[alto] Roman Danyliw's No Objection on draft-ietf-alto-oam-yang-17: (with COMMENT)

2024-01-19 Thread Roman Danyliw via Datatracker
Roman Danyliw has entered the following ballot position for
draft-ietf-alto-oam-yang-17: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to 
https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ 
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-alto-oam-yang/



--
COMMENT:
--

Thank you to Rich Salz for the SECDIR review.

Thank you for addressed by COMMENT and DISCUSS feedback.



___
alto mailing list
alto@ietf.org
https://www.ietf.org/mailman/listinfo/alto


[alto] Roman Danyliw's Discuss on draft-ietf-alto-oam-yang-16: (with DISCUSS and COMMENT)

2024-01-18 Thread Roman Danyliw via Datatracker
Roman Danyliw has entered the following ballot position for
draft-ietf-alto-oam-yang-16: Discuss

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to 
https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ 
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-alto-oam-yang/



--
DISCUSS:
--

Per -15 ballot review:

** Section 8.  Per the guidance on writeable data, aren’t significant parts of
alto-server/listen sensitive as one could alter the stored keys for the server
or client; or the username/password combinations (in http-server-parameters)?

** Section 8.  Per the guidance about readable data:

-- isn’t tls-server-parameters sensitive since it could contain raw private
keys (e.g., ks:inline-or-keystore-symmetric-key-grouping)?

-- Would it be best practice to be able to read all of the authorized users?

Thanks for the response at
https://mailarchive.ietf.org/arch/msg/alto/tD88zktK20QDBIbd-jbGt5JJDLc/

> Yes, some groupings in alto-server/listen are also sensitive. But they are
> defined in other RFCs, thus the security considerations in those RFCs also
> apply to them.

This described approach is inconsistent with my observation on how the YANG
security template is used.  If there is a path which has security
considerations, the issues are typically highlighted regardless of whether
there is reuse.  Setting aside that this is a YANG module, my experience with
any protocol document is that if there is a mechanism reused by reference and
it introduces a relevant security dependency, it would have been cited in the
Security Considerations as applicable.  Neither of these approach appear to be
taken here.  Is there a reason why not?


--
COMMENT:
--

Thank you to Rich Salz for the SECDIR review.

Thank you for addressed by COMMENT and DISCUSS feedback.



___
alto mailing list
alto@ietf.org
https://www.ietf.org/mailman/listinfo/alto


[alto] Roman Danyliw's No Objection on draft-ietf-alto-new-transport-21: (with COMMENT)

2024-01-02 Thread Roman Danyliw via Datatracker
Roman Danyliw has entered the following ballot position for
draft-ietf-alto-new-transport-21: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to 
https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ 
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-alto-new-transport/



--
COMMENT:
--

Thank you to Donald Eastlake for the SECDIR review.

Thanks for addressing my DISCUSS feedback.

** Section 6.2.  Editorial. New text was added clarifying text to prescribe
that TIPS view URI must not be reused.  I would recommend being a clearer on
this language.

OLD
  A server MUST NOT use a URI for different TIPS views, either for
  different resources or different request bodies to the same
  resource.
NEW
A server MUST NOT use the same URI for different TIPS views, either for
different resources or different request bodies to the same  resource.

** Section 9.
   The security considerations (Section 15 of [RFC7285]) of the base
   protocol fully apply to this extension.  For example, the same
   authenticity and integrity considerations (Section 15.1 of [RFC7285])
   still fully apply;

Since ALTO TIPS is a new protocol mechanism is it possible to improve on the
TLS guidance in Section 8.3.5 of RFC7295 (from circa 2014)?  Specifically, can
RFC9325 be mandated?



___
alto mailing list
alto@ietf.org
https://www.ietf.org/mailman/listinfo/alto


[alto] Roman Danyliw's Discuss on draft-ietf-alto-oam-yang-15: (with DISCUSS and COMMENT)

2023-10-24 Thread Roman Danyliw via Datatracker
Roman Danyliw has entered the following ballot position for
draft-ietf-alto-oam-yang-15: Discuss

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to 
https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ 
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-alto-oam-yang/



--
DISCUSS:
--

(There were a number of YANG references to chase down.  Please correct my read
of the YANG model if I have misunderstood.)

** Implementing mutual TLS/client side certificates (per Section 8.3.5 of
RFC7285) appears to need more guidance.   Client EE certificates and client CAs
can be specified by the tls:tls-server-group in
alto/server-listen-stack/https/tls-server-parameters.  However, it appears to
me that there isn’t any way then to later reference them in the
alto-server/auth-client section.  When doing username and password
authentication via http-server-parameters/client-authentication, there is a
common user-id field shared with auth-client/https-auth-client.

** Section 5.4.3.  It appears that there is an http-auth-client for both http
and https.  Is this suggesting that it is possible to have authenticated users
over unencrypted HTTP.  How does that work securely?  Is this related to
Section 8’s “The ietf-alto supports an HTTP listen mode to cover cases where
the ALTO server stack does not handle the TLS termination itself, but is
handled by a separate component.”  If so, what is the residual risk of this
approach?

** Section 8.  Per the guidance on writeable data, aren’t significant parts of
alto-server/listen sensitive as one could alter the stored keys for the server
or client; or the username/password combinations (in http-server-parameters)?

** Section 8.  Per the guidance about readable data:

-- isn’t tls-server-parameters sensitive since it could contain raw private
keys (e.g., ks:inline-or-keystore-symmetric-key-grouping)?

-- Would it be best practice to be able to read all of the authorized users?


--
COMMENT:
--

Thank you to Rich Salz for the SECDIR review.

** Section A.5.  Per the example:
"client-authentication": {
  "users": {
"user": [
  {
"user-id": "alice",
"basic": {
  "user-id": "alice",
  "password": "$0$p8ssw0rd"
}

Isn’t the password supposed to be hashed? 
draft-ietf-netconf-http-client-server says password is of type
ianach:crypt-hash.



___
alto mailing list
alto@ietf.org
https://www.ietf.org/mailman/listinfo/alto


[alto] Roman Danyliw's Discuss on draft-ietf-alto-new-transport-17: (with DISCUSS and COMMENT)

2023-10-23 Thread Roman Danyliw via Datatracker
Roman Danyliw has entered the following ballot position for
draft-ietf-alto-new-transport-17: Discuss

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to 
https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ 
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-alto-new-transport/



--
DISCUSS:
--

** Section 6.2.  Construction of the “tips-view-uri”.

-- Under what circumstances would it be appropriate to use http (instead of
https) for the tips-view-uri for this new protocol mechanism?  Why is http
needed?  Could https be the only option?  I appreciate that there is history of
an http URL from RFC7285 published in 2014, but has field experience continue
to dictate a need for this insecure approach for an entirely new service?  If
it is needed would there be a away to express a preference for secure transport?

-- Is there any underlying assumption in how “tips-view-path” is constructed? I
asked because Section 9.3 says “An outside party that can read the TIPS
response or that can observe TIPS requests can obtain the TIPS view URI and use
that to send fraudulent ‘DELETE’ requests thus disabling the service for the
valid ALTO client.  This can be avoided by encrypting the requests and
responses (Section 15 of [RFC7285]).”  Observing the tips-view-uri is one way
to spoof the URI, but what if it could be guessed?  Is there an assumption that
a unguessable random string is part of the path?  As far as I can find, no text
explicitly says that, although the examples imply it.  If the string is
guessable being encrypted doesn’t help but using some kind of authentication
would.


--
COMMENT:
--

Thank you to Donald Eastlake for the SECDIR review.

** Section 6.3.  The example in Figure 10 describes Basic Auth.  Section 8.3.5
of RFC7295 notes that Digest Auth is MTI.  Recommend using that instead.

** Section 9.
   The security considerations (Section 15 of [RFC7285]) of the base
   protocol fully apply to this extension.  For example, the same
   authenticity and integrity considerations (Section 15.1 of [RFC7285])
   still fully apply;

Since ALTO TIPS is a new protocol mechanism is it possible to improve on the
TLS guidance in Section 8.3.5 of RFC7295 (from circa 2014)?  Specifically, can
RFC9325 be mandated?



___
alto mailing list
alto@ietf.org
https://www.ietf.org/mailman/listinfo/alto


[alto] Roman Danyliw's No Objection on draft-ietf-alto-cost-mode-03: (with COMMENT)

2022-05-31 Thread Roman Danyliw via Datatracker
Roman Danyliw has entered the following ballot position for
draft-ietf-alto-cost-mode-03: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to 
https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ 
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-alto-cost-mode/



--
COMMENT:
--

Thank you to Stephen Farrell for the SECDIR review.

Section 4 specifies an assignment policy of “IETF Review.”  To double-check,
you also do not want a designated expert too?



___
alto mailing list
alto@ietf.org
https://www.ietf.org/mailman/listinfo/alto


[alto] Roman Danyliw's Discuss on draft-ietf-alto-path-vector-20: (with DISCUSS and COMMENT)

2022-01-26 Thread Roman Danyliw via Datatracker
Roman Danyliw has entered the following ballot position for
draft-ietf-alto-path-vector-20: Discuss

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/blog/handling-iesg-ballot-positions/
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-alto-path-vector/



--
DISCUSS:
--

(Updated ballot to make the remaining issues clear)

Thanks for the update in -20 and in particular all of the new language in the
Security considerations to discuss applicability and obfuscation procedures.

In these edits in response to the earlier DISCUSS text, the following sentence
was introduced into Section 11:

For settings where the ALTO server and client are not
in the same trust domain, Digital Right Management (DRM) techniques
and legal contracts protecting the sensitive Path Vector information
MUST be applied.

It appears to be trying to provide guidance on how to ensure that only the
expected ALTO clients get the sensitive path information in the case where the
server and clients are in different trust domains.  This new language contains
normative guidance to using DRM techniques.  Given this is a normative “MUST”,
the specifics of “DRM techniques” is under-specified.  Independent of that, DRM
techniques I quickly think of provides object security (i.e., embedding a
security envelope of some form directly in the data it is trying to protect). 
How would that mesh with the specified format for the path information in this
document?


--
COMMENT:
--

Thanks to Samuel Weiler for the SECDIR review.

Thanks for addressing my COMMENTs.

Previous DISCUSS point below
==
Thanks for documenting the increased risk of exposing sensitive topology
information and the potentially of this data being exploited for a highly
targeted DoS attack in Section 11.  While this significant problem is
documented, the mitigation for this fundamental issue is underspecified.  The
security of this extension is predicated on the ANE obfuscation procedures, but
those specifics are not provided.

In my review, there doesn’t appear to be wide operational usage or
implementations of this extension to inform these obfuscation procedures. 
Furthermore, it appears that these procedures remain an open research question.
 I appreciate the helpful references to the academic papers in Section 11
([NOVA], [RESA][ MERCATOR])  but their practical applicability to the generic
capability provided by this extension appears to be difficulty to align and be
caveated.  For example, [RESA] and [MERCATOR] made what appear to be
significant assumptions on their approaches, “In this paper, we assume a
semi-honest security model, i.e., the aggregator and all member networks will
not deviate from the security protocol, but merely try to gather information
during the execution of the protocol”.

I believe this document needs to be provide a stronger applicability statement
constraining where it can be fielded and what assumptions are made about the
trust models.  Additionally, given the uncertainty on the generic feasibility
of obfuscation, this document should be published as experimental.



___
alto mailing list
alto@ietf.org
https://www.ietf.org/mailman/listinfo/alto


[alto] Roman Danyliw's No Objection on draft-ietf-alto-cdni-request-routing-alto-18: (with COMMENT)

2022-01-05 Thread Roman Danyliw via Datatracker
Roman Danyliw has entered the following ballot position for
draft-ietf-alto-cdni-request-routing-alto-18: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/blog/handling-iesg-ballot-positions/
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-alto-cdni-request-routing-alto/



--
COMMENT:
--

Thanks to Klaas Wierenga for the SECDIR review.

Thanks for addressing my DISCUSS point

** Section 8.
 For authenticity and integrity of ALTO information, an attacker
  may disguise itself as an ALTO server for a dCDN, and provide
  false capabilities and footprints to a uCDN using the CDNI
  Advertisement service.

-- I don’t follow the intent of the first clause.  Why is an _attacker_
concerned with the authenticity and integrity of the ALTO information?

-- What role can TLS, an associated server certificate (for the dCDN) and
configured knowledge of this certificate at the uCDN mitigate some of this
risk?  Shouldn’t the uCDNs only be communicating with a collection of known
dCDNs with which it has some out-of-band negotiated arrangement?

** Section 8.
  For availability of ALTO services, an attacker may conduct service
  degradation attacks using services defined in this document to
  disable ALTO services of a network.

Again, operating under the assumption that the dCDN (ALTO Server) would only be
working with a known (prearranged) set of uCDNs and they would have
authenticated somehow (per the DISCUSS), couldn’t repeated requested be rate
limited and after attribution, filtered to minimize impact?



___
alto mailing list
alto@ietf.org
https://www.ietf.org/mailman/listinfo/alto


[alto] Roman Danyliw's Discuss on draft-ietf-alto-cdni-request-routing-alto-17: (with DISCUSS and COMMENT)

2021-12-01 Thread Roman Danyliw via Datatracker
Roman Danyliw has entered the following ballot position for
draft-ietf-alto-cdni-request-routing-alto-17: Discuss

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/blog/handling-iesg-ballot-positions/
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-alto-cdni-request-routing-alto/



--
DISCUSS:
--

The security consideration is silent on how to handle client (uCDN)
authentication for this specific CDN use case.  Hence, the default guidance
from Section 15.13.2 of RFC7285 seems to apply -- that HTTP Digest
Authentication or TLS client authentication could be used.

If I understand the use case right, it seems like the uCDNs and dCDNs should
know about each other, and there wouldn’t be an unreasonably large number of
them to prevent credentials existing for peers.  Is there a reason why there
isn’t a normative guidance requiring some kind of peer authentication given
this narrow use case?  If not, why is ok given the significance of this ALTO
data in FCI model.


--
COMMENT:
--

Thanks to Klaas Wierenga for the SECDIR review.

** Abstract.  Typo?
RFC 8008 defines
   precisely the semantics of FCI and provides guidelines on the FCI
   protocol, but the exact protocol is specified

Shouldn’t this read, “but the exact protocol is _NOT_ specified”?

** Section 8.
 For authenticity and integrity of ALTO information, an attacker
  may disguise itself as an ALTO server for a dCDN, and provide
  false capabilities and footprints to a uCDN using the CDNI
  Advertisement service.

-- I don’t follow the intent of the first clause.  Why is an _attacker_
concerned with the authenticity and integrity of the ALTO information?

-- What role can TLS, an associated server certificate (for the dCDN) and
configured knowledge of this certificate at the uCDN mitigate some of this
risk?  Shouldn’t the uCDNs only be communicating with a collection of known
dCDNs with which it has some out-of-band negotiated arrangement?

** Section 8.
  For availability of ALTO services, an attacker may conduct service
  degradation attacks using services defined in this document to
  disable ALTO services of a network.

Again, operating under the assumption that the dCDN (ALTO Server) would only be
working with a known (prearranged) set of uCDNs and they would have
authenticated somehow (per the DISCUSS), couldn’t repeated requested be rate
limited and after attribution, filtered to minimize impact?



___
alto mailing list
alto@ietf.org
https://www.ietf.org/mailman/listinfo/alto


[alto] Roman Danyliw's No Objection on draft-ietf-alto-unified-props-new-21: (with COMMENT)

2021-11-30 Thread Roman Danyliw via Datatracker
Roman Danyliw has entered the following ballot position for
draft-ietf-alto-unified-props-new-21: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/blog/handling-iesg-ballot-positions/
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-alto-unified-props-new/



--
COMMENT:
--

Thank you to Paul Wouters for the SECDIR review.

** Section 3.1.  This section provides a list of examples of entities, but
doesn’t cite a few of them.  For example: -- as = should be
[I-D.ietf-alto-cdni-request-routing-alto] -- country = should be
[I-D.ietf-alto-cdni-request-routing-alto] -- network flow = ? -- routing
element = ?

** Section 3.2.1
   An entity domain type
   MUST be registered at the IANA, as specified in section
   Section 12.2.2 and similarly to an ALTO address type.

Per the text in Section 12.2.2, it doesn’t appear that a binding to an ALTO
address type is required.  For example neither pid or priv have an “ALTO
address type”.

** Section 4.6
   Besides, it is also necessary to inform a Client about which
   associations of specific resources and entity domain types are
   allowed, because it is not possible to prevent a Server from exposing
   inappropriate associations.  An informed Client will just ignore
   inappropriate associations exposed by a Server and avoid error-prone
   transactions with the Server.

-- Editorial, s/Besides, it is also/It is also/

-- What does it mean that it’s “necessary to inform a Client about which
associations”?  I was under the impression that this section was documenting
the IRD capability behavior which is triggered by the client.  If so, the
client “is asking” in this interaction model rather than being “informed”.

-- What is meant by “it is not possible to prevent a Server from exposing
inappropriate associations”?  Is it envisioned that the Server might respond
with an associations which isn’t self-consistent with another part of the
property map?

** Section 4.6
For example, the association "costmap3.pid" is not allowed for the
   following reason: although a cost map exposes PID identifiers, it
   does not define the set of addresses included in this PID.

I don’t follow what this example is trying to demonstrate – in that, how is it
related to the what’s supported in the IRD capability.  From the explanation,
it appears that a costmap and a pid can never be mixed.  No query to an IRD
would be needed to know that.

** Section 5.1.1.  Would “_”, “-“, “__--" be considered valid
EntityDomainTypes?  If so, is that desirable?  (it's perfectly reasonable to
say "absolutely")

** Section 5.1.1

   For an endpoint domain type identifier with the "priv:" prefix, an
   additional string (e.g., company identifier or random string) MUST
   follow (i.e., "priv:" only is not a valid entity domain type
   identifier) to reduce potential collisions.

I found this language confusing.  “priv:” is not a domain type identifier. 
It’s only a prefix to the domain type identifier.  It couldn’t be a domain type
identifier because the colon is not permitted in things of type
EntityDomainType.  Is this text effectively saying that EntityDomainType has to
be a non-zero length string, which should be true whether “priv:” is used or
not.  If so, I’d recommend being clearer.

** Section 5.2.1.
-- What’s the thinking on EntityPropertyType having a colon, but
EntityDomainType (Section 5.1.1) cannot?

-- Could “:” or “_::-“ be a valid EntityPropertyType?  If so, is that
desirable?  (it's perfectly reasonable to say "absolutely")

===[ Nits

** Section 1.  Editorial
   At first, a map of endpoint properties might seem impractical,
   because it could require enumerating the property value for every
   possible endpoint.  However, in practice, the number of endpoint
   addresses involved by an ALTO server can be quite large.

The “However, in practice ” part doesn’t follow from the previous sentence. 
s/However, in practice, the number/The number/

** Section 3.3.  Editorial.  s/Likewise, a same/Likewise, the same/

** Section 5.1.3.  Editorial.

OLD
   The format of the second part of an entity identifier depends on the
   entity domain type, and MUST be specified when defining a new entity
   domain type and registering it with the IANA.

NEW

   The format of the second part of an entity identifier,
   DomainTypeSpecificEntityID, depends on the entity domain type, and MUST be
   specified when defining a new entity domain type and registering it with the
   IANA.
** Section 8.6.  Typo. s/contanaing/containing/

** Section 9.3.  Typo. s/is is/is/

** 

[alto] Roman Danyliw's No Objection on draft-ietf-alto-performance-metrics-20: (with COMMENT)

2021-11-30 Thread Roman Danyliw via Datatracker
Roman Danyliw has entered the following ballot position for
draft-ietf-alto-performance-metrics-20: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/blog/handling-iesg-ballot-positions/
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-alto-performance-metrics/



--
COMMENT:
--

Thanks to Vincent Roca for the SECDIR review.

** Section 1.
An ALTO server may provide only a subset of the metrics described in
   this document.  For example, those that are subject to privacy
   concerns should not be provided to unauthorized ALTO clients.

Is this generic caution, or are any of the mentioned metrics considered privacy
sensitive in some way?

** Section 2.1.  Editorial.  s/, and “sla”/, “sla”/

** Examples 1 – 7 all have a their “Content-Length” set to “TBA”.  Consider
populating it with the real length of each of the examples.

** Nit.  Example 7 (in Section 4.2.4) comes earlier than Example 6 (in Section
4.3.3)

** Section 6.  In the spirit of inclusively, please rephrase “man-in-the-middle
(MITM) attacks”

** Additional Security Considerations. It appears that in cases of an “sla” and
certain “estimation” cost-estimates, it is recommended for a URI to be provided
via the parameters field to point to additional information.

-- is there any further guidance that can be provided on how this URI can be
secured.  Perhaps, requiring https?

-- additional, I would recommend guidance to this effect (please polish the
language on what exact ALTO fields are in question):

When ALTO clients process the URIs in the “link” field provided in the
“parameters” field of select “sla” and “estimation” cost-estimate metrics, they
should heed the risks outlined in Section 7 of RFC3986.



___
alto mailing list
alto@ietf.org
https://www.ietf.org/mailman/listinfo/alto


[alto] Roman Danyliw's Discuss on draft-ietf-alto-path-vector-19: (with DISCUSS and COMMENT)

2021-11-30 Thread Roman Danyliw via Datatracker
Roman Danyliw has entered the following ballot position for
draft-ietf-alto-path-vector-19: Discuss

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/blog/handling-iesg-ballot-positions/
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-alto-path-vector/



--
DISCUSS:
--

Thanks for documenting the increased risk of exposing sensitive topology
information and the potentially of this data being exploited for a highly
targeted DoS attack in Section 11.  While this significant problem is
documented, the mitigation for this fundamental issue is underspecified.  The
security of this extension is predicated on the ANE obfuscation procedures, but
those specifics are not provided.

In my review, there doesn’t appear to be wide operational usage or
implementations of this extension to inform these obfuscation procedures. 
Furthermore, it appears that these procedures remain an open research question.
 I appreciate the helpful references to the academic papers in Section 11
([NOVA], [RESA][ MERCATOR])  but their practical applicability to the generic
capability provided by this extension appears to be difficulty to align and be
caveated.  For example, [RESA] and [MERCATOR] made what appear to be
significant assumptions on their approaches, “In this paper, we assume a
semi-honest security model, i.e., the aggregator and all member networks will
not deviate from the security protocol, but merely try to gather information
during the execution of the protocol”.

I believe this document needs to be provide a stronger applicability statement
constraining where it can be fielded and what assumptions are made about the
trust models.  Additionally, given the uncertainty on the generic feasibility
of obfuscation, this document should be published as experimental.


--
COMMENT:
--

Thanks to Samuel Weiler for the SECDIR review.

** Overstatement of security properties.

Section 1.  For better confidentiality, this document aims to minimize   
information exposure.

Section 5.1.2.  By design, ANEs are ephemeral and not to be used in further
requests to other ALTO resources.  More precisely, the corresponding ANE names
are no longer valid beyond the scope of the Path Vector response or the
incremental update stream for a Path Vector request.  This has several benefits
including better privacy of the ISPs and more flexible ANE computation.

The text in both of these sections reads to strongly.  This document defines
the ANEs which in fact provides more detailed network information but provides
no normative operational guidance or protocol-based protections to minimize
(obfuscate) this information.  These claims seem to rest of practices which are
out of scope of this document

** Section 5.1.2.   Editorial
   This has
   several benefits including better privacy of the ISPs and more
   flexible ANE computation.

Words are missing from this sentence – “better privacy of the ISPs” what?

** Section 5.1.3.
   Resource-constrained ALTO clients may benefit from the filtering of
   Path Vector query results at the ALTO server ...

Can you describe the use case of these “resource-constrained ALTO clients” as
nothing about the use cases in Section 4.2 suggested that the clients were
constrained.

** Section 5.2.
To be pedantic on what’s strictly in C++:

OLD
For
example, in programming languages such as C++, a Path Vector will
have the type of JSONArray.

NEW
For example, in programming languages such as C++ where there existed a JSON
array type named JSONArray, a Path Vector will have the type of
JSONArray.



___
alto mailing list
alto@ietf.org
https://www.ietf.org/mailman/listinfo/alto


[alto] Roman Danyliw's No Objection on draft-ietf-alto-incr-update-sse-20: (with COMMENT)

2020-03-09 Thread Roman Danyliw via Datatracker
Roman Danyliw has entered the following ballot position for
draft-ietf-alto-incr-update-sse-20: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-alto-incr-update-sse/



--
COMMENT:
--

** Section 7.1.  “To prevent an attacker from forging a stream control URI and
sending bogus requests to disrupt other update streams, stream control URIs
SHOULD contain sufficient random redundancy to make it difficult to guess valid
URIs.”

-- This approach provides no protection against an on-path attacker if https
isn’t used (Section 8.3.5 of RFC7285 only says that “ALTO server
implementations … MUST support the ‘https’ URI scheme”, not MUST use).

-- The words “random redundancy” wasn’t clear to me, but contextually, I
understood the intent.

** Section 9.1. Per “For stable resources with minor changes, the update stream
server may choose to send incremental changes; for resources that frequently
change, the update stream server may choose to send a full replacement after a
while.”, it isn’t clear what guidance this is providing as both statements are
“mays”.  The server always has the ability to choose the approach of returning
the updates.

** Section 9.1.  Per “Other JSON-based incremental change format may be
introduced in the future”, this statement doesn’t seem to have value in an
archival format without citation. Section 10.  With the addition of the URI
parameter for the stream control service, the attack surface described in
Section 15.1.1 of RFC7285 gets larger (as this could cause redirection to a
host of choice) – same mitigation though (use TLS).



___
alto mailing list
alto@ietf.org
https://www.ietf.org/mailman/listinfo/alto


[alto] Roman Danyliw's No Objection on draft-ietf-alto-cost-calendar-19: (with COMMENT)

2020-03-02 Thread Roman Danyliw via Datatracker
Roman Danyliw has entered the following ballot position for
draft-ietf-alto-cost-calendar-19: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-alto-cost-calendar/



--
COMMENT:
--

A few minor comments:

Section 1.1.  The role of the text describing the SENSE project isn’t clear.
I’m not sure it will age will when in an RFC

Section 3.  Thanks for providing an overview with the section.  Given that this
section is non-normative, how should the implementers use the text with RFC2119
words -- is it there just for emphasis?

Section 4.1.  Per ‘Attribute "cost-type-names" provides a better readability to
the Calendar attributes specified …”, could you please clarify “a better
readability”.

Section 4.3.  Nit. s/mode,to/mode, to/



___
alto mailing list
alto@ietf.org
https://www.ietf.org/mailman/listinfo/alto