Re: [Anima] [Gen-art] dealing with many the secdir and genart comments [on draft-ietf-anima-bootstrapping-keyinfra]

Michael Richardson <mcr+ietf@sandelman.ca> Sun, 02 December 2018 23:54 UTC

Return-Path: <mcr@sandelman.ca>
X-Original-To: anima@ietfa.amsl.com
Delivered-To: anima@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C7361130DCF for <anima@ietfa.amsl.com>; Sun, 2 Dec 2018 15:54:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DR-wDE1y_ymE for <anima@ietfa.amsl.com>; Sun, 2 Dec 2018 15:54:21 -0800 (PST)
Received: from relay.sandelman.ca (relay.cooperix.net [176.58.120.209]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 90C1D130DD8 for <anima@ietf.org>; Sun, 2 Dec 2018 15:54:20 -0800 (PST)
Received: from dooku.sandelman.ca (unknown [IPv6:2a02:c7d:b752:2f00:c3eb:b5be:80ee:7c56]) by relay.sandelman.ca (Postfix) with ESMTPS id 825411F8BE for <anima@ietf.org>; Sun, 2 Dec 2018 23:54:19 +0000 (UTC)
Received: by dooku.sandelman.ca (Postfix, from userid 179) id E260614F2; Sun, 2 Dec 2018 23:53:47 +0000 (GMT)
From: Michael Richardson <mcr+ietf@sandelman.ca>
To: anima@ietf.org
In-reply-to: <0b517731-ef11-4484-7bf8-46e313a2ac49@gmail.com>
References: <153826253306.18743.9250084704876465818@ietfa.amsl.com> <153874289877.989.15433226866680411112@ietfa.amsl.com> <24358.1543530974@dooku.sandelman.ca> <0b517731-ef11-4484-7bf8-46e313a2ac49@gmail.com>
Comments: In-reply-to Brian E Carpenter <brian.e.carpenter@gmail.com> message dated "Fri, 30 Nov 2018 13:57:26 +1300."
X-Mailer: MH-E 8.6; nmh 1.6; GNU Emacs 24.5.1
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg="pgp-sha256"; protocol="application/pgp-signature"
Date: Sun, 02 Dec 2018 23:53:47 -0000
Message-ID: <24016.1543794827@dooku.sandelman.ca>
Archived-At: <https://mailarchive.ietf.org/arch/msg/anima/WSBO4JB_CwjO7BKGevxyAmopbzw>
Subject: Re: [Anima] [Gen-art] dealing with many the secdir and genart comments [on draft-ietf-anima-bootstrapping-keyinfra]
X-BeenThere: anima@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Autonomic Networking Integrated Model and Approach <anima.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/anima>, <mailto:anima-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/anima/>
List-Post: <mailto:anima@ietf.org>
List-Help: <mailto:anima-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/anima>, <mailto:anima-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 02 Dec 2018 23:54:24 -0000

Brian E Carpenter <brian.e.carpenter@gmail.com> wrote:
    >> The authors seriously believe that this will result in an attempt to
    >> boil the ocean.  Yes, BRSKI is exciting for many and opens many doors,
    >> but in the context of the *ANIMA* Charter, we strongly think that this
    >> document should leave the oceans alone, and deal only with the ANIMA
    >> ACP usage.

    > Yes, violent agreement. From all the interest outside ANIMA, the basic
    > idea of BRSKI is a big hit and will be re-used in other contexts. I
    > think a strong statement about the specific scope of *this* document
    > belongs in the Abstract and Introduction, with a comment that variant
    > usages of BRSKI in other scenarios will be documented separately.

Brian, these are my proposed changes to the abstract, intro,
and adding a section on ACP Applicability.  I think that there is probably
more to say there.

This has become issue #116.

diff --git a/dtbootstrap-anima-keyinfra.xml b/dtbootstrap-anima-keyinfra.xml
index 78ce2a3..e705904 100644
--- a/dtbootstrap-anima-keyinfra.xml
+++ b/dtbootstrap-anima-keyinfra.xml
@@ -82,19 +82,21 @@
 
     <abstract>
       <t>
-        This document specifies automated bootstrapping of a remote secure
-        key infrastructure (BRSKI) using manufacturer installed X.509 certificate, in
-        combination with a manufacturer's authorizing service, both online and offline.
+        This document specifies automated bootstrapping of an Autonomic
+        Control Plane.  To do this a remote secure
+        key infrastructure (BRSKI) is created using manufacturer installed
+        X.509 certificate, in combination with a manufacturer's authorizing
+        service, both online and offline. 
         Bootstrapping a new device can occur using a routable address and a
         cloud service, or using only link-local connectivity, or on
         limited/disconnected networks. Support for lower security models,
         including devices with minimal identity, is described for legacy reasons
 
@@ -103,7 +105,22 @@
       <t>
         BRSKI provides a solution for secure zero-touch (automated) bootstrap of
         virgin (untouched) devices that are called pledges in this
-        document. These pledges need to discover (or be discovered by) an
+        document.
+      </t>
+      
+      <t>
+        This document primarily provides for the needs of
+        the ISP and Enterprise focused ANIMA 
+        <xref target="I-D.ietf-anima-autonomic-control-plane">Autonomic 
+        Control Plane (ACP)</xref>.  Other users of the BRSKI protocol
+        will need to provide separate applicability statements that
+        include privacy and security considerations appropriate to that
+        deployment.  Section <xref target="acpapplicability" /> explains the details
+        applicability for this the ACP usage.
+      </t>
+      
+      <t>
+        This document describes how pledges discover (or be discovered by) an
         element of the network domain to which the pledge belongs to perform
         the bootstrap.  This element (device) is called the
         registrar.  Before any other operation, pledge and registrar need to

@@ -2755,6 +2772,64 @@ Reference: [This document]
 	  </t>
 	</section>
     </section>
+    <section anchor="acpapplicability" title="Applicability to the Autonomic
+                                              Control Plane">
+      <t>
+        This document provides a solution to the requirements for secure
+        bootstrap set out in <xref target="RFC8368">Using an Autonomic Control Plane for
+        Stable Connectivity of Network Operations, Administration, and
+        Maintenance </xref>, 
+        <xref target="I-D.ietf-anima-reference-model" >A Reference Model for
+        Autonomic Networking</xref> and specifically the 
+        <xref target="I-D.ietf-anima-autonomic-control-plane">An Autonomic
+        Control Plane (ACP)</xref>, section 3.2 (Secure Bootstrap), and
+        section 6.1 (ACP Domain, Certificate and Network).
+      </t>
+      <t>
+        The protocol described in this document has appeal in a number of
+        other non-ANIMA use cases.  Such uses of the protocol will be
+        deploying into other environments with different tradeoffs of
+        privacy, security, reliability and autonomy from manufacturers.
+        As such those use cases will need to provide their own applicability
+        statements, and will need to address unique privacy and security
+        considerations for the environments in which they are used.
+      </t>
+      <t>
+        The autonomic control plane that this document provides bootstrap
+        for is typically a medium to large Internet Service Provider
+        organization, or an equivalent Enterprise that has signficant layer-3
+        router connectivity.  (A network consistenting of primarily layer-2
+        is not excluded, but the adjacencies that the ACP will create and
+        maintain will not reflect the topology until all devices participate
+        in the ACP).
+      </t>
+      <t>
+        As specified in the ANIMA charter, this work "..focuses on
+        professionally-managed networks."  Such a network has an operator
+        and can do things like like install, configure and operate the
+        Registrar function.  The operator makes purchasing decisions
+        and is aware of what manufacturers it expects to see on it's
+        network.
+      </t>
+      <t>
+        Such an operator also is capable of performing the traditional
+        (craft serial-console) based bootstrap of devices. The zero-touch
+        mechanism presented in this and the ACP document represents a
+        signficiant efficiency: in particular it reduces the need to
+        put senior experts on airplanes to configure devices in person.
+        There is a recognition as the technology evolves that not every
+        situation may work out, and occasionally a human still still have to
+        visit.
+      </t>
+      <t>
+        The BRSKI protocol is going into environments where there have
+        already been quite a number of vendor proprietary management
+        systems.  Those are not expected to go away quickly, but rather to
+        leverage the secure credentials that are provisioned by BRSKI.  The
+        connectivity requirements of said management systems are provided
+        by the ACP.
+      </t>
+    </section>
     <section anchor="privacyconsiderations" title="Privacy Considerations">
       <section title="MASA audit log">
       <t>
@@ -3292,6 +3367,7 @@ Reference: [This document]
 
       <?rfc include="reference.I-D.ietf-anima-autonomic-control-plane" ?>
       <?rfc include="reference.RFC.8366" ?>
+      <?rfc include="reference.RFC.8368" ?>
       <?rfc include="reference.I-D.ietf-anima-grasp" ?>
 
       <reference anchor="IDevID"

-- 
Michael Richardson <mcr+IETF@sandelman.ca>, Sandelman Software Works
 -= IPv6 IoT consulting =-