[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Draft Working Group Minutes



Attached are draft minutes from the opsec working group meeting
at the recent IETF -- in both Word and Text formats.

Please send corrections to me (optionally you may CC the working
group).

I would like to submit these one week from today.

Thanks, Ross

Attachment: OPSEC minutes March 2005.doc
Description: MS-Word document

MINUTES OF OPSEC WORKING GROUP
IETF 62, Minneapolis
Wednesday March 9, 2005 

Minutes by Ross Callon, with help from George Jones' Jabber minutes. 



Pat Cain presented the agenda:

* Administrivia and Agenda Bashing (Pat, Ross)
* Brief Working Group Status (Pat, Ross)
* Survey of Service Provider Security Practices (Merike Kaeo)
* Filtering Capabilities for IP Network Infrastructure (Chris Morrow)
* TMOC Liaison (Joe Saloway, Chris Lonvick)
* Adjourn



Brief Working Group Status (Pat)

* The currently available documents are: Framework  <draft-ietf-opsec-
  framework-00>, Survey of other security efforts <draft-ietf-opsec-
  efforts-00.txt>, Survey of Current Practices <draft-ietf-opsec-
  current-practices-00>, and filtering capabilities <draft-morrow-
  filter-caps-00>.
* Frame work document: Is stable, it outlines working group plan, scope, 
  etc.
* Individual capability documents: We have a draft of one of these 
  (filtering), and have some authors signed up for a few more. However, 
  we are still looking for input and/or authors for some of the 
  capabilities documents. 
* Profile documents are a future item (it makes sense to start them when 
  the capabilities documents are nearly complete).



Survey of Operational Service Provider Practices (Merike Kaeo)
<draft-ietf-opsec-current-practices-00.txt>

Merike gave an overview of the Survey of Current Service Provider 
Security Practices where she described the organization of the document 
and the sections requiring more input.  She mentioned that the Filtering 
and Denial of Service Mitigation sections will be the hardest to complete 
since current practices vary quite a bit between service providers.

For the next version:
* will fill in filtering and DOS mitigation sections
* intends to add an appendix which enumerates known common attacks (eg, 
  TCP attacks)
* be more specific about core security versus customer side security. 
  This is in particular relevant to filtering.

At this point Merike has talked to 6  large tier 1 ISPs, as well as other 
smaller ISPs. She encourages people to read the document, send comments, 
and in particular let her know if you have additional practices to tell 
her about. Merike and Ross pointed out that there are ways to contribute 
and remain anonymous if you want to do this: You can talk to Merike off 
line. Alternatively, if you want to contribute to the list anonymously, 
you can send comments to the chairs who can remove identification of 
where it came from and then forward to the list. 

George asked about layer 2 equipment and specifically whether layer 2 
filtering  practices will be included (which is not explicitly discussed 
in the current document but is in scope).   Merike replied that this will 
be specifically addressed since it is important at the customer edges for 
certain scenarios.



Packet Filtering Capabilities Document (Chris Morrow)
<draft-morrow-filter-caps-00.txt>

Chris Morrow apologize for the roughness of draft and lack of slides for 
this presentation. The goal for the filtering capabilities document, from 
his perspective, is to make it clear to vendors what service providers 
need. He has heard vendors say "you are the only person asking for this" 
when he didn't believe that this was true (and other service providers 
have reportedly heard the same). He would rather have a document that 
he can reference to aid discussion with vendors. He felt that George's 
document was a very good start, and his document (which was largely taken 
from George's RFC 3871), was a first rough start at fleshing out the 
filtering section of George's document. Chris welcome's comments. 

Chris Lonvick mentioned that TMOC has a document on packet filtering for 
the prevention of unwanted traffic and wanted to know whether we have 
looked at this. 

Pat noted that the document was put out a bit quickly. 

The intent is to update the draft and then put it out as a working group 
document. Are there any objections? (no objections)



ATIS Liaison Pre-Letter Ballow Review, TMOC Issue 56 (Chris Lonvick)
http://www.ietf.org/IESG/LIAISON/file92.pdf

ATIS/TMOC has appointed Chris Lonvick as official liaison and is asking 
for feedback.

Chris sent email to the Opsec list (March 8, the day before the working 
group meeting) with a pointer to a Liaison statement from ATIS asking for 
comments on a paper "Guidelines and Requirements for Network Security 
Management". We can send comments back to Chris and Joe. The pointer is 
also on the IETF liaision page.

One person (Richard Graveman) said "it needs a lot of work, many of the 
references are out of date". Chris agreed that the references are out of 
date. 

Points of interest: Section 4 contains the best summary of what the 
document is about, and how it correlates to security in ISP networks. 
The document addresses Security Management Operational Support Systems. 
Relationship with other documents is described. In section 5, the 
document goes through four major areas that need to be addressed wrt 
security. Defines some security points. Does not reference how this 
document relates back to an old ITU M3016, recommendation describing 
threats, requirements, and services. But this does use the requirements 
and services of 3016. In section 5 it discusses some security 
requirements. Chris asks: Are these issues clear, and do they address 
the correct set of security requirements? Does it make it clear who 
should be paying attention to these security requirements? Section 6 
discusses additional requirements. Please comment on whether these are 
clear and address real security requirements. Please send comments to 
Joe and Chris. Please also respond on whether this document should 
become an ANSI standard. The process that the document is currently 
being progressed through will end with an ANSI document. Also, if you 
feel that the document should continue to be progressed, please also 
comment on improvements that would be appropriate. Are there any 
questions on this? no questions. 

Pat: We have completed our originally scheduled agenda. Are there 
other issues that people want to address? No.

Pat: Please comment. Please volunteer to be an author. Thanks. 

The meeting was ajourned.