Re: [Nea] UPDATED: WG Review: Network Endpoint Assessment (nea)

2006-10-27 Thread Alan DeKok
Keith Moore moore@cs.utk.edu wrote: I don't think it's a good analogy because modem pools are very special-purpose devices, whereas a host can potentially do anything that needs to communicate with something else. For that matter, RADIUS doesn't have the intent of preventing some kinds of

Re: [Nea] UPDATED: WG Review: Network Endpoint Assessment (nea)

2006-10-27 Thread Alan DeKok
Mike Fratto [EMAIL PROTECTED] wrote: At a very high level, this isn't much different than RADIUS, which defines the data formats and protocols between a network access device such as modem pool and the RADIUS server. Vendor specific attributes are supported and the standards don't attempt to

Re: [Nea] UPDATED: WG Review: Network Endpoint Assessment (nea)

2006-10-27 Thread Alan DeKok
Keith Moore moore@cs.utk.edu wrote: do you have actual statistics to back that up? It's not meant to be an exact number, but it's pretty close to being correct, in my experience. there are better (more reliable, more secure, more effective, cheaper) ways of providing a set of functions at a

Re: [Nea] UPDATED: WG Review: Network Endpoint Assessment (nea)

2006-10-27 Thread Alan DeKok
Keith Moore moore@cs.utk.edu wrote: That seems overbroad, in particular because a laptop that connects to multiple networks cannot in general be expected to adhere to conflicting policies of the networks to which it connects. Exactly. That's why there are provisions for non-conforming

RE: [Nea] UPDATED: WG Review: Network Endpoint Assessment (nea)

2006-10-24 Thread Narayanan, Vidya
PROTECTED] Subject: [Nea] UPDATED: WG Review: Network Endpoint Assessment (nea) A new IETF working group has been proposed in the Security Area. The IESG has not made any determination as yet. The following UPDATED draft charter was submitted, and is provided for informational purposes only

Re: [Nea] UPDATED: WG Review: Network Endpoint Assessment (nea)

2006-10-24 Thread Keith Moore
Original Message All, This charter is definitely clearer on some of the points that were discussed based on the last version, but a couple of things still remain to be clarified. Based on several discussions that we've had lately, I have two suggestions for further clarity:

RE: [Nea] UPDATED: WG Review: Network Endpoint Assessment (nea)

2006-10-24 Thread Hallam-Baker, Phillip
From: Keith Moore [mailto:[EMAIL PROTECTED] As far as I can tell, this is the crux of the problem with NEA - that in general it's simply unreasonable for a network to demand that every host that connect to it conform to arbitrary policies for configuration of those hosts. IETF should

Re: [Nea] UPDATED: WG Review: Network Endpoint Assessment (nea)

2006-10-24 Thread Keith Moore
My network, my rules. If you don't like them go to the nearest Panera and use their free WiFi. If you want to connect to my network, my rules apply. That's not arbitrary, that's my right and my choice. perhaps. but I don't see why the IETF should provide tools to help you impose those

Re: [Nea] UPDATED: WG Review: Network Endpoint Assessment (nea)

2006-10-24 Thread Keith Moore
As far as I can tell, this is the crux of the problem with NEA - that in general it's simply unreasonable for a network to demand that every host that connect to it conform to arbitrary policies for configuration of those hosts. IETF should not be standardizing unreasonable expectations. And

RE: [Nea] UPDATED: WG Review: Network Endpoint Assessment (nea)

2006-10-24 Thread Hallam-Baker, Phillip
From: Keith Moore [mailto:[EMAIL PROTECTED] that's my understanding also. but nothing you said here contradicts my statement. if connection of the host to the network is predicated on having the host conform to whatever arbitrary policy the network wishes to impose on how the host

RE: [Nea] UPDATED: WG Review: Network Endpoint Assessment (nea)

2006-10-24 Thread Hallam-Baker, Phillip
From: Keith Moore [mailto:[EMAIL PROTECTED] My network, my rules. If you don't like them go to the nearest Panera and use their free WiFi. If you want to connect to my network, my rules apply. That's not arbitrary, that's my right and my choice. perhaps. but I don't see why the

Re: [Nea] UPDATED: WG Review: Network Endpoint Assessment (nea)

2006-10-24 Thread Marcus Leech
Hallam-Baker, Phillip wrote: The best way to stop such nonsense is to recognize what every mainstream security specialist working in the field recognized long ago - there is a difference between the network and the inter-network and connection to either is a privilege that should only be

RE: [Nea] UPDATED: WG Review: Network Endpoint Assessment (nea)

2006-10-24 Thread Hallam-Baker, Phillip
From: Marcus Leech [mailto:[EMAIL PROTECTED] I think the problem that Keith is talking about is the problem of unreasonable policies, which will instantly create a criminal subculture in any networks that have such unreasonable policies. The people talking about NEA are generally

RE: [Nea] UPDATED: WG Review: Network Endpoint Assessment (nea)

2006-10-24 Thread Susan Thomson \(sethomso\)
Hi Vidya Inline ... -Original Message- From: Narayanan, Vidya [mailto:[EMAIL PROTECTED] Sent: Tuesday, October 24, 2006 2:15 AM To: iesg@ietf.org; ietf@ietf.org Cc: [EMAIL PROTECTED] Subject: RE: [Nea] UPDATED: WG Review: Network Endpoint Assessment (nea) All

Re: [Nea] UPDATED: WG Review: Network Endpoint Assessment (nea)

2006-10-24 Thread Keith Moore
My network, my rules. If you don't like them go to the nearest Panera and use their free WiFi. If you want to connect to my network, my rules apply. That's not arbitrary, that's my right and my choice. perhaps. but I don't see why the IETF should provide tools to help you impose those rules

Re: [Nea] UPDATED: WG Review: Network Endpoint Assessment (nea)

2006-10-24 Thread Marcus Leech
Hallam-Baker, Phillip wrote: Trying to enforce that a Turing-complete machine have capabilities no greater than X might seem to an IT senior manager to be a really good idea, but in practical terms, it can't be done. Of course it can. Simply put a trustworthy computing partition

Re: [Nea] UPDATED: WG Review: Network Endpoint Assessment (nea)

2006-10-24 Thread Keith Moore
Whether a company manageing a network demands that all hosts meet a specific policy is a local policy issue and the charter specifically addresses this concern: An organization may make a range of policy decisions based on the posture of an endpoint. NEA is not intended to be prescriptive in

RE: [Nea] UPDATED: WG Review: Network Endpoint Assessment (nea)

2006-10-24 Thread Hallam-Baker, Phillip
From: Keith Moore [mailto:[EMAIL PROTECTED] Because the architecture you propose is failed and unworkable. I didn't propose anything resembling an architecture. and the proposal at hand is an anti-architecture - it's something that destroys the possibility of a unifying theme. So you

RE: [Nea] UPDATED: WG Review: Network Endpoint Assessment (nea)

2006-10-24 Thread Lakshminath Dondeti
: [EMAIL PROTECTED] Subject: RE: [Nea] UPDATED: WG Review: Network Endpoint Assessment (nea) All, This charter is definitely clearer on some of the points that were discussed based on the last version, but a couple of things still remain to be clarified. Based on several discussions

RE: [Nea] UPDATED: WG Review: Network Endpoint Assessment (nea)

2006-10-24 Thread Nelson, David
Keith Moore writes... what the WG charter says and how the WG output is used are different things. IMHO we need to consider the potential unintended consequences of our efforts in IETF, not just what we intend. network operators do not limit their use of technology to what we write in

Re: [Nea] UPDATED: WG Review: Network Endpoint Assessment (nea)

2006-10-24 Thread Keith Moore
Keith Moore moore@cs.utk.edu wrote: That seems overbroad, in particular because a laptop that connects to multiple networks cannot in general be expected to adhere to conflicting policies of the networks to which it connects. Exactly. That's why there are provisions for non-conforming

Re: [Nea] UPDATED: WG Review: Network Endpoint Assessment (nea)

2006-10-24 Thread Andy Bierman
Hallam-Baker, Phillip wrote: From: Keith Moore [mailto:[EMAIL PROTECTED] that's my understanding also. but nothing you said here contradicts my statement. if connection of the host to the network is predicated on having the host conform to whatever arbitrary policy the network wishes to

Re: [Nea] UPDATED: WG Review: Network Endpoint Assessment (nea)

2006-10-24 Thread Keith Moore
what the WG charter says and how the WG output is used are different things. IMHO we need to consider the potential unintended consequences of our efforts in IETF, not just what we intend. network operators do not limit their use of technology to what we write in applicability statements.

Re: [Nea] UPDATED: WG Review: Network Endpoint Assessment (nea)

2006-10-24 Thread Sam Hartman
: [Nea] UPDATED: WG Review: Network Endpoint Assessment (nea) All, This charter is definitely clearer on some of the points that were discussed based on the last version, but a couple of things still remain to be clarified. Based on several discussions

RE: [Nea] UPDATED: WG Review: Network Endpoint Assessment (nea)

2006-10-24 Thread Narayanan, Vidya
-Original Message- From: Sam Hartman [mailto:[EMAIL PROTECTED] Sent: Tuesday, October 24, 2006 10:28 AM To: Susan Thomson (sethomso) Cc: Narayanan, Vidya; [EMAIL PROTECTED]; iesg@ietf.org; ietf@ietf.org Subject: Re: [Nea] UPDATED: WG Review: Network Endpoint Assessment (nea

Re: [Nea] UPDATED: WG Review: Network Endpoint Assessment (nea)

2006-10-24 Thread Keith Moore
I don't see how NEA is such a big philosophical change from existing RADIUS practices. perhaps not, but I don't see how past mistakes are a justification for future ones. Keith ___ Ietf mailing list Ietf@ietf.org

RE: [Nea] UPDATED: WG Review: Network Endpoint Assessment (nea)

2006-10-24 Thread Narayanan, Vidya
-Original Message- From: Alan DeKok [mailto:[EMAIL PROTECTED] Sent: Tuesday, October 24, 2006 11:29 AM To: Keith Moore Cc: [EMAIL PROTECTED]; iesg@ietf.org; ietf@ietf.org Subject: Re: [Nea] UPDATED: WG Review: Network Endpoint Assessment (nea) Keith Moore moore@cs.utk.edu

Re: [Nea] UPDATED: WG Review: Network Endpoint Assessment (nea)

2006-10-24 Thread Ned Freed
Whether a company manageing a network demands that all hosts meet a specific policy is a local policy issue and the charter specifically addresses this concern: An organization may make a range of policy decisions based on the posture of an endpoint. NEA is not intended to be prescriptive

Re: [Nea] UPDATED: WG Review: Network Endpoint Assessment (nea)

2006-10-24 Thread Keith Moore
what the WG charter says and how the WG output is used are different things. IMHO we need to consider the potential unintended consequences of our efforts in IETF, not just what we intend. Keith, I have two big problems with this position. First of all, I have grave doubts our crystal ball is

Re: [Nea] Re: WG Review: Network Endpoint Assessment (nea)

2006-10-23 Thread Alan DeKok
Douglas Otis [EMAIL PROTECTED] wrote: It seems impractical to specify system requirements or expect a suitable examination be done realtime prior to obtaining access. Maybe you're saying that a complete systems check would take too long. That is true, but that isn't how the NEA variants

RE: [Nea] WG Review: Network Endpoint Assessment (nea)

2006-10-19 Thread Stephen Hanna
Ted Hardie wrote: For the charter discussions, I want to know whether it will be an aim of the working group to standardize: * a way of carrying this information * the structure of this information (but not its content) * a standard representation of the content, so that access to the vendor

Re: [Nea] WG Review: Network Endpoint Assessment (nea)

2006-10-18 Thread Leif Johansson
Lets not forget that when (not if) NEA/NAP/NAC is deployed the IDSen people have deployed today to solve the lying-client-problem by scanning for common/current vulnerabilities as part of the network admission process will have to interface with PDPs part of a NEA intfrastructure. Could

Re: [Nea] Re: WG Review: Network Endpoint Assessment (nea)

2006-10-18 Thread Ned Freed
Noting the scenarios above, I claim that NEA-like functionality has proved useful already in protecting the computing environment of an enterprise. I have not seen compelling evidence that it has any use in the layer 3 infrastructure used to carry customer traffic at an ISP. But I think that's

RE: [Nea] WG Review: Network Endpoint Assessment (nea)

2006-10-17 Thread Stephen Hanna
Sam Hartman wrote: One of the things coming out of the most recent BOF was a strong desire for PA-level interoperability. That can be accomplished through standardized attributes or vendor-specific attributes that are sufficiently well documented (and not subject to patents) that third

Re: [Nea] Re: WG Review: Network Endpoint Assessment (nea)

2006-10-17 Thread Harald Alvestrand
Narayanan, Vidya wrote: Harald, This seems to be missing the point. I think there is a general sense that NEA could be helpful for some level of protection to complying endpoints in an enterprise scenario, which is exactly what you have described below. The disagreement seems to be on the topics

RE: [Nea] WG Review: Network Endpoint Assessment (nea)

2006-10-17 Thread Stephen Hanna
@ietf.org Subject: RE: [Nea] WG Review: Network Endpoint Assessment (nea) Sam, -Original Message- From: Sam Hartman [mailto:[EMAIL PROTECTED] Sent: Friday, October 13, 2006 12:43 PM To: Frank Yeh Jr Cc: Hardie, Ted; [EMAIL PROTECTED]; ietf@ietf.org Subject: Re: [Nea] WG Review

Re: [Nea] Re: WG Review: Network Endpoint Assessment (nea)

2006-10-17 Thread Lakshminath Dondeti
At 11:06 PM 10/16/2006, Harald Alvestrand wrote: Narayanan, Vidya wrote: Harald, snip Noting the scenarios above, I claim that NEA-like functionality has proved useful already in protecting the computing environment of an enterprise. I have not seen compelling evidence that it has any use in

RE: [Nea] WG Review: Network Endpoint Assessment (nea)

2006-10-17 Thread Lakshminath Dondeti
At 12:00 AM 10/17/2006, Khosravi, Hormuzd M wrote: Sam, I believe if we move 'quickly' in this WG we will be able to meet interoperability goals to certain extent atleast. The bottom-line is this technology is already being deployed by different vendors in academia and enterprises. The question

Re: [Nea] Re: WG Review: Network Endpoint Assessment (nea)

2006-10-17 Thread Harald Alvestrand
Lakshminath Dondeti wrote: At 11:06 PM 10/16/2006, Harald Alvestrand wrote: Narayanan, Vidya wrote: Harald, snip Noting the scenarios above, I claim that NEA-like functionality has proved useful already in protecting the computing environment of an enterprise. I have not seen compelling

Re: [Nea] Re: WG Review: Network Endpoint Assessment (nea)

2006-10-17 Thread Lakshminath Dondeti
At 12:29 AM 10/17/2006, Harald Alvestrand wrote: Lakshminath Dondeti wrote: At 11:06 PM 10/16/2006, Harald Alvestrand wrote: Narayanan, Vidya wrote: Harald, snip snip NEA is applicable to computing environments of enterprises where endpoints accessing the enterprise's network are owned

Re: WG Review: Network Endpoint Assessment (nea)

2006-10-17 Thread Stephen Hanna
Ted, As I understand your concerns expressed below, you are concerned that standardizing attributes for NEA would be redundant and pointless: redundant because vendor-specific attributes will cover the same information in more detail and pointless because remediation will not be possible given

RE: [Nea] WG Review: Network Endpoint Assessment (nea)

2006-10-17 Thread Ted Hardie
At 2:04 AM -0400 10/17/06, Stephen Hanna wrote: Will we be able to meet these interoperability goals? Why or why not? Yes, we can. If we define a small set of standardized attributes (OS and app version, AV status, etc.) and make them mandatory to implement, Sorry, but doesn't AV status above

Re: [Nea] WG Review: Network Endpoint Assessment (nea)

2006-10-17 Thread Eliot Lear
Ted, Sorry, but doesn't AV status above refer to the existing, proprietary anti-virus systems? How does standardizing an attribute for carrying that help create a standardized understanding of what it means?Don't I still have to treat that as, essentially, a vendor attribute, since I have

Re: [Nea] WG Review: Network Endpoint Assessment (nea)

2006-10-17 Thread Ted Hardie
At 8:22 PM +0200 10/17/06, Eliot Lear wrote: would think that five or six values are appropriate: 1. Vendor name (string) 2. Vendor engine version (integer) 3. Vendor virus definitions version (integer) 4. Enabled? (binary) 5. Buggered? (binary) 6. Other gobbledigook the vendor wants

Re: [Nea] WG Review: Network Endpoint Assessment (nea)

2006-10-17 Thread Douglas Otis
On Oct 17, 2006, at 11:22 AM, Eliot Lear wrote: I would think that five or six values are appropriate: 1. Vendor name (string) 2. Vendor engine version (integer) 3. Vendor virus definitions version (integer) 4. Enabled? (binary) 5. Buggered? (binary) 6. Other gobbledigook the

Re: [Nea] Re: WG Review: Network Endpoint Assessment (nea)

2006-10-16 Thread Eliot Lear
Andy Bierman wrote: I don't agree that this is low-hanging fruit. The server component of this system seems like a wonderful new target for DDoS and masquerade attacks. Well, first of all I don't see why this is any different than a radius server. In fact it could be that the access box

Re: [Nea] WG Review: Network Endpoint Assessment (nea)

2006-10-16 Thread Leif Johansson
Lakshminath Dondeti wrote: At 01:42 AM 10/7/2006, Harald Alvestrand wrote: snip Many universities require their students to buy their own laptops, but prohibit certain types of activity from those laptops (like spamming, DDOS-attacks and the like). They would love to have the ability to run

Re: [Nea] Re: WG Review: Network Endpoint Assessment (nea)

2006-10-16 Thread Leif Johansson
Extreme clipping below: v) IDS/IPS to detect and prevent intrusions NEA might help here by providing a common semantics for communicating the result of IDS scans of hosts to policy decision points. Cheers Leif ___ Ietf mailing list

Re: [Nea] WG Review: Network Endpoint Assessment (nea)

2006-10-16 Thread Lakshminath Dondeti
At 01:46 AM 10/16/2006, Leif Johansson wrote: Lakshminath Dondeti wrote: At 01:42 AM 10/7/2006, Harald Alvestrand wrote: snip Many universities require their students to buy their own laptops, but prohibit certain types of activity from those laptops (like spamming, DDOS-attacks and the

Re: [Nea] Re: WG Review: Network Endpoint Assessment (nea)

2006-10-16 Thread Andy Bierman
Eliot Lear wrote: Andy Bierman wrote: I don't agree that this is low-hanging fruit. The server component of this system seems like a wonderful new target for DDoS and masquerade attacks. Well, first of all I don't see why this is any different than a radius server. In fact it could be that

Re: [Nea] Re: WG Review: Network Endpoint Assessment (nea)

2006-10-16 Thread Frank Yeh Jr
. Regards, Frank Yeh - Original Message - From: Frank Yeh Jr To: [EMAIL PROTECTED] Cc: [EMAIL PROTECTED] ; ietf@ietf.org Sent: Thursday, October 12, 2006 3:32 PM Subject: RE: [Nea] Re: WG Review: Network Endpoint Assessment (nea) Greetings, Both of the existing flavors of NEA-type

RE: [Nea] WG Review: Network Endpoint Assessment (nea)

2006-10-16 Thread Narayanan, Vidya
Sam, -Original Message- From: Sam Hartman [mailto:[EMAIL PROTECTED] Sent: Friday, October 13, 2006 12:43 PM To: Frank Yeh Jr Cc: Hardie, Ted; [EMAIL PROTECTED]; ietf@ietf.org Subject: Re: [Nea] WG Review: Network Endpoint Assessment (nea) Frank == Frank Yeh [EMAIL PROTECTED

RE: [Nea] Re: WG Review: Network Endpoint Assessment (nea)

2006-10-16 Thread Narayanan, Vidya
To: Alan DeKok Cc: [EMAIL PROTECTED]; ietf@ietf.org Subject: Re: [Nea] Re: WG Review: Network Endpoint Assessment (nea) A typical NEA case (taken out of what Cisco's NAC is supposed to be good for): - Worker goes on holiday, takes laptop - New attack is discovered that exploits a newly

Re: [Nea] Re: WG Review: Network Endpoint Assessment (nea)

2006-10-16 Thread Douglas Otis
On Oct 12, 2006, at 2:27 PM, Darryl ((Dassa)) Lynch wrote: Am I mistaken or is NEA intended to be a compliance check before a node is allowed onto the network? It seems impractical to specify system requirements or expect a suitable examination be done realtime prior to obtaining access.

Re: [Nea] Re: WG Review: Network Endpoint Assessment (nea)

2006-10-14 Thread Andy Bierman
Harald Alvestrand wrote: A typical NEA case (taken out of what Cisco's NAC is supposed to be good for): - Worker goes on holiday, takes laptop - New attack is discovered that exploits a newly discovered Windows vulnerability - Patch is created, distributed and installed - NEA posture

Re: [Nea] Re: WG Review: Network Endpoint Assessment (nea)

2006-10-13 Thread Alan DeKok
Brian E Carpenter [EMAIL PROTECTED] wrote: What if your contractor has carefully configured the laptop to give all the right answers? What if it has already been infected with a virus that causes it to give all the right answers? Yes, that's a problem with NEA. No, it's not a problem for

RE: [Nea] Re: WG Review: Network Endpoint Assessment (nea)

2006-10-13 Thread Frank Yeh Jr
: [Nea] Re: WG Review: Network Endpoint Assessment (nea) Douglas Otis wrote: If an application happens to be malware, it seems it would be unlikely stop these applications. How about: vi) Provide application level advisory information pertaining to available services. Points

Re:[Nea] WG Review: Network Endpoint Assessment (nea)

2006-10-13 Thread yinhan 34728
I have a very basic fear that this working group is getting chartered with a bunch of aims added by people who will not take on the task of doing the work. After private discussion with folks involved, my sense is that the very core of this work is a perceived need to be able to pass

Re: [Nea] WG Review: Network Endpoint Assessment (nea)

2006-10-13 Thread Frank Yeh Jr
Ted Hardie [EMAIL PROTECTED] wrote on 10/08/2006 11:45:37 PM: [snip] my sense is that the very core of this work is a perceived need to be able to pass opaque strings between a host and the network prior to the host attaching. Yes, that is the essence of this work which is what we need

Re: [Nea] Re: WG Review: Network Endpoint Assessment (nea)

2006-10-13 Thread Arnt Gulbrandsen
Alan DeKok writes: The people I talk with plan on using NEA to catch the 99% case of a misconfigured/unknown system that is used by a well-meaning but perhaps less clueful employee or contractor. The purpose of NEA is to enhance network security by allowing fewer insecure end hosts in the

Re: [Nea] WG Review: Network Endpoint Assessment (nea)

2006-10-13 Thread Sam Hartman
Frank == Frank Yeh [EMAIL PROTECTED] writes: Frank Standardized VS vendor-specific attributes is not something that needs to be Frank solved today. Solutions can start with vendor-specific and migrate toward a Frank standard, if one develops, without changing the protocol. The

Due process [Re: [Nea] WG Review: Network Endpoint Assessment (nea)]

2006-10-12 Thread Brian E Carpenter
Noel Chiappa wrote: From: Steven M. Bellovin [EMAIL PROTECTED] it is better that we aren't copied because to do so would be unfair to the complainer(s). As much as I've sparred with Glassey in the past ... I think he's right in this case. In my opinion, any sort of

Re: Due process [Re: [Nea] WG Review: Network Endpoint Assessment (nea)]

2006-10-12 Thread todd glassey
PROTECTED] To: ietf@ietf.org Sent: Thursday, October 12, 2006 2:55 AM Subject: Due process [Re: [Nea] WG Review: Network Endpoint Assessment (nea)] Noel Chiappa wrote: From: Steven M. Bellovin [EMAIL PROTECTED] it is better that we aren't copied because to do so would be unfair

RE: [Nea] Re: WG Review: Network Endpoint Assessment (nea)

2006-10-12 Thread Douglas Otis
On Tue, 2006-10-10 at 20:01 -0700, Narayanan, Vidya wrote: I am rather confused by this attempt to make NEA fit into some kind of a network protection mechanism. I keep hearing that NEA is *one* of a suite of protocols that may be used for protecting networks. Let's dig a bit deeper into what

RE: [Nea] Re: WG Review: Network Endpoint Assessment (nea)

2006-10-12 Thread Darryl \(Dassa\) Lynch
Douglas Otis wrote: If an application happens to be malware, it seems it would be unlikely stop these applications. How about: vi) Provide application level advisory information pertaining to available services. Points that seem to be missing are: vii) Notification of

Re: [Nea] WG Review: Network Endpoint Assessment (nea)

2006-10-11 Thread Steven M. Bellovin
On Tue, 10 Oct 2006 17:10:50 -0700, Fleischman, Eric [EMAIL PROTECTED] wrote: I'm sorry to enter this fray, but I'd like to point out that while I respect Todd's request to know who is accusing him and why, the rest of us don't need to be copied that information. In fact, it is better that we

RE: [Nea] WG Review: Network Endpoint Assessment (nea)

2006-10-11 Thread Russ Housley
Vidya: I'm not sure that the charter actually needs to get into the modes at all - I'm guessing what happens after NEA (i.e., what is done with the results from NEA) has zero impact on any work being done in NEA itself. So, why not simply state something like Once NEA is conducted on an

Re: Complaints and complainers (Re: [Nea] WG Review: Network Endpoint Assessment (nea))

2006-10-11 Thread Ned Freed
Just FTR (and changing the subject, since this is not about NEA at all): I agree with the principle that the sergeants-at-arms are obliged to make up their own minds about whether or not a posting is inappropriate, and that they are responsible for their own decisions. Complaints are a

Re: [Nea] WG Review: Network Endpoint Assessment (nea)

2006-10-11 Thread Noel Chiappa
From: Steven M. Bellovin [EMAIL PROTECTED] it is better that we aren't copied because to do so would be unfair to the complainer(s). As much as I've sparred with Glassey in the past ... I think he's right in this case. In my opinion, any sort of disciplinary action needs

Re: [Nea] Re: WG Review: Network Endpoint Assessment (nea)

2006-10-11 Thread Brian E Carpenter
I run a very closed network, ports are closed and not opened unless there is a validated request, external drives are disabled etc etc. A contractor comes in with a notebook and needs to work on some files located on our internal secure network. A trusted staff member rings in with the

Re: [Nea] WG Review: Network Endpoint Assessment (nea)

2006-10-11 Thread todd glassey
- Original Message - From: Steven M. Bellovin [EMAIL PROTECTED] To: Fleischman, Eric [EMAIL PROTECTED] Cc: todd glassey [EMAIL PROTECTED]; [EMAIL PROTECTED]; ietf@ietf.org Sent: Wednesday, October 11, 2006 7:09 AM Subject: Re: [Nea] WG Review: Network Endpoint Assessment (nea) On Tue

RE: [Nea] Re: WG Review: Network Endpoint Assessment (nea)

2006-10-11 Thread Ted Hardie
At 7:55 PM +1000 10/11/06, Darryl \(Dassa\) Lynch wrote: I run a very closed network, ports are closed and not opened unless there is a validated request, external drives are disabled etc etc. A contractor comes in with a notebook and needs to work on some files located on our internal secure

RE: [Nea] Re: WG Review: Network Endpoint Assessment (nea)

2006-10-11 Thread Narayanan, Vidya
: Network Endpoint Assessment (nea) Narayanan, Vidya wrote: SNIP I continue to remain puzzled on the above points! Hello Vidya Perhaps if I put forward an example of how NEA may benefit me it would go some way to clear the puzzle. I run a very closed network, ports are closed

Re: [Nea] WG Review: Network Endpoint Assessment (nea)

2006-10-11 Thread todd glassey
, 2006 7:18 AM Subject: RE: [Nea] WG Review: Network Endpoint Assessment (nea) Vidya: I'm not sure that the charter actually needs to get into the modes at all - I'm guessing what happens after NEA (i.e., what is done with the results from NEA) has zero impact on any work being done in NEA itself

RE: [Nea] WG Review: Network Endpoint Assessment (nea)

2006-10-11 Thread Narayanan, Vidya
Hi Russ, -Original Message- From: Russ Housley [mailto:[EMAIL PROTECTED] Sent: Wednesday, October 11, 2006 7:19 AM To: Narayanan, Vidya Cc: [EMAIL PROTECTED]; iesg@ietf.org; ietf@ietf.org Subject: RE: [Nea] WG Review: Network Endpoint Assessment (nea) Vidya: I'm not sure

RE: [Nea] Re: WG Review: Network Endpoint Assessment (nea)

2006-10-11 Thread Stephen Hanna
Vidya, Thanks for your response. I think we may be getting closer to understanding each other's perspectives. That's a good thing. Let me respond to your comments inline below. I hope you won't mind if I clip a bit since this thread is starting to get long. Vidya Narayanan wrote: A. Any

Re: [Nea] Re: WG Review: Network Endpoint Assessment (nea)

2006-10-11 Thread Eliot Lear
In the end, I believe all NEA can do is help good hosts stay good. Bad hosts will stay bad, and may or may not be identifyable as such. Still, the former ain't nothing. But I agree with Ted at least in part that a standardization effort for the content within NEA is challenging. I do not think

RE: [Nea] Re: WG Review: Network Endpoint Assessment (nea)

2006-10-11 Thread Darryl \(Dassa\) Lynch
Brian E Carpenter wrote: I run a very closed network, ports are closed and not opened unless there is a validated request, external drives are disabled etc etc. A contractor comes in with a notebook and needs to work on some files located on our internal secure network. A trusted staff

RE: [Nea] Re: WG Review: Network Endpoint Assessment (nea)

2006-10-11 Thread Darryl \(Dassa\) Lynch
Hello Ted Comments inline as appropriate. Ted Hardie wrote: At 7:55 PM +1000 10/11/06, Darryl \(Dassa\) Lynch wrote: I run a very closed network, ports are closed and not opened unless there is a validated request, external drives are disabled etc etc. A contractor comes in with a notebook

RE: [Nea] Re: WG Review: Network Endpoint Assessment (nea)

2006-10-11 Thread Darryl \(Dassa\) Lynch
Hi Vidya Comments inline as appropriate. Narayanan, Vidya wrote: Your email indicates that you would: a) somehow require that a visitor's laptop run an NEA client, b) expect the device to support PAs that the server requires to be checked, and c) trust data coming out of it, rather

RE: [Nea] WG Review: Network Endpoint Assessment (nea)

2006-10-11 Thread Gray, Eric
PROTECTED] -- Subject: Re: [Nea] WG Review: Network Endpoint Assessment (nea) -- -- From: Steven M. Bellovin [EMAIL PROTECTED] -- -- it is better that we aren't copied because to do so -- would be unfair to -- the complainer(s). -- -- As much as I've sparred with Glassey

Re: [Nea] WG Review: Network Endpoint Assessment (nea)

2006-10-10 Thread todd glassey
, and personally after NETWORK was shutdown I thought that this was it. Todd Glassey - Original Message - From: Theodore Tso [EMAIL PROTECTED] To: todd glassey [EMAIL PROTECTED] Cc: [EMAIL PROTECTED]; ietf@ietf.org Sent: Monday, October 09, 2006 3:16 PM Subject: Re: [Nea] WG Review: Network

Re: [Nea] WG Review: Network Endpoint Assessment (nea)

2006-10-10 Thread JORDI PALET MARTINEZ
09, 2006 3:16 PM Subject: Re: [Nea] WG Review: Network Endpoint Assessment (nea) On Mon, Oct 09, 2006 at 02:39:46PM -0700, todd glassey wrote: So then Ted are you formally saying that it is inappropriate to discuss IETF operations or its processes on the IETF@IETF.ORG mailing list

Re: [Nea] WG Review: Network Endpoint Assessment (nea)

2006-10-10 Thread todd glassey
, 2006 12:34 PM Subject: Re: [Nea] WG Review: Network Endpoint Assessment (nea) Todd, I've received several complains from people that think that you are crossing the limit again and being off-topic with this thread and I seriously agree with them. Consequently I warn you. If you keep going

Re: WG Review: Network Endpoint Assessment (nea)

2006-10-10 Thread Stephen Hanna
I have seen a lot of discussion about whether NEA provides network protection. In fact, it has been suggested that the charter be revised to say NEA must not be considered a protection mechanism for networks. I don't agree. Let's start by examining this concept of network protection. It's an

Re: [Nea] WG Review: Network Endpoint Assessment (nea)

2006-10-10 Thread JORDI PALET MARTINEZ
] Responder a: [EMAIL PROTECTED] Fecha: Tue, 10 Oct 2006 12:42:30 -0700 Para: [EMAIL PROTECTED], ietf@ietf.org, Contreras, Jorge [EMAIL PROTECTED] Asunto: Re: [Nea] WG Review: Network Endpoint Assessment (nea) Who filed the complaints? if you are accusing me of something I have the right to know

Re: [Nea] WG Review: Network Endpoint Assessment (nea)

2006-10-10 Thread todd glassey
Glassey - Original Message - From: JORDI PALET MARTINEZ [EMAIL PROTECTED] To: todd glassey [EMAIL PROTECTED]; ietf@ietf.org Sent: Tuesday, October 10, 2006 2:11 PM Subject: Re: [Nea] WG Review: Network Endpoint Assessment (nea) Todd, People got very irritated with this type

RE: [Nea] WG Review: Network Endpoint Assessment (nea)

2006-10-10 Thread Fleischman, Eric
PROTECTED]; ietf@ietf.org Subject: Re: [Nea] WG Review: Network Endpoint Assessment (nea) Yes actually you do -how does anyone complained against know who is complaining or why? - if the complaints are not public then the oversight is not real - its a paper fiction - a lie in print. Speaking of lies

Re: [Nea] WG Review: Network Endpoint Assessment (nea)

2006-10-10 Thread JORDI PALET MARTINEZ
[EMAIL PROTECTED] Responder a: [EMAIL PROTECTED] Fecha: Tue, 10 Oct 2006 17:10:50 -0700 Para: todd glassey [EMAIL PROTECTED], [EMAIL PROTECTED], ietf@ietf.org Conversación: [Nea] WG Review: Network Endpoint Assessment (nea) Asunto: RE: [Nea] WG Review: Network Endpoint Assessment (nea) I'm

RE: [Nea] Re: WG Review: Network Endpoint Assessment (nea)

2006-10-10 Thread Narayanan, Vidya
. Some further comments inline. -Original Message- From: Stephen Hanna [mailto:[EMAIL PROTECTED] Sent: Tuesday, October 10, 2006 1:30 PM To: ietf@ietf.org; [EMAIL PROTECTED]; iesg@ietf.org Subject: [Nea] Re: WG Review: Network Endpoint Assessment (nea) I have seen a lot

Re: [Nea] WG Review: Network Endpoint Assessment (nea)

2006-10-10 Thread Theodore Tso
On Tue, Oct 10, 2006 at 07:45:48PM -0500, JORDI PALET MARTINEZ wrote: Hi Eric, I don't really agree with that. I've first the obligation to keep the privacy about any email received in private. Of course, I can always suggest that the people which complained in private speak up in the list,

WG Review: Network Endpoint Assessment (nea)

2006-10-09 Thread Ted Hardie
I have a very basic fear that this working group is getting chartered with a bunch of aims added by people who will not take on the task of doing the work. After private discussion with folks involved, my sense is that the very core of this work is a perceived need to be able to pass opaque

Re: [Nea] WG Review: Network Endpoint Assessment (nea)

2006-10-09 Thread Brian E Carpenter
This is what I meant when I said that the charter is unclear and it must explicitly state that NEA is not meant as a protection mechanism of any sort for the network. I don't believe the Charter needs to delve into this at all. If some people see it as part of their protection mechanisms,

Re: [Nea] WG Review: Network Endpoint Assessment (nea)

2006-10-09 Thread todd glassey
Subject: Re: [Nea] WG Review: Network Endpoint Assessment (nea) This is what I meant when I said that the charter is unclear and it must explicitly state that NEA is not meant as a protection mechanism of any sort for the network. I don't believe the Charter needs to delve into this at all

Re: [Nea] WG Review: Network Endpoint Assessment (nea)

2006-10-09 Thread Fritz F. Saad
, October 09, 2006 2:07 AM Subject: Re: [Nea] WG Review: Network Endpoint Assessment (nea) This is what I meant when I said that the charter is unclear and it must explicitly state that NEA is not meant as a protection mechanism of any sort for the network. I don't believe the Charter needs

Re: [Nea] WG Review: Network Endpoint Assessment (nea)

2006-10-09 Thread Brian E Carpenter
Agreed, we should work to fix that. ... The IETF has an obligation to WIPO and to the DMCA ... I can only assume this was intended as some form of joke. Brian ___ Ietf mailing list Ietf@ietf.org https://www1.ietf.org/mailman/listinfo/ietf

Re: [Nea] WG Review: Network Endpoint Assessment (nea)

2006-10-09 Thread Keith Moore
The IETF has an obligation to WIPO and to the DMCA ... I can only assume this was intended as some form of joke. regardless of intent, it should be treated as such. Keith ___ Ietf mailing list Ietf@ietf.org

Re: [Nea] WG Review: Network Endpoint Assessment (nea)

2006-10-09 Thread todd glassey
and can pretty much do anything they want. Todd Glassey - Original Message - From: Brian E Carpenter [EMAIL PROTECTED] To: ietf@ietf.org Cc: [EMAIL PROTECTED] Sent: Monday, October 09, 2006 7:31 AM Subject: Re: [Nea] WG Review: Network Endpoint Assessment (nea) Agreed, we should work to fix

Re: [Nea] WG Review: Network Endpoint Assessment (nea)

2006-10-09 Thread todd glassey
: [Nea] WG Review: Network Endpoint Assessment (nea) Tood, Agreed, we should work to fix that. Fritz. - Original Message - From: todd glassey [EMAIL PROTECTED] To: Brian E Carpenter [EMAIL PROTECTED]; [EMAIL PROTECTED] Cc: [EMAIL PROTECTED]; ietf@ietf.org Sent: Monday

RE: [Nea] WG Review: Network Endpoint Assessment (nea)

2006-10-09 Thread Narayanan, Vidya
Hi Darrly, snip It appears that the NEA charter is completely misleading to some people from what is stated in this email. As the NEA charter alludes to, NEA does nothing to protect against compromised devices. Also, as has been agreed, NEA is not a protection mechanism for

  1   2   >