<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=Content-Type content="text/html; charset=iso-8859-1">
<meta name=Generator content="Microsoft Word 12 (filtered medium)">
<!--[if !mso]>
<style>
v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style>
<![endif]-->
<title>[LACNIC/Seguridad] Security Assessment of TCP at the IETF</title>
<style>
<!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
{font-family:Tahoma;
panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0in;
margin-bottom:.0001pt;
font-size:12.0pt;
font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:blue;
text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-priority:99;
color:purple;
text-decoration:underline;}
p
{mso-style-priority:99;
mso-margin-top-alt:auto;
margin-right:0in;
mso-margin-bottom-alt:auto;
margin-left:0in;
font-size:12.0pt;
font-family:"Times New Roman","serif";}
span.EstiloDeEmail18
{mso-style-type:personal-reply;
font-family:"Calibri","sans-serif";
color:#1F497D;}
.MsoChpDefault
{mso-style-type:export-only;
font-size:10.0pt;}
@page Section1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;}
div.Section1
{page:Section1;}
-->
</style>
<!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=EN-US link=blue vlink=purple>
<div class=Section1>
<p class=MsoNormal><span style='font-size:11.0pt;font-family:"Calibri","sans-serif";
color:#1F497D'>Dear Max, <o:p></o:p></span></p>
<p class=MsoNormal><span style='font-size:11.0pt;font-family:"Calibri","sans-serif";
color:#1F497D'> <o:p></o:p></span></p>
<p class=MsoNormal><span style='font-size:11.0pt;font-family:"Calibri","sans-serif";
color:#1F497D'>we have been facing problems regarding several attempts sweeping
ports of our firewalls. In a recent case we obtained reports that they were
treated of ips of provider LOCAWEB, here in Brazil. Now, I ask; how can a name
provider give up ips to hackers? Which control does exist so that they avoid
such supplies? <o:p></o:p></span></p>
<p class=MsoNormal><span style='font-size:11.0pt;font-family:"Calibri","sans-serif";
color:#1F497D'><o:p> </o:p></span></p>
<p class=MsoNormal><span style='font-size:11.0pt;font-family:"Calibri","sans-serif";
color:#1F497D'>In Brazil no there is still a law so that they force supplying
us IP allocated by the provider when of an attack. The slowness in the
treatment and search for information of the origin of the attack is dependent
of an excessive bureaucracy, the one that finishes motivating the attacks,
because we gave up. <o:p></o:p></span></p>
<p class=MsoNormal><span style='font-size:11.0pt;font-family:"Calibri","sans-serif";
color:#1F497D'><o:p> </o:p></span></p>
<p class=MsoNormal><span style='font-size:11.0pt;font-family:"Calibri","sans-serif";
color:#1F497D'>For norms, we protected ourselves with ISO/IEC 27001, 18044,
etc... but it is not enough if no there is a government law that it helps to
minimize attacks hackers. <o:p></o:p></span></p>
<p class=MsoNormal><span style='font-size:11.0pt;font-family:"Calibri","sans-serif";
color:#1F497D'>is my protest, in the hope of until you of this immense list to
help us.<o:p></o:p></span></p>
<p class=MsoNormal><span style='font-size:11.0pt;font-family:"Calibri","sans-serif";
color:#1F497D'><o:p> </o:p></span></p>
<div>
<p class=MsoNormal><span style='font-size:10.0pt;font-family:"Tahoma","sans-serif";
color:#002060'>Wladimir<o:p></o:p></span></p>
<p class=MsoNormal><span style='font-size:10.0pt;font-family:"Tahoma","sans-serif";
color:#002060'>Security Officer<o:p></o:p></span></p>
<p class=MsoNormal><span style='font-size:10.0pt;font-family:"Tahoma","sans-serif";
color:#002060'>PanAmericano<o:p></o:p></span></p>
<p class=MsoNormal><span style='font-size:11.0pt;font-family:"Calibri","sans-serif";
color:#002060'><o:p> </o:p></span></p>
</div>
<p class=MsoNormal><span style='font-size:11.0pt;font-family:"Calibri","sans-serif";
color:#1F497D'><o:p> </o:p></span></p>
<div>
<div style='border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in 0in 0in'>
<p class=MsoNormal><b><span lang=PT-BR style='font-size:10.0pt;font-family:
"Tahoma","sans-serif"'>De:</span></b><span lang=PT-BR style='font-size:10.0pt;
font-family:"Tahoma","sans-serif"'> seguridad-bounces@lacnic.net
[mailto:seguridad-bounces@lacnic.net] <b>Em nome de </b>Max Lazaro Taico<br>
<b>Enviada em:</b> Saturday, June 27, 2009 6:29 PM WLAD<br>
<b>Para:</b> Lista para discusión de seguridad en redes y sistemas informaticos
de la región; seguridad@lacnic.net<br>
<b>Assunto:</b> Re: [LACNIC/Seguridad] Security Assessment of TCP at the IETF<o:p></o:p></span></p>
</div>
</div>
<p class=MsoNormal><o:p> </o:p></p>
<div id=idOWAReplyText61009>
<div>
<p class=MsoNormal><span style='font-size:10.0pt;font-family:"Arial","sans-serif";
color:black'>Estimados Amigos,</span><o:p></o:p></p>
</div>
<div>
<p class=MsoNormal> <o:p></o:p></p>
</div>
<div>
<p class=MsoNormal><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'>Podrian
comentar como vienen en cada pais afrontando el tema de los delitos
informaticos, hacks a bancos, ingreso a base de datos de entidades publicas,
etc. (el cual podria incluir procedimientos operativos y temas de regulaciones
normativas entre otros)</span><o:p></o:p></p>
</div>
<div>
<p class=MsoNormal> <o:p></o:p></p>
</div>
<div>
<p class=MsoNormal><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'>Gracias,</span><o:p></o:p></p>
</div>
<div>
<p class=MsoNormal> <o:p></o:p></p>
</div>
<div>
<p class=MsoNormal><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'>Max,</span><o:p></o:p></p>
</div>
</div>
<div id=idSignature80848>
<p class=MsoNormal><o:p> </o:p></p>
<div class=MsoNormal align=center style='text-align:center'>
<hr size=2 width="100%" align=center>
</div>
<p class=MsoNormal style='margin-bottom:12.0pt'><b><span style='font-size:10.0pt;
font-family:"Tahoma","sans-serif"'>De:</span></b><span style='font-size:10.0pt;
font-family:"Tahoma","sans-serif"'> seguridad-bounces@lacnic.net en nombre de
Fernando Gont<br>
<b>Enviado el:</b> sáb 27/06/2009 15:35<br>
<b>Para:</b> seguridad@lacnic.net<br>
<b>Asunto:</b> [LACNIC/Seguridad] Security Assessment of TCP at the IETF</span><o:p></o:p></p>
</div>
<div>
<p style='margin-bottom:12.0pt'><span style='font-size:10.0pt'>Estimados,<br>
<br>
El tcpm wg de la IETF esta decidiendo en este momento que hacer con el<br>
documento draft-gont-tcp-security, que es una version para la IETF del<br>
documento sobre seguridad en TCP que el UK CPNI publico a principios de<br>
este año.<br>
<br>
Estaría interesanet que quienes puedan/deseen emitan su opinion en la<br>
lista de correo relevante. A continuación les envio (en ingles) una<br>
explicación un poco mas detallada, junto con los enlaces correspondientes:<br>
<br>
In February this year the UK CPNI published the document "Security<br>
Assessment of the Transmission Control Protocol (TCP)" (available at:<br>
<a href="http://www.cpni.gov.uk/Docs/tn-03-09-security-assessment-TCP.pdf">http://www.cpni.gov.uk/Docs/tn-03-09-security-assessment-TCP.pdf</a>)<br>
<br>
Earlier this year we published an IETF Internet-Draft version of this<br>
document (available at:<br>
<a
href="http://www.gont.com.ar/drafts/tcp-security/draft-gont-tcp-security-00.txt">http://www.gont.com.ar/drafts/tcp-security/draft-gont-tcp-security-00.txt</a>)<br>
in the hope of having the IETF further work on the TCP security paper UK<br>
CPNI had published.<br>
<br>
My personal take (possibly biased, since I am the document author)<br>
is that this document has been the result of a lot of work (including<br>
the work of the many peple that reviewed the CPNI version of the<br>
document), and that the IETF should take this chance to work and publish<br>
something on the subject.<br>
<br>
The chairs of the TCPM Working Group of the IETF are currently polling<br>
the WG for input about this document. It would be great if you could<br>
voice your opinion about whether the TCPM should take this document on,<br>
and also whether you would be willing to review this document. (Bellow<br>
you'll find a copy of the TCPM chairs' poll)<br>
<br>
Please send your comments to tcpm@ietf.org (and please CC me).<br>
<br>
Thanks!<br>
<br>
Kind regards,<br>
Fernando<br>
<br>
<br>
<br>
<br>
--------- Original Message --------<br>
Subject: [tcpm] poll for adopting draft-gont-tcp-security<br>
Date: Wed, 24 Jun 2009 14:25:04 -0500<br>
From: Eddy, Wesley M. (GRC-MS00)[Verizon] <wesley.m.eddy@nasa.gov><br>
To: tcpm Extensions WG <tcpm@ietf.org><br>
<br>
TCPMers, there was a thread a while ago about working on<br>
draft-gont-tcp-security in this working group that didn't<br>
conclusively give us a feeling one way or other:<br>
<a href="http://www.ietf.org/mail-archive/web/tcpm/current/msg04489.html">http://www.ietf.org/mail-archive/web/tcpm/current/msg04489.html</a><br>
<br>
Basically, my understanding is that there are at least a<br>
handful of people in the WG that think it should be done<br>
here as a WG item (more likely for Informational rather<br>
than BCP), and there are also some expressed opinions on<br>
why it shouldn't.<br>
<br>
Given the raw size of the document, if the WG intends to<br>
take this document on, then we need some people to clearly<br>
commit to putting cycles into review and contributions to<br>
the document. Since it is quite large, and to my knowledge,<br>
there hasn't been a specific technical review of the content<br>
on this list, but just discussions about if the idea in<br>
general is a good or bad thing, we still need to know if<br>
people are willing to invest their time and energy in this.<br>
<br>
Please let us know if there is traction for this in the<br>
near term, and/or we can also discuss it in Stockholm.<br>
<br>
----------------------------<br>
Wes Eddy<br>
Network & Systems Architect<br>
Verizon FNS / NASA GRC<br>
Office: (216) 433-6682<br>
----------------------------<br>
<br>
_______________________________________________<br>
tcpm mailing list<br>
tcpm@ietf.org<br>
<a href="https://www.ietf.org/mailman/listinfo/tcpm">https://www.ietf.org/mailman/listinfo/tcpm</a><br>
<br>
<br>
--<br>
Fernando Gont<br>
e-mail: fernando@gont.com.ar || fgont@acm.org<br>
PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1<br>
<br>
<br>
<br>
<br>
<br>
_______________________________________________<br>
Seguridad mailing list<br>
Seguridad@lacnic.net<br>
<a href="https://mail.lacnic.net/mailman/listinfo/seguridad">https://mail.lacnic.net/mailman/listinfo/seguridad</a></span><o:p></o:p></p>
</div>
</div>
</body>
</html>