Hi Paul/Rex,

How about adding the following threat to the list:

Threat 8: Natural disaster resulting in inability to obtain authorization
for 
               spectrum use by emergency responders

In the case of a sizable natural disaster a lot of internet
infrastructure ceases to function.  Emergency services users need to
reconstitute quickly and will rely on establishing radio WANs. The
potential for lot of radio WAN gear that has been unused suddenly
needs to be pressed into action. And the radio WANs need frequency
authorizations to function. Regulatory entities may also authorize
usage of additional spectrum in the affected areas. The white space
radio entities may need to establish communication with a database and
obtain authorizations. Alternatively there may be other mechanisms
which allow the use of spectrum by emergency service equipment without
strict authorization or with liberal interpretation of the regulatory
policy for white space usage.

Please suggest additional text or changes as needed.

-Raj




On 2/10/12 3:16 PM, "ext Rex Buddenberg" <[email protected]> wrote:

>On Fri, 2012-02-10 at 21:00 +0000, [email protected] wrote:
>> Hi Rex,
>> 
>> Thanks for the description. I understand the use case itself better now.
>> However I am still trying to parse the threat.
>> In the case of a natural disaster, I can imagine all types of radio
>> equipment being pressed into use.
>> So the statement:
>> "And the radio WANs need frequency authorizations to function."
>> 
>> Is the threat then the inability to reach the entity that authorizes the
>> use of spectrum?
>
>Yes.  
>
>> Is the reachability and inability to obtain authorization a result of a
>> malicious node preventing such communication?
>
>I did not consider this in the use case.  What I was considering was
>that the disaster itself prevented comms, including those to the
>whitespace data server ... but not sure it would make a difference.
>However I would, in all use cases, consider authenticity of the data
>communicated (both ways) to be a requirement.
>
>> 
>> Rgds,
>> -Raj
>> 
>> 
>> 
>> On 2/10/12 2:28 PM, "ext Rex Buddenberg" <[email protected]> wrote:
>> 
>> >Raj, 
>> >
>> >I'll try ...
>> >
>> >The public safety users of spectrum are very concerned with an issue
>> >they call 'talk around'.  It's not at all defined, but certainly
>> >includes a definition in which internet infrastructure  or simply (in a
>> >single segment net) a base station does not exist.  In IEEE 802
>> >terminology, two erstwhile subscriber stations need to communicate.
>> >
>> >The prism through which most public safety folks look at this is the
>>LMR
>> >radio ... if I have the same freq as the guy over there that I can see
>> >then I can talk with him.
>> >    Once this migrates to internet, the information power is amplified
>> >enormously, but what happens if I can't see a DNS server or a SIP
>>server
>> >or ...?  The PAWS concern is 'what if I can't see the white space
>>server
>> >in order to get a freq allocation to use'.
>> >
>> >
>> >
>> >A suitable use case would be a sizable disaster where a lot of internet
>> >infrastructure ceases to function.  Emergency services users need to
>> >reconstitute quickly and they will need radio WANs to do that.  We can
>> >estimate that a lot of radio WAN gear that has been unused suddenly
>> >needs to be pressed into action.   And the radio WANs need frequency
>> >authorizations to function.
>> >
>> >
>> >That work?
>> >
>> >On Fri, 2012-02-10 at 18:09 +0000, [email protected] wrote:
>> >> HI Paul,
>> >> 
>> >> On 2/9/12 3:32 PM, "ext Paul Lambert" <[email protected]> wrote:
>> >> 
>> >> >
>> >> >>The list in the current threat models text that I proposed is by no
>> >> >>means
>> >> >>exhaustiveĊ  Or intended to be. The intent is to derive a key set of
>> >> >>security requirements for the protocol. The focus is on those
>>threats
>> >> >>that
>> >> >>are relevant to the device-2-database protocol rather than to the
>>much
>> >> >>more expansive topic of white space technology.
>> >> >
>> >> >Yes, but ...
>> >> >
>> >> >Without determining if there are technical mitigation mechanisms we
>> >> >should not be rejecting threats.  The threats should all be examined
>> >>and
>> >> >we should explicitly determine what is in scope versus unilaterally
>>as
>> >> >part of the editing process.
>> >> 
>> >> No doubt. I don't think there is any unilateral proposal here. I am
>> >>happy
>> >> to incorporate all relevant threats through the consensus process and
>> >> discussion on the mailing list. The threat model has evolved from
>>Rev 1
>> >>to
>> >> Rev 4 as a result of feedback from you and others.
>> >> 
>> >> >
>> >> >As an interesting example - if there is a natural disaster, should
>> >>there
>> >> >be protocol mechanisms to enable use of emergency services without
>> >>direct
>> >> >Internet connectivity to the DB?
>> >> 
>> >> Would you consider this as a threat or a feature that the protocol
>>needs
>> >> to be concerned with regarding reachability of the database?
>> >> 
>> >> >
>> >> >Loss of service (emergency and normal) usage of WS is a threat that
>> >> >should be listed and may or may not be addressed by technical or
>> >> >procedural mechanisms.
>> >> 
>> >> If you can elaborate or (preferably) provide the text describing the
>> >> threat and consequences, I would be happy to include it.
>> >> 
>> >> -Raj
>> >> 
>> >> >
>> >> >Paul
>> >> 
>> >> _______________________________________________
>> >> paws mailing list
>> >> [email protected]
>> >> https://www.ietf.org/mailman/listinfo/paws
>> >
>> >
>> 
>
>

_______________________________________________
paws mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/paws

Reply via email to