INTERNET-DRAFT                                                R. Housley
Intended Status: Informational                             Vigil Securiy
Expires: January 12, 2014                                      S. Turner
                                                                    IECA
                                                           July 11, 2013

                         sacm: Asset Identifier
                 draft-handt-sacm-asset-identifiers-00

Abstract

   This document examines the asset identifiers available for sacm and
   it proposes that OIDs (Object Identifiers) be selected as the asset
   identifier format.

Status of this Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

Copyright and License Notice

   Copyright (c) 2013 IETF Trust and the persons identified as the
   document authors. All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document. Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document. Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

   This document may contain material from IETF Documents or IETF
   Contributions published or made publicly available before November
   10, 2008.  The person(s) controlling the copyright in some of this



Housley & Turner        Expires January 12, 2014                [Page 1]


INTERNET-DRAFT            sacm: Asset Identi*              July 11, 2013


   material may not have granted the IETF Trust the right to allow
   modifications of such material outside the IETF Standards Process.
   Without obtaining an adequate license from the person(s) controlling
   the copyright in such materials, this document may not be modified
   outside the IETF Standards Process, and derivative works of it may
   not be created outside the IETF Standards Process, except to format
   it for publication as an RFC or to translate it into languages other
   than English.

1.  Introduction

   The meaning of the terms identity, identification, and identifier are
   often conflated.  This document uses and proposes that sacm use the
   terms as defined in [RFC4949], where system entity is replace by
   asset:

     o Asset identity is "the collective aspect of a set of attribute
       values (i.e., a set of characteristics) by which [an asset] is
       recognizable or known."

     o Asset identification is an "act or process that presents an
       identifier to a system so that the system can recognize [an
       asset] and distinguish it from other [assets]."

     o An asset identifier is a "data object -- often, a printable, non-
       blank character string -- that definitively represents a specific
       identity of [an asset], distinguishing that identity from all
       others."

   You've got an identity, we've got an identity, we've all got an
   identity.  Even assets have at least one identity.  For the purpose
   of this document, an asset is any computing based hardware and the
   software, including operating system, that runs on the hardware.
   Examples of computing devices include laptops, tablets, servers,
   routers, and telephones but as more and more devices are computerized
   this could expand to the break room's toaster [Arkko].

   Obviously, assets exist therefore they have an identity and because
   they exist (and they cost money to build or buy) enterprises will
   manage them.  It cost money to buy the asset so there is little doubt
   they should be tracked to make sure at minimum the asset does not
   find itself disappeared.  More to the point, enterprises do not wish
   their assets to misbehave.  When the toaster starts acting like a
   flame thrower, it is a very bad day in the break room.

   Identifiers are an easy way to sum up the asset's identity that
   uniquely identifies it from other assets of the same type.  If
   there's two toasters in the break room and only one is misbehaving,



Housley & Turner        Expires January 12, 2014                [Page 2]


INTERNET-DRAFT            sacm: Asset Identi*              July 11, 2013


   then it would be good to know which one is misbehaving; it's even
   more important to know which asset is misbehaving if there are ninety
   thousand IP-based sensors in a building and one is acting up.

   The identifier is also import because asset identifiers enable
   authenticated identities that in turn serve as basis for security
   services such as peer entity authentication.

   This document examines the proposes that OIDs (Object Identifiers) be
   used as the asset identifier in sacm (a proposed wg at the time this
   was submitted).

2.  Identifiers

   Identifiers are a dime a dozen.  Some make sense and some do not.
   This section will examine some options, but first it propose some
   requirements.

   For asset identification to work, application developers, os
   (operating system) vendors, and hardware manufacturers need to be the
   ones assigning identifiers.  Interacting with a 3rd party to obtain
   an identifier would add unacceptable complexity.

   Asset identifiers need not include all of the identity's attribute
   values in the identifier.  In the same way an X.509 certificate often
   only includes a country name, organization, and common name but not
   hair color, height and weight.

   Asset identifiers need not have any inherent semantic meaning that's
   the job for metadata.

2.1.  Identifier Format Options

2.1.1.  CPE

   Common Platform Enumeration (CPE) "is a structured naming scheme for
   information technology systems, software, and packages" and it is a
   "method of describing and identifying classes of applications,
   operating systems, and hardware devices present among an enterprise's
   computing assets." It is a product of US NIST (National Institute of
   Standards and Technology) Computer Security Division, Information
   Technology Laboratory, sponsored by the US DHS's (Department of
   Homeland Security's) National Cyber Security Division.  All
   intellectual property has been transferred to NIST [CPE-IPR].

   CPE is a four part document set [CPE].  CPE's specifications define
   the naming scheme (the format and binding of names) and matching
   rules for the names.  Also defined is a dictionary (aka repository or



Housley & Turner        Expires January 12, 2014                [Page 3]


INTERNET-DRAFT            sacm: Asset Identi*              July 11, 2013


   directory) that holds the names and metadata about the names that can
   be accessed for lookups and searches presumably to ensure there's no
   duplication amongst the names.  Finally, an application language is
   defined for applicability statements (aka logical expressions) using
   WFNs (Well-Formed Names) "to tag checklists, policies, guidance, and
   other documents with information about the product(s) to which the
   documents apply."

   In terms of asset identifiers, the naming document applies as well as
   the requirements in the directory document for which of the 7 WFN
   name attributes are required.  The remaining documents, the name
   matching, the application language, and the rest of the directory
   document, are not germane to the asset identifier topic.

   A WFN (Well-Formed Name), as defined in the CPE naming document, is
   "a logical construct only" and "is not intended to be a data format,
   encoding, or any other kind of machine-readable representation for
   machine interchange and processing."  The URI (Uniform Resource
   Identifiers) [RFC3986] and formatted string bindings are the machine-
   readable representation for machine interchange and processing.  A
   WFN has 7 naming attributes (whose purposes are pretty self-
   explanatory so this document does not copy the definitions but
   instead leaves it to the motivated reader to read NIST's
   specifications): part, vendor, product, version, update, edition,
   language, sw_edition, target_sw, target_hw, other.  Part
   (application, operating system, hardware), vendor, product, and
   version must be present, as specified in the directory document.

   A major issue with a WFN as the asset identifier is it's scope.  CPE
   provides identifiers for platforms, including both hardware and
   software, but not to the level necessary to act as the asset
   identifier because it lacks the ability to disambiguate between
   hardware of software of the same type.

   Another major issue with CPE is process by which one is obtained; an
   application needs to be submitted to NVD (National Vulnerability
   Database), which is run by the USG (United States Government).  This
   simple fact likely renders CPE, as it is currently specified and
   operated, as unsatisfactory as the basis for sacm because there will
   be some non-US entity unwilling or unable to submit an application.

3.1.2.2.  SWID

   Software Identifier (SWID), documented in ISO/IEC 19770-2:2009, is as
   its name implies an identifier for software.  SWIDs can be assigned
   by software developers or by organizations that purchased software
   without a SWID.




Housley & Turner        Expires January 12, 2014                [Page 4]


INTERNET-DRAFT            sacm: Asset Identi*              July 11, 2013


   Complaints about SWID include:

   o The standards is not free.  In terms of IETF process, this is not
     show stopper.  The standard must be publicly available and it even
     it costs some.

   o SWIDs aren't free.  This is not entirely clear because there
     appeared to be a way for opensource software to receive a tag.

     Note that Software Entitlement (SWEN) Tags, documented in ISO/IEC
     19770-3, are likely a non-starter in the IETF because of DRM
     issues.

     The reason SWIDs obviously can't be the identifier is that

3.1.2.3.  Protocol Identifiers

     Protocol identifiers encompass identifiers such as MAC (Media
     Access Control), IPv4 [RFC791], IPv6 [RFC2460], as well as IPv6's
     CGAs (Cryptographically Generated Addresses)
     [RFC3972][RFC4581][RFC4982] and UUIDs (Universal Unique
     Identifiers) [RFC4122].  None of these are appropriate for the
     asset identifier for sacm because of their scope.

3.1.2.6.  OIDs

     OIDs are abstract and can actually represent anything.  OIDs are
     cheap, and there are ways to get them for free.  OIDs can be
     obtained from the IANA PEN (Private Enterprise Number) Registry
     [IANA-PEN] or from the ITU's UUID OID page [I-UUID].

     OIDs are also already used by management protocols SNMP and for
     identifying hardware modules for firmware distribution [RFC4108].

4.  Recommendations

     Select OIDs as the asset identifier format.


5.  Security Considerations

     Identifiers that include inherent semantic meaning may divulge
     information about that asset if the identifier is not protected at
     rest and in transit.


6.  IANA Considerations




Housley & Turner        Expires January 12, 2014                [Page 5]


INTERNET-DRAFT            sacm: Asset Identi*              July 11, 2013


     There are no IANA considerations present in this document.

     If OIDs are chosen as the asset identifier, then entities wishing
     to use OIDs may obtain them using the procedures


7.  References

7.1  Normative References

   [RFC4949]  Shirey, R., "Internet Security Glossary, Version 2", FYI
              36, RFC 4949, August 2007.


7.2  Informative References

   [RFC791]   Postel, J., "Internet Protocol", STD 5, RFC 791, September
              1981.

   [RFC2460]  Deering, S. and R. Hinden, "Internet Protocol, Version 6
              (IPv6) Specification", RFC 2460, December 1998.

   [RFC3972]  Aura, T., "Cryptographically Generated Addresses (CGA)",
              RFC 3972, March 2005.

   [RFC3986]  Berners-Lee, T., Fielding, R., and L. Masinter, "Uniform
              Resource Identifier (URI): Generic Syntax", STD 66,
              RFC 3986, January 2005.

   [RFC4108]  Housley, R., "Using Cryptographic Message Syntax (CMS) to
              Protect Firmware Packages", RFC 4108, August 2005.

   [RFC4122]  Leach, P., Mealling, M., and R. Salz, "A Universally
              Unique IDentifier (UUID) URN Namespace", RFC 4122, July
              2005.

   [RFC4581]  Bagnulo, M. and J. Arkko, "Cryptographically Generated
              Addresses (CGA) Extension Field Format", RFC 4581, October
              2006.

   [RFC4982]  Bagnulo, M. and J. Arkko, "Support for Multiple Hash
              Algorithms in Cryptographically Generated Addresses
              (CGAs)", RFC 4982, July 2007.

   [CPE]       https://nvd.nist.gov/cpe.cfm
               https://csrc.nist.gov/publications/nistir/ir7695/
               NISTIR-7695-CPE-Naming.pdf




Housley & Turner        Expires January 12, 2014                [Page 6]


INTERNET-DRAFT            sacm: Asset Identi*              July 11, 2013


               https://csrc.nist.gov/publications/nistir/ir7696/
               NISTIR-7696-CPE-Matching.pdf

               https://csrc.nist.gov/publications/nistir/ir7697/
               NISTIR-7697-CPE-Dictionary.pdf

               https://csrc.nist.gov/publications/nistir/ir7698/
               NISTIR-7698-CPE-Language.pdf

   [CPE-IPR]   https://cpe.mitre.org/index.html


   [IANA-PEN]  http://pen.iana.org/pen/PenApplication.page

   [I-UUID]     http://www.itu.int/ITU-T/asn1/uuid.html#registration

   [Arkko]     http://online.wsj.com/article/
               SB10001424052702303544604576434013394780764.html

Authors' Addresses

   Russ Housley
   Vigil Security, LLC
   918 Spring Knoll Drive
   Herndon, VA 20170
   USA

   Email: : housley@vigilsec.com

   Sean Turner
   IECA, Inc.
   3057 Nutley Street, Suite 106
   Fairfax, VA 22031
   USA

   Email: turners@ieca.com















Housley & Turner        Expires January 12, 2014                [Page 7]