Hi John,

thanks for your edits! They look good to me. Sorry for my late reply but I’ve 
seen you have find a resolution for your one remaining question below.

Mirja


> Am 12.11.2017 um 23:05 schrieb John Strassner <straz...@gmail.com>:
> 
> Dear Mirja, Adrial, and Kathleen,
> 
> thank you for performing this review, and the discussions that followed.
> I hope that the following addresses the issues that you have raised.
> This content will be published in version 9 of this I-D, to be released on
> Monday 11/13.
> 
> POINT #1
> 1) The first one should be easy to address:
> "Transport redundancy mechanisms such as Multipath TCP (MPTCP) and the
>    Stream Control Transmission Protocol (SCTP) will need to be evaluated
>    for applicability. "
> 
> This sentence is not correct; MPTP and SCTP do not provide any redundancy
> mechanisms; they simply just provide a reliable transport as TCP does.
> Therefore I would just remove this sentence here.
> <jcs>
> DONE
> </jcs>
> 
> Further, on this paragraph, it is not clear to me why you say that reliable
> transport is needed. Especially for some monitoring purposes, unreliable
> transport might be acceptable as well. Or do you think that all communication
> for security systems have always to be reliable? I don't think this document
> discusses things in detail enough to make such an assessment.
> <jcs>
> I believe that we need reliable transport for critical management-based
> operations, but NOT for other mechanisms (e.g., monitoring). The following
> text is proposed:
> 
>    Therefore, the transport mechanism used to carry management data and
>    information must be secure. It does not have to be a reliable
>    transport; rather, a transport-independent reliable messaging
>    mechanism is required, where communication can be performed reliably
>    (e.g., by establishing end-to-end communication sessions and by
>    introducing explicit acknowledgement of messages into the
>    communication flow). Latency requirements for control message
>    delivery must also be evaluated. Note that monitoring does not
>    reliable transport.
> </jcs>
> 
> POINT 2
> 2a - Adrian's suggested text is implemented, but all normative language
> (in UPPER CASE) is changed to informative language (in lower case)
> since we are now using RFC8174 boilerplate.
> 
> 2b - end of section 4:
> "The above threats may be mitigated by requiring the use of an AAA
>    framework for all users to access the I2NSF environment. This could
>    be further enhanced by requiring attestation to be used to detect
>    changes to the I2NSF environment by authorized parties.“
> <jcs>
> That is the present text; what would you suggest to strengthen it?
> </jcs>
> 
> 
> 2c - sec 6.1:
> „ Given the role of the I2NSF
>    Controller, a mutual authentication of users and the I2NSF
>    Controller may be required.“
> Why not „is required“?
> <jcs>
> DONE
> </jcs>
> 
> 
> 2c - And I’m also uncertain about this part in sec 6.2:
> "The network connection between the I2NSF Controller and NSFs can
>    rely either on:
> 
>    o  Closed environments, where there is only one administrative
>       domain.  Less restrictive access control and simpler validation
>       can be used inside the domain because of the protected nature of
>       a closed environment.“
> <jcs>
> This text was changed to:
> 
>    o  Closed environments, where there is only one administrative
>       domain.  Such environments provide a more **isolated**
>       environment, but still communicate over the same set of I2NSF
>       interfaces present in open environments (see above). Hence, the
>       security control and access requirements for closed environments
>       are the same as those for open environments.
> </jcs>
> 
> best regards,
> John
> 
> On Mon, Oct 23, 2017 at 8:15 AM, Mirja Kuehlewind (IETF) 
> <i...@kuehlewind.net> wrote:
> Hi Adrian,
> 
> see below.
> 
> > Am 23.10.2017 um 17:00 schrieb Adrian Farrel <adr...@olddog.co.uk>:
> >
> > <hat style="shepherd">
> >
> > Trying to extract actions for the authors from this interesting Discussion. 
> > I think that the first point is closed with Mirja still surprised, but no 
> > action needed.
> 
> Yes...
> 
> > The second point needs reinforcement of the need for strong security in the 
> > management (not control) plane used in the architecture: in particular, 
> > that the messages that configure network security functions must, 
> > themselves, else the security functions are vulnerable and so the whole 
> > network at risk.
> >
> > Section 11 currently reads...
> >
> > 11.  Security Considerations
> >
> >   NSF control and monitoring demand trustworthy, robust, and fully
> >   secured access.  Therefore, proper secure communication channels
> >   have to be carefully specified for carrying the controlling and
> >   monitoring information between the NSFs and their management
> >   entity or entities. This has been discussed in Section 4.
> >
> >   This framework is intended for enterprise users, with or without
> >   cloud service offerings. Privacy of users should be provided by
> >   using existing standard mechanisms, such as encryption;
> >   anonymization of data should also be done (if possible depending
> >   on the transport used). Such mechanisms require confidentiality
> >   and integrity.
> >
> > ... I suggest that this is enhanced to read...
> >
> > 11.  Security Considerations
> >
> >   The configuration, control, and monitoring of NSFs provide access to
> >   and information about security functions that are critical for
> >   delivering network security and for protecting end-to-end traffic.
> >   Therefore, it is important that the messages that are exchanged
> >   within this architecture utilize a trustworthy, robust, and fully
> >   secure communication channel.  The mechanisms adopted within the
> >   solution space MUST include proper secure communication channels
> >   that are carefully specified for carrying the controlling and
> >   monitoring information between the NSFs and their management entity
> >   or entities. The threats associated with remotely managed NSFs are
> >   discussed in Section 4, and solutions MUST address those concerns.
> >
> >   This framework is intended for enterprise users, with or without
> >   cloud service offerings. Privacy of users should be provided by
> >   using existing standard mechanisms, such as encryption;
> >   anonymization of data should also be done (if possible depending
> >   on the transport used). Such mechanisms require confidentiality
> >   and integrity.
> > END
> >
> Thanks that’s much better from my point of view. Maybe also
> s/Privacy of users should be provided by/Privacy of users MUST be provided 
> by/ ?
> 
> 
> There are a few more cases that could potentially be strengthened as well:
> 
> end of section 4:
> "The above threats may be mitigated by requiring the use of an AAA
>    framework for all users to access the I2NSF environment. This could
>    be further enhanced by requiring attestation to be used to detect
>    changes to the I2NSF environment by authorized parties.“
> 
> 
> sec 6.1:
> „ Given the role of the I2NSF
>    Controller, a mutual authentication of users and the I2NSF
>    Controller may be required.“
> Why not „is required“?
> 
> And I’m also uncertain about this part in sec 6.2:
> "The network connection between the I2NSF Controller and NSFs can
>    rely either on:
> 
>    o  Closed environments, where there is only one administrative
>       domain.  Less restrictive access control and simpler validation
>       can be used inside the domain because of the protected nature of
>       a closed environment.“
> 
> Maybe you can have another look at these cases? Also not sure I’ve caught 
> very just now…
> 
> Thanks,
> Mirja
> 
> 
> >
> >
> >
> >
> >> -----Original Message-----
> >> From: Mirja Kuehlewind (IETF) [mailto:i...@kuehlewind.net]
> >> Sent: 23 October 2017 12:10
> >> To: Kathleen Moriarty
> >> Cc: draft-ietf-i2nsf-framew...@ietf.org; i2nsf@ietf.org; Yoav Nir; The 
> >> IESG; i2nsf-
> >> cha...@ietf.org; Adrian Farrel
> >> Subject: Re: Mirja Kühlewind's Discuss on draft-ietf-i2nsf-framework-08: 
> >> (with
> >> DISCUSS)
> >>
> >> Hi Kathleen,
> >>
> >> see below.
> >>
> >>> Am 16.10.2017 um 20:22 schrieb Kathleen Moriarty
> >> <kathleen.moriarty.i...@gmail.com>:
> >>>
> >>> Hi Mirja,
> >>>
> >>> Thanks for your review.  The first seems simple enough, but I'll leave
> >>> that to the editors, shepherd and WG.
> >>>
> >>> On Mon, Oct 16, 2017 at 11:45 AM, Mirja Kühlewind <i...@kuehlewind.net>
> >> wrote:
> >>>> Mirja Kühlewind has entered the following ballot position for
> >>>> draft-ietf-i2nsf-framework-08: Discuss
> >>>>
> >>>> When responding, please keep the subject line intact and reply to all
> >>>> email addresses included in the To and CC lines. (Feel free to cut this
> >>>> introductory paragraph, however.)
> >>>>
> >>>>
> >>>> Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
> >>>> for more information about IESG DISCUSS and COMMENT positions.
> >>>>
> >>>>
> >>>> The document, along with other ballot positions, can be found here:
> >>>> https://datatracker.ietf.org/doc/draft-ietf-i2nsf-framework/
> >>>>
> >>>>
> >>>>
> >>>> ----------------------------------------------------------------------
> >>>> DISCUSS:
> >>>> ----------------------------------------------------------------------
> >>>>
> >>>> I have two points below:
> >>>>
> >>>> 1) The first one should be easy to address:
> >>>> "Transport redundancy mechanisms such as Multipath TCP (MPTCP) and the
> >>>>  Stream Control Transmission Protocol (SCTP) will need to be evaluated
> >>>>  for applicability. "
> >>>> This sentence is not correct; MPTP and SCTP do not provide any redundancy
> >>>> mechanisms; they simply just provide a reliable transport as TCP does.
> >>>> Therefore I would just remove this sentence here.
> >>>>
> >>>> Further, on this paragraph, it is not clear to me why you say that 
> >>>> reliable
> >>>> transport is needed. Especially for some monitoring purposes, unreliable
> >>>> transport might be acceptable as well. Or do you think that all 
> >>>> communication
> >>>> for security systems have always to be reliable? I don't think this 
> >>>> document
> >>>> discusses things in detail enough to make such an assessment.
> >>>>
> >>>> 2) This second is a very high level concern and I'm not sure if balloting
> >>>> discuss on this is the right thing to do but I definitely would like to 
> >>>> get
> >>>> some feedback from the group to better understand this document before
> >>>> publication:
> >>>>
> >>>> This document seem not very security specific to me. To say this in a 
> >>>> somehow
> >>>> sloppy way: I have the feeling that if you would just remove the word
> >>>> "security" everywhere in the text, it would still be the same document. I
> >>>> checked the charter and the charter is also not very concrete about what 
> >>>> to
> >>>> expect, besides motivating the needed interfaces with the need for in-
> >> network
> >>>> security function. However, if there is nothing security specific about 
> >>>> this,
> >>>> what's the difference to the usually control plane architecture as 
> >>>> usually
> >>>> deployed with the use of NETCONF? And I am actually wondering if this is 
> >>>> the
> >>>> right wg to write such a document.
> >>>
> >>> I think right as you were becoming an AD as this work was in process
> >>> of being chartered, so there may be a gap in knowledge.  This WG is a
> >>> cross area WG between routing and security.  Many of the people in the
> >>> WG are from the routing area.  Since the devices they were most
> >>> concerned in provisioning were security devices (per the customers
> >>> that helped bring the work to the IETF), the IESG decided to put this
> >>> in the Security area.  Yes, the mechanisms are purposefully reusing
> >>> existing technologies to accomplish the tasks, but all of the tasks
> >>> are interacting with security provisioning services or security
> >>> appliances.  An example of a draft that was just adopted is one that
> >>> includes a YANG module to provision IPsec.  The security focus is
> >>> important in that example (as well as others) since mistakes with
> >>> provisioning of IPsec tunnels could have a large impact.  AN advantage
> >>> of having this work as a cross area group in the Security area is that
> >>> it not only caught the attention of the IPSecMe WG, but they had a
> >>> joint interim call to improve the work and the go forward plan will
> >>> involve assistance from people contributing to the IPSecME WG.
> >>>
> >>> I think this one is likely just a gap in background knowledge.
> >>
> >> I was just step up when this was charter but I got the background that 
> >> this is
> >> somewhere between SEC and RTG. I was still very much surprised how few
> >> security focus there is in this document.
> >>
> >>>
> >>>>
> >>>> Further, I would at least have expected that this framework mandates for 
> >>>> high
> >>>> control plan security given we are talking about the configuration and
> >>>> deployment of security function. However, it does not. It does rarely 
> >>>> provide
> >>>> any concrete recommendation here, and basically leaves the door open to
> >> used
> >>>> these interfaces without authentication which I think is not acceptable.
> >>>>
> >>>
> >>> This is handled in the drafts that follow, so adding text here
> >>> shouldn't be a problem.
> >>
> >> I think making some stronger recommendations about how to secure the 
> >> control
> >> plan communication for security-relevant configurations would address my
> >> discuss sufficiently to move to ‚No Objection‘.
> >>
> >> Thanks,
> >> Mirja
> >>
> >>
> >>
> >>>
> >>>>
> >>>>
> >>>>
> >>>
> >>>
> >>>
> >>> --
> >>>
> >>> Best regards,
> >>> Kathleen
> >>>
> >
> 
> _______________________________________________
> I2nsf mailing list
> I2nsf@ietf.org
> https://www.ietf.org/mailman/listinfo/i2nsf
> 
> 
> 
> -- 
> regards,
> John

_______________________________________________
I2nsf mailing list
I2nsf@ietf.org
https://www.ietf.org/mailman/listinfo/i2nsf

Reply via email to