>On Fri, 2012-02-10 at 21:00 +0000, [email protected] wrote:
>> Hi Rex,
>>
>> Thanks for the description. I understand the use case itself better
>now.
>> However I am still trying to parse the threat.
>> In the case of a natural disaster, I can imagine all types of radio
>> equipment being pressed into use.
>> So the statement:
>> "And the radio WANs need frequency authorizations to function."
>>
>> Is the threat then the inability to reach the entity that authorizes
>the
>> use of spectrum?
>
>Yes.

However - a malicious node blocking communication is a different threat than a 
natural disaster.

In a natural disaster (or perceived disaster)  it may be possible to allow some 
devices (like emergency services) more lee-way to not shut down immediately 
when a database is not accessible.  Some level of default capabilities and 
channels could be provided.  Authorization or enablement using a lower duty 
cycle (no push, lower time limits) might be possible.


>
>> Is the reachability and inability to obtain authorization a result of
>a
>> malicious node preventing such communication?
>
>I did not consider this in the use case.  What I was considering was
>that the disaster itself prevented comms, including those to the
>whitespace data server ... but not sure it would make a difference.
>However I would, in all use cases, consider authenticity of the data
>communicated (both ways) to be a requirement.

Both prevent access ... but are different scenarios. 


Paul


>
>>
>> Rgds,
>> -Raj
>>
>>
>>
>> On 2/10/12 2:28 PM, "ext Rex Buddenberg" <[email protected]> wrote:
>>
>> >Raj,
>> >
>> >I'll try ...
>> >
>> >The public safety users of spectrum are very concerned with an issue
>> >they call 'talk around'.  It's not at all defined, but certainly
>> >includes a definition in which internet infrastructure  or simply (in
>a
>> >single segment net) a base station does not exist.  In IEEE 802
>> >terminology, two erstwhile subscriber stations need to communicate.
>> >
>> >The prism through which most public safety folks look at this is the
>LMR
>> >radio ... if I have the same freq as the guy over there that I can
>see
>> >then I can talk with him.
>> >    Once this migrates to internet, the information power is amplified
>> >enormously, but what happens if I can't see a DNS server or a SIP
>server
>> >or ...?  The PAWS concern is 'what if I can't see the white space
>server
>> >in order to get a freq allocation to use'.
>> >
>> >
>> >
>> >A suitable use case would be a sizable disaster where a lot of
>internet
>> >infrastructure ceases to function.  Emergency services users need to
>> >reconstitute quickly and they will need radio WANs to do that.  We
>can
>> >estimate that a lot of radio WAN gear that has been unused suddenly
>> >needs to be pressed into action.   And the radio WANs need frequency
>> >authorizations to function.
>> >
>> >
>> >That work?
>> >
>> >On Fri, 2012-02-10 at 18:09 +0000, [email protected] wrote:
>> >> HI Paul,
>> >>
>> >> On 2/9/12 3:32 PM, "ext Paul Lambert" <[email protected]> wrote:
>> >>
>> >> >
>> >> >>The list in the current threat models text that I proposed is by
>no
>> >> >>means
>> >> >>exhaustiveĊ  Or intended to be. The intent is to derive a key set
>of
>> >> >>security requirements for the protocol. The focus is on those
>threats
>> >> >>that
>> >> >>are relevant to the device-2-database protocol rather than to the
>much
>> >> >>more expansive topic of white space technology.
>> >> >
>> >> >Yes, but ...
>> >> >
>> >> >Without determining if there are technical mitigation mechanisms
>we
>> >> >should not be rejecting threats.  The threats should all be
>examined
>> >>and
>> >> >we should explicitly determine what is in scope versus
>unilaterally as
>> >> >part of the editing process.
>> >>
>> >> No doubt. I don't think there is any unilateral proposal here. I am
>> >>happy
>> >> to incorporate all relevant threats through the consensus process
>and
>> >> discussion on the mailing list. The threat model has evolved from
>Rev 1
>> >>to
>> >> Rev 4 as a result of feedback from you and others.
>> >>
>> >> >
>> >> >As an interesting example - if there is a natural disaster, should
>> >>there
>> >> >be protocol mechanisms to enable use of emergency services without
>> >>direct
>> >> >Internet connectivity to the DB?
>> >>
>> >> Would you consider this as a threat or a feature that the protocol
>needs
>> >> to be concerned with regarding reachability of the database?
>> >>
>> >> >
>> >> >Loss of service (emergency and normal) usage of WS is a threat
>that
>> >> >should be listed and may or may not be addressed by technical or
>> >> >procedural mechanisms.
>> >>
>> >> If you can elaborate or (preferably) provide the text describing
>the
>> >> threat and consequences, I would be happy to include it.
>> >>
>> >> -Raj
>> >>
>> >> >
>> >> >Paul
>> >>
>> >> _______________________________________________
>> >> paws mailing list
>> >> [email protected]
>> >> https://www.ietf.org/mailman/listinfo/paws
>> >
>> >
>>
>

_______________________________________________
paws mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/paws

Reply via email to