Re: [babel] I-D Action: draft-ietf-babel-information-model-02.txt

David Schinazi <dschinazi@apple.com> Wed, 11 April 2018 16:19 UTC

Return-Path: <dschinazi@apple.com>
X-Original-To: babel@ietfa.amsl.com
Delivered-To: babel@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0C28D1275F4 for <babel@ietfa.amsl.com>; Wed, 11 Apr 2018 09:19:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.312
X-Spam-Level:
X-Spam-Status: No, score=-4.312 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=apple.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vvvgk9WQIpem for <babel@ietfa.amsl.com>; Wed, 11 Apr 2018 09:19:14 -0700 (PDT)
Received: from mail-in7.apple.com (mail-out7.apple.com [17.151.62.29]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A1BE8127241 for <babel@ietf.org>; Wed, 11 Apr 2018 09:19:14 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; d=apple.com; s=mailout2048s; c=relaxed/simple; q=dns/txt; i=@apple.com; t=1523463554; x=2387377154; h=From:Sender:Reply-To:Subject:Date:Message-id:To:Cc:MIME-version:Content-type: Content-transfer-encoding:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-reply-to:References:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=vmipHUYCUXDnj06xz/O4s99D3fOEOi9d15Y8A6OwRKM=; b=dAlmeSBcMBWUG+cyTPm+WIbVeEgpr8fJrUWYSFVQsV4+8aRA1aNgyihm3/IqsCxc CRZeUxz50aKGj/JFyVE7J4H2895qa/xfoGWnOb5PJqLuoGUtEr7BAxN+IifyFyqW fu2nTGQRrat2XVGlQEiAV1igHuyggIMwMqEsNfHuDxEfJ+n683jJUvg84s+laktL 7YNsGelJsyBNgEJPVEBgrOdKTHk8QDXrkzPxvEpnvrqW7axd7itERAgDDZax6Hem eP/BUuDqKFKe0oiYI0GJ7uyMcPlVP0LZRAAHfYL5spJuxnnfFeLIl0rWKXAMiax7 DG9uRUZcqQT/8MpAxA+xTQ==;
Received: from relay7.apple.com (relay7.apple.com [17.128.113.101]) (using TLS with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mail-in7.apple.com (Apple Secure Mail Relay) with SMTP id 8F.15.04908.2853ECA5; Wed, 11 Apr 2018 09:19:14 -0700 (PDT)
X-AuditID: 11973e16-446529e00000132c-14-5ace35829444
Received: from nwk-mmpp-sz13.apple.com (nwk-mmpp-sz13.apple.com [17.128.115.216]) (using TLS with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client did not present a certificate) by relay7.apple.com (Apple SCV relay) with SMTP id 41.EA.21982.2853ECA5; Wed, 11 Apr 2018 09:19:14 -0700 (PDT)
MIME-version: 1.0
Content-type: text/plain; charset="utf-8"
Received: from [17.234.117.4] by nwk-mmpp-sz13.apple.com (Oracle Communications Messaging Server 8.0.2.2.20180403 64bit (built Apr 3 2018)) with ESMTPSA id <0P71001DM3ZVHM50@nwk-mmpp-sz13.apple.com>; Wed, 11 Apr 2018 09:19:14 -0700 (PDT)
Sender: dschinazi@apple.com
From: David Schinazi <dschinazi@apple.com>
In-reply-to: <2524EF75-E323-4B72-A516-E671BF3A08AB@iki.fi>
Date: Wed, 11 Apr 2018 09:19:05 -0700
Cc: Toke Høiland-Jørgensen <toke@toke.dk>, BARBARA H STARK <bs7652@att.com>, "babel@ietf.org" <babel@ietf.org>
Content-transfer-encoding: quoted-printable
Message-id: <3B3269F9-6B16-4781-88DE-F643A6765FC6@apple.com>
References: <152296922074.3735.16897081899496814064@ietfa.amsl.com> <2D09D61DDFA73D4C884805CC7865E6114DD686A8@GAALPA1MSGUSRBF.ITServices.sbc.com> <87y3hyam6h.fsf@toke.dk> <E56431DB-1B79-4B10-B5E2-C0D1A7C0DC2A@apple.com> <2524EF75-E323-4B72-A516-E671BF3A08AB@iki.fi>
To: Markus Stenberg <markus.stenberg@iki.fi>
X-Mailer: Apple Mail (2.3445.5.20)
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFjrDLMWRmVeSWpSXmKPExsUi2FCYqttkei7K4FyvtMWWRd0sFpP+/mS0 2Dt3BYvF1vcr2B1YPF72z2H0WLLkJ5PH4a8LWTy2HLrIFsASxWWTkpqTWZZapG+XwJXx8PhV loLV3BXL28oaGHs4uxg5OSQETCT+LV3B0sXIxSEksIZJ4l/XVHaYxMbbL9khEhuYJA617mMB SfAKCEr8mHwPyObgYBZQl5gyJRei5gujxPqzf8GahQWkJbou3GWFsL0knr2ZxApSzyagJXFg jRFImFPASmLpnt+MIDaLgKrEjR0LmUBsZoE2RokJu3ggbG2JJ+8ugLXyCthInL3JB7Gqn0mi f+FcsF4RAR2JC58OskLcrCQx/fttNgh7AZtE+xSpCYzCs5BcPQvh6llINixgZF7FKJSbmJmj m5lnrpdYUJCTqpecn7uJERT80+3EdjA+XGV1iFGAg1GJh/fCrTNRQqyJZcWVuYcYpTlYlMR5 jzGfiBISSE8sSc1OTS1ILYovKs1JLT7EyMTBKdXAaPc75dojlS0H3qsdTSk9tLX0qKQY49t7 m7b79Lle3mD2dqd0TofFrJxzPKdFIti67dtKjO4evW/pcu7pUpFrkzV+sTVI+bvJhPcrprzm 3rnS+Ma6yiMbY5oOT//Q1Vqw+uerMrlwFYvoKzwLfl2bOGXhhbItTavX7zBNyRXnezSdV/Pm ZA8xRyWW4oxEQy3mouJEAKJM1bFfAgAA
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFjrALMWRmVeSWpSXmKPExsUi2FB8Q7fJ9FyUwZ7rEhZbFnWzWEz6+5PR Yu/cFSwWW9+vYHdg8XjZP4fRY8mSn0weh78uZPHYcugiWwBLFJdNSmpOZllqkb5dAlfGw+NX WQpWc1csbytrYOzh7GLk5JAQMJHYePslexcjF4eQwAYmiUOt+1hAErwCghI/Jt8Dsjk4mAXU JaZMyYWo+cIosf7sX3aQGmEBaYmuC3dZIWwviWdvJrGC1LMJaEkcWGMEEuYUsJJYuuc3I4jN IqAqcWPHQiYQm1mgjVFiwi4eCFtb4sm7C2CtvAI2Emdv8kGs6meS6F84F6xXREBH4sKng6wQ NytJTP9+m20Co8AsJJfOQrh0FpKpCxiZVzEKFKXmJFaa6yUWFOSk6iXn525iBIdrYeoOxsbl VocYBTgYlXh4L9w6EyXEmlhWXJl7iFGCg1lJhPfo77NRQrwpiZVVqUX58UWlOanFhxilOViU xHlnrj4aJSSQnliSmp2aWpBaBJNl4uCUamCc3v/T+N1cz8nz0q/Ilb361XHmWrfm0T1H98o7 H9qj9jWzeHmqiWKJopFKYocD88G3JT/t2w0ZQ5Z76B/Osp28IOdo0+Qlbu37IuIzsjUqFkr9 eLM6dI3Le/4TZodF9AI/Bl+YdKtQNDenrWrqlsXnFvtdrXixi9FRWU56PYvjozZnvrtONZOU WIozEg21mIuKEwHn8/s/UwIAAA==
Archived-At: <https://mailarchive.ietf.org/arch/msg/babel/aNMC2vT7gGPCCaHBU6L2W_ec1h0>
Subject: Re: [babel] I-D Action: draft-ietf-babel-information-model-02.txt
X-BeenThere: babel@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "A list for discussion of the Babel Routing Protocol." <babel.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/babel>, <mailto:babel-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/babel/>
List-Post: <mailto:babel@ietf.org>
List-Help: <mailto:babel-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/babel>, <mailto:babel-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 11 Apr 2018 16:19:16 -0000

> On Apr 10, 2018, at 21:05, Markus Stenberg <markus.stenberg@iki.fi> wrote:
> 
> On 11 Apr 2018, at 2.04, David Schinazi <dschinazi@apple.com> wrote:
>> 2) Regarding security, should it be possible to pull the private key from a router? Is that common practice?
> 
> No. I think what is written in the spec now is good.
> 
> In general only public keys should ever go anywhere from a device. Any scheme that involves private key distribution is quite a bit less secure.
> 
> That’s why e.g. certificate (= glorified public key) enrollment practises involve device making requests with the public key, and getting signed one back in return. Similarly, why HSMs and such are all the rage (keep your private key on a box you don’t have even access to the actual private key, just encryption and decryption functions and public key).
> 
> As a matter of fact, if one were to use HSM with routing protocol (not impossible although I guess it is mostly done nowadays with https/ipsec/ssh keys), providing private key would not be possible as only public key (and-or certificate) would even be available.

To clarify, I entirely agree with you - I think we should NOT allow extracting the private key. But my incorrect understanding of the doc was that it allowed grabbing them. I just reread it and agree that I does not allow it, only addition and deletion.

David