Re: [Gen-art] Gen-art LC review: draft-mm-netconf-time-capability-05

Tal Mizrahi <talmi@marvell.com> Sat, 01 August 2015 18:53 UTC

Return-Path: <talmi@marvell.com>
X-Original-To: gen-art@ietfa.amsl.com
Delivered-To: gen-art@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 499C81A03A5; Sat, 1 Aug 2015 11:53:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.266
X-Spam-Level:
X-Spam-Status: No, score=-2.266 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, IP_NOT_FRIENDLY=0.334, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PlPTSora8rek; Sat, 1 Aug 2015 11:53:45 -0700 (PDT)
Received: from mx0b-0016f401.pphosted.com (mx0b-0016f401.pphosted.com [67.231.156.173]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5286D1A03A1; Sat, 1 Aug 2015 11:53:45 -0700 (PDT)
Received: from pps.filterd (m0045851.ppops.net [127.0.0.1]) by mx0b-0016f401.pphosted.com (8.15.0.59/8.15.0.59) with SMTP id t71IU9L4020621; Sat, 1 Aug 2015 11:32:47 -0700
Received: from il-exch01.marvell.com ([199.203.130.101]) by mx0b-0016f401.pphosted.com with ESMTP id 1w0wmh0nk2-1 (version=TLSv1/SSLv3 cipher=ECDHE-RSA-AES256-SHA bits=256 verify=NOT); Sat, 01 Aug 2015 11:32:46 -0700
Received: from IL-EXCH01.marvell.com (10.4.102.220) by IL-EXCH01.marvell.com (10.4.102.220) with Microsoft SMTP Server (TLS) id 15.0.1044.25; Sat, 1 Aug 2015 21:32:43 +0300
Received: from IL-EXCH01.marvell.com ([fe80::41:1c9f:8611:3a4a]) by IL-EXCH01.marvell.com ([fe80::41:1c9f:8611:3a4a%20]) with mapi id 15.00.1044.021; Sat, 1 Aug 2015 21:32:43 +0300
From: Tal Mizrahi <talmi@marvell.com>
To: Andy Bierman <andy@yumaworks.com>, Robert Sparks <rjsparks@nostrum.com>
Thread-Topic: Gen-art LC review: draft-mm-netconf-time-capability-05
Thread-Index: AQHQuyy5eLfoM7z3lE+UNS2q/7BDz533l8dg
Date: Sat, 01 Aug 2015 18:32:43 +0000
Message-ID: <331cc904106847b2b8c8890b4c076077@IL-EXCH01.marvell.com>
References: <559D98AC.7040403@nostrum.com> <CABCOCHQ7d9Sh9b7jujKipJjRAH16vxTYW9GkRF_30PdoSAGw_Q@mail.gmail.com>
In-Reply-To: <CABCOCHQ7d9Sh9b7jujKipJjRAH16vxTYW9GkRF_30PdoSAGw_Q@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.94.250.30]
Content-Type: multipart/alternative; boundary="_000_331cc904106847b2b8c8890b4c076077ILEXCH01marvellcom_"
MIME-Version: 1.0
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:, , definitions=2015-08-01_02:, , signatures=0
X-Proofpoint-Spam-Details: rule=inbound_notspam policy=inbound score=0 kscore.is_bulkscore=0 kscore.compositescore=1 compositescore=0.9 suspectscore=0 malwarescore=0 phishscore=0 bulkscore=0 kscore.is_spamscore=0 rbsscore=0.9 spamscore=0 urlsuspectscore=0.9 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1506180000 definitions=main-1508010335
Archived-At: <http://mailarchive.ietf.org/arch/msg/gen-art/THSmZEXzacjhX15pLUqJIshmwpM>
Cc: General Area Review Team <gen-art@ietf.org>, "ietf@ietf.org" <ietf@ietf.org>, "draft-mm-netconf-time-capability.all@ietf.org" <draft-mm-netconf-time-capability.all@ietf.org>
Subject: Re: [Gen-art] Gen-art LC review: draft-mm-netconf-time-capability-05
X-BeenThere: gen-art@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "GEN-ART: General Area Review Team" <gen-art.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/gen-art>, <mailto:gen-art-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/gen-art/>
List-Post: <mailto:gen-art@ietf.org>
List-Help: <mailto:gen-art-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/gen-art>, <mailto:gen-art-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 01 Aug 2015 18:53:48 -0000

Hi Andy,

Thanks for the comments.
We have posted an updated version of the draft:
https://tools.ietf.org/html/draft-mm-netconf-time-capability-06

We believe the current draft addresses the issues you raised below.


>Since the scheduled rpc event is sent to every client that is listening
>for notifications, there is no possibility for security through hard-to-guess token,
>as is done with the "persist-id"  for cancelling a confirmed-commit.
>NETCONF has no support for sending a notification to just 1 session or user.

Right, we have added a paragraph to Section 6.2 that explains this issue.
BTW, we discussed the same issue in another thread: https://www.ietf.org/mail-archive/web/ietf/current/msg94144.html


>Picking some arbitrary small sched-max-future value only lowers the probability that
>something goes wrong

Right, the low value of sched-max-future lowers the probability, but does not prevent something wrong from happening. In the current draft this is more clearly explained and discussed in Section 3.6.


Please let us know if you have further comments.

Thanks,
Tal.



From: ietf [mailto:ietf-bounces@ietf.org] On Behalf Of Andy Bierman
Sent: Friday, July 10, 2015 7:23 PM
To: Robert Sparks
Cc: General Area Review Team; ietf@ietf.org; draft-mm-netconf-time-capability.all@ietf.org
Subject: Re: Gen-art LC review: draft-mm-netconf-time-capability-05



On Wed, Jul 8, 2015 at 2:39 PM, Robert Sparks <rjsparks@nostrum.com<mailto:rjsparks@nostrum.com>> wrote:
I am the assigned Gen-ART reviewer for this draft. For background on
Gen-ART, please see the FAQ at

<http://wiki.tools.ietf.org/area/gen/trac/wiki/GenArtfaq>.

Please resolve these comments along with any other Last Call comments
you may receive.

Document: draft-mm-netconf-time-capability-05
Reviewer: Robert Sparks
Review Date: 8 Jul 2015
IETF LC End Date: 29 Jul 2015
IESG Telechat date: not yet scheduled

Summary: This draft has open issues to address before publication

This draft adds two separable concepts to netconf
* Asking for and receiving knowledge of when a command was executed
* Requesting that a command be executed at a particular time

The utility of the first is obvious, and I have no problems with the specification of that part of this extension. Would it be better to pull these apart and progress them separately?

The utility of the second would be more obvious if the draft didn't limit the time to be "near future scheduling". It punts on most of the hard problems with scheduling things outside a very tight range (15 seconds in the future by default), without motivating the advantages of saying "wait until 5 seconds from now before you do this".

So:

Why was 15 seconds chosen? Could you add a motivating example that shows why being able to say "now is not good, but 5 seconds from now is better" is useful? (Something like having a series of things happen as close to simultaneously without the network delay of sending the requests impacting how they are separated perhaps?)

Given the punt, why isn't there a statement that sched-max-future MUST NOT be configured for more than some small value (twice the default, or 30 seconds, perhaps), especially while this is targeted for Experimental? Without something like that, I think the document needs to talk about more of the issues it is trying to avoid with longer term scheduling, even if it doesn't solve those issues. (If I have a fast pipe, I can make a server keep a lot of queued requests, eating a lot of state, even if the window is only 15 seconds. Pointing to how netconf protects against state-exhaustion abuse might be useful).


Picking some arbitrary small sched-max-future value only lowers the probability that
something goes wrong, so it is not a very good punt.


The security considerations section talks about malicious parties attempting to cause sched-max-future to be configured to "a small value". Could you more clearly characterize  "small", given that the default is 15 seconds?

Even with the near-future limit, there are issues to discuss introduced with the ability to cancel a request:

* What prevents a 3rd party from cancelling a request? I think it's only that the 3rd party would have to obtain the right id to put in the cancel message. If so, the document should talk about how you keep eavesdroppers from seeing those ids, and that the servers that generate them should make ids that are hard to guess.


Since the scheduled rpc event is sent to every client that is listening
for notifications, there is no possibility for security through hard-to-guess token,
as is done with the "persist-id"  for cancelling a confirmed-commit.

NETCONF has no support for sending a notification to just 1 session or user.



* Especially given the near-future limitation, you run a high risk that the cancel arrives after the identified request has been executed. It's not clear in the current text what the server should do. I assume you want the server to reply to the cancel with a "I couldn't cancel that" rather than to do something like try to undo the request. The document should be explicit.
* The document should explicitly disallow adding <scheduled-time> to <cancel-schedule>

One editorial comment: It would help to move the concept of the near-future limitation much earlier in the document, perhaps even into the introduction and abstract.

And for the shepherding AD: The document has no shepherd or shepherd writeup. While a writeup is not required, one would have been useful in this case to discuss the history of (lack of) discussion of the document on the group's list and the group's reaction to progressing as Experimental as an Individual Submission.


Andy