Uploaded image for project: 'Technical Committee Administration'
  1. Technical Committee Administration
  2. TCADMIN-2995

Coordinate with CTI TC in registering stix/taxii +json media types with IANA

    Details

    • Type: Registration / Template Request
    • Status: Closed
    • Priority: Major
    • Resolution: Fixed
    • Labels:
      None
    • Environment:

      CTI

       

      Description

      Community review notices were sent, and submission made

      STIX: Notice for a potential media type registration: application/stix+json
      https://www.ietf.org/mail-archive/web/media-types/current/msg00974.html
      https://mailarchive.ietf.org/arch/msg/media-types/aI--TDbP6iIARMTkoR41VOAg6Rs

      TAXII: Notice for a potential media type registration: application/taxii+json
      https://www.ietf.org/mail-archive/web/media-types/current/msg00973.html
      https://mailarchive.ietf.org/arch/msg/media-types/lN7iDAihnT9eK01wALUsgnOgE50

       

        Attachments

          Activity

          robincover Robin Cover (Inactive) created issue -
          robincover Robin Cover (Inactive) made changes -
          Field Original Value New Value
          Description Community review notices were sent, and submission made

          STIX: Notice for a potential media type registration: application/stix+json
          https://www.ietf.org/mail-archive/web/media-types/current/msg00974.html
          https://mailarchive.ietf.org/arch/msg/media-types/aI--TDbP6iIARMTkoR41VOAg6Rs

          TAXII: Notice for a potential media type registration: application/taxii+json
          https://www.ietf.org/mail-archive/web/media-types/current/msg00973.html
          https://mailarchive.ietf.org/arch/msg/media-types/lN7iDAihnT9eK01wALUsgnOgE50

           
          robincover Robin Cover (Inactive) made changes -
          Environment CTI TC, with Bret Jordan as appointed technical lead

          STIX: Notice for a potential media type registration: application/stix+json
          https://www.ietf.org/mail-archive/web/media-types/current/msg00974.html
          https://mailarchive.ietf.org/arch/msg/media-types/aI--TDbP6iIARMTkoR41VOAg6Rs

          TAXII: Notice for a potential media type registration: application/taxii+json
          https://www.ietf.org/mail-archive/web/media-types/current/msg00973.html
          https://mailarchive.ietf.org/arch/msg/media-types/lN7iDAihnT9eK01wALUsgnOgE50
          CTI TC, with Bret Jordan as appointed technical lead

          [|https://mailarchive.ietf.org/arch/msg/media-types/lN7iDAihnT9eK01wALUsgnOgE50]
          robincover Robin Cover (Inactive) made changes -
          Environment CTI TC, with Bret Jordan as appointed technical lead

          [|https://mailarchive.ietf.org/arch/msg/media-types/lN7iDAihnT9eK01wALUsgnOgE50]
          CTI TC, with Bret Jordan as appointed technical lead

           
          robincover Robin Cover (Inactive) made changes -
          Status Open [ 1 ] In Progress [ 3 ]
          Hide
          robincover Robin Cover (Inactive) added a comment -

          Formal submission of registration requests was made, and initial comments were sent back by IANA (IESG-designated experts).  Comment set sent to Bret Jordan for the two IANA responses.

          Show
          robincover Robin Cover (Inactive) added a comment - Formal submission of registration requests was made, and initial comments were sent back by IANA (IESG-designated experts).  Comment set sent to Bret Jordan for the two IANA responses.
          chet-oasis Chet Ensign made changes -
          Component/s IANA media type registration [ 12026 ]
          Hide
          robincover Robin Cover (Inactive) added a comment -

          To coordinate latest draft work with Chet on 2018-06-21.

          Show
          robincover Robin Cover (Inactive) added a comment - To coordinate latest draft work with Chet on 2018-06-21.
          Hide
          robincover Robin Cover (Inactive) added a comment -

          Send updated info to Chet Ensign and Paul Knight for handoff on this ticket.

          Show
          robincover Robin Cover (Inactive) added a comment - Send updated info to Chet Ensign and Paul Knight for handoff on this ticket.
          Hide
          robincover Robin Cover (Inactive) added a comment -

          TC principals (especially, Bret Jordan) on this ticket are encouraged to share insights with the members of the SARIF TC, who are seeking to register "application/sarif+json" in the coming days

          https://lists.oasis-open.org/archives/sarif/201806/msg00081.html

          And
          Coordinate with SARIF TC in registering application/sarif+json media type with IANA
          https://issues.oasis-open.org/browse/TCADMIN-3008
           

          Show
          robincover Robin Cover (Inactive) added a comment - TC principals (especially, Bret Jordan) on this ticket are encouraged to share insights with the members of the SARIF TC, who are seeking to register "application/sarif+json" in the coming days https://lists.oasis-open.org/archives/sarif/201806/msg00081.html And Coordinate with SARIF TC in registering application/sarif+json media type with IANA https://issues.oasis-open.org/browse/TCADMIN-3008  
          robincover Robin Cover (Inactive) made changes -
          Assignee Robin Cover [ robincover ] Chet Ensign [ chet-oasis ]
          Hide
          chet-oasis Chet Ensign added a comment -

          Bret sent me email 6/20:

          Subject: Correct OASIS email address to use in IANA stuff
          to me, Richard

          Chet,
          Will you be sending our response to IANA? They are due by the 30th of this month. The TAXII one is almost done and the STIX one is close.
          Bret

          I confirmed that to him.

          Show
          chet-oasis Chet Ensign added a comment - Bret sent me email 6/20: Subject: Correct OASIS email address to use in IANA stuff to me, Richard Chet, Will you be sending our response to IANA? They are due by the 30th of this month. The TAXII one is almost done and the STIX one is close. Bret I confirmed that to him.
          Hide
          chet-oasis Chet Ensign added a comment -

          Bret provided revised submissions.

          Show
          chet-oasis Chet Ensign added a comment - Bret provided revised submissions.
          Hide
          chet-oasis Chet Ensign added a comment -

          Revised submission for stix+json sent to iana-mime@iana.org
          ------
          IANA #1110641 Revised submission for stix+json media type

          sent: 5:04 PM (0 minutes ago)
          to: iana-mime
          cc: iana-mime-comm

          Our thanks to the IESG-designated media type experts for their review and feedback of the OASIS CTI Technical Committee's submission for stix+json media type.

          Below, please find the committee's revised submission, authored by Bret Jordan (bret_jordan at symantec.com) who has been tasked by the TC to provide the technical content.

          I am the designated administrative contact for OASIS for IANA registration requests. Please don't hesitate to contact either me or Bret on this submission.

          ===

          Revised submission:

          Name: Chet Ensign
          Email: chet.ensign@oasis-open.org

          Media type name: application
          Media subtype name: stix+json

          Required parameters: None

          Optional parameters: version.
          This parameter is used to designate the specification version of STIX that is being used during HTTP content negotiation. Example: "application/stix+json;version=2.1". The parameter value is of the form 'n.m', where n is the major version and m the minor version, both unsigned integer values.

          Encoding considerations: binary
          Encoding considerations are identical to those specified for the "application/json" media type. See [RFC8259].

          Security considerations:
          Security considerations relating to the generation and consumption of STIX messages are similar to application/json and are discussed in Section 12 of [RFC8259].

          Unicode is used to represent text such as descriptions in the format. The considerations documented by Unicode Technical Report #36: Unicode Security Considerations UnicodeTR#36 should be taken into account.

          The STIX standard does not itself specify a transport mechanism for STIX documents. It is expected that TAXII is often used (which uses TLS via HTTPS). As there is no transport mechanism specified, it is up to the users of this to use an appropriately authenticated transport method. For example, TLS, JSON Web Encryption [RFC7516] and/or JSON Web Signature [RFC7515] can provide such mechanisms.

          Documents of "application/stix+json" are STIX based Cyber Threat Intelligence (CTI) documents. The documents may contain active or executable content as well as URLs, IP addresses, and domain names that are known or suspected to be malicious. Systems should thus take appropriate precautions before decoding any of this content, either for persistent storage or execution purposes. Such precautions may include measures such as de-fanging, sandboxing, or other measures. The samples included in STIX documents are reference samples only, and there is no provision or expectation in the specification that they will be loaded and/or executed. There are provisions in the specification to encrypt these samples so that even if a tool decodes the data, a further active step must be done before the payload will be "live". It is highly recommended that all active code be armored in this manner.

          STIX specifies the use of hashing and encryption mechanisms for some data types. A cryptography expert should be consulted when choosing which hashing or encryption algorithms to use to ensure that they do not have any security issues.

          STIX provides a graph based data model. As such, STIX implementations should implement protections against graph queries that can potentially consume a significant amount of resources and prevent the implementation from functioning in a normal way.

          This specification also describes "STIX Patterning", a mechanism to describe and evaluate a search/match for data observed on systems and networks. Patterning is a grammar itself and includes PCRE regular expressions. Care should be taken when parsing and evaluating the grammar and executing PCRE from unknown or untrusted sources as they can potentially consume a significant amount of resources.

          Privacy considerations:
          These considerations are, in part, derived from Section 10 of the Resource-Oriented Lightweight Information Exchange [RFC8322].

          Documents may include highly confidential, personal (PII), and/or classified information. There are methods in the standard for marking elements of the document such that the consumer knows of these limitations. These markings may not always be used. For example, an out-of-band agreement may cover and restrict sharing. Just because a document is not marked as containing information that should not be shared does not mean that a document is free for sharing. It may be the case that a legal agreement has been entered into between the parties sharing documents, and that each party understand and follows their obligations under that agreement as well as any applicable laws or regulations.

          Adoption of the information-sharing approach described in this document will enable users to more easily perform correlations across separate, and potentially unrelated, cybersecurity information providers. A client may succeed in assembling a data set that would not have been permitted within the context of the authorization policies of either provider when considered individually. Thus, providers may face a risk of an attacker obtaining an access that constitutes an undetected separation of duties (SOD) violation. It is important to note that this risk is not unique to this specification, and a similar potential for abuse exists with any other cybersecurity information-sharing protocol.

          Interoperability considerations:
          The STIX specification specifies the format of conforming messages and the interpretation thereof. In addition, the OASIS Cyber Threat Intelligence (CTI) Technical Committee has defined interoperability tests to ensure conforming products and solutions can exchange STIX documents.

          Published specification:
          STIX Version 2.0 OASIS Committee Specification 01
          http://docs.oasis-open.org/cti/stix/v2.0/cs01/stix-v2.0-cs01.html
          Cited in the "OASIS Standards" document:
          https://www.oasis-open.org/standards#oasiscommiteespecs, from
          https://www.oasis-open.org/standards#stix2.0

          Applications which use this media:
          Structured Threat Information Expression (STIX) is a language and serialization format used to exchange cyber threat intelligence (CTI) such as Threat Actors, Campaigns, Intrusion Sets, Attack Patterns, Indicators of Compromise, etc. STIX enables organizations to share CTI with one another in a consistent and machine readable manner, allowing security communities to better understand what computer-based attacks they are most likely to see and to anticipate and/or respond to those attacks faster and more effectively. STIX is designed to improve many different capabilities, such as collaborative threat analysis, automated threat exchange, automated detection and response, and more.

          Fragment identifier considerations: None

          Restrictions on usage: None

          Provisional registration? (standards tree only):
          No

          Additional information:

          1. Deprecated alias names for this type: None
          2. Magic number(s): n/a [RFC8259]
          3. File extension(s): stix
          4. Macintosh file type code: TEXT [RFC8259]
          5. Object Identifiers: None

          General Comments:
          1) The "Published specification:" cited above was approved as Version 2.0 but is now under active revision (2018-05)

          2) The revised STIX specification Version 2.1 will contain the complete text of the (finalized) IANA Media Type Registration in an Appendix

          3) The technical content in the Version 2.1 revision for STIX does not materially change anything vis-a-vis STIX Version 2.0 as respects serialization, transport, or client-server interactions that depend upon media type and content negotiation.

          Person to contact for further information:

          1. Name: Chet Ensign
          2. Email: chet.ensign@oasis-open.org

          Intended usage: Common
          COMMON

          Author/Change controller:
          Author: OASIS Cyber Threat Intelligence (CTI) Technical Committee; URI reference: http://www.oasis-open.org/committees/cti/.
          Change controller: OASIS

          Show
          chet-oasis Chet Ensign added a comment - Revised submission for stix+json sent to iana-mime@iana.org ------ IANA #1110641 Revised submission for stix+json media type sent: 5:04 PM (0 minutes ago) to: iana-mime cc: iana-mime-comm Our thanks to the IESG-designated media type experts for their review and feedback of the OASIS CTI Technical Committee's submission for stix+json media type. Below, please find the committee's revised submission, authored by Bret Jordan (bret_jordan at symantec.com) who has been tasked by the TC to provide the technical content. I am the designated administrative contact for OASIS for IANA registration requests. Please don't hesitate to contact either me or Bret on this submission. === Revised submission: Name: Chet Ensign Email: chet.ensign@oasis-open.org Media type name: application Media subtype name: stix+json Required parameters: None Optional parameters: version. This parameter is used to designate the specification version of STIX that is being used during HTTP content negotiation. Example: "application/stix+json;version=2.1". The parameter value is of the form 'n.m', where n is the major version and m the minor version, both unsigned integer values. Encoding considerations: binary Encoding considerations are identical to those specified for the "application/json" media type. See [RFC8259] . Security considerations: Security considerations relating to the generation and consumption of STIX messages are similar to application/json and are discussed in Section 12 of [RFC8259] . Unicode is used to represent text such as descriptions in the format. The considerations documented by Unicode Technical Report #36: Unicode Security Considerations UnicodeTR#36 should be taken into account. The STIX standard does not itself specify a transport mechanism for STIX documents. It is expected that TAXII is often used (which uses TLS via HTTPS). As there is no transport mechanism specified, it is up to the users of this to use an appropriately authenticated transport method. For example, TLS, JSON Web Encryption [RFC7516] and/or JSON Web Signature [RFC7515] can provide such mechanisms. Documents of "application/stix+json" are STIX based Cyber Threat Intelligence (CTI) documents. The documents may contain active or executable content as well as URLs, IP addresses, and domain names that are known or suspected to be malicious. Systems should thus take appropriate precautions before decoding any of this content, either for persistent storage or execution purposes. Such precautions may include measures such as de-fanging, sandboxing, or other measures. The samples included in STIX documents are reference samples only, and there is no provision or expectation in the specification that they will be loaded and/or executed. There are provisions in the specification to encrypt these samples so that even if a tool decodes the data, a further active step must be done before the payload will be "live". It is highly recommended that all active code be armored in this manner. STIX specifies the use of hashing and encryption mechanisms for some data types. A cryptography expert should be consulted when choosing which hashing or encryption algorithms to use to ensure that they do not have any security issues. STIX provides a graph based data model. As such, STIX implementations should implement protections against graph queries that can potentially consume a significant amount of resources and prevent the implementation from functioning in a normal way. This specification also describes "STIX Patterning", a mechanism to describe and evaluate a search/match for data observed on systems and networks. Patterning is a grammar itself and includes PCRE regular expressions. Care should be taken when parsing and evaluating the grammar and executing PCRE from unknown or untrusted sources as they can potentially consume a significant amount of resources. Privacy considerations: These considerations are, in part, derived from Section 10 of the Resource-Oriented Lightweight Information Exchange [RFC8322] . Documents may include highly confidential, personal (PII), and/or classified information. There are methods in the standard for marking elements of the document such that the consumer knows of these limitations. These markings may not always be used. For example, an out-of-band agreement may cover and restrict sharing. Just because a document is not marked as containing information that should not be shared does not mean that a document is free for sharing. It may be the case that a legal agreement has been entered into between the parties sharing documents, and that each party understand and follows their obligations under that agreement as well as any applicable laws or regulations. Adoption of the information-sharing approach described in this document will enable users to more easily perform correlations across separate, and potentially unrelated, cybersecurity information providers. A client may succeed in assembling a data set that would not have been permitted within the context of the authorization policies of either provider when considered individually. Thus, providers may face a risk of an attacker obtaining an access that constitutes an undetected separation of duties (SOD) violation. It is important to note that this risk is not unique to this specification, and a similar potential for abuse exists with any other cybersecurity information-sharing protocol. Interoperability considerations: The STIX specification specifies the format of conforming messages and the interpretation thereof. In addition, the OASIS Cyber Threat Intelligence (CTI) Technical Committee has defined interoperability tests to ensure conforming products and solutions can exchange STIX documents. Published specification: STIX Version 2.0 OASIS Committee Specification 01 http://docs.oasis-open.org/cti/stix/v2.0/cs01/stix-v2.0-cs01.html Cited in the "OASIS Standards" document: https://www.oasis-open.org/standards#oasiscommiteespecs , from https://www.oasis-open.org/standards#stix2.0 Applications which use this media: Structured Threat Information Expression (STIX) is a language and serialization format used to exchange cyber threat intelligence (CTI) such as Threat Actors, Campaigns, Intrusion Sets, Attack Patterns, Indicators of Compromise, etc. STIX enables organizations to share CTI with one another in a consistent and machine readable manner, allowing security communities to better understand what computer-based attacks they are most likely to see and to anticipate and/or respond to those attacks faster and more effectively. STIX is designed to improve many different capabilities, such as collaborative threat analysis, automated threat exchange, automated detection and response, and more. Fragment identifier considerations: None Restrictions on usage: None Provisional registration? (standards tree only): No Additional information: 1. Deprecated alias names for this type: None 2. Magic number(s): n/a [RFC8259] 3. File extension(s): stix 4. Macintosh file type code: TEXT [RFC8259] 5. Object Identifiers: None General Comments: 1) The "Published specification:" cited above was approved as Version 2.0 but is now under active revision (2018-05) 2) The revised STIX specification Version 2.1 will contain the complete text of the (finalized) IANA Media Type Registration in an Appendix 3) The technical content in the Version 2.1 revision for STIX does not materially change anything vis-a-vis STIX Version 2.0 as respects serialization, transport, or client-server interactions that depend upon media type and content negotiation. Person to contact for further information: 1. Name: Chet Ensign 2. Email: chet.ensign@oasis-open.org Intended usage: Common COMMON Author/Change controller: Author: OASIS Cyber Threat Intelligence (CTI) Technical Committee; URI reference: http://www.oasis-open.org/committees/cti/ . Change controller: OASIS
          Hide
          chet-oasis Chet Ensign added a comment -

          Revised submission for taxii+json sent to iana-mime@iana.org

          —
          subject: IANA #1110642 Revised submission for taxii+json media type

          10:48 AM (0 minutes ago)
          to iana-mime, iana-mime-comm., bcc: Bret

          Our thanks to the IESG-designated media type experts for their review and feedback of the OASIS CTI Technical Committee's submission for taxii+json media type.

          Below, please find the committee's revised submission, authored by Bret Jordan (bret_jordan at symantec.com) who has been tasked by the TC to provide the technical content.

          I am the designated administrative contact for OASIS for IANA registration requests. Please don't hesitate to contact either me or Bret on this submission.

          ===

          Revised submission:

          Name: Chet Ensign
          Email: chet.ensign@oasis-open.org

          Media type name: application
          Media subtype name: taxii+json

          Required parameters: None

          Optional parameters: version.
          This parameter is used to designate the specification version of TAXII that is being used during HTTP content negotiation. Example: "application/taxii+json;version=2.1". The parameter value is of the form 'n.m', where n is the major version and m the minor version, both unsigned integer values.

          Encoding considerations: binary
          Encoding considerations are identical to those specified for the "application/json" media type. See [RFC8259].

          Security considerations:
          These considerations are, in part, derived from Section 9 of the Resource-Oriented Lightweight Information Exchange [RFC8322].

          This document defines a resource-oriented approach for exchanging cyber threat intelligence using HTTP [RFC7230] over TLS [RFC5246] and the JSON [RFC8259] Format. As such, implementers must understand the security considerations described in those specifications. All that follows is guidance; instructions that are more specific are out of scope for this document.

          Security considerations relating to the generation and consumption of TAXII messages are similar to application/json and are discussed in Section 12 of [RFC8259].

          The discovery API contains one or multiple URLs, therefor the security considerations stated in Section 6 of [RFC1738] should be consulted especially in regards to parsing relative URLs and attempts of path traversal.

          Documents of "application/taxii+json" are simply request and response messages for an RPC like mechanism for searching, uploading and downloading Cyber Threat Intelligence (CTI) documents, most commonly STIX. The documents only contain metadata about the TAXII server, such as descriptions, versions of CTI or status response of the request. Documents do not contain active or executable content.

          Unicode is used to represent text such as descriptions in the format. The considerations documented by Unicode Technical Report #36: Unicode Security Considerations [UNICODE] should be taken into account.

          To protect the confidentiality of a given resource provided by a TAXII implementation, requests for retrieval of a resource need to be authenticated to prevent unauthorized users from accessing the resource. It can also be useful to log and audit access to sensitive resources to verify that proper access controls remain in place over time.

          Access control to content made available using TAXII should use mechanisms that are appropriate to the sensitivity of the information. While the primitive authentication mechanism of HTTP Basic Authentication [RFC7617] is mandatory to implement for base level interoperability it is rarely appropriate for sensitive information. A number of authentication schemes are defined in the "HTTP Authentication Schemes" registry at IANA [IANA AUTH]. Of these, HTTP Origin-Bound Authentication (HOBA) [RFC7486] and SCRAM-SHA-256 [RFC7804] ("SCRAM" stands for "Salted Challenge Response Authentication Mechanism") provide improved security properties over HTTP Basic [RFC7617] and Digest [RFC7616] authentication schemes. However, sharing communities that are engaged in sensitive collaborative analysis and/or operational response for indicators and incidents targeting high-value information systems should adopt a suitably stronger user authentication solution, such as a risk-based or multi-factor approach.

          Collaborating consortiums may benefit from the adoption of a federated identity solution, such as those based upon OAuth [RFC6749] with the JSON Web Token (JWT) [RFC7797], or SAML-core [SAML-core] ("SAML" stands for "Security Assertion Markup Language"), SAML-bind [SAML-bind], and SAML-prof [SAML-prof] for web-based authentication and cross-organizational single sign-on. Dependency on a trusted third-party identity provider implies that appropriate care must be exercised to sufficiently secure the identity provider. Any attacks on the federated identity system would present a risk to the consortium, as a relying party. Potential mitigations include deployment of a federation-aware identity provider that is under the control of the information-sharing consortium, with suitably stringent technical and management controls.

          It is recommended that all TAXII servers authenticate and authorize access to all collection data on a per-client basis using robust security methods. While this specification defines HTTP Basic as a minimum suggested authentication mechanism, more advanced security authentication methods are recommended when products or deployments require stronger authentication and authorization frameworks for accessing or posting data to the TAXII server.

          Authorization of resource representations is the responsibility of the source system, i.e., based on the authenticated user identity associated with an HTTP(S) request. The required authorization policies that are to be enforced must therefore be managed by the security administrators of the source system. Various authorization architectures would be suitable for this purpose, such as Role-Based Access Control (RBAC) [NIST RBAC] and/or Attribute-Based Access Control (ABAC), as embodied in the eXtensible Access Control Markup Language (XACML) [XACML]. In particular, implementers adopting XACML may benefit from the capability to represent their authorization policies in a standardized, interoperable format. Note that implementers are free to choose any suitable authorization mechanism that is capable of fulfilling the policy enforcement requirements relevant to their consortium and/or organization.

          While the authentication and confidentiality for the TAXII session is done at a lower level via the transport mechanism (HTTPS), this does not obviate the consumer (server or client) from validating the format and contents of the documents sent in a session. This validation should includes checking various limits, such as document size limits, to limit the risk of the other party attempting to attack the service.

          Additional security requirements such as enforcing message-level security at the destination system could supplement the security enforcements performed at the source system; however, these destination-provided policy enforcements are out of scope for this specification. Implementers requiring this capability should consider leveraging, for example, the <RIDPolicy> element in the RID schema. Refer to Section 9 of [RFC6545] for more information. Additionally, the underlying JSON serialization used in the representation can offer encryption and message authentication capabilities. For example, JSON Web Encryption [RFC7516] and JSON Web Signature [RFC7515], can provide such mechanisms.

          TAXII Servers may manage response volume in different ways. Implementers should be aware that a search request may return more records than is prudent to return in a single HTTP Response. To mitigate this, TAXII servers should consider implementing restrictions on the number of records it will return in a single HTTP response.

          TAXII provides clients a rich set of filtering and query options to return specific results from repositories of CTI data. As such, TAXII servers should implement protections against queries that can potentially consume a significant amount of resources and prevent the server from functioning in a normal way.

          TAXII defines an optional error message that may contain sensitive application data. Implementers should ensure that they do not leak descriptive text or application return codes for things that a user may not have access to, for example leak info about existence of something, implementation of something, vs. just not having access.

          Note: Despite TAXII searching and returning STIX objects, this format does not encapsulate any CTI content. It is expected that CTI documents will be sent with the appropriate mime-type. For these, consult their own security consideration sections.

          Privacy considerations
          These considerations are, in part, derived from Section 10 of the Resource-Oriented Lightweight Information Exchange [RFC8322].

          The documents contain various descriptions and other text. There is no expectation that these will contain private information, but as some may be user provided, there is no guarantee that a user will not inadvertently include private data. It is expected that the client or server authenticate the other party through the transport mechanism before sending any possible private data. As the protocol is about sharing data, it is expected that the parties understand their obligations in keeping relevant data private.

          Adoption of the information-sharing approach described in this document will enable users to more easily perform correlations across separate, and potentially unrelated, cybersecurity information providers. A client may succeed in assembling a data set that would not have been permitted within the context of the authorization policies of either provider when considered individually. Thus, providers may face a risk of an attacker obtaining an access that constitutes an undetected separation of duties (SOD) violation. It is important to note that this risk is not unique to this specification, and a similar potential for abuse exists with any other cybersecurity information-sharing protocol. However, the wide availability of tools for HTTP clients implies that the resources and technical skills required for a successful exploit may be less than it was previously. This risk can be best mitigated through appropriate vetting of the client at the time of account provisioning. In addition, any increase in the risk of this type of abuse should be offset by the corresponding increase in effectiveness that this specification affords to the defenders.

          Overall, privacy concerns in TAXII can be mitigated by following security considerations and by the careful use of the content exchanged via TAXII.

          Interoperability considerations:
          The TAXII specification specifies the format of conforming messages and the interpretation thereof. In addition, the OASIS Cyber Threat Intelligence (CTI) Technical Committee has defined interoperability tests to ensure conforming products and solutions can exchange TAXII documents.

          Published specification:
          TAXII Version 2.0 OASIS Committee Specification 01
          http://docs.oasis-open.org/cti/taxii/v2.0/cs01/taxii-v2.0-cs01.html
          Cited in the "OASIS Standards" document:
          https://www.oasis-open.org/standards#oasiscommiteespecs, from
          https://www.oasis-open.org/standards#taxii2.0

          Applications which use this media:
          TAXII is an application layer protocol for the communication of cyber threat information including STIX in a simple and scalable manner.

          Fragment identifier considerations: None

          Restrictions on usage: None

          Provisional registration? (standards tree only):
          No

          Additional information:

          1. Deprecated alias names for this type: None
          2. Magic number(s): n/a [RFC8259]
          3. File extension(s): None
          4. Macintosh file type code: TEXT [RFC8259]
          5. Object Identifiers: None

          General Comments:
          1) The "Published specification:" cited above was approved as Version 2.0 but is now under active revision (2018-05)

          2) The revised TAXII specification Version 2.1 will contain the complete text of the (finalized) IANA Media Type Registration in an Appendix; in Version 2.0 the media type identifier was drafted (incorrectly) as a candidate for the vendor tree

          3) The technical content in the Version 2.1 revision for TAXII does not materially change anything vis-a-vis TAXII Version 2.0 as respects serialization, transport, or client-server interactions that depend upon media type and content negotiation

          Person to contact for further information:

          1. Name: Chet Ensign
          2. Email: chet.ensign@oasis-open.org

          Intended usage: Common
          COMMON

          Author/Change controller:
          Author: OASIS Cyber Threat Intelligence (CTI) Technical Committee; URI reference: http://www.oasis-open.org/committees/cti/.
          Change controller: OASIS

          Show
          chet-oasis Chet Ensign added a comment - Revised submission for taxii+json sent to iana-mime@iana.org — subject: IANA #1110642 Revised submission for taxii+json media type 10:48 AM (0 minutes ago) to iana-mime, iana-mime-comm., bcc: Bret Our thanks to the IESG-designated media type experts for their review and feedback of the OASIS CTI Technical Committee's submission for taxii+json media type. Below, please find the committee's revised submission, authored by Bret Jordan (bret_jordan at symantec.com) who has been tasked by the TC to provide the technical content. I am the designated administrative contact for OASIS for IANA registration requests. Please don't hesitate to contact either me or Bret on this submission. === Revised submission: Name: Chet Ensign Email: chet.ensign@oasis-open.org Media type name: application Media subtype name: taxii+json Required parameters: None Optional parameters: version. This parameter is used to designate the specification version of TAXII that is being used during HTTP content negotiation. Example: "application/taxii+json;version=2.1". The parameter value is of the form 'n.m', where n is the major version and m the minor version, both unsigned integer values. Encoding considerations: binary Encoding considerations are identical to those specified for the "application/json" media type. See [RFC8259] . Security considerations: These considerations are, in part, derived from Section 9 of the Resource-Oriented Lightweight Information Exchange [RFC8322] . This document defines a resource-oriented approach for exchanging cyber threat intelligence using HTTP [RFC7230] over TLS [RFC5246] and the JSON [RFC8259] Format. As such, implementers must understand the security considerations described in those specifications. All that follows is guidance; instructions that are more specific are out of scope for this document. Security considerations relating to the generation and consumption of TAXII messages are similar to application/json and are discussed in Section 12 of [RFC8259] . The discovery API contains one or multiple URLs, therefor the security considerations stated in Section 6 of [RFC1738] should be consulted especially in regards to parsing relative URLs and attempts of path traversal. Documents of "application/taxii+json" are simply request and response messages for an RPC like mechanism for searching, uploading and downloading Cyber Threat Intelligence (CTI) documents, most commonly STIX. The documents only contain metadata about the TAXII server, such as descriptions, versions of CTI or status response of the request. Documents do not contain active or executable content. Unicode is used to represent text such as descriptions in the format. The considerations documented by Unicode Technical Report #36: Unicode Security Considerations [UNICODE] should be taken into account. To protect the confidentiality of a given resource provided by a TAXII implementation, requests for retrieval of a resource need to be authenticated to prevent unauthorized users from accessing the resource. It can also be useful to log and audit access to sensitive resources to verify that proper access controls remain in place over time. Access control to content made available using TAXII should use mechanisms that are appropriate to the sensitivity of the information. While the primitive authentication mechanism of HTTP Basic Authentication [RFC7617] is mandatory to implement for base level interoperability it is rarely appropriate for sensitive information. A number of authentication schemes are defined in the "HTTP Authentication Schemes" registry at IANA [IANA AUTH] . Of these, HTTP Origin-Bound Authentication (HOBA) [RFC7486] and SCRAM-SHA-256 [RFC7804] ("SCRAM" stands for "Salted Challenge Response Authentication Mechanism") provide improved security properties over HTTP Basic [RFC7617] and Digest [RFC7616] authentication schemes. However, sharing communities that are engaged in sensitive collaborative analysis and/or operational response for indicators and incidents targeting high-value information systems should adopt a suitably stronger user authentication solution, such as a risk-based or multi-factor approach. Collaborating consortiums may benefit from the adoption of a federated identity solution, such as those based upon OAuth [RFC6749] with the JSON Web Token (JWT) [RFC7797] , or SAML-core [SAML-core] ("SAML" stands for "Security Assertion Markup Language"), SAML-bind [SAML-bind] , and SAML-prof [SAML-prof] for web-based authentication and cross-organizational single sign-on. Dependency on a trusted third-party identity provider implies that appropriate care must be exercised to sufficiently secure the identity provider. Any attacks on the federated identity system would present a risk to the consortium, as a relying party. Potential mitigations include deployment of a federation-aware identity provider that is under the control of the information-sharing consortium, with suitably stringent technical and management controls. It is recommended that all TAXII servers authenticate and authorize access to all collection data on a per-client basis using robust security methods. While this specification defines HTTP Basic as a minimum suggested authentication mechanism, more advanced security authentication methods are recommended when products or deployments require stronger authentication and authorization frameworks for accessing or posting data to the TAXII server. Authorization of resource representations is the responsibility of the source system, i.e., based on the authenticated user identity associated with an HTTP(S) request. The required authorization policies that are to be enforced must therefore be managed by the security administrators of the source system. Various authorization architectures would be suitable for this purpose, such as Role-Based Access Control (RBAC) [NIST RBAC] and/or Attribute-Based Access Control (ABAC), as embodied in the eXtensible Access Control Markup Language (XACML) [XACML] . In particular, implementers adopting XACML may benefit from the capability to represent their authorization policies in a standardized, interoperable format. Note that implementers are free to choose any suitable authorization mechanism that is capable of fulfilling the policy enforcement requirements relevant to their consortium and/or organization. While the authentication and confidentiality for the TAXII session is done at a lower level via the transport mechanism (HTTPS), this does not obviate the consumer (server or client) from validating the format and contents of the documents sent in a session. This validation should includes checking various limits, such as document size limits, to limit the risk of the other party attempting to attack the service. Additional security requirements such as enforcing message-level security at the destination system could supplement the security enforcements performed at the source system; however, these destination-provided policy enforcements are out of scope for this specification. Implementers requiring this capability should consider leveraging, for example, the <RIDPolicy> element in the RID schema. Refer to Section 9 of [RFC6545] for more information. Additionally, the underlying JSON serialization used in the representation can offer encryption and message authentication capabilities. For example, JSON Web Encryption [RFC7516] and JSON Web Signature [RFC7515] , can provide such mechanisms. TAXII Servers may manage response volume in different ways. Implementers should be aware that a search request may return more records than is prudent to return in a single HTTP Response. To mitigate this, TAXII servers should consider implementing restrictions on the number of records it will return in a single HTTP response. TAXII provides clients a rich set of filtering and query options to return specific results from repositories of CTI data. As such, TAXII servers should implement protections against queries that can potentially consume a significant amount of resources and prevent the server from functioning in a normal way. TAXII defines an optional error message that may contain sensitive application data. Implementers should ensure that they do not leak descriptive text or application return codes for things that a user may not have access to, for example leak info about existence of something, implementation of something, vs. just not having access. Note: Despite TAXII searching and returning STIX objects, this format does not encapsulate any CTI content. It is expected that CTI documents will be sent with the appropriate mime-type. For these, consult their own security consideration sections. Privacy considerations These considerations are, in part, derived from Section 10 of the Resource-Oriented Lightweight Information Exchange [RFC8322] . The documents contain various descriptions and other text. There is no expectation that these will contain private information, but as some may be user provided, there is no guarantee that a user will not inadvertently include private data. It is expected that the client or server authenticate the other party through the transport mechanism before sending any possible private data. As the protocol is about sharing data, it is expected that the parties understand their obligations in keeping relevant data private. Adoption of the information-sharing approach described in this document will enable users to more easily perform correlations across separate, and potentially unrelated, cybersecurity information providers. A client may succeed in assembling a data set that would not have been permitted within the context of the authorization policies of either provider when considered individually. Thus, providers may face a risk of an attacker obtaining an access that constitutes an undetected separation of duties (SOD) violation. It is important to note that this risk is not unique to this specification, and a similar potential for abuse exists with any other cybersecurity information-sharing protocol. However, the wide availability of tools for HTTP clients implies that the resources and technical skills required for a successful exploit may be less than it was previously. This risk can be best mitigated through appropriate vetting of the client at the time of account provisioning. In addition, any increase in the risk of this type of abuse should be offset by the corresponding increase in effectiveness that this specification affords to the defenders. Overall, privacy concerns in TAXII can be mitigated by following security considerations and by the careful use of the content exchanged via TAXII. Interoperability considerations: The TAXII specification specifies the format of conforming messages and the interpretation thereof. In addition, the OASIS Cyber Threat Intelligence (CTI) Technical Committee has defined interoperability tests to ensure conforming products and solutions can exchange TAXII documents. Published specification: TAXII Version 2.0 OASIS Committee Specification 01 http://docs.oasis-open.org/cti/taxii/v2.0/cs01/taxii-v2.0-cs01.html Cited in the "OASIS Standards" document: https://www.oasis-open.org/standards#oasiscommiteespecs , from https://www.oasis-open.org/standards#taxii2.0 Applications which use this media: TAXII is an application layer protocol for the communication of cyber threat information including STIX in a simple and scalable manner. Fragment identifier considerations: None Restrictions on usage: None Provisional registration? (standards tree only): No Additional information: 1. Deprecated alias names for this type: None 2. Magic number(s): n/a [RFC8259] 3. File extension(s): None 4. Macintosh file type code: TEXT [RFC8259] 5. Object Identifiers: None General Comments: 1) The "Published specification:" cited above was approved as Version 2.0 but is now under active revision (2018-05) 2) The revised TAXII specification Version 2.1 will contain the complete text of the (finalized) IANA Media Type Registration in an Appendix; in Version 2.0 the media type identifier was drafted (incorrectly) as a candidate for the vendor tree 3) The technical content in the Version 2.1 revision for TAXII does not materially change anything vis-a-vis TAXII Version 2.0 as respects serialization, transport, or client-server interactions that depend upon media type and content negotiation Person to contact for further information: 1. Name: Chet Ensign 2. Email: chet.ensign@oasis-open.org Intended usage: Common COMMON Author/Change controller: Author: OASIS Cyber Threat Intelligence (CTI) Technical Committee; URI reference: http://www.oasis-open.org/committees/cti/ . Change controller: OASIS
          Hide
          chet-oasis Chet Ensign added a comment -

          Amanda forwarded taxii+json submission with 2 minor in-line questions. I forwarded on to Bret, ccing Rich and Mark Davidson. She requested response by July 27th.

          Show
          chet-oasis Chet Ensign added a comment - Amanda forwarded taxii+json submission with 2 minor in-line questions. I forwarded on to Bret, ccing Rich and Mark Davidson. She requested response by July 27th.
          Hide
          chet-oasis Chet Ensign added a comment -

          Amanda responded on stix+json:

          The reviewer writes, "Without a doubt the best security considerations I've ever seen. There's a single word tweak that needs to be made, otherwise this is great."

          Do you agree with the one-word change the reviewer requests below? If so, we can make the edit and complete the registration process.

          —

          Bret agrees with the edit and also asks that they list application/vnd.oasis.stix+json in the deprecated list. Communicating this back to Amanda.

          Show
          chet-oasis Chet Ensign added a comment - Amanda responded on stix+json: The reviewer writes, "Without a doubt the best security considerations I've ever seen. There's a single word tweak that needs to be made, otherwise this is great." Do you agree with the one-word change the reviewer requests below? If so, we can make the edit and complete the registration process. — Bret agrees with the edit and also asks that they list application/vnd.oasis.stix+json in the deprecated list. Communicating this back to Amanda.
          Hide
          chet-oasis Chet Ensign added a comment -

          Amanda reports and Bret notifies the TC that the media type application is approved:

          All,

          I am pleased to announce that the STIX media type is now officially registered with IANA. The media type is:

          application/stix+json

          We defined one optional parameter called version. When using it to say represent 2.1 content, it would look like:

          application/stix+json;version2.1

          We are still waiting to hear on our application for the TAXII media type. Here is the link to the IANA page https://www.iana.org/assignments/media-types/application/stix+json

          Show
          chet-oasis Chet Ensign added a comment - Amanda reports and Bret notifies the TC that the media type application is approved: All, I am pleased to announce that the STIX media type is now officially registered with IANA. The media type is: application/stix+json We defined one optional parameter called version. When using it to say represent 2.1 content, it would look like: application/stix+json;version2.1 We are still waiting to hear on our application for the TAXII media type. Here is the link to the IANA page https://www.iana.org/assignments/media-types/application/stix+json
          Hide
          chet-oasis Chet Ensign added a comment -

          Official notice received from IANA:

          Amanda Baber via RT via icann.org
          2:32 PM (21 hours ago)
          to bret_jordan, me
          Dear Chet,

          We've registered the following media type:

          application/stix+json

          Please see

          http://www.iana.org/assignments/media-types

          If you need to update the contact information for this registration, please reply to this email or send a message to iana@iana.org.

          Show
          chet-oasis Chet Ensign added a comment - Official notice received from IANA: Amanda Baber via RT via icann.org 2:32 PM (21 hours ago) to bret_jordan, me Dear Chet, We've registered the following media type: application/stix+json Please see http://www.iana.org/assignments/media-types If you need to update the contact information for this registration, please reply to this email or send a message to iana@iana.org.
          Hide
          chet-oasis Chet Ensign added a comment -

          Official notice received from IANA:

          Amanda Baber via RT via icann.org
          3:25 PM (2 minutes ago)
          to bret_jordan, me
          Dear Chet,

          We've registered the following media type:

          application/taxii+json

          Please see

          http://www.iana.org/assignments/media-types

          If you need to update the contact information for this registration, please reply to this email or send a message to iana@iana.org

          Show
          chet-oasis Chet Ensign added a comment - Official notice received from IANA: Amanda Baber via RT via icann.org 3:25 PM (2 minutes ago) to bret_jordan, me Dear Chet, We've registered the following media type: application/taxii+json Please see http://www.iana.org/assignments/media-types If you need to update the contact information for this registration, please reply to this email or send a message to iana@iana.org
          chet-oasis Chet Ensign made changes -
          Environment CTI TC, with Bret Jordan as appointed technical lead

           
          CTI

           
          Hide
          chet-oasis Chet Ensign added a comment -

          The media types have both been approved by IANA as recorded in the comments.

          Closing this ticket.

          Show
          chet-oasis Chet Ensign added a comment - The media types have both been approved by IANA as recorded in the comments. Closing this ticket.
          chet-oasis Chet Ensign made changes -
          Resolution Fixed [ 1 ]
          Status In Progress [ 3 ] Resolved [ 5 ]
          chet-oasis Chet Ensign made changes -
          Status Resolved [ 5 ] Closed [ 6 ]

            People

            • Assignee:
              chet-oasis Chet Ensign
              Reporter:
              robincover Robin Cover (Inactive)
            • Watchers:
              2 Start watching this issue

              Dates

              • Due:
                Created:
                Updated:
                Resolved: