Skip to main content

Definitions of Managed Objects for iSNS (Internet Storage Name Service)
draft-ietf-ips-isns-mib-11

Yes

Lars Eggert
(Dan Romascanu)

No Objection

(Chris Newman)
(David Ward)
(Jari Arkko)
(Jon Peterson)
(Magnus Westerlund)
(Mark Townsley)
(Ron Bonica)
(Ross Callon)
(Russ Housley)
(Sam Hartman)

Note: This ballot was opened for revision 11 and is now closed.

Lars Eggert Yes

(Dan Romascanu; former steering group member) Yes

Yes ()

                            

(Chris Newman; former steering group member) No Objection

No Objection ()

                            

(David Ward; former steering group member) No Objection

No Objection ()

                            

(Jari Arkko; former steering group member) No Objection

No Objection ()

                            

(Jon Peterson; former steering group member) No Objection

No Objection ()

                            

(Magnus Westerlund; former steering group member) No Objection

No Objection ()

                            

(Mark Townsley; former steering group member) No Objection

No Objection ()

                            

(Ron Bonica; former steering group member) No Objection

No Objection ()

                            

(Ross Callon; former steering group member) No Objection

No Objection ()

                            

(Russ Housley; former steering group member) No Objection

No Objection ()

                            

(Sam Hartman; former steering group member) No Objection

No Objection ()

                            

(Tim Polk; former steering group member) No Objection

No Objection (2007-04-18)
The following text was contributed by Hannes Tschofenig in a Security
Directorate Review.  Please treat as Last Call comments:

I read into RFC 4171 to understand the topic a bit better since
draft-ietf-ips-isns-mib-11.txt is obviously not meant to be a good
start into the topic.

RFC 4171 obviously has a number of security relevant aspects that are
described in the security consideration section. The following aspects
are relevant for the monitoring of iSNS servers:


* Communication security aspects

This aspect relates to providing data origin authentication,
integrity, replay and confidentiality protection of data that is
transmitted between the involved entities.

The draft points to Section 8 of [RFC3410]. I am not sure whether this
is the correct section and maybe the hint is a bit unspecific. What do
I need to support in order to provide communication security?
* Unauthorized retrieval of information available via the MIB

The security requirements of draft-ietf-ips-isns-mib-11.txt mention
that the MIB contains security sensitive information that might be of
advantage for an adversary. Hence, access control may need to be
provided. The last paragraph in security consideration points to the
need for access control to ensure that only authorized entities are
able to read the MIB objects. Would it be useful to put a reference
to the User-based Security Model (USM) [RFC3414] of SNMPv3 and
to the work in progress of the ISMS working group (see
http://www.ietf.org/html.charters/isms-charter.html) with respect to
the usage of existing authentication infrastructures.  
* Unauthorized modification of data elements

RFC 4171 lists a number of security relevant elements, such as
IsnsPortalSecurityType, that impact the security of the entire system.
If an adversary would be able to modify the configuration settings of
a node then this would obviously be a serious problem (e.g., DoS,
masquerading).

As stated in the security consideration section of
draft-ietf-ips-isns-mib-11.txt there are no management objects defined
in this MIB that have a MAX-ACCESS clause of read-write and/or
read-create.

That's one possible way of dealing with a potential threat and fine
for me.