IMHO, gear replacement after large outages is quite relevant:

I have seen equipment become unusable after bad
power situations (spike, brownout, electrical storms,..) because of
el-cheapo power supply/circuitry as well as wired interface
circuitry/protection. Certifications in Telco/IoT make that type of gear
often better, but those certifcations are a zoo.

- Large organizations will have spares. With ANIMA, those spares should
  be stored pre-enrolled to avoid MASA/registrar dependency during
  recovery/replacements: Receive gear on any site (no central provisioning
  site needed), but unpack, plug in for short period, then stash away.
  
  This is imo an easy requirement also useful without desaster requirements
  - aka: enrolled spares would likely also have better theft/abuse protection
  than non-enrolled. And yes, you will have to power up these spares
  once a year. Which IMHO is ok. And of course certs should therefore
  be somewhat longer than 1 year).

- If sparing would be cross-locations (eg: spares sent from some site to
  other sites during recovery), then its important that the ANIMA certs do
  not include any location specific attributes that would prohibit thart
  movement. So far BRSKY does not include any such attributes, but in
  discussions, three has been interest to lock into the cert some device
  role specific attributes, and for a spare piecce of equipment, those
  attributes may not be predetermined.

  Aka: Desaster sparing means domain certs need to be simple, devices
  reuseable across domain.

- If spares are done by a shared facility: vendor, FEMO (for fed networks)
  or the like, one could think of that entity offering (emergency)
  enrolment service.

  Such an entity would have desaster proof MASA connectivity on site,
  and the customers would provide it with (emergency) registrar certs.
  (emergency) meaning that the entity is only permitted to enrol during
  emergencies, and the customer could be able to verify the emergency
  entities behavior by pulling from the MASA an audit log.

  If the customer would give the emergeny registrar credentials
  cert/private/public-key to the emergeny entities, then the customer
  itself also has the cert/private-key and could ask the MASA.
  This option would work with current BRSKY text. I am just not sure
  about security BCP (having two copies of a public key pair...).

- If the shared spare storage facility is Best Buy, and the Jones
  family wants to replace some electric storm victims @home while
  their ISP takes its days (my ISP C*...*T took almost 48 hours in one case),
  then the gear should probably come with a nonceless voucher
  printed on on a scratcher piece of paper inside the box.

Beyond these BRSKY considerations, the next cool ANIMA piece to consider
for these use-cases is of course the ASA driven "re-configuration" of the
spare device, aka: In larger outages, you should not except the whole
network provisioning backend to be up and running. And its IMHO
illusionary to expect devices to ONLY be driven from intent for many
years (in complex networks... in a clean homenet they are driven by
intent today..). 

Aka: for pre-intent-only desaster proof networks, we'd need:
  - ASA to cache neighbors configs.
  - reapply neighbor stored config when replacement gear is inserted.
  - IMHO: An anima definition for a "device-role-id" which is not
    the ACP IPv6 address (which will change upon gear replacement
    without enrolment support).

Cheers
    toerless

_______________________________________________
Anima mailing list
Anima@ietf.org
https://www.ietf.org/mailman/listinfo/anima

Reply via email to