[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Response to opsec issues raised by Russ White
> Wow. Now we're down to American vs. British usage of the English
> language:
Hmmm.... I didn't realize there was a difference. :-)
> Try this:
>
> 04> 1.7 Intended Use
> 04>
> 04> It is anticipated that the requirements in this document will be used
> 04> for the following purposes:
> 04>
> 04> o as a checklist when evaluating networked products,
> 04>
> 04> o to create profiles of different subsets of the requirements which
> 04> describe the needs of different devices, organizations, and
> 04> operating environments,
> 04>
> 04> o to assist operators in clearly communicating their security
> 04> requirements,
> 04>
> 04> o as high level guidance for the creation of detailed test plans.
This is fine....
> rw> CLI.
> rw>
> rw> Several requirements refer to a Command Line Interface (CLI).
> rw> While this refers at present to a classic text oriented command
> rw> interface, it is not intended to preclude other mechanisms which
> rw> may meet all the requirements that reference "CLI".
> rw>
> rw> I would replace this throughout with "user interface," or "UI."
> rw> There's no reason to specify CLI, and then define it as UI. :-)
>
> This one has been back and forth several times. I tried to abstract it,
> but I think clarity was lost, so it came back to CLI with caveats that
> other mechanisms that met the same requirements would be acceptable.
> The CLI is a well known beast, even if ill defined. When you say "CLI"
> people know what you're talking about. Saying "user interface with the
> following 10 qualities" does not have the same clarity.
Well, but when you say "CLI," you mean a command line interface. This
draft, then requires all devices to have a command line interface--a gui,
or any other interface, isn't allowed, unless a CLI is also available. Is
that the intent?
> 04> Bogon.
> 04>
> 04> A "Bogon" (plural: "bogons") is a packet with a IP source address
> 04> in an address block not yet allocated by IANA or the Regional
> 04> Internet Registries (ARIN, RIPE, APNIC...) as well as all
> 04> addresses reserved for private or special use by RFCs. See
> 04> [RFC3330] and [RFC1918].
This is fine....
> rw> Should you refer to the idr draft about choosing good MD5 keys at some point in the 2.2.3 area, maybe?
>
> I-D.orman-public-key-lengths ?
>
> That's about key lengths and strength, and hence cited in 2.2.2 which is
> about cryptographic strength. 2.2.3 is about open review of protocols.
I was thinking about 3562. I don't know if that would fit in here anyplace,
but it might be a useful reference (?).
> 04> Management.
> 04>
> 04> This document uses a broad definition of the term "management".
> 04> In this document, "management" refers to any authorized
> 04> interaction with the device intended to change its operational
> 04> state or configuration. Data/Forwarding plane functions (e.g. the
> 04> transit of customer traffic) is not considered management.
> 04> Control plane functions such as routing, signaling and link
> 04> management protocols and management plane functions such as remote
> 04> access, configuration and authentication are considered to be
> 04> management.
>
> http://www.laurelnetworks.com/products/literature/security.pdf lays
> out the problem pretty well.
Okay, this is fine....
> 04> The following assumptions are made about out-of-band management:
> 04>
> 04> o The out-of-band management network is secure.
> 04>
> 04> o Communications beyond the management interface (e.g. console port,
> 04> management network interface) is secure.
> 04>
> 04> o There is no need for encryption of communication on out-of-band
> 04> management interfaces, e.g. on a serial connection between a
> 04> terminal server and a device's console port.
> 04>
> 04> o Security measures are in place to prevent unauthorized physical
> 04> access.
> 04>
> 04> Even if these assumptions hold it would be wise, as an application of
> 04> defense-in-depth, to apply the in-band requirements (e.g. encryption)
> 04> to out-of-band interfaces.
This is fine....
> The example section now reads:
>
> 04> One method might be to send a break on a serial line. Another might
> 04> involve physical action such as setting a jumper and/or power cycling
> 04> the device.
This is fine....
> rw> 2.4 Configuration and Management Interface Requirements
> rw>
> rw> I think you need better justification for this section than what
> rw> you've given here. This section is more of a wish list of what the UI
> rw> should support, and there's seems to be little justification given
> rw> for why these things make a network more secure (?).
>
> I disagree. I just re-read all the justification sections in 2.4.x
> and I think each one of them gives adequate security-related rational
> for the individual requirement. Show me which ones you think are weak
> on security rational ?
Well, why is it important that the interface be scriptable or programmatic?
I can see why it is from an operational perspective, but from a security
perspective? Wouldn't these sorts of things be better in a generic
"suggestions to vendors" draft, and then referenced here, since they are
more generic than security?
Thanks!
:-)
Russ
__________________________________
riw@cisco.com CCIE <>< Grace Alone