Hi,

I think the security considerations section in draft-ietf-alto-protocol-14
is indeed a big mess.  I mean nothing what's written there is really
wrong but it does not seem to be the result of a systematic analysis
what our relevant threats and countermeasures are.

We should try to give this section a systematic structure, probably
based on the basic protection goals of almost any networked system.
My proposal is:


13.      Security Considerations

13.1.    Authenticity and Integrity of ALTO queries and responses
13.1.1.  Threat scenarios
13.1.2.  High-level discussion of scenarios and protection mechanisms
13.1.3.  Recommendations for configuration of specific protection mechanisms
         in the protocol

13.2.    Confidentiality of ALTO queries and responses
13.2.1.  Threat scenarios
13.2.2.  High-level discussion of scenarios and protection mechanisms
13.2.3.  Recommendations for configuration of specific protection mechanisms
         in the protocol

13.3.    Availability of the ALTO service
13.3.1.  Threat scenarios
13.3.2.  High-level discussion of scenarios and protection mechanisms
13.3.3.  Recommendations for configuration of specific protection mechanisms
         in the protocol





For authenticity/integrity threat scenarios we already have some text in
RFC 5693, Sec. 6 that could be cited or copied and refined.

For confidentiality threat scenarios and discussion we have a rather
extensive analysis in RFC 6708, Sec 5.2 that should be just cited.


Just my $0.02
Sebastian
_______________________________________________
alto mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/alto

Reply via email to