Internet Draft T. Hansen
draft-ietf-grip-user-00.txt AT&T Laboratories
Valid for six months T. Killalea
Verio Northwest
January 31, 1999
Security Expectations for Internet Service Provider Consumers
<draft-ietf-grip-user-00.txt>
Author's version: 1.5
Status of this Memo
This document is an Internet-Draft and is in full conformance with
all provisions of Section 10 of RFC2026.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that other
groups may also distribute working documents as Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six
months and may be updated, replaced, or obsoleted by other documents at
any time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
To view the list Internet-Draft Shadow Directories, see
http://www.ietf.org/shadow.html.
This memo and its companions are discussed on the GRIP working
group mailing list, grip-wg[-request]@uu.net.
Copyright Notice
Copyright (C) The Internet Society (1998). All Rights Reserved.
Abstract
The purpose of this document is to provide information to the gen-
eral Internet community regarding security expectations of Internet Ser-
vice Providers (ISPs).
It is not the intent of this document to define a set of require-
ments that would be appropriate for all ISPs, but rather to provide the
community with a framework for discussion of security expectations with
current and prospective service providers.
Hansen [Page 1]
Internet Draft Security Expectations for ISP Consumers January 31, 1999
This document is written from the perspective of the consumer.
Companion documents provide information from the ISP perspective.
1. Introduction
The purpose of this document, and its companions [RFCisp] and
[RFCsshadd], is to express the general Internet community's expectations
of Internet Service Providers (ISPs) with respect to security.
A goal is that customers could have a framework to facilitate the
discussion of security with prospective service providers; regrettably,
such a discussion rarely takes place today.
Additionally, in informing ISPs of what the community hopes and
expects of them, a further goal is to encourage ISPs to become proactive
in making security not only a priority, but something to which they
point with pride when selling their services.
This document is addressed to Internet service purchasing
decision-makers (customers).
It has been argued that vendors begin to care about security only
when prompted by customers. We hope that these documents will encourage
both parties to more readily express how much they care about security,
and that discussion between the community and its ISPs will be
increased.
1.1. Conventions Used in this Document
The key words "REQUIRED", "MUST", "MUST NOT", "SHOULD", "SHOULD
NOT", and "MAY" in this document are to be interpreted as described in
"Key words for use in RFCs to Indicate Requirement Levels" [RFC2119].
2. Incident Response
A Security Incident Response Team (SIRT) is a team that performs,
coordinates, and supports the response to security incidents that
involve sites within a defined constituency. The Internet community's
expectations of SIRTs are described in [BCP21].
2.1. ISPs and Security Incident Response Teams
Some ISPs have Security Incident Response Teams (SIRTs). However
it should not be assumed that either the ISP's connectivity customers or
a site being attacked by a customer of that ISP can automatically avail
of the services of the ISP's SIRT. ISP SIRTs are frequently provided as
an added-cost service, with the team defining as their constituency only
those who specifically subscribe to (and perhaps pay for) Incident
Hansen [Page 2]
Internet Draft Security Expectations for ISP Consumers January 31, 1999
Response services.
Thus it's important to determine what incident response and secu-
rity resources are available to you, and define your incident response
escalation chain BEFORE an incident occurs.
You should find out if your ISP has a SIRT, and if so what the
charter, policies and services of that team are. (This information is
best expressed using the SIRT template as shown in Appendix D of
[BCP21].)
If the ISP doesn't have a SIRT, you should find out what role, if
any, they WILL take in incident response. You should also find out if
there is any other SIRT whose constituency would include yourself and to
whom incidents could be reported.
2.2. Assistance with Inbound Security Incidents
When a security incident targeting one of their connectivity custo-
mers occurs, you should expect your ISP to inform you of the attack,
provide assistance to trace the attack, and collect and protect evidence
of the incident and guard against its destruction or unintentional
announcement. If the event continues, you may ask the ISP to provide
logging in order to further diagnose the problem, or to perform filter-
ing of certain types of traffic.
2.3. Notification of Vulnerabilities and Reporting of Incidents
You should expect your ISP to be proactive in notifying you of
security vulnerabilities in the services they provide. In addition, as
new vulnerabilities in systems and software are discovered, they should
indicate whether their services are threatened by these risks.
When security incidents occur that affect components of an ISP's
infrastructure, your ISP SHOULD promptly report to you:
- who is coordinating response to the incident
- the vulnerability
- how service was affected
- what is being done to respond to the incident
- whether customer data may have been compromised
- what is being done to eliminate the vulnerability
Hansen [Page 3]
Internet Draft Security Expectations for ISP Consumers January 31, 1999
- the expected schedule for response, assuming it can be
predicted
2.4. Contact Information
If you need to contact someone at your ISP, you should use the
address SECURITY@your.isp.example for network security issues,
ABUSE@your.isp.example for issues relating to inappropriate public
behaviour, and NOC@your.isp.example for issues relating to network
infrastructure. ([RFC2142] states that sites (including ISPs) must
maintain these mailboxes, as well as additional mailboxes that are
defined for receiving queries and reports relating to specific ser-
vices.) Your ISP may also have web site addresses (e.g.,
http://www.ISP-name-here.net/security/) that you may use to check for
expanded details on the above. You should also be able to find contact
information for your ISP in Whois and in the routing registry [RFC1786].
2.5. Communication and Authentication
You should expect your ISP to have clear policies and procedures on
the sharing of information about a security incident with you, other
ISPs or SIRTs, with law enforcement, and with the press and the general
public. If your jurisdiction permits, you should expect to be able to
conduct such communication with your ISP over a secure channel.
3. Policies
3.1. Security Policy
You should expect your ISP to have a policy with regard to privacy,
authentication, accountability, application of security patches, availa-
bility and violations reporting.
A more detailed discussion of Security Policy can be found in the
Site Security Handbook [RFC2196].
3.2. Appropriate Use Policy
When you establish a contract with your ISP to provide connectivity
to the Internet, that contract SHOULD be governed by an Appropriate Use
Policy (AUP). The AUP SHOULD clearly identify what you may and may not
do on the various components of the system or network, including the
type of traffic allowed on the networks. The AUP should be as explicit
as possible to avoid ambiguity or misunderstanding.
The AUP should be reviewed each time you renew your contract. You
should also expect your ISP to proactively notify you as their policies
Hansen [Page 4]
Internet Draft Security Expectations for ISP Consumers January 31, 1999
are updated.
3.3. Sanctions
You should expect the AUP to be clear in stating what sanctions
will be enforced in the event of inappropriate behaviour. You should
also expect your ISP to be forthcoming in announcing to the community
when such sanctions are imposed.
3.4. Announcement of Policies
You should expect your ISP to publish their security and appropri-
ate use policies in a public place such as their web site. This way,
the community can be aware of what the ISP considers appropriate and can
know what action to expect in the event of inappropriate behaviour.
4. Network Infrastructure
Your ISP is responsible for managing the network infrastructure of
the Internet in such a way that it is:
- reasonably resistant to known security vulnerabilities
- not easily hijacked by attackers for use in subsequent attacks
5. Physical Security
If you have co-located equipment at your ISP's facility, the physi-
cal security of the installation should be given appropriate considera-
tion. This is particularly so for co-located facilities to which people
from different organisations and with different security policies have
access. Many issues arise surrounding customer access to their co-
located equipment.
Ideally you and each other customer SHOULD have a fully enclosed
locking 'cage', akin to a small room with walls and ceiling of heavy
wire mesh fencing, containing the racks in which their equipment is
mounted. Each customer would be allowed access to their own cage under
escort by one of the ISP's employees, or with keys that grant access
specifically to their cage.
This assignment of separate cages is expensive in terms of space
however, so many ISPs compromise by putting all co-located equipment
together in a single machine room, and managing the actions of escorted
customers very closely. However this may be insufficient to prevent
mishaps such as the accidental disconnection of another customer's
equipment. If a single machine room is used then the ISP SHOULD provide
separate locking cabinets for each co-location customer in preferance to
Hansen [Page 5]
Internet Draft Security Expectations for ISP Consumers January 31, 1999
an open common area.
You should expect to always be supervised while in the physical
presence of any equipment that is not yours, and should not expect to be
allowed to touch, photograph, or examine equipment belonging to another
customer.
Also of concern is layer 2 security of co-located equipment. Your
equipment SHOULD NOT be allowed to share a physical network segment with
hosts belonging to anyone else, whether another customer or the ISP
themselves. It's common for crackers to exploit weak security or unen-
crypted remote logins on co-located customer-owned equipment to take
control of that equipment and put it into promiscuous listening mode on
the local network segment, thereby potentially compromising the privacy
and security of any other devices on that segment.
6. References
[BCP21] Brownlee, N and E. Guttman, "Expectations for Computer
Security Incident Response", BCP 21, RFC 2350, June 1998.
[RFC1786] Bates, T., Gerich, E., Joncheray, L., Jouanigot, J-M.,
Karrenberg, D., Terpstra, M., and J. Yu, "Representation
of IP Routing Policies in a Routing Registry (ripe-
81++)", RFC 1786, March 1995.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", RFC 2119, March 1997.
[RFC2142] Crocker, D., "Mailbox Names for Common Services, Roles
and Functions", RFC 2142, May 1997.
[RFC2195] Klensin, J., Catoe, R., and P. Krumviede, "IMAP/POP
AUTHorize Extension for Simple Challenge/Response", RFC
2195, September 1997.
[RFC2196] Fraser, B., "Site Security Handbook", RFC 2196, September
1997.
7. Acknowledgements
We gratefully acknowledge the constructive comments received from
Nevil Brownlee, Randy Bush, Bill Cheswick, Barbara Y. Fraser, Randall
Gellens, Erik Guttman, Larry J. Hughes Jr., Klaus-Peter Kossakowski,
Michael A. Patton, Don Stikvoort and Bill Woodcock.
Hansen [Page 6]
Internet Draft Security Expectations for ISP Consumers January 31, 1999
8. Security
This entire document discusses security issues.
9. Author's Address
Tony Hansen
AT&T Laboratories
Lincroft, NJ 07738
USA
Phone: +1 732 576-3207
E-Mail: tony@att.com
Tom Killalea
Verio Northwest
15400 SE 30th Pl., Ste. 202
Bellevue, WA 98007-6546
USA
Phone: +1 425 649-7417
E-Mail: tomk@nw.verio.net
10. Full Copyright Statement
Copyright (C) The Internet Society (1998). All Rights Reserved.
This document and translations of it may be copied and furnished to
others, and derivative works that comment on or otherwise explain it or
assist in its implmentation may be prepared, copied, published and dis-
tributed, in whole or in part, without restriction of any kind, provided
that the above copyright notice and this paragraph are included on all
such copies and derivative works. However, this document itself may not
be modified in any way, such as by removing the copyright notice or
references to the Internet Society or other Internet organisations,
except as needed for the purpose of developing Internet standards in
which case the procedures for copyrights defined in the Internet Stan-
dards process must be followed, or as required to translate it into
languages other than English.
The limited permissions granted above are perpetual and will not be
revoked by the Internet Society or its successors or assigns.
This document and the information contained herein is provided on
an "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT
Hansen [Page 7]
Internet Draft Security Expectations for ISP Consumers January 31, 1999
NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL
NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR
FITNESS FOR A PARTICULAR PURPOSE."
This document expires August 1999.
Hansen [Page 8]