On Mon, Jan 6, 2014 at 9:49 PM, Paul Lambert <[email protected]> wrote:

> > Comments welcome!
>
>
>
> Nice work!
>
>
Thanks!


Minor comment – don’t see any text on L2 wireless tracking.  All of our
> wireless devices effectively beacon our location and identity (e.g 802.11
> MAC addresses and probing). While not strictly a IETF domain of work (L2),
> the solutions to this class of problems do require changes in IETF
> protocols.
>

I also wonder to what degree this is a "pervasive attack" issue.  If the
attack involves being physically close to the victim, it's hard to see how
the attacker would achieve a pervasive scale.

What sorts of changes to IETF protocols are you imagining?

--Richard




>
>
> Paul
>
>
>
>
>
> *From:* perpass [mailto:[email protected]] *On Behalf Of *Richard
> Barnes
> *Sent:* Monday, January 06, 2014 6:24 PM
> *To:* perpass
> *Subject:* [perpass] Fwd: New Version Notification for
> draft-barnes-pervasive-problem-00.txt
>
>
>
> Dear PERPASS,
>
>
>
> Stephen asked me to take a stab at a problem statement for PERPASS.  With
> some help from Bruce, Cullen, and Ted, the results have just been published
> as draft-barnes-pervasive-problem-00.
>
>
>
> In general, this draft tries to outline at a technical level what we mean
> by pervasive attack, and what the high level mitigations are.
>
>
>
> Comments welcome!
>
>
>
> Thanks,
>
> --Richard
>
>
>
>
>
> ---------- Forwarded message ----------
> From: <[email protected]>
> Date: Mon, Jan 6, 2014 at 9:17 PM
> Subject: New Version Notification for draft-barnes-pervasive-problem-00.txt
> To: Cullen Jennings <[email protected]>, Ted Hardie <[email protected]>,
> Bruce Schneier <[email protected]>, Richard Barnes <[email protected]>
>
>
>
> A new version of I-D, draft-barnes-pervasive-problem-00.txt
> has been successfully submitted by Richard Barnes and posted to the
> IETF repository.
>
> Name:           draft-barnes-pervasive-problem
> Revision:       00
> Title:          Pervasive Attack: A Threat Model and Problem Statement
> Document date:  2014-01-06
> Group:          Individual Submission
> Pages:          23
> URL:
> http://www.ietf.org/internet-drafts/draft-barnes-pervasive-problem-00.txt
> Status:
> https://datatracker.ietf.org/doc/draft-barnes-pervasive-problem/
> Htmlized:
> http://tools.ietf.org/html/draft-barnes-pervasive-problem-00
>
>
> Abstract:
>    Documents published in 2013 have revealed several classes of
>    "pervasive" attack on Internet communications.  In this document, we
>    review the main attacks that have been published, and develop a
>    threat model that describes these pervasive attacks.  Based on this
>    threat model, we discuss the techniques that can be employed in
>    Internet protocol design to increase the protocols robustness to
>    pervasive attacks.
>
>
>
>
> Please note that it may take a couple of minutes from the time of
> submission
> until the htmlized version and diff are available at tools.ietf.org.
>
> The IETF Secretariat
>
>
>
_______________________________________________
perpass mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/perpass

Reply via email to