean? You don't have to give answers (as I said it's a problem by itself
that deserved a specific WG to be created). However you can give a
few pointers, and illustrate with a simple attack that can make the
choice incoherent across the network, etc.

I hope these comments are useful.
Regards,

    Vincent

---
Two typos:

* section 2: "Wherever this term in used in this document..." -> "is"

* section 6: it is said (bullets 5, 6 and 7):
        *  If there is only one entry available then that is selected as 
Group-to-RP mapping.
I suggest: "... then that entry is selected..."



From weiler@watson.org  Tue Jan  4 13:23:40 2011
Return-Path: <weiler@watson.org>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 574363A6BC1 for <secdir@core3.amsl.com>; Tue,  4 Jan 2011 13:23:40 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.49
X-Spam-Level: 
X-Spam-Status: No, score=-2.49 tagged_above=-999 required=5 tests=[AWL=0.109,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kxMPZwJzVJd7 for <secdir@core3.amsl.com>; Tue,  4 Jan 2011 13:23:39 -0800 (PST)
Received: from fledge.watson.org (fledge.watson.org [65.122.17.41]) by core3.amsl.com (Postfix) with ESMTP id 292343A6BBE for <secdir@ietf.org>; Tue,  4 Jan 2011 13:23:39 -0800 (PST)
Received: from fledge.watson.org (localhost.watson.org [127.0.0.1]) by fledge.watson.org (8.14.4/8.14.4) with ESMTP id p04LPjdI060984 for <secdir@ietf.org>; Tue, 4 Jan 2011 16:25:45 -0500 (EST) (envelope-from weiler@watson.org)
Received: from localhost (weiler@localhost) by fledge.watson.org (8.14.4/8.14.4/Submit) with ESMTP id p04LPjvl060981 for <secdir@ietf.org>; Tue, 4 Jan 2011 16:25:45 -0500 (EST) (envelope-from weiler@watson.org)
X-Authentication-Warning: fledge.watson.org: weiler owned process doing -bs
Date: Tue, 4 Jan 2011 16:25:45 -0500 (EST)
From: Samuel Weiler <weiler@watson.org>
To: secdir@ietf.org
Message-ID: <alpine.BSF.2.00.1101041623490.58408@fledge.watson.org>
User-Agent: Alpine 2.00 (BSF 1167 2008-08-23)
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; format=flowed; charset=US-ASCII
X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.2.3 (fledge.watson.org [127.0.0.1]); Tue, 04 Jan 2011 16:25:45 -0500 (EST)
Subject: [secdir] Assignments
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: secdir-secretary@mit.edu
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 04 Jan 2011 21:23:40 -0000

With the holidays, new assignments haven't been sent in a while. 
There are many new docs below.

Review instructions and related resources are at:
      http://tools.ietf.org/area/sec/trac/wiki/SecDirReview

Jeffrey Hutzelman is next in the rotation.


For telechat 2011-01-06

Reviewer                 LC end     Draft
Phillip Hallam-Baker   T 2010-12-14 draft-ietf-ecrit-lost-servicelistboundary-05
Love Hornquist-Astrand T 2010-07-23 draft-ietf-pkix-ocspagility-09
Jeffrey Hutzelman      T 2010-12-06 draft-ietf-roll-trickle-06
Barry Leiba            T 2010-12-22 draft-turner-md5-seccon-update-08
David McGrew           T 2010-12-29 draft-kucherawy-authres-vbr-02
Hilarie Orman          T 2010-12-17 draft-ietf-avt-srtp-big-aes-05
Sam Weiler             T 2011-01-05 draft-ietf-dnsext-5395bis-02
Kurt Zeilenga          TR2010-12-29 draft-ietf-v6ops-tunnel-security-concerns-04


For telechat 2011-01-20

Dave Cridland          T 2010-12-03 draft-ietf-sipcore-sec-flows-07
Barry Leiba            TR2010-12-16 draft-saintandre-tls-server-id-check-12
Stefan Santesson       T 2010-12-30 draft-ietf-roll-security-framework-03
Tina TSOU              T 2011-01-06 draft-nsri-tls-aria-01
Carl Wallace           T 2011-01-03 draft-schaad-smime-algorithm-attribute-03
Larry Zhu              T 2011-01-14 draft-ietf-6lowpan-hc-13

Last calls and special requests:

Derek Atkins             2011-01-18 draft-groves-sakke-00
Rob Austein              2010-12-15 draft-salowey-secsh-uri-00
Rob Austein              2011-01-06 draft-ietf-6man-prefixlen-p2p-01
Richard Barnes           2011-01-18 draft-ietf-isis-ieee-aq-03
Dave Cridland            2011-01-18 draft-ietf-isis-purge-tlv-05
Alan DeKok               2011-01-18 draft-ietf-isis-reg-purge-00
Donald Eastlake          2011-01-07 draft-ietf-l3vpn-mvpn-infra-addrs-02
Shawn Emery              -          draft-ietf-ltans-xmlers-08
Stephen Farrell          2011-01-06 draft-ietf-mmusic-image-attributes-10
Tobias Gondrom           -          draft-ietf-mptcp-architecture-03
Phillip Hallam-Baker     -          draft-ietf-mptcp-threat-06
Steve Hanna              2011-01-05 draft-ietf-multimob-pmipv6-base-solution-07
Dan Harkins              2011-01-18 draft-igoe-secsh-suiteb-02
Sam Hartman              2011-01-18 draft-turner-cms-symmetrickeypackage-algs-00
Paul Hoffman             2011-01-18 draft-turner-additional-new-asn-06
Love Hornquist-Astrand   2011-02-01 draft-yevstifeyev-tn3270-uri-12
Charlie Kaufman         R2011-01-05 draft-baker-ietf-core-11
David McGrew             -          draft-ietf-ecrit-framework-12
Russ Mundy               2011-01-04 draft-cardona-cablelabs-urn-05
Sandy Murphy             2011-01-03 draft-turner-sha0-sha1-seccon-02
Eric Rescorla            2011-01-07 draft-ietf-pce-inter-layer-req-15
Joe Salowey              2011-01-05 draft-ietf-roll-routing-metrics-14
Nico Williams            2011-01-14 draft-yevstifeyev-http-headers-not-recognized-10
Kurt Zeilenga            2011-01-18 draft-groves-eccsi-00
Larry Zhu                2010-09-30 draft-lundberg-app-tei-xml-06
Glen Zorn                2011-01-18 draft-groves-mikey-sakke-00


From hilarie@purplestreak.com  Tue Jan  4 14:21:58 2011
Return-Path: <hilarie@purplestreak.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 1A7003A6C1B; Tue,  4 Jan 2011 14:21:58 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.599
X-Spam-Level: 
X-Spam-Status: No, score=-3.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LGWUPxol4y09; Tue,  4 Jan 2011 14:21:54 -0800 (PST)
Received: from out01.mta.xmission.com (out01.mta.xmission.com [166.70.13.231]) by core3.amsl.com (Postfix) with ESMTP id F1F053A6C5C; Tue,  4 Jan 2011 14:21:53 -0800 (PST)
Received: from mx02.mta.xmission.com ([166.70.13.212]) by out01.mta.xmission.com with esmtps (TLSv1:AES256-SHA:256) (Exim 4.69) (envelope-from <hilarie@purplestreak.com>) id 1PaFIP-0001Fs-62; Tue, 04 Jan 2011 15:24:01 -0700
Received: from 166-70-57-249.ip.xmission.com ([166.70.57.249] helo=fermat.rhmr.com) by mx02.mta.xmission.com with esmtps (TLSv1:AES256-SHA:256) (Exim 4.69) (envelope-from <hilarie@purplestreak.com>) id 1PaFIN-0005o7-35; Tue, 04 Jan 2011 15:24:00 -0700
Received: from fermat.rhmr.com (localhost [127.0.0.1]) by fermat.rhmr.com (8.14.3/8.14.3/Debian-9.1ubuntu1) with ESMTP id p04MQef9028796; Tue, 4 Jan 2011 15:26:40 -0700
Received: (from ho@localhost) by fermat.rhmr.com (8.14.3/8.14.3/Submit) id p04MQe4E028795; Tue, 4 Jan 2011 15:26:40 -0700
Date: Tue, 4 Jan 2011 15:26:40 -0700
Message-Id: <201101042226.p04MQe4E028795@fermat.rhmr.com>
X-Authentication-Warning: fermat.rhmr.com: ho set sender to hilarie using -f
From: "Hilarie Orman" <hilarie@purplestreak.com>
To: iesg@ietf.org, secdir@ietf.org
X-XM-SPF: eid=; ; ; mid=; ; ; hst=mx02.mta.xmission.com; ; ; ip=166.70.57.249; ; ; frm=hilarie@purplestreak.com; ; ; spf=none
X-XM-DomainKey: sender_domain=purplestreak.com; ; ; sender=hilarie@purplestreak.com; ; ; status=error
X-SA-Exim-Connect-IP: 166.70.57.249
X-SA-Exim-Mail-From: hilarie@purplestreak.com
X-Spam-DCC: XMission; sa03 1397; Body=1 Fuz1=1 Fuz2=1 
X-Spam-Combo: ;iesg@ietf.org, secdir@ietf.org
X-Spam-Relay-Country: 
X-SA-Exim-Version: 4.2.1 (built Fri, 06 Aug 2010 16:31:04 -0600)
X-SA-Exim-Scanned: Yes (on mx02.mta.xmission.com)
Subject: [secdir] review of draft-ietf-avt-srtp-big-aes-05.txt
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: Hilarie Orman <hilarie@purplestreak.com>
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 04 Jan 2011 22:21:58 -0000

Security review of draft-ietf-avt-srtp-big-aes-05.txt

Do not be alarmed.  I have reviewed this document as part of the
security directorate's ongoing effort to review all IETF documents
being processed by the IESG. These comments were written primarily for
the benefit of the security area directors. Document editors and WG
chairs should treat these comments just like any other last call
comments.

This is a very well-written document about using AES-192 and AES-256
with RTP, and I have only a few comments.

There is no comment on why AES-192 might be used.  There is a comment
about AES-128 vs. AES-256, but AES-192 seems to fall into a useless
middle ground.  I'd like to see some comment about it.

Section 3.1 "Usage Requirements" might be easier to understand if it
said that "When AES_192_CM is used for encryption, the key derivation
function MUST have a cryptographic strength of at least 192 bits;
AES_192_CM has this strength, AES_128_CM does not."  Similarly for
AES_256_CM.

It would be helpful to note which data items are specific to SRTP.
The draft says that it uses the terminology of "Section 4.1.1 of
[RFC3711]", but oddly enough, the "SSRC" is not defined in that
document, either.  One must go back to RFC3550 for its definition.

I was flummoxed by the math of "if kdr=0 then (index DIV kdr) = 0".
RFC3711 section 4.3.1 does explain it; it's kind of confusing to have to
switch back and forth between the two documents.

The block counter "b_c" is two octets, but the "default key lifetime"
is 2^31.  Is this perhaps the "maximum" key lifetime?  Should
implementors introduce an internal counter to keep track of the
history of key usage (across sessions?)?  Perhaps earlier documents
explain this?

Hilarie





From weiler@watson.org  Wed Jan  5 02:54:52 2011
Return-Path: <weiler@watson.org>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B14513A6B79; Wed,  5 Jan 2011 02:54:52 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.494
X-Spam-Level: 
X-Spam-Status: No, score=-2.494 tagged_above=-999 required=5 tests=[AWL=0.105,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qkLnJlVs8prL; Wed,  5 Jan 2011 02:54:52 -0800 (PST)
Received: from fledge.watson.org (fledge.watson.org [65.122.17.41]) by core3.amsl.com (Postfix) with ESMTP id CE3383A6B77; Wed,  5 Jan 2011 02:54:51 -0800 (PST)
Received: from fledge.watson.org (localhost.watson.org [127.0.0.1]) by fledge.watson.org (8.14.4/8.14.4) with ESMTP id p05Auv9R029061; Wed, 5 Jan 2011 05:56:58 -0500 (EST) (envelope-from weiler@watson.org)
Received: from localhost (weiler@localhost) by fledge.watson.org (8.14.4/8.14.4/Submit) with ESMTP id p05Auu92029058; Wed, 5 Jan 2011 05:56:56 -0500 (EST) (envelope-from weiler@watson.org)
X-Authentication-Warning: fledge.watson.org: weiler owned process doing -bs
Date: Wed, 5 Jan 2011 05:56:56 -0500 (EST)
From: Samuel Weiler <weiler@watson.org>
To: secdir@ietf.org, iesg@ietf.org, draft-ietf-dnsext-5395bis.all@tools.ietf.org
Message-ID: <alpine.BSF.2.00.1101050550550.27285@fledge.watson.org>
User-Agent: Alpine 2.00 (BSF 1167 2008-08-23)
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; format=flowed; charset=US-ASCII
X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.2.3 (fledge.watson.org [127.0.0.1]); Wed, 05 Jan 2011 05:56:58 -0500 (EST)
Subject: [secdir] secdir review of draft-ietf-dnsext-5395bis
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Jan 2011 10:54:52 -0000

I have reviewed this document as part of the security directorate's
ongoing effort to review all IETF documents being processed by the
IESG.  These comments were written primarily for the benefit of the
security area directors.  Document editors and WG chairs should treat
these comments just like any other last call comments.

5395 made some pretty big changes in how DNS RR types are assigned.
This update is trivial by comparison.  It was mainly triggered by the 
change in the DNSEXT WG mailing list name, which had been hard coded 
into 5395.  Other changes are editorial (e.g. removing the list of 
differences between 5395 and 2929).

The doc has no particular security impact.

I have no objections.

-- Sam

From CWallace@cygnacom.com  Wed Jan  5 10:42:05 2011
Return-Path: <CWallace@cygnacom.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3AE683A6C17; Wed,  5 Jan 2011 10:42:05 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level: 
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[AWL=0.000,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yaVIR32NQ-6I; Wed,  5 Jan 2011 10:42:04 -0800 (PST)
Received: from mail75.messagelabs.com (mail75.messagelabs.com [216.82.250.3]) by core3.amsl.com (Postfix) with SMTP id 7516D3A6BE9; Wed,  5 Jan 2011 10:42:04 -0800 (PST)
X-VirusChecked: Checked
X-Env-Sender: CWallace@cygnacom.com
X-Msg-Ref: server-7.tower-75.messagelabs.com!1294253050!109086494!1
X-StarScan-Version: 6.2.9; banners=-,-,-
X-Originating-IP: [65.242.48.8]
Received: (qmail 30030 invoked from network); 5 Jan 2011 18:44:10 -0000
Received: from unknown (HELO scygexch1.cygnacom.com) (65.242.48.8) by server-7.tower-75.messagelabs.com with SMTP; 5 Jan 2011 18:44:10 -0000
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
X-MimeOLE: Produced By Microsoft Exchange V6.5
Date: Wed, 5 Jan 2011 13:44:09 -0500
Message-ID: <FAD1CF17F2A45B43ADE04E140BA83D4801225B09@scygexch1.cygnacom.com>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: secdir review of draft-schaad-smime-algorithm-attribute-03
Thread-Index: AcutBrP9jR0C4SyKQWunIRas1nrn0Q==
From: "Carl Wallace" <CWallace@cygnacom.com>
To: <secdir@ietf.org>, <iesg@ietf.org>, <ietf@augustcellars.com>
Subject: [secdir] secdir review of draft-schaad-smime-algorithm-attribute-03
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Jan 2011 18:42:05 -0000

I have reviewed this document as part of the security directorate's
ongoing effort to review all IETF documents being processed by the IESG.
These comments were written primarily for the benefit of the security
area directors.  Document editors and WG chairs should treat these
comments just like any other last call comments.

This document looks good to me.  I have a few minor comments and
editorial suggestions.

For consistency, I suggest the definitions of the signatureAlgorithm and
macAlgorithm fields refer to the corresponding fields in SignerInfo and
AuthenticatedData similar to the description of the digestAlgorithm
field, i.e., refer to SignerInfo.signatureAlgorithm and
AuthenticatedData.macAlgorithm. =20

Though it doesn't really matter, given the requirement for one of
signatureAlgorithm or macAlgorithm to be present, why not use a CHOICE
and force the issue?

In 3.2, change signature validation to MAC verification.

From fred@cisco.com  Wed Jan  5 13:32:20 2011
Return-Path: <fred@cisco.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 658443A6DDB; Wed,  5 Jan 2011 13:32:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -110.445
X-Spam-Level: 
X-Spam-Status: No, score=-110.445 tagged_above=-999 required=5 tests=[AWL=0.154, BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Z5lX56hRNTkp; Wed,  5 Jan 2011 13:32:19 -0800 (PST)
Received: from sj-iport-2.cisco.com (sj-iport-2.cisco.com [171.71.176.71]) by core3.amsl.com (Postfix) with ESMTP id 64F633A6DCE; Wed,  5 Jan 2011 13:32:19 -0800 (PST)
Authentication-Results: sj-iport-2.cisco.com; dkim=neutral (message not signed) header.i=none
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AvsEAGlyJE2rR7H+/2dsb2JhbACkHXOmfJgrhUwEhGiGIoMf
X-IronPort-AV: E=Sophos;i="4.60,279,1291593600"; d="scan'208";a="301203033"
Received: from sj-core-2.cisco.com ([171.71.177.254]) by sj-iport-2.cisco.com with ESMTP; 05 Jan 2011 21:33:43 +0000
Received: from stealth-10-32-244-218.cisco.com (stealth-10-32-244-218.cisco.com [10.32.244.218]) by sj-core-2.cisco.com (8.13.8/8.14.3) with ESMTP id p05LXGIC002502; Wed, 5 Jan 2011 21:33:43 GMT
Received: from [127.0.0.1] by stealth-10-32-244-218.cisco.com (PGP Universal service); Wed, 05 Jan 2011 13:33:43 -0800
X-PGP-Universal: processed; by stealth-10-32-244-218.cisco.com on Wed, 05 Jan 2011 13:33:43 -0800
From: Fred Baker <fred@cisco.com>
Date: Wed, 5 Jan 2011 13:33:43 -0800
References: <004201cbad1f$79dfe9a0$6d9fbce0$@com>
To: IETF SmartPower Directorate <smartpowerdir@ietf.org>, secdir@ietf.org
Message-Id: <5D84701A-4890-429E-AFE7-DDB13F831C2A@cisco.com>
Mime-Version: 1.0 (Apple Message framework v1082)
X-Mailer: Apple Mail (2.1082)
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: quoted-printable
Subject: [secdir] Fwd: NIST security doc
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Jan 2011 21:32:20 -0000

FYI

Begin forwarded message:

> From: "Tony Hain" <ahain@cisco.com>
> Date: January 5, 2011 1:28:20 PM PST
> To: "'Tim Reilly \(tireilly\)'" <tireilly@cisco.com>, "'Joseph Chieng =
\(jochieng\)'" <jochieng@cisco.com>, "'Alan Egge \(aegge\)'" =
<aegge@cisco.com>, "'Rich West \(riwest\)'" <riwest@cisco.com>, "'Fred =
Baker'" <fred@cisco.com>
> Subject: NIST security doc
>=20
> In case this has not been widely publicized internally ...
>=20
> http://csrc.nist.gov/publications/nistpubs/800-119/sp800-119.pdf
>=20
>=20


From hallam@gmail.com  Wed Jan  5 14:39:45 2011
Return-Path: <hallam@gmail.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A49AD3A6D0B; Wed,  5 Jan 2011 14:39:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.384
X-Spam-Level: 
X-Spam-Status: No, score=-3.384 tagged_above=-999 required=5 tests=[AWL=0.215,  BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jGOrr2VwW6OW; Wed,  5 Jan 2011 14:39:44 -0800 (PST)
Received: from mail-yw0-f44.google.com (mail-yw0-f44.google.com [209.85.213.44]) by core3.amsl.com (Postfix) with ESMTP id 85D753A6D02; Wed,  5 Jan 2011 14:39:44 -0800 (PST)
Received: by ywk9 with SMTP id 9so7003060ywk.31 for <multiple recipients>; Wed, 05 Jan 2011 14:41:51 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:received:date:message-id :subject:from:to:content-type; bh=Chbm4NgVrTi6OXsedbMpDPxnZPsFYC5eIiDl/A3a2Q8=; b=W5IdPm1NYX8OFmO4Vn2P8cdvZ6fcybO9GWSM0tF4fb3icAZWmlnapNA79UQJqf1tR4 Ny9mGWfk+4xLcWLIi1NbRWx8PI4rz2dvyiEsue2J5DAwlgCqSDNbM5N+VDUUGXZXo5/K kUV9iFf0LFXXlFdJXjOBm5P0L3esqHLU7AtL8=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:date:message-id:subject:from:to:content-type; b=mGcOHaPU/bvOIpezh13SxjcjtEsQfT2XjlOxLd5e14RV/7uPo8YqZV5chAKEiNmAYr wDb+fWkZuOX/Y06fRCkwQ4yz55M4L3dgZ+iibnu4TV1U2241Y+VH1CKjAioWc+lGQWIL o+1aVHbPB43atWsNwOkvDmiYRkOawX8Lvidh8=
MIME-Version: 1.0
Received: by 10.100.231.20 with SMTP id d20mr3186430anh.35.1294267311265; Wed, 05 Jan 2011 14:41:51 -0800 (PST)
Received: by 10.100.31.8 with HTTP; Wed, 5 Jan 2011 14:41:51 -0800 (PST)
Date: Wed, 5 Jan 2011 22:41:51 +0000
Message-ID: <AANLkTimWH5wUkLqOF5HcK4pBkyrP=qQeyxdrWtz9J6tc@mail.gmail.com>
From: Phillip Hallam-Baker <hallam@gmail.com>
To: secdir@ietf.org, karlheinz.wolf@nic.at, Tim Polk <tim.polk@nist.gov>,  Sean Turner <turners@ieca.com>, iesg@ietf.org
Content-Type: text/plain; charset=ISO-8859-1
Subject: [secdir] SECDIR review of draft-ietf-ecrit-lost-servicelistboundary-05
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Jan 2011 22:39:45 -0000

Hello,

I have reviewed this document as part of the security directorate's
ongoing effort to review all IETF documents being processed by the
IESG. These comments were written primarily for the benefit of the
security area directors. Document editors and WG chairs should treat
these comments just like any other last call comments.


This draft proposes an experimental extension to the LoST protocol to
add additional information to the data being exchanged.

While the LoST protocol exchanges raise significant privacy and
confidentiality concerns, it does not appear to me that the additional
data proposed raises different or additional concerns. It is thus
appropriate for this document to refer back to the original protocol
document which in turn considers the privacy issues in considerable
detail.

--
Website: http://hallambaker.com/

From mcgrew@cisco.com  Wed Jan  5 14:53:41 2011
Return-Path: <mcgrew@cisco.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0AE583A6D18; Wed,  5 Jan 2011 14:53:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -110.599
X-Spam-Level: 
X-Spam-Status: No, score=-110.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id j7IvRUFiUweg; Wed,  5 Jan 2011 14:53:37 -0800 (PST)
Received: from sj-iport-4.cisco.com (sj-iport-4.cisco.com [171.68.10.86]) by core3.amsl.com (Postfix) with ESMTP id D37233A6D02; Wed,  5 Jan 2011 14:53:36 -0800 (PST)
Authentication-Results: sj-iport-4.cisco.com; dkim=neutral (message not signed) header.i=none
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AvsEAFeFJE2rRN+K/2dsb2JhbACkHHOmYZghhUwEhGiGIoMf
X-IronPort-AV: E=Sophos;i="4.60,279,1291593600"; d="scan'208";a="241065133"
Received: from sj-core-4.cisco.com ([171.68.223.138]) by sj-iport-4.cisco.com with ESMTP; 05 Jan 2011 22:55:43 +0000
Received: from [10.32.254.210] ([10.32.254.210]) by sj-core-4.cisco.com (8.13.8/8.14.3) with ESMTP id p05Mtg0E014998; Wed, 5 Jan 2011 22:55:43 GMT
Message-Id: <702D2C5A-8D11-4881-82FE-738E6F5B1D33@cisco.com>
From: David McGrew <mcgrew@cisco.com>
To: Hilarie Orman <hilarie@purplestreak.com>
In-Reply-To: <201101042226.p04MQe4E028795@fermat.rhmr.com>
Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes
Content-Transfer-Encoding: 7bit
Mime-Version: 1.0 (Apple Message framework v936)
Date: Wed, 5 Jan 2011 14:55:42 -0800
References: <201101042226.p04MQe4E028795@fermat.rhmr.com>
X-Mailer: Apple Mail (2.936)
Cc: iesg@ietf.org, secdir@ietf.org
Subject: Re: [secdir] review of draft-ietf-avt-srtp-big-aes-05.txt
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Jan 2011 22:53:41 -0000

Hi Hilarie,

thanks for your detailed review.

On Jan 4, 2011, at 2:26 PM, Hilarie Orman wrote:

> Security review of draft-ietf-avt-srtp-big-aes-05.txt
>
> Do not be alarmed.  I have reviewed this document as part of the
> security directorate's ongoing effort to review all IETF documents
> being processed by the IESG. These comments were written primarily for
> the benefit of the security area directors. Document editors and WG
> chairs should treat these comments just like any other last call
> comments.
>
> This is a very well-written document about using AES-192 and AES-256
> with RTP, and I have only a few comments.
>
> There is no comment on why AES-192 might be used.  There is a comment
> about AES-128 vs. AES-256, but AES-192 seems to fall into a useless
> middle ground.  I'd like to see some comment about it.

I agree that AES-192 doesn't seem that useful.  When the draft was  
first presented to AVT WG, the sentiment of the room was that AES-192  
might be useful, so the draft should include it, so that people have  
the option of using it if it seems valuable in the future.  I suppose  
the draft ought to say something like that.  How about:

AES-256 provides the highest level of security, and it SHOULD be used  
whenever the highest possible security is desired.  AES-192 provides a  
middle ground between the 128-bit and 256-bit versions of AES, and it  
MAY be used when higher security than AES-128 is desired.

>
> Section 3.1 "Usage Requirements" might be easier to understand if it
> said that "When AES_192_CM is used for encryption, the key derivation
> function MUST have a cryptographic strength of at least 192 bits;
> AES_192_CM has this strength, AES_128_CM does not."  Similarly for
> AES_256_CM.
>

Sounds good.

> It would be helpful to note which data items are specific to SRTP.
> The draft says that it uses the terminology of "Section 4.1.1 of
> [RFC3711]", but oddly enough, the "SSRC" is not defined in that
> document, either.  One must go back to RFC3550 for its definition.
>

That's a very constructive suggestion.

> I was flummoxed by the math of "if kdr=0 then (index DIV kdr) = 0".
> RFC3711 section 4.3.1 does explain it; it's kind of confusing to  
> have to
> switch back and forth between the two documents.
>
> The block counter "b_c" is two octets, but the "default key lifetime"
> is 2^31.  Is this perhaps the "maximum" key lifetime?  Should
> implementors introduce an internal counter to keep track of the
> history of key usage (across sessions?)?  Perhaps earlier documents
> explain this?
>

The key lifetime is the maximum number of packets that can be  
protected using a single key.  The packets are no longer than 2^18  
bytes, so limiting the number of packets is a convenient way to limit  
the number of bytes.

Perhaps the draft should mention that this parameter (and the other  
cryptosuite parameters) are defined in Section 8.2 of RFC 3711.

thanks again,

David

> Hilarie
>
>
>
>
> _______________________________________________
> secdir mailing list
> secdir@ietf.org
> https://www.ietf.org/mailman/listinfo/secdir


From mcgrew@cisco.com  Thu Jan  6 07:56:13 2011
Return-Path: <mcgrew@cisco.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B54A13A6E2B; Thu,  6 Jan 2011 07:56:13 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -110.599
X-Spam-Level: 
X-Spam-Status: No, score=-110.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id M-VLIYT-acWl; Thu,  6 Jan 2011 07:56:13 -0800 (PST)
Received: from sj-iport-3.cisco.com (sj-iport-3.cisco.com [171.71.176.72]) by core3.amsl.com (Postfix) with ESMTP id F12723A6E1A; Thu,  6 Jan 2011 07:56:12 -0800 (PST)
Authentication-Results: sj-iport-3.cisco.com; dkim=neutral (message not signed) header.i=none
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AvsEAJN1JU2rR7Hu/2dsb2JhbACkG3OlXJgMhUwEhGeGIoMd
Received: from sj-core-5.cisco.com ([171.71.177.238]) by sj-iport-3.cisco.com with ESMTP; 06 Jan 2011 15:58:19 +0000
Received: from [10.32.254.210] ([10.32.254.210]) by sj-core-5.cisco.com (8.13.8/8.14.3) with ESMTP id p06FwJMp003782; Thu, 6 Jan 2011 15:58:19 GMT
Message-Id: <07F215F7-78DF-4B09-AF28-F75FF15FD9CD@cisco.com>
From: David McGrew <mcgrew@cisco.com>
To: draft-kucherawy-authres-vbr@tools.ietf.org, secdir@ietf.org, The IESG <iesg@ietf.org>
Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes
Content-Transfer-Encoding: 7bit
Mime-Version: 1.0 (Apple Message framework v936)
Date: Thu, 6 Jan 2011 07:58:18 -0800
X-Mailer: Apple Mail (2.936)
Subject: [secdir] SECDIR review of draft-kucherawy-authres-vbr
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 06 Jan 2011 15:56:13 -0000

I have reviewed this document as part of the security directorate's  
ongoing effort to review all IETF documents being processed by the  
IESG.  These comments were written primarily for the benefit of the  
security area directors.  Document editors and WG chairs should treat  
these comments just like any other last call comments.

This draft defines a way that a border mail gateway that assesses  
inbound email using VBR can use AUTHRES to pass along the results of  
its assessment to user agents or other entities such as mail filters.   
This is a sensible and useful thing to do, and the draft is  
straightforward and clear.  I have a few comments/questions.

Section 1.  It is not clear what problem is referred to in paragraph  
two.

Section 4.

What behavior should a mail filter have upon receiving the result  
codes defined in that section?   If the recommended behavior is  
defined elsewhere (presumably [VBR]), then it should be referenced in  
this section.

What behavior should a border mail gateway have upon receiving a VBR  
response?   For instance, under what conditions (if any) should a  
border mail gateway not forward an email on which VBR has returned  
"fail"?   I would guess that this draft expects gateways to always  
forward emails, and regards a mail filter as a logically separate  
entity.  I suggest clarifying this point.

Section 6.  The Security Considerations are short, but I agree with  
what they say (that the Security Considerations of [VBR] and [AUTHRES]  
should be read and understood).

regards,

David






From danli@huawei.com  Thu Dec 30 23:38:12 2010
Return-Path: <danli@huawei.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 96A5D28C0E3; Thu, 30 Dec 2010 23:38:12 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.969
X-Spam-Level: 
X-Spam-Status: No, score=-2.969 tagged_above=-999 required=5 tests=[AWL=-0.526, BAYES_00=-2.599, FH_RELAY_NODNS=1.451, HELO_MISMATCH_COM=0.553, MIME_8BIT_HEADER=0.3, MIME_BASE64_TEXT=1.753,  RCVD_IN_DNSWL_MED=-4, RDNS_NONE=0.1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id r9kxmdNVr1iA; Thu, 30 Dec 2010 23:38:11 -0800 (PST)
Received: from szxga04-in.huawei.com (unknown [119.145.14.67]) by core3.amsl.com (Postfix) with ESMTP id B4BC43A68EF; Thu, 30 Dec 2010 23:38:11 -0800 (PST)
Received: from huawei.com (szxga04-in [172.24.2.12]) by szxga04-in.huawei.com (iPlanet Messaging Server 5.2 HotFix 2.14 (built Aug 8 2006)) with ESMTP id <0LEA00C547YV6Y@szxga04-in.huawei.com>; Fri, 31 Dec 2010 15:40:07 +0800 (CST)
Received: from huawei.com ([172.24.2.119]) by szxga04-in.huawei.com (iPlanet Messaging Server 5.2 HotFix 2.14 (built Aug 8 2006)) with ESMTP id <0LEA009GX7YUUJ@szxga04-in.huawei.com>; Fri, 31 Dec 2010 15:40:06 +0800 (CST)
Received: from l00037133 ([10.70.77.125]) by szxml04-in.huawei.com (iPlanet Messaging Server 5.2 HotFix 2.14 (built Aug 8 2006)) with ESMTPA id <0LEA00I6L7YU98@szxml04-in.huawei.com>; Fri, 31 Dec 2010 15:40:06 +0800 (CST)
Date: Fri, 31 Dec 2010 15:40:06 +0800
From: Dan Li <danli@huawei.com>
To: =?iso-8859-1?Q?Magnus_Nystr=F6m?= <magnusn@gmail.com>, draft-ietf-ccamp-gmpls-g-694-lambda-labels@tools.ietf.org, secdir@ietf.org, iesg@ietf.org
Message-id: <012301cba8bd$f18212f0$7d4d460a@china.huawei.com>
MIME-version: 1.0
X-MIMEOLE: Produced By Microsoft MimeOLE V6.00.2900.3664
X-Mailer: Microsoft Outlook Express 6.00.2900.3664
Content-type: text/plain; charset=iso-8859-1
Content-transfer-encoding: base64
X-Priority: 3
X-MSMail-priority: Normal
References: <AANLkTi=R6Fg-GOak7ychV_O0_RGO75yjLcrurna5xsXp@mail.gmail.com>
X-Mailman-Approved-At: Thu, 06 Jan 2011 09:46:04 -0800
Subject: Re: [secdir] Secdir review of draft-ietf-ccamp-gmpls-g-694-lambda-labels-10
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 31 Dec 2010 07:38:12 -0000

SGkgTWFnbnVzLA0KDQpUaGFua3MgZm9yIHlvdXIgcmV2aWV3IQ0KDQpQbGVhc2Ugc2VlIGJlbG93
Lg0KDQpUaGFua3MsDQoNCkRhbg0KDQotLS0tLSBPcmlnaW5hbCBNZXNzYWdlIC0tLS0tIA0KRnJv
bTogIk1hZ251cyBOeXN0cvZtIiA8bWFnbnVzbkBnbWFpbC5jb20+DQpUbzogPGRyYWZ0LWlldGYt
Y2NhbXAtZ21wbHMtZy02OTQtbGFtYmRhLWxhYmVsc0B0b29scy5pZXRmLm9yZz47IDxzZWNkaXJA
aWV0Zi5vcmc+OyA8aWVzZ0BpZXRmLm9yZz4NClNlbnQ6IEZyaWRheSwgRGVjZW1iZXIgMzEsIDIw
MTAgMTA6MDIgQU0NClN1YmplY3Q6IFNlY2RpciByZXZpZXcgb2YgZHJhZnQtaWV0Zi1jY2FtcC1n
bXBscy1nLTY5NC1sYW1iZGEtbGFiZWxzLTEwDQoNCg0KPkkgaGF2ZSByZXZpZXdlZCB0aGlzIGRv
Y3VtZW50IGFzIHBhcnQgb2YgdGhlIHNlY3VyaXR5IGRpcmVjdG9yYXRlJ3MNCj4gb25nb2luZyBl
ZmZvcnQgdG8gcmV2aWV3IGFsbCBJRVRGIGRvY3VtZW50cyBiZWluZyBwcm9jZXNzZWQgYnkgdGhl
DQo+IElFU0cuICBUaGVzZSBjb21tZW50cyB3ZXJlIHdyaXR0ZW4gcHJpbWFyaWx5IGZvciB0aGUg
YmVuZWZpdCBvZiB0aGUNCj4gc2VjdXJpdHkgYXJlYSBkaXJlY3RvcnMuIERvY3VtZW50IGVkaXRv
cnMgYW5kIFdHIGNoYWlycyBzaG91bGQgdHJlYXQNCj4gdGhlc2UgY29tbWVudHMganVzdCBsaWtl
IGFueSBvdGhlciBsYXN0IGNhbGwgY29tbWVudHMuDQo+IA0KPiBUaGlzIGRvY3VtZW50IGRlZmlu
ZXMgYSBuZXcgbGFtYmRhICh3YXZlbGVuZ3RoKSBsYWJlbCBmb3JtYXQgZm9yIHVzZQ0KPiBpbiBH
TVBMUyBzaWduYWxpbmcgYW5kIHJvdXRpbmcuDQo+IA0KPiBJIGhhdmUgbm8gcGFydGljdWxhciBz
ZWN1cml0eSBjb25jZXJucyB3aXRoIHRoaXMgZG9jdW1lbnQuDQo+IA0KPiBBIGZldyBlZGl0b3Jp
YWwgY29tbWVudHM6DQo+IA0KPiAtIEdlbmVyYWw6IFRoZSBkb2N1bWVudCBzZWVtcyB0byBiZSBp
biBuZWVkIG9mIGEgcHJvb2YtcmVhZDsgdGhlcmUgYXJlDQo+IHNldmVyYWwgZXhhbXBsZXMgd2hl
cmUgdGhlIHdvcmRpbmdzIG1ha2UgdGhlIGludGVudCBiZWhpbmQgYSBzZW50ZW5jZQ0KPiB1bmNs
ZWFyIC0gSSBjaXRlIHNvbWUgb2YgdGhlbSBiZWxvdy4NCj4gDQo+IC0gU2VjdGlvbiAyOiAiVGhl
IExhYmVsX1NldCBvYmplY3QgaXMgbWFkZSBieSBvbmx5IG9uZSBzdWIgY2hhbm5lbA0KPiB0aGF0
IG11c3QgYmUgc2FtZSBhcyB0aGUgVXBzdHJlYW1fTGFiZWwgb2JqZWN0IjogU3VnZ2VzdCBjaGFu
Z2luZyB0bw0KPiBzb21ldGhpbmcgbGlrZSAoaWYgSSBkaWQgbm90IG1pc3VuZGVyc3RhbmQgdGhl
IGludGVudCB3aXRoIHRoaXMNCj4gc2VudGVuY2UpOiAgIlRoZSBMYWJlbF9zZXQgb2JqZWN0IHNo
YWxsIGNvbnRhaW4gYSBzaW5nbGUgc3ViLWNoYW5uZWwNCj4gdGhhdCBtdXN0IGJlIHRoZSBzYW1l
IGFzIHRoZSBVcHN0cmVhbV9MYWJlbCBvYmplY3QiDQoNCltkYW5dIE9rLiBZb3UncmUgcmlnaHQh
IEkgY2FuIHVzZSB5b3VyIHByb3Bvc2VkIHRleHQuDQoNCj4gLSBTZWN0aW9uIDIsIGxhc3QgcGFy
YWdyYXBoIGlzIHVuY2xlYXIgYW5kIHNob3VsZCBwcmVmZXJhYmx5IGJlDQo+IHJlLXdyaXR0ZW4g
Zm9yIGNsYXJpdHkuDQo+IC0gU2VjdGlvbiAzLjEsIHRoaXJkIHBhcmFncmFwaCwgdW5jbGVhcg0K
DQpbZGFuXSBZb3Uga25vdyBFbmdsaXNoIGlzIG5vdCBteSBuYXRpdmUgbGFuZ3VhZ2UuIEFueSBw
cm9wb3NlZCB0ZXh0Pw0KDQo+IC0gU2VjdG9pbiAzLjEsIHdoeSBzdGF0ZSB0aGF0IG4gaXMgYSB0
d28ncyBjb21wbGVtZW50IGludGVnZXI/IFNlZW1zDQo+IHNpbXBsZXIgdG8gc3RhdGUgaXQgaXMg
anVzdCBhbiBpbnRlZ2VyPyAoaXQgZG9lcyBtYWtlIHNlbnNlIHRvIHN0YXRlDQo+IGl0IGluIDMu
MiwgaG93ZXZlcikNCj4gDQpbZGFuXSBUaGUgIm4iIGlzIGEgc2lnbmVkIGludGVnZXIuIEhlcmUg
anVzdCB3YW50IHRvIG1ha2UgaXQgbW9yZSBjbGVhciwgd2UgYXJlIHVzaW5nIHR3bydzIGNvbXBs
ZW1lbnQgaW50ZWdlci4gSW4gc2VjdGlvbiAzLjIgYW5kIDMuMywgdGhpcyBzdGF0ZW1lbnQgaXMg
cmVwZWF0ZWQuDQoNCj4gLS0gTWFnbnVz


From stpeter@stpeter.im  Mon Jan  3 10:59:51 2011
Return-Path: <stpeter@stpeter.im>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id EF6823A6AB1; Mon,  3 Jan 2011 10:59:50 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.468
X-Spam-Level: 
X-Spam-Status: No, score=-102.468 tagged_above=-999 required=5 tests=[AWL=0.131, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id icurMfovEPTh; Mon,  3 Jan 2011 10:59:49 -0800 (PST)
Received: from stpeter.im (stpeter.im [207.210.219.233]) by core3.amsl.com (Postfix) with ESMTP id 8C0733A6AB0; Mon,  3 Jan 2011 10:59:49 -0800 (PST)
Received: from leavealone.cisco.com (72-163-0-129.cisco.com [72.163.0.129]) (Authenticated sender: stpeter) by stpeter.im (Postfix) with ESMTPSA id 382AA4009B; Mon,  3 Jan 2011 12:16:07 -0700 (MST)
Message-ID: <4D221D21.40107@stpeter.im>
Date: Mon, 03 Jan 2011 12:01:53 -0700
From: Peter Saint-Andre <stpeter@stpeter.im>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.2.13) Gecko/20101207 Thunderbird/3.1.7
MIME-Version: 1.0
To: "Laganier, Julien" <julienl@qualcomm.com>
References: <BF345F63074F8040B58C00A186FCA57F29F6FBFE5D@NALASEXMB04.na.qualcomm.com>
In-Reply-To: <BF345F63074F8040B58C00A186FCA57F29F6FBFE5D@NALASEXMB04.na.qualcomm.com>
X-Enigmail-Version: 1.1.1
OpenPGP: url=http://www.saint-andre.com/me/stpeter.asc
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg=sha1; boundary="------------ms050408000207060805080501"
X-Mailman-Approved-At: Thu, 06 Jan 2011 09:46:04 -0800
Cc: "draft-loreto-http-bidirectional.all@tools.ietf.org" <draft-loreto-http-bidirectional.all@tools.ietf.org>, "iesg@ietf.org" <iesg@ietf.org>, "secdir@ietf.org" <secdir@ietf.org>
Subject: Re: [secdir] SecDir review of draft-loreto-http-bidirectional-05
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Jan 2011 18:59:51 -0000

This is a cryptographically signed message in MIME format.

--------------ms050408000207060805080501
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Thanks for your review, and our apologies for the delayed reply.

On 12/16/10 9:38 AM, Laganier, Julien wrote:
> I have reviewed this document as part of the security directorate's
> ongoing effort to review all IETF documents being processed by the
> IESG.  These comments were written primarily for the benefit of the
> security area directors.  Document editors and WG chairs should treat
> these comments just like any other last call comments.
>=20
> The document describes "Known issues and best practices for the Use
> of Long Polling and                    Streaming in Bidirectional
> HTTP", and it has the following abstract:
>=20
> There is widespread interest in using the Hypertext Transfer
> Protocol (HTTP) to enable asynchronous or server-initiated
> communication from a server to a client as well as from a client to a
> server.  This document describes the known issues and the best
> practices related to the use of HTTP, as it exists today, to enable
> such "bidirectional HTTP".  The two existing mechanisms, called "HTTP
> long polling" and "HTTP streaming" are described.
>=20
> The document is very clear and articulate and I have not found any
> security issues that were not covered appropriately in the Security
> Considerations sections.
>=20
> I have two concerns regarding the use of "should", "must" etc.:
>=20
> 1. I have found at least one occurrence where a recommendation is
> made using lower cases "recommended" and "should". Should upper cases
> be used instead?

Currently this document does not reference RFC 2119 or use capitalized
keywords. Instead of adding such a reference, I suggest changing that
text to:

   Several experiments have shown success with timeouts as high as 120
   seconds, but generally 30 seconds is a safer value.  Therefore
   vendors of network equipment wishing to be compatible with the HTTP
   long polling mechanism are advised to implement a timeout
   substantially greater than 30 seconds (where "substantially" means
   several times more than the medium network transit time).

> 2. Similarly, parts of the text describes node behavior using lower
> cases "should" and "must". This makes it hard for the reader to
> differentiate between behavior specified in another standard document
> from behavior that can be reasonably expected from a deployed
> implementation. I would suggest that upper case requirements key
> words ("SHOULD", "MUST") be used if the behavior thereby enounced is
> specified within another RFC documents, and that document be cited
> next to the statement.

The sentences you mention indeed simply cite other RFCs. Because the
actual normative text is contained in the referenced RFCs, I suggest
that we remove the lowercase "should" and "must" words from this I-D.

> Nits:
>=20
> s/DOS attacks\.[RFC4732]/Denial-of-Service (DoS) attacks [RFC4732]/

Fixed.

Peter

--=20
Peter Saint-Andre
https://stpeter.im/




--------------ms050408000207060805080501
Content-Type: application/pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
Content-Description: S/MIME Cryptographic Signature
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--------------ms050408000207060805080501--

From stpeter@stpeter.im  Mon Jan  3 11:15:52 2011
Return-Path: <stpeter@stpeter.im>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 9038B3A6AFB; Mon,  3 Jan 2011 11:15:52 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.472
X-Spam-Level: 
X-Spam-Status: No, score=-102.472 tagged_above=-999 required=5 tests=[AWL=0.127, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NPcDAHV8ktvr; Mon,  3 Jan 2011 11:15:51 -0800 (PST)
Received: from stpeter.im (stpeter.im [207.210.219.233]) by core3.amsl.com (Postfix) with ESMTP id 964EB3A6AF9; Mon,  3 Jan 2011 11:15:51 -0800 (PST)
Received: from leavealone.cisco.com (72-163-0-129.cisco.com [72.163.0.129]) (Authenticated sender: stpeter) by stpeter.im (Postfix) with ESMTPSA id 8194B4009B; Mon,  3 Jan 2011 12:32:09 -0700 (MST)
Message-ID: <4D2220E4.10000@stpeter.im>
Date: Mon, 03 Jan 2011 12:17:56 -0700
From: Peter Saint-Andre <stpeter@stpeter.im>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.2.13) Gecko/20101207 Thunderbird/3.1.7
MIME-Version: 1.0
To: "Laganier, Julien" <julienl@qualcomm.com>
References: <BF345F63074F8040B58C00A186FCA57F29F6FBFE5D@NALASEXMB04.na.qualcomm.com>	<4D221D21.40107@stpeter.im> <BF345F63074F8040B58C00A186FCA57F7E273BBF4A@NALASEXMB04.na.qualcomm.com>
In-Reply-To: <BF345F63074F8040B58C00A186FCA57F7E273BBF4A@NALASEXMB04.na.qualcomm.com>
X-Enigmail-Version: 1.1.1
OpenPGP: url=http://www.saint-andre.com/me/stpeter.asc
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg=sha1; boundary="------------ms040601080908020600020007"
X-Mailman-Approved-At: Thu, 06 Jan 2011 09:46:04 -0800
Cc: "draft-loreto-http-bidirectional.all@tools.ietf.org" <draft-loreto-http-bidirectional.all@tools.ietf.org>, "iesg@ietf.org" <iesg@ietf.org>, "secdir@ietf.org" <secdir@ietf.org>
Subject: Re: [secdir] SecDir review of draft-loreto-http-bidirectional-05
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Jan 2011 19:15:52 -0000

This is a cryptographically signed message in MIME format.

--------------ms040601080908020600020007
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Super. We'll push out a revised I-D in the next day or two.

On 1/3/11 12:05 PM, Laganier, Julien wrote:
> Thanks Pete, what you propose below seems appropriate.
>=20
> --julien
>=20
> Peter Saint-Andre wrote:
>>
>> Thanks for your review, and our apologies for the delayed reply.
>>
>> On 12/16/10 9:38 AM, Laganier, Julien wrote:
>>> I have reviewed this document as part of the security directorate's
>>> ongoing effort to review all IETF documents being processed by the
>>> IESG.  These comments were written primarily for the benefit of the
>>> security area directors.  Document editors and WG chairs should treat=

>>> these comments just like any other last call comments.
>>>
>>> The document describes "Known issues and best practices for the Use
>>> of Long Polling and                    Streaming in Bidirectional
>>> HTTP", and it has the following abstract:
>>>
>>> There is widespread interest in using the Hypertext Transfer
>>> Protocol (HTTP) to enable asynchronous or server-initiated
>>> communication from a server to a client as well as from a client to a=

>>> server.  This document describes the known issues and the best
>>> practices related to the use of HTTP, as it exists today, to enable
>>> such "bidirectional HTTP".  The two existing mechanisms, called "HTTP=

>>> long polling" and "HTTP streaming" are described.
>>>
>>> The document is very clear and articulate and I have not found any
>>> security issues that were not covered appropriately in the Security
>>> Considerations sections.
>>>
>>> I have two concerns regarding the use of "should", "must" etc.:
>>>
>>> 1. I have found at least one occurrence where a recommendation is
>>> made using lower cases "recommended" and "should". Should upper cases=

>>> be used instead?
>>
>> Currently this document does not reference RFC 2119 or use capitalized=

>> keywords. Instead of adding such a reference, I suggest changing that
>> text to:
>>
>>    Several experiments have shown success with timeouts as high as 120=

>>    seconds, but generally 30 seconds is a safer value.  Therefore
>>    vendors of network equipment wishing to be compatible with the HTTP=

>>    long polling mechanism are advised to implement a timeout
>>    substantially greater than 30 seconds (where "substantially" means
>>    several times more than the medium network transit time).
>>
>>> 2. Similarly, parts of the text describes node behavior using lower
>>> cases "should" and "must". This makes it hard for the reader to
>>> differentiate between behavior specified in another standard document=

>>> from behavior that can be reasonably expected from a deployed
>>> implementation. I would suggest that upper case requirements key
>>> words ("SHOULD", "MUST") be used if the behavior thereby enounced is
>>> specified within another RFC documents, and that document be cited
>>> next to the statement.
>>
>> The sentences you mention indeed simply cite other RFCs. Because the
>> actual normative text is contained in the referenced RFCs, I suggest
>> that we remove the lowercase "should" and "must" words from this I-D.
>>
>>> Nits:
>>>
>>> s/DOS attacks\.[RFC4732]/Denial-of-Service (DoS) attacks [RFC4732]/
>>
>> Fixed.
>>
>> Peter


--------------ms040601080908020600020007
Content-Type: application/pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
Content-Description: S/MIME Cryptographic Signature
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--------------ms040601080908020600020007--

From stpeter@stpeter.im  Mon Jan  3 12:54:25 2011
Return-Path: <stpeter@stpeter.im>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 91AD63A6BF0; Mon,  3 Jan 2011 12:54:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.481
X-Spam-Level: 
X-Spam-Status: No, score=-102.481 tagged_above=-999 required=5 tests=[AWL=0.118, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xWniXbsZ48Vs; Mon,  3 Jan 2011 12:54:24 -0800 (PST)
Received: from stpeter.im (stpeter.im [207.210.219.233]) by core3.amsl.com (Postfix) with ESMTP id 36C603A6BEF; Mon,  3 Jan 2011 12:54:24 -0800 (PST)
Received: from leavealone.cisco.com (72-163-0-129.cisco.com [72.163.0.129]) (Authenticated sender: stpeter) by stpeter.im (Postfix) with ESMTPSA id D861B400EE; Mon,  3 Jan 2011 14:10:41 -0700 (MST)
Message-ID: <4D2237FC.40404@stpeter.im>
Date: Mon, 03 Jan 2011 13:56:28 -0700
From: Peter Saint-Andre <stpeter@stpeter.im>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.2.13) Gecko/20101207 Thunderbird/3.1.7
MIME-Version: 1.0
To: "Laganier, Julien" <julienl@qualcomm.com>
References: <BF345F63074F8040B58C00A186FCA57F29F6FBFE5D@NALASEXMB04.na.qualcomm.com>	<4D221D21.40107@stpeter.im> <BF345F63074F8040B58C00A186FCA57F7E273BBF4A@NALASEXMB04.na.qualcomm.com> <4D2220E4.10000@stpeter.im>
In-Reply-To: <4D2220E4.10000@stpeter.im>
X-Enigmail-Version: 1.1.1
OpenPGP: url=http://www.saint-andre.com/me/stpeter.asc
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg=sha1; boundary="------------ms000305070203020405030606"
X-Mailman-Approved-At: Thu, 06 Jan 2011 09:46:04 -0800
Cc: "draft-loreto-http-bidirectional.all@tools.ietf.org" <draft-loreto-http-bidirectional.all@tools.ietf.org>, "iesg@ietf.org" <iesg@ietf.org>, "secdir@ietf.org" <secdir@ietf.org>
Subject: Re: [secdir] SecDir review of draft-loreto-http-bidirectional-05
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Jan 2011 20:54:25 -0000

This is a cryptographically signed message in MIME format.

--------------ms000305070203020405030606
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Done.

On 1/3/11 12:17 PM, Peter Saint-Andre wrote:
> Super. We'll push out a revised I-D in the next day or two.
>=20
> On 1/3/11 12:05 PM, Laganier, Julien wrote:
>> Thanks Pete, what you propose below seems appropriate.
>>
>> --julien
>>
>> Peter Saint-Andre wrote:
>>>
>>> Thanks for your review, and our apologies for the delayed reply.
>>>
>>> On 12/16/10 9:38 AM, Laganier, Julien wrote:
>>>> I have reviewed this document as part of the security directorate's
>>>> ongoing effort to review all IETF documents being processed by the
>>>> IESG.  These comments were written primarily for the benefit of the
>>>> security area directors.  Document editors and WG chairs should trea=
t
>>>> these comments just like any other last call comments.
>>>>
>>>> The document describes "Known issues and best practices for the Use
>>>> of Long Polling and                    Streaming in Bidirectional
>>>> HTTP", and it has the following abstract:
>>>>
>>>> There is widespread interest in using the Hypertext Transfer
>>>> Protocol (HTTP) to enable asynchronous or server-initiated
>>>> communication from a server to a client as well as from a client to =
a
>>>> server.  This document describes the known issues and the best
>>>> practices related to the use of HTTP, as it exists today, to enable
>>>> such "bidirectional HTTP".  The two existing mechanisms, called "HTT=
P
>>>> long polling" and "HTTP streaming" are described.
>>>>
>>>> The document is very clear and articulate and I have not found any
>>>> security issues that were not covered appropriately in the Security
>>>> Considerations sections.
>>>>
>>>> I have two concerns regarding the use of "should", "must" etc.:
>>>>
>>>> 1. I have found at least one occurrence where a recommendation is
>>>> made using lower cases "recommended" and "should". Should upper case=
s
>>>> be used instead?
>>>
>>> Currently this document does not reference RFC 2119 or use capitalize=
d
>>> keywords. Instead of adding such a reference, I suggest changing that=

>>> text to:
>>>
>>>    Several experiments have shown success with timeouts as high as 12=
0
>>>    seconds, but generally 30 seconds is a safer value.  Therefore
>>>    vendors of network equipment wishing to be compatible with the HTT=
P
>>>    long polling mechanism are advised to implement a timeout
>>>    substantially greater than 30 seconds (where "substantially" means=

>>>    several times more than the medium network transit time).
>>>
>>>> 2. Similarly, parts of the text describes node behavior using lower
>>>> cases "should" and "must". This makes it hard for the reader to
>>>> differentiate between behavior specified in another standard documen=
t
>>>> from behavior that can be reasonably expected from a deployed
>>>> implementation. I would suggest that upper case requirements key
>>>> words ("SHOULD", "MUST") be used if the behavior thereby enounced is=

>>>> specified within another RFC documents, and that document be cited
>>>> next to the statement.
>>>
>>> The sentences you mention indeed simply cite other RFCs. Because the
>>> actual normative text is contained in the referenced RFCs, I suggest
>>> that we remove the lowercase "should" and "must" words from this I-D.=

>>>
>>>> Nits:
>>>>
>>>> s/DOS attacks\.[RFC4732]/Denial-of-Service (DoS) attacks [RFC4732]/
>>>
>>> Fixed.
>>>
>>> Peter
>=20


--=20
Peter Saint-Andre
https://stpeter.im/




--------------ms000305070203020405030606
Content-Type: application/pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
Content-Description: S/MIME Cryptographic Signature
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--------------ms000305070203020405030606--

From bharat_joshi@infosys.com  Wed Jan  5 21:23:25 2011
Return-Path: <bharat_joshi@infosys.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 843223A6ECD; Wed,  5 Jan 2011 21:23:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.137
X-Spam-Level: 
X-Spam-Status: No, score=-6.137 tagged_above=-999 required=5 tests=[AWL=0.462,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pPyf48sG3WlC; Wed,  5 Jan 2011 21:23:24 -0800 (PST)
Received: from kecgate06.infosys.com (Kecgate06.infosys.com [122.98.14.33]) by core3.amsl.com (Postfix) with ESMTP id 70B713A68DA; Wed,  5 Jan 2011 21:23:23 -0800 (PST)
X-TM-IMSS-Message-ID: <014a8e8f001ed4e9@infosys.com>
Received: from blrkechub03.ad.infosys.com ([10.66.236.43]) by infosys.com ([122.98.14.33]) with ESMTP (TREND IMSS SMTP Service 7.1) id 014a8e8f001ed4e9 ; Thu, 6 Jan 2011 10:56:14 +0530
Received: from BLRKECMBX02.ad.infosys.com ([10.66.236.22]) by blrkechub03.ad.infosys.com ([10.66.236.43]) with mapi; Thu, 6 Jan 2011 10:55:03 +0530
From: Bharat Joshi <bharat_joshi@infosys.com>
To: Vincent Roca <vincent.roca@inrialpes.fr>, "secdir@ietf.org" <secdir@ietf.org>, "iesg@ietf.org" <iesg@ietf.org>
Date: Thu, 6 Jan 2011 10:55:02 +0530
Thread-Topic: SecDir review of draft-ietf-pim-group-rp-mapping-08
Thread-Index: AcusH/ScoaqYT08AQCOE+lb3nlZ6eABO0Dcu
Message-ID: <31D55C4D55BEED48A4459EB64567589A10811495B1@BLRKECMBX02.ad.infosys.com>
References: <4D2335B2.9030803@inrialpes.fr>
In-Reply-To: <4D2335B2.9030803@inrialpes.fr>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Mailman-Approved-At: Thu, 06 Jan 2011 09:46:04 -0800
Cc: "draft-ietf-pim-group-rp-mapping.all@tools.ietf.org" <draft-ietf-pim-group-rp-mapping.all@tools.ietf.org>
Subject: Re: [secdir] SecDir review of draft-ietf-pim-group-rp-mapping-08
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 06 Jan 2011 05:23:25 -0000

Hi=20Vincent,

=20=20=20=20=20Thanks=20for=20your=20comment.=20Please=20see=20in=20line=
=20for=20my=20response.

Regards,
Bharat
=20
>=20The=20current=20security=20consideration=20section=20is=20extremely=
=20limited.
>=20I=20understand=20that=20the=20additional=20risks=20introduced=20by=20=
the=20current
>=20specification=20are=20limited.=20I=20also=20understand=20that=20secur=
ing=20PIM=20is=20a
>=20problem=20by=20itself,=20that=20is=20well=20beyond=20the=20goals=20of=
=20this=20section
>=20(e.g.=20it=20is=20currently=20being=20considered=20in=20the=20KARP=20=
WG).

Yes.=20I=20agree.
=20
>=20However=20I'd=20appreciate=20if=20the=20authors=20can=20improve=20the=
=20current=20section:
>=20
>=20**=20clarify=20that=20the=20main=20risk=20is=20the=20fact=20different=
=20RPs=20be=20selected=20for=20the
>=20same=20group.=20Is=20there=20anything=20else?=20E.g.=20can=20forged=
=20control=20messages
>=20lead=20PIM=20routers=20to=20point=20to=20a=20non=20existing=20RP=20fo=
r=20some=20(all?)=20groups
>=20which=20would=20cause=20a=20DoS?=20(I=20have=20no=20idea=20if=20this=
=20is=20feasible=20or=20not,=20it's
>=20just=20an=20example).
>

If=20a=20different=20RP=20is=20selected,=20a=20PIM=20join/prune=20message=
=20will=20be=20sent=20to=20this=20RP=20which=20may=20not=20be=20the=20RP=
=20for=20the=20group=20in=20PIM=20join/prune=20message.

A=20forged=20control=20message=20from=20which=20a=20group-to-rp=20mapping=
=20is=20learned,=20will=20be=20used=20by=20the=20algorithm=20defined=20in=
=20this=20document.=20But=20we=20have=20not=20added=20such=20information=
=20in=20this=20draft=20because=20the=20forged=20message=20should=20have=
=20been=20handled=20as=20defined=20in=20RFCs=20that=20has=20defined=20thi=
s=20particular=20mechanism=20which=20was=20used=20to=20learn=20this=20gro=
up-to-rp=20mapping?=20This=20is=20what=20is=20mentioned=20in=20the=20draf=
t=20as=20well.

Do=20you=20think=20we=20should=20explain=20some=20more=20here?=20

>=20**=20the=20following=20sentence=20is=20ambiguous.
>=20=20=20=20"The=20updated=20algorithm=20will=20not=20completely=20preve=
nt=20the=20possibility=20of
>=20=20=20=20=20different=20routers=20selecting=20different=20group-to-rp=
=20mappings=20for=20the
>=20=20=20=20=20same=20group."
>=20It=20suggests=20(but=20does=20not=20say=20explicitly)=20that=20the=20=
updated=20algorithm
>=20reduces=20the=20possibility=20of=20selecting=20different=20RP=20for=
=20the=20same=20group.
>=20Is=20it=20the=20case?
>=20

Actually=20this=20sentence=20is=20trying=20to=20say=20that=20routers=20us=
ing=20this=20algorithm=20can=20come=20up=20with=20a=20different=20RP=20fo=
r=20a=20given=20group=20if=20the=20group-to-rp=20mappings=20learned=20by=
=20various=20methods=20are=20not=20same.=20Now=20this=20can=20be=20avoide=
d=20if=20we=20keep=20these=20various=20methods=20consistent=20and=20secur=
e=20across=20all=20routers.

>=20**=20the=20last=20sentence=20is=20the=20key=20sentence=20and=20it=20M=
UST=20be=20developed.
>=20What=20does:
>=20"if=20various=20mechanisms=20[...]=20are=20secure=20and=20consistent=
=20across=20the=20network"
>=20mean?=20You=20don't=20have=20to=20give=20answers=20(as=20I=20said=20i=
t's=20a=20problem=20by=20itself
>=20that=20deserved=20a=20specific=20WG=20to=20be=20created).=20However=
=20you=20can=20give=20a
>=20few=20pointers,=20and=20illustrate=20with=20a=20simple=20attack=20tha=
t=20can=20make=20the
>=20choice=20incoherent=20across=20the=20network,=20etc.

Ok.=20Do=20you=20think=20the=20following=20paragraph=20instead=20of=20wha=
t=20is=20there=20in=20the=20draft=20looks=20better:

<<<

=20=20=20This=20document=20enhances=20an=20existing=20algorithm=20to=20de=
terministically
=20=20=20choose=20between=20several=20group-to-rp=20mappings=20for=20a=20=
specific=20group.
=20=20=20Different=20routers=20may=20select=20different=20group-to-rp=20m=
apping=20for=20the=20same=20group
=20=20=20if=20the=20group-to-rp=20mappings=20learned=20in=20these=20route=
rs=20are=20not=20consistent.=20For
=20=20=20example:=20let=20us=20assume=20that=20BSR=20is=20not=20enabled=
=20in=20one=20of=20the=20router=20and=20so=20it=20
=20=20=20does=20not=20learn=20any=20group-to-rp=20mappings=20from=20BSR.=
=20Now=20as=20the=20group-to-rp=20
=20=20=20mappings=20learned=20in=20this=20router=20is=20not=20consistent=
=20with=20other=20routers=20in=20the=20
=20=20=20network,=20it=20may=20select=20a=20different=20RP=20or=20may=20n=
ot=20select=20any=20RP=20for=20a=20given=20group.=20
=20=20=20Such=20situations=20can=20be=20avoided=20if=20various=20mechanis=
ms=20used=20to=20learn=20group-to-rp
=20=20=20mappings=20are=20secure=20and=20consistent=20across=20the=20netw=
ork.

>>>

Is=20the=20above=20good=20enough?=20If=20not,=20can=20you=20suggest=20som=
ething?

>=20I=20hope=20these=20comments=20are=20useful.

Yes.=20They=20surely=20are.

>=20---
>=20Two=20typos:
>=20
>=20*=20section=202:=20"Wherever=20this=20term=20in=20used=20in=20this=20=
document..."=20->=20"is"

Yes.=20Will=20fix.

>=20*=20section=206:=20it=20is=20said=20(bullets=205,=206=20and=207):
>=20=20=20=20=20=20=20=20=20*=20=20If=20there=20is=20only=20one=20entry=
=20available=20then=20that=20is=20selected=20as=20
>=20Group-to-RP=20mapping.
>=20I=20suggest:=20"...=20then=20that=20entry=20is=20selected..."

Yes.=20Will=20fix.
****************=20CAUTION=20-=20Disclaimer=20*****************
This=20e-mail=20contains=20PRIVILEGED=20AND=20CONFIDENTIAL=20INFORMATION=
=20intended=20solely=20
for=20the=20use=20of=20the=20addressee(s).=20If=20you=20are=20not=20the=
=20intended=20recipient,=20please=20
notify=20the=20sender=20by=20e-mail=20and=20delete=20the=20original=20mes=
sage.=20Further,=20you=20are=20not=20
to=20copy,=20disclose,=20or=20distribute=20this=20e-mail=20or=20its=20con=
tents=20to=20any=20other=20person=20and=20
any=20such=20actions=20are=20unlawful.=20This=20e-mail=20may=20contain=20=
viruses.=20Infosys=20has=20taken=20
every=20reasonable=20precaution=20to=20minimize=20this=20risk,=20but=20is=
=20not=20liable=20for=20any=20damage=20
you=20may=20sustain=20as=20a=20result=20of=20any=20virus=20in=20this=20e-=
mail.=20You=20should=20carry=20out=20your=20
own=20virus=20checks=20before=20opening=20the=20e-mail=20or=20attachment.=
=20Infosys=20reserves=20the=20
right=20to=20monitor=20and=20review=20the=20content=20of=20all=20messages=
=20sent=20to=20or=20from=20this=20e-mail=20
address.=20Messages=20sent=20to=20or=20from=20this=20e-mail=20address=20m=
ay=20be=20stored=20on=20the=20
Infosys=20e-mail=20system.
***INFOSYS********=20End=20of=20Disclaimer=20********INFOSYS***

From weiler@watson.org  Thu Jan  6 10:04:56 2011
Return-Path: <weiler@watson.org>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id BD2C03A6E28; Thu,  6 Jan 2011 10:04:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.498
X-Spam-Level: 
X-Spam-Status: No, score=-2.498 tagged_above=-999 required=5 tests=[AWL=0.101,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0J9fztwwrBYV; Thu,  6 Jan 2011 10:04:56 -0800 (PST)
Received: from fledge.watson.org (fledge.watson.org [65.122.17.41]) by core3.amsl.com (Postfix) with ESMTP id CE0F83A6C9B; Thu,  6 Jan 2011 10:04:55 -0800 (PST)
Received: from fledge.watson.org (localhost.watson.org [127.0.0.1]) by fledge.watson.org (8.14.4/8.14.4) with ESMTP id p06I71Lh032498; Thu, 6 Jan 2011 13:07:02 -0500 (EST) (envelope-from weiler@watson.org)
Received: from localhost (weiler@localhost) by fledge.watson.org (8.14.4/8.14.4/Submit) with ESMTP id p06I71v6032495; Thu, 6 Jan 2011 13:07:01 -0500 (EST) (envelope-from weiler@watson.org)
X-Authentication-Warning: fledge.watson.org: weiler owned process doing -bs
Date: Thu, 6 Jan 2011 13:07:01 -0500 (EST)
From: Samuel Weiler <weiler@watson.org>
To: secdir@ietf.org, iesg@ietf.org, draft-ietf-dnsext-5395bis.all@tools.ietf.org
In-Reply-To: <alpine.BSF.2.00.1101050550550.27285@fledge.watson.org>
Message-ID: <alpine.BSF.2.00.1101061304090.23132@fledge.watson.org>
References: <alpine.BSF.2.00.1101050550550.27285@fledge.watson.org>
User-Agent: Alpine 2.00 (BSF 1167 2008-08-23)
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII; format=flowed
X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.2.3 (fledge.watson.org [127.0.0.1]); Thu, 06 Jan 2011 13:07:02 -0500 (EST)
Subject: Re: [secdir] secdir review of draft-ietf-dnsext-5395bis
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: secdir-secretary@mit.edu
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 06 Jan 2011 18:04:56 -0000

Looking at David Harrington's DISCUSS, I'll let someone else address 
the substance, but I observe that there are basically no changes in 
these sections from RFC5393.

-- Sam

On Wed, 5 Jan 2011, Samuel Weiler wrote:

> I have reviewed this document as part of the security directorate's
> ongoing effort to review all IETF documents being processed by the
> IESG.  These comments were written primarily for the benefit of the
> security area directors.  Document editors and WG chairs should treat
> these comments just like any other last call comments.
>
> 5395 made some pretty big changes in how DNS RR types are assigned.
> This update is trivial by comparison.  It was mainly triggered by the change 
> in the DNSEXT WG mailing list name, which had been hard coded into 5395. 
> Other changes are editorial (e.g. removing the list of differences between 
> 5395 and 2929).
>
> The doc has no particular security impact.
>
> I have no objections.
>
> -- Sam


From tena@huawei.com  Thu Jan  6 11:46:25 2011
Return-Path: <tena@huawei.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 663353A6F26; Thu,  6 Jan 2011 11:46:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.188
X-Spam-Level: 
X-Spam-Status: No, score=-106.188 tagged_above=-999 required=5 tests=[AWL=0.411, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CLZMLh3zvnzd; Thu,  6 Jan 2011 11:46:24 -0800 (PST)
Received: from usaga02-in.huawei.com (usaga02-in.huawei.com [206.16.17.70]) by core3.amsl.com (Postfix) with ESMTP id 5BCC73A6D06; Thu,  6 Jan 2011 11:46:24 -0800 (PST)
Received: from huawei.com (localhost [127.0.0.1]) by usaga02-in.huawei.com (iPlanet Messaging Server 5.2 HotFix 2.14 (built Aug 8 2006)) with ESMTP id <0LEM00INL9OT0W@usaga02-in.huawei.com>; Thu, 06 Jan 2011 11:48:30 -0800 (PST)
Received: from TingZousc1 ([10.193.34.133]) by usaga02-in.huawei.com (iPlanet Messaging Server 5.2 HotFix 2.14 (built Aug 8 2006)) with ESMTPA id <0LEM00GCX9OSJE@usaga02-in.huawei.com>; Thu, 06 Jan 2011 11:48:29 -0800 (PST)
Date: Thu, 06 Jan 2011 11:48:28 -0800
From: Tina Tsou <tena@huawei.com>
In-reply-to: <alpine.BSF.2.00.1101061304090.23132@fledge.watson.org>
To: secdir-secretary@mit.edu, secdir@ietf.org, iesg@ietf.org, draft-nsri-tls-aria@tools.ietf.org
Message-id: <011201cbadda$b125a060$1370e120$@com>
MIME-version: 1.0
X-Mailer: Microsoft Office Outlook 12.0
Content-type: text/plain; charset=us-ascii
Content-language: en-us
Content-transfer-encoding: 7BIT
Thread-index: AcutzIgw9ByX0XPzQPWZkZnegPYJ2QADaVwA
x-cr-hashedpuzzle: A2C8 Bi/e Drhz GuwV Oa32 O/hU VpTe WVO7 aFF/ bs7B hhQj neOj oZ/C pO5X pZHi rvof; 4; ZAByAGEAZgB0AC0AbgBzAHIAaQAtAHQAbABzAC0AYQByAGkAYQBAAHQAbwBvAGwAcwAuAGkAZQB0AGYALgBvAHIAZwA7AGkAZQBzAGcAQABpAGUAdABmAC4AbwByAGcAOwBzAGUAYwBkAGkAcgAtAHMAZQBjAHIAZQB0AGEAcgB5AEAAbQBpAHQALgBlAGQAdQA7AHMAZQBjAGQAaQByAEAAaQBlAHQAZgAuAG8AcgBnAA==; Sosha1_v1; 7; {BBB25490-128C-4769-9528-FB9784100D91}; dABlAG4AYQBAAGgAdQBhAHcAZQBpAC4AYwBvAG0A; Thu, 06 Jan 2011 19:48:19 GMT; UwBlAGMAZABpAHIAIAByAGUAdgBpAGUAdwAgAG8AZgAgACAAZAByAGEAZgB0AC0AbgBzAHIAaQAtAHQAbABzAC0AYQByAGkAYQAtADAAMQA=
x-cr-puzzleid: {BBB25490-128C-4769-9528-FB9784100D91}
References: <alpine.BSF.2.00.1101050550550.27285@fledge.watson.org> <alpine.BSF.2.00.1101061304090.23132@fledge.watson.org>
Subject: [secdir] Secdir review of  draft-nsri-tls-aria-01
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 06 Jan 2011 19:46:25 -0000

I have reviewed this document as part of the security directorate's
ongoing effort to review all IETF documents being processed by the
IESG.  These comments were written primarily for the benefit of the
security area directors.  Document editors and WG chairs should treat
these comments just like any other last call comments.

I have no comment to this draft as it adds more cipher algorithm, which is
the right trend within security domain.  As we know, MD5 and SHA-1 was
cracked with the analytical attack by Wang Xiaoyun in Shangdong University.
So there must be strong algorithm to address these security holes.


Best Regards,
Tina TSOU
http://tinatsou.weebly.com/contact.html




From msk@cloudmark.com  Thu Jan  6 10:34:32 2011
Return-Path: <msk@cloudmark.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E1D973A6F3D; Thu,  6 Jan 2011 10:34:32 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -104.048
X-Spam-Level: 
X-Spam-Status: No, score=-104.048 tagged_above=-999 required=5 tests=[AWL=-0.449, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id I0G1cPlYwsAm; Thu,  6 Jan 2011 10:34:31 -0800 (PST)
Received: from ht1-outbound.cloudmark.com (ht1-outbound.cloudmark.com [72.5.239.35]) by core3.amsl.com (Postfix) with ESMTP id EAAF73A6F36; Thu,  6 Jan 2011 10:34:31 -0800 (PST)
Received: from EXCH-C2.corp.cloudmark.com ([172.22.1.74]) by malice.corp.cloudmark.com ([172.22.10.71]) with mapi; Thu, 6 Jan 2011 10:36:38 -0800
From: "Murray S. Kucherawy" <msk@cloudmark.com>
To: David McGrew <mcgrew@cisco.com>, "draft-kucherawy-authres-vbr@tools.ietf.org" <draft-kucherawy-authres-vbr@tools.ietf.org>, "secdir@ietf.org" <secdir@ietf.org>, The IESG <iesg@ietf.org>
Date: Thu, 6 Jan 2011 10:36:37 -0800
Thread-Topic: SECDIR review of draft-kucherawy-authres-vbr
Thread-Index: AcutupEeVcqrZszkSzOCa5gOzXSQewAFUteg
Message-ID: <F5833273385BB34F99288B3648C4F06F1341E73CFC@EXCH-C2.corp.cloudmark.com>
References: <07F215F7-78DF-4B09-AF28-F75FF15FD9CD@cisco.com>
In-Reply-To: <07F215F7-78DF-4B09-AF28-F75FF15FD9CD@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Mailman-Approved-At: Thu, 06 Jan 2011 12:22:36 -0800
Subject: Re: [secdir] SECDIR review of draft-kucherawy-authres-vbr
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 06 Jan 2011 18:34:33 -0000

Hi David.  Thanks for your comments.

> -----Original Message-----
> From: David McGrew [mailto:mcgrew@cisco.com]
> Sent: Thursday, January 06, 2011 7:58 AM
> To: draft-kucherawy-authres-vbr@tools.ietf.org; secdir@ietf.org; The IESG
> Subject: SECDIR review of draft-kucherawy-authres-vbr
>=20
> [...]
>=20
> Section 1.  It is not clear what problem is referred to in paragraph
> two.

The "problem" (though I agree it could be worded better) is that VBR came a=
long after Authentication-Results was published, and so there's currently n=
o standard way to convey VBR results in past a border gateway.

> Section 4.
>=20
> What behavior should a mail filter have upon receiving the result
> codes defined in that section?   If the recommended behavior is
> defined elsewhere (presumably [VBR]), then it should be referenced in
> this section.

Reactions to the information provided within an Authentication-Results fiel=
d is entirely up to the consumer(s) of that information.  It's all a matter=
 of local policy, and thus not specified in either document.  RFC5451 and i=
ts extensions only define the mechanism for transmitting that information i=
nbound past border gateways.

> What behavior should a border mail gateway have upon receiving a VBR
> response?   For instance, under what conditions (if any) should a
> border mail gateway not forward an email on which VBR has returned
> "fail"?   I would guess that this draft expects gateways to always
> forward emails, and regards a mail filter as a logically separate
> entity.  I suggest clarifying this point.

Again, it's a matter of local policy.  A gateway detecting a VBR, DKIM, SPF=
 or any other failure is at liberty to reject or quarantine the message, or=
 allow it to pass after adding those results via the mechanism of RFC5451 s=
o that internal filters or MUAs can take whatever action they deem necessar=
y without repeating those mechanisms themselves.

Since this is just an extension to the existing mechanism, I'm not sure it'=
s useful to discuss it in this memo.  It would be better discussed in an RF=
C5451bis since it applies to the mechanism itself and not this extension.  =
That said, I'll add mention of this in an -03 draft if that's the preferenc=
e.

-MSK


From msk@cloudmark.com  Thu Jan  6 10:40:07 2011
Return-Path: <msk@cloudmark.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A86ED3A6F46; Thu,  6 Jan 2011 10:40:07 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -103.523
X-Spam-Level: 
X-Spam-Status: No, score=-103.523 tagged_above=-999 required=5 tests=[AWL=-0.924, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FKAYBXyjuEex; Thu,  6 Jan 2011 10:40:06 -0800 (PST)
Received: from ht2-outbound.cloudmark.com (ht2-outbound.cloudmark.com [72.5.239.36]) by core3.amsl.com (Postfix) with ESMTP id D527B3A6F35; Thu,  6 Jan 2011 10:40:06 -0800 (PST)
Received: from EXCH-C2.corp.cloudmark.com ([172.22.1.74]) by spite.corp.cloudmark.com ([172.22.10.72]) with mapi; Thu, 6 Jan 2011 10:42:13 -0800
From: "Murray S. Kucherawy" <msk@cloudmark.com>
To: David McGrew <mcgrew@cisco.com>, "draft-kucherawy-authres-vbr@tools.ietf.org" <draft-kucherawy-authres-vbr@tools.ietf.org>, "secdir@ietf.org" <secdir@ietf.org>, The IESG <iesg@ietf.org>
Date: Thu, 6 Jan 2011 10:42:12 -0800
Thread-Topic: SECDIR review of draft-kucherawy-authres-vbr
Thread-Index: AcutupEeVcqrZszkSzOCa5gOzXSQewAFqn/w
Message-ID: <F5833273385BB34F99288B3648C4F06F1341E73CFD@EXCH-C2.corp.cloudmark.com>
References: <07F215F7-78DF-4B09-AF28-F75FF15FD9CD@cisco.com>
In-Reply-To: <07F215F7-78DF-4B09-AF28-F75FF15FD9CD@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Mailman-Approved-At: Thu, 06 Jan 2011 12:22:36 -0800
Subject: Re: [secdir] SECDIR review of draft-kucherawy-authres-vbr
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 06 Jan 2011 18:40:07 -0000

How about this replacing the second paragraph of Section 1:

   This memo thus registers an additional reporting property allowing a
   VBR result to be relayed as an annotation in a message header.

And at the end of Section 3, covering your Section 4 issues:

   Reactions to the information contained in an Authentication-Results
   header field that contains VBR (or any) results are not specified
   here as they are entirely a matter of local policy at the receiver.

-MSK

From Kurt.Zeilenga@Isode.COM  Thu Jan  6 12:32:56 2011
Return-Path: <Kurt.Zeilenga@Isode.COM>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 2ECF53A6CF5; Thu,  6 Jan 2011 12:32:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.405
X-Spam-Level: 
X-Spam-Status: No, score=-102.405 tagged_above=-999 required=5 tests=[AWL=0.194, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id o16V+YuNekzz; Thu,  6 Jan 2011 12:32:55 -0800 (PST)
Received: from rufus.isode.com (rufus.isode.com [62.3.217.251]) by core3.amsl.com (Postfix) with ESMTP id 07E673A6CBB; Thu,  6 Jan 2011 12:32:55 -0800 (PST)
Received: from [192.168.42.5] (75-141-240-242.dhcp.reno.nv.charter.com [75.141.240.242])  by rufus.isode.com (submission channel) via TCP with ESMTPSA  id <TSYndAB0Kwr4@rufus.isode.com>; Thu, 6 Jan 2011 20:35:00 +0000
From: Kurt Zeilenga <Kurt.Zeilenga@Isode.COM>
Date: Thu, 6 Jan 2011 12:34:57 -0800
Message-Id: <DC639E3E-9796-4A0F-8B7D-E70BE9D84109@Isode.COM>
To: draft-ietf-v6ops-tunnel-security-concerns@tools.ietf.org
X-Mailer: Apple Mail (2.1082)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: quoted-printable
Cc: The IESG <iesg@ietf.org>, Security Area Directorate <secdir@ietf.org>
Subject: [secdir] SECDIR (re)review of draft-ietf-v6ops-tunnel-security-concerns
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 06 Jan 2011 20:32:56 -0000

I have reviewed this document as part of the security directorate's =
ongoing review efforts.  These comments were written primarily for the =
benefit of the security area directors. Document editors and WG chairs =
should treat these comments just like they would treat comments from any =
other IETF contributor.

I previously reviewed a predecessor to this I-D, =
draft-ietf-v6ops-tunnel-concerns-00, back in August 2008.

At that I raised a few comments, all of which appear to have been =
adequately addressed in draft-ietf-v6ops-tunnel-security-concerns.   I =
have no further comments.



From jsalowey@cisco.com  Thu Jan  6 14:40:10 2011
Return-Path: <jsalowey@cisco.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 4CB8A3A6F29; Thu,  6 Jan 2011 14:40:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -110.584
X-Spam-Level: 
X-Spam-Status: No, score=-110.584 tagged_above=-999 required=5 tests=[AWL=0.015, BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Z2hG69bNmB8P; Thu,  6 Jan 2011 14:40:09 -0800 (PST)
Received: from sj-iport-5.cisco.com (sj-iport-5.cisco.com [171.68.10.87]) by core3.amsl.com (Postfix) with ESMTP id 9A4173A6D23; Thu,  6 Jan 2011 14:40:09 -0800 (PST)
Authentication-Results: sj-iport-5.cisco.com; dkim=neutral (message not signed) header.i=none
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AvsEAMrTJU2rR7Hu/2dsb2JhbACkH3OlKpgqhUwEhGeGIoMd
Received: from sj-core-5.cisco.com ([171.71.177.238]) by sj-iport-5.cisco.com with ESMTP; 06 Jan 2011 22:42:16 +0000
Received: from [10.33.249.181] ([10.33.249.181]) by sj-core-5.cisco.com (8.13.8/8.14.3) with ESMTP id p06MgDGM026090; Thu, 6 Jan 2011 22:42:14 GMT
From: Joe Salowey <jsalowey@cisco.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: quoted-printable
Date: Thu, 6 Jan 2011 14:42:55 -0800
Message-Id: <123DE172-C230-4A8E-81A8-2B60D9E6AD92@cisco.com>
To: secdir@ietf.org, The IESG <iesg@ietf.org>, draft-ietf-roll-routing-metrics.all@tools.ietf.org
Mime-Version: 1.0 (Apple Message framework v1082)
X-Mailer: Apple Mail (2.1082)
Subject: [secdir] secdir review of draft-ietf-roll-routing-metrics-14
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 06 Jan 2011 22:40:10 -0000

I have reviewed this document as part of the security directorate's=20
ongoing effort to review all IETF documents being processed by the=20
IESG.  These comments were written primarily for the benefit of the=20
security area directors.  Document editors and WG chairs should treat=20
these comments just like any other last call comments.

In general I think the document is clear.  I have one security related =
issue.  The security considerations mention attacks where the metric =
information is manipulated to cause problems.  I think there may also be =
cases where disclosure of some of the metric information may be an =
issue.  the main area of concern for me is the node energy metric.  This =
information may be useful to an attacker to determine which devices to =
attack with out-of-band or in-band attacks involving energy draining.   =
I have not had a chance to see if the RPL protects the confidentiality =
of these attributes.  If this is a concern in a deployment environment =
then the usage of these attributes may be limited.   I think it is =
probably worth mentioning this in the security considerations.=20

Also energy metric introduce a new vector into the system for an =
attacker to modify routing behavior.  An attacker can purposely attempt =
to modify the stored energy in a node to modify the metrics advertised.  =
 Its not clear to me at this point if this is significant since the =
power drain may have effect on metrics and routing beyond what is =
advertised and it seems the recommendation to protect against unstable =
links would be effective in this case as well.  =20

Cheers,

Joe=

From charliek@microsoft.com  Thu Jan  6 21:07:04 2011
Return-Path: <charliek@microsoft.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id AEAB23A63C9; Thu,  6 Jan 2011 21:07:04 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.599
X-Spam-Level: 
X-Spam-Status: No, score=-10.599 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id w03HGsAbX1lo; Thu,  6 Jan 2011 21:06:59 -0800 (PST)
Received: from smtp.microsoft.com (mail3.microsoft.com [131.107.115.214]) by core3.amsl.com (Postfix) with ESMTP id 700423A635F; Thu,  6 Jan 2011 21:06:59 -0800 (PST)
Received: from TK5EX14HUBC107.redmond.corp.microsoft.com (157.54.80.67) by TK5-EXGWY-E803.partners.extranet.microsoft.com (10.251.56.169) with Microsoft SMTP Server (TLS) id 8.2.176.0; Thu, 6 Jan 2011 21:09:05 -0800
Received: from TK5EX14MBXC115.redmond.corp.microsoft.com ([169.254.4.135]) by TK5EX14HUBC107.redmond.corp.microsoft.com ([157.54.80.67]) with mapi id 14.01.0255.003; Thu, 6 Jan 2011 21:09:05 -0800
From: Charlie Kaufman <charliek@microsoft.com>
To: "secdir@ietf.org" <secdir@ietf.org>, "iesg@ietf.org" <iesg@ietf.org>, "draft-ietf-pwe3-cam-msg-map.all@tools.ietf.org" <draft-ietf-pwe3-cam-msg-map.all@tools.ietf.org>
Thread-Topic: Secdir review of draft-ietf-pwe3-cam-msg-map-14.txt
Thread-Index: AcuuJEBicqVIAvhRTp6H828slDO0Ig==
Date: Fri, 7 Jan 2011 05:09:05 +0000
Message-ID: <D80EDFF2AD83E648BD1164257B9B09122C2F14BF@TK5EX14MBXC115.redmond.corp.microsoft.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.123.12]
Content-Type: multipart/alternative; boundary="_000_D80EDFF2AD83E648BD1164257B9B09122C2F14BFTK5EX14MBXC115r_"
MIME-Version: 1.0
Subject: [secdir] Secdir review of draft-ietf-pwe3-cam-msg-map-14.txt
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 07 Jan 2011 05:07:04 -0000

--_000_D80EDFF2AD83E648BD1164257B9B09122C2F14BFTK5EX14MBXC115r_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

I have reviewed this document as part of the security directorate's ongoing=
 effort to review all IETF documents being processed by the IESG.  These co=
mments were written primarily for the benefit of the security area director=
s.  Document editors and WG chairs should treat these comments just like an=
y other last call comments.

This document specifies a standardized way of translating error notificatio=
n codes between several different protocols. The need comes up in the conte=
xt of using Pseudowire (PW) protocol to replace a physical link in a networ=
k. Pseudowires replace physical wires imperfectly in that they can have mor=
e complex failure modes. These can interact in complex ways with the failur=
e modes of the protocols running over the pseudowires.

There are no real security considerations in the code mappings. This docume=
nt references the security considerations sections of other RFCs where the =
translated error codes are handled. This seems appropriate.

The only thing that came to my mind that relates to security that was not d=
iscussed was emergent errors, where the pseudowire could introduce an error=
 not detectable at its endpoints that could nevertheless cause problems at =
a higher layer. Examples would be a pseudowire that duplicated, selectively=
 lost, or reordered packets. There are also interesting problems to be had =
where the pseudowire capacity is variable and its carrying capacity falls b=
elow the higher layer protocol's ability to use it. An example would be a l=
ink between two routers that should be declared down when it gets slow enou=
gh so that higher layers will find better routes. Even so, any such discuss=
ion would belong in a different document.

I'd like to express my great appreciation for Section 4.1, which expands al=
most all of the acronyms used in the document. It made it possible for me -=
 with almost no previous knowledge of the subject matter - to read and most=
ly understand most of the document. I wish such a thing could be made manda=
tory for all RFCs.

                --Charlie

--_000_D80EDFF2AD83E648BD1164257B9B09122C2F14BFTK5EX14MBXC115r_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoPlainText, li.MsoPlainText, div.MsoPlainText
	{mso-style-priority:99;
	mso-style-link:"Plain Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
span.PlainTextChar
	{mso-style-name:"Plain Text Char";
	mso-style-priority:99;
	mso-style-link:"Plain Text";
	font-family:"Calibri","sans-serif";}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri","sans-serif";}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoPlainText">I have reviewed this document as part of the secu=
rity directorate's ongoing effort to review all IETF documents being proces=
sed by the IESG.&nbsp; These comments were written primarily for the benefi=
t of the security area directors.&nbsp; Document
 editors and WG chairs should treat these comments just like any other last=
 call comments.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">This document specifies a standardized way of transl=
ating error notification codes between several different protocols. The nee=
d comes up in the context of using Pseudowire (PW) protocol to replace a ph=
ysical link in a network. Pseudowires
 replace physical wires imperfectly in that they can have more complex fail=
ure modes. These can interact in complex ways with the failure modes of the=
 protocols running over the pseudowires.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">There are no real security considerations in the cod=
e mappings. This document references the security considerations sections o=
f other RFCs where the translated error codes are handled. This seems appro=
priate.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">The only thing that came to my mind that relates to =
security that was not discussed was emergent errors, where the pseudowire c=
ould introduce an error not detectable at its endpoints that could neverthe=
less cause problems at a higher layer.
 Examples would be a pseudowire that duplicated, selectively lost, or reord=
ered packets. There are also interesting problems to be had where the pseud=
owire capacity is variable and its carrying capacity falls below the higher=
 layer protocol&#8217;s ability to use
 it. An example would be a link between two routers that should be declared=
 down when it gets slow enough so that higher layers will find better route=
s. Even so, any such discussion would belong in a different document.<o:p><=
/o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">I&#8217;d like to express my great appreciation for =
Section 4.1, which expands almost all of the acronyms used in the document.=
 It made it possible for me &#8211; with almost no previous knowledge of th=
e subject matter &#8211; to read and mostly understand
 most of the document. I wish such a thing could be made mandatory for all =
RFCs.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; --Charlie<o:p></o:p></p>
</div>
</body>
</html>

--_000_D80EDFF2AD83E648BD1164257B9B09122C2F14BFTK5EX14MBXC115r_--

From charliek@microsoft.com  Thu Jan  6 21:13:57 2011
Return-Path: <charliek@microsoft.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 2A50C3A63C9; Thu,  6 Jan 2011 21:13:57 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.598
X-Spam-Level: 
X-Spam-Status: No, score=-10.598 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pjGTXVl1dh6B; Thu,  6 Jan 2011 21:13:51 -0800 (PST)
Received: from smtp.microsoft.com (mail2.microsoft.com [131.107.115.215]) by core3.amsl.com (Postfix) with ESMTP id D67B63A63D2; Thu,  6 Jan 2011 21:13:51 -0800 (PST)
Received: from TK5EX14HUBC105.redmond.corp.microsoft.com (157.54.80.48) by TK5-EXGWY-E802.partners.extranet.microsoft.com (10.251.56.168) with Microsoft SMTP Server (TLS) id 8.2.176.0; Thu, 6 Jan 2011 21:15:52 -0800
Received: from TK5EX14MBXC115.redmond.corp.microsoft.com ([169.254.4.135]) by TK5EX14HUBC105.redmond.corp.microsoft.com ([157.54.80.48]) with mapi id 14.01.0255.003; Thu, 6 Jan 2011 21:15:52 -0800
From: Charlie Kaufman <charliek@microsoft.com>
To: "secdir@ietf.org" <secdir@ietf.org>, "iesg@ietf.org" <iesg@ietf.org>, "draft-ietf-pwe3-oam-msg-map.all@tools.ietf.org" <draft-ietf-pwe3-oam-msg-map.all@tools.ietf.org>
Thread-Topic: RESEND: Secdir review of draft-ietf-pwe3-oam-msg-map-14.txt
Thread-Index: AcuuKd9EKwp+v9B5SwSfHxd1LFfVUg==
Date: Fri, 7 Jan 2011 05:15:52 +0000
Message-ID: <D80EDFF2AD83E648BD1164257B9B09122C2F151A@TK5EX14MBXC115.redmond.corp.microsoft.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.123.12]
Content-Type: multipart/alternative; boundary="_000_D80EDFF2AD83E648BD1164257B9B09122C2F151ATK5EX14MBXC115r_"
MIME-Version: 1.0
Subject: [secdir] RESEND: Secdir review of draft-ietf-pwe3-oam-msg-map-14.txt
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 07 Jan 2011 05:13:57 -0000

--_000_D80EDFF2AD83E648BD1164257B9B09122C2F151ATK5EX14MBXC115r_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

**Please ignore previous version; I had a typo in an email address and draf=
t name. **



I have reviewed this document as part of the security directorate's ongoing=
 effort to review all IETF documents being processed by the IESG.  These co=
mments were written primarily for the benefit of the security area director=
s.  Document editors and WG chairs should treat these comments just like an=
y other last call comments.

This document specifies a standardized way of translating error notificatio=
n codes between several different protocols. The need comes up in the conte=
xt of using Pseudowire (PW) protocol to replace a physical link in a networ=
k. Pseudowires replace physical wires imperfectly in that they can have mor=
e complex failure modes. These can interact in complex ways with the failur=
e modes of the protocols running over the pseudowires.

There are no real security considerations in the code mappings. This docume=
nt references the security considerations sections of other RFCs where the =
translated error codes are handled. This seems appropriate.

The only thing that came to my mind that relates to security that was not d=
iscussed was emergent errors, where the pseudowire could introduce an error=
 not detectable at its endpoints that could nevertheless cause problems at =
a higher layer. Examples would be a pseudowire that duplicated, selectively=
 lost, or reordered packets. There are also interesting problems to be had =
where the pseudowire capacity is variable and its carrying capacity falls b=
elow the higher layer protocol's ability to use it. An example would be a l=
ink between two routers that should be declared down when it gets slow enou=
gh so that higher layers will find better routes. Even so, any such discuss=
ion would belong in a different document.

I'd like to express my great appreciation for Section 4.1, which expands al=
most all of the acronyms used in the document. It made it possible for me -=
 with almost no previous knowledge of the subject matter - to read and most=
ly understand most of the document. I wish such a thing could be made manda=
tory for all RFCs.

                --Charlie

--_000_D80EDFF2AD83E648BD1164257B9B09122C2F151ATK5EX14MBXC115r_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoPlainText, li.MsoPlainText, div.MsoPlainText
	{mso-style-priority:99;
	mso-style-link:"Plain Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
span.PlainTextChar
	{mso-style-name:"Plain Text Char";
	mso-style-priority:99;
	mso-style-link:"Plain Text";
	font-family:"Calibri","sans-serif";}
span.EmailStyle19
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
span.EmailStyle20
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoPlainText"><span style=3D"color:#1F497D">**Please ignore pre=
vious version; I had a typo in an email address and draft name. **<o:p></o:=
p></span></p>
<p class=3D"MsoPlainText"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></=
span></p>
<p class=3D"MsoPlainText">I have reviewed this document as part of the secu=
rity directorate's ongoing effort to review all IETF documents being proces=
sed by the IESG.&nbsp; These comments were written primarily for the benefi=
t of the security area directors.&nbsp; Document
 editors and WG chairs should treat these comments just like any other last=
 call comments.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">This document specifies a standardized way of transl=
ating error notification codes between several different protocols. The nee=
d comes up in the context of using Pseudowire (PW) protocol to replace a ph=
ysical link in a network. Pseudowires
 replace physical wires imperfectly in that they can have more complex fail=
ure modes. These can interact in complex ways with the failure modes of the=
 protocols running over the pseudowires.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">There are no real security considerations in the cod=
e mappings. This document references the security considerations sections o=
f other RFCs where the translated error codes are handled. This seems appro=
priate.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">The only thing that came to my mind that relates to =
security that was not discussed was emergent errors, where the pseudowire c=
ould introduce an error not detectable at its endpoints that could neverthe=
less cause problems at a higher layer.
 Examples would be a pseudowire that duplicated, selectively lost, or reord=
ered packets. There are also interesting problems to be had where the pseud=
owire capacity is variable and its carrying capacity falls below the higher=
 layer protocol&#8217;s ability to use
 it. An example would be a link between two routers that should be declared=
 down when it gets slow enough so that higher layers will find better route=
s. Even so, any such discussion would belong in a different document.<o:p><=
/o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">I&#8217;d like to express my great appreciation for =
Section 4.1, which expands almost all of the acronyms used in the document.=
 It made it possible for me &#8211; with almost no previous knowledge of th=
e subject matter &#8211; to read and mostly understand
 most of the document. I wish such a thing could be made mandatory for all =
RFCs.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; --Charlie<o:p></o:p></p>
</div>
</body>
</html>

--_000_D80EDFF2AD83E648BD1164257B9B09122C2F151ATK5EX14MBXC115r_--

From stbryant@cisco.com  Fri Jan  7 02:31:40 2011
Return-Path: <stbryant@cisco.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D32A43A6816; Fri,  7 Jan 2011 02:31:40 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -110.537
X-Spam-Level: 
X-Spam-Status: No, score=-110.537 tagged_above=-999 required=5 tests=[AWL=0.062, BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id efwD6h3IJQ+L; Fri,  7 Jan 2011 02:31:39 -0800 (PST)
Received: from rtp-iport-2.cisco.com (rtp-iport-2.cisco.com [64.102.122.149]) by core3.amsl.com (Postfix) with ESMTP id B64E13A680F; Fri,  7 Jan 2011 02:31:39 -0800 (PST)
Authentication-Results: rtp-iport-2.cisco.com; dkim=neutral (message not signed) header.i=none
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AvsEAG56Jk1AZnwN/2dsb2JhbACkJXOkGoJQDgGVTIVMBIsJ
Received: from rtp-core-2.cisco.com ([64.102.124.13]) by rtp-iport-2.cisco.com with ESMTP; 07 Jan 2011 10:33:46 +0000
Received: from cisco.com (mrwint.cisco.com [64.103.71.48]) by rtp-core-2.cisco.com (8.13.8/8.14.3) with ESMTP id p07AXjw9002816; Fri, 7 Jan 2011 10:33:45 GMT
Received: from stbryant-mac2.lan (localhost [127.0.0.1]) by cisco.com (8.11.7p3+Sun/8.8.8) with ESMTP id p07AXa822305; Fri, 7 Jan 2011 10:33:43 GMT
Message-ID: <4D26EC00.4060904@cisco.com>
Date: Fri, 07 Jan 2011 10:33:36 +0000
From: Stewart Bryant <stbryant@cisco.com>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.6; en-US; rv:1.9.2.13) Gecko/20101207 Lightning/1.0b2 Thunderbird/3.1.7
MIME-Version: 1.0
To: Charlie Kaufman <charliek@microsoft.com>
References: <D80EDFF2AD83E648BD1164257B9B09122C2F151A@TK5EX14MBXC115.redmond.corp.microsoft.com>
In-Reply-To: <D80EDFF2AD83E648BD1164257B9B09122C2F151A@TK5EX14MBXC115.redmond.corp.microsoft.com>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 8bit
Cc: "draft-ietf-pwe3-oam-msg-map.all@tools.ietf.org" <draft-ietf-pwe3-oam-msg-map.all@tools.ietf.org>, "iesg@ietf.org" <iesg@ietf.org>, "secdir@ietf.org" <secdir@ietf.org>
Subject: Re: [secdir] RESEND: Secdir review of draft-ietf-pwe3-oam-msg-map-14.txt
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: stbryant@cisco.com
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 07 Jan 2011 10:31:41 -0000

Hi Charlie

Thank you for the review.
>
> The only thing that came to my mind that relates to security that was 
> not discussed was emergent errors, where the pseudowire could 
> introduce an error not detectable at its endpoints that could 
> nevertheless cause problems at a higher layer. Examples would be a 
> pseudowire that duplicated, selectively lost, or reordered packets. 
> There are also interesting problems to be had where the pseudowire 
> capacity is variable and its carrying capacity falls below the higher 
> layer protocol’s ability to use it. An example would be a link between 
> two routers that should be declared down when it gets slow enough so 
> that higher layers will find better routes. Even so, any such 
> discussion would belong in a different document.
>

The issue of capacity and congestion has been the subject of 
longstanding discussion with the Transport Area. There is text in the PW 
framework RFCs on topics similar to those that you highlight above.

The problem is substantially mitigated by the fact that PW are usually 
deployed as part of a service provider offering and are thus subject to 
capacity planing and reliability network engineering considerations, and 
are likely to be monitored by the provider.

Regards

Stewart







From aland@deployingradius.com  Fri Jan  7 04:52:49 2011
Return-Path: <aland@deployingradius.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 80BAE3A6849; Fri,  7 Jan 2011 04:52:49 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.589
X-Spam-Level: 
X-Spam-Status: No, score=-102.589 tagged_above=-999 required=5 tests=[AWL=0.010, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YWqoEnWVfMzX; Fri,  7 Jan 2011 04:52:48 -0800 (PST)
Received: from liberty.deployingradius.com (liberty.deployingradius.com [88.191.76.128]) by core3.amsl.com (Postfix) with ESMTP id B31A33A6847; Fri,  7 Jan 2011 04:52:48 -0800 (PST)
Message-ID: <4D270D1D.8090006@deployingradius.com>
Date: Fri, 07 Jan 2011 13:54:53 +0100
From: Alan DeKok <aland@deployingradius.com>
User-Agent: Thunderbird 2.0.0.24 (Macintosh/20100228)
MIME-Version: 1.0
To: Alper Yegin <alper.yegin@yegin.org>
References: <4D009D34.1020809@deployingradius.com> <4D01DABF.6060604@toshiba.co.jp> <001101cb9aa0$367b3480$a3719d80$@yegin@yegin.org> <4D064683.30009@deployingradius.com> <4D07A874.4010702@gridmerge.com> <4D07D090.9020407@deployingradius.com> <070601cba3ad$63852150$2a8f63f0$@yegin@yegin.org>
In-Reply-To: <070601cba3ad$63852150$2a8f63f0$@yegin@yegin.org>
X-Enigmail-Version: 0.96.0
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
Cc: secdir@ietf.org, paduffy@cisco.com, margaretw42@gmail.com, pana@ietf.org, robert.cragie@gridmerge.com, samitac@ipinfusion.com, 'Ralph Droms' <rdroms.ietf@gmail.com>
Subject: Re: [secdir] pana-relay security considerations
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 07 Jan 2011 12:52:49 -0000

Alper Yegin wrote:
> Hi Alan, Margaret,
> 
> Based on the feedback we have received from you, we have enhanced the
> security considerations section of pana-relay I-D as follows.

  It looks good.  I'd like to know if the PRE can relay messages from
the PAA to the PaC on a non-PANA port.  If so, that needs to be
addressed somehow.  Saying "use DTLS" might not be enough.

  If the PaC always sends packets from the PANA port, then the text
should be updated to say that the PAA only sends packets to the PANA
port on the PaC.

  Alan DeKok.

From mcgrew@cisco.com  Fri Jan  7 07:19:45 2011
Return-Path: <mcgrew@cisco.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 048C63A67F4; Fri,  7 Jan 2011 07:19:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -110.599
X-Spam-Level: 
X-Spam-Status: No, score=-110.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xO7k8P926BRx; Fri,  7 Jan 2011 07:19:44 -0800 (PST)
Received: from sj-iport-2.cisco.com (sj-iport-2.cisco.com [171.71.176.71]) by core3.amsl.com (Postfix) with ESMTP id 1C7223A67E9; Fri,  7 Jan 2011 07:19:44 -0800 (PST)
Authentication-Results: sj-iport-2.cisco.com; dkim=neutral (message not signed) header.i=none
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AvsEALW+Jk2rRN+K/2dsb2JhbACkKHOjS5g4hUwEhGeGIoMe
Received: from sj-core-4.cisco.com ([171.68.223.138]) by sj-iport-2.cisco.com with ESMTP; 07 Jan 2011 15:21:50 +0000
Received: from [10.32.254.210] ([10.32.254.210]) by sj-core-4.cisco.com (8.13.8/8.14.3) with ESMTP id p07FLnkr022078; Fri, 7 Jan 2011 15:21:50 GMT
Message-Id: <53F0388A-4BFF-4474-B504-EE3C2DD3DB19@cisco.com>
From: David McGrew <mcgrew@cisco.com>
To: "Murray S. Kucherawy" <msk@cloudmark.com>
In-Reply-To: <F5833273385BB34F99288B3648C4F06F1341E73CFC@EXCH-C2.corp.cloudmark.com>
Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes
Content-Transfer-Encoding: 7bit
Mime-Version: 1.0 (Apple Message framework v936)
Date: Fri, 7 Jan 2011 07:21:49 -0800
References: <07F215F7-78DF-4B09-AF28-F75FF15FD9CD@cisco.com> <F5833273385BB34F99288B3648C4F06F1341E73CFC@EXCH-C2.corp.cloudmark.com>
X-Mailer: Apple Mail (2.936)
Cc: "draft-kucherawy-authres-vbr@tools.ietf.org" <draft-kucherawy-authres-vbr@tools.ietf.org>, The IESG <iesg@ietf.org>, "secdir@ietf.org" <secdir@ietf.org>
Subject: Re: [secdir] SECDIR review of draft-kucherawy-authres-vbr
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 07 Jan 2011 15:19:45 -0000

Hi Murray,

On Jan 6, 2011, at 10:36 AM, Murray S. Kucherawy wrote:

> Hi David.  Thanks for your comments.
>
>> -----Original Message-----
>> From: David McGrew [mailto:mcgrew@cisco.com]
>> Sent: Thursday, January 06, 2011 7:58 AM
>> To: draft-kucherawy-authres-vbr@tools.ietf.org; secdir@ietf.org;  
>> The IESG
>> Subject: SECDIR review of draft-kucherawy-authres-vbr
>>
>> [...]
>>
>> Section 1.  It is not clear what problem is referred to in paragraph
>> two.
>
> The "problem" (though I agree it could be worded better) is that VBR  
> came along after Authentication-Results was published, and so  
> there's currently no standard way to convey VBR results in past a  
> border gateway.
>
>> Section 4.
>>
>> What behavior should a mail filter have upon receiving the result
>> codes defined in that section?   If the recommended behavior is
>> defined elsewhere (presumably [VBR]), then it should be referenced in
>> this section.
>
> Reactions to the information provided within an Authentication- 
> Results field is entirely up to the consumer(s) of that  
> information.  It's all a matter of local policy, and thus not  
> specified in either document.  RFC5451 and its extensions only  
> define the mechanism for transmitting that information inbound past  
> border gateways.
>
>> What behavior should a border mail gateway have upon receiving a VBR
>> response?   For instance, under what conditions (if any) should a
>> border mail gateway not forward an email on which VBR has returned
>> "fail"?   I would guess that this draft expects gateways to always
>> forward emails, and regards a mail filter as a logically separate
>> entity.  I suggest clarifying this point.
>
> Again, it's a matter of local policy.  A gateway detecting a VBR,  
> DKIM, SPF or any other failure is at liberty to reject or quarantine  
> the message, or allow it to pass after adding those results via the  
> mechanism of RFC5451 so that internal filters or MUAs can take  
> whatever action they deem necessary without repeating those  
> mechanisms themselves.
>
> Since this is just an extension to the existing mechanism, I'm not  
> sure it's useful to discuss it in this memo.  It would be better  
> discussed in an RFC5451bis since it applies to the mechanism itself  
> and not this extension.  That said, I'll add mention of this in an  
> -03 draft if that's the preference.

I'm surprised that it's not discussed in RFC5451, but given that fact  
I certainly agree that RFC5451bis would be the right place for it.

David

>
> -MSK
>


From mcgrew@cisco.com  Fri Jan  7 07:19:57 2011
Return-Path: <mcgrew@cisco.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id ADB843A68D0; Fri,  7 Jan 2011 07:19:57 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -110.599
X-Spam-Level: 
X-Spam-Status: No, score=-110.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id REP+pdtBvtFN; Fri,  7 Jan 2011 07:19:56 -0800 (PST)
Received: from sj-iport-2.cisco.com (sj-iport-2.cisco.com [171.71.176.71]) by core3.amsl.com (Postfix) with ESMTP id EA1AD3A67E9; Fri,  7 Jan 2011 07:19:56 -0800 (PST)
Authentication-Results: sj-iport-2.cisco.com; dkim=neutral (message not signed) header.i=none
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AvsEALW+Jk2rRN+K/2dsb2JhbACkKHOjS5g4hUwEhGeGIoMe
Received: from sj-core-4.cisco.com ([171.68.223.138]) by sj-iport-2.cisco.com with ESMTP; 07 Jan 2011 15:22:03 +0000
Received: from [10.32.254.210] ([10.32.254.210]) by sj-core-4.cisco.com (8.13.8/8.14.3) with ESMTP id p07FLnks022078; Fri, 7 Jan 2011 15:22:03 GMT
Message-Id: <60EE0BD1-AA8A-4C52-AF1A-DFEA2DFD59FB@cisco.com>
From: David McGrew <mcgrew@cisco.com>
To: "Murray S. Kucherawy" <msk@cloudmark.com>
In-Reply-To: <F5833273385BB34F99288B3648C4F06F1341E73CFD@EXCH-C2.corp.cloudmark.com>
Content-Type: text/plain; charset=US-ASCII; format=flowed
Content-Transfer-Encoding: 7bit
Mime-Version: 1.0 (Apple Message framework v936)
Date: Fri, 7 Jan 2011 07:22:03 -0800
References: <07F215F7-78DF-4B09-AF28-F75FF15FD9CD@cisco.com> <F5833273385BB34F99288B3648C4F06F1341E73CFD@EXCH-C2.corp.cloudmark.com>
X-Mailer: Apple Mail (2.936)
Cc: "draft-kucherawy-authres-vbr@tools.ietf.org" <draft-kucherawy-authres-vbr@tools.ietf.org>, The IESG <iesg@ietf.org>, "secdir@ietf.org" <secdir@ietf.org>
Subject: Re: [secdir] SECDIR review of draft-kucherawy-authres-vbr
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 07 Jan 2011 15:19:57 -0000

Hi Murray,

Looks good to me.

David

On Jan 6, 2011, at 10:42 AM, Murray S. Kucherawy wrote:

> How about this replacing the second paragraph of Section 1:
>
>   This memo thus registers an additional reporting property allowing a
>   VBR result to be relayed as an annotation in a message header.
>
> And at the end of Section 3, covering your Section 4 issues:
>
>   Reactions to the information contained in an Authentication-Results
>   header field that contains VBR (or any) results are not specified
>   here as they are entirely a matter of local policy at the receiver.
>
> -MSK


From andrew.g.malis@verizon.com  Fri Jan  7 07:52:25 2011
Return-Path: <andrew.g.malis@verizon.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 05AB33A6919; Fri,  7 Jan 2011 07:52:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.837
X-Spam-Level: 
X-Spam-Status: No, score=-2.837 tagged_above=-999 required=5 tests=[AWL=-0.239, BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8OM6M-Q4C-KB; Fri,  7 Jan 2011 07:52:23 -0800 (PST)
Received: from tpamail4.verizon.com (tpamail4.verizon.com [192.76.82.161]) by core3.amsl.com (Postfix) with ESMTP id A72BF3A6905; Fri,  7 Jan 2011 07:52:23 -0800 (PST)
Received: from tpaintrmemf3.verizon.com (tpaintrmemf3.verizon.com [138.83.67.58]) by tpamail4.verizon.com (8.13.6/8.13.3) with ESMTP id p07FmDUH017377; Fri, 7 Jan 2011 10:48:22 -0500 (EST)
X-AuditID: 8a53433a-b7b57ae0000011e0-1c-4d273730d229
Received: from smtptpa4.verizon.com ( [138.83.71.177]) by tpaintrmemf3.verizon.com (EMF) with SMTP id 21.8D.04576.037372D4; Fri,  7 Jan 2011 10:54:24 -0500 (EST)
Received: from FHDP1LUMXC7HB02.us.one.verizon.com (fhdp1lumxc7hb02.verizon.com [166.68.59.189]) by smtptpa4.verizon.com (8.13.3/8.13.3) with ESMTP id p07FsNX9017584; Fri, 7 Jan 2011 10:54:23 -0500 (EST)
Received: from fhdp1lumxc7v22.us.one.verizon.com ([fe80::30d0:a653:fa92:eedb]) by FHDP1LUMXC7HB02.us.one.verizon.com ([2002:a644:3bbd::a644:3bbd]) with mapi; Fri, 7 Jan 2011 10:54:23 -0500
From: "Malis, Andrew G. (Andy)" <andrew.g.malis@verizon.com>
To: Charlie Kaufman <charliek@microsoft.com>, "secdir@ietf.org" <secdir@ietf.org>, "iesg@ietf.org" <iesg@ietf.org>, "draft-ietf-pwe3-oam-msg-map.all@tools.ietf.org" <draft-ietf-pwe3-oam-msg-map.all@tools.ietf.org>
Date: Fri, 7 Jan 2011 10:54:22 -0500
Thread-Topic: RESEND: Secdir review of draft-ietf-pwe3-oam-msg-map-14.txt
Thread-Index: AcuuKd9EKwp+v9B5SwSfHxd1LFfVUgAWUc4a
Message-ID: <C94CA15E.15196%andrew.g.malis@one.verizon.com>
In-Reply-To: <D80EDFF2AD83E648BD1164257B9B09122C2F151A@TK5EX14MBXC115.redmond.corp.microsoft.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-Entourage/13.8.0.101117
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_C94CA15E15196andrewgmalisoneverizoncom_"
MIME-Version: 1.0
X-Brightmail-Tracker: AAAAAA==
X-Mailman-Approved-At: Fri, 07 Jan 2011 08:40:55 -0800
Subject: Re: [secdir] RESEND: Secdir review of draft-ietf-pwe3-oam-msg-map-14.txt
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 07 Jan 2011 15:52:25 -0000

--_000_C94CA15E15196andrewgmalisoneverizoncom_
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable

Charlie,

On behalf of the WG, many thanks for your review and comments.

Cheers,
Andy

On 1/7/11 0:15 , "Charlie Kaufman" <charliek@microsoft.com> wrote:

**Please ignore previous version; I had a typo in an email address and draf=
t name. **

I have reviewed this document as part of the security directorate's ongoing=
 effort to review all IETF documents being processed by the IESG.  These co=
mments were written primarily for the benefit of the security area director=
s.  Document editors and WG chairs should treat these comments just like an=
y other last call comments.

This document specifies a standardized way of translating error notificatio=
n codes between several different protocols. The need comes up in the conte=
xt of using Pseudowire (PW) protocol to replace a physical link in a networ=
k. Pseudowires replace physical wires imperfectly in that they can have mor=
e complex failure modes. These can interact in complex ways with the failur=
e modes of the protocols running over the pseudowires.

There are no real security considerations in the code mappings. This docume=
nt references the security considerations sections of other RFCs where the =
translated error codes are handled. This seems appropriate.

The only thing that came to my mind that relates to security that was not d=
iscussed was emergent errors, where the pseudowire could introduce an error=
 not detectable at its endpoints that could nevertheless cause problems at =
a higher layer. Examples would be a pseudowire that duplicated, selectively=
 lost, or reordered packets. There are also interesting problems to be had =
where the pseudowire capacity is variable and its carrying capacity falls b=
elow the higher layer protocol=92s ability to use it. An example would be a=
 link between two routers that should be declared down when it gets slow en=
ough so that higher layers will find better routes. Even so, any such discu=
ssion would belong in a different document.

I=92d like to express my great appreciation for Section 4.1, which expands =
almost all of the acronyms used in the document. It made it possible for me=
 =96 with almost no previous knowledge of the subject matter =96 to read an=
d mostly understand most of the document. I wish such a thing could be made=
 mandatory for all RFCs.

                --Charlie


--_000_C94CA15E15196andrewgmalisoneverizoncom_
Content-Type: text/html; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable

<html><head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3DWindows-1=
252"><title>Re: RESEND: Secdir review of draft-ietf-pwe3-oam-msg-map-14.txt=
</title>
</head>
<body>
<font face=3D"Tahoma, Verdana, Helvetica, Arial"><span style=3D"font-size:1=
0pt">Charlie,<br>
<br>
On behalf of the WG, many thanks for your review and comments.<br>
<br>
Cheers,<br>
Andy<br>
<br>
On 1/7/11 0:15 , &quot;Charlie Kaufman&quot; &lt;<a href=3D"charliek@micros=
oft.com">charliek@microsoft.com</a>&gt; wrote:<br>
<br>
</span></font><blockquote><font color=3D"#1F497D"><font size=3D"4"><font fa=
ce=3D"Calibri, Verdana, Helvetica, Arial"><span style=3D"font-size:11pt">**=
Please ignore previous version; I had a typo in an email address and draft =
name. **<br>
&nbsp;<br>
</span></font></font></font><font size=3D"4"><font face=3D"Calibri, Verdana=
, Helvetica, Arial"><span style=3D"font-size:11pt">I have reviewed this doc=
ument as part of the security directorate's ongoing effort to review all IE=
TF documents being processed by the IESG. &nbsp;These comments were written=
 primarily for the benefit of the security area directors. &nbsp;Document e=
ditors and WG chairs should treat these comments just like any other last c=
all comments.<br>
&nbsp;<br>
This document specifies a standardized way of translating error notificatio=
n codes between several different protocols. The need comes up in the conte=
xt of using Pseudowire (PW) protocol to replace a physical link in a networ=
k. Pseudowires replace physical wires imperfectly in that they can have mor=
e complex failure modes. These can interact in complex ways with the failur=
e modes of the protocols running over the pseudowires.<br>
&nbsp;<br>
There are no real security considerations in the code mappings. This docume=
nt references the security considerations sections of other RFCs where the =
translated error codes are handled. This seems appropriate.<br>
&nbsp;<br>
The only thing that came to my mind that relates to security that was not d=
iscussed was emergent errors, where the pseudowire could introduce an error=
 not detectable at its endpoints that could nevertheless cause problems at =
a higher layer. Examples would be a pseudowire that duplicated, selectively=
 lost, or reordered packets. There are also interesting problems to be had =
where the pseudowire capacity is variable and its carrying capacity falls b=
elow the higher layer protocol=92s ability to use it. An example would be a=
 link between two routers that should be declared down when it gets slow en=
ough so that higher layers will find better routes. Even so, any such discu=
ssion would belong in a different document.<br>
&nbsp;<br>
I=92d like to express my great appreciation for Section 4.1, which expands =
almost all of the acronyms used in the document. It made it possible for me=
 =96 with almost no previous knowledge of the subject matter =96 to read an=
d mostly understand most of the document. I wish such a thing could be made=
 mandatory for all RFCs.<br>
&nbsp;<br>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;--Charlie<br>
</span></font></font><font face=3D"Tahoma, Verdana, Helvetica, Arial"><span=
 style=3D"font-size:10pt"><br>
</span></font></blockquote>
</body>
</html>


--_000_C94CA15E15196andrewgmalisoneverizoncom_--

From shawn.emery@oracle.com  Sun Jan  9 23:35:58 2011
Return-Path: <shawn.emery@oracle.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id EFE9F3A6A7D; Sun,  9 Jan 2011 23:35:58 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.56
X-Spam-Level: 
X-Spam-Status: No, score=-6.56 tagged_above=-999 required=5 tests=[AWL=0.039,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8b0h1TZa1WoW; Sun,  9 Jan 2011 23:35:58 -0800 (PST)
Received: from rcsinet10.oracle.com (rcsinet10.oracle.com [148.87.113.121]) by core3.amsl.com (Postfix) with ESMTP id 22D443A6A79; Sun,  9 Jan 2011 23:35:58 -0800 (PST)
Received: from acsinet15.oracle.com (acsinet15.oracle.com [141.146.126.227]) by rcsinet10.oracle.com (Switch-3.4.2/Switch-3.4.2) with ESMTP id p0A7c80o005714 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Mon, 10 Jan 2011 07:38:10 GMT
Received: from acsmt355.oracle.com (acsmt355.oracle.com [141.146.40.155]) by acsinet15.oracle.com (Switch-3.4.2/Switch-3.4.1) with ESMTP id p0A7DrhY009926; Mon, 10 Jan 2011 07:38:08 GMT
Received: from abhmt018.oracle.com by acsmt355.oracle.com with ESMTP id 911789261294645087; Sun, 09 Jan 2011 23:38:07 -0800
Received: from [10.7.250.156] (/10.7.250.156) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Sun, 09 Jan 2011 23:38:06 -0800
Message-ID: <4D2AB75B.3070001@oracle.com>
Date: Mon, 10 Jan 2011 00:38:03 -0700
From: Shawn Emery <shawn.emery@oracle.com>
User-Agent: Mozilla/5.0 (X11; U; SunOS i86pc; en-US; rv:1.9.2.13) Gecko/20101220 Lightning/1.0b2 Thunderbird/3.1.7
MIME-Version: 1.0
To: secdir@ietf.org
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Cc: draft-ietf-ltans-xmlers.all@tools.ietf.org, iesg@ietf.org
Subject: [secdir] Review of draft-ietf-ltans-xmlers-08
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 10 Jan 2011 07:35:59 -0000

I have reviewed this document as part of the security directorate's
ongoing effort to review all IETF documents being processed by the
IESG. These comments were written primarily for the benefit of the
security area directors. Document editors and WG chairs should treat
these comments just like any other last call comments.

This draft outlines XML schema and rules for Evidence Record Syntax (ERS).

The security considerations section does exist and states that tracking 
security suitability of cryptographic algorithms is out of scope for 
this document.  It goes on to say that different Evidence Records should 
be generated for the same data object in case a particular algorithm 
becomes weak or an attack is discovered.  On secure time stamps; the 
draft gives guidance on the strength of the algorithm to use between 
normal, archival, and renewal purposes.  I agree with the above points 
and do not find other issues in the draft.

General comments:

None.

Editorial comments:

None.

Shawn.
-- 

From charliek@microsoft.com  Sun Jan  9 23:41:35 2011
Return-Path: <charliek@microsoft.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 80BD928C0CF; Sun,  9 Jan 2011 23:41:35 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.598
X-Spam-Level: 
X-Spam-Status: No, score=-10.598 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gmkNIYOwe9FC; Sun,  9 Jan 2011 23:41:29 -0800 (PST)
Received: from smtp.microsoft.com (smtp.microsoft.com [131.107.115.215]) by core3.amsl.com (Postfix) with ESMTP id F218428C0E5; Sun,  9 Jan 2011 23:41:28 -0800 (PST)
Received: from TK5EX14MLTC103.redmond.corp.microsoft.com (157.54.79.174) by TK5-EXGWY-E802.partners.extranet.microsoft.com (10.251.56.168) with Microsoft SMTP Server (TLS) id 8.2.176.0; Sun, 9 Jan 2011 23:43:35 -0800
Received: from TK5EX14MBXC115.redmond.corp.microsoft.com ([169.254.4.135]) by TK5EX14MLTC103.redmond.corp.microsoft.com ([157.54.79.174]) with mapi id 14.01.0255.003; Sun, 9 Jan 2011 23:43:35 -0800
From: Charlie Kaufman <charliek@microsoft.com>
To: "secdir@ietf.org" <secdir@ietf.org>, "iesg@ietf.org" <iesg@ietf.org>, "draft-baker-ietf-core.all@tools.ietf.org" <draft-baker-ietf-core.all@tools.ietf.org>
Thread-Topic: Secdir review of draft-baker-ietf-core-11.txt
Thread-Index: AcuwlFYRhTqo2OiETVufesZBsiT2pw==
Date: Mon, 10 Jan 2011 07:43:34 +0000
Message-ID: <D80EDFF2AD83E648BD1164257B9B09122C2F2C86@TK5EX14MBXC115.redmond.corp.microsoft.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.123.12]
Content-Type: multipart/alternative; boundary="_000_D80EDFF2AD83E648BD1164257B9B09122C2F2C86TK5EX14MBXC115r_"
MIME-Version: 1.0
Subject: [secdir] Secdir review of draft-baker-ietf-core-11.txt
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 10 Jan 2011 07:41:35 -0000

--_000_D80EDFF2AD83E648BD1164257B9B09122C2F2C86TK5EX14MBXC115r_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

I have reviewed this document as part of the security directorate's ongoing=
 effort to review all IETF documents being processed by the IESG.  These co=
mments were written primarily for the benefit of the security area director=
s.  Document editors and WG chairs should treat these comments just like an=
y other last call comments.

I don't know the back story on this document. It is an individual submissio=
n, I assume targeting Informational status. The title is "Internet Protocol=
s for the Smart Grid". I didn't immediately know what "Smart Grid" referred=
 to, and the document assumes the reader already knows, but a quick web sea=
rch says that current usage is for an upgrade to the electrical power grid =
supporting innovations like having large numbers of small providers and int=
elligently managing load (i.e. turning off low priority devices under condi=
tions of peak load) so that we don't need to provision for peak loads so mu=
ch larger than average loads.

Most of this document has little to do with the Smart Grid. It is largely a=
n overview of the Internet Protocol Suite referencing the relevant RFCs for=
 details. I would have thought that such an overview would already exist, b=
ut my quick search of RFCs did not find one. This would be a handy document=
 to be able to point newbies at, though this title might dissuade them. It'=
s possible that this overview leaves out broad swaths of IETF work  on the =
theory that it would be irrelevant to Smart Grid designers, but such filter=
ing was not obvious.

The part of this document that is about the Smart Grid is Appendix A, which=
 speculates on several ways the Smart Grid might take advantages of Interne=
t technology. I would hope that the people designing the Smart Grid would b=
e familiar with the Internet Protocol Suite, but perhaps I'm being na=EFve.

Security is one of the most important challenges designers of a Smart Grid =
will face, and this document emphasizes parts of the Internet Protocol Suit=
e that provide security and that might be applicable (i.e. IPsec, TLS, XML-=
DSIG, and S/MIME). [Note: I believe a reference to CMS would be more useful=
 than the indirect references to it via S/MIME]. It does not address (that =
I saw) the fact that since the Smart Grid is a real time control system, de=
aling effectively with Denial of Service attacks will be particularly impor=
tant in this context. While a lot of work has gone into QoS guarantees on t=
he Internet, my impression is that most of that work is not standardized. T=
he fact that the use of the power grid as a networking mechanism appears to=
 target non-general purpose use (i.e. it does not appear anyone is planning=
 to run on-demand video over it) makes it plausible that this problem is so=
lvable.

Because this document does not propose a specific protocol, is has only a t=
oken "Security Considerations" section (that notes that security is discuss=
ed in some other sections). That seems appropriate to me.

I noted a couple of typos:

P50 next to last line: "a distributed application in a set collectors" -> ?=
??

P52 first line: unbalanced quotes.



--_000_D80EDFF2AD83E648BD1164257B9B09122C2F2C86TK5EX14MBXC115r_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoPlainText, li.MsoPlainText, div.MsoPlainText
	{mso-style-priority:99;
	mso-style-link:"Plain Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
span.PlainTextChar
	{mso-style-name:"Plain Text Char";
	mso-style-priority:99;
	mso-style-link:"Plain Text";
	font-family:"Calibri","sans-serif";}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri","sans-serif";}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoPlainText">I have reviewed this document as part of the secu=
rity directorate's ongoing effort to review all IETF documents being proces=
sed by the IESG.&nbsp; These comments were written primarily for the benefi=
t of the security area directors.&nbsp; Document
 editors and WG chairs should treat these comments just like any other last=
 call comments.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">I don&#8217;t know the back story on this document. =
It is an individual submission, I assume targeting Informational status. Th=
e title is &#8220;Internet Protocols for the Smart Grid&#8221;. I didn&#821=
7;t immediately know what &#8220;Smart Grid&#8221; referred to, and the
 document assumes the reader already knows, but a quick web search says tha=
t current usage is for an upgrade to the electrical power grid supporting i=
nnovations like having large numbers of small providers and intelligently m=
anaging load (i.e. turning off low
 priority devices under conditions of peak load) so that we don&#8217;t nee=
d to provision for peak loads so much larger than average loads.<o:p></o:p>=
</p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Most of this document has little to do with the Smar=
t Grid. It is largely an overview of the Internet Protocol Suite referencin=
g the relevant RFCs for details. I would have thought that such an overview=
 would already exist, but my quick
 search of RFCs did not find one. This would be a handy document to be able=
 to point newbies at, though this title might dissuade them. It&#8217;s pos=
sible that this overview leaves out broad swaths of IETF work&nbsp; on the =
theory that it would be irrelevant to Smart
 Grid designers, but such filtering was not obvious.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">The part of this document that is about the Smart Gr=
id is Appendix A, which speculates on several ways the Smart Grid might tak=
e advantages of Internet technology. I would hope that the people designing=
 the Smart Grid would be familiar
 with the Internet Protocol Suite, but perhaps I&#8217;m being na=EFve.<o:p=
></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Security is one of the most important challenges des=
igners of a Smart Grid will face, and this document emphasizes parts of the=
 Internet Protocol Suite that provide security and that might be applicable=
 (i.e. IPsec, TLS, XML-DSIG, and S/MIME).
 [Note: I believe a reference to CMS would be more useful than the indirect=
 references to it via S/MIME]. It does not address (that I saw) the fact th=
at since the Smart Grid is a real time control system, dealing effectively =
with Denial of Service attacks will
 be particularly important in this context. While a lot of work has gone in=
to QoS guarantees on the Internet, my impression is that most of that work =
is not standardized. The fact that the use of the power grid as a networkin=
g mechanism appears to target non-general
 purpose use (i.e. it does not appear anyone is planning to run on-demand v=
ideo over it) makes it plausible that this problem is solvable.<o:p></o:p><=
/p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Because this document does not propose a specific pr=
otocol, is has only a token &#8220;Security Considerations&#8221; section (=
that notes that security is discussed in some other sections). That seems a=
ppropriate to me.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">I noted a couple of typos:<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">P50 next to last line: &#8220;a distributed applicat=
ion in a set collectors&#8221; -&gt; ???<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">P52 first line: unbalanced quotes.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</body>
</html>

--_000_D80EDFF2AD83E648BD1164257B9B09122C2F2C86TK5EX14MBXC115r_--

From alper.yegin@yegin.org  Mon Jan 10 02:34:41 2011
Return-Path: <alper.yegin@yegin.org>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 5BEC83A6956; Mon, 10 Jan 2011 02:34:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -100.561
X-Spam-Level: 
X-Spam-Status: No, score=-100.561 tagged_above=-999 required=5 tests=[AWL=-0.011, BAYES_00=-2.599, J_CHICKENPOX_33=0.6, MSGID_MULTIPLE_AT=1.449, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id c8m2pQ9JZoRr; Mon, 10 Jan 2011 02:34:40 -0800 (PST)
Received: from mout.perfora.net (mout.perfora.net [74.208.4.194]) by core3.amsl.com (Postfix) with ESMTP id 9388B28C0ED; Mon, 10 Jan 2011 02:34:40 -0800 (PST)
Received: from ibm (dsl88-247-34762.ttnet.net.tr [88.247.135.202]) by mrelay.perfora.net (node=mrus3) with ESMTP (Nemesis) id 0M8lvA-1PSK0u2OK4-00CcFo; Mon, 10 Jan 2011 05:36:47 -0500
From: "Alper Yegin" <alper.yegin@yegin.org>
To: "'Alan DeKok'" <aland@deployingradius.com>
References: <4D009D34.1020809@deployingradius.com> <4D01DABF.6060604@toshiba.co.jp> <001101cb9aa0$367b3480$a3719d80$@yegin@yegin.org> <4D064683.30009@deployingradius.com> <4D07A874.4010702@gridmerge.com> <4D07D090.9020407@deployingradius.com> <070601cba3ad$63852150$2a8f63f0$@yegin@yegin.org> <4D270D1D.8090006@deployingradius.com>
In-Reply-To: <4D270D1D.8090006@deployingradius.com>
Date: Mon, 10 Jan 2011 12:35:46 +0200
Message-ID: <005f01cbb0b2$2bc21cc0$83465640$@yegin@yegin.org>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Office Outlook 12.0
Thread-Index: AcuuahYO8CAV0E0sQci2eFTD0TST8wCRmpHQ
Content-Language: en-us
X-Provags-ID: V02:K0:Q8vWxxcFPRbIpR+Ghh197rTw+iHbMC7mQgL2bQoyt+Q hH81m72HDjhlxwAAM89IGS6YtMgOXOA4IStANmTB1IQRrRbeRb D+Xgo12gI26B1AlYJDhOtutplxfFiT7zxkzpn+dahtM3Fxu3mb e2I21e/1T1aiy6FVXQuUrSe/PhYOHqO/OiccBVGEE1xbyCR6r7 A5I1LZjtDSssMlT1MFW9qnLaSzg0CrD9rZALxEub0c=
Cc: secdir@ietf.org, paduffy@cisco.com, margaretw42@gmail.com, pana@ietf.org, robert.cragie@gridmerge.com, samitac@ipinfusion.com, 'Ralph Droms' <rdroms.ietf@gmail.com>
Subject: Re: [secdir] pana-relay security considerations
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 10 Jan 2011 10:34:41 -0000

Hi Alan,


>   It looks good.  I'd like to know if the PRE can relay messages from
> the PAA to the PaC on a non-PANA port.  If so, that needs to be
> addressed somehow.  Saying "use DTLS" might not be enough.

The PaC picks an ephemeral port when sending the PANA packet. Src:any, dst:
716. And the response from the PAA reverses the ports. 

The most PRE can do is to check if source port is 716.

If the PRE knows that it received the packet from a trusted source (by means
of DTLS, physical security, IPsec, etc.), then the PRE should not
normally(*) have to perform another level of check on the packets. 

(*) If the PRE cares extra about this, it can start performing DPI on the
packets. I don't think we should specify this in the document though.

> 
>   If the PaC always sends packets from the PANA port, then the text
> should be updated to say that the PAA only sends packets to the PANA
> port on the PaC.

Alper






> 
>   Alan DeKok.


From aland@deployingradius.com  Mon Jan 10 03:00:31 2011
Return-Path: <aland@deployingradius.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B6EE83A6AF7; Mon, 10 Jan 2011 03:00:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.289
X-Spam-Level: 
X-Spam-Status: No, score=-102.289 tagged_above=-999 required=5 tests=[AWL=-0.290, BAYES_00=-2.599, J_CHICKENPOX_33=0.6, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6oCqa1jIfV+h; Mon, 10 Jan 2011 03:00:31 -0800 (PST)
Received: from liberty.deployingradius.com (liberty.deployingradius.com [88.191.76.128]) by core3.amsl.com (Postfix) with ESMTP id DA0233A6953; Mon, 10 Jan 2011 03:00:30 -0800 (PST)
Message-ID: <4D2AE752.2000504@deployingradius.com>
Date: Mon, 10 Jan 2011 12:02:42 +0100
From: Alan DeKok <aland@deployingradius.com>
User-Agent: Thunderbird 2.0.0.24 (Macintosh/20100228)
MIME-Version: 1.0
To: Alper Yegin <alper.yegin@yegin.org>
References: <4D009D34.1020809@deployingradius.com> <4D01DABF.6060604@toshiba.co.jp> <001101cb9aa0$367b3480$a3719d80$@yegin@yegin.org> <4D064683.30009@deployingradius.com> <4D07A874.4010702@gridmerge.com> <4D07D090.9020407@deployingradius.com> <070601cba3ad$63852150$2a8f63f0$@yegin@yegin.org> <4D270D1D.8090006@deployingradius.com> <005f01cbb0b2$2bc21cc0$83465640$@yegin@yegin.org>
In-Reply-To: <005f01cbb0b2$2bc21cc0$83465640$@yegin@yegin.org>
X-Enigmail-Version: 0.96.0
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
Cc: secdir@ietf.org, paduffy@cisco.com, margaretw42@gmail.com, pana@ietf.org, robert.cragie@gridmerge.com, samitac@ipinfusion.com, 'Ralph Droms' <rdroms.ietf@gmail.com>
Subject: Re: [secdir] pana-relay security considerations
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 10 Jan 2011 11:00:31 -0000

Alper Yegin wrote:
> The PaC picks an ephemeral port when sending the PANA packet. Src:any, dst:
> 716. And the response from the PAA reverses the ports. 

  OK.

> The most PRE can do is to check if source port is 716.
> 
> If the PRE knows that it received the packet from a trusted source (by means
> of DTLS, physical security, IPsec, etc.), then the PRE should not
> normally(*) have to perform another level of check on the packets. 

  And if not?  Anyone can pretend to be the PAA, and send any data to
any port on the PaC.  If this data MUST be a well-formed PANA packet,
the security issues are minimal.  But I don't see that requirement
clearly in the document.

  Alan DeKok.


From alper.yegin@yegin.org  Mon Jan 10 03:15:19 2011
Return-Path: <alper.yegin@yegin.org>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 06EA428C146; Mon, 10 Jan 2011 03:15:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -100.56
X-Spam-Level: 
X-Spam-Status: No, score=-100.56 tagged_above=-999 required=5 tests=[AWL=-0.010, BAYES_00=-2.599, J_CHICKENPOX_33=0.6, MSGID_MULTIPLE_AT=1.449, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bZIahc2miQq7; Mon, 10 Jan 2011 03:15:18 -0800 (PST)
Received: from mout.perfora.net (mout.perfora.net [74.208.4.194]) by core3.amsl.com (Postfix) with ESMTP id 3CEDE28C13A; Mon, 10 Jan 2011 03:15:18 -0800 (PST)
Received: from ibm (dsl88-247-34762.ttnet.net.tr [88.247.135.202]) by mrelay.perfora.net (node=mrus1) with ESMTP (Nemesis) id 0MBEIX-1PUncX3ghh-009uyg; Mon, 10 Jan 2011 06:17:27 -0500
From: "Alper Yegin" <alper.yegin@yegin.org>
To: "'Alan DeKok'" <aland@deployingradius.com>
References: <4D009D34.1020809@deployingradius.com> <4D01DABF.6060604@toshiba.co.jp> <001101cb9aa0$367b3480$a3719d80$@yegin@yegin.org> <4D064683.30009@deployingradius.com> <4D07A874.4010702@gridmerge.com> <4D07D090.9020407@deployingradius.com> <070601cba3ad$63852150$2a8f63f0$@yegin@yegin.org> <4D270D1D.8090006@deployingradius.com> <005f01cbb0b2$2bc21cc0$83465640$@yegin@yegin.org> <4D2AE752.2000504@deployingradius.com>
In-Reply-To: <4D2AE752.2000504@deployingradius.com>
Date: Mon, 10 Jan 2011 13:16:25 +0200
Message-ID: <006001cbb0b7$da450050$8ecf00f0$@yegin@yegin.org>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Office Outlook 12.0
Thread-Index: Acuwtei1MAWfTMPWSv6RWCiLEVgL9wAAKEVQ
Content-Language: en-us
X-Provags-ID: V02:K0:7MlJwzroWSRyEcbDzi8Yy6IqtktPlJ8V8nLaK1oYtSI RoSlKmaoC9/5C9g70op1fGt1GOy/1ehPVau7Uos5MB5V3wlvKu GBg5TF3Ex4/qE33Wi1TdUza0JPKeeBY4m/xRLUpz/zbrNnAbDs abHJKojOlJkxTd3KJdpmBdoXxde85LYiZCzwKi285LxYvr7EvT j0KKVhR2W85O/67eZLxvx68MV96yuiBMq4rfCKFA7c=
Cc: secdir@ietf.org, paduffy@cisco.com, margaretw42@gmail.com, pana@ietf.org, robert.cragie@gridmerge.com, samitac@ipinfusion.com, 'Ralph Droms' <rdroms.ietf@gmail.com>
Subject: Re: [secdir] pana-relay security considerations
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 10 Jan 2011 11:15:19 -0000

> > The PaC picks an ephemeral port when sending the PANA packet.
> Src:any, dst:
> > 716. And the response from the PAA reverses the ports.
> 
>   OK.
> 
> > The most PRE can do is to check if source port is 716.
> >
> > If the PRE knows that it received the packet from a trusted source
> (by means
> > of DTLS, physical security, IPsec, etc.), then the PRE should not
> > normally(*) have to perform another level of check on the packets.
> 
>   And if not?  Anyone can pretend to be the PAA, and send any data to
> any port on the PaC.  

PRE would authenticate and authorize the other end-point who claims to be a
legit PAA before accepting any packets from it. So, it's not  "anyone".


> If this data MUST be a well-formed PANA packet,
> the security issues are minimal.  But I don't see that requirement
> clearly in the document.

This is the DPI aspect. 

What should we check for well-formation? Many if not all fields in the PANA
header may be updated by future releases of the spec (extensions, etc.). so
checking on them would force the PRE to get upgraded (with a revised version
of PANA-relay spec each time) when PaC/PAA gets upgraded. This is very
undesirable. 


I think we shall stick to relying on PAA-PRE security.

Alper

> 
>   Alan DeKok.


From fred@cisco.com  Mon Jan 10 03:45:19 2011
Return-Path: <fred@cisco.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B735D3A6953; Mon, 10 Jan 2011 03:45:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -110.455
X-Spam-Level: 
X-Spam-Status: No, score=-110.455 tagged_above=-999 required=5 tests=[AWL=0.143, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ej3YkB-HZYDE; Mon, 10 Jan 2011 03:45:18 -0800 (PST)
Received: from sj-iport-4.cisco.com (sj-iport-4.cisco.com [171.68.10.86]) by core3.amsl.com (Postfix) with ESMTP id 512DF28C10E; Mon, 10 Jan 2011 03:45:18 -0800 (PST)
Authentication-Results: sj-iport-4.cisco.com; dkim=neutral (message not signed) header.i=none
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AhgFAEeAKk2rR7Hu/2dsb2JhbACCOaIFc6QFl2CFTASEZ4YjgyA
Received: from sj-core-5.cisco.com ([171.71.177.238]) by sj-iport-4.cisco.com with ESMTP; 10 Jan 2011 11:47:31 +0000
Received: from stealth-10-32-244-218.cisco.com (stealth-10-32-244-218.cisco.com [10.32.244.218]) by sj-core-5.cisco.com (8.13.8/8.14.3) with ESMTP id p0ABlQUQ022754; Mon, 10 Jan 2011 11:47:31 GMT
Received: from [127.0.0.1] by stealth-10-32-244-218.cisco.com (PGP Universal service); Mon, 10 Jan 2011 03:47:31 -0800
X-PGP-Universal: processed; by stealth-10-32-244-218.cisco.com on Mon, 10 Jan 2011 03:47:31 -0800
Mime-Version: 1.0 (Apple Message framework v1082)
From: Fred Baker <fred@cisco.com>
In-Reply-To: <D80EDFF2AD83E648BD1164257B9B09122C2F2C86@TK5EX14MBXC115.redmond.corp.microsoft.com>
Date: Mon, 10 Jan 2011 03:47:17 -0800
Message-Id: <4017D939-EA36-435F-BE31-D010399CFEAB@cisco.com>
References: <D80EDFF2AD83E648BD1164257B9B09122C2F2C86@TK5EX14MBXC115.redmond.corp.microsoft.com>
To: Charlie Kaufman <charliek@microsoft.com>
X-Mailer: Apple Mail (2.1082)
Content-Type: multipart/alternative; boundary=Apple-Mail-128-672740972
Cc: "draft-baker-ietf-core.all@tools.ietf.org" <draft-baker-ietf-core.all@tools.ietf.org>, "iesg@ietf.org" <iesg@ietf.org>, "secdir@ietf.org" <secdir@ietf.org>
Subject: Re: [secdir] Secdir review of draft-baker-ietf-core-11.txt
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 10 Jan 2011 11:45:19 -0000

--Apple-Mail-128-672740972
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=windows-1252


On Jan 9, 2011, at 11:43 PM, Charlie Kaufman wrote:

> I have reviewed this document as part of the security directorate's =
ongoing effort to review all IETF documents being processed by the IESG. =
 These comments were written primarily for the benefit of the security =
area directors.  Document editors and WG chairs should treat these =
comments just like any other last call comments.
> =20
> I don=92t know the back story on this document. It is an individual =
submission, I assume targeting Informational status. The title is =
=93Internet Protocols for the Smart Grid=94. I didn=92t immediately know =
what =93Smart Grid=94 referred to, and the document assumes the reader =
already knows, but a quick web search says that current usage is for an =
upgrade to the electrical power grid supporting innovations like having =
large numbers of small providers and intelligently managing load (i.e. =
turning off low priority devices under conditions of peak load) so that =
we don=92t need to provision for peak loads so much larger than average =
loads.

Correct. in the next version of the document, I plan to quote a few =
words from the wikipedia article on the Smart Grid in the introduction.

> Most of this document has little to do with the Smart Grid. It is =
largely an overview of the Internet Protocol Suite referencing the =
relevant RFCs for details. I would have thought that such an overview =
would already exist, but my quick search of RFCs did not find one. This =
would be a handy document to be able to point newbies at, though this =
title might dissuade them. It=92s possible that this overview leaves out =
broad swaths of IETF work  on the theory that it would be irrelevant to =
Smart Grid designers, but such filtering was not obvious.
> =20
> The part of this document that is about the Smart Grid is Appendix A, =
which speculates on several ways the Smart Grid might take advantages of =
Internet technology. I would hope that the people designing the Smart =
Grid would be familiar with the Internet Protocol Suite, but perhaps I=92m=
 being na=EFve.

The document was requested by US NIST, which is taking the lead on =
national Smart Grid requirements and standards, in the context of the =
Smart Grid Interoperability Panel, which I am the IETF's designated =
liaison to. I also chair the Smart Grid Directorate in the IETF.
=20
> Security is one of the most important challenges designers of a Smart =
Grid will face, and this document emphasizes parts of the Internet =
Protocol Suite that provide security and that might be applicable (i.e. =
IPsec, TLS, XML-DSIG, and S/MIME). [Note: I believe a reference to CMS =
would be more useful than the indirect references to it via S/MIME]. It =
does not address (that I saw) the fact that since the Smart Grid is a =
real time control system, dealing effectively with Denial of Service =
attacks will be particularly important in this context. While a lot of =
work has gone into QoS guarantees on the Internet, my impression is that =
most of that work is not standardized. The fact that the use of the =
power grid as a networking mechanism appears to target non-general =
purpose use (i.e. it does not appear anyone is planning to run on-demand =
video over it) makes it plausible that this problem is solvable.

Since I am not a security expert, I have been asking Russ for help from =
the security community; the security person he asked to help out on the =
directorate told me that "I am not being paid for this, so I don't plan =
to offer material help" during the IETF meeting in Anaheim last year. =
I'd be very willing to mention CMS, if the Security Directorate would =
like me to. I have little idea what CMS is or how it would be used in =
this context, however, and would appreciate constructive assistance from =
the Security Directorate on these sections.

> Because this document does not propose a specific protocol, is has =
only a token =93Security Considerations=94 section (that notes that =
security is discussed in some other sections). That seems appropriate to =
me.
> =20
> I noted a couple of typos:

Thanks, I'll pick these up in the next revision.

> P50 next to last line: =93a distributed application in a set =
collectors=94 -> ???
> =20
> P52 first line: unbalanced quotes.
> =20
> =20


--Apple-Mail-128-672740972
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=windows-1252

<html><head><base href=3D"x-msg://129/"></head><body style=3D"word-wrap: =
break-word; -webkit-nbsp-mode: space; -webkit-line-break: =
after-white-space; "><br><div><div>On Jan 9, 2011, at 11:43 PM, Charlie =
Kaufman wrote:</div><br class=3D"Apple-interchange-newline"><blockquote =
type=3D"cite"><span class=3D"Apple-style-span" style=3D"border-collapse: =
separate; font-family: Helvetica; font-style: normal; font-variant: =
normal; font-weight: normal; letter-spacing: normal; line-height: =
normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: =
normal; widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: =
0px; -webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; font-size: medium; "><div =
lang=3D"EN-US" link=3D"blue" vlink=3D"purple"><div class=3D"WordSection1" =
style=3D"page: WordSection1; "><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
11pt; font-family: Calibri, sans-serif; ">I have reviewed this document =
as part of the security directorate's ongoing effort to review all IETF =
documents being processed by the IESG.&nbsp; These comments were written =
primarily for the benefit of the security area directors.&nbsp; Document =
editors and WG chairs should treat these comments just like any other =
last call comments.<o:p></o:p></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
11pt; font-family: Calibri, sans-serif; "><o:p>&nbsp;</o:p></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 11pt; font-family: Calibri, sans-serif; ">I =
don=92t know the back story on this document. It is an individual =
submission, I assume targeting Informational status. The title is =
=93Internet Protocols for the Smart Grid=94. I didn=92t immediately know =
what =93Smart Grid=94 referred to, and the document assumes the reader =
already knows, but a quick web search says that current usage is for an =
upgrade to the electrical power grid supporting innovations like having =
large numbers of small providers and intelligently managing load (i.e. =
turning off low priority devices under conditions of peak load) so that =
we don=92t need to provision for peak loads so much larger than average =
loads.<o:p></o:p></div></div></div></span></blockquote><div><span =
class=3D"Apple-style-span" style=3D"border-collapse: separate; =
font-family: Helvetica; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; line-height: normal; =
orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; =
widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; font-size: medium; "><div =
lang=3D"EN-US" link=3D"blue" vlink=3D"purple"><div class=3D"WordSection1" =
style=3D"page: WordSection1; "><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
11pt; font-family: Calibri, sans-serif; "><br></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 11pt; font-family: Calibri, sans-serif; =
">Correct. in the next version of the document, I plan to quote a few =
words from the wikipedia article on the Smart Grid in the =
introduction.</div><div style=3D"margin-top: 0in; margin-right: 0in; =
margin-bottom: 0.0001pt; margin-left: 0in; font-size: 11pt; font-family: =
Calibri, sans-serif; "><br></div></div></div></span></div><blockquote =
type=3D"cite"><span class=3D"Apple-style-span" style=3D"border-collapse: =
separate; font-family: Helvetica; font-style: normal; font-variant: =
normal; font-weight: normal; letter-spacing: normal; line-height: =
normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: =
normal; widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: =
0px; -webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; font-size: medium; "><div =
lang=3D"EN-US" link=3D"blue" vlink=3D"purple"><div class=3D"WordSection1" =
style=3D"page: WordSection1; "><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
11pt; font-family: Calibri, sans-serif; ">Most of this document has =
little to do with the Smart Grid. It is largely an overview of the =
Internet Protocol Suite referencing the relevant RFCs for details. I =
would have thought that such an overview would already exist, but my =
quick search of RFCs did not find one. This would be a handy document to =
be able to point newbies at, though this title might dissuade them. It=92s=
 possible that this overview leaves out broad swaths of IETF work&nbsp; =
on the theory that it would be irrelevant to Smart Grid designers, but =
such filtering was not obvious.<o:p></o:p></div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 11pt; font-family: Calibri, sans-serif; =
"><o:p>&nbsp;</o:p></div><div style=3D"margin-top: 0in; margin-right: =
0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: 11pt; =
font-family: Calibri, sans-serif; ">The part of this document that is =
about the Smart Grid is Appendix A, which speculates on several ways the =
Smart Grid might take advantages of Internet technology. I would hope =
that the people designing the Smart Grid would be familiar with the =
Internet Protocol Suite, but perhaps I=92m being =
na=EFve.<o:p></o:p></div></div></div></span></blockquote><div><span =
class=3D"Apple-style-span" style=3D"border-collapse: separate; =
font-family: Helvetica; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; line-height: normal; =
orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; =
widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; font-size: medium; "><div =
lang=3D"EN-US" link=3D"blue" vlink=3D"purple"><div class=3D"WordSection1" =
style=3D"page: WordSection1; "><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
11pt; font-family: Calibri, sans-serif; "><o:p><br></o:p></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 11pt; font-family: Calibri, sans-serif; =
"><o:p>The document was requested by US NIST, which is taking the lead =
on national Smart Grid requirements and standards, in the context of the =
Smart Grid Interoperability Panel, which I am the IETF's designated =
liaison to. I also chair the Smart Grid Directorate in the =
IETF.</o:p></div><div style=3D"margin-top: 0in; margin-right: 0in; =
margin-bottom: 0.0001pt; margin-left: 0in; font-size: 11pt; font-family: =
Calibri, sans-serif; =
"><o:p>&nbsp;</o:p></div></div></div></span></div><blockquote =
type=3D"cite"><span class=3D"Apple-style-span" style=3D"border-collapse: =
separate; font-family: Helvetica; font-style: normal; font-variant: =
normal; font-weight: normal; letter-spacing: normal; line-height: =
normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: =
normal; widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: =
0px; -webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; font-size: medium; "><div =
lang=3D"EN-US" link=3D"blue" vlink=3D"purple"><div class=3D"WordSection1" =
style=3D"page: WordSection1; "><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
11pt; font-family: Calibri, sans-serif; ">Security is one of the most =
important challenges designers of a Smart Grid will face, and this =
document emphasizes parts of the Internet Protocol Suite that provide =
security and that might be applicable (i.e. IPsec, TLS, XML-DSIG, and =
S/MIME). [Note: I believe a reference to CMS would be more useful than =
the indirect references to it via S/MIME]. It does not address (that I =
saw) the fact that since the Smart Grid is a real time control system, =
dealing effectively with Denial of Service attacks will be particularly =
important in this context. While a lot of work has gone into QoS =
guarantees on the Internet, my impression is that most of that work is =
not standardized. The fact that the use of the power grid as a =
networking mechanism appears to target non-general purpose use (i.e. it =
does not appear anyone is planning to run on-demand video over it) makes =
it plausible that this problem is =
solvable.<o:p></o:p></div></div></div></span></blockquote><div><span =
class=3D"Apple-style-span" style=3D"border-collapse: separate; =
font-family: Helvetica; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; line-height: normal; =
orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; =
widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; font-size: medium; "><div =
lang=3D"EN-US" link=3D"blue" vlink=3D"purple"><div class=3D"WordSection1" =
style=3D"page: WordSection1; "><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
11pt; font-family: Calibri, sans-serif; "><br></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 11pt; font-family: Calibri, sans-serif; =
">Since I am not a security expert, I have been asking Russ for help =
from the security community; the security person he asked to help out on =
the directorate told me that "I am not being paid for this, so I don't =
plan to offer material help" during the IETF meeting in Anaheim last =
year. I'd be very willing to mention CMS, if the Security Directorate =
would like me to. I have little idea what CMS is or how it would be used =
in this context, however, and would appreciate constructive assistance =
from the Security Directorate on these sections.</div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 11pt; font-family: Calibri, sans-serif; =
"><br></div></div></div></span></div><blockquote type=3D"cite"><span =
class=3D"Apple-style-span" style=3D"border-collapse: separate; =
font-family: Helvetica; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; line-height: normal; =
orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; =
widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; font-size: medium; "><div =
lang=3D"EN-US" link=3D"blue" vlink=3D"purple"><div class=3D"WordSection1" =
style=3D"page: WordSection1; "><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
11pt; font-family: Calibri, sans-serif; ">Because this document does not =
propose a specific protocol, is has only a token =93Security =
Considerations=94 section (that notes that security is discussed in some =
other sections). That seems appropriate to me.<o:p></o:p></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 11pt; font-family: Calibri, sans-serif; =
"><o:p>&nbsp;</o:p></div><div style=3D"margin-top: 0in; margin-right: =
0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: 11pt; =
font-family: Calibri, sans-serif; ">I noted a couple of =
typos:<o:p></o:p></div></div></div></span></blockquote><div><span =
class=3D"Apple-style-span" style=3D"border-collapse: separate; =
font-family: Helvetica; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; line-height: normal; =
orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; =
widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; font-size: medium; "><div =
lang=3D"EN-US" link=3D"blue" vlink=3D"purple"><div class=3D"WordSection1" =
style=3D"page: WordSection1; "><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
11pt; font-family: Calibri, sans-serif; =
"><br></div></div></div></span></div>Thanks, I'll pick these up in the =
next revision.</div><div><br><blockquote type=3D"cite"><span =
class=3D"Apple-style-span" style=3D"border-collapse: separate; =
font-family: Helvetica; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; line-height: normal; =
orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; =
widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; font-size: medium; "><div =
lang=3D"EN-US" link=3D"blue" vlink=3D"purple"><div class=3D"WordSection1" =
style=3D"page: WordSection1; "><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
11pt; font-family: Calibri, sans-serif; ">P50 next to last line: =93a =
distributed application in a set collectors=94 -&gt; =
???<o:p></o:p></div><div style=3D"margin-top: 0in; margin-right: 0in; =
margin-bottom: 0.0001pt; margin-left: 0in; font-size: 11pt; font-family: =
Calibri, sans-serif; "><o:p>&nbsp;</o:p></div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 11pt; font-family: Calibri, sans-serif; ">P52 first line: =
unbalanced quotes.<o:p></o:p></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
11pt; font-family: Calibri, sans-serif; "><o:p>&nbsp;</o:p></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 11pt; font-family: Calibri, sans-serif; =
"><o:p>&nbsp;</o:p></div></div></div></span></blockquote></div><br></body>=
</html>=

--Apple-Mail-128-672740972--

From aland@deployingradius.com  Mon Jan 10 04:04:41 2011
Return-Path: <aland@deployingradius.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 17C1628C163; Mon, 10 Jan 2011 04:04:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.58
X-Spam-Level: 
X-Spam-Status: No, score=-102.58 tagged_above=-999 required=5 tests=[AWL=0.019, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8AoNAywb0taV; Mon, 10 Jan 2011 04:04:40 -0800 (PST)
Received: from liberty.deployingradius.com (liberty.deployingradius.com [88.191.76.128]) by core3.amsl.com (Postfix) with ESMTP id 4A77428C133; Mon, 10 Jan 2011 04:04:40 -0800 (PST)
Message-ID: <4D2AF65C.6060903@deployingradius.com>
Date: Mon, 10 Jan 2011 13:06:52 +0100
From: Alan DeKok <aland@deployingradius.com>
User-Agent: Thunderbird 2.0.0.24 (Macintosh/20100228)
MIME-Version: 1.0
To: Alper Yegin <alper.yegin@yegin.org>
References: <4D009D34.1020809@deployingradius.com> <4D01DABF.6060604@toshiba.co.jp> <001101cb9aa0$367b3480$a3719d80$@yegin@yegin.org> <4D064683.30009@deployingradius.com> <4D07A874.4010702@gridmerge.com> <4D07D090.9020407@deployingradius.com> <070601cba3ad$63852150$2a8f63f0$@yegin@yegin.org> <4D270D1D.8090006@deployingradius.com> <005f01cbb0b2$2bc21cc0$83465640$@yegin@yegin.org> <4D2AE752.2000504@deployingradius.com> <006001cbb0b7$da450050$8ecf00f0$@yegin@yegin.org>
In-Reply-To: <006001cbb0b7$da450050$8ecf00f0$@yegin@yegin.org>
X-Enigmail-Version: 0.96.0
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
Cc: secdir@ietf.org, paduffy@cisco.com, margaretw42@gmail.com, pana@ietf.org, robert.cragie@gridmerge.com, samitac@ipinfusion.com, 'Ralph Droms' <rdroms.ietf@gmail.com>
Subject: Re: [secdir] pana-relay security considerations
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 10 Jan 2011 12:04:41 -0000

Alper Yegin wrote:
> PRE would authenticate and authorize the other end-point who claims to be a
> legit PAA before accepting any packets from it. So, it's not  "anyone".

  Only when a secure transport is used.  When a secure transport is not
used, the PAA to PRE is just UDP, which is spoofable.

>> If this data MUST be a well-formed PANA packet,
>> the security issues are minimal.  But I don't see that requirement
>> clearly in the document.
> 
> This is the DPI aspect. 

  The PRE can't verify that it's sending a valid PANA packet to the PaC?

> What should we check for well-formation? Many if not all fields in the PANA
> header may be updated by future releases of the spec (extensions, etc.). so
> checking on them would force the PRE to get upgraded (with a revised version
> of PANA-relay spec each time) when PaC/PAA gets upgraded. This is very
> undesirable. 

  Some basic level of checks should be possible.

> I think we shall stick to relying on PAA-PRE security.

  Then it should be a MUST.

  Alan DeKok.




From aland@deployingradius.com  Mon Jan 10 05:23:37 2011
Return-Path: <aland@deployingradius.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 2DAFD3A6AFB; Mon, 10 Jan 2011 05:23:37 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.581
X-Spam-Level: 
X-Spam-Status: No, score=-102.581 tagged_above=-999 required=5 tests=[AWL=0.018, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XVyXG6uY9VOt; Mon, 10 Jan 2011 05:23:36 -0800 (PST)
Received: from liberty.deployingradius.com (liberty.deployingradius.com [88.191.76.128]) by core3.amsl.com (Postfix) with ESMTP id 52A333A6AFA; Mon, 10 Jan 2011 05:23:36 -0800 (PST)
Message-ID: <4D2B08DD.6010603@deployingradius.com>
Date: Mon, 10 Jan 2011 14:25:49 +0100
From: Alan DeKok <aland@deployingradius.com>
User-Agent: Thunderbird 2.0.0.24 (Macintosh/20100228)
MIME-Version: 1.0
To: Margaret Wasserman <margaretw42@gmail.com>
References: <4D009D34.1020809@deployingradius.com> <4D01DABF.6060604@toshiba.co.jp> <001101cb9aa0$367b3480$a3719d80$@yegin@yegin.org> <4D064683.30009@deployingradius.com> <4D07A874.4010702@gridmerge.com> <4D07D090.9020407@deployingradius.com> <070601cba3ad$63852150$2a8f63f0$@yegin@yegin.org> <4D270D1D.8090006@deployingradius.com> <005f01cbb0b2$2bc21cc0$83465640$@yegin@yegin.org> <4D2AE752.2000504@deployingradius.com> <006001cbb0b7$da450050$8ecf00f0$@yegin@yegin.org> <4D2AF65C.6060903@deployingradius.com> <A5B8DC5E-C118-47CE-9419-2F73879A6430@gmail.com>
In-Reply-To: <A5B8DC5E-C118-47CE-9419-2F73879A6430@gmail.com>
X-Enigmail-Version: 0.96.0
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
Cc: secdir@ietf.org, paduffy@cisco.com, Alper Yegin <alper.yegin@yegin.org>, pana@ietf.org, robert.cragie@gridmerge.com, samitac@ipinfusion.com, 'Ralph Droms' <rdroms.ietf@gmail.com>
Subject: Re: [secdir] pana-relay security considerations
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 10 Jan 2011 13:23:37 -0000

Margaret Wasserman wrote:
> In my opinion, a security mechanism for PRE-PAA authentication needs to
> be defined in this spec before we publish it.  I think it should be
> optional to actually _use_ the security mechanism, though since there
> some situations (such as closed or otherwise secured networks) where
> this type of security isn't required operationally.  The security
> considerations should make it clear what the risks are, and describe the
> situations in which it would be safe not to use the PRE-to-PAA security.
>
> Alan, would that satisfy your concerns?  PANA folks, would that meet
> your needs?

  That would satisfy my concerns, yes.

  Alan DeKok.

From margaretw42@gmail.com  Mon Jan 10 04:24:33 2011
Return-Path: <margaretw42@gmail.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 31F5D28C134; Mon, 10 Jan 2011 04:24:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.299
X-Spam-Level: 
X-Spam-Status: No, score=-3.299 tagged_above=-999 required=5 tests=[AWL=0.300,  BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Xx7sKxe-XL9n; Mon, 10 Jan 2011 04:24:32 -0800 (PST)
Received: from mail-vw0-f44.google.com (mail-vw0-f44.google.com [209.85.212.44]) by core3.amsl.com (Postfix) with ESMTP id 1900028C133; Mon, 10 Jan 2011 04:24:32 -0800 (PST)
Received: by vws7 with SMTP id 7so7836867vws.31 for <multiple recipients>; Mon, 10 Jan 2011 04:26:45 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:cc:message-id:from:to :in-reply-to:content-type:content-transfer-encoding:mime-version :subject:date:references:x-mailer; bh=QwZUdrojJsTawoc3ox31HEtl+igA41D9Ao7nLYLQ+Yo=; b=fLs78LQt/dPIhQE8t7yX624IGZye9cb5ai7meYT3F/IC0Cfw7jrSTmaCaxn5xiudoQ HtOWrBQBLOq3m2Z4hMh5yTyGaxmrcQlbUAKE71y1Z0gJgOQg7P8OKGhnLCFg6/lnYJTA UgmB2lPm2GjZjyj5JqNuyuWmIWPs+ec/A8baQ=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=cc:message-id:from:to:in-reply-to:content-type :content-transfer-encoding:mime-version:subject:date:references :x-mailer; b=o9cJ+4xtwITCNIQYAE/SQUkshopjaBpJDTCZC+P91uzobATgfHwmhADLwMdF9ctvTd 6b/Kd7XEU9D8M3v5W72jeD+5h1mHNq7WES36zH8CfKTdeuDh5hR3OmhyP90e4w7S8iug XpYFSTRgCWGLv0SUtttPyNW+K+dd9gMhAxwe8=
Received: by 10.220.188.133 with SMTP id da5mr8922414vcb.175.1294662405169; Mon, 10 Jan 2011 04:26:45 -0800 (PST)
Received: from [10.36.0.42] (pool-108-20-27-240.bstnma.fios.verizon.net [108.20.27.240]) by mx.google.com with ESMTPS id d14sm6278228vcx.23.2011.01.10.04.26.43 (version=TLSv1/SSLv3 cipher=RC4-MD5); Mon, 10 Jan 2011 04:26:44 -0800 (PST)
Message-Id: <A5B8DC5E-C118-47CE-9419-2F73879A6430@gmail.com>
From: Margaret Wasserman <margaretw42@gmail.com>
To: Alan DeKok <aland@deployingradius.com>
In-Reply-To: <4D2AF65C.6060903@deployingradius.com>
Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes
Content-Transfer-Encoding: 7bit
Mime-Version: 1.0 (Apple Message framework v936)
Date: Mon, 10 Jan 2011 07:26:42 -0500
References: <4D009D34.1020809@deployingradius.com> <4D01DABF.6060604@toshiba.co.jp> <001101cb9aa0$367b3480$a3719d80$@yegin@yegin.org> <4D064683.30009@deployingradius.com> <4D07A874.4010702@gridmerge.com> <4D07D090.9020407@deployingradius.com> <070601cba3ad$63852150$2a8f63f0$@yegin@yegin.org> <4D270D1D.8090006@deployingradius.com> <005f01cbb0b2$2bc21cc0$83465640$@yegin@yegin.org> <4D2AE752.2000504@deployingradius.com> <006001cbb0b7$da450050$8ecf00f0$@yegin@yegin.org> <4D2AF65C.6060903@deployingradius.com>
X-Mailer: Apple Mail (2.936)
X-Mailman-Approved-At: Mon, 10 Jan 2011 06:28:08 -0800
Cc: secdir@ietf.org, paduffy@cisco.com, Alper Yegin <alper.yegin@yegin.org>, pana@ietf.org, robert.cragie@gridmerge.com, samitac@ipinfusion.com, 'Ralph Droms' <rdroms.ietf@gmail.com>
Subject: Re: [secdir] pana-relay security considerations
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 10 Jan 2011 12:24:33 -0000

Hi Alan,

On Jan 10, 2011, at 7:06 AM, Alan DeKok wrote:
>
>> I think we shall stick to relying on PAA-PRE security.
>
>  Then it should be a MUST.

I originally thought that we needed some form of PRE-PAA security, and  
your comments have, IMO, suggested more reasons why this is needed.

In my opinion, a security mechanism for PRE-PAA authentication needs  
to be defined in this spec before we publish it.  I think it should be  
optional to actually _use_ the security mechanism, though since there  
some situations (such as closed or otherwise secured networks) where  
this type of security isn't required operationally.  The security  
considerations should make it clear what the risks are, and describe  
the situations in which it would be safe not to use the PRE-to-PAA  
security.

Alan, would that satisfy your concerns?  PANA folks, would that meet  
your needs?

Margaret





From weiler+secdir@watson.org  Mon Jan 10 08:46:41 2011
Return-Path: <weiler+secdir@watson.org>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 1ECA73A680B for <secdir@core3.amsl.com>; Mon, 10 Jan 2011 08:46:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.539
X-Spam-Level: 
X-Spam-Status: No, score=-2.539 tagged_above=-999 required=5 tests=[AWL=0.060,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Xch7mSgYvg4G for <secdir@core3.amsl.com>; Mon, 10 Jan 2011 08:46:40 -0800 (PST)
Received: from fledge.watson.org (fledge.watson.org [65.122.17.41]) by core3.amsl.com (Postfix) with ESMTP id E20BA3A67FA for <secdir@ietf.org>; Mon, 10 Jan 2011 08:46:39 -0800 (PST)
Received: from fledge.watson.org (localhost.watson.org [127.0.0.1]) by fledge.watson.org (8.14.4/8.14.4) with ESMTP id p0AGmrih075634 for <secdir@ietf.org>; Mon, 10 Jan 2011 11:48:53 -0500 (EST) (envelope-from weiler+secdir@watson.org)
Received: from localhost (weiler@localhost) by fledge.watson.org (8.14.4/8.14.4/Submit) with ESMTP id p0AGmrDc075631 for <secdir@ietf.org>; Mon, 10 Jan 2011 11:48:53 -0500 (EST) (envelope-from weiler+secdir@watson.org)
X-Authentication-Warning: fledge.watson.org: weiler owned process doing -bs
Date: Mon, 10 Jan 2011 11:48:53 -0500 (EST)
From: Samuel Weiler <weiler+secdir@watson.org>
X-X-Sender: weiler@fledge.watson.org
To: secdir@ietf.org
Message-ID: <alpine.BSF.2.00.1101101142110.72067@fledge.watson.org>
User-Agent: Alpine 2.00 (BSF 1167 2008-08-23)
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; format=flowed; charset=US-ASCII
X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.2.3 (fledge.watson.org [127.0.0.1]); Mon, 10 Jan 2011 11:48:53 -0500 (EST)
Subject: [secdir] Assignments
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: secdir-secretary@mit.edu
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 10 Jan 2011 16:46:41 -0000

Review instructions and related resources are at:
 	http://tools.ietf.org/area/sec/trac/wiki/SecDirReview

Stephen Kent is next in the rotation.

For telechat 2011-01-20

Reviewer                 LC end     Draft
Dave Cridland          T 2010-12-03 draft-ietf-sipcore-sec-flows-07
Barry Leiba            TR2010-12-16 draft-saintandre-tls-server-id-check-13
Stefan Santesson       T 2010-12-30 draft-ietf-roll-security-framework-03
Larry Zhu              T 2011-01-14 draft-ietf-6lowpan-hc-13

Last calls and special requests:

Derek Atkins             2011-01-18 draft-groves-sakke-00
Rob Austein              2010-12-15 draft-salowey-secsh-uri-00
Rob Austein              2011-01-06 draft-ietf-6man-prefixlen-p2p-01
Richard Barnes           2011-01-18 draft-ietf-isis-ieee-aq-03
Dave Cridland            2011-01-18 draft-ietf-isis-purge-tlv-05
Alan DeKok               2011-01-18 draft-ietf-isis-reg-purge-00
Donald Eastlake          2011-01-07 draft-ietf-l3vpn-mvpn-infra-addrs-02
Stephen Farrell          2011-01-06 draft-ietf-mmusic-image-attributes-10
Tobias Gondrom           -          draft-ietf-mptcp-architecture-03
Phillip Hallam-Baker     -          draft-ietf-mptcp-threat-06
Steve Hanna              2011-01-05 draft-ietf-multimob-pmipv6-base-solution-07
Dan Harkins              2011-01-18 draft-igoe-secsh-suiteb-02
Sam Hartman              2011-01-18 draft-turner-cms-symmetrickeypackage-algs-00
Paul Hoffman             2011-01-18 draft-turner-additional-new-asn-06
Love Hornquist-Astrand   2011-02-01 draft-yevstifeyev-tn3270-uri-12
Jeffrey Hutzelman        2011-01-18 draft-groves-eccsi-00
Scott Kelly              -          draft-ymbk-aplusp-08
David McGrew             -          draft-ietf-ecrit-framework-12
Russ Mundy               2011-01-04 draft-cardona-cablelabs-urn-05
Sandy Murphy             2011-01-03 draft-turner-sha0-sha1-seccon-02
Eric Rescorla            2011-01-07 draft-ietf-pce-inter-layer-req-15
Nico Williams            2011-01-14 draft-yevstifeyev-http-headers-not-recognized-11
Larry Zhu                2010-09-30 draft-lundberg-app-tei-xml-06
Glen Zorn                2011-01-18 draft-groves-mikey-sakke-00


From alper.yegin@yegin.org  Mon Jan 10 11:58:20 2011
Return-Path: <alper.yegin@yegin.org>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id CE81428C117; Mon, 10 Jan 2011 11:58:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -100.859
X-Spam-Level: 
X-Spam-Status: No, score=-100.859 tagged_above=-999 required=5 tests=[AWL=0.291, BAYES_00=-2.599, MSGID_MULTIPLE_AT=1.449, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nEgfEN2hOL0t; Mon, 10 Jan 2011 11:58:20 -0800 (PST)
Received: from mout.perfora.net (mout.perfora.net [74.208.4.194]) by core3.amsl.com (Postfix) with ESMTP id 13AD828C110; Mon, 10 Jan 2011 11:58:20 -0800 (PST)
Received: from ibm (dsl88-247-34762.ttnet.net.tr [88.247.135.202]) by mrelay.perfora.net (node=mrus3) with ESMTP (Nemesis) id 0M932L-1PSBBO2wt3-00CFvm; Mon, 10 Jan 2011 15:00:31 -0500
From: "Alper Yegin" <alper.yegin@yegin.org>
To: "'Margaret Wasserman'" <margaretw42@gmail.com>, "'Alan DeKok'" <aland@deployingradius.com>
References: <4D009D34.1020809@deployingradius.com> <4D01DABF.6060604@toshiba.co.jp> <001101cb9aa0$367b3480$a3719d80$@yegin@yegin.org> <4D064683.30009@deployingradius.com> <4D07A874.4010702@gridmerge.com> <4D07D090.9020407@deployingradius.com> <070601cba3ad$63852150$2a8f63f0$@yegin@yegin.org> <4D270D1D.8090006@deployingradius.com> <005f01cbb0b2$2bc21cc0$83465640$@yegin@yegin.org> <4D2AE752.2000504@deployingradius.com> <006001cbb0b7$da450050$8ecf00f0$@yegin@yegin.org> <4D2AF65C.6060903@deployingradius.com> <A5B8DC5E-C118-47CE-9419-2F73879A6430@gmail.com>
In-Reply-To: <A5B8DC5E-C118-47CE-9419-2F73879A6430@gmail.com>
Date: Mon, 10 Jan 2011 21:59:29 +0200
Message-ID: <010101cbb100$ecead380$c6c07a80$@yegin@yegin.org>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Office Outlook 12.0
Thread-Index: AcuwwaTIb/4A+U5fT3GmjFhBVvOXTgAPo5Kw
Content-Language: en-us
X-Provags-ID: V02:K0:b/VDN2plbSwZLBH8VzR/kZpOazowCauPzaA10qeoQda +esLQNt4mv1KU21R8Z7ZI7kIe90B9c9C7cxg/olGc14dlzPFqe EkwdbNtoMGERukISwAW6Pg1nZlW9AqDZyqZWUJWEsiqF0DkE+L sZdKou1avtdBBajtvfOcBk32ilQlRGsE6FATQWqh5drIHOayui rJ/KD2TV2gGs1RIY4v0Gz7q5hUYZuOyKa6SRfreqIQ=
Cc: secdir@ietf.org, paduffy@cisco.com, pana@ietf.org, robert.cragie@gridmerge.com, samitac@ipinfusion.com, 'Ralph Droms' <rdroms.ietf@gmail.com>
Subject: Re: [secdir] pana-relay security considerations
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 10 Jan 2011 19:58:20 -0000

> On Jan 10, 2011, at 7:06 AM, Alan DeKok wrote:
> >
> >> I think we shall stick to relying on PAA-PRE security.
> >
> >  Then it should be a MUST.

Security considerations section already says so:

	Some of the risks stemming from the aforementioned threats are 
	already handled by the EAP and PANA as described. The residual risks

	>>shall be<< mitigated using additional physical or cryptographic
security 
	in the network hosting the PREs and the PAAs.

> I originally thought that we needed some form of PRE-PAA security, and
> your comments have, IMO, suggested more reasons why this is needed.
> 
> In my opinion, a security mechanism for PRE-PAA authentication needs
> to be defined in this spec before we publish it.  

Continuing the modeling after DHCP, we could define use of IPsec (same way
RFC 3315 does).

> I think it should be
> optional to actually _use_ the security mechanism, though since there
> some situations (such as closed or otherwise secured networks) where
> this type of security isn't required operationally. 

Indeed.


>  The security
> considerations should make it clear what the risks are, and describe
> the situations in which it would be safe not to use the PRE-to-PAA
> security.
> 
> Alan, would that satisfy your concerns?  PANA folks, would that meet
> your needs?

Alper


From d3e3e3@gmail.com  Mon Jan 10 18:41:40 2011
Return-Path: <d3e3e3@gmail.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 1AF2F28C1BF; Mon, 10 Jan 2011 18:41:40 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -103.33
X-Spam-Level: 
X-Spam-Status: No, score=-103.33 tagged_above=-999 required=5 tests=[AWL=0.269, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 95zDZGUbrn3t; Mon, 10 Jan 2011 18:41:39 -0800 (PST)
Received: from mail-wy0-f172.google.com (mail-wy0-f172.google.com [74.125.82.172]) by core3.amsl.com (Postfix) with ESMTP id EA74728C1BE; Mon, 10 Jan 2011 18:41:38 -0800 (PST)
Received: by wyf23 with SMTP id 23so21123762wyf.31 for <multiple recipients>; Mon, 10 Jan 2011 18:43:53 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:mime-version:received:from:date :message-id:subject:to:content-type:content-transfer-encoding; bh=jgoH31Grr67FW/hG4FjYMNrRChDEYtDuyo64/KSaZbw=; b=ebDbTUqcGQowiWTUtYyNlwfzrwMKNF/avcSmAGBq+BAK7V2pQE10f0+6lL7YxJhWr9 7QtrVz+PgSKnKUT7aI1488azqiAnUyXRtNzy+p1/X3aK0X92m0in4jVSn5jkOxVeHhwn EqgiPNSXoMWK0TuV6+88HKvmjJlpRo6QL9u/0=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:from:date:message-id:subject:to:content-type :content-transfer-encoding; b=AFeqeT8m1XucnK+WNIb7MGeRLLu2Kc5zrK/F56YJOUBMBaZv7/r9OY1YO/vV0YC7Yk jVrIZgNeuZORnJC10mcjHLeUGCvt29FYgrrqBNVM/wEzHCG9x8p+HUtNVZ44Q5Pa+lv8 PeRUND+xicTYiCXQ7WItdZSmePRQi12jQBvkg=
Received: by 10.227.141.138 with SMTP id m10mr4282142wbu.66.1294713833727; Mon, 10 Jan 2011 18:43:53 -0800 (PST)
MIME-Version: 1.0
Received: by 10.227.61.81 with HTTP; Mon, 10 Jan 2011 18:43:33 -0800 (PST)
From: Donald Eastlake <d3e3e3@gmail.com>
Date: Mon, 10 Jan 2011 21:43:33 -0500
Message-ID: <AANLkTi=ZDc578pmEsqYFSaSOqPCuWw4RvuomoBoAOA22@mail.gmail.com>
To: iesg@ietf.org, secdir@ietf.org,  draft-ietf-l3vpn-mvpn-infra-addrs.all@tools.ietf.org
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
Subject: [secdir] SecDir Review of draft-ietf-l3vpn-mvpn-infra-addrs-02.txt
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 11 Jan 2011 02:41:40 -0000

I have reviewed this document as part of the security directorate's
ongoing effort to review all IETF documents being processed by the
IESG.  Document editors and WG chairs should treat these comments just
like any other last call comments.

This document appears to concern provider multicast routing using BGP
in the context of "Multicast in MPLS/BGP IP VPNs",
draft-ietf-l3vpn-2547bis-mcast, where the customer traffic and the
provider facilities may independently be IPv4 or IPv6. The type of
customer traffic is explicitly indicated and this draft primarily
provides for various field and message restrictions or, in other
cases, that the provider traffic type (IPv4 or IPv6) will be
determined explicitly from the length of the provider addresses, so as
to remove ambiguity. It is basically an encoding matter and does not
particularly seem to change the sensitivity of the messages involved.

It's Security Considerations simply points to
draft-ietf-l3vpn-2547bis-mcast-bgp-08.txt which is already in the RFC
Editor's queue. Considering the nature of the draft being reviewed,
that seems adequate.

Thanks,
Donald
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D
=A0Donald E. Eastlake 3rd=A0=A0 +1-508-333-2270 (cell)
=A0155 Beaver Street
=A0Milford, MA 01757 USA
=A0d3e3e3@gmail.com

From gnakibly@yahoo.com  Mon Jan 10 23:02:55 2011
Return-Path: <gnakibly@yahoo.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0162F3A69B7 for <secdir@core3.amsl.com>; Mon, 10 Jan 2011 23:02:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.299
X-Spam-Level: 
X-Spam-Status: No, score=-2.299 tagged_above=-999 required=5 tests=[AWL=0.300,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CODEmBJfAZde for <secdir@core3.amsl.com>; Mon, 10 Jan 2011 23:02:52 -0800 (PST)
Received: from nm25-vm0.bullet.mail.sp2.yahoo.com (nm25-vm0.bullet.mail.sp2.yahoo.com [98.139.91.228]) by core3.amsl.com (Postfix) with SMTP id 42A2E3A6765 for <secdir@ietf.org>; Mon, 10 Jan 2011 23:02:52 -0800 (PST)
Received: from [98.139.91.70] by nm25.bullet.mail.sp2.yahoo.com with NNFMP; 11 Jan 2011 07:05:05 -0000
Received: from [98.139.91.4] by tm10.bullet.mail.sp2.yahoo.com with NNFMP; 11 Jan 2011 07:05:05 -0000
Received: from [127.0.0.1] by omp1004.mail.sp2.yahoo.com with NNFMP; 11 Jan 2011 07:05:05 -0000
X-Yahoo-Newman-Property: ymail-3
X-Yahoo-Newman-Id: 908838.44534.bm@omp1004.mail.sp2.yahoo.com
Received: (qmail 25568 invoked by uid 60001); 11 Jan 2011 07:05:05 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1294729505; bh=3Tts7Tl0Kys5EzXbChwUzd/FBIrJqNXbj4hgodvG8ps=; h=Message-ID:X-YMail-OSG:Received:X-Mailer:References:Date:From:Subject:To:In-Reply-To:MIME-Version:Content-Type:Content-Transfer-Encoding; b=sgiFN5pTi1hiAiirxQsJsSJNSlDTxLdtjqq4MarmSxdbNmjtOUX3WfU+cv8N5TfkA0e0hxj8EDLzBEo//dEf0f9dSHk469fWFLcmDhE/2hTbJaecE38DWmBKPs50jj8JdlyFkowUw7sFEKEsLZ4LcuH0falywnv5FAqbziHidI0=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=Message-ID:X-YMail-OSG:Received:X-Mailer:References:Date:From:Subject:To:In-Reply-To:MIME-Version:Content-Type:Content-Transfer-Encoding; b=1c87KImWOTO/mkQqFDRtpx59HKjd50vr/9CJ4+0QtfSBoJ+D0783lcZtHgX6wIJF/JdpBQSHbjfRvQ0Yzma7/XH52plq+ZS3Z49HNinRZnrkStFn2DlrUVWOnUSnQ+rtJsfMzf26swbxJwF4RNh00zmK8KE8kajSlsI9mmk+wKQ=;
Message-ID: <774066.24552.qm@web45512.mail.sp1.yahoo.com>
X-YMail-OSG: GE1X5b0VM1kBUW0Ho.IGtrm7O4HMmuJbZQqUXWFlODvT4nb LwBKApDnE2pmgJ3n6WlztY2XFKftSHAbc5oxW2RfpxeFQldgJYJcfAfTvLdD Ix9j_Uw0.wPmjCF3Nfjm7WRl0sROQez9nQG8QWWdjre1jH7E3I2Oc_WC0ZO4 smxoQWRscBvpKG_WO3NJgCXbxKVuGch696AlwWyLxMZbwvgangs.0w20KWuY QoDdJdp9Fs95ep0PQzTRjcn40Z.mS45LoO23vsQVt6PeQi8nV97GQ5l1Gmf7 GNHgAsse2EwBehqJbj3o-
Received: from [93.172.151.94] by web45512.mail.sp1.yahoo.com via HTTP; Mon, 10 Jan 2011 23:05:05 PST
X-Mailer: YahooMailRC/553 YahooMailWebService/0.8.107.285259
References: <ldvhbdv29lz.fsf@cathode-dark-space.mit.edu>
Date: Mon, 10 Jan 2011 23:05:05 -0800 (PST)
From: Gabi Nakibly <gnakibly@yahoo.com>
To: Tom Yu <tlyu@MIT.EDU>, iesg@ietf.org, secdir@ietf.org, draft-ietf-v6ops-tunnel-loops.all@tools.ietf.org
In-Reply-To: <ldvhbdv29lz.fsf@cathode-dark-space.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable
Subject: Re: [secdir] secdir review of draft-ietf-v6ops-tunnel-loops-01
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 11 Jan 2011 07:02:55 -0000

Hi Tom,=0AThanks for the valuable input. See our reponse inline.=0A=0AFred =
and Gabi=0A=0A=0A=0A----- Original Message ----=0A> From: Tom Yu <tlyu@MIT.=
EDU>=0A> To: iesg@ietf.org; secdir@ietf.org; =0A>draft-ietf-v6ops-tunnel-lo=
ops.all@tools.ietf.org=0A> Sent: Thu, December 30, 2010 6:00:24 AM=0A> Subj=
ect: secdir review of draft-ietf-v6ops-tunnel-loops-01=0A> =0A> This docume=
nt describes routing loop vulnerabilities inherent in the=0A> existing desi=
gn of IPv6-in-IPv4 tunneling protocols, and suggests=0A> mitigation strateg=
ies.=0A> =0A> While the Security Considerations section of this document cl=
aims that=0A> the recommended checks do not introduce new security threats,=
 Section=0A> 3.1 mentions that the additional processing overhead for check=
ing=0A> destination and source addresses may be considerable.=A0 It would b=
e=0A> useful to have measurements or estimates of how this additional=0A> p=
rocessing overhead compares to the effects of the routing loop attack=0A> t=
hat it is intended to mitigate.=0A=0ASuch estimates will be added to the Se=
curity Considerations section.=0A=0A> =0A> This document makes no mention o=
f the Teredo attacks that are=0A> discussed in the USENIX WOOT paper.=A0 Th=
e authors may wish to mention=0A> draft-gont-6man-teredo-loops-00 for the s=
ake of completeness.=0A> =0A=0AWe will cite this draft.=0A=0A> Editorial:=
=0A> =0A> Section 3 lists three categories of mitigation measures but the=
=0A> accompanying text states that they fall under two categories.=0A> =0A>=
 In Section 3.1, in the sentence "However, this approach has some=0A> inher=
it limitations", replace "inherit" with "inherent".=0A> =0A> In Section 4, =
in the sentence "...other mitigation measures may be=0A> allowed is specifi=
c deployment scenarios", replace "may be allowed is"=0A> with "may be feasi=
ble in".=0A> =0A=0AAll these will be corrected.=0A=0A=0A=0A      

From new-work-bounces@ietf.org  Tue Jan 11 10:35:11 2011
Return-Path: <new-work-bounces@ietf.org>
X-Original-To: secdir@ietf.org
Delivered-To: secdir@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id EDF9E28C2C7; Tue, 11 Jan 2011 10:35:11 -0800 (PST)
X-Original-To: new-work@ietf.org
Delivered-To: new-work@core3.amsl.com
Received: by core3.amsl.com (Postfix, from userid 30) id 6ED7F28C274; Tue, 11 Jan 2011 10:35:11 -0800 (PST)
From: IESG Secretary <iesg-secretary@ietf.org>
To: new-work@ietf.org
Mime-Version: 1.0
Message-Id: <20110111183511.6ED7F28C274@core3.amsl.com>
Date: Tue, 11 Jan 2011 10:35:11 -0800 (PST)
X-BeenThere: new-work@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: new-work-bounces@ietf.org
Errors-To: new-work-bounces@ietf.org
X-Mailman-Approved-At: Wed, 12 Jan 2011 11:10:19 -0800
Subject: [secdir] [new-work] WG Review: Audio/Video Transport Payloads (payload)
X-BeenThere: secdir@ietf.org
Reply-To: iesg@ietf.org
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 11 Jan 2011 18:35:12 -0000

A new IETF working group has been proposed in the Real-Time Applications
and Infrastructure Area.  The IESG has not made any determination as yet.
The following draft charter was submitted, and is provided for
informational purposes only. Please send your comments to the IESG mailing
list (iesg@ietf.org) by Tuesday, January 18, 2011.               

Audio/Video Transport Payloads (payload)
-------------------------------------------
Current Status: Proposed Working Group
Last modified: 2010-12-03

Chairs: TBD

Real-Time Applications and Infrastructure Area Directors:
  Gonzalo Camarillo <gonzalo.camarillo@ericsson.com>
  Robert Sparks <rjsparks@nostrum.com>

Real-Time Applications and Infrastructure Area Advisor:
  Robert Sparks <rjsparks@nostrum.com>

Mailing Lists: TBD

Description of Working Group:

  The PAYLOAD working group is tasked with the specification and 
  maintenance of payload formats for use with the Real-Time Transport 
  Protocol, RTP [RFC3550]. The group will follow the guidelines 
  established in "Guidelines for Writers of RTP Payload Format 
  Specifications" [BCP 36], the "How to Write an RTP Payload Format" 
  (under development) and is responsible for maintaining those 
  guidelines.

  This working group will develop RTP payload formats for new media 
  codecs, review and revise existing payload formats to advance those 
  which are useful to Draft Standard or Standard, and declare others 
  Historic.

Goals and Milestones:
Dec 2010  Submit RTP Payload Format for MIDI for Proposed Standard
Feb 2011  Submit How to Write an RTP Payload Format for Informational
Feb 2011  Submit RTP Payload Format for MPEG-4 Audio/Visual Streams for 
          Proposed Standard
Mar 2011  Submit RTP Payload Format for EVBR/G.718 for Proposed Standard
Mar 2011  Submit RTP Payload Format for Enhanced Variable Rate 
          Narrowband-Wideband Codec (EVRC-NW) for Proposed Standard
Mar 2011  Submit RTP Payload Format for Bluetooth's SBC audio codec for 
          Proposed Standard
Apr 2011  Submit RTP Payload Format for MPEG2-TS preamble for Proposed 
          Standard
Apr 2011  Submit RTP Payload Format for DV (IEC 61834) Video for 
          Proposed Standard
Apr 2011  Submit RTP Payload Format for the iSAC codec for Proposed 
          Standard
Apr 2011  Submit RTP profile for the carriage of SMPTE 336M data for 
          Proposed Standard
Jun 2011  Submit RTP Payload Format for MVC Video for Proposed Standard

_______________________________________________
new-work mailing list
new-work@ietf.org
https://www.ietf.org/mailman/listinfo/new-work

From new-work-bounces@ietf.org  Tue Jan 11 10:38:18 2011
Return-Path: <new-work-bounces@ietf.org>
X-Original-To: secdir@ietf.org
Delivered-To: secdir@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id CCAE528C17D; Tue, 11 Jan 2011 10:38:18 -0800 (PST)
X-Original-To: new-work@ietf.org
Delivered-To: new-work@core3.amsl.com
Received: by core3.amsl.com (Postfix, from userid 30) id 84BA728B56A; Tue, 11 Jan 2011 10:38:17 -0800 (PST)
From: IESG Secretary <iesg-secretary@ietf.org>
To: new-work@ietf.org
Mime-Version: 1.0
Message-Id: <20110111183817.84BA728B56A@core3.amsl.com>
Date: Tue, 11 Jan 2011 10:38:17 -0800 (PST)
X-BeenThere: new-work@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: new-work-bounces@ietf.org
Errors-To: new-work-bounces@ietf.org
X-Mailman-Approved-At: Wed, 12 Jan 2011 11:10:19 -0800
Subject: [secdir] [new-work] WG Review: Metric Blocks for use with RTCP's Extended Report Framework (xrblock)
X-BeenThere: secdir@ietf.org
Reply-To: iesg@ietf.org
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 11 Jan 2011 18:38:18 -0000

A new IETF working group has been proposed in the Real-Time Applications
and Infrastructure Area.  The IESG has not made any determination as yet.
The following draft charter was submitted, and is provided for
informational purposes only. Please send your comments to the IESG mailing
list (iesg@ietf.org) by Tuesday, January 18, 2011.               

Metric Blocks for use with RTCP's Extended Report Framework (xrblock)
-------------------------------------------
Current Status: Proposed Working Group
Last modified: 2010-12-03

Chairs: TBD

Real-Time Applications and Infrastructure Area Directors:
  Gonzalo Camarillo <gonzalo.camarillo@ericsson.com>
  Robert Sparks <rjsparks@nostrum.com>

Real-Time Applications and Infrastructure Area Advisor:
  Robert Sparks <rjsparks@nostrum.com>

Mailing Lists: TBD

Description of Working Group:

RFC3611, "RTP Control Protocol Extended Reports (RTCP XR)" established
a framework to allow new information to be conveyed in RTCP, 
supplementing the original report blocks defined in RFC 3550, "RTP: A 
Transport Protocol for Real-Time Applications".

The XRBLOCK working group is chartered to work within this framework, 
evaluating proposals for report block definitions containing new 
metrics.  The group will follow the guidelines established in RFC5968, 
"Guidelines for Extending the RTP Control Protocol (RTCP)" and RTP 
Monitoring Architecture being developed in the RTPCORE working group.

Goals and Milestones:

Mar 2011  Submit RTCP XR Report Block for Measurement Identity
Mar 2011  Submit RTCP XR Report Block for Burst/Gap Discard metric 
          Reporting
Mar 2011  Submit RTCP XR Report Block for Burst/Gap Loss metric 
          Reporting
Jun 2011  Submit RTCP XR Report Block for Concealed Seconds metric 
          Reporting
Jun 2011  Submit RTCP XR Report Block for Delay metric Reporting
Jun 2011  Submit RTCP XR Report Block for Discard metric Reporting
Sep 2011  Submit RTCP XR Report Block for Jitter Buffer Metric Reporting
Sep 2011  Submit RTCP XR Report Block for Loss Concealment metric 
          Reporting
Sep 2011  Submit RTCP XR Report Block for Packet Delay Variation Metric 
          Reporting
Dec 2011  Submit RTCP XR Report Block for Run Length Encodings of 
          Discarded Packets
Dec 2011  Submit RTCP XR Report Block for QoE Metrics Reporting    
_______________________________________________
new-work mailing list
new-work@ietf.org
https://www.ietf.org/mailman/listinfo/new-work

From new-work-bounces@ietf.org  Tue Jan 11 10:42:36 2011
Return-Path: <new-work-bounces@ietf.org>
X-Original-To: secdir@ietf.org
Delivered-To: secdir@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A466228C2E7; Tue, 11 Jan 2011 10:42:36 -0800 (PST)
X-Original-To: new-work@ietf.org
Delivered-To: new-work@core3.amsl.com
Received: by core3.amsl.com (Postfix, from userid 30) id E16D528C287; Tue, 11 Jan 2011 10:42:35 -0800 (PST)
From: IESG Secretary <iesg-secretary@ietf.org>
To: new-work@ietf.org
Mime-Version: 1.0
Message-Id: <20110111184235.E16D528C287@core3.amsl.com>
Date: Tue, 11 Jan 2011 10:42:35 -0800 (PST)
X-BeenThere: new-work@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: new-work-bounces@ietf.org
Errors-To: new-work-bounces@ietf.org
X-Mailman-Approved-At: Wed, 12 Jan 2011 11:10:19 -0800
Subject: [secdir] [new-work] WG Review: Audio/Video Transport Core Maintenence	(avtcore)
X-BeenThere: secdir@ietf.org
Reply-To: iesg@ietf.org
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 11 Jan 2011 18:42:36 -0000

A new IETF working group has been proposed in the Real-Time Applications
and Infrastructure Area.  The IESG has not made any determination as yet.
The following draft charter was submitted, and is provided for
informational purposes only. Please send your comments to the IESG mailing
list (iesg@ietf.org) by Tuesday, January 18, 2011.               

Audio/Video Transport Core Maintenence (avtcore)
-------------------------------------------
Current Status: Proposed Working Group
Last modified: 2010-12-03

Chairs: TBD

Real-Time Applications and Infrastructure Area Directors:
  Gonzalo Camarillo <gonzalo.camarillo@ericsson.com>
  Robert Sparks <rjsparks@nostrum.com>

Real-Time Applications and Infrastructure Area Advisor:
  Robert Sparks <rjsparks@nostrum.com>

Mailing Lists: TBD

Description of Working Group:

The Real-time Transport Protocol, RTP, along with its associated 
profiles and payload formats provides for real-time transmission of 
audio and video over unicast and multicast transports.  RTP itself has 
been shepherded to Full Standard. Its associated profiles, extensions, 
and payload formats are currently at various levels of standards 
maturity. 

The AVTCORE working group is chartered to maintain the core RTP/RTCP 
protocols and the AVP, SAVP, AVPF, and SAVPF profiles. The group will 
provide architectural guidance for extending the protocols and 
guidelines for their proper use. While other working groups may be 
chartered to work on application-specific extensions to the protocols, 
extensions that are generally applicable will be developed in AVTCORE.

The AVTCORE working group will coordinate closely with the Security Area
while working on maintenance and enhancements to the SRTP Profile.

In addition to the milestones called out below, the AVTCORE working 
group's initial tasks will include completing any remaining work 
identified in those drafts from the AVT working group already in IESG 
Evaluation, with the exception of the Rapid Acquisition of Multicast RTP 
sessions, which will complete in the AVTEXT working group.

Goals and Milestones:
Dec 2010  Submit Guideline for Choosing RTCP CNAME as Proposed Standard
Dec 2010  Submit use of AES-192 and AES-256 in Secure RTP for Proposed 
          Standard
Dec 2010  Submit Port Mapping Between Unicast and Multicast RTP Sessions 
          for Proposed Standard
Dec 2010  Submit Real-Time Transport Control Protocol (RTCP) in Overlay 
          Multicast for Proposed Standard
Feb 2011  Submit Monitoring Architecture for RTP for Informational
Feb 2011  Guidelines for the use of Variable Bit Rate Audio with Secure 
          RTP as informational (or possibly BCP)
Apr 2011  Submit in band keying mechanism for SRTP draft for Proposed 
          Standard
Apr 2011  Submit Explicit Congestion Notification (ECN) for RTP over UDP 
          for Proposed Standard
May 2011  RTCP indication for retransmission suppression as proposed 
          standard
Sep 2011  Encryption of Header Extensions in the Secure Real-Time 
          Transport Protocol (SRTP) for Proposed Standard

_______________________________________________
new-work mailing list
new-work@ietf.org
https://www.ietf.org/mailman/listinfo/new-work

From new-work-bounces@ietf.org  Tue Jan 11 10:45:35 2011
Return-Path: <new-work-bounces@ietf.org>
X-Original-To: secdir@ietf.org
Delivered-To: secdir@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 72ECD28C300; Tue, 11 Jan 2011 10:45:35 -0800 (PST)
X-Original-To: new-work@ietf.org
Delivered-To: new-work@core3.amsl.com
Received: by core3.amsl.com (Postfix, from userid 30) id 0AE7928C2F7; Tue, 11 Jan 2011 10:45:33 -0800 (PST)
From: IESG Secretary <iesg-secretary@ietf.org>
To: new-work@ietf.org
Mime-Version: 1.0
Message-Id: <20110111184534.0AE7928C2F7@core3.amsl.com>
Date: Tue, 11 Jan 2011 10:45:34 -0800 (PST)
X-BeenThere: new-work@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: new-work-bounces@ietf.org
Errors-To: new-work-bounces@ietf.org
X-Mailman-Approved-At: Wed, 12 Jan 2011 11:10:19 -0800
Subject: [secdir] [new-work] WG Review: Audio/Video Transport Extensions (avtext)
X-BeenThere: secdir@ietf.org
Reply-To: iesg@ietf.org
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 11 Jan 2011 18:45:35 -0000

A new IETF working group has been proposed in the Real-Time Applications
and Infrastructure Area.  The IESG has not made any determination as yet.
The following draft charter was submitted, and is provided for
informational purposes only. Please send your comments to the IESG mailing
list (iesg@ietf.org) by Tuesday, January 18, 2011.               

Audio/Video Transport Extensions (avtext)
-------------------------------------------
Current Status: Proposed Working Group
Last modified: 2010-12-03

Chairs: TBD

Real-Time Applications and Infrastructure Area Directors:
  Gonzalo Camarillo <gonzalo.camarillo@ericsson.com>
  Robert Sparks <rjsparks@nostrum.com>

Real-Time Applications and Infrastructure Area Advisor:
  Robert Sparks <rjsparks@nostrum.com>

Mailing Lists: TBD

Description of Working Group:

  The Full-Standard Real-time Transport Protocol, RTP [RFC 3550], along 
  with its associated profiles and payload formats provides for real-
  time transmission of audio and video over unicast and multicast 
  transports. RTP is widely implemented, and deployed for a wide range 
  of applications, ranging from telephony to television over IP. As new 
  applications have emerged, the need for guidelines for the use of the 
  RTP/RTCP protocols and extensions specific to those applications 
  has been identified.

  The AVTEXT working group is charted to develop application-specific 
  guidelines for the use of RTP/RTCP protocols with the AVP, SAVP, 
  AVPF, and SAVPF profiles, and extensions to those protocols that are 
  driven by application-specific needs. Proposals for extensions with 
  general applicability to many different RTP/RTCP usages should be 
  taken to the AVTCORE working group. 

  The AVTEXT working group is constrained to use the protocol extension 
  mechanisms defined in the core protocols (such as RTP Header 
  extensions [RFC5285], AVPF Feedback Messages [RFC4585], and 
  SDES Items [RFC3550]). If new ways to extend the core protocols are 
  needed, they will be developed in the AVTCORE working group.

  In addition to the milestones called out below, the AVTEXT working 
  group's initial tasks will include completing any new work identified 
  during IESG evaluation for the Rapid Acquisition of Multicast RTP 
  Sessions.

Goals and Milestones:
Dec 2010  Submit Considerations for RAMS Scenarios for Informational
Oct 2011  Submit RTP Header extension for mixer to client audio level 
          indication as Proposed Standard
Oct 2011  Submit RTP Header extension for client to mixer audio level 
          indication as proposed standard
Dec 2011  Submit Support for multiple clock rates in an RTP session for 
          Proposed Standard
Dec 2011  Submit SRTP Store-and-Forward Use Cases and Requirements for 
          Informational
Dec 2011  Submit Use of the Secure Real-time Transport Protocol (SRTP) 
          in Store-and-Forward Applications for Proposed Standard

_______________________________________________
new-work mailing list
new-work@ietf.org
https://www.ietf.org/mailman/listinfo/new-work

From stephen.farrell@cs.tcd.ie  Thu Jan 13 03:50:17 2011
Return-Path: <stephen.farrell@cs.tcd.ie>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 28B0C3A6AAA; Thu, 13 Jan 2011 03:50:17 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -103.256
X-Spam-Level: 
X-Spam-Status: No, score=-103.256 tagged_above=-999 required=5 tests=[AWL=-0.657, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id G0KJAP8RgO-V; Thu, 13 Jan 2011 03:50:16 -0800 (PST)
Received: from scss.tcd.ie (hermes.cs.tcd.ie [IPv6:2001:770:10:200:21b:21ff:fe3a:3d50]) by core3.amsl.com (Postfix) with ESMTP id F14F23A6A9B; Thu, 13 Jan 2011 03:50:14 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by hermes.scss.tcd.ie (Postfix) with ESMTP id 4341C3E4082; Thu, 13 Jan 2011 11:52:35 +0000 (GMT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cs.tcd.ie; h= content-transfer-encoding:content-type:subject:mime-version :user-agent:from:date:message-id:received:received: x-virus-scanned; s=cs; t=1294919555; bh=7mle47ZpEcFMu6nw+Uy2RER4 IpqNRstjuYoji1U6M7M=; b=iEFgHYBHDd8cK/JmEVO2Jktq2FdYyQa7a3SNS42H eyRn7i0+DYziqnM9iS6R8DjIlESQGSFTO2aTfHTb4bpVY7XCuj3X9A68PNC3Li0Y OPv0KGtKS3/U9Mqk/Lz8ivZm5Q6UdEz1xONOVs5MfpdQW15ciMh4BNS3E05tN9kM 4lWmC+uupG292UADAoE00W1L7XR5OtvMWOw2WCd/EkTtHCehKdqxiVzaWbpGpk1Y mzGr0lZwlXdr/RUaum19Y+Ui0p2PCSlwzdFqKnTmNVsrlSL6swT4mK2kgJonHfEx lXWHIDloL+9zFEs6kmHKGza2DlPf1uyZaZYAqft2A7xUYg==
X-Virus-Scanned: Debian amavisd-new at scss.tcd.ie
Received: from scss.tcd.ie ([127.0.0.1]) by localhost (scss.tcd.ie [127.0.0.1]) (amavisd-new, port 10027) with ESMTP id 8Z6lBcUpXhR3; Thu, 13 Jan 2011 11:52:35 +0000 (GMT)
Received: from [134.226.36.137] (stephen-samy.dsg.cs.tcd.ie [134.226.36.137]) by smtp.scss.tcd.ie (Postfix) with ESMTPSA id DD0E53E4075; Thu, 13 Jan 2011 11:52:33 +0000 (GMT)
Message-ID: <4D2EE782.3010801@cs.tcd.ie>
Date: Thu, 13 Jan 2011 11:52:34 +0000
From: Stephen Farrell <stephen.farrell@cs.tcd.ie>
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.2.13) Gecko/20101208 Lightning/1.0b2 Thunderbird/3.1.7
MIME-Version: 1.0
To: iesg@ietf.org, secdir@ietf.org,  draft-ietf-mmusic-image-attributes.all@tools.ietf.org
X-Enigmail-Version: 1.1.1
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
Subject: [secdir]  SecDir Review ofdraft-ietf-mmusic-image-attributes
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 13 Jan 2011 11:50:17 -0000

I have reviewed this document as part of the security directorate's
ongoing effort to review all IETF documents being processed by the
IESG.  Document editors and WG chairs should treat these comments just
like any other last call comments.

This draft defines a way to ask a sender to use different image
attributes using SDP.

The security considerations says that this doesn't change anything,
but I don't quite agree. A requestor could (accidentally or on
purpose) as for some very large image size or for some kind
of transformation that puts a lot of load on a transcoder, and
that could be part of some DoS attack. (I've actually seen this
bug triggered accidentally in a real system that did more or
less this.)

I'd suggest adding a paragraph to the security considerations
saying that implementations should be wary of this and could
include some sanity checking of inputs or could try to detect
cases where lots of resources are being used and then handle that
somehow. I don't know how that'd be best done, nor whether any
of that should use 2119 type language, but I assume the authors
can figure that out.

Stephen.


From kyunghun.jung@samsung.com  Thu Jan 13 05:31:55 2011
Return-Path: <kyunghun.jung@samsung.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3C7D33A6B88 for <secdir@core3.amsl.com>; Thu, 13 Jan 2011 05:31:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.147
X-Spam-Level: *
X-Spam-Status: No, score=1.147 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, CHARSET_FARAWAY_HEADER=3.2, HTML_MESSAGE=0.001, MIME_8BIT_HEADER=0.3, MIME_BASE64_BLANKS=0.041, MIME_BASE64_TEXT=1.753, MIME_HTML_ONLY=1.457, RCVD_IN_DNSWL_MED=-4, RELAY_IS_203=0.994]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nhz4Y+qsvUnu for <secdir@core3.amsl.com>; Thu, 13 Jan 2011 05:31:54 -0800 (PST)
Received: from mailout3.samsung.com (mailout3.samsung.com [203.254.224.33]) by core3.amsl.com (Postfix) with ESMTP id 2C5F13A6AAB for <secdir@ietf.org>; Thu, 13 Jan 2011 05:31:54 -0800 (PST)
Received: from epms1.samsung.com (mailout3.samsung.com [203.254.224.33]) by mailout3.samsung.com (Oracle Communications Messaging Exchange Server 7u4-19.01 64bit (built Sep 7 2010)) with ESMTP id <0LEY00E3YR03GD50@mailout3.samsung.com> for secdir@ietf.org; Thu, 13 Jan 2011 22:33:39 +0900 (KST)
Received: from epv6spt1 ("port 21683"@[203.254.225.172]) by ms1.samsung.com (Oracle Communications Messaging Exchange Server 7u4-19.01 64bit (built Sep 7 2010)) with ESMTP id <0LEY00IYJR029Q40@ms1.samsung.com> for secdir@ietf.org; Thu, 13 Jan 2011 22:33:39 +0900 (KST)
Message-id: <0LEY00IYRR039Q40@ms1.samsung.com>
Date: Thu, 13 Jan 2011 13:33:39 +0000 (GMT)
From: =?euc-kr?B?waSw5sjG?= <kyunghun.jung@samsung.com>
To: Stephen Farrell <stephen.farrell@cs.tcd.ie>, "iesg@ietf.org" <iesg@ietf.org>, "secdir@ietf.org" <secdir@ietf.org>, "draft-ietf-mmusic-image-attributes.all@tools.ietf.org" <draft-ietf-mmusic-image-attributes.all@tools.ietf.org>
MIME-version: 1.0
X-MTR: 20110113131535653@kyunghun.jung
Msgkey: 20110113131535653@kyunghun.jung
X-EPLocale: ko_KR.euc-kr
X-Priority: 3
X-EPWebmail-Msg-Type: personal
X-EPWebmail-Reply-Demand: 0
X-EPApproval-Locale: 
X-EPHeader: ML
X-EPTrCode: 
X-EPTrName: 
X-MLAttribute: 
X-RootMTR: 20110113131535653@kyunghun.jung
X-ParentMTR: 
MIME-version: 1.0
Content-type: text/html; charset=euc-kr
Content-transfer-encoding: base64
X-Generator: Namo ActiveSquare 7 7.0.0.44
X-Mailman-Approved-At: Thu, 13 Jan 2011 07:21:34 -0800
Subject: Re: [secdir] SecDir Review ofdraft-ietf-mmusic-image-attributes
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: kyunghun.jung@samsung.com
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 13 Jan 2011 13:31:55 -0000
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From jpv@cisco.com  Thu Jan 13 06:37:08 2011
Return-Path: <jpv@cisco.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A3EE428C0F8; Thu, 13 Jan 2011 06:37:08 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -110.394
X-Spam-Level: 
X-Spam-Status: No, score=-110.394 tagged_above=-999 required=5 tests=[AWL=0.204, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6JG1Sb3ebGcf; Thu, 13 Jan 2011 06:37:07 -0800 (PST)
Received: from sj-iport-5.cisco.com (sj-iport-5.cisco.com [171.68.10.87]) by core3.amsl.com (Postfix) with ESMTP id 8015E28C0DB; Thu, 13 Jan 2011 06:37:07 -0800 (PST)
Authentication-Results: sj-iport-5.cisco.com; dkim=neutral (message not signed) header.i=none
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AvsEABedLk2rR7Ht/2dsb2JhbACkR3OkEphignSCWASLEIMo
Received: from sj-core-1.cisco.com ([171.71.177.237]) by sj-iport-5.cisco.com with ESMTP; 13 Jan 2011 14:39:30 +0000
Received: from xbh-ams-101.cisco.com (xbh-ams-101.cisco.com [144.254.74.71]) by sj-core-1.cisco.com (8.13.8/8.14.3) with ESMTP id p0DEdPR2018091; Thu, 13 Jan 2011 14:39:29 GMT
Received: from xfe-ams-101.cisco.com ([144.254.231.93]) by xbh-ams-101.cisco.com with Microsoft SMTPSVC(6.0.3790.4675);  Thu, 13 Jan 2011 15:39:23 +0100
Received: from dhcp-lyon-144-254-54-119.cisco.com ([144.254.54.119]) by xfe-ams-101.cisco.com with Microsoft SMTPSVC(6.0.3790.4675);  Thu, 13 Jan 2011 15:39:22 +0100
Mime-Version: 1.0 (Apple Message framework v1082)
Content-Type: multipart/alternative; boundary=Apple-Mail-76-942261511
From: JP Vasseur <jpv@cisco.com>
In-Reply-To: <123DE172-C230-4A8E-81A8-2B60D9E6AD92@cisco.com>
Date: Thu, 13 Jan 2011 15:39:17 +0100
Message-Id: <6C8230FE-0DC4-461A-8549-A7127DDDEB01@cisco.com>
References: <123DE172-C230-4A8E-81A8-2B60D9E6AD92@cisco.com>
To: Joseph Salowey (jsalowey) <jsalowey@cisco.com>
X-Mailer: Apple Mail (2.1082)
X-OriginalArrivalTime: 13 Jan 2011 14:39:22.0960 (UTC) FILETIME=[AB568500:01CBB32F]
X-Mailman-Approved-At: Thu, 13 Jan 2011 07:21:34 -0800
Cc: draft-ietf-roll-routing-metrics.all@tools.ietf.org, The IESG <iesg@ietf.org>, secdir@ietf.org
Subject: Re: [secdir] secdir review of draft-ietf-roll-routing-metrics-14
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 13 Jan 2011 14:37:08 -0000

--Apple-Mail-76-942261511
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

Dear Joseph,

Thanks for your review.

On Jan 6, 2011, at 11:42 PM, Joseph Salowey (jsalowey) wrote:

> I have reviewed this document as part of the security directorate's
> ongoing effort to review all IETF documents being processed by the
> IESG.  These comments were written primarily for the benefit of the
> security area directors.  Document editors and WG chairs should treat
> these comments just like any other last call comments.
>=20
> In general I think the document is clear.  I have one security related =
issue.  The security considerations mention attacks where the metric =
information is manipulated to cause problems.  I think there may also be =
cases where disclosure of some of the metric information may be an =
issue.  the main area of concern for me is the node energy metric.  This =
information may be useful to an attacker to determine which devices to =
attack with out-of-band or in-band attacks involving energy draining.   =
I have not had a chance to see if the RPL protects the confidentiality =
of these attributes.  If this is a concern in a deployment environment =
then the usage of these attributes may be limited.   I think it is =
probably worth mentioning this in the security considerations.
>=20
>=20
JP> This is a very good point. How about adding the following:=20

"Some routing metrics may also be used to identify some areas of =
weaknesses in the network (a highly unreliable links, a node running low =
in terms of energy, ...): such information may be used by a potential =
attacker. Thus it is RECOMMENDED to carefully consider which metrics =
should be used by RPL and the level of visibility that they provide =
about the network state or to use appropriate the security measures as =
specified in draft-ietf-roll-rpl to protect that information."
> Also energy metric introduce a new vector into the system for an =
attacker to modify routing behavior.  An attacker can purposely attempt =
to modify the stored energy in a node to modify the metrics advertised. =20=

>=20
JP> Right but this is also true for other metrics, this is why we made a =
recommendation to stop advertising metrics for unstable links, which =
should address your point. It is a generally accepted feature of routing =
security that it is not possible to protect against subverted routers. =
That is, a router that can be made to lie is a significant security risk =
and the protection must be physical or in the management system access, =
not in the routing protocol. Modifying the stored energy in a router =
constitutes a physical attack on the router (i.e. subversion) and would, =
of course, modify the router's ability to forward data. Thus, the =
routing protocol would be correct to notify the rest of the network of =
the revised state of power in the router and this would affect how =
packets are routed.
> Its not clear to me at this point if this is significant since the =
power drain may have effect on metrics and routing beyond what is =
advertised and it seems the recommendation to protect against unstable =
links would be effective in this case as well. =20
>=20
>=20
Exactly.

Thanks a lot.

Cheers.

JP.
> Cheers,
>=20
> Joe
>=20


--Apple-Mail-76-942261511
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=us-ascii

<html><head></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space; ">Dear =
Joseph,<div><br></div><div>Thanks for your =
review.<br><div><br><div><div>On Jan 6, 2011, at 11:42 PM, Joseph =
Salowey (jsalowey) wrote:</div><br =
class=3D"Apple-interchange-newline"><blockquote type=3D"cite">
<div>
<!-- Converted from text/plain format --><p><font size=3D"2">I have =
reviewed this document as part of the security directorate's<br>
ongoing effort to review all IETF documents being processed by the<br>
IESG.&nbsp; These comments were written primarily for the benefit of =
the<br>
security area directors.&nbsp; Document editors and WG chairs should =
treat<br>
these comments just like any other last call comments.<br>
<br>
In general I think the document is clear.&nbsp; I have one security =
related issue.&nbsp; The security considerations mention attacks where =
the metric information is manipulated to cause problems.&nbsp; I think =
there may also be cases where disclosure of some of the metric =
information may be an issue.&nbsp; the main area of concern for me is =
the node energy metric.&nbsp; This information may be useful to an =
attacker to determine which devices to attack with out-of-band or =
in-band attacks involving energy draining.&nbsp;&nbsp; I have not had a =
chance to see if the RPL protects the confidentiality of these =
attributes.&nbsp; If this is a concern in a deployment environment then =
the usage of these attributes may be limited.&nbsp;&nbsp; I think it is =
probably worth mentioning this in the security considerations.<br>
<br></font></p></div></blockquote><div>JP&gt; This is a very good point. =
How about adding the following:&nbsp;</div><div><br></div><div><i>"Some =
routing metrics may also be used to identify some areas of weaknesses in =
the network (a highly unreliable links, a node running low in terms of =
energy, ...): such information may be used by a potential attacker. Thus =
it is RECOMMENDED to carefully consider which metrics should be used by =
RPL and the level of visibility that they provide about the network =
state or to use appropriate the security measures as specified in =
draft-ietf-roll-rpl to protect that information."</i></div><blockquote =
type=3D"cite"><div><p><font size=3D"2">
Also energy metric introduce a new vector into the system for an =
attacker to modify routing behavior.&nbsp; An attacker can purposely =
attempt to modify the stored energy in a node to modify the metrics =
advertised.&nbsp;&nbsp; </font></p></div></blockquote><div>JP&gt; Right =
but this is also true for other metrics, this is why we made a =
recommendation to stop advertising metrics for unstable links, which =
should address your point.&nbsp;It is a generally accepted feature of =
routing security that it is not possible to protect against subverted =
routers. That is, a router that can be made to lie is a significant =
security risk and the protection must be physical or in the management =
system access, not in the routing protocol. Modifying the stored energy =
in a router constitutes a physical attack on the router (i.e. =
subversion) and would, of course, modify the router's ability to forward =
data. Thus, the routing protocol would be correct to notify the rest of =
the network of the revised state of power in the router and this would =
affect how packets are routed.</div><blockquote =
type=3D"cite"><div><p><font size=3D"2">Its not clear to me at this point =
if this is significant since the power drain may have effect on metrics =
and routing beyond what is advertised and it seems the recommendation to =
protect against unstable links would be effective in this case as =
well.&nbsp;&nbsp;<br>
=
<br></font></p></div></blockquote><div>Exactly.</div><div><br></div><div>T=
hanks a =
lot.</div><div><br></div><div>Cheers.</div><div><br></div><div>JP.</div><b=
lockquote type=3D"cite"><div><p><font size=3D"2">
Cheers,<br>
<br>
Joe<br>
</font>
</p>

</div>
</blockquote></div><br></div>
</div>


</body></html>=

--Apple-Mail-76-942261511--

From Adrian.Farrel@huawei.com  Thu Jan 13 08:06:51 2011
Return-Path: <Adrian.Farrel@huawei.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 32CF13A6BA0; Thu, 13 Jan 2011 08:06:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -103.567
X-Spam-Level: 
X-Spam-Status: No, score=-103.567 tagged_above=-999 required=5 tests=[AWL=-0.969, BAYES_00=-2.599, HTML_MESSAGE=0.001, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cBhCuuKnhJBD; Thu, 13 Jan 2011 08:06:49 -0800 (PST)
Received: from usaga01-in.huawei.com (usaga01-in.huawei.com [206.16.17.211]) by core3.amsl.com (Postfix) with ESMTP id CC4953A6BB4; Thu, 13 Jan 2011 08:06:49 -0800 (PST)
Received: from huawei.com (usaga01-in [172.18.4.6]) by usaga01-in.huawei.com (iPlanet Messaging Server 5.2 HotFix 2.14 (built Aug 8 2006)) with ESMTP id <0LEY00LZNY7CO2@usaga01-in.huawei.com>; Thu, 13 Jan 2011 08:09:12 -0800 (PST)
Received: from 950129200 (dsl-sp-81-140-15-32.in-addr.broadbandscope.com [81.140.15.32]) by usaga01-in.huawei.com (iPlanet Messaging Server 5.2 HotFix 2.14 (built Aug  8 2006)) with ESMTPA id <0LEY00F4YY7885@usaga01-in.huawei.com>; Thu, 13 Jan 2011 08:09:12 -0800 (PST)
Date: Thu, 13 Jan 2011 16:09:08 +0000
From: Adrian Farrel <Adrian.Farrel@huawei.com>
In-reply-to: <6C8230FE-0DC4-461A-8549-A7127DDDEB01@cisco.com>
To: 'JP Vasseur' <jpv@cisco.com>, "'Joseph Salowey (jsalowey)'" <jsalowey@cisco.com>
Message-id: <040401cbb33c$37262ed0$a5728c70$@huawei.com>
MIME-version: 1.0
X-Mailer: Microsoft Outlook 14.0
Content-type: multipart/alternative; boundary="Boundary_(ID_vF0svZAZe4m8D2EcK+tEfA)"
Content-language: en-gb
Thread-index: AQLGyxyKgkV2GhAribjZa9D4bCr9wQFqc1ySkc2OR5A=
iPlanet-SMTP-Warning: Lines longer than SMTP allows found and truncated.
References: <123DE172-C230-4A8E-81A8-2B60D9E6AD92@cisco.com> <6C8230FE-0DC4-461A-8549-A7127DDDEB01@cisco.com>
Cc: secdir@ietf.org, 'The IESG' <iesg@ietf.org>, draft-ietf-roll-routing-metrics.all@tools.ietf.org
Subject: Re: [secdir] secdir review of draft-ietf-roll-routing-metrics-14
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: Adrian.Farrel@huawei.com
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 13 Jan 2011 16:06:51 -0000

This is a multipart message in MIME format.

--Boundary_(ID_vF0svZAZe4m8D2EcK+tEfA)
Content-type: text/plain; charset=us-ascii
Content-transfer-encoding: 7BIT

I added an RFC note capturing this text (translated into English ;-) and put it
on the agenda for the IESG on 1/20 (ballot had already been issued).
 
Adrian
 
From: iesg-bounces@ietf.org [mailto:iesg-bounces@ietf.org] On Behalf Of JP
Vasseur
Sent: 13 January 2011 14:39
To: Joseph Salowey (jsalowey)
Cc: draft-ietf-roll-routing-metrics.all@tools.ietf.org; The IESG;
secdir@ietf.org
Subject: Re: secdir review of draft-ietf-roll-routing-metrics-14
 
Dear Joseph,
 
Thanks for your review.
 
On Jan 6, 2011, at 11:42 PM, Joseph Salowey (jsalowey) wrote:



I have reviewed this document as part of the security directorate's
ongoing effort to review all IETF documents being processed by the
IESG.  These comments were written primarily for the benefit of the
security area directors.  Document editors and WG chairs should treat
these comments just like any other last call comments.

In general I think the document is clear.  I have one security related issue.
The security considerations mention attacks where the metric information is
manipulated to cause problems.  I think there may also be cases where disclosure
of some of the metric information may be an issue.  the main area of concern for
me is the node energy metric.  This information may be useful to an attacker to
determine which devices to attack with out-of-band or in-band attacks involving
energy draining.   I have not had a chance to see if the RPL protects the
confidentiality of these attributes.  If this is a concern in a deployment
environment then the usage of these attributes may be limited.   I think it is
probably worth mentioning this in the security considerations.
JP> This is a very good point. How about adding the following: 
 
"Some routing metrics may also be used to identify some areas of weaknesses in
the network (a highly unreliable links, a node running low in terms of energy,
...): such information may be used by a potential attacker. Thus it is
RECOMMENDED to carefully consider which metrics should be used by RPL and the
level of visibility that they provide about the network state or to use
appropriate the security measures as specified in draft-ietf-roll-rpl to protect
that information."
Also energy metric introduce a new vector into the system for an attacker to
modify routing behavior.  An attacker can purposely attempt to modify the stored
energy in a node to modify the metrics advertised.   
JP> Right but this is also true for other metrics, this is why we made a
recommendation to stop advertising metrics for unstable links, which should
address your point. It is a generally accepted feature of routing security that
it is not possible to protect against subverted routers. That is, a router that
can be made to lie is a significant security risk and the protection must be
physical or in the management system access, not in the routing protocol.
Modifying the stored energy in a router constitutes a physical attack on the
router (i.e. subversion) and would, of course, modify the router's ability to
forward data. Thus, the routing protocol would be correct to notify the rest of
the network of the revised state of power in the router and this would affect
how packets are routed.
Its not clear to me at this point if this is significant since the power drain
may have effect on metrics and routing beyond what is advertised and it seems
the recommendation to protect against unstable links would be effective in this
case as well.  
Exactly.
 
Thanks a lot.
 
Cheers.
 
JP.
Cheers,

Joe
 

--Boundary_(ID_vF0svZAZe4m8D2EcK+tEfA)
Content-type: text/html; charset=us-ascii
Content-transfer-encoding: 7BIT

<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40"><head><meta http-equiv=Content-Type content="text/html; charset=us-ascii"><meta name=ProgId content=Word.Document><meta name=Generator content="Microsoft Word 14"><meta name=Originator content="Microsoft Word 14"><link rel=File-List href="cid:filelist.xml@01CBB33C.32AF9AD0"><!--[if gte mso 9]><xml>
<o:OfficeDocumentSettings>
<o:AllowPNG/>
</o:OfficeDocumentSettings>
</xml><![endif]--><!--[if gte mso 9]><xml>
<w:WordDocument>
<w:SpellingState>Clean</w:SpellingState>
<w:TrackMoves/>
<w:TrackFormatting/>
<w:EnvelopeVis/>
<w:ValidateAgainstSchemas/>
<w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
<w:IgnoreMixedContent>false</w:IgnoreMixedContent>
<w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
<w:DoNotPromoteQF/>
<w:LidThemeOther>EN-GB</w:LidThemeOther>
<w:LidThemeAsian>X-NONE</w:LidThemeAsian>
<w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript>
<w:Compatibility>
<w:DoNotExpandShiftReturn/>
<w:BreakWrappedTables/>
<w:SplitPgBreakAndParaMark/>
<w:EnableOpenTypeKerning/>
</w:Compatibility>
<m:mathPr>
<m:mathFont m:val="Cambria Math"/>
<m:brkBin m:val="before"/>
<m:brkBinSub m:val="&#45;-"/>
<m:smallFrac m:val="off"/>
<m:dispDef/>
<m:lMargin m:val="0"/>
<m:rMargin m:val="0"/>
<m:defJc m:val="centerGroup"/>
<m:wrapIndent m:val="1440"/>
<m:intLim m:val="subSup"/>
<m:naryLim m:val="undOvr"/>
</m:mathPr></w:WordDocument>
</xml><![endif]--><!--[if gte mso 9]><xml>
<w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true" DefSemiHidden="true" DefQFormat="false" DefPriority="99" LatentStyleCount="267">
<w:LsdException Locked="false" Priority="0" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Normal"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="heading 1"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9"/>
<w:LsdException Locked="false" Priority="39" Name="toc 1"/>
<w:LsdException Locked="false" Priority="39" Name="toc 2"/>
<w:LsdException Locked="false" Priority="39" Name="toc 3"/>
<w:LsdException Locked="false" Priority="39" Name="toc 4"/>
<w:LsdException Locked="false" Priority="39" Name="toc 5"/>
<w:LsdException Locked="false" Priority="39" Name="toc 6"/>
<w:LsdException Locked="false" Priority="39" Name="toc 7"/>
<w:LsdException Locked="false" Priority="39" Name="toc 8"/>
<w:LsdException Locked="false" Priority="39" Name="toc 9"/>
<w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption"/>
<w:LsdException Locked="false" Priority="10" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Title"/>
<w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font"/>
<w:LsdException Locked="false" Priority="11" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Subtitle"/>
<w:LsdException Locked="false" Priority="22" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Strong"/>
<w:LsdException Locked="false" Priority="20" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Emphasis"/>
<w:LsdException Locked="false" Priority="59" SemiHidden="false" UnhideWhenUsed="false" Name="Table Grid"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text"/>
<w:LsdException Locked="false" Priority="1" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="No Spacing"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 1"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 1"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 1"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 1"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision"/>
<w:LsdException Locked="false" Priority="34" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="List Paragraph"/>
<w:LsdException Locked="false" Priority="29" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Quote"/>
<w:LsdException Locked="false" Priority="30" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Intense Quote"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 1"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 1"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 1"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 1"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 1"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 2"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 2"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 2"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 2"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 2"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 2"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 2"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 2"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 3"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 3"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 3"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 3"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 3"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 3"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 3"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 3"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 3"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 4"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 4"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 4"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 4"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 4"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 4"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 4"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 4"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 4"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 5"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 5"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 5"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 5"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 5"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 5"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 5"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 5"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 5"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 6"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 6"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 6"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 6"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 6"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 6"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 6"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 6"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 6"/>
<w:LsdException Locked="false" Priority="19" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis"/>
<w:LsdException Locked="false" Priority="21" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis"/>
<w:LsdException Locked="false" Priority="31" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference"/>
<w:LsdException Locked="false" Priority="32" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Intense Reference"/>
<w:LsdException Locked="false" Priority="33" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Book Title"/>
<w:LsdException Locked="false" Priority="37" Name="Bibliography"/>
<w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading"/>
</w:LatentStyles>
</xml><![endif]--><style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;
	mso-font-charset:0;
	mso-generic-font-family:swiss;
	mso-font-pitch:variable;
	mso-font-signature:-520092929 1073786111 9 0 415 0;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;
	mso-font-charset:0;
	mso-generic-font-family:swiss;
	mso-font-pitch:variable;
	mso-font-signature:-520081665 -1073717157 41 0 66047 0;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{mso-style-unhide:no;
	mso-style-qformat:yes;
	mso-style-parent:"";
	margin:0cm;
	margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";
	mso-fareast-font-family:Calibri;}
a:link, span.MsoHyperlink
	{mso-style-noshow:yes;
	mso-style-priority:99;
	color:blue;
	text-decoration:underline;
	text-underline:single;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-noshow:yes;
	mso-style-priority:99;
	color:purple;
	text-decoration:underline;
	text-underline:single;}
p
	{mso-style-noshow:yes;
	mso-style-priority:99;
	mso-margin-top-alt:auto;
	margin-right:0cm;
	mso-margin-bottom-alt:auto;
	margin-left:0cm;
	mso-pagination:widow-orphan;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";
	mso-fareast-font-family:Calibri;}
span.EmailStyle18
	{mso-style-type:personal-reply;
	mso-style-noshow:yes;
	mso-style-unhide:no;
	mso-ansi-font-size:11.0pt;
	mso-bidi-font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	mso-ascii-font-family:Calibri;
	mso-fareast-font-family:Calibri;
	mso-hansi-font-family:Calibri;
	mso-bidi-font-family:"Times New Roman";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	mso-default-props:yes;
	font-size:10.0pt;
	mso-ansi-font-size:10.0pt;
	mso-bidi-font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;
	mso-header-margin:36.0pt;
	mso-footer-margin:36.0pt;
	mso-paper-source:0;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 10]><style>/* Style Definitions */
table.MsoNormalTable
	{mso-style-name:"Table Normal";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-priority:99;
	mso-style-parent:"";
	mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
	mso-para-margin:0cm;
	mso-para-margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:10.0pt;
	font-family:"Times New Roman","serif";}
</style><![endif]--><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]--></head><body lang=EN-GB link=blue vlink=purple style='tab-interval:36.0pt'><div class=WordSection1><p class=MsoNormal><span style='font-size:11.0pt;font-family:"Calibri","sans-serif";mso-bidi-font-family:"Times New Roman";color:#1F497D'>I added an RFC note capturing this text (translated into English ;-) and put it on the agenda for the IESG on 1/20 (ballot had already been issued).<o:p></o:p></span></p><p class=MsoNormal><span style='font-size:11.0pt;font-family:"Calibri","sans-serif";mso-bidi-font-family:"Times New Roman";color:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=MsoNormal><span style='font-size:11.0pt;font-family:"Calibri","sans-serif";mso-bidi-font-family:"Times New Roman";color:#1F497D'>Adrian<o:p></o:p></span></p><p class=MsoNormal><span style='font-size:11.0pt;font-family:"Calibri","sans-serif";mso-bidi-font-family:"Times New Roman";color:#1F497D'><o:p>&nbsp;</o:p></span></p><div style='border:none;border-left:solid blue 1.5p
 t;paddin
><div style='border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm 0cm 0cm'><p class=MsoNormal><b><span lang=EN-US style='font-size:10.0pt;font-family:"Tahoma","sans-serif";mso-fareast-font-family:"Times New Roman";mso-ansi-language:EN-US'>From:</span></b><span lang=EN-US style='font-size:10.0pt;font-family:"Tahoma","sans-serif";mso-fareast-font-family:"Times New Roman";mso-ansi-language:EN-US'> iesg-bounces@ietf.org [mailto:iesg-bounces@ietf.org] <b>On Behalf Of </b>JP Vasseur<br><b>Sent:</b> 13 January 2011 14:39<br><b>To:</b> Joseph Salowey (jsalowey)<br><b>Cc:</b> draft-ietf-roll-routing-metrics.all@tools.ietf.org; The IESG; secdir@ietf.org<br><b>Subject:</b> Re: secdir review of draft-ietf-roll-routing-metrics-14<o:p></o:p></span></p></div></div><p class=MsoNormal><o:p>&nbsp;</o:p></p><p class=MsoNormal><span style='mso-fareast-font-family:"Times New Roman"'>Dear Joseph,<o:p></o:p></span></p><div><p class=MsoNormal><span style='mso-fareast-font-family:"Times New R
 oman"'><
p></div><div><p class=MsoNormal><span style='mso-fareast-font-family:"Times New Roman"'>Thanks for your review.<o:p></o:p></span></p><div><p class=MsoNormal><span style='mso-fareast-font-family:"Times New Roman"'><o:p>&nbsp;</o:p></span></p><div><div><p class=MsoNormal><span style='mso-fareast-font-family:"Times New Roman"'>On Jan 6, 2011, at 11:42 PM, Joseph Salowey (jsalowey) wrote:<o:p></o:p></span></p></div><p class=MsoNormal><span style='mso-fareast-font-family:"Times New Roman"'><br style='mso-special-character:line-break'><![if !supportLineBreakNewLine]><br style='mso-special-character:line-break'><![endif]><o:p></o:p></span></p><div><p style='margin-bottom:12.0pt'><span style='font-size:10.0pt'>I have reviewed this document as part of the security directorate's<br>ongoing effort to review all IETF documents being processed by the<br>IESG.&nbsp; These comments were written primarily for the benefit of the<br>security area directors.&nbsp; Document editors and WG chairs
  should 
ust like any other last call comments.<br><br>In general I think the document is clear.&nbsp; I have one security related issue.&nbsp; The security considerations mention attacks where the metric information is manipulated to cause problems.&nbsp; I think there may also be cases where disclosure of some of the metric information may be an issue.&nbsp; the main area of concern for me is the node energy metric.&nbsp; This information may be useful to an attacker to determine which devices to attack with out-of-band or in-band attacks involving energy draining.&nbsp;&nbsp; I have not had a chance to see if the RPL protects the confidentiality of these attributes.&nbsp; If this is a concern in a deployment environment then the usage of these attributes may be limited.&nbsp;&nbsp; I think it is probably worth mentioning this in the security considerations.</span><o:p></o:p></p></div><div><p class=MsoNormal><span style='mso-fareast-font-family:"Times New Roman"'>JP&gt; This is a ve
 ry good 
he following:&nbsp;<o:p></o:p></span></p></div><div><p class=MsoNormal><span style='mso-fareast-font-family:"Times New Roman"'><o:p>&nbsp;</o:p></span></p></div><div><p class=MsoNormal><i><span style='mso-fareast-font-family:"Times New Roman"'>&quot;Some routing metrics may also be used to identify some areas of weaknesses in the network (a highly unreliable links, a node running low in terms of energy, ...): such information may be used by a potential attacker. Thus it is RECOMMENDED to carefully consider which metrics should be used by RPL and the level of visibility that they provide about the network state or to use appropriate the security measures as specified in draft-ietf-roll-rpl to protect that information.&quot;</span></i><span style='mso-fareast-font-family:"Times New Roman"'><o:p></o:p></span></p></div><blockquote style='margin-top:5.0pt;margin-bottom:5.0pt'><div><p><span style='font-size:10.0pt'>Also energy metric introduce a new vector into the system for an at
 tacker t
.&nbsp; An attacker can purposely attempt to modify the stored energy in a node to modify the metrics advertised.&nbsp;&nbsp; </span><o:p></o:p></p></div></blockquote><div><p class=MsoNormal><span style='mso-fareast-font-family:"Times New Roman"'>JP&gt; Right but this is also true for other metrics, this is why we made a recommendation to stop advertising metrics for unstable links, which should address your point.&nbsp;It is a generally accepted feature of routing security that it is not possible to protect against subverted routers. That is, a router that can be made to lie is a significant security risk and the protection must be physical or in the management system access, not in the routing protocol. Modifying the stored energy in a router constitutes a physical attack on the router (i.e. subversion) and would, of course, modify the router's ability to forward data. Thus, the routing protocol would be correct to notify the rest of the network of the revised state of powe
 r in the
   outer and this would a
fect how packets are routed.<o:p></o:p></span></p></div><blockquote style='margin-top:5.0pt;margin-bottom:5.0pt'><div><p style='margin-bottom:12.0pt'><span style='font-size:10.0pt'>Its not clear to me at this point if this is significant since the power drain may have effect on metrics and routing beyond what is advertised and it seems the recommendation to protect against unstable links would be effective in this case as well.&nbsp;&nbsp;</span><o:p></o:p></p></div></blockquote><div><p class=MsoNormal><span style='mso-fareast-font-family:"Times New Roman"'>Exactly.<o:p></o:p></span></p></div><div><p class=MsoNormal><span style='mso-fareast-font-family:"Times New Roman"'><o:p>&nbsp;</o:p></span></p></div><div><p class=MsoNormal><span style='mso-fareast-font-family:"Times New Roman"'>Thanks a lot.<o:p></o:p></span></p></div><div><p class=MsoNormal><span style='mso-fareast-font-family:"Times New Roman"'><o:p>&nbsp;</o:p></span></p></div><div><p class=MsoNormal><span style='mso-
 fareast-
man"'>Cheers.<o:p></o:p></span></p></div><div><p class=MsoNormal><span style='mso-fareast-font-family:"Times New Roman"'><o:p>&nbsp;</o:p></span></p></div><div><p class=MsoNormal><span style='mso-fareast-font-family:"Times New Roman"'>JP.<o:p></o:p></span></p></div><blockquote style='margin-top:5.0pt;margin-bottom:5.0pt'><div><p><span style='font-size:10.0pt'>Cheers,<br><br>Joe</span><o:p></o:p></p></div></blockquote></div><p class=MsoNormal><span style='mso-fareast-font-family:"Times New Roman"'><o:p>&nbsp;</o:p></span></p></div></div></div></div></body></html>

--Boundary_(ID_vF0svZAZe4m8D2EcK+tEfA)--

From jsalowey@cisco.com  Thu Jan 13 09:28:34 2011
Return-Path: <jsalowey@cisco.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 269CC28C10E; Thu, 13 Jan 2011 09:28:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -110.599
X-Spam-Level: 
X-Spam-Status: No, score=-110.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jOpklL9G5yu3; Thu, 13 Jan 2011 09:28:33 -0800 (PST)
Received: from sj-iport-2.cisco.com (sj-iport-2.cisco.com [171.71.176.71]) by core3.amsl.com (Postfix) with ESMTP id 44C2228C0F7; Thu, 13 Jan 2011 09:28:33 -0800 (PST)
Authentication-Results: sj-iport-2.cisco.com; dkim=neutral (message not signed) header.i=none
Received: from sj-core-3.cisco.com ([171.68.223.137]) by sj-iport-2.cisco.com with ESMTP; 13 Jan 2011 17:30:56 +0000
Received: from [10.33.249.181] ([10.33.249.181]) by sj-core-3.cisco.com (8.13.8/8.14.3) with ESMTP id p0DHUtOt016119; Thu, 13 Jan 2011 17:30:56 GMT
Mime-Version: 1.0 (Apple Message framework v1082)
Content-Type: text/plain; charset=us-ascii
From: Joe Salowey <jsalowey@cisco.com>
In-Reply-To: <6C8230FE-0DC4-461A-8549-A7127DDDEB01@cisco.com>
Date: Thu, 13 Jan 2011 09:31:42 -0800
Content-Transfer-Encoding: quoted-printable
Message-Id: <A96D73E3-AFEA-47EA-A65B-62F030C04FEE@cisco.com>
References: <123DE172-C230-4A8E-81A8-2B60D9E6AD92@cisco.com> <6C8230FE-0DC4-461A-8549-A7127DDDEB01@cisco.com>
To: JP Vasseur <jpv@cisco.com>
X-Mailer: Apple Mail (2.1082)
Cc: draft-ietf-roll-routing-metrics.all@tools.ietf.org, The IESG <iesg@ietf.org>, secdir@ietf.org
Subject: Re: [secdir] secdir review of draft-ietf-roll-routing-metrics-14
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 13 Jan 2011 17:28:34 -0000

This resolution looks good to me.

Thanks,

Joe

On Jan 13, 2011, at 6:39 AM, JP Vasseur wrote:

> Dear Joseph,
>=20
> Thanks for your review.
>=20
> On Jan 6, 2011, at 11:42 PM, Joseph Salowey (jsalowey) wrote:
>=20
>> I have reviewed this document as part of the security directorate's
>> ongoing effort to review all IETF documents being processed by the
>> IESG.  These comments were written primarily for the benefit of the
>> security area directors.  Document editors and WG chairs should treat
>> these comments just like any other last call comments.
>>=20
>> In general I think the document is clear.  I have one security =
related issue.  The security considerations mention attacks where the =
metric information is manipulated to cause problems.  I think there may =
also be cases where disclosure of some of the metric information may be =
an issue.  the main area of concern for me is the node energy metric.  =
This information may be useful to an attacker to determine which devices =
to attack with out-of-band or in-band attacks involving energy draining. =
  I have not had a chance to see if the RPL protects the confidentiality =
of these attributes.  If this is a concern in a deployment environment =
then the usage of these attributes may be limited.   I think it is =
probably worth mentioning this in the security considerations.
>>=20
>>=20
> JP> This is a very good point. How about adding the following:=20
>=20
> "Some routing metrics may also be used to identify some areas of =
weaknesses in the network (a highly unreliable links, a node running low =
in terms of energy, ...): such information may be used by a potential =
attacker. Thus it is RECOMMENDED to carefully consider which metrics =
should be used by RPL and the level of visibility that they provide =
about the network state or to use appropriate the security measures as =
specified in draft-ietf-roll-rpl to protect that information."
>> Also energy metric introduce a new vector into the system for an =
attacker to modify routing behavior.  An attacker can purposely attempt =
to modify the stored energy in a node to modify the metrics advertised. =20=

>>=20
> JP> Right but this is also true for other metrics, this is why we made =
a recommendation to stop advertising metrics for unstable links, which =
should address your point. It is a generally accepted feature of routing =
security that it is not possible to protect against subverted routers. =
That is, a router that can be made to lie is a significant security risk =
and the protection must be physical or in the management system access, =
not in the routing protocol. Modifying the stored energy in a router =
constitutes a physical attack on the router (i.e. subversion) and would, =
of course, modify the router's ability to forward data. Thus, the =
routing protocol would be correct to notify the rest of the network of =
the revised state of power in the router and this would affect how =
packets are routed.
>> Its not clear to me at this point if this is significant since the =
power drain may have effect on metrics and routing beyond what is =
advertised and it seems the recommendation to protect against unstable =
links would be effective in this case as well. =20
>>=20
>>=20
> Exactly.
>=20
> Thanks a lot.
>=20
> Cheers.
>=20
> JP.
>> Cheers,
>>=20
>> Joe
>>=20
>=20


From dharkins@lounge.org  Thu Jan 13 14:48:31 2011
Return-Path: <dharkins@lounge.org>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C6A783A6C0D; Thu, 13 Jan 2011 14:48:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.335
X-Spam-Level: 
X-Spam-Status: No, score=-5.335 tagged_above=-999 required=5 tests=[AWL=-0.930, BAYES_20=-0.74, IP_NOT_FRIENDLY=0.334, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Tedud4D1Nu2t; Thu, 13 Jan 2011 14:48:31 -0800 (PST)
Received: from colo.trepanning.net (colo.trepanning.net [69.55.226.174]) by core3.amsl.com (Postfix) with ESMTP id F07E03A6BED; Thu, 13 Jan 2011 14:48:30 -0800 (PST)
Received: from www.trepanning.net (localhost [127.0.0.1]) by colo.trepanning.net (Postfix) with ESMTP id 8DCC21022404C; Thu, 13 Jan 2011 14:50:54 -0800 (PST)
Received: from 216.31.249.246 (SquirrelMail authenticated user dharkins@lounge.org) by www.trepanning.net with HTTP; Thu, 13 Jan 2011 14:50:54 -0800 (PST)
Message-ID: <cce49a057d2fce5430e91821cd065e32.squirrel@www.trepanning.net>
Date: Thu, 13 Jan 2011 14:50:54 -0800 (PST)
From: "Dan Harkins" <dharkins@lounge.org>
To: iesg@ietf.org, secdir@ietf.org, draft-igoe-secsh-suiteb.all@tools.ietf.org
User-Agent: SquirrelMail/1.4.14 [SVN]
MIME-Version: 1.0
Content-Type: text/plain;charset=iso-8859-1
Content-Transfer-Encoding: 8bit
X-Priority: 3 (Normal)
Importance: Normal
Subject: [secdir] secdir review of draft-igoe-secsh-suiteb-02
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 13 Jan 2011 22:48:31 -0000

  Hello,

  I have reviewed this document as part of the security directorate's
ongoing effort to review all IETF documents being processed by the
IESG.  These comments were written primarily for the benefit of the
security area directors.  Document editors and WG chairs should treat
these comments just like any other last call comments.

  This draft documents how a Suite B-compliant SSH client can be built
using various other documents that describe how to do ECC-DH, ECDSA, and
AES-GCM in SSH. It establishes 2 minimum levels of security, one at
128-bits and another at 192-bits, and specifies how to use the ECC-DH,
ECDSA, and AES-GCM components to achieve those two levels.

  I found no issues with the draft itself and my only complaint is that
the Security Considerations seem a little insufficient for the task of
describing how to put Suite B in SSH. They are, in their entirety:

          The security considerations of [SSH-Arch] apply.

where [SSH-ARCH] is RFC 4251. The Security Considerations in RFC 4251
are very nice and it is proper to refer to them but, at the very least,
it would be nice to provide some text around the following questions:

  1. how much entropy is each side required to put into the ECC-DH
     exchange to achieve the appropriate minimum level of security?

  2. in the introduction the draft mentions that following the
     requirements in the draft does not imply that an implementation is
     suitable for protection of classified data. What other guidance can
     the author recommend to leap that bar? Are there any other documents
     that specify the other requirements an implementation would have to
     comply with?

  regards,

  Dan.




From paul.hoffman@vpnc.org  Mon Jan 17 09:29:16 2011
Return-Path: <paul.hoffman@vpnc.org>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C94B428C17B for <secdir@core3.amsl.com>; Mon, 17 Jan 2011 09:29:16 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -100.416
X-Spam-Level: 
X-Spam-Status: No, score=-100.416 tagged_above=-999 required=5 tests=[AWL=-0.970, BAYES_50=0.001, HELO_MISMATCH_COM=0.553, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hp7y9l1qVGSB for <secdir@core3.amsl.com>; Mon, 17 Jan 2011 09:29:16 -0800 (PST)
Received: from hoffman.proper.com (Hoffman.Proper.COM [207.182.41.81]) by core3.amsl.com (Postfix) with ESMTP id 311E928C163 for <secdir@ietf.org>; Mon, 17 Jan 2011 09:29:16 -0800 (PST)
Received: from MacBook-08.local (75-101-30-90.dsl.dynamic.sonic.net [75.101.30.90]) (authenticated bits=0) by hoffman.proper.com (8.14.4/8.14.3) with ESMTP id p0HHVn3I088443 (version=TLSv1/SSLv3 cipher=DHE-RSA-CAMELLIA256-SHA bits=256 verify=NO) for <secdir@ietf.org>; Mon, 17 Jan 2011 10:31:50 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
Message-ID: <4D347D05.7050604@vpnc.org>
Date: Mon, 17 Jan 2011 09:31:49 -0800
From: Paul Hoffman <paul.hoffman@vpnc.org>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.6; en-US; rv:1.9.2.13) Gecko/20101207 Thunderbird/3.1.7
MIME-Version: 1.0
To: secdir@ietf.org
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Subject: [secdir] Secdir review of draft-turner-additional-new-asn
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Jan 2011 17:29:16 -0000

Greetings again. This is a stub security review, given that one of the 
co-authors is a Security AD. This document is a pile of ASN.1 that 
updates earlier ASN.1 modules in various security documents. The 
Security Considerations section says, in total:

    This document itself does not have any security considerations.  The
    ASN.1 modules keep the same bits-on-the-wire as the modules that they
    replace.

I agree with that assessment.

--Paul Hoffman

From jpv@cisco.com  Thu Jan 13 09:31:20 2011
Return-Path: <jpv@cisco.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 263C428C12E; Thu, 13 Jan 2011 09:31:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -110.4
X-Spam-Level: 
X-Spam-Status: No, score=-110.4 tagged_above=-999 required=5 tests=[AWL=0.199,  BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KBz53mDUvPcN; Thu, 13 Jan 2011 09:31:19 -0800 (PST)
Received: from sj-iport-1.cisco.com (sj-iport-1.cisco.com [171.71.176.70]) by core3.amsl.com (Postfix) with ESMTP id 39B2B28C0F7; Thu, 13 Jan 2011 09:31:19 -0800 (PST)
Authentication-Results: sj-iport-1.cisco.com; dkim=neutral (message not signed) header.i=none
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AvsEAFzGLk2rR7Ht/2dsb2JhbACkSHOkQJhMgnSCWASLEIMo
Received: from sj-core-1.cisco.com ([171.71.177.237]) by sj-iport-1.cisco.com with ESMTP; 13 Jan 2011 17:33:42 +0000
Received: from xbh-ams-101.cisco.com (xbh-ams-101.cisco.com [144.254.74.71]) by sj-core-1.cisco.com (8.13.8/8.14.3) with ESMTP id p0DHXftX024707; Thu, 13 Jan 2011 17:33:41 GMT
Received: from xfe-ams-201.cisco.com ([144.254.231.95]) by xbh-ams-101.cisco.com with Microsoft SMTPSVC(6.0.3790.4675);  Thu, 13 Jan 2011 18:33:39 +0100
Received: from dhcp-lyon-144-254-54-119.cisco.com ([144.254.54.119]) by xfe-ams-201.cisco.com with Microsoft SMTPSVC(6.0.3790.4675);  Thu, 13 Jan 2011 18:33:39 +0100
Mime-Version: 1.0 (Apple Message framework v1082)
Content-Type: text/plain; charset=us-ascii
From: JP Vasseur <jpv@cisco.com>
In-Reply-To: <A96D73E3-AFEA-47EA-A65B-62F030C04FEE@cisco.com>
Date: Thu, 13 Jan 2011 18:33:31 +0100
Content-Transfer-Encoding: quoted-printable
Message-Id: <F1F90CCF-F155-4D52-B520-732A51FCEE49@cisco.com>
References: <123DE172-C230-4A8E-81A8-2B60D9E6AD92@cisco.com> <6C8230FE-0DC4-461A-8549-A7127DDDEB01@cisco.com> <A96D73E3-AFEA-47EA-A65B-62F030C04FEE@cisco.com>
To: Joe Salowey <jsalowey@cisco.com>
X-Mailer: Apple Mail (2.1082)
X-OriginalArrivalTime: 13 Jan 2011 17:33:39.0826 (UTC) FILETIME=[041DA520:01CBB348]
X-Mailman-Approved-At: Mon, 17 Jan 2011 13:05:04 -0800
Cc: draft-ietf-roll-routing-metrics.all@tools.ietf.org, The IESG <iesg@ietf.org>, secdir@ietf.org
Subject: Re: [secdir] secdir review of draft-ietf-roll-routing-metrics-14
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 13 Jan 2011 17:31:20 -0000

Thanks Joe.

On Jan 13, 2011, at 6:31 PM, Joe Salowey wrote:

> This resolution looks good to me.
>=20
> Thanks,
>=20
> Joe
>=20
> On Jan 13, 2011, at 6:39 AM, JP Vasseur wrote:
>=20
>> Dear Joseph,
>>=20
>> Thanks for your review.
>>=20
>> On Jan 6, 2011, at 11:42 PM, Joseph Salowey (jsalowey) wrote:
>>=20
>>> I have reviewed this document as part of the security directorate's
>>> ongoing effort to review all IETF documents being processed by the
>>> IESG.  These comments were written primarily for the benefit of the
>>> security area directors.  Document editors and WG chairs should =
treat
>>> these comments just like any other last call comments.
>>>=20
>>> In general I think the document is clear.  I have one security =
related issue.  The security considerations mention attacks where the =
metric information is manipulated to cause problems.  I think there may =
also be cases where disclosure of some of the metric information may be =
an issue.  the main area of concern for me is the node energy metric.  =
This information may be useful to an attacker to determine which devices =
to attack with out-of-band or in-band attacks involving energy draining. =
  I have not had a chance to see if the RPL protects the confidentiality =
of these attributes.  If this is a concern in a deployment environment =
then the usage of these attributes may be limited.   I think it is =
probably worth mentioning this in the security considerations.
>>>=20
>>>=20
>> JP> This is a very good point. How about adding the following:=20
>>=20
>> "Some routing metrics may also be used to identify some areas of =
weaknesses in the network (a highly unreliable links, a node running low =
in terms of energy, ...): such information may be used by a potential =
attacker. Thus it is RECOMMENDED to carefully consider which metrics =
should be used by RPL and the level of visibility that they provide =
about the network state or to use appropriate the security measures as =
specified in draft-ietf-roll-rpl to protect that information."
>>> Also energy metric introduce a new vector into the system for an =
attacker to modify routing behavior.  An attacker can purposely attempt =
to modify the stored energy in a node to modify the metrics advertised. =20=

>>>=20
>> JP> Right but this is also true for other metrics, this is why we =
made a recommendation to stop advertising metrics for unstable links, =
which should address your point. It is a generally accepted feature of =
routing security that it is not possible to protect against subverted =
routers. That is, a router that can be made to lie is a significant =
security risk and the protection must be physical or in the management =
system access, not in the routing protocol. Modifying the stored energy =
in a router constitutes a physical attack on the router (i.e. =
subversion) and would, of course, modify the router's ability to forward =
data. Thus, the routing protocol would be correct to notify the rest of =
the network of the revised state of power in the router and this would =
affect how packets are routed.
>>> Its not clear to me at this point if this is significant since the =
power drain may have effect on metrics and routing beyond what is =
advertised and it seems the recommendation to protect against unstable =
links would be effective in this case as well. =20
>>>=20
>>>=20
>> Exactly.
>>=20
>> Thanks a lot.
>>=20
>> Cheers.
>>=20
>> JP.
>>> Cheers,
>>>=20
>>> Joe
>>>=20
>>=20
>=20


From weiler+secdir@watson.org  Tue Jan 18 14:00:52 2011
Return-Path: <weiler+secdir@watson.org>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 1B9853A6F00 for <secdir@core3.amsl.com>; Tue, 18 Jan 2011 14:00:52 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.549
X-Spam-Level: 
X-Spam-Status: No, score=-2.549 tagged_above=-999 required=5 tests=[AWL=0.050,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NVPsR8ULtfUh for <secdir@core3.amsl.com>; Tue, 18 Jan 2011 14:00:51 -0800 (PST)
Received: from fledge.watson.org (fledge.watson.org [65.122.17.41]) by core3.amsl.com (Postfix) with ESMTP id B3B5E3A6DCE for <secdir@ietf.org>; Tue, 18 Jan 2011 14:00:50 -0800 (PST)
Received: from fledge.watson.org (localhost.watson.org [127.0.0.1]) by fledge.watson.org (8.14.4/8.14.4) with ESMTP id p0IM3Rl7077437 for <secdir@ietf.org>; Tue, 18 Jan 2011 17:03:27 -0500 (EST) (envelope-from weiler+secdir@watson.org)
Received: from localhost (weiler@localhost) by fledge.watson.org (8.14.4/8.14.4/Submit) with ESMTP id p0IM3Rwf077434 for <secdir@ietf.org>; Tue, 18 Jan 2011 17:03:27 -0500 (EST) (envelope-from weiler+secdir@watson.org)
X-Authentication-Warning: fledge.watson.org: weiler owned process doing -bs
Date: Tue, 18 Jan 2011 17:03:27 -0500 (EST)
From: Samuel Weiler <weiler+secdir@watson.org>
X-X-Sender: weiler@fledge.watson.org
To: secdir@ietf.org
Message-ID: <alpine.BSF.2.00.1101181701070.45644@fledge.watson.org>
User-Agent: Alpine 2.00 (BSF 1167 2008-08-23)
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; format=flowed; charset=US-ASCII
X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.2.3 (fledge.watson.org [127.0.0.1]); Tue, 18 Jan 2011 17:03:28 -0500 (EST)
Subject: [secdir] Assignments
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: secdir-secretary@mit.edu
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Jan 2011 22:00:52 -0000

There are LOTS of new assignments, and, due to some advance telechat 
scheduling, there are five lists below.  Please look carefully.

Review instructions and related resources are at:
         http://tools.ietf.org/area/sec/trac/wiki/SecDirReview

Juergen Schoenwaelder is next in the rotation.


For telechat 2011-01-20

Reviewer                 LC end     Draft
Dave Cridland          T 2010-12-03 draft-ietf-sipcore-sec-flows-08
Tobias Gondrom         T -          draft-ietf-mptcp-architecture-04
Phillip Hallam-Baker   T -          draft-ietf-mptcp-threat-07
Steve Hanna            T 2011-01-05 draft-ietf-multimob-pmipv6-base-solution-07
Barry Leiba            TR2010-12-16 draft-saintandre-tls-server-id-check-14
Stefan Santesson       T 2010-12-30 draft-ietf-roll-security-framework-04
Larry Zhu              T 2011-01-14 draft-ietf-6lowpan-hc-13


For telechat 2011-02-03

Hilarie Orman          T 2011-01-26 draft-morton-ippm-rfc4148-obsolete-03


For telechat 2011-02-17

Scott Kelly            T 2011-02-07 draft-ymbk-aplusp-08
Stephen Kent           T 2011-02-10 draft-arkko-dual-stack-extra-lite-03
Tero Kivinen           T 2011-02-14 draft-eastlake-sha2b-06
Chris Lonvick          T 2011-02-14 draft-cheshire-dnsext-special-names-01
Sandy Murphy           T 2011-02-01 draft-ietf-tsvwg-iana-ports-09
Radia Perlman          T 2011-02-08 draft-mraihi-mutual-oath-hotp-variants-12
Eric Rescorla          T 2011-02-08 draft-mraihi-totp-timebased-07


For telechat 2011-03-03

Julien Laganier        T 2011-02-11 draft-holsten-about-uri-scheme-06
Magnus Nystrom         T -          draft-meadors-multiple-attachments-ediint-10

Last calls and special requests:

Derek Atkins             2011-01-18 draft-groves-sakke-00
Rob Austein              2010-12-15 draft-salowey-secsh-uri-00
Rob Austein              2011-01-06 draft-ietf-6man-prefixlen-p2p-01
Richard Barnes           2011-01-18 draft-ietf-isis-ieee-aq-03
Dave Cridland            2011-01-18 draft-ietf-isis-purge-tlv-05
Alan DeKok               2011-01-18 draft-ietf-isis-reg-purge-00
Sam Hartman              2011-01-18 draft-turner-cms-symmetrickeypackage-algs-00
Love Hornquist-Astrand   2011-02-01 draft-yevstifeyev-tn3270-uri-12
Jeffrey Hutzelman        2011-01-18 draft-groves-eccsi-00
Barry Leiba              2011-01-31 draft-ietf-ccamp-mpls-tp-cp-framework-05
David McGrew             -          draft-ietf-ecrit-framework-12
David McGrew             2011-02-01 draft-ietf-intarea-shared-addressing-issues-02
Catherine Meadows        2011-01-25 draft-ietf-pim-registry-03
Kathleen Moriarty        2011-01-27 draft-ietf-pmol-metrics-framework-07
Russ Mundy               2011-01-04 draft-cardona-cablelabs-urn-05
Russ Mundy               2011-01-25 draft-ietf-speermint-architecture-17
Sandy Murphy             2011-01-03 draft-turner-sha0-sha1-seccon-02
Eric Rescorla            2011-01-07 draft-ietf-pce-inter-layer-req-15
Vincent Roca             2011-02-07 draft-reed-urn-dgiwg-02
Joe Salowey              2011-02-08 draft-turner-akf-algs-update-02
Stefan Santesson         2011-02-08 draft-turner-ekpct-algs-update-02
Nico Williams            2011-01-14 draft-yevstifeyev-http-headers-not-recognized-11
Larry Zhu                2010-09-30 draft-lundberg-app-tei-xml-06
Glen Zorn                2011-01-18 draft-groves-mikey-sakke-00



From catherine.meadows@nrl.navy.mil  Tue Jan 18 14:34:54 2011
Return-Path: <catherine.meadows@nrl.navy.mil>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B677A28C0E0; Tue, 18 Jan 2011 14:34:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level: 
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wiaM2ZoFb0w3; Tue, 18 Jan 2011 14:34:53 -0800 (PST)
Received: from fw5540.nrl.navy.mil (fw5540.nrl.navy.mil [132.250.196.100]) by core3.amsl.com (Postfix) with ESMTP id B1AC03A7068; Tue, 18 Jan 2011 14:34:53 -0800 (PST)
Received: from chacs.nrl.navy.mil (sun1.fw5540.net [10.0.0.11]) by fw5540.nrl.navy.mil (8.13.8/8.13.6) with ESMTP id p0IMbT06013189; Tue, 18 Jan 2011 17:37:29 -0500 (EST)
Received: from chacs.nrl.navy.mil (sun1 [10.0.0.11]) by chacs.nrl.navy.mil (8.13.8/8.13.6) with SMTP id p0IMbRC6027966; Tue, 18 Jan 2011 17:37:27 -0500 (EST)
Received: from siduri.fw5540.net ([10.0.3.73]) by chacs.nrl.navy.mil (SMSSMTP 4.1.16.48) with SMTP id M2011011817372617948 ; Tue, 18 Jan 2011 17:37:26 -0500
From: Catherine Meadows <catherine.meadows@nrl.navy.mil>
Content-Type: multipart/alternative; boundary=Apple-Mail-10--744066565
Date: Tue, 18 Jan 2011 17:45:13 -0500
Message-Id: <F0189CCC-CC55-4A8D-A0A0-EE61F155B40D@nrl.navy.mil>
To: iesg@ietf.org, secdir@ietf.org, draft-ietf-pim-registry.all@tools.ietf.org
Mime-Version: 1.0 (Apple Message framework v1082)
X-Mailer: Apple Mail (2.1082)
Subject: [secdir] secdir review of draft-ietf-pim-registry-03
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Jan 2011 22:34:54 -0000

--Apple-Mail-10--744066565
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

I have reviewed this document as part of the security directorate's
ongoing effort to review all IETF documents being processed by the
IESG.  Document editors and WG chairs should treat these comments just
like any other last call comments.

This short draft provides instructions for an IANA  registry for =
Protocol Independent Multicast (PIM) message types.  There is currently =
no such registry, and there
are already several RFCs specifying PIM message types that should be =
included.  The document gives the initial content of the
registry based on these RFCs, as well as a new type which is reserved =
for the extension of type space.

The authors not that other than the possible security benefits of having =
one place where the various PIM message types can
be found, there are no security considerations.  I agree with them, and =
so don't have anything further to add.



=20
Catherine Meadows
Naval Research Laboratory
Code 5543
4555 Overlook Ave., S.W.
Washington DC, 20375
phone: 202-767-3490
fax: 202-404-7942
email: catherine.meadows@nrl.navy.mil


--Apple-Mail-10--744066565
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=us-ascii

<html><head></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space; ">I =
have reviewed this document as part of the security =
directorate's<br>ongoing effort to review all IETF documents being =
processed by the<br>IESG. &nbsp;Document editors and WG chairs should =
treat these comments just<br>like any other last call =
comments.<div><br></div><div>This short draft provides instructions for =
an IANA &nbsp;registry for Protocol Independent Multicast (PIM) message =
types. &nbsp;There is currently no such registry, and there<div>are =
already several RFCs specifying PIM message types that should be =
included. &nbsp;The document gives the initial content of =
the</div><div>registry based on these RFCs, as well as a new type which =
is reserved for the extension of type =
space.</div><div><br></div><div>The authors not that other than the =
possible security benefits of having one place where the various PIM =
message types can</div><div>be found, there are no security =
considerations. &nbsp;I agree with them, and so don't have anything =
further to =
add.</div><div><br></div><div><br></div><div><br></div><div>&nbsp;<br><div=
>
<span class=3D"Apple-style-span" style=3D"border-collapse: separate; =
color: rgb(0, 0, 0); font-family: Helvetica; font-size: 12px; =
font-style: normal; font-variant: normal; font-weight: normal; =
letter-spacing: normal; line-height: normal; orphans: 2; text-align: =
auto; text-indent: 0px; text-transform: none; white-space: normal; =
widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0; "><div>Catherine Meadows<br>Naval =
Research Laboratory<br>Code 5543<br>4555 Overlook Ave., =
S.W.<br>Washington DC, 20375<br>phone: 202-767-3490<br>fax: =
202-404-7942<br>email:&nbsp;<a =
href=3D"mailto:catherine.meadows@nrl.navy.mil">catherine.meadows@nrl.navy.=
mil</a></div></span>
</div>
<br></div></div></body></html>=

--Apple-Mail-10--744066565--

From rbarnes@bbn.com  Tue Jan 18 15:25:17 2011
Return-Path: <rbarnes@bbn.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 4129028C145; Tue, 18 Jan 2011 15:25:17 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.72
X-Spam-Level: 
X-Spam-Status: No, score=-102.72 tagged_above=-999 required=5 tests=[AWL=-0.121, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DYhzXR4bvrU3; Tue, 18 Jan 2011 15:25:16 -0800 (PST)
Received: from smtp.bbn.com (smtp.bbn.com [128.33.1.81]) by core3.amsl.com (Postfix) with ESMTP id 6D91828C13C; Tue, 18 Jan 2011 15:25:16 -0800 (PST)
Received: from [192.1.255.181] (port=49662 helo=col-raltmann-l1.nira.bbn.com) by smtp.bbn.com with esmtps (TLSv1:AES128-SHA:128) (Exim 4.71 (FreeBSD)) (envelope-from <rbarnes@bbn.com>) id 1PfKxu-000CMu-NJ; Tue, 18 Jan 2011 18:27:54 -0500
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Apple Message framework v1082)
From: "Richard L. Barnes" <rbarnes@bbn.com>
In-Reply-To: <188D3671-05E9-40A2-9498-24BAE91B269E@bbn.com>
Date: Tue, 18 Jan 2011 18:27:53 -0500
Content-Transfer-Encoding: quoted-printable
Message-Id: <4153935A-E8EE-4775-BEAE-3E695CDB0C5C@bbn.com>
References: <188D3671-05E9-40A2-9498-24BAE91B269E@bbn.com>
To: secdir@ietf.org, The IESG <iesg@ietf.org>
X-Mailer: Apple Mail (2.1082)
Subject: [secdir] secdir review of draft-ietf-isis-ieee-aq-03
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Jan 2011 23:25:17 -0000

I have reviewed this document as part of the security directorate's =
ongoing effort to review all IETF documents being processed by the IESG. =
 These comments were written primarily for the benefit of the security =
area directors.  Document editors and WG chairs should treat these =
comments just like any other last call comments.

This document defines a set of additional sub-TLVs for IS-IS that enable =
IS-IS nodes to communicate information related to the IEEE 802.1aq =
Shortest Path Bridging system.=20
The Security Considerations section of the document claims that these =
extensions do not create any additional security risks.

This may be the case, but I found it difficult to evaluate this claim =
given a basic knowledge of IS-IS and none of 802.1aq.  My high-level =
impression is that the negotiations conducted through the mechanism =
defined in this document have the ability to affect layer-2 routing in =
new ways, with the implication that malicious actors in the protocol =
have new ways to influence traffic patterns or deny service to users. =20=


It would be helpful if the Security Considerations could explain why =
such manipulations are not possible using these extensions (which would =
seem to defeat the purpose of the extensions), or if they are, what =
assumptions need to be true in order for the protocol to operate =
properly.  Do all internal network elements need to behave as specified? =
 Only the SPB instances?

--Richard=

From jhutz@cmu.edu  Wed Jan 19 08:56:22 2011
Return-Path: <jhutz@cmu.edu>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id BD42428B56A; Wed, 19 Jan 2011 08:56:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.529
X-Spam-Level: 
X-Spam-Status: No, score=-106.529 tagged_above=-999 required=5 tests=[AWL=0.070, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id t6vr70qb1RXf; Wed, 19 Jan 2011 08:56:19 -0800 (PST)
Received: from smtp02.srv.cs.cmu.edu (SMTP02.SRV.CS.CMU.EDU [128.2.217.197]) by core3.amsl.com (Postfix) with ESMTP id 310CD3A7178; Wed, 19 Jan 2011 08:56:19 -0800 (PST)
Received: from MINBAR.FAC.CS.CMU.EDU (MINBAR.FAC.CS.CMU.EDU [128.2.216.42]) (authenticated bits=0) by smtp02.srv.cs.cmu.edu (8.13.6/8.13.6) with ESMTP id p0JGwvEV005422 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 19 Jan 2011 11:58:57 -0500 (EST)
Date: Wed, 19 Jan 2011 11:58:57 -0500
From: Jeffrey Hutzelman <jhutz@cmu.edu>
To: ietf@ietf.org, secdir@ietf.org, draft-groves-eccsi.all@tools.ietf.org
Message-ID: <1AF6DD3921E5919222492B24@minbar.fac.cs.cmu.edu>
X-Mailer: Mulberry/4.0.8 (Linux/x86)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
X-Scanned-By: mimedefang-cmuscs on 128.2.217.197
Subject: [secdir] secdir review of draft-groves-eccsi-00.txt
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Jan 2011 16:56:22 -0000

I have reviewed this document as part of the security directorate's
ongoing effort to review all IETF documents being processed by the
IESG.  Document editors and WG chairs should treat these comments just
like any other last call comments.

This document defines an identity-based encryption algorithm, using
elliptic-curve crypto, based in part on the design of ECDSA.  In the
system described, each participant has a well-known identifier and a
public/private key pair generated by a central keying authority, which
itself has a well-known public key.  Each participant's public key is
a function of that participant's identifer, the keying authority's
well-known public key, and a long-term "validation token" which is
initially provided the keying authority, and then transmitted by that
participant along with each of its signatures.

This system shares the usual security considerations of any public
key cryptosystem, of ECC in general, and of ECDSA in particular; the
security considerations section seems to do a reasonable job of calling
these out.  Recommendations are made for selecting an appropriate
group size based on the desired symmetric-equivalent strength, but no
information is given as to the  derivation of this advice.  I suggest
a reference to RFC3766, or perhaps some more recent document which
pays particular attention to ECC algorithms.

Naturally, the security of the system depends on secure delivery of
the agreed-upon group parameters, the keying authority's public key,
and the generated keying material to each participant.  This document
calls out the need for suitable protection, but considers protocols
or mechanisms for delivering this data to be out of scope.

No explicit mechanism is provided for revocation or expiration of
keys.  However, identifiers are free-form, and could easily be
extended to include timestamps, as discussed in the security
considerations section.  This is one of the most serious concerns
I have with any identity-based crypto scheme, and I'm glad to see
it called out and addressed.


This document is unusual for the IETF, in that it defines a new
cryptographic algorithm, which we normally don't do.  While there
is no particular reason not to publish it here, I would be wary
of using this algorithm in any IETF protocol until it has seen
extensive review by the cryptographic community.  It looks to me
like it should work, but I am not a cryptographer and may well
have missed an obvious flaw.


From barryleiba@gmail.com  Wed Jan 19 10:08:14 2011
Return-Path: <barryleiba@gmail.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 1749328C127; Wed, 19 Jan 2011 10:08:14 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.771
X-Spam-Level: 
X-Spam-Status: No, score=-102.771 tagged_above=-999 required=5 tests=[AWL=0.206, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Zxi4AZDpu4il; Wed, 19 Jan 2011 10:08:13 -0800 (PST)
Received: from mail-iy0-f172.google.com (mail-iy0-f172.google.com [209.85.210.172]) by core3.amsl.com (Postfix) with ESMTP id 27BFE28C0EB; Wed, 19 Jan 2011 10:08:13 -0800 (PST)
Received: by iyi42 with SMTP id 42so1141708iyi.31 for <multiple recipients>; Wed, 19 Jan 2011 10:10:53 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:sender:date:x-google-sender-auth :message-id:subject:from:to:cc:content-type; bh=hZQRXC0fd+4Mxw8QvHTzmhczGObptFtpM54rm+J62Bc=; b=LDrW/RNfv5NwnbP8OsgOAJUImjkS+q2jsqfS5BJS30zs7HEC1RwZslKUmCrCjv1Evq cmYCQcEZqe/4nuvREWw9Gi4v0+GKx/h30K2E+elV9+J6/umLd2lKQ7O0l6SQI1W+Znp8 P+FcvcGRVWsLHsPLhmp7NvzGNq3rDKioZekJI=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:sender:date:x-google-sender-auth:message-id:subject :from:to:cc:content-type; b=dXrCdzlbFmT8uO8bPt/I9gBX6cwBjVnNFwHmlTc45IFqLRdZPATZNy39nhrTJA1lOo hm/QtXvL7bbq6TTozcgDR+vw8PC3wfMPGxt/jcJGJe/0Szpvgq2LfRmQ+oelPbt4+hR6 dus8AAUD6e6EfVc3lfs1s2ApSOEBXcAxlrkLY=
MIME-Version: 1.0
Received: by 10.231.39.74 with SMTP id f10mr1240107ibe.84.1295460653722; Wed, 19 Jan 2011 10:10:53 -0800 (PST)
Sender: barryleiba@gmail.com
Received: by 10.231.208.12 with HTTP; Wed, 19 Jan 2011 10:10:53 -0800 (PST)
Date: Wed, 19 Jan 2011 13:10:53 -0500
X-Google-Sender-Auth: RfYyMQpTxaugMET_xH4-X4wXaQg
Message-ID: <AANLkTimfX7pCR2jhN956-BeQvqAMT26FroKpExsxSjXk@mail.gmail.com>
From: Barry Leiba <barryleiba@computer.org>
To: secdir@ietf.org
Content-Type: text/plain; charset=ISO-8859-1
Cc: draft-saintandre-tls-server-id-check.all@tools.ietf.org, IESG <iesg@ietf.org>
Subject: [secdir] secdir review of draft-saintandre-tls-server-id-check-14
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Jan 2011 18:08:14 -0000

This is a re-review of the latest version, for tomorrow's IESG telechat.

I've been following the discussion of the document since my last
review, and am satisfied with where the document is now.  This version
isn't perfect -- and I still find it a difficult read -- but it pretty
much says the right things and steers people in the right direction.
I have some concern about expecting implementors to read it,
understand it, and understand all the implications.  That said, I
think it's ready to publish, and we should go ahead with it.

I see that it still needs five more ADs to take positions on it.  I
urge those ADs who have not done so to register "no objection"
positions.

Barry

From tobias.gondrom@gondrom.org  Thu Jan 20 03:46:03 2011
Return-Path: <tobias.gondrom@gondrom.org>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3C4B83A70FA for <secdir@core3.amsl.com>; Thu, 20 Jan 2011 03:46:03 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -95.158
X-Spam-Level: 
X-Spam-Status: No, score=-95.158 tagged_above=-999 required=5 tests=[AWL=0.204, BAYES_00=-2.599, FH_HELO_EQ_D_D_D_D=1.597, FH_HOST_EQ_D_D_D_D=0.765, FM_DDDD_TIMES_2=1.999, HELO_DYNAMIC_IPADDR=2.426, HELO_EQ_DE=0.35, RDNS_DYNAMIC=0.1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IWrUrCX7YAzM for <secdir@core3.amsl.com>; Thu, 20 Jan 2011 03:46:03 -0800 (PST)
Received: from lvps83-169-7-107.dedicated.hosteurope.de (lvps83-169-7-107.dedicated.hosteurope.de [83.169.7.107]) by core3.amsl.com (Postfix) with ESMTP id 7A0433A6F22 for <secdir@ietf.org>; Thu, 20 Jan 2011 03:46:02 -0800 (PST)
DomainKey-Signature: a=rsa-sha1;  q=dns; c=nofws; s=default; d=gondrom.org; b=nyx0bnYPEkacZaLVSiePj0+NKRP7JpGEQsePE5xkVKcDdxT+u/yUbYP+dkC9MsssVdpGmZbWW6yfNQJ30xM3ofQRkjGOy712y8MgOjcQqIU5gP6Fqa9pue99wcTt8Edp; h=Received:Received:Message-ID:Date:From:User-Agent:MIME-Version:To:Subject:X-Enigmail-Version:Content-Type:Content-Transfer-Encoding;
Received: (qmail 32005 invoked from network); 20 Jan 2011 12:47:48 +0100
Received: from 94-194-102-93.zone8.bethere.co.uk (HELO seraphim.heaven) (94.194.102.93) by lvps83-169-7-107.dedicated.hosteurope.de with (DHE-RSA-AES256-SHA encrypted) SMTP; 20 Jan 2011 12:47:48 +0100
Message-ID: <4D382103.6080601@gondrom.org>
Date: Thu, 20 Jan 2011 11:48:19 +0000
From: Tobias Gondrom <tobias.gondrom@gondrom.org>
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.2.13) Gecko/20101206 SUSE/3.1.7 Lightning/1.0b2 Thunderbird/3.1.7
MIME-Version: 1.0
To: iesg@ietf.org, secdir@ietf.org,  draft-ietf-mptcp-architecture.all@tools.ietf.org
X-Enigmail-Version: 1.1.1
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
Subject: [secdir] secdir review of draft-ietf-mptcp-architecture-04
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 20 Jan 2011 11:46:03 -0000

I have reviewed this document as part of the security directorate's
ongoing effort to review all IETF documents being processed by the IESG.
These comments were written primarily for the benefit of the security
area directors. Document editors and WG chairs should treat these
comments just like any other last call comments.


In general the MPTCP idea and approach look good.
There is a large number of security implications and potential problems
with MPTCP. The draft's security consideration section basically just
refers to two other drafts (draft-ietf-mptcp-threat-06 and
draft-ietf-mptcp-multiaddressed-02) to address and solve them. As these
elements are pretty central, I am not convinced that these references to
"work in progress" drafts are sufficient and only "informative".
Draft draft-ietf-mptcp-threat-06 describes some of the security concerns
in good detail. I would recommend that the progress of the
draft-ietf-mptcp-architecture draft should be halted/delayed until the
referenced drafts (or at least some of them) are released.


There are a number of issues I would like to raise (some of them might
have been answered in one of the several referenced documents or
documents referenced by referenced document):

- section 5.8: Considering the wide range of threats and potential
problems, section "5.8. Security"  3rd paragraph should change "A
multi-addressed Multipath TCP SHOULD be able to"  to "A multi-addressed
Multipath TCP MUST be able to".  These are really mandatory requirements
to make sure MPTCP does not break and is equal to TCP.

- does MPTCP reduce quality of service for other TCP users?
section 2.2.3 states:
"The use of multiple paths MUST NOT unduly harm users using single-path
TCP at shared bottlenecks, beyond the impact that would occur from
another single-path TCP flow."
I fully agree with this concern. However you do not indicate how this
shall be achieved.
Considering the TCP-transparancy paradigm in MPTCP this could conflict
with "fair shared resources" at bottlenecks? Maybe you can elaborate on
how you want to achieve that. I am not sure I can fully see or
understand that from draft-ietf-mptcp-congestion-01 (which btw. you
maybe should reference in section 2.2.3)?
- section 4, paragraph "Congestion Control":
this is referencing to draft-ietf-mptcp-congestion-01, which in turn
claims to have no security considerations and references to
draft-ford-mptcp-multiaddressed-01 (which is experimental and a bit
vague with the security considerations and still work in progress) and a
non-existent [REF] to deal with this problem. This is not satisfying.

- does it lead to traffic shaping (meaning that the network provider
will give individual users different qualities of service for TCP). E.g.
To make MPTCP equal to one TCP, do you have to reduce QoS for some of
its TCP pieces? Or do you identify MPTCP at bottlenecks and allow only
for specific users MPTCP?

- Packet Scheduling:
-- section 4, paragraph "Packet Scheduling" and section 5.3 "Buffer"
thinking about scheduling packets on MPTCP layer means holding TCP
packets back while waiting for others. Does that introduce a new
dimension of memory resource requirements on the receiving machine which
could lead to "flooding" attacks with MPTCP. (E.g. sending a MPTCP where
one TCP packet is missing by intent and making the receiving endpoint
keep all packets keep in memory waiting for the missing subflow packet)?
(also refers to section 5.2.  Reliability and Retransmissions)

- what should happen when two subflow packets (with the same connection
level sequence number) arrive via two different TCP paths? Within the
time until all connection packets have been re-arranged (e.g. while
waiting). Does that mean you can disrupt MPTCP by listening in on one
subflow on one path and sending fake messages that will overlap (in
connection sequence number) with packets from other paths?

- agree with the assessment of section 5.1 on double sequencing ("a
connection level sequence number, and another sequence number for each
subflow").
However:
- could this also make Denial of Service scenarios easier?
(or meaning makes it more difficult for middleboxes to determine whether
a TCP DoS attack is ongoing or a normal MPTCP (MPTCP's several TCP
subflows from one source may look like "flooding" from one source)?

- section "5.6.  Connection Identification":
comment: The Connection id MUST be protected against spoofing, because
for MPTCP aware clients this could be used to divert traffic from a
legitimate client to a non-legitimate client by spoofing to operate
under the same connection id? Normally a server will reply back to the
sender's IP address (the same TCP subflow). With MPTCP an attacker might
inject a second "connection" into the flow and divert answers from the
server to new IP (using the second MPTCP subflow path)?


Kind regards, Tobias




From kivinen@iki.fi  Fri Jan 21 06:07:56 2011
Return-Path: <kivinen@iki.fi>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id BB9D83A699D; Fri, 21 Jan 2011 06:07:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.571
X-Spam-Level: 
X-Spam-Status: No, score=-102.571 tagged_above=-999 required=5 tests=[AWL=0.028, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oNGVehkTVETb; Fri, 21 Jan 2011 06:07:55 -0800 (PST)
Received: from mail.kivinen.iki.fi (fireball.acr.fi [83.145.195.1]) by core3.amsl.com (Postfix) with ESMTP id 2BDC23A6998; Fri, 21 Jan 2011 06:07:54 -0800 (PST)
Received: from fireball.kivinen.iki.fi (localhost [127.0.0.1]) by mail.kivinen.iki.fi (8.14.3/8.14.3) with ESMTP id p0LEAbF1002374 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 21 Jan 2011 16:10:37 +0200 (EET)
Received: (from kivinen@localhost) by fireball.kivinen.iki.fi (8.14.3/8.12.11) id p0LEAaFv000109; Fri, 21 Jan 2011 16:10:36 +0200 (EET)
X-Authentication-Warning: fireball.kivinen.iki.fi: kivinen set sender to kivinen@iki.fi using -f
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <19769.37852.869585.298102@fireball.kivinen.iki.fi>
Date: Fri, 21 Jan 2011 16:10:36 +0200
From: Tero Kivinen <kivinen@iki.fi>
To: iesg@ietf.org, secdir@ietf.org
X-Mailer: VM 7.19 under Emacs 21.4.1
X-Edit-Time: 17 min
X-Total-Time: 23 min
Cc: draft-eastlake-sha2b.all@tools.ietf.org
Subject: [secdir] Review of draft-eastlake-sha2b-06
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Jan 2011 14:07:56 -0000

I have reviewed this document as part of the security directorate's 
ongoing effort to review all IETF documents being processed by the 
IESG.  These comments were written primarily for the benefit of the 
security area directors.  Document editors and WG chairs should treat 
these comments just like any other last call comments.

This document contains c-source code for the SHA1, SHA224, SHA256,
SHA384, and SHA512 for just hash functions, hmac functions and HKDF
functions. It also contains description of SHA224, SHA256, SHA384, and
SHA512 algorithms.

I did review the whole document including the code review on the
actual library functions. I did skip most of the test driver code
while doing code review. I also tested that the code include compiles,
and produced correct results in my system. I did this by comparing the
results from the functions in the draft and our own crypto library
implementation. As our library does not support inputs that are not
multiple of 8 bits, I did not verify the XXXFinalBits implementations
against external implementation.

Security consideration section say:

----------------------------------------------------------------------
   This document is intended to provide convenient open source access by
   the Internet community to the United States of America Federal
   Information Processing Standard Secure Hash Algorithms (SHAs) [FIPS
   180-2], HMACs based thereon, and HKDF. No independent assertion of
   the security of these functions by the authors for any particular use
   is intended.
----------------------------------------------------------------------

On the other hand the C-source files has following security related
statements:

----------------------------------------------------------------------
 *      The SHA-1 algorithm produces a 160-bit message digest for a
 *      given data stream.  It should take about 2**n steps to find a
 *      message with the same digest as a given message and
 *      2**(n/2) to find any two messages with the same digest,
 *      when n is the digest size in bits.  Therefore, this
 *      algorithm can serve as a means of providing a
 *      "fingerprint" for a message.
----------------------------------------------------------------------

which do give some assertion of the security of the functions. On the
other hand the statement in the SHA1.c might even be incorrect, as I
think there are attacks now that can find collisions in 2^69 steps
instead of 2^80 steps
(http://www.schneier.com/blog/archives/2005/02/cryptanalysis_o.html).
There might be even faster attacks by now.

----------------------------------------------------------------------

Some other nits:

In section 3:

> 3. Operations on Words
...
>
>   d. The rotate right (circular right shift) operation ROTR^n(x), where
>        x is a w-bit word and n is an integer with 0 <= n < w, is
>        defined by
>
>             ROTR^n(x) = (x>>n) OR (x<<(w-n))
>
>   e. The rotate left (circular left shift) operation ROTL^n(x), where x
>        is a w-bit word and n is an integer with 0 <= n < w, is defined
>        by
>
>             ROTL^n(X)  =  (x<<n) OR (x>>w-n)
				          ^^^

Could also use "(w-n)" instead of "w-n" just to make sure of the
precedence. 

--

When compiling shatest.c on NetBSD 5.99.39 I do get following
warnings:

----------------------------------------------------------------------
shatest.c: In function 'unhexStr':
shatest.c:1312: warning: array subscript has type 'char'
shatest.c:1320: warning: array subscript has type 'char'
shatest.c: In function 'scasecmp':
shatest.c:1522: warning: array subscript has type 'char'
shatest.c:1523: warning: array subscript has type 'char'
----------------------------------------------------------------------

This is because shatest.c gives char directly to the tolower which is
macro in NetBSD. The unhexStr and scasecmp functions should do the
similar "(int)(unsigned char)" cast before giving *hexstr/*s1/*s2 to
tolower.
-- 
kivinen@iki.fi

From tony@att.com  Fri Jan 21 08:48:45 2011
Return-Path: <tony@att.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D25553A6A59; Fri, 21 Jan 2011 08:48:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.534
X-Spam-Level: 
X-Spam-Status: No, score=-106.534 tagged_above=-999 required=5 tests=[AWL=0.065, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fmbmOaaX6VGy; Fri, 21 Jan 2011 08:48:45 -0800 (PST)
Received: from mail120.messagelabs.com (mail120.messagelabs.com [216.82.250.83]) by core3.amsl.com (Postfix) with ESMTP id 1288E3A6A53; Fri, 21 Jan 2011 08:48:44 -0800 (PST)
X-VirusChecked: Checked
X-Env-Sender: tony@att.com
X-Msg-Ref: server-11.tower-120.messagelabs.com!1295628690!3011328!1
X-StarScan-Version: 6.2.9; banners=-,-,-
X-Originating-IP: [144.160.20.145]
Received: (qmail 19370 invoked from network); 21 Jan 2011 16:51:31 -0000
Received: from sbcsmtp6.sbc.com (HELO mlpd192.enaf.sfdc.sbc.com) (144.160.20.145) by server-11.tower-120.messagelabs.com with DHE-RSA-AES256-SHA encrypted SMTP; 21 Jan 2011 16:51:31 -0000
Received: from enaf.sfdc.sbc.com (localhost.localdomain [127.0.0.1]) by mlpd192.enaf.sfdc.sbc.com (8.14.4/8.14.4) with ESMTP id p0LGppo0017334; Fri, 21 Jan 2011 11:51:52 -0500
Received: from alpd052.aldc.att.com (alpd052.aldc.att.com [130.8.42.31]) by mlpd192.enaf.sfdc.sbc.com (8.14.4/8.14.4) with ESMTP id p0LGpl6j017238; Fri, 21 Jan 2011 11:51:47 -0500
Received: from aldc.att.com (localhost.localdomain [127.0.0.1]) by alpd052.aldc.att.com (8.14.4/8.14.4) with ESMTP id p0LGpOnr027848; Fri, 21 Jan 2011 11:51:25 -0500
Received: from dns.maillennium.att.com (mailgw1.maillennium.att.com [135.25.114.99]) by alpd052.aldc.att.com (8.14.4/8.14.4) with ESMTP id p0LGpJAK027623; Fri, 21 Jan 2011 11:51:19 -0500
Received: from [135.70.217.160] (vpn-135-70-217-160.vpn.east.att.com[135.70.217.160]) by maillennium.att.com (mailgw1) with ESMTP id <20110121165118gw100e4l1ue> (Authid: tony); Fri, 21 Jan 2011 16:51:18 +0000
X-Originating-IP: [135.70.217.160]
Message-ID: <4D39B987.808@att.com>
Date: Fri, 21 Jan 2011 11:51:19 -0500
From: Tony Hansen <tony@att.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US; rv:1.9.2.13) Gecko/20101207 Thunderbird/3.1.7
MIME-Version: 1.0
To: Tero Kivinen <kivinen@iki.fi>
References: <19769.37852.869585.298102@fireball.kivinen.iki.fi>
In-Reply-To: <19769.37852.869585.298102@fireball.kivinen.iki.fi>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Mailman-Approved-At: Sun, 23 Jan 2011 15:54:07 -0800
Cc: draft-eastlake-sha2b.all@tools.ietf.org, iesg@ietf.org, secdir@ietf.org
Subject: Re: [secdir] Review of draft-eastlake-sha2b-06
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Jan 2011 16:48:45 -0000

Thank you for comments Tero. More privately.

     Tony

On 1/21/2011 9:10 AM, Tero Kivinen wrote:
> I have reviewed this document as part of the security directorate's
> ongoing effort to review all IETF documents being processed by the
> IESG.  These comments were written primarily for the benefit of the
> security area directors.  Document editors and WG chairs should treat
> these comments just like any other last call comments.

From scott@hyperthought.com  Mon Jan 24 10:21:57 2011
Return-Path: <scott@hyperthought.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 6D08D3A6B21 for <secdir@core3.amsl.com>; Mon, 24 Jan 2011 10:21:57 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.039
X-Spam-Level: 
X-Spam-Status: No, score=-3.039 tagged_above=-999 required=5 tests=[AWL=-0.929, BAYES_05=-1.11, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Hlp71m5TvyJv for <secdir@core3.amsl.com>; Mon, 24 Jan 2011 10:21:56 -0800 (PST)
Received: from smtp162.iad.emailsrvr.com (smtp162.iad.emailsrvr.com [207.97.245.162]) by core3.amsl.com (Postfix) with ESMTP id 748F93A6A6C for <secdir@ietf.org>; Mon, 24 Jan 2011 10:21:56 -0800 (PST)
Received: from localhost (localhost.localdomain [127.0.0.1]) by smtp46.relay.iad1a.emailsrvr.com (SMTP Server) with ESMTP id 9642FE87B7; Mon, 24 Jan 2011 13:24:51 -0500 (EST)
X-Virus-Scanned: OK
Received: from dynamic13.wm-web.iad.mlsrvr.com (dynamic13.wm-web.iad1a.rsapps.net [192.168.2.220]) by smtp46.relay.iad1a.emailsrvr.com (SMTP Server) with ESMTP id 795F0E86F7; Mon, 24 Jan 2011 13:24:51 -0500 (EST)
Received: from hyperthought.com (localhost [127.0.0.1]) by dynamic13.wm-web.iad.mlsrvr.com (Postfix) with ESMTP id 6A36F3218001; Mon, 24 Jan 2011 13:24:51 -0500 (EST)
Received: by apps.rackspace.com (Authenticated sender: scott@hyperthought.com, from: scott@hyperthought.com)  with HTTP; Mon, 24 Jan 2011 10:24:51 -0800 (PST)
Date: Mon, 24 Jan 2011 10:24:51 -0800 (PST)
From: "Scott G. Kelly" <scott@hyperthought.com>
To: "secdir@ietf.org" <secdir@ietf.org>, "iesg@ietf.org" <iesg@ietf.org>, draft-ymbk-splusp.all@tools.ietf.org
MIME-Version: 1.0
Content-Type: text/plain;charset=UTF-8
Content-Transfer-Encoding: quoted-printable
Importance: Normal
X-Priority: 3 (Normal)
X-Type: plain
Message-ID: <1295893491.433714482@192.168.4.58>
X-Mailer: webmail8
Subject: [secdir] secdir review of draft-ymbk-splusp
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Jan 2011 18:21:57 -0000

I have reviewed this document as part of the security directorate's ongoing=
 effort to review all IETF documents being processed by the IESG.  These co=
mments were written primarily for the benefit of the security area director=
s.  Document editors and WG chairs should treat these comments just like an=
y other last call comments.=0A=0AThis document describes a way to extend th=
e IPv4 address space by reclaiming some of the TCP/UDP port bits for use as=
 address bits. The document is well written, and the security consideration=
s seem complete. I see no security issues with this document.=0A=0A--Scott=
=0A


From weiler+secdir@watson.org  Tue Jan 25 05:28:19 2011
Return-Path: <weiler+secdir@watson.org>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id BC5D63A686D for <secdir@core3.amsl.com>; Tue, 25 Jan 2011 05:28:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.556
X-Spam-Level: 
X-Spam-Status: No, score=-2.556 tagged_above=-999 required=5 tests=[AWL=0.043,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xcbVxX4Q9Hy4 for <secdir@core3.amsl.com>; Tue, 25 Jan 2011 05:28:19 -0800 (PST)
Received: from fledge.watson.org (fledge.watson.org [65.122.17.41]) by core3.amsl.com (Postfix) with ESMTP id C61A33A6858 for <secdir@ietf.org>; Tue, 25 Jan 2011 05:28:18 -0800 (PST)
Received: from fledge.watson.org (localhost.watson.org [127.0.0.1]) by fledge.watson.org (8.14.4/8.14.4) with ESMTP id p0PDVFT1042154 for <secdir@ietf.org>; Tue, 25 Jan 2011 08:31:15 -0500 (EST) (envelope-from weiler+secdir@watson.org)
Received: from localhost (weiler@localhost) by fledge.watson.org (8.14.4/8.14.4/Submit) with ESMTP id p0PDVFZh042150 for <secdir@ietf.org>; Tue, 25 Jan 2011 08:31:15 -0500 (EST) (envelope-from weiler+secdir@watson.org)
X-Authentication-Warning: fledge.watson.org: weiler owned process doing -bs
Date: Tue, 25 Jan 2011 08:31:14 -0500 (EST)
From: Samuel Weiler <weiler+secdir@watson.org>
X-X-Sender: weiler@fledge.watson.org
To: secdir@ietf.org
Message-ID: <alpine.BSF.2.00.1101250829370.14233@fledge.watson.org>
User-Agent: Alpine 2.00 (BSF 1167 2008-08-23)
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; format=flowed; charset=US-ASCII
X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.2.3 (fledge.watson.org [127.0.0.1]); Tue, 25 Jan 2011 08:31:15 -0500 (EST)
Subject: [secdir] Assignments
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: secdir-secretary@mit.edu
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 Jan 2011 13:28:20 -0000

Carl Wallace is next in the rotation.

Review instructions and related resources are at:
         http://tools.ietf.org/area/sec/trac/wiki/SecDirReview



For telechat 2011-02-03

Reviewer                 LC end     Draft
Kathleen Moriarty      T 2011-01-27 draft-ietf-pmol-metrics-framework-07
Hilarie Orman          T 2011-01-26 draft-morton-ippm-rfc4148-obsolete-03


For telechat 2011-02-17

Stephen Kent           T 2011-02-10 draft-arkko-dual-stack-extra-lite-03
Chris Lonvick          T 2011-02-14 draft-cheshire-dnsext-special-names-01
Sandy Murphy           T 2011-02-01 draft-ietf-tsvwg-iana-ports-09
Radia Perlman          T 2011-02-08 draft-mraihi-mutual-oath-hotp-variants-12
Eric Rescorla          T 2011-02-08 draft-mraihi-totp-timebased-07


For telechat 2011-03-03

Julien Laganier        T 2011-02-11 draft-holsten-about-uri-scheme-06
Magnus Nystrom         T -          draft-meadors-multiple-attachments-ediint-10
Juergen Schoenwaelder  T 2011-02-18 draft-bryan-metalinkhttp-19

Last calls and special requests:

Derek Atkins             2011-01-18 draft-groves-sakke-00
Rob Austein              2010-12-15 draft-salowey-secsh-uri-00
Rob Austein              2011-01-06 draft-ietf-6man-prefixlen-p2p-01
Dave Cridland            2011-01-18 draft-ietf-isis-purge-tlv-05
Alan DeKok               2011-01-18 draft-ietf-isis-reg-purge-00
Sam Hartman              2011-01-18 draft-turner-cms-symmetrickeypackage-algs-00
Love Hornquist-Astrand   2011-02-01 draft-yevstifeyev-tn3270-uri-12
Barry Leiba              2011-01-31 draft-ietf-ccamp-mpls-tp-cp-framework-05
David McGrew             -          draft-ietf-ecrit-framework-12
David McGrew             2011-02-01 draft-ietf-intarea-shared-addressing-issues-02
Russ Mundy               2011-01-04 draft-cardona-cablelabs-urn-05
Russ Mundy               2011-01-25 draft-ietf-speermint-architecture-17
Sandy Murphy             2011-01-03 draft-turner-sha0-sha1-seccon-03
Eric Rescorla            2011-01-07 draft-ietf-pce-inter-layer-req-15
Vincent Roca             2011-02-07 draft-reed-urn-dgiwg-02
Joe Salowey              2011-02-08 draft-turner-akf-algs-update-02
Stefan Santesson         2011-02-08 draft-turner-ekpct-algs-update-02
Yaron Sheffer            2011-02-01 draft-ietf-ccamp-rwa-wson-framework-10
Tina TSOU                2011-02-07 draft-ietf-netconf-4741bis-07
Nico Williams            2011-01-14 draft-yevstifeyev-http-headers-not-recognized-11
Larry Zhu                2010-09-30 draft-lundberg-app-tei-xml-06
Glen Zorn                2011-01-18 draft-groves-mikey-sakke-00

From hartmans@mit.edu  Tue Jan 25 09:03:56 2011
Return-Path: <hartmans@mit.edu>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C902D3A6819; Tue, 25 Jan 2011 09:03:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.72
X-Spam-Level: 
X-Spam-Status: No, score=-102.72 tagged_above=-999 required=5 tests=[AWL=-0.455, BAYES_00=-2.599, IP_NOT_FRIENDLY=0.334, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id e26Q63lIJ2yg; Tue, 25 Jan 2011 09:03:56 -0800 (PST)
Received: from mail.suchdamage.org (permutation-city.suchdamage.org [69.25.196.28]) by core3.amsl.com (Postfix) with ESMTP id 099433A6817; Tue, 25 Jan 2011 09:03:55 -0800 (PST)
Received: from carter-zimmerman.suchdamage.org (carter-zimmerman.suchdamage.org [69.25.196.178]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client CN "laptop", Issuer "laptop" (not verified)) by mail.suchdamage.org (Postfix) with ESMTPS id 9A8F620246; Tue, 25 Jan 2011 12:05:02 -0500 (EST)
Received: by carter-zimmerman.suchdamage.org (Postfix, from userid 8042) id 38529432C; Tue, 25 Jan 2011 12:06:36 -0500 (EST)
From: Sam Hartman <hartmans-ietf@mit.edu>
To: secdir@ietf.org
Date: Tue, 25 Jan 2011 12:06:36 -0500
Message-ID: <tslmxmo3obn.fsf@mit.edu>
User-Agent: Gnus/5.110009 (No Gnus v0.9) Emacs/22.3 (gnu/linux)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Cc: iesg@ietf.org
Subject: [secdir] secdir review of draft-turner-cms-symmetrickeypackage-algs-00
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 Jan 2011 17:03:56 -0000

I reviewed this draft.  The keyprov working group has defined a CMS
content type for transporting a symmetric key and related
parameters. (That was a big part of why we chartered them)
In order to protected these keys, various CMS facilities can be used.

This draft describes what algorithms need to be implemented each CMS
mode.

There were no surprises; this looks fine.

From hilarie@purplestreak.com  Tue Jan 25 10:17:49 2011
Return-Path: <hilarie@purplestreak.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 1BE7C3A6868 for <secdir@core3.amsl.com>; Tue, 25 Jan 2011 10:17:49 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.099
X-Spam-Level: 
X-Spam-Status: No, score=-3.099 tagged_above=-999 required=5 tests=[AWL=-0.500, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tLteX751Fmep for <secdir@core3.amsl.com>; Tue, 25 Jan 2011 10:17:48 -0800 (PST)
Received: from out02.mta.xmission.com (out02.mta.xmission.com [166.70.13.232]) by core3.amsl.com (Postfix) with ESMTP id 53A563A6853 for <secdir@ietf.org>; Tue, 25 Jan 2011 10:17:48 -0800 (PST)
Received: from mx02.mta.xmission.com ([166.70.13.212]) by out02.mta.xmission.com with esmtps (TLSv1:AES256-SHA:256) (Exim 4.69) (envelope-from <hilarie@purplestreak.com>) id 1PhnVW-0007Va-9s; Tue, 25 Jan 2011 11:20:46 -0700
Received: from 166-70-57-249.ip.xmission.com ([166.70.57.249] helo=fermat.rhmr.com) by mx02.mta.xmission.com with esmtps (TLSv1:AES256-SHA:256) (Exim 4.69) (envelope-from <hilarie@purplestreak.com>) id 1PhnVT-0003R1-0s; Tue, 25 Jan 2011 11:20:46 -0700
Received: from fermat.rhmr.com (localhost [127.0.0.1]) by fermat.rhmr.com (8.14.3/8.14.3/Debian-9.1ubuntu1) with ESMTP id p0PILHYF025061; Tue, 25 Jan 2011 11:21:17 -0700
Received: (from ho@localhost) by fermat.rhmr.com (8.14.3/8.14.3/Submit) id p0PILHGK025060; Tue, 25 Jan 2011 11:21:17 -0700
Date: Tue, 25 Jan 2011 11:21:17 -0700
Message-Id: <201101251821.p0PILHGK025060@fermat.rhmr.com>
X-Authentication-Warning: fermat.rhmr.com: ho set sender to hilarie using -f
From: "Hilarie Orman" <hilarie@purplestreak.com>
To: secdir@ietf.org
X-XM-SPF: eid=; ; ; mid=; ; ; hst=mx02.mta.xmission.com; ; ; ip=166.70.57.249; ; ; frm=hilarie@purplestreak.com; ; ; spf=none
X-XM-DomainKey: sender_domain=purplestreak.com; ; ; sender=hilarie@purplestreak.com; ; ; status=error
X-SA-Exim-Connect-IP: 166.70.57.249
X-SA-Exim-Mail-From: hilarie@purplestreak.com
X-Spam-DCC: XMission; sa03 1397; Body=1 Fuz1=1 Fuz2=1 
X-Spam-Combo: ;secdir@ietf.org
X-Spam-Relay-Country: 
X-SA-Exim-Version: 4.2.1 (built Fri, 06 Aug 2010 16:31:04 -0600)
X-SA-Exim-Scanned: Yes (on mx02.mta.xmission.com)
Cc: acmorton@att.com
Subject: [secdir] Security review of draft-morton-ippm-rfc4148-obsolete-03
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: Hilarie Orman <hilarie@purplestreak.com>
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 Jan 2011 18:17:49 -0000

Security review of draft-morton-ippm-rfc4148-obsolete-03

I have reviewed this document as part of the security directorate's
ongoing effort to review all IETF documents being processed by the
IESG.  These comments were written primarily for the benefit of the
security area directors.  Document editors and WG chairs should treat
these comments just like any other last call comments.

The abstract explains the reasons for abandoning IPPM:

   This memo reclassifies RFC 4148, the IP Performance Metrics (IPPM)
   Registry as Obsolete, and withdraws the IANA IPPM Metrics Registry
   itself from use because it is obsolete.  The current registry
   structure has been found to be insufficiently detailed to uniquely
   identify IPPM metrics.  Despite apparent efforts to find current or
   even future users, no one has responded to the call for interest in
   the RFC 4148 registry during the second half of 2010.

I don't see any security impacts of this action, and I did read
the "security considerations", which I hope will be withdrawn before
submission to the RFC editor.

Hilarie

From tena@huawei.com  Tue Jan 25 13:27:33 2011
Return-Path: <tena@huawei.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E9A543A68B1; Tue, 25 Jan 2011 13:27:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.237
X-Spam-Level: 
X-Spam-Status: No, score=-106.237 tagged_above=-999 required=5 tests=[AWL=0.362, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6s2su1Enpefb; Tue, 25 Jan 2011 13:27:32 -0800 (PST)
Received: from usaga02-in.huawei.com (usaga02-in.huawei.com [206.16.17.70]) by core3.amsl.com (Postfix) with ESMTP id 8D3B43A68C6; Tue, 25 Jan 2011 13:27:32 -0800 (PST)
Received: from huawei.com (localhost [127.0.0.1]) by usaga02-in.huawei.com (iPlanet Messaging Server 5.2 HotFix 2.14 (built Aug 8 2006)) with ESMTP id <0LFL00KLGL2UFA@usaga02-in.huawei.com>; Tue, 25 Jan 2011 13:30:31 -0800 (PST)
Received: from TingZousc1 ([10.212.245.166]) by usaga02-in.huawei.com (iPlanet Messaging Server 5.2 HotFix 2.14 (built Aug 8 2006)) with ESMTPA id <0LFL00CLMKYGRG@usaga02-in.huawei.com>; Tue, 25 Jan 2011 13:30:30 -0800 (PST)
Date: Tue, 25 Jan 2011 13:27:56 -0800
From: Tina Tsou <tena@huawei.com>
To: ops-dir@ietf.org, secdir@ietf.org
Message-id: <01a201cbbcd7$197946c0$4c6bd440$@com>
MIME-version: 1.0
X-Mailer: Microsoft Office Outlook 12.0
Content-type: text/plain; charset=ISO-8859-1
Content-language: en-us
Content-transfer-encoding: quoted-printable
Thread-index: Acu81rPbyWvC8QjGT6iixeTbXkVESw==
x-cr-hashedpuzzle: Kb73 N1+x QaCS SRUO X9iC a/5H iiZT ohFD ooWx pZsn pgCe tH+x uHtg xbaB yRyF 8PCf; 5; ZAByAGEAZgB0AC0AeQBtAGIAawAtAGEAcABsAHUAcwBwAEAAdABvAG8AbABzAC4AaQBlAHQAZgAuAG8AcgBnADsAaQBlAHMAZwBAAGkAZQB0AGYALgBvAHIAZwA7AGkAZQB0AGYAQABpAGUAdABmAC4AbwByAGcAOwBvAHAAcwAtAGQAaQByAEAAaQBlAHQAZgAuAG8AcgBnADsAcwBlAGMAZABpAHIAQABpAGUAdABmAC4AbwByAGcA; Sosha1_v1; 7; {94249E4E-AC6C-4722-8559-B0DA304CD2B0}; dABlAG4AYQBAAGgAdQBhAHcAZQBpAC4AYwBvAG0A; Tue, 25 Jan 2011 21:27:43 GMT; UgBlAHYAaQBlAHcAIABvAGYAIABkAHIAYQBmAHQALQB5AG0AYgBrAC0AYQBwAGwAdQBzAHAALQAwADgA
x-cr-puzzleid: {94249E4E-AC6C-4722-8559-B0DA304CD2B0}
Cc: iesg@ietf.org, draft-ymbk-aplusp@tools.ietf.org, ietf@ietf.org
Subject: [secdir] Review of draft-ymbk-aplusp-08
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 Jan 2011 21:27:34 -0000

I reviewed the document draft-ymbk-aplusp-08 in general.
=20
Operations directorate and Security directorate reviews are solicited
primarily to help the area directors improve their efficiency, =
particularly
when preparing for IESG telechats, and allowing them to focus on =
documents
requiring their attention and spend less time on the trouble-free ones.

Improving the documents is important, but clearly a secondary purpose.
A third purpose is to broaden the OpsDir reviewers' exposure to work =
going
on in other parts of the IETF.
=20
Reviews from OpsDir/SecDir members do not in and of themselves cause the
IESG to raise issue with a document. The reviews may, however, convince
individual IESG members to raise concern over a particular document
requiring further discussion. The reviews, particularly those conducted =
in
last call and earlier, may also help the document editors improve their
documents.
=20
-----
This document is well written, though there may be some nits.

Comment #1:
In Abstract section this draft proposes an IPv4 address sharing scheme,
treating some of the port number bits as part of an extended IPv4 =
address.
A SOHO CPE (A+P) may provide with website service. When a host in =
external
network accesses this website, what information that DNS servers =
feedback to
host? If it is an IP address, it can't uniquely identify the CPE. If it =
is
IP + port range, how can host recognize this and process? If it is IP + =
some
a Port, how can DNS server know when port changed?=20
Some Operators identify services by five elements include UDP/TCP =
well-known
ports when CPE is an unreliable device. If well-known ports changed, =
service
can't be recognized.

Comment #2:
Abstract section,
"In the face of IPv4 address exhaustion, the need for addresses is =
stronger
than the need to be able to address thousands of applications on a =
single
host."
- This viewpoint is not always true. During the transition from IPv4 to
IPv6, some set of operators do not want the services are affected, which =
may
result some customers lost. A smoothly transition technology is more
favorable.

Comment #3:
Section 1.1 says: Another issue with CGN is the trade-off between =
session
state and network placement.
- If there are too many session state to keep, two CGN or more can be
placed. A distributed CGN may be a good choice. And single point of =
failure
can be resolved

Comment #4:
In section 3.3.1, it says: different port-ranges can have different
lifetimes, and the CPE is not entitled to use them after they expire =
what is
the appropriate lifetime for a port-rang?  When for P2P application, =
many
ports are used. In a short-term period, when for some fixed service =
(e.g.
site), a port may be used for many years. Will the server allocate port
according application? Or else there is some security problem or port
efficient allocation. For the more, port allocation will make more =
burdens
for server because of large number s of ports and high frequency
requisition.

Comment #5:
SMAP (stateless A+P Mapping) is proposed in section 4.1, IPv4 address =
and
port is embedded in the IPv6 address =96 which would be used to create a
tunnel.=20
- In section 5.2, =93Dynamic Allocation of Port Ranges=94 is proposed. =
What if
the allocated ports do not belong to a single IP address? The SMAP =
mechanism
may not work in this case.=20
- The IPv6 address would follow the format defined in
[I-D.ietf-behave-address-format], but port is not included in the =
address
formats defined by that draft. Any plan to define the address format?

Here is the format defined in [I-D.ietf-behave-address-format]:


    +--+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
    |PL| 0-------------32--40--48--56--64--72--80--88--96--104---------|
    +--+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
    |32|     prefix    |v4(32)         | u | suffix                    |
    +--+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
    |40|     prefix        |v4(24)     | u |(8)| suffix                |
    +--+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
    |48|     prefix            |v4(16) | u | (16)  | suffix            |
    +--+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
    |56|     prefix                |(8)| u |  v4(24)   | suffix        |
    +--+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
    |64|     prefix                    | u |   v4(32)      | suffix    |
    +--+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
    |96|     prefix                                    |    v4(32)     |
    +--+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
					=09
						Figure 1


Comment #6:
In section 5.1.2 A+P for Mobile Providers=20
- If=A0A+P is implemented in a terminal device, e.g. mobile phone and =
PC,
there might be some problems, e.g. ARP problem =96 terminal would not be =
able
to send packets to other terminals sharing the same IP address with =
itself.=20
- Any thoughts about the solution? A new NAT layer between the IP and
TCU/UDP layer in the stack?


Comment #7:
Section 5.2, it says: mechanism can allocate a port range from another =
IP
within the same subnet.
- For example, an internal host1 communicate with an external host2. At
first CPE allocates IP1 and a port for some a session. During the
communication, more sessions are built and there are no more ports in =
IP1.
If IP2 is used for session, the packet may be discarded by host2.
There may be some errors. Where does 198.51.100.3 come? I can't find it =
in
Figure 15.



Best Regards,
Tina TSOU
http://tinatsou.weebly.com/contact.html




From new-work-bounces@ietf.org  Tue Jan 25 09:29:07 2011
Return-Path: <new-work-bounces@ietf.org>
X-Original-To: secdir@ietf.org
Delivered-To: secdir@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 043E13A686E; Tue, 25 Jan 2011 09:29:07 -0800 (PST)
X-Original-To: new-work@ietf.org
Delivered-To: new-work@core3.amsl.com
Received: by core3.amsl.com (Postfix, from userid 30) id E418A3A6841; Tue, 25 Jan 2011 09:29:04 -0800 (PST)
From: IESG Secretary <iesg-secretary@ietf.org>
To: new-work@ietf.org  
Mime-Version: 1.0
Message-Id: <20110125172904.E418A3A6841@core3.amsl.com>
Date: Tue, 25 Jan 2011 09:29:04 -0800 (PST)
X-BeenThere: new-work@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: new-work-bounces@ietf.org
Errors-To: new-work-bounces@ietf.org
X-Mailman-Approved-At: Tue, 25 Jan 2011 13:52:14 -0800
Subject: [secdir] [new-work] WG Review: Light-Weight Implementation Guidance (lwig)
X-BeenThere: secdir@ietf.org
Reply-To: iesg@ietf.org
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 Jan 2011 17:29:07 -0000

A new IETF working group has been proposed in the Internet Area.  The IESG
has not made any determination as yet. The following draft charter was
submitted, and is provided for informational purposes only. Please send
your comments to the IESG mailing list (iesg@ietf.org) by Tuesday,
February 1, 2011.               

Light-Weight Implementation Guidance (lwig)
-------------------------------------------
Current Status: Proposed Working Group
Last updated: 2011-01-23

Chairs:
  TBD

Internet Area Directors:
  Ralph Droms <rdroms.ietf@gmail.com>
  Jari Arkko <jari.arkko@piuha.net>

Internet Area Advisor:
  Jari Arkko <jari.arkko@piuha.net>

Transport Area Advisor:
  TBD

Mailing Lists:
  General Discussion: lwip@ietf.org
  To Subscribe: https://www.ietf.org/mailman/listinfo/lwip
  Archive: http://www.ietf.org/mail-archive/web/lwip

Description of Working Group:

Communications technology is being embedded into our environment.
Different types of devices in our buildings, vehicles, equipment and
other objects have a need to communicate. It is expected that most of
these devices employ the Internet Protocol suite. However, there is a
lot of variation in the capabilities between different types of devices,
and it is not always easy to embed all the necessary features. The
Light-Weight Implementation Guidance (LWIG) Working Group focuses on
helping the implementors of the smallest devices. The goal is to be able
to build minimal yet interoperable IP-capable devices for the most
constrained environments.

Building a small implementation does not have to be hard. Many small
devices use stripped down versions of general purpose operating systems
and their TCP/IP stacks. However, there are implementations that go even
further in minimization and can exist in as few as a couple of kilobytes
of code, as on some devices this level of optimization is necessary.
Technical and cost considerations may limit the computing power, battery
capacity, available memory, or communications bandwidth that can be
provided. To overcome these limitations the implementors have to employ
the right hardware and software mechanisms. For instance, certain types
of memory management or even fixed memory allocation may be required. It
is also useful to understand what is necessary from the point of view of
the communications protocols and the application employing them. For
instance, a device that only acts as a client or only requires one
connection can simplify its TCP implementation.

The purpose of the LWIG working group is to collect experiences from
existing small IP stacks with regards to protocol implementation
techniques and other details that have been useful in deployments. The
group shall focus only on techniques that have been used in actual
implementations and do not impact interoperability with other devices.
The techniques shall also not affect conformance to the relevant
specifications. The output of this work is a document that describes
implementation techniques for reducing complexity, memory footprint, or
power usage. The main focus is in the IPv4, IPv6, UDP, TCP, ICMPv4/v6,
MLD/IGMP, ND, DHCPv4/v6, IPsec, 6LOWPAN, and RPL protocols. This
document would be helpful for the implementors of new devices or for the
implementors of new general-purpose small IP stacks. It is also expected
that the document increases our knowledge of what existing small
implementations do, and helps in the further optimization of the
existing implementations. On areas where the considerations for small
implementations have already been documented the group shall make an
effort to refer to those documents instead of developing its own.

Generic hardware design advice and software implementation techniques
are outside the scope of this work, as such expertise is not within the
IETF domain. Protocol implementation experience, however, is within the
IETF domain. The group shall also not develop any new protocols or
protocol behavior modifications beyond what is already allowed by
existing RFCs, because it is important to ensure that different types of
devices can work together. The group shall not develop assumptions or
profiles about the operating environment of the devices, because, in
general, it is not possible to guarantee any special configuration.
Finally, while implementation techniques relating to security mechanisms
are within scope, mere removal of security functionality from a protocol
is not an acceptable recommendation.

Given that the group works on both IP and transport layer protocols it
is necessary to ensure that expertise in both aspects is present in the
group. Participation from the implementors of existing small IP stacks
is also required.

Milestones:

Feb 2011 Design team of experts and a document editor recruited
Aug 2011 First version of the implementation guidance document submitted
Mar 2012 Submit the implementation guidance document to the IESG for
         publication as an Informational RFC
_______________________________________________
new-work mailing list
new-work@ietf.org
https://www.ietf.org/mailman/listinfo/new-work

From randy@psg.com  Tue Jan 25 13:47:46 2011
Return-Path: <randy@psg.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D34353A68C0; Tue, 25 Jan 2011 13:47:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tb+oBhACSlPP; Tue, 25 Jan 2011 13:47:46 -0800 (PST)
Received: from ran.psg.com (ran.psg.com [IPv6:2001:418:1::36]) by core3.amsl.com (Postfix) with ESMTP id F0A0D3A68BC; Tue, 25 Jan 2011 13:47:45 -0800 (PST)
Received: from localhost ([127.0.0.1] helo=rmac.psg.com.psg.com) by ran.psg.com with esmtp (Exim 4.72 (FreeBSD)) (envelope-from <randy@psg.com>) id 1Phqme-000Huc-5o; Tue, 25 Jan 2011 21:50:40 +0000
Date: Wed, 26 Jan 2011 06:50:39 +0900
Message-ID: <m2vd1cr6ts.wl%randy@psg.com>
From: Randy Bush <randy@psg.com>
To: Tina Tsou <tena@huawei.com>
In-Reply-To: <01a201cbbcd7$197946c0$4c6bd440$@com>
References: <01a201cbbcd7$197946c0$4c6bd440$@com>
User-Agent: Wanderlust/2.15.9 (Almost Unreal) Emacs/22.3 Mule/5.0 (SAKAKI)
MIME-Version: 1.0 (generated by SEMI 1.14.6 - "Maruoka")
Content-Type: text/plain; charset=US-ASCII
X-Mailman-Approved-At: Tue, 25 Jan 2011 13:52:13 -0800
Cc: ops-dir@ietf.org, ietf@ietf.org, iesg@ietf.org, draft-ymbk-aplusp@tools.ietf.org, secdir@ietf.org
Subject: Re: [secdir] Review of draft-ymbk-aplusp-08
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 Jan 2011 21:47:47 -0000

> Operations directorate and Security directorate reviews are solicited
> primarily to help the area directors improve their efficiency, particularly
> when preparing for IESG telechats, and allowing them to focus on documents
> requiring their attention and spend less time on the trouble-free ones.

and which are you?  can't be ops, as you are a vendor.  so security?
but we already received the security review.

but thanks for the review anyway.

randy, a bit confused

From new-work-bounces@ietf.org  Tue Jan 25 20:50:30 2011
Return-Path: <new-work-bounces@ietf.org>
X-Original-To: secdir@ietf.org
Delivered-To: secdir@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 1B8F43A68FD; Tue, 25 Jan 2011 20:50:30 -0800 (PST)
X-Original-To: new-work@core3.amsl.com
Delivered-To: new-work@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 567403A68FD for <new-work@core3.amsl.com>; Tue, 25 Jan 2011 20:50:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.599
X-Spam-Level: 
X-Spam-Status: No, score=-10.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dPZS4WZiTq0V for <new-work@core3.amsl.com>; Tue, 25 Jan 2011 20:50:28 -0800 (PST)
Received: from jay.w3.org (ssh.w3.org [128.30.52.60]) by core3.amsl.com (Postfix) with ESMTP id 8703A3A689B for <new-work@ietf.org>; Tue, 25 Jan 2011 20:50:28 -0800 (PST)
Received: from localhost ([127.0.0.1] helo=[IPv6:::1]) by jay.w3.org with esmtp (Exim 4.69) (envelope-from <ij@w3.org>) id 1PhxNm-00035j-7P; Tue, 25 Jan 2011 23:53:26 -0500
Message-Id: <76F17EAA-3C07-42DE-8DD7-EA541517E88E@w3.org>
From: Ian Jacobs <ij@w3.org>
To: new-work@ietf.org
Mime-Version: 1.0 (Apple Message framework v936)
Date: Tue, 25 Jan 2011 22:53:25 -0600
X-Mailer: Apple Mail (2.936)
X-BeenThere: new-work@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"; DelSp="yes"
Sender: new-work-bounces@ietf.org
Errors-To: new-work-bounces@ietf.org
X-Mailman-Approved-At: Wed, 26 Jan 2011 14:08:15 -0800
Subject: [secdir] [new-work] Proposed W3C Charter: Audio Working Group (until	2011-02-25)
X-BeenThere: secdir@ietf.org
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 26 Jan 2011 04:50:30 -0000

Hello,

Today W3C Advisory Committee Representatives received a Proposal to  
revise the Rich Web Client Activity [0] (see the W3C Process Document  
description of Activity Proposals [1]). This proposal includes a draft  
charter for the Audio Working Group:
   http://www.w3.org/2010/12/audio-wg-charter

As part of ensuring that the community is aware of proposed work at  
W3C, this draft charter is public during the Advisory Committee review  
period.

W3C invites public comments through 2011-02-25 on the proposed  
charter. Please send comments to
public-new-work@w3.org, which has a public archive:
   http://lists.w3.org/Archives/Public/public-new-work/

Other than comments sent in formal responses by W3C Advisory Committee  
Representatives, W3C cannot guarantee a response to comments. If you  
work for a W3C Member [2], please coordinate your comments with your  
Advisory Committee Representative. For example, you may wish to make  
public comments via this list and have your Advisory Committee  
Representative refer to it from his or her formal review comments.

If you should have any questions or need further information, please  
contact Doug Schepers, Team Contact <schepers@w3.org>.

Thank you,

Ian Jacobs, Head of W3C Communications

[0] http://www.w3.org/2006/rwc/Activity
[1]
http://www.w3.org/2005/10/Process-20051014/activities#ActivityCreation
[2] http://www.w3.org/Consortium/Member/List
--
Ian Jacobs (ij@w3.org)    http://www.w3.org/People/Jacobs/
Tel:                                      +1 718 260 9447

_______________________________________________
new-work mailing list
new-work@ietf.org
https://www.ietf.org/mailman/listinfo/new-work

From tena@huawei.com  Wed Jan 26 14:47:21 2011
Return-Path: <tena@huawei.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 88D563A69EB; Wed, 26 Jan 2011 14:47:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.251
X-Spam-Level: 
X-Spam-Status: No, score=-106.251 tagged_above=-999 required=5 tests=[AWL=0.348, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0MdE4+9WBvCZ; Wed, 26 Jan 2011 14:47:20 -0800 (PST)
Received: from usaga02-in.huawei.com (usaga02-in.huawei.com [206.16.17.70]) by core3.amsl.com (Postfix) with ESMTP id 7F6803A69DD; Wed, 26 Jan 2011 14:47:20 -0800 (PST)
Received: from huawei.com (localhost [127.0.0.1]) by usaga02-in.huawei.com (iPlanet Messaging Server 5.2 HotFix 2.14 (built Aug 8 2006)) with ESMTP id <0LFN00J8EJFXKY@usaga02-in.huawei.com>; Wed, 26 Jan 2011 14:50:21 -0800 (PST)
Received: from TingZousc1 ([10.212.246.230]) by usaga02-in.huawei.com (iPlanet Messaging Server 5.2 HotFix 2.14 (built Aug 8 2006)) with ESMTPA id <0LFN00M4CJFQNG@usaga02-in.huawei.com>; Wed, 26 Jan 2011 14:50:21 -0800 (PST)
Date: Wed, 26 Jan 2011 14:50:18 -0800
From: Tina Tsou <tena@huawei.com>
In-reply-to: <m2vd1cr6ts.wl%randy@psg.com>
To: 'Randy Bush' <randy@psg.com>
Message-id: <001701cbbdab$6b3ce000$41b6a000$@com>
MIME-version: 1.0
X-Mailer: Microsoft Office Outlook 12.0
Content-type: text/plain; charset=us-ascii
Content-language: en-us
Content-transfer-encoding: 7BIT
Thread-index: Acu82qXBYG9862qhTTOT3oPTAW8HiQA0AorA
References: <01a201cbbcd7$197946c0$4c6bd440$@com> <m2vd1cr6ts.wl%randy@psg.com>
Cc: ops-dir@ietf.org, ietf@ietf.org, iesg@ietf.org, draft-ymbk-aplusp@tools.ietf.org, secdir@ietf.org
Subject: Re: [secdir] Review of draft-ymbk-aplusp-08
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 26 Jan 2011 22:47:21 -0000

Best Regards,
Tina TSOU
http://tinatsou.weebly.com/contact.html


-----Original Message-----
From: Randy Bush [mailto:randy@psg.com] 
Sent: Tuesday, January 25, 2011 1:51 PM
To: Tina Tsou
Cc: ops-dir@ietf.org; secdir@ietf.org; draft-ymbk-aplusp@tools.ietf.org;
iesg@ietf.org; ietf@ietf.org
Subject: Re: Review of draft-ymbk-aplusp-08

> Operations directorate and Security directorate reviews are solicited
> primarily to help the area directors improve their efficiency,
particularly
> when preparing for IESG telechats, and allowing them to focus on documents
> requiring their attention and spend less time on the trouble-free ones.

and which are you?  can't be ops, as you are a vendor.  so security?
but we already received the security review.
[Tina:
I know the author is my friend Randy, so I have to be very careful ;-)

I'm a member and also the secretary of Operations directorate.
Here is the wiki page for the Operations directorate.
http://trac.tools.ietf.org/area/ops/trac/wiki/Directorates
You can see many of us do not have the affiliation of operators.
I did the additional review besides the allocated member's review.

I'm also a member of Security directorate.
I did the additional review besides the allocated member's review.

Hope it clarifies.
]

but thanks for the review anyway.

randy, a bit confused


From clonvick@cisco.com  Wed Jan 26 18:47:28 2011
Return-Path: <clonvick@cisco.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 16CF43A6906; Wed, 26 Jan 2011 18:47:28 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -110.513
X-Spam-Level: 
X-Spam-Status: No, score=-110.513 tagged_above=-999 required=5 tests=[AWL=0.086, BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Qf4aU9HSaRvr; Wed, 26 Jan 2011 18:47:27 -0800 (PST)
Received: from sj-iport-6.cisco.com (sj-iport-6.cisco.com [171.71.176.117]) by core3.amsl.com (Postfix) with ESMTP id 5DB7A3A6A5F; Wed, 26 Jan 2011 18:47:27 -0800 (PST)
Authentication-Results: sj-iport-6.cisco.com; dkim=neutral (message not signed) header.i=none
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: Av0EAGJsQE2rR7Hu/2dsb2JhbACWXAGOIXOgW5tKhU8EhRc
Received: from sj-core-5.cisco.com ([171.71.177.238]) by sj-iport-6.cisco.com with ESMTP; 27 Jan 2011 02:50:29 +0000
Received: from sjc-cde-011.cisco.com (sjc-cde-011.cisco.com [171.69.16.68]) by sj-core-5.cisco.com (8.13.8/8.14.3) with ESMTP id p0R2oTAp029783; Thu, 27 Jan 2011 02:50:29 GMT
Date: Wed, 26 Jan 2011 18:50:29 -0800 (PST)
From: Chris Lonvick <clonvick@cisco.com>
To: iesg@ietf.org, secdir@ietf.org, draft-cheshire-dnsext-special-names.all@tools.ietf.org
Message-ID: <Pine.GSO.4.63.1101261815430.3620@sjc-cde-011.cisco.com>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII; format=flowed
Subject: [secdir] SECDIR review of draft-cheshire-dnsext-special-names-01.txt
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 27 Jan 2011 02:47:28 -0000

Hi,

I have reviewed this document as part of the security directorate's
ongoing effort to review all IETF documents being processed by the
IESG.  These comments were written primarily for the benefit of the
security area directors.  Document editors and WG chairs should treat
these comments just like any other last call comments.

Overall, the document appears to be well written and I havn't found any 
security concerns with it.

I will bring up a couple of nits that the authors may want to address.

The use of the term "carve" may not be well understood by non-native 
English speakers.  Perhaps using the term "reserved" would be better.

in the IANA section, shouldn't the IESG perform the check that your 7 
questions are answered appropriately?

Along those lines, since you give examples of special-use domain names, 
wouldn't it be appropriate to start the IANA registry with those?

The last lines of section 2 are:
    processes, that process should be used. Reservation of a Special-Use
    Domain Names is not a mechanism for circumventing normal domain name
    registration processes.
I'd s/Names/Name/

Regards,
Chris

From kent@bbn.com  Thu Jan 27 08:26:46 2011
Return-Path: <kent@bbn.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 196EB3A690D for <secdir@core3.amsl.com>; Thu, 27 Jan 2011 08:26:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.412
X-Spam-Level: 
X-Spam-Status: No, score=-102.412 tagged_above=-999 required=5 tests=[AWL=0.186, BAYES_00=-2.599, HTML_MESSAGE=0.001, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LETj-lZyPB4b for <secdir@core3.amsl.com>; Thu, 27 Jan 2011 08:26:44 -0800 (PST)
Received: from smtp.bbn.com (smtp.bbn.com [128.33.1.81]) by core3.amsl.com (Postfix) with ESMTP id E873C3A690A for <secdir@ietf.org>; Thu, 27 Jan 2011 08:26:43 -0800 (PST)
Received: from [192.1.255.194] (port=49192) by smtp.bbn.com with esmtp (Exim 4.71 (FreeBSD)) (envelope-from <kent@bbn.com>) id 1PiUjD-000Gpj-KS; Thu, 27 Jan 2011 11:29:47 -0500
Mime-Version: 1.0
Message-Id: <p06240809c9674d216edd@[192.1.255.194]>
Date: Thu, 27 Jan 2011 11:29:43 -0500
To: secdir@ietf.org
From: Stephen Kent <kent@bbn.com>
Content-Type: multipart/alternative; boundary="============_-915976709==_ma============"
Cc: ars.eggert@nokia.com, jari.arkko@piuha.net, Ralph Droms <rdroms.ietf@gmail.com>
Subject: [secdir] review of draft-arkko-dual-stack-extra-lite-03
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 27 Jan 2011 16:26:46 -0000

--============_-915976709==_ma============
Content-Type: text/plain; charset="us-ascii" ; format="flowed"

I reviewed this document as part of the security directorate's 
ongoing effort to review all IETF documents being processed by the 
IESG.  These comments were written primarily for the benefit of the 
security area directors.  Document editors and WG chairs should treat 
these comments just like any other last call comments.

This is a very brief (8-page) document. It defines how to employ 
address translation (NAT) to serve a large (> 2^24) user population 
without making use of a large private address space. Thus the focus 
here is a bit different from the usual NAT context, where one uses a 
large-enough private address space behind a NAT, and maps that space 
into a smaller (typically IPV4) address space on the other side of a 
NAT.

The authors review several other approaches to dealing with the 
problem, as a prelude to presenting the proposed solution. The 
solution put forth here is applicable to nets where each endpoint has 
a point-to-point link to a NAT (vs. a broadcast net). The authors 
note that if tunneling is already being used to connect endpoints to 
a gateway/NAT, this technique also is applicable. In either case the 
NAT maintains a map between the overlapping private address spaces 
and the public space by associating a network interface ID (as well 
as the private IP address) with each endpoint.

The authors recommend employing their solution for dealing with the 
IPv4 addresses that need to be associated with endpoints in the dual 
stack [RFC 4213] deployment model for IPv6. They also note that their 
proposal could be used in another IPv6 deployment model 
[I-D.ietf-behave-v6v4-xlate-stateful], but that it probably is not 
necessary there, because of the abundance of IPv6 address space.

The security considerations section is but one sentence: "This 
practices outlined in this document do not affect the security 
properties of address translation." I think this needs to be expanded 
upon :. The authors should cite at least one RFC that deals with NAT 
and has sustentative security considerations section. If they can't 
find a suitable RFC (2993 is the obvious candidate, but it is 
outdated in several of its references and comments) then they at 
least describe why they believe that this proposal introduces no new 
security implications.
--============_-915976709==_ma============
Content-Type: text/html; charset="us-ascii"

<!doctype html public "-//W3C//DTD W3 HTML//EN">
<html><head><style type="text/css"><!--
blockquote, dl, ul, ol, li { padding-top: 0 ; padding-bottom: 0 }
 --></style><title>review of
draft-arkko-dual-stack-extra-lite-03</title></head><body>
<div><font color="#000000">I reviewed this document as part of the
security directorate's ongoing effort to review all IETF documents
being processed by the IESG.&nbsp; These comments were written
primarily for the benefit of the security area directors.&nbsp;
Document editors and WG chairs should treat these comments just like
any other last call comments.<br>
<br>
This is a very brief (8-page) document. It defines how to employ
address translation (NAT) to serve a large (&gt; 2^24) user population
without making use of a large private address space. Thus the focus
here is a bit different from the usual NAT context, where one uses a
large-enough private address space behind a NAT, and maps that space
into a smaller (typically IPV4) address space on the other side of a
NAT.<br>
<br>
The authors review several other approaches to dealing with the
problem, as a prelude to presenting the proposed solution. The
solution put forth here is applicable to nets where each endpoint has
a point-to-point link to a NAT (vs. a broadcast net). The authors note
that if tunneling is already being used to connect endpoints to a
gateway/NAT, this technique also is applicable. In either case the NAT
maintains a map between the overlapping private address spaces and the
public space by associating a network interface ID (as well as the
private IP address) with each endpoint.<br>
<br>
The authors recommend employing their solution for dealing with the
IPv4 addresses that need to be associated with endpoints in the dual
stack [RFC 4213] deployment model for IPv6. They also note that their
proposal could be used in another IPv6 deployment model
[I-D.ietf-behave-v6v4-xlate-stateful], but that it probably is not
necessary there, because of the abundance of IPv6 address space.<br>
<br>
The security considerations section is but one sentence: "This
practices outlined in this document do not affect the security
properties of address translation." I think this needs to be
expanded upon<font face="Wingdings"> :</font>. The authors should cite
at least one RFC that deals with NAT and has sustentative security
considerations section. If they can't find a suitable RFC (2993 is the
obvious candidate, but it is outdated in several of its references and
comments) then they at least describe why they believe that this
proposal introduces no new security implications.</font></div>
</body>
</html>
--============_-915976709==_ma============--

From randy@psg.com  Wed Jan 26 15:31:05 2011
Return-Path: <randy@psg.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E41013A69FB; Wed, 26 Jan 2011 15:31:05 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uGu5zEWhrbXs; Wed, 26 Jan 2011 15:31:05 -0800 (PST)
Received: from ran.psg.com (ran.psg.com [IPv6:2001:418:1::36]) by core3.amsl.com (Postfix) with ESMTP id C4A963A69FA; Wed, 26 Jan 2011 15:31:04 -0800 (PST)
Received: from localhost ([127.0.0.1] helo=rmac.psg.com.psg.com) by ran.psg.com with esmtp (Exim 4.72 (FreeBSD)) (envelope-from <randy@psg.com>) id 1PiEsD-000LkQ-Ow; Wed, 26 Jan 2011 23:34:01 +0000
Date: Thu, 27 Jan 2011 08:34:06 +0900
Message-ID: <m24o8vp7dd.wl%randy@psg.com>
From: Randy Bush <randy@psg.com>
To: Tina Tsou <tena@huawei.com>
In-Reply-To: <001701cbbdab$6b3ce000$41b6a000$@com>
References: <01a201cbbcd7$197946c0$4c6bd440$@com> <m2vd1cr6ts.wl%randy@psg.com> <001701cbbdab$6b3ce000$41b6a000$@com>
User-Agent: Wanderlust/2.15.9 (Almost Unreal) Emacs/22.3 Mule/5.0 (SAKAKI)
MIME-Version: 1.0 (generated by SEMI 1.14.6 - "Maruoka")
Content-Type: text/plain; charset=US-ASCII
X-Mailman-Approved-At: Fri, 28 Jan 2011 09:08:42 -0800
Cc: ops-dir@ietf.org, ietf@ietf.org, iesg@ietf.org, draft-ymbk-aplusp@tools.ietf.org, secdir@ietf.org
Subject: Re: [secdir] Review of draft-ymbk-aplusp-08
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 26 Jan 2011 23:31:06 -0000

> I'm a member and also the secretary of Operations directorate.

the ops dir is a joke.  does reviews for an area director who does not
do his/her own?

there is an ops cabal that meets at ietf and has ML etc.  all actual ops
except for one guest, the actual ops director, ron.

> http://trac.tools.ietf.org/area/ops/trac/wiki/Directorates
> You can see many of us do not have the affiliation of operators.

welcome to the ietf

> I'm also a member of Security directorate.

must be fun.

randy

From j.schoenwaelder@jacobs-university.de  Fri Jan 28 12:38:52 2011
Return-Path: <j.schoenwaelder@jacobs-university.de>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id AE4C83A6876; Fri, 28 Jan 2011 12:38:52 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -103.118
X-Spam-Level: 
X-Spam-Status: No, score=-103.118 tagged_above=-999 required=5 tests=[AWL=0.131, BAYES_00=-2.599, HELO_EQ_DE=0.35, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5UKZicY6qm+g; Fri, 28 Jan 2011 12:38:51 -0800 (PST)
Received: from hermes.jacobs-university.de (hermes.jacobs-university.de [212.201.44.23]) by core3.amsl.com (Postfix) with ESMTP id 83E4C3A680E; Fri, 28 Jan 2011 12:38:51 -0800 (PST)
Received: from localhost (demetrius2.jacobs-university.de [212.201.44.47]) by hermes.jacobs-university.de (Postfix) with ESMTP id EDCD2C0045; Fri, 28 Jan 2011 21:41:57 +0100 (CET)
X-Virus-Scanned: amavisd-new at jacobs-university.de
Received: from hermes.jacobs-university.de ([212.201.44.23]) by localhost (demetrius2.jacobs-university.de [212.201.44.32]) (amavisd-new, port 10024) with ESMTP id wpFONHENNrMG; Fri, 28 Jan 2011 21:41:57 +0100 (CET)
Received: from elstar.local (elstar.iuhb02.iu-bremen.de [10.50.231.133]) by hermes.jacobs-university.de (Postfix) with ESMTP id 9306CC0054; Fri, 28 Jan 2011 21:41:46 +0100 (CET)
Received: by elstar.local (Postfix, from userid 501) id 248BC1633032; Fri, 28 Jan 2011 21:41:46 +0100 (CET)
Date: Fri, 28 Jan 2011 21:41:46 +0100
From: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
To: iesg@ietf.org, secdir@ietf.org, draft-bryan-metalinkhttp.all@tools.ietf.org
Message-ID: <20110128204146.GA24446@elstar.local>
Mail-Followup-To: iesg@ietf.org, secdir@ietf.org, draft-bryan-metalinkhttp.all@tools.ietf.org
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.5.21 (2010-09-15)
Subject: [secdir] secdir review of draft-bryan-metalinkhttp-19.txt
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 28 Jan 2011 20:38:52 -0000

I have reviewed this document as part of the security directorate's
ongoing effort to review all IETF documents being processed by the
IESG.  These comments were written primarily for the benefit of the
security area directors.  Document editors and WG chairs should treat
these comments just like any other last call comments.

Metalink provides meta information about resources such as locations
where copies can be found or checksums. This specification defines how
Metalink data can be transported as HTTP header lines. The document is
generally easy to follow. The security considerations seem to be short
but appropriate.

That said, it seems the text in section 3 is not final in the sense
that there might still be an open issue, although there is also text
that says that it is up to the server to decide how many Link headers
to send. The fix might be as simple as removing the following text:

   [[Some organizations have many mirrors.  Only send a few mirrors, or
   only use the Link header fields if Want-Digest is used?]]

But then Appendix C lists this again as an open issue, together with a
question whether partial hashes should be carried in HTTP as
well. Perhaps the answer is "no" and this is just an old open issue
item - I can't judge.

Editorial nits:

- p1: s/althought/although/

- p7: s/fieldss/fields/

- p10: s/fieldss/fields/

- p11: s/fieldss/fields/

- p11: s/fieldss/fields/

- p11: s/syncronisation/synchronisation

- p12: s/cyptographic/cryptographic

- p13: s/fieldss/fields/

- p15: s/reponse/response/

/js

-- 
Juergen Schoenwaelder           Jacobs University Bremen gGmbH
Phone: +49 421 200 3587         Campus Ring 1, 28759 Bremen, Germany
Fax:   +49 421 200 3103         <http://www.jacobs-university.de/>

From anthonybryan@gmail.com  Sat Jan 29 22:38:11 2011
Return-Path: <anthonybryan@gmail.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 147413A6925; Sat, 29 Jan 2011 22:38:11 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.626
X-Spam-Level: 
X-Spam-Status: No, score=-3.626 tagged_above=-999 required=5 tests=[AWL=-0.027, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Bbv579sUtPgb; Sat, 29 Jan 2011 22:38:09 -0800 (PST)
Received: from mail-ew0-f44.google.com (mail-ew0-f44.google.com [209.85.215.44]) by core3.amsl.com (Postfix) with ESMTP id 586133A68C8; Sat, 29 Jan 2011 22:38:09 -0800 (PST)
Received: by ewy8 with SMTP id 8so2263216ewy.31 for <multiple recipients>; Sat, 29 Jan 2011 22:41:19 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:in-reply-to:references:date :message-id:subject:from:to:content-type:content-transfer-encoding; bh=yomlNnYl37zCf1eIAug2QEa4+OlC2Zi+F0xSAPtjAoE=; b=uOdGI9Q7+kAoADHpPw23aZjrzOMktWCVCFkq2Hpx569uEUKnPBHmyBVInlQj9nq+6W rn5HR56H4tiAUeYeeRBFMVKcEr5XWmByeS4Y0zmr0t7NC0heUiuvrY/RYHS91TYY5Cyw np3OQ1Y9VFx1pPbLRuWqb+Z+OxZsPVyqO35wY=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :content-type:content-transfer-encoding; b=rANPhv37Qt9I8nP5FKporwxEyS9fIcY6ZuhG5X7WJzCkqycS5NKg4ful4qZOtg14vm 8TRXbXQS1ubsgahFR8SoIZozDR2++A6dR8Qiw5fzlEWHn/zzwSo4VYIPLi1vRhJfTnaZ k6LQtIFNBHk8D2Sox3K2GQk9G7hfclJ5sNYAo=
MIME-Version: 1.0
Received: by 10.213.22.209 with SMTP id o17mr6959305ebb.41.1296369678666; Sat, 29 Jan 2011 22:41:18 -0800 (PST)
Received: by 10.213.98.69 with HTTP; Sat, 29 Jan 2011 22:41:18 -0800 (PST)
In-Reply-To: <20110128204146.GA24446@elstar.local>
References: <20110128204146.GA24446@elstar.local>
Date: Sun, 30 Jan 2011 01:41:18 -0500
Message-ID: <AANLkTim=iQzqM5pwdhQAmToVNjw3EHUWvTfAEPYJ5QWo@mail.gmail.com>
From: Anthony Bryan <anthonybryan@gmail.com>
To: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>, iesg@ietf.org, secdir@ietf.org, draft-bryan-metalinkhttp.all@tools.ietf.org
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
Subject: Re: [secdir] secdir review of draft-bryan-metalinkhttp-19.txt
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 30 Jan 2011 06:38:11 -0000

On Fri, Jan 28, 2011 at 3:41 PM, Juergen Schoenwaelder
<j.schoenwaelder@jacobs-university.de> wrote:
> I have reviewed this document as part of the security directorate's
> ongoing effort to review all IETF documents being processed by the
> IESG. =A0These comments were written primarily for the benefit of the
> security area directors. =A0Document editors and WG chairs should treat
> these comments just like any other last call comments.
>
> Metalink provides meta information about resources such as locations
> where copies can be found or checksums. This specification defines how
> Metalink data can be transported as HTTP header lines. The document is
> generally easy to follow. The security considerations seem to be short
> but appropriate.
>
> That said, it seems the text in section 3 is not final in the sense
> that there might still be an open issue, although there is also text
> that says that it is up to the server to decide how many Link headers
> to send. The fix might be as simple as removing the following text:
>
> =A0 [[Some organizations have many mirrors. =A0Only send a few mirrors, o=
r
> =A0 only use the Link header fields if Want-Digest is used?]]
>
> But then Appendix C lists this again as an open issue, together with a
> question whether partial hashes should be carried in HTTP as
> well. Perhaps the answer is "no" and this is just an old open issue
> item - I can't judge.

yes, old issue. I've removed the text.

> Editorial nits:
>
> - p1: s/althought/although/
>
> - p7: s/fieldss/fields/
>
> - p10: s/fieldss/fields/
>
> - p11: s/fieldss/fields/
>
> - p11: s/fieldss/fields/
>
> - p11: s/syncronisation/synchronisation
>
> - p12: s/cyptographic/cryptographic
>
> - p13: s/fieldss/fields/
>
> - p15: s/reponse/response/

eep! I've fixed all those typos.

thanks, Juergen.

--=20
(( Anthony Bryan ... Metalink [ http://www.metalinker.org ]
=A0 )) Easier, More Reliable, Self Healing Downloads

From gwz@net-zen.net  Sun Jan 30 03:55:00 2011
Return-Path: <gwz@net-zen.net>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D22D23A6977 for <secdir@core3.amsl.com>; Sun, 30 Jan 2011 03:55:00 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -103.636
X-Spam-Level: 
X-Spam-Status: No, score=-103.636 tagged_above=-999 required=5 tests=[AWL=0.963, BAYES_00=-2.599, GB_I_LETTER=-2, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iLnAqBhUpeaC for <secdir@core3.amsl.com>; Sun, 30 Jan 2011 03:55:00 -0800 (PST)
Received: from smtpauth20.prod.mesa1.secureserver.net (smtpauth20.prod.mesa1.secureserver.net [64.202.165.36]) by core3.amsl.com (Postfix) with SMTP id 02D0D3A6973 for <secdir@ietf.org>; Sun, 30 Jan 2011 03:54:59 -0800 (PST)
Received: (qmail 9082 invoked from network); 30 Jan 2011 11:58:10 -0000
Received: from unknown (124.122.190.93) by smtpauth20.prod.mesa1.secureserver.net (64.202.165.36) with ESMTP; 30 Jan 2011 11:58:08 -0000
From: "Glen Zorn" <gwz@net-zen.net>
To: <secdir@ietf.org>, <Michael.Groves@cesg.gsi.gov.uk>, <iesg@ietf.org>, <ietf@ietf.org>
Date: Sun, 30 Jan 2011 18:57:44 +0700
Organization: Network Zen
Message-ID: <000001cbc074$eb1b10f0$c15132d0$@net>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Office Outlook 12.0
Thread-Index: AcvAdODyYgmg4dzFQJWjFf21rT3diA==
Content-Language: en-us
Subject: [secdir] secdir review of draft-groves-mikey-sakke-00
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 30 Jan 2011 11:55:00 -0000

I have reviewed this document as part of the security directorate's ongoing
effort to review all IETF documents being processed by the IESG.  These
comments were written primarily for the benefit of the security area
directors.  Document editors and WG chairs should treat these comments just
like any other last call comments.

EDITORIAL COMMENTS

In the Abstract, the acronym IDPKC doesn't match the capitalized letters in
its expansion.  Suggestion: s/Identifier-based Public Key
Cryptography/Identifier-Based Public Key Cryptography/

In section 1, paragraph 2, s/legislation/legislations/.

Why is the word "identifier" (and variants) persistently capitalized?  It
doesn't appear to be being used as a proper noun.

In the title of section 2, s/Mode;/Mode:/.

In section 2.1, paragraph 1, the acronym "TGK" is not expanded on first use.

There is no IANA Considerations section, FULL STOP.




From sra@hactrn.net  Sun Jan 30 14:44:58 2011
Return-Path: <sra@hactrn.net>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D54823A6B48; Sun, 30 Jan 2011 14:44:58 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -99.76
X-Spam-Level: 
X-Spam-Status: No, score=-99.76 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, DATE_IN_PAST_06_12=1.069, FH_HOST_EQ_D_D_D_D=0.765, RCVD_IN_PBL=0.905, RDNS_DYNAMIC=0.1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id P+gAWpgpcrDJ; Sun, 30 Jan 2011 14:44:58 -0800 (PST)
Received: from cyteen.hactrn.net (cyteen.hactrn.net [IPv6:2002:425c:4242:0:210:5aff:fe86:1f54]) by core3.amsl.com (Postfix) with ESMTP id D669F3A6B44; Sun, 30 Jan 2011 14:44:57 -0800 (PST)
Received: from angband.hactrn.net (host-174-45-45-87.gdj-co.client.bresnan.net [174.45.45.87]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client CN "angband.hactrn.net", Issuer "Grunchweather Associates" (verified OK)) by cyteen.hactrn.net (Postfix) with ESMTPS id 5ECF628451; Sun, 30 Jan 2011 22:48:06 +0000 (UTC)
Received: from angband.hactrn.net (localhost [IPv6:::1]) by angband.hactrn.net (Postfix) with ESMTP id 9D8FD15ED25; Sun, 30 Jan 2011 13:17:09 +0000 (UTC)
Date: Sun, 30 Jan 2011 08:17:09 -0500
From: Rob Austein <sra@hactrn.net>
To: iesg@ietf.org, secdir@ietf.org, draft-salowey-secsh-uri.all@tools.ietf.org
MIME-Version: 1.0 (generated by SEMI 1.14.6 - "Maruoka")
Content-Type: text/plain; charset=US-ASCII
Message-Id: <20110130131709.9D8FD15ED25@angband.hactrn.net>
Subject: [secdir] Review of draft-salowey-secsh-uri-00.txt
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 30 Jan 2011 22:44:59 -0000

I have reviewed this document as part of the security directorate's
ongoing effort to review all IETF documents being processed by the
IESG.  These comments were written primarily for the benefit of the
security area directors.  Document editors and WG chairs should treat
these comments just like any other last call comments.

This draft defines URI syntax and semantics for ssh.  The proposed
mechanism is straightforward, and the authors have shown laudable
restraint in defining only the minimum necessary to do the job.

I have no serious security concerns regarding this document, but did
notice one omission: the (otherwise quite good) discussion of the
fingerprint option gives no guidance on interaction with RFC 4255.
Such a discussion need not be very long (a paragraph would do), but
should cover both the presence and absence of a verified DNSSEC
signature for the SSHFP RRset, as the recommendations presumably will
be different for those two cases.

From sra@hactrn.net  Sun Jan 30 14:44:59 2011
Return-Path: <sra@hactrn.net>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E88733A6B44; Sun, 30 Jan 2011 14:44:58 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -100.295
X-Spam-Level: 
X-Spam-Status: No, score=-100.295 tagged_above=-999 required=5 tests=[AWL=0.534, BAYES_00=-2.599, FH_HOST_EQ_D_D_D_D=0.765, RCVD_IN_PBL=0.905, RDNS_DYNAMIC=0.1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mwIpiqTNu-pp; Sun, 30 Jan 2011 14:44:58 -0800 (PST)
Received: from cyteen.hactrn.net (cyteen.hactrn.net [IPv6:2002:425c:4242:0:210:5aff:fe86:1f54]) by core3.amsl.com (Postfix) with ESMTP id D66E63A6B47; Sun, 30 Jan 2011 14:44:57 -0800 (PST)
Received: from angband.hactrn.net (host-174-45-45-87.gdj-co.client.bresnan.net [174.45.45.87]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client CN "angband.hactrn.net", Issuer "Grunchweather Associates" (verified OK)) by cyteen.hactrn.net (Postfix) with ESMTPS id 9AC052846B; Sun, 30 Jan 2011 22:48:06 +0000 (UTC)
Received: from angband.hactrn.net (localhost [IPv6:::1]) by angband.hactrn.net (Postfix) with ESMTP id 75A0915ED88; Sun, 30 Jan 2011 13:48:10 +0000 (UTC)
Date: Sun, 30 Jan 2011 08:48:09 -0500
From: Rob Austein <sra@hactrn.net>
To: iesg@ietf.org, secdir@ietf.org, draft-ietf-6man-prefixlen-p2p.all@tools.ietf.org
MIME-Version: 1.0 (generated by SEMI 1.14.6 - "Maruoka")
Content-Type: text/plain; charset=US-ASCII
Message-Id: <20110130134810.75A0915ED88@angband.hactrn.net>
Subject: [secdir] Review of draft-ietf-6man-prefixlen-p2p-01
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 30 Jan 2011 22:44:59 -0000

I have reviewed this document as part of the security directorate's
ongoing effort to review all IETF documents being processed by the
IESG.  These comments were written primarily for the benefit of the
security area directors.  Document editors and WG chairs should treat
these comments just like any other last call comments.

This draft discusses several reasons why the recommendations against
using 127-bit prefixes on inter-router IPv6 point-to-point links in
the current RFCs are not merely specious but actively harmful, and
details several attack scenarios in which 127-bit prefixes on
inter-router point-to-point links are a better defense than anything
that can be done with 64-bit prefixes.  The draft concludes by
requiring (if this draft is adopted) router support for 127-bit
prefixes and makes some recommendations on how to avoid having use of
127-bit prefixes cause problems with other IPv6 implementations.

I have no security concerns regarding this document.  Should have done
this years ago, and the authors of this draft deserve our thanks for
their perseverance.
