[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
GRIP WG Minutes from Pittsburgh IETF Meeting
Minutes for GRIP Working Group Meeting
Date: Tuesday, August 1, 2000
Time: 2:15pm - 3:15pm
Scribe: David Blumenstein (www.david.com)
The working group met for a single one-hour session this IETF. The first
part of the meeting focused on the current status of the ISP document.
During the IETF Last Call, at least one person expressed discomfort with
the content. The IESG sought external comment and the ISPs contacted said
the draft "needed cleaning up". There were issues that the draft was overly
prescriptive, and some of the practices that were included were unrealistic
business practices. Jeff Schiller, Area Director for Security Area,
commented that there exists a tension between Internet security and
business interests of ISPs to the point that the relationship between the
user and the ISP would be one of a contractual basis. He gave an example of
wanting his ISP to inform him when a security incident occurs that effects him.
The document editor, Tom Killalea, reported that he had revised the -03
version and thought the new draft addressed all the concerns that surfaced
during the IETF last call. He reviewed the changes he has made:
* Use of registries - updates if supported and operationally possible
* sanctions on open mail relays dropped (AUP)
* Message submission - priority ordered towards 1, SMTP AUTH 2, MAIL TO
The next portion of the meeting was spent reviewing the current evidence
protection draft. There was some discussion concerning the collection
procedures and the use of digital signatures.Signing makes the verification
easier.
Sections 3.2 "Collection Steps" and 4.2 "Archive" are really weak and need
to get bolstered. Attendees were encouraged to send content to the list.
Tom requested that attendees take the draft to their local law enforcement
folks for review. We want to ensure the document is as internationally
appropriate as possible.
There was some discussion about who the evidence was being protected for.
That is, is the document focused on protecting evidence so that law
enforcement can use it to track down the perpetrator, or is it focused on
protecting evidence so that when a perpetrator is identified, the evidence
will hold up in a court of law. It is the latter that this document is
concerned with.
Someone asked that the use of the phrase "law enforcement" be elaborated
for the context of this document. Others said the definition varies with
jurisdiction. These points will be discussed on the mailing list and the
revised draft will be uploaded by September 1, 2000
A new version of the user document will also be made available by September
1 by editor Manos Megagiannis. Attendees were urged to look for each of
these two documents and send their review comments to the list.