Re: [CDNi] I-D Action: draft-ietf-cdni-logging-20.txt
Kevin Ma J <kevin.j.ma@ericsson.com> Fri, 16 October 2015 20:54 UTC
Return-Path: <kevin.j.ma@ericsson.com>
X-Original-To: cdni@ietfa.amsl.com
Delivered-To: cdni@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9F54D1AD277 for <cdni@ietfa.amsl.com>; Fri, 16 Oct 2015 13:54:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level:
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QKcFgk7HmUwd for <cdni@ietfa.amsl.com>; Fri, 16 Oct 2015 13:54:48 -0700 (PDT)
Received: from usevmg20.ericsson.net (usevmg20.ericsson.net [198.24.6.45]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4B12D1AD367 for <cdni@ietf.org>; Fri, 16 Oct 2015 13:54:40 -0700 (PDT)
X-AuditID: c618062d-f79ef6d000007f54-2d-562103b4ca57
Received: from EUSAAHC003.ericsson.se (Unknown_Domain [147.117.188.81]) by usevmg20.ericsson.net (Symantec Mail Security) with SMTP id 2C.E2.32596.4B301265; Fri, 16 Oct 2015 16:03:32 +0200 (CEST)
Received: from EUSAAMB103.ericsson.se ([147.117.188.120]) by EUSAAHC003.ericsson.se ([147.117.188.81]) with mapi id 14.03.0248.002; Fri, 16 Oct 2015 16:54:36 -0400
From: Kevin Ma J <kevin.j.ma@ericsson.com>
To: "Francois Le Faucheur (flefauch)" <flefauch@cisco.com>, "cdni@ietf.org" <cdni@ietf.org>
Thread-Topic: [CDNi] I-D Action: draft-ietf-cdni-logging-20.txt
Thread-Index: AQHRCCY3lWk/UJNjKUaDYEiJLzjrAJ5ukE4AgAAIBmA=
Date: Fri, 16 Oct 2015 20:54:35 +0000
Message-ID: <A419F67F880AB2468214E154CB8A556206B75707@eusaamb103.ericsson.se>
References: <20151016152010.14346.9523.idtracker@ietfa.amsl.com> <C6839406-B8D6-46E4-BC87-9FC71DA7DEF4@cisco.com>
In-Reply-To: <C6839406-B8D6-46E4-BC87-9FC71DA7DEF4@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [147.117.188.9]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFrrELMWRmVeSWpSXmKPExsUyuXRPoO4WZsUwg8/r9Cyezv7DavFvwWkm ByaPKb83snosWfKTKYApissmJTUnsyy1SN8ugStjV/s8loIHQRXdHRoNjBcCuhg5OSQETCRW /5jEDGGLSVy4t56ti5GLQ0jgKKPE7kN72SGc5YwSDxo7GUGq2AS0JB5//csEYosIxEr8X3YA LC4sYCcx+dk0doi4vcTErQsZIWwridaZG8DqWQRUJV7eW8IGYvMK+Eo8f9gHVi8kUCzx6cJG sCs4BWwllvw8AGYzAl30/dQasF5mAXGJW0/mM0FcKiCxZM95qKtFJV4+/scKYStK7OufDjST A6heU2L9Ln2IVkWJKd0P2SHWCkqcnPmEZQKj6CwkU2chdMxC0jELSccCRpZVjBylxalluelG BpsYgZFwTIJNdwfjnpeWhxgFOBiVeHgXvJQPE2JNLCuuzD3EKM3BoiTOu3/J/VAhgfTEktTs 1NSC1KL4otKc1OJDjEwcnFINjFuucvoUmQdc4z7VHPKk8FTr3w25ckbP+0w7FHjqLDzfVxTy Pz2h9F3y1b/C/FNlOvvMppVWLDoRYbxgiaGPSY+ahkjZr+LnXZYcEz9+3y7FJVi500GzZqmz cRv3Ut2J7G1HGndOTeS/PeX6emedCx9jo+MvzNPy170knZXn+YH72JSLQSvLlViKMxINtZiL ihMBrtiSd2UCAAA=
Archived-At: <http://mailarchive.ietf.org/arch/msg/cdni/M1pqlKD3lVdin61pZimV86jt8HA>
Subject: Re: [CDNi] I-D Action: draft-ietf-cdni-logging-20.txt
X-BeenThere: cdni@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "This list is to discuss issues associated with the Interconnection of Content Delivery Networks \(CDNs\)" <cdni.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/cdni>, <mailto:cdni-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/cdni/>
List-Post: <mailto:cdni@ietf.org>
List-Help: <mailto:cdni-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/cdni>, <mailto:cdni-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 16 Oct 2015 20:54:50 -0000
Hi Francois, Comments and nits on the updated text below. thanx. -- Kevin J. Ma general: - Theres an inconsistency in use of "e.g. " vs "e.g., ". Should do a find-and-replace to use the latter? - Theres an inconsistency in use of ",..." vs ", etc.". Should do a find-and-replace to use one or the other? - Theres an inconsistency in use of "a uCDN" vs "an uCDN". Should do a find-and-replace to use one or the other? section 2.2.5.1: - "This is allowed , in the definition of the c-groupid under Section 3.4.1), with very" -> "This is allowed in the definition of the c-groupid (under Section 3.4.1), with very" - "in the request in request fields" -> "in request fields" - "care SHOULD then be" -> "care SHOULD be" - "it allows a reliable identification of the client while IP address does not allow accurate identification of clients in many situations (e.g. behind NAT," -> "it allows a reliable identification of the client while IP address does not in many situations (e.g. when behind NAT," section 3.4.1: - "out of band" -> "out-of-band" - extra "*"? - "the element identifying the client is algorithmically generated" -> "the element identifying the client SHOULD be algorithmically generated" - "one example way to achieve this is to hash the address with a shared secret that is pre-synchronised and rotated at a predefined time interval" "The encryption algorithm must also be defined," I found this to be a bit confusing. I think of a hash as being a one-way function, but encryption as being reversible. I believe we agreed that either a hash or encryption would work, but that encryption provided the ability to get back the IP address if necessary. We might want to make that more clear. Do we only want to suggest encryption? I found the subsequent text that lists hashing and encryption algorithms compounded my confusion since the hashing algorithms are only intended to be used for generating key material, as opposed to being used to generate the id. "they agree on the salt and input key material, as described in [RFC5869], Section 2.2, the hash mechanism to use (SHA-2 or SHA-3 SHOULD be used)," "The encryption algorithm must also be defined, and SHOULD be 128-bit AES-GCM or better." I think it would be helpful to separate key generation from generating the id. The following feels a little clearer and more concise to me: "the element identifying the client is algorithmically generated (from the client IPv4 or IPv6 address in the request received by the Surrogate and/or other network-level identifying information) in a way that SHOULD NOT be linkable back to the global addressing context and that SHOULD vary over time (to offer protection against long term attacks); one way to achieve this is to either hash or encrypt the address with a shared secret that is pre-synchronised and rotated at a predefined time interval. It is RECOMMENDED that the mapping varies at least once every 24 hours. If the client IPv4 or IPv6 address or other network-level identifying information needs to be recoverable, encryption should be used rather than a one-way hashing algorithm. The mapping from IP address to the element identifying the client SHOULD be done using a symmetric key that is known only to both the uCDN and dCDN. (One method of selecting a key is to use an analog of HKDF [RFC5869], as will be used in TLS 1.3 [I-D.ietf-tls-rfc5246-bis]). When the two CDNs set up a relationship, they agree out-of-band on a mapping between IPv4 and IPv6 addresses and aggregates and on the algorithmic mapping from IPv4/IPv6 addresses and the element identifying the client. They agree on the salt and input key material, any algorithms used in key generation (e.g., SHA-256), and the key lifetime which SHOULD NOT exceed 25 hours (shorter lifetimes MAY be used). At the expiration of the agreed-upon lifetime, a new key is used." section 7.3: - "it generates it" -> "it generated the information" - "protected by usual IETF privacy-protection mechanism (TLS)" -> "protected by usual IETF privacy-protection mechanisms (e.g., TLS)" - "that very large volumes" -> "that large volumes" - ", which then represent a high-value target," -> ". These files represent high-value targets" - "and thus is at risk" -> "and at risk" - "very large volumes of" -> "large volumes of" - "these concerned are" -> "these concerns are" - "section Section 3.4.1." -> "Section 3.4.1." - "any other party than" -> "any party other than" > -----Original Message----- > From: CDNi [mailto:cdni-bounces@ietf.org] On Behalf Of Francois Le > Faucheur (flefauch) > Sent: Friday, October 16, 2015 12:22 PM > To: cdni@ietf.org > Subject: Re: [CDNi] I-D Action: draft-ietf-cdni-logging-20.txt > > Folks, > > (as a co-author) > > This new version addresses : > * ABNF corrections > * logging privacy : > o privacy concerns and non-concerns in section 7.3 > o privacy protection mechanism in the form of the “c-groupid” > field in section 3.4.1 (replacing the c-ip, c-ip-anonymizing, c-port, c- > port-anonymizing). > > Thanks much to the Logging Privacy Design team, in particular to Brian > Trammel and Rich Salz. > > Please review the diffs from -19 and let us know if you have any concerns. > > Obviously, the material related to privacy will also be presented in > Yokohama. > > Cheers > > Francois > > > On 16 Oct 2015, at 17:20, internet-drafts@ietf.org wrote: > > > > > > A New Internet-Draft is available from the on-line Internet-Drafts > directories. > > This draft is a work item of the Content Delivery Networks > Interconnection Working Group of the IETF. > > > > Title : CDNI Logging Interface > > Authors : Francois Le Faucheur > > Gilles Bertrand > > Iuniana Oprescu > > Roy Peterkofsky > > Filename : draft-ietf-cdni-logging-20.txt > > Pages : 57 > > Date : 2015-10-16 > > > > Abstract: > > This memo specifies the Logging interface between a downstream CDN > > (dCDN) and an upstream CDN (uCDN) that are interconnected as per the > > CDN Interconnection (CDNI) framework. First, it describes a > > reference model for CDNI logging. Then, it specifies the CDNI > > Logging File format and the actual protocol for exchange of CDNI > > Logging Files. > > > > > > The IETF datatracker status page for this draft is: > > https://datatracker.ietf.org/doc/draft-ietf-cdni-logging/ > > > > There's also a htmlized version available at: > > https://tools.ietf.org/html/draft-ietf-cdni-logging-20 > > > > A diff from the previous version is available at: > > https://www.ietf.org/rfcdiff?url2=draft-ietf-cdni-logging-20 > > > > > > Please note that it may take a couple of minutes from the time of > submission > > until the htmlized version and diff are available at tools.ietf.org. > > > > Internet-Drafts are also available by anonymous FTP at: > > ftp://ftp.ietf.org/internet-drafts/ > > > > _______________________________________________ > > CDNi mailing list > > CDNi@ietf.org > > https://www.ietf.org/mailman/listinfo/cdni > > _______________________________________________ > CDNi mailing list > CDNi@ietf.org > https://www.ietf.org/mailman/listinfo/cdni
- [CDNi] I-D Action: draft-ietf-cdni-logging-20.txt internet-drafts
- Re: [CDNi] I-D Action: draft-ietf-cdni-logging-20… Francois Le Faucheur (flefauch)
- Re: [CDNi] I-D Action: draft-ietf-cdni-logging-20… Kevin Ma J
- Re: [CDNi] I-D Action: draft-ietf-cdni-logging-20… Francois Le Faucheur (flefauch)
- Re: [CDNi] I-D Action: draft-ietf-cdni-logging-20… Francois Le Faucheur (flefauch)
- Re: [CDNi] I-D Action: draft-ietf-cdni-logging-20… Kevin Ma J