Re: [Anima] Magnus Westerlund's Discuss on draft-ietf-anima-bootstrapping-keyinfra-22: (with DISCUSS)

Eliot Lear <lear@cisco.com> Sun, 14 July 2019 10:36 UTC

Return-Path: <lear@cisco.com>
X-Original-To: anima@ietfa.amsl.com
Delivered-To: anima@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4730D120112; Sun, 14 Jul 2019 03:36:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.5
X-Spam-Level:
X-Spam-Status: No, score=-14.5 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RewZ-pTaaXd4; Sun, 14 Jul 2019 03:36:45 -0700 (PDT)
Received: from aer-iport-2.cisco.com (aer-iport-2.cisco.com [173.38.203.52]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C83881200F4; Sun, 14 Jul 2019 03:36:44 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=11575; q=dns/txt; s=iport; t=1563100605; x=1564310205; h=from:message-id:mime-version:subject:date:in-reply-to:cc: to:references; bh=mI+uE9ml40/7if5F3eTr8Ahwl5JtAH8HxPs8TUporys=; b=jofJfa4nVhHxWL8qGPs4+bPo9SuQQB5j5n9+H/AjhBptSTIDcul5cpd4 j83WUUFM30bcvaZr6TwOM+LTyWAFOdT+gnjN/ljdmznYXoVOKUPeheL++ pUoO4f7J/BHa0AwwkgcgLf6QjibUj1/ev2KM+hG8SetJ5VC0u1N0j24DE U=;
X-Files: signature.asc : 195
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AJAAAIBStd/xbLJq1mGgEBAQEBAgEBAQEHAgEBAQGBVQMBAQEBCwGBZ4EZUQEgEiiEHIh7i3eSeoYDgXsCBwEBAQkDAQEYAQoMAQGBS4J1AoJ5NgcOAQMBAQQBAQIBBW2FPAyFSgEBAQECAQEBIUsLBQsLGCMHAgInMAYTgyIBgXsPD6l7gTKEMgGBFIRmEIE0AYFQiiWBf4ERJx+CTD6CYQEBgToRgyAygiYEjBCIYZVyCYIbgh+BDIMtiUSDcBuCLYclg2WKU5R9jH2DCwIEBgUCFYFXAi+BWDMaCBsVOyoBgkEJNYI6gmaFaIVBPQMwjheCUgEB
X-IronPort-AV: E=Sophos;i="5.63,490,1557187200"; d="asc'?scan'208,217";a="14285727"
Received: from aer-iport-nat.cisco.com (HELO aer-core-4.cisco.com) ([173.38.203.22]) by aer-iport-2.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 14 Jul 2019 10:36:42 +0000
Received: from [10.61.168.132] ([10.61.168.132]) by aer-core-4.cisco.com (8.15.2/8.15.2) with ESMTPS id x6EAae9r012979 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Sun, 14 Jul 2019 10:36:41 GMT
From: Eliot Lear <lear@cisco.com>
Message-Id: <D9A4C31A-1A3D-471A-B92E-7FFAF93AF262@cisco.com>
Content-Type: multipart/signed; boundary="Apple-Mail=_68973762-8F9C-4E63-AF85-C3F3343004A5"; protocol="application/pgp-signature"; micalg="pgp-sha1"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
Date: Sun, 14 Jul 2019 12:36:40 +0200
In-Reply-To: <17539.1563043297@dooku.sandelman.ca>
Cc: Magnus Westerlund <magnus.westerlund@ericsson.com>, draft-ietf-anima-bootstrapping-keyinfra@ietf.org, tte+ietf@cs.fau.de, anima-chairs@ietf.org, The IESG <iesg@ietf.org>, anima@ietf.org
To: Michael Richardson <mcr+ietf@sandelman.ca>
References: <156285243815.32459.10845626927382447919.idtracker@ietfa.amsl.com> <17539.1563043297@dooku.sandelman.ca>
X-Mailer: Apple Mail (2.3445.104.11)
X-Outbound-SMTP-Client: 10.61.168.132, [10.61.168.132]
X-Outbound-Node: aer-core-4.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/anima/qOoUesbG9wBWVG620UI7BE9ZYvc>
Subject: Re: [Anima] Magnus Westerlund's Discuss on draft-ietf-anima-bootstrapping-keyinfra-22: (with DISCUSS)
X-BeenThere: anima@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Autonomic Networking Integrated Model and Approach <anima.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/anima>, <mailto:anima-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/anima/>
List-Post: <mailto:anima@ietf.org>
List-Help: <mailto:anima-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/anima>, <mailto:anima-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 14 Jul 2019 10:36:49 -0000

Michael, Magnus,

I want to reinforce a point I made in that previous discussion about pledges using BRSKI with H2 (and by extension QUIC).  In this limited case, both present needless overhead both in terms of dev costs and COGS.  H2 in particular, and in this particular case, introduces new dev complexity because the provisional trust model used in BRSKI means that you cannot make use of multiple channels within the transport until at least the BRSKI transaction is complete.  And once it’s complete, and once EST is complete, the session is expected to terminate(*).  When BRSKI is in play, these transactions will happen lock step.

Eliot

(*) Keep in mind these protocols are used to establish network access.  A good analogy is that they are the language used to communicate at the gate with the security guard.  Typically one prefers that conversation to be short and to the point, so that one can get on with the business at hand.


> On 13 Jul 2019, at 20:41, Michael Richardson <mcr+ietf@sandelman.ca> wrote:
> 
> 
> <#secure method=pgpmime mode=sign>
> 
> Magnus Westerlund via Datatracker <noreply@ietf.org> wrote:
>> A. This is really a discuss discuss. With to little time to dig into
>> the details it appears that this protocol is making i hack of its
>> interface towards the its transport. It appears to attempt to use an
>> HTTP rest interface, but then it is also have a lot of talking about
>> requirement for the TLS connection underlying the HTTP. So to
>> illustrate the issue I see here is what happens if one like to use QUIC
>> as the underlying transport for the rest interface rather than TCP/TLS?
>> So can this document achieve a clearer interface to the lower layers so
>> that it will be simpler to move the protocol to another underlying
>> version of the HTTP "transport"?
> 
> Between the JRC (Registrar) and the MASA, we can support any HTTPS, including
> HTTP/2 with QUIC (with the 'normal' corporate firewall issue with UDP).
> 
> Between the Pledge and the Registrar, we support any HTTPS that works over a
> single TCP connection.  We can not support QUIC, since the Pledge is behind
> an intentionally limited proxy.  We had some discussion about this a year or
> so ago, please see:
>  https://mailarchive.ietf.org/arch/msg/anima/ml1OSEKhR4-ICS0Bd0zfuzn8uw4
> 
> You are certainly right: we have linkage between the TLS layer and the
> application layer, and we expect TLSClientCertificates and
> TLSServerCertificates to have meaning at the application layer.
> 
> None of the connections could go through TLS "forced proxies" of the kind
> that are apparently common in Enterprises.
> 
> I am open to suggestions on how to make the document clearer about how it
> interfaces to TLS.  We have a sections:
>    5.1.  BRSKI-EST TLS establishment details . . . . . . . . . . .  36
>    5.4.  BRSKI-MASA TLS establishment details  . . . . . . . . . .  38
> 
> 
> 
>> B. Section 5.6:
> 
>> The server MUST answer with a suitable 4xx or 5xx HTTP [RFC2616] error
>> code when a problem occurs.
> 
>> Referencing RFC 2616 that has been obsolete by RFC 7230 and
>> companions. I do note that there are no normative reference for that
>> part in this document.
> 
> Fixed to 7230.
> Yes, that wasn't even a real reference, just a literal [RFC2616].
> 
> --
> ]               Never tell me the odds!                 | ipv6 mesh networks [
> ]   Michael Richardson, Sandelman Software Works        | network architect  [
> ]     mcr@sandelman.ca  http://www.sandelman.ca/        |   ruby on rails    [
> 
> 
> --
> Michael Richardson <mcr+IETF@sandelman.ca>, Sandelman Software Works
> -= IPv6 IoT consulting =-
> 
> 
> 
> _______________________________________________
> Anima mailing list
> Anima@ietf.org
> https://www.ietf.org/mailman/listinfo/anima