Hi Richard,

The new text looks great to me.

Thanks,
Brian

> On Feb 25, 2020, at 3:23 PM, Y. Richard Yang <[email protected]> wrote:
> 
> 
> Dear Brian,
> 
> Thank you so much for the review. Please see inline below.
> 
>> On Tue, Feb 25, 2020 at 12:56 AM Brian Weis via Datatracker 
>> <[email protected]> wrote:
>> Reviewer: Brian Weis
>> Review result: Ready
>> 
>> I have reviewed this document as part of the security directorate's
>> ongoing effort to review all IETF documents being processed by the IESG.
>> These comments were written primarily for the benefit of the security
>> area directors.  Document editors and WG chairs should treat these
>> comments just like any other last call comments.
>> 
>> This document defines the ALTO Cost Calendar, an extension to the base
>> Application-Layer Traffic Optimization (ALTO) protocol. Currently, the
>> ALTO cost information service provides applications with guidance about
>> current costs of a desired resource, but not for resources with a cost that
>> changes dramatically over time. The ALTO Cost Calendar allows for
>> specifying costs for varying time periods in the future.
>> 
>> The extensions in this document are to the existing network flows, with
>> policy defined in JSON. As such, additional security considerations are
>> few. The well-written Security Considerations document does define a few
>> considerations that come from announcing events that are expected to
>> happen in the future.
>> 
>> I have only one suggestion for additional text. The second
>> paragraph on page 27 (draft -17) describes risks of a client using the
>> calendaring information for their own selfish purposes. The suggested
>> mitigation in the next paragraph is to limit the information “being
>> leaked to malicious clients or third parties“ by authenticating clients
>> with TLS. This strategy may thwart “third parties”, but it will not help
>> in the case of “malicious clients” possessing valid credentials to
>> authenticate. The threat here might be legitimate clients that have
>> become subverted by an attacker and are now ‘bots’ being asked to
>> participate in a DDoS attack. The calendar information would be valuable
>> information for when to persecute a DDoS attack, and this should be
>> noted here.
> 
> 
> This is an excellent point. The compromised-but-still-appear-to-be-legitimate 
> is a quite reasonable setting. We have added the following paragraph, by 
> borrowing your excellent text above, right after the paragraph 
> "[RFC8446] specifies TLS 1.3 and writes in its section 1: ..."
> 
> New paragraph:
> 
>   The operator should be should be cognizant that the preceding mechanisms
>    do not address all security risks. In particular, they will not help in 
>    the case of “malicious clients” possessing valid credentials to
>    authenticate. The threat here can be that legitimate clients have
>    become subverted by an attacker and are now ‘bots’ being asked to
>    participate in a DDoS attack. The Calendar information would be valuable
>    information for when to persecute a DDoS attack. A mechanism such as
>    a monitoring system that detects abnormal behaviors may still be needed.."
> 
> How does it look?
> 
> Thanks a lot,
> Richard
> 
> 
> 
> 
_______________________________________________
alto mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/alto

Reply via email to