[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
RE: Begin Last Call on draft-ietf-opsec-current-practices-06
Sorry to get back to you that late, but vacation season interfered. For
the third comment, because of the distance between 2.2.2 and 2.2.4, I
believe it would have been more clear to add at the first occurrence of
the words 'community string' something like '(used in SNMPv1 and
SNMPv2c)'. I se that 07 is out, it would be nice to add this if still
possible, but it's not a show-stopper.
Dan
> -----Original Message-----
> From: Merike Kaeo [mailto:merike@doubleshotsecurity.com]
> Sent: Saturday, August 12, 2006 12:59 AM
> To: Romascanu, Dan (Dan)
> Cc: Ross Callon; opsec@ops.ietf.org
> Subject: Re: Begin Last Call on draft-ietf-opsec-current-practices-06
>
> I can modify wording as pointed out in your comments 1 and 2 below.
>
> For the third comment on SNMP, noone I talked to said
> anything about using
> SNMPv3 nor have any comments from ISPs mentioned it. Do you
> think I need to put more explicit text in the main 2.2.2
> section? Note that it was implied that SNMPv3 was not used in
> the additional considerations section with the following paragraph:
>
> " In instances where SNMP is used, some legacy devices only support
> SNMPv1 which then requires the provider to mandate its
> use across all
> infrastructure devices for operational simplicity. SNMPv2 is
> primarily deployed since it is easier to set up than v3."
>
> Thanks.
>
> - merike
>
> On Aug 7, 2006, at 1:58 AM, Romascanu, Dan ((Dan)) wrote:
>
> > Here are a few comments:
> >
> > 1. Section 1.2
> >
> >> All of the threats in any
> > network infrastructure is an instantiation or combination of the
> > following:
> >
> > I would rephrase to fix the syntax, and also to make the statement
> > less comprehensive (saying 'ALL of the threats in ANY network
> > infrastructure'
> > seems to be too strong)
> >
> > 2. Section 1.3
> >
> >> This is
> > possible if the attacker has control of a host in the
> > communications path between two victim machines or has
> > compromised
> > the routing infrastructure to specifically arrange
> that traffic
> > pass through a compromised machine.
> >
> > I would mention the case when the traffic is mirrored to a
> compromised
> > machine.
> >
> > Also
> >
> >> Thus, if an attack depends on being
> > able to receive data, off-path hosts must first subvert the
> > topology in order to place themselves on-path. This is by no
> > means impossible but is not necessarily trivial. [RFC3552]
> >
> > Is ignoring the same potential threat of hijacking a
> traffic mirroring
> > capability installed for debugging, performance monitoring or
> > accounting purposes and divert traffic to a host that
> belongs to the
> > attacker without necessarily subverting the topology.
> >
> > 3. Section 2.2.2 - The two paragraphs that deal with SNMP refer to
> > community strings, thus they seem to be SNMPv1 and SNMPv2c
> oriented.
> > The current standard version is SNMPv3, which has a
> different security
> > framework. It's OK to refer to the older versions if this is the
> > current practice, but the text should explicitly mention this.
> >
> > Regards,
> >
> > Dan
> >
> >
> >
> >
> >
> >
> >
> >> -----Original Message-----
> >> From: owner-opsec@psg.com [mailto:owner-opsec@psg.com] On
> Behalf Of
> >> Ross Callon
> >> Sent: Monday, July 31, 2006 10:01 PM
> >> To: opsec@ops.ietf.org
> >> Subject: Re: Begin Last Call on
> draft-ietf-opsec-current-practices-06
> >>
> >> We will extend this for another week, until August 15th (two weeks
> >> from tomorrow), since I forgot to copy the last call to
> Nanog (which
> >> I just fixed).
> >>
> >> Thanks, Ross
> >>
> >>> Date: Mon, 24 Jul 2006 17:01:58 -0400
> >>> To: opsec@ops.ietf.org
> >>> From: Ross Callon <rcallon@juniper.net>
> >>> Subject: Begin Last Call on draft-ietf-opsec-current-practices-06
> >>>
> >>> This begins working group last call on
> >>> draft-ietf-opsec-current-practices-06
> >>> "Operational Security Current Practices". The last call
> >> will terminate
> >>> two weeks from tomorrow (Tuesday August 8th).
> >>>
> >>> Comments to the list please.
> >>>
> >>> thanks, Ross
> >>
> >>
> >>
> >
> >
>
>