Hi Stephen,
Adding to Flemming’s comment,  finding “exact quotes” will be difficult as 
their intent is really not to break things but rather want to ensure that 
inspection and oversight is available to affect guards/protections within an 
(enterprise/data center) infrastructure.   That said, PCI and other regulations 
will have a lot of documents that one has to go through….one that kind-of calls 
explicitly to the use of packet inspection, firewalling and such is in:

https://www.pcisecuritystandards.org/documents/SAQ_D_v3_Merchant.pdf

It is an assessment questionnaire for vendors to evaluate their compliance, the 
requirements speak to securing the network and systems including firewalls, 
DMZs and the ability to do packet inspection.

Thanks, Nancy 

On 11/7/17, 3:27 PM, "Flemming Andreasen (fandreas)" <fandr...@cisco.com> wrote:

    Thanks for taking an initial look at the document Stephen - please see 
    below for responses so far
    
    On 11/7/17 4:13 AM, Stephen Farrell wrote:
    > Hiya,
    >
    > On 07/11/17 02:48, Flemming Andreasen wrote:
    >> We didn't draw any particular line, but the use case scenarios that we
    >> tried to highlight are those related to overall security and regulatory
    >> requirements (including public sector)
    > I had a quick look at the draft (will try read properly en-route to
    > ietf-100) and I followed the reference to [1] but that only lead to a
    > forest of documents in which I didn't find any reference to breaking
    > TLS so far at least. Can you provide an explicit pointer to the
    > exact document on which that claim is based?
    For NERC, you can look under  "(CIP) Critital Infrastructure 
    Protection". CIP-005-5 for example covers the electronic security 
    perimeter, which has a couple of relevant requirements and associated text:
    
    
http://www.nerc.com/_layouts/PrintStandard.aspx?standardnumber=CIP-005-5&title=Cyber%20Security%20-%20Electronic%20Security%20Perimeter(s)&jurisdiction=United%20States
 
    
    
    To be clear though, the document does not specifically call out breaking 
    TLS, but it does clearly call out the need to detect malicious inbound 
    and outbound communications by leveraging an "Electronic Access Point" 
    (e.g. IDS/IPS) to enforce the Electronic Security Perimeter.
    > I'd also claim that your reference to PCI-DSS is misleading, as that
    > same spec also explicitly calls for there to be good key management
    > specifically including minimising the number of copies of keys, so
    > at most, one might be able to claim that PCI-DSS is ok with people
    > who break TLS in a nod-and-a-wink manner. But if you do have a real
    > quote from PCI-DSS that calls for breaking TLS then please do also
    > send that (it's been asked for a bunch of times without any answer
    > being provided so far).
    
    I will need to look more closely for such a quote - if anybody else 
    knows of one, please chime in as well.
    
    Thanks
    
    -- Flemming
    
    
    > Thanks,
    > S.
    >
    >
    > [1]
    > 
https://tools.ietf.org/html/draft-camwinget-tls-use-cases-00.html#ref-NERCCIP
    >
    
    

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to