Re: [CDNi] I-D Action: draft-ietf-cdni-logging-20.txt

"Francois Le Faucheur (flefauch)" <flefauch@cisco.com> Tue, 03 November 2015 07:34 UTC

Return-Path: <flefauch@cisco.com>
X-Original-To: cdni@ietfa.amsl.com
Delivered-To: cdni@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3FCE81A0181 for <cdni@ietfa.amsl.com>; Mon, 2 Nov 2015 23:34:32 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.511
X-Spam-Level:
X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gtr16TCIIo_N for <cdni@ietfa.amsl.com>; Mon, 2 Nov 2015 23:34:30 -0800 (PST)
Received: from alln-iport-8.cisco.com (alln-iport-8.cisco.com [173.37.142.95]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DA6951A0151 for <cdni@ietf.org>; Mon, 2 Nov 2015 23:34:29 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=11262; q=dns/txt; s=iport; t=1446536069; x=1447745669; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=/bsS1J1RZkq8VWEvP2sqpPuGdOjQV8LE9Ax5HgaOQlI=; b=C4ZGwapEKRDm3OdDQboDdf/T8iY6qyPvYAV1XtdHumakok1iaar+HRdw FAVIgaDaa8PVA+6Jsfkgrja0XCBS4O7Oy+9+HAtWR/8t+LEKq24n98Aro /HNa+aepHC9gChesCgkqp15RdhCz2JcBP4x4LFFbrxTpoD1T6xRnvV1Dc I=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AFAgATYjhW/5hdJa1egztTbwa/OwENgVoXCoV4AhyBFDgUAQEBAQEBAYEKhDUBAQEDAQEBASAEDToEBwUHBAIBCBEEAQEBAgIjAwICAiULFAEICAIEDgWIKAgNsCyRCAEBAQEBAQEBAQEBAQEBAQEBAQEBARiBIoVWgg+CboRcGIMHMYEUAQSWRwGFHIgIgVpIg3eHNI5vAR8BAUKCEB6BVnIBhHaBBwEBAQ
X-IronPort-AV: E=Sophos;i="5.20,238,1444694400"; d="scan'208";a="204461510"
Received: from rcdn-core-1.cisco.com ([173.37.93.152]) by alln-iport-8.cisco.com with ESMTP; 03 Nov 2015 07:34:28 +0000
Received: from XCH-RCD-018.cisco.com (xch-rcd-018.cisco.com [173.37.102.28]) by rcdn-core-1.cisco.com (8.14.5/8.14.5) with ESMTP id tA37YS2r007225 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Tue, 3 Nov 2015 07:34:28 GMT
Received: from xch-rcd-020.cisco.com (173.37.102.30) by XCH-RCD-018.cisco.com (173.37.102.28) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Tue, 3 Nov 2015 01:34:28 -0600
Received: from xch-rcd-020.cisco.com ([173.37.102.30]) by XCH-RCD-020.cisco.com ([173.37.102.30]) with mapi id 15.00.1104.000; Tue, 3 Nov 2015 01:34:28 -0600
From: "Francois Le Faucheur (flefauch)" <flefauch@cisco.com>
To: Ma Kevin <kevin.j.ma@ericsson.com>
Thread-Topic: [CDNi] I-D Action: draft-ietf-cdni-logging-20.txt
Thread-Index: AQHRCCYtZN2FUjWu80SRxpX0BBm7lQ==
Date: Tue, 03 Nov 2015 07:34:28 +0000
Message-ID: <D43BFAFB-0E82-449B-A5BB-744552C5E127@cisco.com>
References: <20151016152010.14346.9523.idtracker@ietfa.amsl.com> <C6839406-B8D6-46E4-BC87-9FC71DA7DEF4@cisco.com> <A419F67F880AB2468214E154CB8A556206B75707@eusaamb103.ericsson.se>
In-Reply-To: <A419F67F880AB2468214E154CB8A556206B75707@eusaamb103.ericsson.se>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.70.230.162]
Content-Type: text/plain; charset="utf-8"
Content-ID: <32823134E7DC76458F14CB181AC75E1D@emea.cisco.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/cdni/bufzI8vezGPepENJwb6_Rmu4Zs8>
Cc: "cdni@ietf.org" <cdni@ietf.org>
Subject: Re: [CDNi] I-D Action: draft-ietf-cdni-logging-20.txt
X-BeenThere: cdni@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "This list is to discuss issues associated with the Interconnection of Content Delivery Networks \(CDNs\)" <cdni.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/cdni>, <mailto:cdni-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/cdni/>
List-Post: <mailto:cdni@ietf.org>
List-Help: <mailto:cdni-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/cdni>, <mailto:cdni-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 03 Nov 2015 07:34:32 -0000

Hi Kevin,

Thanks for these comments. 

I have included all the editorial corrections in the working copy.

I will discuss separately the non-editorial comment regarding choice of mapping algorithm.

Thanks

Francois


> On 17 Oct 2015, at 05:54, Kevin Ma J <kevin.j.ma@ericsson.com> wrote:
> 
> Hi Francois,
> 
>  Comments and nits on the updated text below.
> 
> thanx.
> 
> --  Kevin J. Ma
> 
> general:
> 
>  - Theres an inconsistency in use of "e.g. " vs "e.g., ".  Should do a find-and-replace to use the latter?
> 
>  - Theres an inconsistency in use of ",..." vs ", etc.".  Should do a find-and-replace to use one or the other?
> 
>  - Theres an inconsistency in use of "a uCDN" vs "an uCDN".  Should do a find-and-replace to use one or the other?
> 
> section 2.2.5.1:
> 
>  - "This is allowed
>     , in the definition of the c-groupid under Section 3.4.1), with very" ->
>    "This is allowed in the definition of the c-groupid (under Section 3.4.1), with very"
> 
>  - "in the request in request fields" -> "in request fields"
> 
>  - "care SHOULD then be" -> "care SHOULD be"
> 
>  - "it allows a reliable identification of the client while IP address does not allow accurate identification of clients in many situations (e.g. behind NAT," ->
>    "it allows a reliable identification of the client while IP address does not in many situations (e.g. when behind NAT,"
> 
> section 3.4.1:
> 
>  - "out of band" -> "out-of-band"
> 
>  - extra "*"?
> 
>  - "the element identifying the client is algorithmically generated" -> "the element identifying the client SHOULD be algorithmically generated"
> 
>  - "one example way to achieve this is to hash the address with a shared secret that is pre-synchronised and rotated at a predefined time interval"
>    "The encryption algorithm must also be defined,"
> 
>    I found this to be a bit confusing.  I think of a hash as being a one-way function, but encryption as being reversible.  I believe we agreed that either a hash or encryption would work, but that encryption provided the ability to get back the IP address if necessary.  We might want to make that more clear.  Do we only want to suggest encryption?
> 
>    I found the subsequent text that lists hashing and encryption algorithms compounded my confusion since the hashing algorithms are only intended to be used for generating key material, as opposed to being used to generate the id.
> 
>    "they agree on the salt and input key material, as described in [RFC5869], Section 2.2, the hash mechanism to use (SHA-2 or SHA-3 SHOULD be used),"
>    "The encryption algorithm must also be defined, and SHOULD be 128-bit AES-GCM or better."
> 
>    I think it would be helpful to separate key generation from generating the id.  The following feels a little clearer and more concise to me:
> 
>      "the element identifying the client is algorithmically
>       generated (from the client IPv4 or IPv6 address in the
>       request received by the Surrogate and/or other network-level
>       identifying information) in a way that SHOULD NOT be
>       linkable back to the global addressing context and that
>       SHOULD vary over time (to offer protection against long term
>       attacks); one way to achieve this is to either hash or encrypt the
>       address with a shared secret that is pre-synchronised and
>       rotated at a predefined time interval.  It is RECOMMENDED
>       that the mapping varies at least once every 24 hours.  If
>       the client IPv4 or IPv6 address or other network-level
>       identifying information needs to be recoverable, encryption
>       should be used rather than a one-way hashing algorithm.
>       The mapping from IP address to the element identifying the
>       client SHOULD be done using a symmetric key that is known only
>       to both the uCDN and dCDN.  (One method of selecting a key is
>       to use an analog of HKDF [RFC5869], as will be used in TLS 1.3
>       [I-D.ietf-tls-rfc5246-bis]). 
>       When the two CDNs set up a relationship, they agree
>       out-of-band on a mapping between IPv4 and IPv6 addresses and
>       aggregates and on the algorithmic mapping from IPv4/IPv6
>       addresses and the element identifying the client.
>       They agree on the salt and input key material, any
>       algorithms used in key generation (e.g., SHA-256), and the key
>       lifetime which SHOULD NOT exceed 25 hours (shorter lifetimes
>       MAY be used).  At the expiration of the agreed-upon lifetime,
>       a new key is used."
> 
> section 7.3:
>  - "it generates it" -> "it generated the information"
> 
>  - "protected by usual IETF privacy-protection mechanism (TLS)" ->
>    "protected by usual IETF privacy-protection mechanisms (e.g., TLS)"
> 
>  - "that very large volumes" -> "that large volumes"
> 
>  - ", which then represent a high-value target," ->
>    ".  These files represent high-value targets"
> 
>  - "and thus is at risk" -> "and at risk"
> 
>  - "very large volumes of" -> "large volumes of"
> 
>  - "these concerned are" -> "these concerns are"
> 
>  - "section Section 3.4.1." -> "Section 3.4.1."
> 
>  - "any other party than" -> "any party other than"
> 
> 
>> -----Original Message-----
>> From: CDNi [mailto:cdni-bounces@ietf.org] On Behalf Of Francois Le
>> Faucheur (flefauch)
>> Sent: Friday, October 16, 2015 12:22 PM
>> To: cdni@ietf.org
>> Subject: Re: [CDNi] I-D Action: draft-ietf-cdni-logging-20.txt
>> 
>> Folks,
>> 
>> (as a co-author)
>> 
>> This new version addresses :
>> 	* ABNF corrections
>> 	* logging privacy :
>> 		o privacy concerns and non-concerns in section 7.3
>> 		o privacy protection mechanism in the form of the  “c-groupid”
>> field in section 3.4.1 (replacing the c-ip, c-ip-anonymizing, c-port, c-
>> port-anonymizing).
>> 
>> Thanks much to the Logging Privacy Design team, in particular to Brian
>> Trammel and Rich Salz.
>> 
>> Please review the diffs from -19 and let us know if you have any concerns.
>> 
>> Obviously, the material related to privacy will also be presented in
>> Yokohama.
>> 
>> Cheers
>> 
>> Francois
>> 
>>> On 16 Oct 2015, at 17:20, internet-drafts@ietf.org wrote:
>>> 
>>> 
>>> A New Internet-Draft is available from the on-line Internet-Drafts
>> directories.
>>> This draft is a work item of the Content Delivery Networks
>> Interconnection Working Group of the IETF.
>>> 
>>>       Title           : CDNI Logging Interface
>>>       Authors         : Francois Le Faucheur
>>>                         Gilles Bertrand
>>>                         Iuniana Oprescu
>>>                         Roy Peterkofsky
>>> 	Filename        : draft-ietf-cdni-logging-20.txt
>>> 	Pages           : 57
>>> 	Date            : 2015-10-16
>>> 
>>> Abstract:
>>>  This memo specifies the Logging interface between a downstream CDN
>>>  (dCDN) and an upstream CDN (uCDN) that are interconnected as per the
>>>  CDN Interconnection (CDNI) framework.  First, it describes a
>>>  reference model for CDNI logging.  Then, it specifies the CDNI
>>>  Logging File format and the actual protocol for exchange of CDNI
>>>  Logging Files.
>>> 
>>> 
>>> The IETF datatracker status page for this draft is:
>>> https://datatracker.ietf.org/doc/draft-ietf-cdni-logging/
>>> 
>>> There's also a htmlized version available at:
>>> https://tools.ietf.org/html/draft-ietf-cdni-logging-20
>>> 
>>> A diff from the previous version is available at:
>>> https://www.ietf.org/rfcdiff?url2=draft-ietf-cdni-logging-20
>>> 
>>> 
>>> Please note that it may take a couple of minutes from the time of
>> submission
>>> until the htmlized version and diff are available at tools.ietf.org.
>>> 
>>> Internet-Drafts are also available by anonymous FTP at:
>>> ftp://ftp.ietf.org/internet-drafts/
>>> 
>>> _______________________________________________
>>> CDNi mailing list
>>> CDNi@ietf.org
>>> https://www.ietf.org/mailman/listinfo/cdni
>> 
>> _______________________________________________
>> CDNi mailing list
>> CDNi@ietf.org
>> https://www.ietf.org/mailman/listinfo/cdni