Thank you for the edits and for letting me know the new version was ready. Best regards, Kathleen
On Sun, Mar 1, 2015 at 12:47 PM, Ersue, Mehmet (Nokia - DE/Munich) < mehmet.er...@nokia.com> wrote: > Dear Kathleen, > > > > just to inform you, we uploaded the agreed changes as > draft-ietf-opsawg-coman-probstate-reqs-05.txt. > > > > Cheers, > Mehmet > > > > *From:* ext Kathleen Moriarty [mailto:kathleen.moriarty.i...@gmail.com] > *Sent:* Thursday, February 26, 2015 9:14 PM > *To:* Juergen Schoenwaelder; Kathleen Moriarty; The IESG; opsawg@ietf.org; > Warren Kumari; draft-ietf-opsawg-coman-probstate-reqs....@ietf.org; > opsawg-cha...@ietf.org > *Subject:* Re: Kathleen Moriarty's Discuss on > draft-ietf-opsawg-coman-probstate-reqs-04: (with DISCUSS) > > > > Hi, > > > > On Thu, Feb 26, 2015 at 3:10 PM, Juergen Schoenwaelder < > j.schoenwael...@jacobs-university.de> wrote: > > Hi, > > I am not sure what to do about this comment. My take is that the > document is primarily scoped on the management interface and 6.003 > talks about access control towards the managing system and access > control towards the managed device. > > I certainly agree that devices should be robust, bug free, have no > backdoors, be tamper resitant, etc. but then this is, in an ideal > world, true for any device. That said, there is already text in the > security considerations that devices should make sure credentials are > properly protected. Perhaps if we can address this discuss by > expanding this sentence: > > OLD > > As a > consequence, it is crucial to properly protect any security > credentials that may be stored on the device (e.g., by using hardware > protection mechanisms). > > NEW > > As a consequence, it is crucial that devices are robust and tamper > resistant, have no backdoors, do not provide services that are not > essential for the primary function, and properly protect any > security credentials that may be stored on the device (e.g., by > using hardware protection mechanisms). > > > > Yes, that works for me in combination with the updates to the use case > draft. Please let me know when the updated draft has been posted. > > > > Thank you, > > Kathleen > > > /js > > > On Thu, Feb 19, 2015 at 08:10:02AM -0800, Kathleen Moriarty wrote: > > Kathleen Moriarty has entered the following ballot position for > > draft-ietf-opsawg-coman-probstate-reqs-04: Discuss > > > > When responding, please keep the subject line intact and reply to all > > email addresses included in the To and CC lines. (Feel free to cut this > > introductory paragraph, however.) > > > > > > Please refer to http://www.ietf.org/iesg/statement/discuss-criteria.html > > for more information about IESG DISCUSS and COMMENT positions. > > > > > > The document, along with other ballot positions, can be found here: > > http://datatracker.ietf.org/doc/draft-ietf-opsawg-coman-probstate-reqs/ > > > > > > > > ---------------------------------------------------------------------- > > DISCUSS: > > ---------------------------------------------------------------------- > > > > I have not had time to read the full draft, but do see a gap in the > > security requirements that I'd like to see if we can address. The > > section on access controls for management systems and devices reads as > > follows: > > > > Req-ID: 6.003 > > > > Title: Access control on management system and devices > > > > Description: Systems acting in a management role must provide an > > access control mechanism that allows the security administrator to > > restrict which devices can access the managing system (e.g., using > > an access control white list of known devices). On the other hand > > managed constrained devices must provide an access control > > mechanism that allows the security administrator to restrict how > > systems in a management role can access the device (e.g., no- > > access, read-only access, and read-write access). > > > > Source: Basic security requirement for use cases where access > > control is essential. > > > > The way I read this, there is no statement about general access > > protections to the device outside of what is designated by a security > > administrator. I would think a statement on access controls on the > > device would be very important in consideration of safety concerns that > > put a strong need for security on such devices (medical, environmental > > monitors, etc.). Are there additional access mechanisms to the device > > besides what is possible by the management connection? Could there be > > factory defaults in place with local access work-arounds or even wireless > > int he even that there are issues accessing devices from management > > stations? Do these cause security problems? Are there ports other than > > those for management open that could lead to security breaches? Or are > > these out-of-scope because the discussion is about management > > connections? If it's out-of-scope, it would be good to state that it is > > even though that would be a concern. Text on this should be added to the > > security considerations section as a general discussion if it's a > > concern, but not in scope, similar to what was done for privacy. > > > > > > > > > > -- > Juergen Schoenwaelder Jacobs University Bremen gGmbH > Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | Germany > Fax: +49 421 200 3103 <http://www.jacobs-university.de/> > > > > > > -- > > > > Best regards, > > Kathleen > -- Best regards, Kathleen
_______________________________________________ OPSAWG mailing list OPSAWG@ietf.org https://www.ietf.org/mailman/listinfo/opsawg