Re: [Anima] Benjamin Kaduk's Discuss on draft-ietf-anima-bootstrapping-keyinfra-22: (with DISCUSS and COMMENT)

Michael Richardson <mcr+ietf@sandelman.ca> Sun, 18 August 2019 20:09 UTC

Return-Path: <mcr+ietf@sandelman.ca>
X-Original-To: anima@ietfa.amsl.com
Delivered-To: anima@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 58EF81200CD; Sun, 18 Aug 2019 13:09:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.199
X-Spam-Level:
X-Spam-Status: No, score=-4.199 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1_OfoDq93pwB; Sun, 18 Aug 2019 13:09:52 -0700 (PDT)
Received: from tuna.sandelman.ca (tuna.sandelman.ca [209.87.249.19]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3A4DE1200B9; Sun, 18 Aug 2019 13:09:52 -0700 (PDT)
Received: from sandelman.ca (obiwan.sandelman.ca [209.87.249.21]) by tuna.sandelman.ca (Postfix) with ESMTP id 72DCD380BE; Sun, 18 Aug 2019 16:08:56 -0400 (EDT)
Received: from localhost (localhost [IPv6:::1]) by sandelman.ca (Postfix) with ESMTP id 6B1DEB2D; Sun, 18 Aug 2019 16:09:50 -0400 (EDT)
From: Michael Richardson <mcr+ietf@sandelman.ca>
To: Benjamin Kaduk <kaduk@mit.edu>, Adam Roach <adam@nostrum.com>
cc: The IESG <iesg@ietf.org>, Christian Huitema <huitema@huitema.net>, draft-ietf-anima-bootstrapping-keyinfra@ietf.org, tte+ietf@cs.fau.de, anima@ietf.org, anima-chairs@ietf.org
In-Reply-To: <20190816223315.GP88236@kduck.mit.edu>
References: <156282301326.15131.7510532622479656237.idtracker@ietfa.amsl.com> <17440.1565636744@localhost> <20190814142737.GV88236@kduck.mit.edu> <14902.1565888325@localhost> <20190816223315.GP88236@kduck.mit.edu>
X-Mailer: MH-E 8.6; nmh 1.7+dev; GNU Emacs 24.5.1
X-Face: $\n1pF)h^`}$H>Hk{L"x@)JS7<%Az}5RyS@k9X%29-lHB$Ti.V>2bi.~ehC0; <'$9xN5Ub# z!G,p`nR&p7Fz@^UXIn156S8.~^@MJ*mMsD7=QFeq%AL4m<nPbLgmtKK-5dC@#:k
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg="pgp-sha256"; protocol="application/pgp-signature"
Date: Sun, 18 Aug 2019 16:09:50 -0400
Message-ID: <3614.1566158990@localhost>
Archived-At: <https://mailarchive.ietf.org/arch/msg/anima/RPPZ05Vt5lQqrNgzqZLrjAUs7yo>
Subject: Re: [Anima] Benjamin Kaduk's Discuss on draft-ietf-anima-bootstrapping-keyinfra-22: (with DISCUSS and COMMENT)
X-BeenThere: anima@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Autonomic Networking Integrated Model and Approach <anima.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/anima>, <mailto:anima-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/anima/>
List-Post: <mailto:anima@ietf.org>
List-Help: <mailto:anima-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/anima>, <mailto:anima-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 18 Aug 2019 20:09:54 -0000

Benjamin Kaduk <kaduk@mit.edu> wrote:
    > That specific construction would seem like an "optional feature" per
    > https://www.ietf.org/blog/iesg-statement-normative-and-informative-references/
    > ...

I re-read this, and this as to do with References, and so anything optional
referenced in section 7 would still need to be a Normative Reference.

The stickler I see right now is [I-D.ietf-netconf-keystore].
I don't want to hang on MISREF on that document; it's just one of many that
could be used, and I do not want to tell manufacturers that they have
to use this specific protocol to update trust anchors.
There are many other protocols that they presently support which they could
use, in particular, a CLI interface would be fine.

I think that this 7.4.3 section that creates a factory default which isn't
the default from the factory should be worry people who care about remote
attestation of software.

Adam has been particularly vocal about the need to specify something
normative that manufacturers have to provide in order to resale and operation
with the availability of the MASA.

It seems that we might need another round of discussion on this topic.
I feel that we are being pushed to describe the entire security lifetime of
the device; that we need to solve the entire management problem of devices in
our document.  (i.e. the 25 years of SNMPv3, plus YANG...) Maybe I just don't
understand what would be a reasonable answer, if what I've written is not enough.

Maybe a virtual interim discussion!   If so, please let me know.
ANIMA/Iot-Onboarding has some time booked already:
    https://datatracker.ietf.org/meeting/interim-2019-anima-01/materials/agenda-interim-2019-anima-01-anima-01

ps: (s/IPv6 NAT44/IPv4 NAT44/ for section 7.4.2, btw)


    >> section 9:
    >> In recognition of this, some mechanisms are presented in
    >> Section 7.2.  The manufacturer MUST provide at least one of the one-
    >> touch mechanisms described that permit enrollment to be proceed
    >> without availability of any manufacturer server (such as the MASA).

    > ... but this is a somewhat different construction.  In isolation, it looks
    > more like "MUST do at least one of X, Y, Z" without condition on "wish to
    > do W", and if X, Y, and Z are all in the same place, that place seems
    > normative to me.  (I will confess I've rather lost track of exactly why
    > we're debating if this is normative or not; I guess it's just the
    > disclaimer in Section 7 about "considered non-normative in the generality
    > of the protocol".)

Yes, it's MUST do one of X,Y,Z.
So that implies: MAY do X, MAY do Y, MAY do Z, but not the case of all being false.

--
Michael Richardson <mcr+IETF@sandelman.ca>, Sandelman Software Works
 -= IPv6 IoT consulting =-