Lou: Ok, Thank you for noting these three points. For the IESG, the proposed text to Kathleen still works. If Kathleen ACKS my message and text, then I will upload this text in version 9. I also hear the silence regarding NETMOD WG considering these proposals.
Sue -----Original Message----- From: Lou Berger [mailto:lber...@labn.net] Sent: Friday, August 19, 2016 8:20 AM To: Susan Hares; 'Juergen Schoenwaelder' Cc: i2rs@ietf.org; 'Alissa Cooper'; i2rs-cha...@ietf.org; 'Kathleen Moriarty'; 'IESG'; jh...@pfrc.org; 'Joel Halpern'; draft-ietf-i2rs-protocol-security-requireme...@ietf.org Subject: Re: [i2rs] Kathleen Moriarty's Discuss on draft-ietf-i2rs-protocol-security-requirements-07: (with DISCUSS and COMMENT) Sue, My message said three things: 1) Juergen's comment resonates with me. 2) I think the current text is acceptable. 3) I see changing the SHOULD to a MUST as problematic. I understood one of the other messages on this thread proposing this change which is what triggered my message. If I misunderstood that message, feel free to interpret my message as supporting the current text in question. Note that I am only speaking for myself (including in my role as NETMOD co-chair) and not representing the consensus opinion of any WG. Lou On 8/19/2016 8:07 AM, Susan Hares wrote: > Lou: > > I am clear that Juergen does not want not want to place transport > requirements within the data model for NETMOD. His opinion was considered in > the rough for the I2RS WG. If this requirement is a problem for > NETCONF/NETMOD, the text currently says: > > REQ-SEC-09 states: > > The default mode of transport is secure so data models SHOULD clearly > annotate what data nodes can be > passed over an insecure connection. > > However, if this means the NETCONF/NETMOD WG will not even entertain proposal > for marking the insecure functions in yang text -- then the two WG > (I2RS/NETMOD) have a problem and should stop this standardization process > going forward. > > Sue > > > -----Original Message----- > From: Lou Berger [mailto:lber...@labn.net] > Sent: Friday, August 19, 2016 7:34 AM > To: Susan Hares; 'Juergen Schoenwaelder' > Cc: i2rs@ietf.org; 'Alissa Cooper'; i2rs-cha...@ietf.org; 'Kathleen > Moriarty'; 'IESG'; jh...@pfrc.org; 'Joel Halpern'; > draft-ietf-i2rs-protocol-security-requireme...@ietf.org > Subject: Re: [i2rs] Kathleen Moriarty's Discuss on > draft-ietf-i2rs-protocol-security-requirements-07: (with DISCUSS and > COMMENT) > > Sue, > > I don't see Juergen as arguing against model access via non-secure > transport. I read his point as that the transport security requirements don't > belong scattered within a data model. > > I have to say that from a model complexity (definition, process, review, > implementation - take your pick) , language and NETMOD co-chair perspective, > his comment resonates with me. > > I think this makes the key text: > > The default mode of transport is > secure so data models SHOULD clearly annotate what data nodes can be > passed over an insecure connection. > > > As this isn't a MUST, I personally think we can live with the text and we can > debate the issue further in the context of specific solutions. I would > strongly object to this being changed to a MUST, or if the document is > changed to make transport (security) requirements identified within data > models a requirement. > > Lou > > On 8/19/2016 6:49 AM, Susan Hares wrote: >> Juergen: >> >> You have laid out the two options: a) link the data-model to the >> non-secure transport, and b) do not link the data to the non-secure >> transport. I agree with you that past models did not link past SNMP MIB >> data model to the transport. Existing NETCONF models do not link it to the >> transport. As you have indicated, you disagreed in the I2RS WG and we >> found consensus was to include the non-secure transport. >> >> I2RS was created to build things as an interface to the routing environment. >> The operators clearly informed the I2RS group of this need during the >> requirement setting phase prior to the time I was chair. The reason I >> continue to press for this capability is their input, and the existing use >> cases I listed previously in this mail: >> >> a) public information - BGP route views, >> b) specific well know up events - such as public-web site up >> c) specific network service events - interface to particular public LAN up. >> >> As you know, we do not have any I2RS data models that specify this feature >> at this time. I suspect after we get through this lengthy requirement >> phase, the operators may begin to specify new models that have this feature. >> >> >> Sue >> >> -----Original Message----- >> From: Juergen Schoenwaelder >> [mailto:j.schoenwael...@jacobs-university.de] >> Sent: Friday, August 19, 2016 4:58 AM >> To: Susan Hares >> Cc: 'Alissa Cooper'; 'Joel Halpern'; i2rs@ietf.org; >> i2rs-cha...@ietf.org; 'Kathleen Moriarty'; 'IESG'; jh...@pfrc.org; >> draft-ietf-i2rs-protocol-security-requireme...@ietf.org >> Subject: Re: [i2rs] Kathleen Moriarty's Discuss on >> draft-ietf-i2rs-protocol-security-requirements-07: (with DISCUSS and >> COMMENT) >> >> I repeat my technical argument: While there may be deployments where >> non-secure transports may be reasonable to use, defining these situations >> statically as part of data model schemas does not follow established >> practices. The IETF has a long tradition of standardizing data models that >> can be used in a variety of operational contexts and I do not see reasons >> why we should move away from that basic approach. >> >> /js >> >> On Thu, Aug 18, 2016 at 02:35:03PM -0400, Susan Hares wrote: >>> Alissa: >>> >>> Just a little input you may not know. My background is 15 years >>> (1995-2010) developing a routing/switching platform (denoted as GateD) >>> which was sold to over 200 companies. We developed XML and a binary XML >>> based product that configured this product. It could do 100K configuration >>> lines and reboot in less than a second on most hardware. We also provide >>> status messages in secure streams and non-secure streams. I sold early >>> version of this code to companies that Alia has worked for - so she has >>> personal viewed the code. At the height of our work, our development team >>> ran to 50 people which I directed (First as VP of Engineering, and then as >>> CTO). It is due to this level of experience that Alia selected me for the >>> co-chair. Russ White has understood Cisco's process, and has also >>> directed software development teams for routing. >>> >>> In order to freshen my direct experience with I2RS on open source work, I >>> am working on a publically available work in Quagga based on the confD >>> product suggested by Cisco. >>> >>> In contrast, Juergen is a university professor who has worked on >>> proto-types. He is not working on an implementation. I hope he will. >>> >>> I hope you will consider this background in my response to your comments >>> below. >>> >>> Sue >>> >>> >>> -----Original Message----- >>> From: Alissa Cooper [mailto:ali...@cooperw.in] >>> Sent: Thursday, August 18, 2016 12:54 PM >>> To: Joel Halpern >>> Cc: Susan Hares; Juergen Schoenwaelder; i2rs@ietf.org; >>> i2rs-cha...@ietf.org; Kathleen Moriarty; IESG; jh...@pfrc.org; >>> draft-ietf-i2rs-protocol-security-requireme...@ietf.org >>> Subject: Re: [i2rs] Kathleen Moriarty's Discuss on >>> draft-ietf-i2rs-protocol-security-requirements-07: (with DISCUSS and >>> COMMENT) >>> >>> Jumping in here because this is relevant to my DISCUSS, hope nobody minds >>> (but if you do, I can go back to the other thread). >>> >>>>> On Aug 18, 2016, at 10:30 AM, Joel Halpern <joel.halp...@ericsson.com> >>>>> wrote: >>>>> >>>>> Let me try a different take approach to this particular question. >>>>> >>>>> Let me start by putting aside the question of where things are marked, >>>>> and come back to that afterwards. >>>>> >>>>> There are a number of cases that I2RS has been asked to cover of high >>>>> rate telemetry data. This may be BGP update information, it may be >>>>> frequent information about line card activity. There are other cases, >>>>> some of which have been documented. >>>>> >>>>> While not completely insensitive, the operators have made clear that they >>>>> see protecting this data as unnecessary. While I would hope over time to >>>>> move to a domain where all of it is protect, that is not trivial. As the >>>>> I2RS Architecture points out, it is expected that what we describe as a >>>>> single I2RS >communication between a client and agent is actually >>>>> associated with multiple channels of communication. >>>>> >>>>> Now, if you want to say that the I2RS protocol requirements cannot allow >>>>> for unprotected channels, I guess we have disconnect between the IESG and >>>>> the WG. >>>>> >>>>> If we say that we can allow for unprotected channels, we then get to the >>>>> question of which data can be sent over such channels. While >>>>> architecturally I agree with Juergen that the model is a bad place to >>>>> specify it, the obverse is also true. Not having some limits on what can >>>>> be sent unprotected >causes concern about insufficient protection. If I >>>>> recall correctly, earlier security reviews called us to task for being >>>>> too broad in what we allowed. >>>>> >>>>> So, if the IESG wants us to just allow it anywhere, because the >>>>> model is an awkward place to define the limitation, I can live with that. >>>>> What I can't live with is being told both that the model is a bad place >>>>> to define it and that there must be restrictions on what is sent >>>>> unprotected, without any proposal on how we are to move forward. >>>> Thank you Joel, this explanation helps me a lot. I think there is a >>>> disconnect about how the restrictions are expressed. From reading the >>>> email traffic about this document, it strikes me that trying to express >>>> the restrictions programmatically doesn’t make much sense in this case. >>>> I agree with Juergen that it will be challenging to make a judgment a >>>> priori in order to bake a restriction into a data model, because data that >>>> is considered sensitive enough to warrant a secure transport in one >>>> deployment may not be considered sensitive in another deployment. >>>> So for any data elements where there is any question at all about >>>> whether they might be sensitive (i.e., any data elements that are not >>>> already routinely made public), I would expect data model authors to end >>>> up indicating that they may be sent over either secure or insecure >>>> transport, which renders the indication not useful. >>>> Perhaps it would make more sense then to just enumerate in the text the >>>> cases that motivate the inclusion of protocol support for insecure >>>> transport: >>>> >>>> 1. For conveyance of information that is already routinely made public. >>>> 2. For line card activity data where there is no likely upgrade path to >>>> support secure transports in the foreseeable future. >>>> >>>> Then the normative requirements would be on clients and agents to use >>>> secure transports unless those clients and agents are deployed where >>>> either of the operational circumstances above necessitate otherwise. >>>> Alissa >>> Point 1: >>> I disagree with Juergen on the difficulty in specifying the sections of the >>> yang modules. I have provided a suggested solution in: >>> https://tools.ietf.org/html/draft-hares-i2rs-protocol-strawman-03#section-4.5.2. >>> >>> >>> Given the mount schema functionality, we can mount ephemeral state module >>> which augment non-ephemeral state modules which are "in-secure only". >>> >>> Point 2: >>> I am willing to put an enumeration of the use cases in the protocol >>> requirement, but I would like to understand the purpose for the >>> enumeration. We are not doing a use case, but a requirements document. >>> This information appears to be a "use case" rather than a technical >>> description. What purpose are you looking for this enumeration to server. >>> Are you looking for the enumeration in SEC-REQ-08? >>> >>> Point 3: Could you review -08.txt on this topic, especially the text below. >>> Given your comments, I believe I should change the last line to a MUST. >>> New/ The default mode of transport is >>> secure so data models MUST clearly annotate what data nodes can be >>> passed over an insecure connection. >>> / >>> >>> Sue >>> >>> =================== >>> As to the normative requirements (-08.txt) version: >>> >>> Section 3: >>> >>> I2RS allows the use of an insecure transport for portions of data >>> models that clearly indicate the use of an insecure transport. >>> Operators deploying I2RS must determine if they want to populate and >>> deploy the portions of the data model which use insecure transports. >>> >>> In Section 3.2 in version -08.txt >>> >>> SEC-REQ-08: The I2RS protocol MUST be able to transfer data over a >>> secure transport and optionally MAY be able to transfer data over a >>> non-secure transport. A secure transport MUST provide data >>> confidentiality, data integrity, and replay prevention. >>> >>> The default I2RS transport is a secure transport. >>> >>> A non-secure transport can be used for publishing telemetry data or >>> other operational state that was specifically indicated to non- >>> confidential in the data model in the Yang syntax. >>> >>> The configuration of ephemeral data in the I2RS Agent by the I2RS >>> client SHOULD be done over a secure transport. It is anticipated >>> that the passing of most I2RS ephemeral state operational status >>> SHOULD be done over a secure transport. As >>> [I-D.ietf-i2rs-ephemeral-state] notes, a data model MUST indicate >>> whether the transport exchanging the data between I2RS client and >>> I2RS agent is secure or insecure. >>> >>> The default mode of transport is >>> secure so data models SHOULD clearly annotate what data nodes can be >>> passed over an insecure connection. >>> >>>> Yours, >>>> Joel >>>> >>>> -----Original Message----- >>>> From: Susan Hares [mailto:sha...@ndzh.com] >>>> Sent: Thursday, August 18, 2016 9:17 AM >>>> To: 'Juergen Schoenwaelder' <j.schoenwael...@jacobs-university.de> >>>> Cc: i2rs@ietf.org; i2rs-cha...@ietf.org; 'Kathleen Moriarty' >>>> <kathleen.moriarty.i...@gmail.com>; 'The IESG' <i...@ietf.org>; >>>> jh...@pfrc.org; >>>> draft-ietf-i2rs-protocol-security-requireme...@ietf.org >>>> Subject: RE: [i2rs] Kathleen Moriarty's Discuss on >>>> draft-ietf-i2rs-protocol-security-requirements-07: (with DISCUSS >>>> and >>>> COMMENT) >>>> >>>> Juergen and Kathleen: >>>> >>>> Let me proceed with two examples: BGP route views data model and the event >>>> for the web-service data. >>>> >>>> The content of these data models are designated as exposed to public. The >>>> routing system only populates the proposed BGP route views data model with >>>> the data destined for the BGP looking glass. The policy on the routing >>>> system indicates what information gets transferred. The data model is >>>> completely available to the public. The Yang Doctors are going to review >>>> this by seeing the whole model is public and available via non-secure >>>> means. >>>> The security people are going to review this seeing that the whole model >>>> is public, and available via an unprotect means. The fact the data model >>>> is all public should simplify the review. >>>> >>>> An event from the I2RS RIB that a web-service route is up is the second >>>> case. The I2RS RIB has an event based on policy that indicates a >>>> web-service route is up. The yang-1.1 doctors must review the content of >>>> the event text to see it does not break privacy or provide too much >>>> information The event mechanisms will need to work over secure transport >>>> and insecure transport. Most of the data will go over the secure >>>> transport event stream. However, a small amount of information may go over >>>> the insecure transport stream. >>>> >>>> First, let me know if my use cases are understandable. Second, let me >>>> know if you disagree with this use cases. >>>> >>>> Fyi - IESG approved the architecture with the insecure stream. >>>> >>>> Sue >>>> >>>> -----Original Message----- >>>> From: Juergen Schoenwaelder >>>> [mailto:j.schoenwael...@jacobs-university.de] >>>> Sent: Thursday, August 18, 2016 9:06 AM >>>> To: Susan Hares >>>> Cc: i2rs@ietf.org; i2rs-cha...@ietf.org; 'Kathleen Moriarty'; 'The >>>> IESG'; jh...@pfrc.org; >>>> draft-ietf-i2rs-protocol-security-requireme...@ietf.org >>>> Subject: Re: [i2rs] Kathleen Moriarty's Discuss on >>>> draft-ietf-i2rs-protocol-security-requirements-07: (with DISCUSS >>>> and >>>> COMMENT) >>>> >>>> I just do not know on which basis a data model writer can decide whether a >>>> data object can be exposed in an unprotected way. How are YANG doctors >>>> going to review this? How are security directorate people going to judge >>>> this? But as promised, I leave (still puzzled) now. >>>> >>>> /js >>>> >>>> On Thu, Aug 18, 2016 at 09:00:14AM -0400, Susan Hares wrote: >>>>> Juergen: >>>>> >>>>> Yes, we seem to disagree on the value of making it hardwired in the model. >>>>> For me, the value is a common understanding of deployment >>>>> distribution >>>> such >>>>> as the route-views. Since the operators argued strongly for this point, >>>> I >>>>> think the best idea is to get it working in code and then see if >>>>> the deployment matches the requests. >>>>> >>>>> Sue >>>>> >>>>> -----Original Message----- >>>>> From: i2rs [mailto:i2rs-boun...@ietf.org] On Behalf Of Juergen >>>>> Schoenwaelder >>>>> Sent: Thursday, August 18, 2016 8:14 AM >>>>> To: Susan Hares >>>>> Cc: i2rs@ietf.org; i2rs-cha...@ietf.org; 'Kathleen Moriarty'; 'The >>>>> IESG'; jh...@pfrc.org; >>>>> draft-ietf-i2rs-protocol-security-requireme...@ietf.org >>>>> Subject: Re: [i2rs] Kathleen Moriarty's Discuss on >>>>> draft-ietf-i2rs-protocol-security-requirements-07: (with DISCUSS >>>>> and >>>>> COMMENT) >>>>> >>>>> Sue, >>>>> >>>>> I still do not see why the 'mode of exposure' of data benefits >>>>> from being hard-wired in the data model. For me, it is a >>>>> situational and deployment specific question. But I shut up here >>>>> since I aired this concern before (and we simply seem to disagree). >>>>> >>>>> /js >>>>> >>>>> On Thu, Aug 18, 2016 at 08:07:18AM -0400, Susan Hares wrote: >>>>>> Juergen: >>>>>> >>>>>> My example is the looking glass servers for the BGP route views >>>>>> project >>>>>> (http://www.routeviews.org/) or a route indicating the presence of a >>>>>> web-server that is public. For the BGP I2RS route, a yang model could >>>>>> replace the looking glass function, and provide events for these looking >>>>>> glass functions. For the web-server route, an event be sent when >>>> that >>>>>> one route is added. >>>>>> >>>>>> Sue >>>>>> >>>>>> >>>>>> -----Original Message----- >>>>>> From: Juergen Schoenwaelder >>>>>> [mailto:j.schoenwael...@jacobs-university.de] >>>>>> Sent: Thursday, August 18, 2016 3:32 AM >>>>>> To: Susan Hares >>>>>> Cc: 'Kathleen Moriarty'; 'The IESG'; jh...@pfrc.org; >>>>>> i2rs@ietf.org; i2rs-cha...@ietf.org; >>>>>> draft-ietf-i2rs-protocol-security-requireme...@ietf.org >>>>>> Subject: Re: [i2rs] Kathleen Moriarty's Discuss on >>>>>> draft-ietf-i2rs-protocol-security-requirements-07: (with DISCUSS >>>>>> and >>>>>> COMMENT) >>>>>> >>>>>> On Wed, Aug 17, 2016 at 09:16:48PM -0400, Susan Hares wrote: >>>>>>> ---------------------------------------------------------------- >>>>>>> - >>>>>>> - >>>>>>> -- >>>>>>> -- >>>>>>> COMMENT: >>>>>>> ---------------------------------------------------------------- >>>>>>> - >>>>>>> - >>>>>>> -- >>>>>>> -- >>>>>>> >>>>>>>> Section 3: >>>>>>>> Can you clarify the second to last sentence? Do you mean there >>>>>>>> are >>>>>> sections that indicate an insecure transport should be used? >>>>>>>> I2RS allows the use of an >>>>>>>> insecure transport for portions of data models that clearly >>>>>>>> indicate insecure transport. >>>>>>>> Perhaps: >>>>>>>> I2RS allows the use of an >>>>>>>> insecure transport for portions of data models that clearly >>>>>>>> indicate the use of an insecure transport. >>>>>> I still wonder how a data model writer can reasonably decide >>>>>> whether a piece of information can be shipped safely over an >>>>>> insecure transport since this decision often depends on the >>>>>> specifics of a deployment >>>>> situation. >>>>>> /js >>>>>> >>>>>> PS: I hope we do not end up with defining data multiple times (once >>>>>> for insecure transport and once for secured transports). >>>>>> >>>>>> -- >>>>>> Juergen Schoenwaelder Jacobs University Bremen gGmbH >>>>>> Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | Germany >>>>>> Fax: +49 421 200 3103 <http://www.jacobs-university.de/> >>>>>> >>>>>> _______________________________________________ >>>>>> i2rs mailing list >>>>>> i2rs@ietf.org >>>>>> https://www.ietf.org/mailman/listinfo/i2rs >>>>> -- >>>>> Juergen Schoenwaelder Jacobs University Bremen gGmbH >>>>> Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | Germany >>>>> Fax: +49 421 200 3103 <http://www.jacobs-university.de/> >>>>> >>>>> _______________________________________________ >>>>> i2rs mailing list >>>>> i2rs@ietf.org >>>>> https://www.ietf.org/mailman/listinfo/i2rs >>>>> >>>> -- >>>> Juergen Schoenwaelder Jacobs University Bremen gGmbH >>>> Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | Germany >>>> Fax: +49 421 200 3103 <http://www.jacobs-university.de/> >>>> > > > _______________________________________________ i2rs mailing list i2rs@ietf.org https://www.ietf.org/mailman/listinfo/i2rs