Re: [CDNi] I-D Action: draft-ietf-cdni-logging-20.txt

Kevin Ma J <kevin.j.ma@ericsson.com> Fri, 16 October 2015 20:54 UTC

Return-Path: <kevin.j.ma@ericsson.com>
X-Original-To: cdni@ietfa.amsl.com
Delivered-To: cdni@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9F54D1AD277 for <cdni@ietfa.amsl.com>; Fri, 16 Oct 2015 13:54:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level:
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QKcFgk7HmUwd for <cdni@ietfa.amsl.com>; Fri, 16 Oct 2015 13:54:48 -0700 (PDT)
Received: from usevmg20.ericsson.net (usevmg20.ericsson.net [198.24.6.45]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4B12D1AD367 for <cdni@ietf.org>; Fri, 16 Oct 2015 13:54:40 -0700 (PDT)
X-AuditID: c618062d-f79ef6d000007f54-2d-562103b4ca57
Received: from EUSAAHC003.ericsson.se (Unknown_Domain [147.117.188.81]) by usevmg20.ericsson.net (Symantec Mail Security) with SMTP id 2C.E2.32596.4B301265; Fri, 16 Oct 2015 16:03:32 +0200 (CEST)
Received: from EUSAAMB103.ericsson.se ([147.117.188.120]) by EUSAAHC003.ericsson.se ([147.117.188.81]) with mapi id 14.03.0248.002; Fri, 16 Oct 2015 16:54:36 -0400
From: Kevin Ma J <kevin.j.ma@ericsson.com>
To: "Francois Le Faucheur (flefauch)" <flefauch@cisco.com>, "cdni@ietf.org" <cdni@ietf.org>
Thread-Topic: [CDNi] I-D Action: draft-ietf-cdni-logging-20.txt
Thread-Index: AQHRCCY3lWk/UJNjKUaDYEiJLzjrAJ5ukE4AgAAIBmA=
Date: Fri, 16 Oct 2015 20:54:35 +0000
Message-ID: <A419F67F880AB2468214E154CB8A556206B75707@eusaamb103.ericsson.se>
References: <20151016152010.14346.9523.idtracker@ietfa.amsl.com> <C6839406-B8D6-46E4-BC87-9FC71DA7DEF4@cisco.com>
In-Reply-To: <C6839406-B8D6-46E4-BC87-9FC71DA7DEF4@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [147.117.188.9]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFrrELMWRmVeSWpSXmKPExsUyuXRPoO4WZsUwg8/r9Cyezv7DavFvwWkm ByaPKb83snosWfKTKYApissmJTUnsyy1SN8ugStjV/s8loIHQRXdHRoNjBcCuhg5OSQETCRW /5jEDGGLSVy4t56ti5GLQ0jgKKPE7kN72SGc5YwSDxo7GUGq2AS0JB5//csEYosIxEr8X3YA LC4sYCcx+dk0doi4vcTErQsZIWwridaZG8DqWQRUJV7eW8IGYvMK+Eo8f9gHVi8kUCzx6cJG sCs4BWwllvw8AGYzAl30/dQasF5mAXGJW0/mM0FcKiCxZM95qKtFJV4+/scKYStK7OufDjST A6heU2L9Ln2IVkWJKd0P2SHWCkqcnPmEZQKj6CwkU2chdMxC0jELSccCRpZVjBylxalluelG BpsYgZFwTIJNdwfjnpeWhxgFOBiVeHgXvJQPE2JNLCuuzD3EKM3BoiTOu3/J/VAhgfTEktTs 1NSC1KL4otKc1OJDjEwcnFINjFuucvoUmQdc4z7VHPKk8FTr3w25ckbP+0w7FHjqLDzfVxTy Pz2h9F3y1b/C/FNlOvvMppVWLDoRYbxgiaGPSY+ahkjZr+LnXZYcEz9+3y7FJVi500GzZqmz cRv3Ut2J7G1HGndOTeS/PeX6emedCx9jo+MvzNPy170knZXn+YH72JSLQSvLlViKMxINtZiL ihMBrtiSd2UCAAA=
Archived-At: <http://mailarchive.ietf.org/arch/msg/cdni/M1pqlKD3lVdin61pZimV86jt8HA>
Subject: Re: [CDNi] I-D Action: draft-ietf-cdni-logging-20.txt
X-BeenThere: cdni@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "This list is to discuss issues associated with the Interconnection of Content Delivery Networks \(CDNs\)" <cdni.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/cdni>, <mailto:cdni-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/cdni/>
List-Post: <mailto:cdni@ietf.org>
List-Help: <mailto:cdni-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/cdni>, <mailto:cdni-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 16 Oct 2015 20:54:50 -0000

Hi Francois,

  Comments and nits on the updated text below.

thanx.

--  Kevin J. Ma

general:

  - Theres an inconsistency in use of "e.g. " vs "e.g., ".  Should do a find-and-replace to use the latter?

  - Theres an inconsistency in use of ",..." vs ", etc.".  Should do a find-and-replace to use one or the other?

  - Theres an inconsistency in use of "a uCDN" vs "an uCDN".  Should do a find-and-replace to use one or the other?

section 2.2.5.1:

  - "This is allowed
     , in the definition of the c-groupid under Section 3.4.1), with very" ->
    "This is allowed in the definition of the c-groupid (under Section 3.4.1), with very"

  - "in the request in request fields" -> "in request fields"

  - "care SHOULD then be" -> "care SHOULD be"

  - "it allows a reliable identification of the client while IP address does not allow accurate identification of clients in many situations (e.g. behind NAT," ->
    "it allows a reliable identification of the client while IP address does not in many situations (e.g. when behind NAT,"

section 3.4.1:

  - "out of band" -> "out-of-band"

  - extra "*"?

  - "the element identifying the client is algorithmically generated" -> "the element identifying the client SHOULD be algorithmically generated"

  - "one example way to achieve this is to hash the address with a shared secret that is pre-synchronised and rotated at a predefined time interval"
    "The encryption algorithm must also be defined,"

    I found this to be a bit confusing.  I think of a hash as being a one-way function, but encryption as being reversible.  I believe we agreed that either a hash or encryption would work, but that encryption provided the ability to get back the IP address if necessary.  We might want to make that more clear.  Do we only want to suggest encryption?

    I found the subsequent text that lists hashing and encryption algorithms compounded my confusion since the hashing algorithms are only intended to be used for generating key material, as opposed to being used to generate the id.

    "they agree on the salt and input key material, as described in [RFC5869], Section 2.2, the hash mechanism to use (SHA-2 or SHA-3 SHOULD be used),"
    "The encryption algorithm must also be defined, and SHOULD be 128-bit AES-GCM or better."

    I think it would be helpful to separate key generation from generating the id.  The following feels a little clearer and more concise to me:

      "the element identifying the client is algorithmically
       generated (from the client IPv4 or IPv6 address in the
       request received by the Surrogate and/or other network-level
       identifying information) in a way that SHOULD NOT be
       linkable back to the global addressing context and that
       SHOULD vary over time (to offer protection against long term
       attacks); one way to achieve this is to either hash or encrypt the
       address with a shared secret that is pre-synchronised and
       rotated at a predefined time interval.  It is RECOMMENDED
       that the mapping varies at least once every 24 hours.  If
       the client IPv4 or IPv6 address or other network-level
       identifying information needs to be recoverable, encryption
       should be used rather than a one-way hashing algorithm.
       The mapping from IP address to the element identifying the
       client SHOULD be done using a symmetric key that is known only
       to both the uCDN and dCDN.  (One method of selecting a key is
       to use an analog of HKDF [RFC5869], as will be used in TLS 1.3
       [I-D.ietf-tls-rfc5246-bis]). 
       When the two CDNs set up a relationship, they agree
       out-of-band on a mapping between IPv4 and IPv6 addresses and
       aggregates and on the algorithmic mapping from IPv4/IPv6
       addresses and the element identifying the client.
       They agree on the salt and input key material, any
       algorithms used in key generation (e.g., SHA-256), and the key
       lifetime which SHOULD NOT exceed 25 hours (shorter lifetimes
       MAY be used).  At the expiration of the agreed-upon lifetime,
       a new key is used."

section 7.3:
  - "it generates it" -> "it generated the information"

  - "protected by usual IETF privacy-protection mechanism (TLS)" ->
    "protected by usual IETF privacy-protection mechanisms (e.g., TLS)"

  - "that very large volumes" -> "that large volumes"

  - ", which then represent a high-value target," ->
    ".  These files represent high-value targets"

  - "and thus is at risk" -> "and at risk"

  - "very large volumes of" -> "large volumes of"

  - "these concerned are" -> "these concerns are"

  - "section Section 3.4.1." -> "Section 3.4.1."

  - "any other party than" -> "any party other than"


> -----Original Message-----
> From: CDNi [mailto:cdni-bounces@ietf.org] On Behalf Of Francois Le
> Faucheur (flefauch)
> Sent: Friday, October 16, 2015 12:22 PM
> To: cdni@ietf.org
> Subject: Re: [CDNi] I-D Action: draft-ietf-cdni-logging-20.txt
> 
> Folks,
> 
> (as a co-author)
> 
> This new version addresses :
> 	* ABNF corrections
> 	* logging privacy :
> 		o privacy concerns and non-concerns in section 7.3
> 		o privacy protection mechanism in the form of the  “c-groupid”
> field in section 3.4.1 (replacing the c-ip, c-ip-anonymizing, c-port, c-
> port-anonymizing).
> 
> Thanks much to the Logging Privacy Design team, in particular to Brian
> Trammel and Rich Salz.
> 
> Please review the diffs from -19 and let us know if you have any concerns.
> 
> Obviously, the material related to privacy will also be presented in
> Yokohama.
> 
> Cheers
> 
> Francois
> 
> > On 16 Oct 2015, at 17:20, internet-drafts@ietf.org wrote:
> >
> >
> > A New Internet-Draft is available from the on-line Internet-Drafts
> directories.
> > This draft is a work item of the Content Delivery Networks
> Interconnection Working Group of the IETF.
> >
> >        Title           : CDNI Logging Interface
> >        Authors         : Francois Le Faucheur
> >                          Gilles Bertrand
> >                          Iuniana Oprescu
> >                          Roy Peterkofsky
> > 	Filename        : draft-ietf-cdni-logging-20.txt
> > 	Pages           : 57
> > 	Date            : 2015-10-16
> >
> > Abstract:
> >   This memo specifies the Logging interface between a downstream CDN
> >   (dCDN) and an upstream CDN (uCDN) that are interconnected as per the
> >   CDN Interconnection (CDNI) framework.  First, it describes a
> >   reference model for CDNI logging.  Then, it specifies the CDNI
> >   Logging File format and the actual protocol for exchange of CDNI
> >   Logging Files.
> >
> >
> > The IETF datatracker status page for this draft is:
> > https://datatracker.ietf.org/doc/draft-ietf-cdni-logging/
> >
> > There's also a htmlized version available at:
> > https://tools.ietf.org/html/draft-ietf-cdni-logging-20
> >
> > A diff from the previous version is available at:
> > https://www.ietf.org/rfcdiff?url2=draft-ietf-cdni-logging-20
> >
> >
> > Please note that it may take a couple of minutes from the time of
> submission
> > until the htmlized version and diff are available at tools.ietf.org.
> >
> > Internet-Drafts are also available by anonymous FTP at:
> > ftp://ftp.ietf.org/internet-drafts/
> >
> > _______________________________________________
> > CDNi mailing list
> > CDNi@ietf.org
> > https://www.ietf.org/mailman/listinfo/cdni
> 
> _______________________________________________
> CDNi mailing list
> CDNi@ietf.org
> https://www.ietf.org/mailman/listinfo/cdni