[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Draft opsec working group minutes
Here are draft minutes from the OPSEC
working group in Paris. Please
send corrections to Pat and me. If you commented or spoke, then
please
check that we didn't mangle either your name or what you said.
Thanks, Ross
---------------------------------------------------------------------------------------------------
Operational Security Capabilities for IP Network Infrastructure
(opsec)
August 3rd, 2005 (at Paris IETF)
Chairs: Pat Cain
Ross Callon
Agenda:
- Administrivia / agenda bashing
- working group and document status (Pat)
- Current Documents
- Framework (Ross)
- Survey of Service Provider
Current Practices (Merike Kaeo)
- Filtering Capabilities for
IP Net Infrastructure (Chris Morrow)
- Proposed New Document
- A proposed new document on
Best Practices (Chris Morrow)
Administrivia / Agenda Bashing
Ross and Pat agreed to take minutes (with help from Matthew
Zekauskas).
(no jabber scribe)
Current document / working group status (Pat)
- there are four classes of documents
(take from slides)
- four documents are currently out
- framework
- survey of other security
efforts
- current provider
practices
- filtering capabilities
- The charter calls for quite a few documents. Some may be
combined.
- Some volunteers have gotten their work done. Some have not. Some
volunteers have disappeared. We are still looking for
people willing
to work on documents. If you have volunteered in the
past, expect us
to bug you. ;-)
Framework status (Ross Callon)
<draft-ietf-opsec-framework-00.txt>
- This is a roadmap of the working group effort.
- update coming
- not much different. This is primarily just a re-issue to keep
the draft
from timing out.
Current Practices document (Merike Kaeo)
<draft-ietf-opsec-current-practices-01.txt>
- Documents the security practices currently used in SP networks.
- document is almost done
- deleted filtering section, since felt that this would be
redundant with the
existing filtering capabilities draft.
- added text for DOS mitigation but this still needs work. Added
appendix
to detail some common packet mangling attacks.
Merike intends to submit a -02 version within the next month which will
include DoS mitigation section with more detail. She will also solicit
input from the mailing list.
Questions
Ross; What about large enterprises? This might for example include things
like firewalls and perhaps intrusion detection and/or prevention. Merike:
Interested. Chris Morrow: this is a large can of worms. Merike: If it is
this large a can of worms, it might be worth putting this into a
different document (allowing us to finish this document). This would
imply a change in the title of this document to limit it to service
providers. Merike volunteered to work on the large enterprise network
security practices document.
Packet Filtering Capabilities (Chris Morrow)
<draft-morrow-filter-caps-01.txt>
Chris Morrow briefly discussed the packet filtering capabilities draft.
This document is cut'n'paste of multiple inputs (including RFC3871)
Draft -01 is out. The change is mainly structure regarding data plane
versus mgt/control plane.
Filter traffic through the device, but also filter snmp, bgp, telnet to
the device
-Need to filter non-transit traffic
-Trying to protect the lower speed customer traffic
-Map functions back to the current practices document
- in some cases rate limiting is useful (eg, to reduce size of
problems)
- work at line rate
The capabilities in this document should map back to the current
practices document (which implies that it might be useful to have a
filtering section in the current practices document).
Added some layer2 functionality
-MAC address, ATM, SONET, etc
(I think that Chris said that he would be adding more text on this based
on input)
Darrel Lewis: Does the mgt plane include control plane?
A: Yes, it's really a combination, includes BGP, control, login,
etc.
Ross: To me the term "control plane" normally includes both
routing and management (which I believe is the intent here, and thus the
term "control plane" fits).
Darrel: Maybe we should use the X.805 definitions for consistency
Next steps
- Need to map doc sections to practice document.
- Validate current structure and subsections are valid
Barbara Fraser: Is there any new functionality in the document (ie,
capabilities which are not currently widely deployed)?
A (Chris). Not really. Some deployed devices do all the functions, but
there are some devices that don't do all of them.
Merike: Don't forget that the profiles documents will take all the
capabilities and map them to specific environments.
Infrastructure Protection BCP (Darrel Lewis, Chris Morrow, Paul
Quinn)
Chris presented an idea to produce a document which will document some
recommended "best practices". This could provide an
introduction for newer, smaller providers or customers. Will be a
detailed guide of the capabilities.
Susan Hares: Is the capability document mainly a procurement
document
Merike: This maps well to the other documents
Darrel: This should be good just like BCP38
Ross: There may be some confusion between this proposed new document and
the existing document on current practices.
Paul Quinn: This would propose a bare minimum of practices as the survey
is
really a list of things that providers do.
Discussion on whether this as a BCP will map to the other
documents.
Pat: Let's wait for some text before we figure out what type of
document
this is. Ross: It will be easier to know whether this document is best
kept on
its own (and separate from the current practices and profile documents)
after
we see the text. Thus it makes sense to see a draft of this document.
Pat: It may be useful to send a message to the list with a synopsis of
the proposed document.
Randy Preshin: Make sure we're compliant with rfc2026
Chris: Structure of doc:edge remarking, edge access control, core
hiding,
route filtering. Not covered: Logging evaluation, net mgt, customer
security, service
protection
End of working group