Re: [alto] [ietf-wg-alto/draft-ietf-alto-oam-yang] Security Considerations (Issue #33)

mohamed.boucadair@orange.com Thu, 11 May 2023 06:42 UTC

Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: alto@ietfa.amsl.com
Delivered-To: alto@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5C3D5C15154C for <alto@ietfa.amsl.com>; Wed, 10 May 2023 23:42:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.095
X-Spam-Level:
X-Spam-Status: No, score=-7.095 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=orange.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oc3xhp6uDa9d for <alto@ietfa.amsl.com>; Wed, 10 May 2023 23:42:33 -0700 (PDT)
Received: from relais-inet.orange.com (relais-inet.orange.com [80.12.66.41]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 840B0C15152F for <alto@ietf.org>; Wed, 10 May 2023 23:42:33 -0700 (PDT)
Received: from opfedar07.francetelecom.fr (unknown [xx.xx.xx.9]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by opfedar20.francetelecom.fr (ESMTP service) with ESMTPS id 4QH2Pz200gz8tRk; Thu, 11 May 2023 08:42:31 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=orange.com; s=ORANGE001; t=1683787351; bh=+BrB8VZ4muNdKyWJJPBymEiguX2rhuBOcXdgJIsD0l8=; h=From:To:Subject:Date:Message-ID:Content-Type:MIME-Version; b=IC/U2HfhSLPiN0UL2MbcbirQPx0Vu72q8ly6URfKX06a8Zr/57y2LQifzZWCeFo+V 9e2L1XaisFG6t+asYZjOMF8100P0R04trxQDve0lWmwRl8JYDEiq8dJjK4/vszCozj /vfajGnIerxspDQLMbq7V0fXa0D+EAXd5WbNuAbWrKmzSc+qtS/FjAGjo9GiFwzwk5 SjwokM6pLKUGo+wMOOLc4S6TTu5KnkN9IeNBK9UP0ClZj+Y1qwZiiOkM9ww0qHVkaD WYIWlbMcC4ylaw/Tt1XpuC96mMcJ8F20Aecc6XDBJPzDAe6n7BBFF0ztFHSDHOFLg5 /YrZXCliDSK8w==
X-TM-AS-ERS: 10.107.176.76-127.5.254.253
X-TM-AS-SMTP: 1.0 b3BmZWRhbTMwLmZyYW5jZXRlbGVjb20uZnI= bW9oYW1lZC5ib3VjYWRha XJAb3JhbmdlLmNvbQ==
X-DDEI-TLS-USAGE: Used
Received: from opfedam30.francetelecom.fr (unknown [xx.xx.xx.76]) by opzinddimail2.si.francetelecom.fr (Postfix) with ESMTPS; Thu, 11 May 2023 08:42:30 +0200 (CEST)
Received: from EUR05-VI1-obe.outbound.protection.outlook.com (mail-vi1eur05lp2170.outbound.protection.outlook.com [104.47.17.170]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by relais-m365.orange.com (ESMTP service) with ESMTPS id 4QH2Py3mdMzyPL; Thu, 11 May 2023 08:42:30 +0200 (CEST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=RlAXkjQGzhyB1OZhLpCjh0bQrhf9BgxJlZQlRUb/OPcE/Gd4xON1gy8mr6p/ikZNCHwg6JXQR/hjKCALR9zwcaVu81eWrqn2qT1u1rdnNJO9aaLLfwInt/JUs3F399tfhXtgdDlUqvn9/ehR3j1WdIBMfoCZxkxUEotz/FP0x1vmDJVgQCNbIScBWNXSryIzU0wS+xu9ebaLJaJyy4xWhh8eFt75r2II8Jhez8DW/1zM69U9fsUW4BAxd/yM9akDqB1lXm1tU0X1cpdhRRHHpdI2dGx0/Zitzj1O/+YZrysXrfwD9KghBszVsHqYd6TjSowfIsbJ/AtDam93eZ986Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=mwyg3VpbMOK8GNbjaewuPJUb2BuCMc9gQa+IzLRNM0s=; b=c6upGlTH6ErPapYzsEhF61UN98R9W3NV4j3M5hpJgY2obLtvgI3GrtZUooG2WyASc/E7p6YZOOZQpiGsII+PmeonhJVUFFp+mqj2EQT996PI1c77SIVnDcVpUo8bdlh4WP5IVaVgGfCjyc5N/F5C6l1Fbdn5oWXMjMChsznsLgd/DJl4Y9p2+geSHgn+PLqHcSviqfeYiVwDsyNrgxebovjfST0TB2RCdRhY2H1Z0jGZ7xloenMoumADAILnb88JRRAnWARn1SGjX1LGOsWJcR3ZOq8zzjbt+/KvQIcQH6GSolcwxWwBQY0QtRKqBMoHx3Mowp2kyFFoS76TUkTfDA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=orange.com; dmarc=pass action=none header.from=orange.com; dkim=pass header.d=orange.com; arc=none
Received: from PAVPR02MB9673.eurprd02.prod.outlook.com (2603:10a6:102:319::5) by AS4PR02MB8006.eurprd02.prod.outlook.com (2603:10a6:20b:4e1::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6363.33; Thu, 11 May 2023 06:42:29 +0000
Received: from PAVPR02MB9673.eurprd02.prod.outlook.com ([fe80::dcd6:6396:fe64:e7bc]) by PAVPR02MB9673.eurprd02.prod.outlook.com ([fe80::dcd6:6396:fe64:e7bc%5]) with mapi id 15.20.6363.033; Thu, 11 May 2023 06:42:29 +0000
From: mohamed.boucadair@orange.com
To: Jensen Zhang <jingxuan.n.zhang@gmail.com>
CC: ietf-wg-alto/draft-ietf-alto-oam-yang <reply+ABCCA5IJEPGBNLOGWRS6ASWCEWNPTEVBNHHGCSJ3GE@reply.github.com>, IETF ALTO <alto@ietf.org>
Thread-Topic: [alto] [ietf-wg-alto/draft-ietf-alto-oam-yang] Security Considerations (Issue #33)
Thread-Index: AQHZg65dvs6OTd9fjkKdUnLofNLnJK9UmX7g
Content-Class:
Date: Thu, 11 May 2023 06:42:28 +0000
Message-ID: <50712_1683787350_645C8E56_50712_424_1_PAVPR02MB96734B3AE907A8C57D0108CE88749@PAVPR02MB9673.eurprd02.prod.outlook.com>
References: <ietf-wg-alto/draft-ietf-alto-oam-yang/issues/33@github.com> <CAAbpuyrAXeNsDDO1gS-HG9X0r=WY6CCsxPJ_NUVhth57KNQDGw@mail.gmail.com> <42432_1683639586_645A4D22_42432_218_1_PAVPR02MB96733D7D634086348D0600A488769@PAVPR02MB9673.eurprd02.prod.outlook.com> <CAAbpuyrtzEqoqkjEk=Uz5WAO0HH0jkhGeLfP3ZPHG+X_zxU_fA@mail.gmail.com>
In-Reply-To: <CAAbpuyrtzEqoqkjEk=Uz5WAO0HH0jkhGeLfP3ZPHG+X_zxU_fA@mail.gmail.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Enabled=true; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SetDate=2023-05-11T06:18:57Z; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Method=Privileged; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Name=unrestricted_parent.2; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SiteId=90c7a20a-f34b-40bf-bc48-b9253b6f5d20; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_ActionId=d72db792-4a13-480c-92a4-517347941728; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_ContentBits=0
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=orange.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: PAVPR02MB9673:EE_|AS4PR02MB8006:EE_
x-ms-office365-filtering-correlation-id: 75ad65d5-89e3-4c39-6021-08db51eae3d6
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:PAVPR02MB9673.eurprd02.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230028)(4636009)(136003)(366004)(376002)(39860400002)(396003)(346002)(451199021)(71200400001)(8936002)(7696005)(5660300002)(66556008)(66446008)(6916009)(64756008)(66476007)(2906002)(66946007)(76116006)(54906003)(15650500001)(52536014)(86362001)(38100700002)(41300700001)(38070700005)(9326002)(8676002)(122000001)(316002)(33656002)(4326008)(55016003)(478600001)(186003)(26005)(9686003)(6506007)(53546011)(83380400001); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_PAVPR02MB96734B3AE907A8C57D0108CE88749PAVPR02MB9673eurp_"
MIME-Version: 1.0
X-OriginatorOrg: orange.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: PAVPR02MB9673.eurprd02.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 75ad65d5-89e3-4c39-6021-08db51eae3d6
X-MS-Exchange-CrossTenant-originalarrivaltime: 11 May 2023 06:42:28.9341 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 90c7a20a-f34b-40bf-bc48-b9253b6f5d20
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: OUmpOzmCaxDquKOj+9WbU/u/tIIgqKqJ7DhwuLh48/T3arv52tTItNYS6Uvu1oWdAjeeYXY9rICmiVAd2v7EpdaSYXM6gFjEDUUVROz8jb8=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS4PR02MB8006
X-TM-AS-ERS: 10.107.176.76-127.5.254.253
X-TM-AS-SMTP: 1.0 b3BmZWRhbTMwLmZyYW5jZXRlbGVjb20uZnI= bW9oYW1lZC5ib3VjYWRha XJAb3JhbmdlLmNvbQ==
X-TMASE-Version: DDEI-5.1-9.0.1002-27618.005
X-TMASE-Result: 10--36.762700-10.000000
X-TMASE-MatchedRID: CxmI61mtwh9jDV//SvkH3uScxJMb2Uf4y2tHgDROzc/nIRwNOM8986cZ dxCE7oUvyX9DPRb9ZnTGp/huIU6WTAlASHYeoezr+Basxm9uZ4fKrKWVfpQkixS1r4tCARkwsGS ON2g4/VuF4MkB3rCuMkB3ekRSYSKFH1nK3LYv76CMcPlFNKd81vJ7gbRt+WCrx8BJ7uScK21exH VWV7Fz79I/2mgOAPYe1T+Z8rC20gdAIbzQeQerirPx3rO+jk2Q6KjY+Ctcuzh7YhuCO/3iFXMWf mr8UEU8wVeG+L4n/T9rRfbE7c2kUWrCMAFDPKUm8MPuu+RzTf4Ex2nnXvzNIy2is8s1ivBkYsiz s49CT4Js/8SLplYFWcF1TcBtfQdbvc0h7h2nAismcGgvQFDPULdy2fiHdqOwlPrZAeAiFsd+IDx sMdvrdT6l8tCqACiRooeFFJqCTE4nW2kr/iHeatIeK3if3H1BTi4EdWBTdoAdD63J577YjH4zeN 1E9+iZ0njN8gU/4ZDmD114yElM19shiG+/TvQoh+0aPvO1xnhZYlrUyCRLW7Xl40gTGJ5pJf5ot vavOZf3wgCpjef5UOmWxAgjfDfrT0Fm6HRsdc/vVbHa5Rs8t0OvwxWboMrdW2L+irfrhdiM0vGt zEpWJawUl4ecgdmLpXXMpwXgD6xLR6THX61zCmQYj6+BFPEwUaTm5EfQzMJHpEd1UrzmFf0Rilt 9eNz0jQO5NdQooutmQGDcBqEA9SONKPnKmSjfmmDwg4h7AdApA2ExuipmWtkY+KIbxMxzdXXYCB SZPZZKkAU17gNQnhxO8fnEdmIqkn6lEyW8qkKeAiCmPx4NwGmRqNBHmBvepTwPRvSoXL2y5/tFZ u9S3OdLjQU97e0W8DFFIBzQ4Q0i4mJ41W/O+n7cGd19dSFd
X-TMASE-SNAP-Result: 1.821001.0001-0-1-22:0,33:0,34:0-0
X-TMASE-INERTIA: 0-0;;;;
X-TMASE-XGENCLOUD: 2d3b2651-70bb-4c35-b17a-08f033d041d4-0-0-200-0
Archived-At: <https://mailarchive.ietf.org/arch/msg/alto/Vhmblilk9rGiMG4_hAzKb03flS4>
Subject: Re: [alto] [ietf-wg-alto/draft-ietf-alto-oam-yang] Security Considerations (Issue #33)
X-BeenThere: alto@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Application-Layer Traffic Optimization \(alto\) WG mailing list" <alto.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/alto>, <mailto:alto-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/alto/>
List-Post: <mailto:alto@ietf.org>
List-Help: <mailto:alto-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/alto>, <mailto:alto-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 May 2023 06:42:38 -0000

Hi Jensen,

Please see inline.

Cheers,
Med

De : Jensen Zhang <jingxuan.n.zhang@gmail.com>
Envoyé : jeudi 11 mai 2023 04:15
À : BOUCADAIR Mohamed INNOV/NET <mohamed.boucadair@orange.com>
Cc : ietf-wg-alto/draft-ietf-alto-oam-yang <reply+ABCCA5IJEPGBNLOGWRS6ASWCEWNPTEVBNHHGCSJ3GE@reply.github.com>; IETF ALTO <alto@ietf.org>
Objet : Re: [alto] [ietf-wg-alto/draft-ietf-alto-oam-yang] Security Considerations (Issue #33)

Hi Med,

Sorry for the late reply.

On Tue, May 9, 2023 at 9:39 PM <mohamed.boucadair@orange.com<mailto:mohamed.boucadair@orange.com>> wrote:
Hi Jensen,

Thanks for drafting that text. I do still that some sensitive data nodes have to be listed. For example,


  *   Access to all authentication-related data nodes should be protected; those that are inherited from other models have already “nacm:default-deny-write” statement, while there is no such protected from the data node that are added in the draft.

Thanks for the suggestion. I agree. But I think the only authentication-related data nodes explicitly added in the current document are "http-auth-client/user-id" and "https-auth-client/user-id" under "auth-client". The leaf nodes referenced by them have already been protected. Shall the leafrefs themselves be also protected?
[Med] I think that is safe that the leafrefs themselves be protected. In addition, we need at least two other actions: (1) remind that imported authentication-related data are adequately protected as per my previous reply. (2) add a warning that given that no “nacm:*” statement is added in the top-level auth container, future augmentations should include those.

  *   Consider the example of “poll-interval”: a misbehaving node can set a very large value that would lead to maintaining stale data. Setting very low values can also be considered as a misbehavior.

It is a very interesting point. I agree that the range of "poll-interval" should be limited. But the accepted range may depend on the data sources and implementations. It is hard to define a fixed range in the module. Do you have any suggestions about it? Or we just explain this consideration without any concrete solution?

[Med] We don’t need to define random ranges for this or touch the YANG model. We only need to list the data node in the security considerations with the associated vulnerability. Thanks.

Thanks,
Jensen

_________________________________________________________________________________________________________________________

Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.

This message and its attachments may contain confidential or privileged information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
Thank you.