Re: [Anima-signaling] GRASP issue 49: More text about inter-domain GRASP

Toerless Eckert <eckert@cisco.com> Tue, 02 August 2016 16:05 UTC

Return-Path: <eckert@cisco.com>
X-Original-To: anima-signaling@ietfa.amsl.com
Delivered-To: anima-signaling@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7E66C12B02F for <anima-signaling@ietfa.amsl.com>; Tue, 2 Aug 2016 09:05:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.808
X-Spam-Level:
X-Spam-Status: No, score=-15.808 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-1.287, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nlXv7iV32i5v for <anima-signaling@ietfa.amsl.com>; Tue, 2 Aug 2016 09:05:24 -0700 (PDT)
Received: from alln-iport-8.cisco.com (alln-iport-8.cisco.com [173.37.142.95]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1D32E12D137 for <anima-signaling@ietf.org>; Tue, 2 Aug 2016 09:05:24 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=2960; q=dns/txt; s=iport; t=1470153924; x=1471363524; h=date:from:to:cc:subject:message-id:references: mime-version:in-reply-to; bh=sUGIdbkLrK3u/zzRqeA4yUOpvfMLmy7S6oNHzH8wO84=; b=LH5SiVEhq51jE2Nw+nrGNe0mUhHCpqLnWznAz7thagxhW1CQK/qwSzKV CosUM65RydHHM5875Mqy8VOOMQPg6+Cc2FucNitCzk1aFE9vyTCatwCLP WzeI2I0AXVCA4oxlBKHvxNv5o1LA9LW2scf2svmJWsfEhN8ESEIvEjIlx o=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AmAgDJw6BX/5xdJa1dg0VWfLkugX0kg?= =?us-ascii?q?kKDNwKBQDgUAQEBAQEBAV0nhF4BAQQBAQE4NAsFCwsSBgklDwUTIhQTG4gOCA7?= =?us-ascii?q?ATAEBAQEBAQEBAQEBAQEBAQEBAQEBARcFineEKoVxBY8LiiiOdQqPP4wwg3ceN?= =?us-ascii?q?oQaHDKIMQEBAQ?=
X-IronPort-AV: E=Sophos;i="5.28,461,1464652800"; d="scan'208";a="305719090"
Received: from rcdn-core-5.cisco.com ([173.37.93.156]) by alln-iport-8.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 02 Aug 2016 16:05:23 +0000
Received: from mcast-linux1.cisco.com (mcast-linux1.cisco.com [172.27.244.121]) by rcdn-core-5.cisco.com (8.14.5/8.14.5) with ESMTP id u72G5Mjh015292 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 2 Aug 2016 16:05:23 GMT
Received: from mcast-linux1.cisco.com (localhost.cisco.com [127.0.0.1]) by mcast-linux1.cisco.com (8.13.8/8.13.8) with ESMTP id u72G5MTQ007353; Tue, 2 Aug 2016 09:05:22 -0700
Received: (from eckert@localhost) by mcast-linux1.cisco.com (8.13.8/8.13.8/Submit) id u72G5Mjj007352; Tue, 2 Aug 2016 09:05:22 -0700
Date: Tue, 2 Aug 2016 09:05:22 -0700
From: Toerless Eckert <eckert@cisco.com>
To: Michael Richardson <mcr+ietf@sandelman.ca>
Message-ID: <20160802160522.GI21039@cisco.com>
References: <623af621-1d6e-c5f3-17a1-63f8d5fe3ffd@gmail.com> <03f239b1-bfda-d283-cf60-b81dacd61156@gmail.com> <20160802115054.GA21039@cisco.com> <31656.1470153362@obiwan.sandelman.ca>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <31656.1470153362@obiwan.sandelman.ca>
User-Agent: Mutt/1.4.2.2i
Archived-At: <https://mailarchive.ietf.org/arch/msg/anima-signaling/pXXT9Vq0v5IxUybBEYVIjdJvTOc>
Cc: Anima signaling DT <anima-signaling@ietf.org>
Subject: Re: [Anima-signaling] GRASP issue 49: More text about inter-domain GRASP
X-BeenThere: anima-signaling@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Mailing list for the signaling design team of the ANIMA WG <anima-signaling.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/anima-signaling>, <mailto:anima-signaling-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/anima-signaling/>
List-Post: <mailto:anima-signaling@ietf.org>
List-Help: <mailto:anima-signaling-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/anima-signaling>, <mailto:anima-signaling-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Aug 2016 16:05:26 -0000

On Tue, Aug 02, 2016 at 11:56:02AM -0400, Michael Richardson wrote:
> 
> Toerless Eckert <eckert@cisco.com> wrote:
>     > In our Cisco implementation, we allow services to run on systems that
>     > do not have ACP - just because its evolving work to get the ACP onto
>     > such systems. Eg: TFTP servers, Radius Servers - or the like. SO there's
>     > a leg of the ACP that's unencrypted. And the deployment requirement is
>     > to physcially protect this segment - aka: router with ACP co-located with
>     > those servers n a secure NOC room. And we use mDNS there.
> 
> I was under the impression that we'd make this secure either by physical
> means (as you write), or by putting those services in containers or VMs, and
> connect them to devices/routers that would have ACP on them.

Right. Those are the easily managed approaches.

>     > Now i could easily imagine that the next step would be to have multiple
>     > disjoined autonomic networks, but a shared NOC. In that case, the
>     > reason that we don't use encryption is not only "server systems suck, have no ACP",
>     > but also: If a server should provide objectives (services) to multiple
>     > autonomic networks, then we would need to solve how it could be cryptographically
>     > part of multiple ACPs. Thats even more work.
> 
> I'm not sure it's that big a deal to be part of multiple ACPs.
> Depends a lot upon the details of the service.
> 
> For some services build upon a multi-tier architecture (anything RESTful,
> such as NETCONF...) then putting a front-end server into two ACPs while
> connecting to middle-ware on a common back-end network would be trivial.
> 
> Ditto: Radius things, you can always add a layer of radius proxy.
> TFTP servers... not a huge deal, just NFS mount /tftpboot across a backend
> LAN from the real machine and have multiple TFTP servers in multiple ACPs.

Yes, there are a lot of different ways to do this, but i think they
all involve some additional SW design, which may be trivial, but needs to
be implemented, and i am not sure we have a sufficient strong use-case for
any specific optoin to mandate or even suggest any such extension right now -
as opposed to any other option.

Cheers
    Toerless

>     > If i take your text and would want to build a solution around it, then
>     > i could think of some gateway-device thats part of two ACPs, and
>     > has an ASA participating in each ACPs GRASP instance and is filtering/forwarding
>     > objectives that should be allowed to be used across ACPs. Makes sense too...
> 
> 
> --
> Michael Richardson <mcr+IETF@sandelman.ca>ca>, Sandelman Software Works
>  -= IPv6 IoT consulting =-
> 
> 
> 



> _______________________________________________
> Anima-signaling mailing list
> Anima-signaling@ietf.org
> https://www.ietf.org/mailman/listinfo/anima-signaling


-- 
---
Toerless Eckert, eckert@cisco.com