< draft-farrell-perpass-attack-04.txt   draft-farrell-perpass-attack-05.txt >
Network Working Group S. Farrell Network Working Group S. Farrell
Internet-Draft Trinity College Dublin Internet-Draft Trinity College Dublin
Intended status: BCP H. Tschofenig Intended status: BCP H. Tschofenig
Expires: July 22, 2014 January 18, 2014 Expires: July 24, 2014 January 20, 2014
Pervasive Monitoring is an Attack Pervasive Monitoring is an Attack
draft-farrell-perpass-attack-04.txt draft-farrell-perpass-attack-05.txt
Abstract Abstract
Pervasive monitoring is a technical attack that should be mitigated Pervasive monitoring is a technical attack that should be mitigated
in the design of IETF protocols, where possible. in the design of IETF protocols, where possible.
Status of this Memo Status of this Memo
This Internet-Draft is submitted in full conformance with the This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79. provisions of BCP 78 and BCP 79.
skipping to change at page 1, line 31 skipping to change at page 1, line 31
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet- working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/. Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
This Internet-Draft will expire on July 22, 2014. This Internet-Draft will expire on July 24, 2014.
Copyright Notice Copyright Notice
Copyright (c) 2014 IETF Trust and the persons identified as the Copyright (c) 2014 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of (http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
skipping to change at page 3, line 45 skipping to change at page 3, line 45
to be published, be able to justify related design decisions. This to be published, be able to justify related design decisions. This
does not mean a new "pervasive monitoring considerations" section is does not mean a new "pervasive monitoring considerations" section is
needed in IETF documentation. It means that, if asked, there needs needed in IETF documentation. It means that, if asked, there needs
to be a good answer to the question "is pervasive monitoring relevant to be a good answer to the question "is pervasive monitoring relevant
to this work and if so how has it been considered?" to this work and if so how has it been considered?"
In particular, architectural decisions, including which existing In particular, architectural decisions, including which existing
technology is re-used, may significantly impact the vulnerability of technology is re-used, may significantly impact the vulnerability of
a protocol to PM. Those developing IETF specifications therefore a protocol to PM. Those developing IETF specifications therefore
need to consider mitigating PM when making these architectural need to consider mitigating PM when making these architectural
decisions and be prepared to justify their decisions. Getting decisions. Getting adequate, early review of architectural decisions
adequate, early review of architectural decisions including whether including whether appropriate mitigation of PM can be made is
appropriate mitigation of PM can be made is important. Revisiting important. Revisiting these architectural decisions late in the
these architectural decisions late in the process is very costly. process is very costly.
While PM is an attack, other forms of monitoring can be beneficial While PM is an attack, other forms of monitoring can be beneficial
and not part of any attack, e.g. network management functions monitor and not part of any attack, e.g. network management functions monitor
packets or flows and anti-spam mechanisms need to see mail message packets or flows and anti-spam mechanisms need to see mail message
content. Some monitoring can even be part of the mitigation for PM, content. Some monitoring can even be part of the mitigation for PM,
for example Certificate Transparency [RFC6962] involves monitoring for example Certificate Transparency [RFC6962] involves monitoring
Public Key Infrastructure in ways that could detect some PM attack Public Key Infrastructure in ways that could detect some PM attack
techniques. There is though a clear potential for monitoring techniques. There is though a clear potential for monitoring
mechanisms to be abused for PM, so this tension needs careful mechanisms to be abused for PM, so this tension needs careful
consideration in protocol design. Making networks unmanageable to consideration in protocol design. Making networks unmanageable to
 End of changes. 4 change blocks. 
7 lines changed or deleted 7 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/