Re: [Gen-art] Genart last call review of draft-wu-l3sm-rfc8049bis-07

"Adrian Farrel" <adrian@olddog.co.uk> Thu, 26 October 2017 11:59 UTC

Return-Path: <adrian@olddog.co.uk>
X-Original-To: gen-art@ietfa.amsl.com
Delivered-To: gen-art@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 76EC613A292; Thu, 26 Oct 2017 04:59:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ph1N5Y5Oez37; Thu, 26 Oct 2017 04:59:41 -0700 (PDT)
Received: from asmtp2.iomartmail.com (asmtp2.iomartmail.com [62.128.201.249]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7F67B13836B; Thu, 26 Oct 2017 04:59:41 -0700 (PDT)
Received: from asmtp2.iomartmail.com (localhost.localdomain [127.0.0.1]) by asmtp2.iomartmail.com (8.13.8/8.13.8) with ESMTP id v9QBxTkc006643; Thu, 26 Oct 2017 12:59:30 +0100
Received: from 950129200 (105.76.115.87.dyn.plus.net [87.115.76.105]) (authenticated bits=0) by asmtp2.iomartmail.com (8.13.8/8.13.8) with ESMTP id v9QBxRvB006599 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 26 Oct 2017 12:59:28 +0100
Reply-To: adrian@olddog.co.uk
From: Adrian Farrel <adrian@olddog.co.uk>
To: "'tom p.'" <daedulus@btconnect.com>, 'Qin Wu' <bill.wu@huawei.com>, 'Jari Arkko' <jari.arkko@piuha.net>, gen-art@ietf.org
Cc: ietf@ietf.org, draft-wu-l3sm-rfc8049bis.all@ietf.org
References: <150896479290.4890.6282834560661739719@ietfa.amsl.com> <B8F9A780D330094D99AF023C5877DABA9AC178E0@nkgeml513-mbx.china.huawei.com> <00c701d34e4b$3ab91c40$4001a8c0@gateway.2wire.net>
In-Reply-To: <00c701d34e4b$3ab91c40$4001a8c0@gateway.2wire.net>
Date: Thu, 26 Oct 2017 12:59:22 +0100
Message-ID: <007101d34e51$de036bc0$9a0a4340$@olddog.co.uk>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQLn9niAzU8zG+14RDbSu8DwG5yv5QGVWM8mAe1mJZigsJ2lwA==
Content-Language: en-gb
X-TM-AS-MML: disable
X-TM-AS-Product-Ver: IMSS-7.1.0.1679-8.1.0.1062-23418.006
X-TM-AS-Result: No--26.416-10.0-31-10
X-imss-scan-details: No--26.416-10.0-31-10
X-TMASE-MatchedRID: yebcs53SkkB4gIWnbcyVjZ21GZGE81yGJPNIV6GF8mv4JyR+b5tvoKLn eXF/QRDTlqnO4loyPKVo/Q6UoVJMJkIUHzxdtG/ZdAg4yd14qASC7C2rJeUTofFRZQJ3jTn8wl9 GLHytwjofsAZLM5dCJCMCJpXHrywc2UnNyTe4Y7/HQ8MHM33wrmLu7N0Ekjfk2nVuImEjI1Gnu5 5oSQOpM/d0NuKfLBNn8MeN4/x0Ua/VFtf7bVfns2Dyuh21ll9wpsL3zxe9d+M7KZ2/frnX6ArIP OCNVt9ZAc6NbGIj66DcY3aFkTTxp5BdU6tTUIPh+/7/+WpTWHp+S5m2/8VLms2mvbig5LjGOEtw HUC1TtWubbuAmBNrb1FLvGMRv53Ezsxad8fKloZEC+iFIlSkj7/I3arxTrviDYbe/PyX8gT0t3k tSH728qGBtzPwjhPCIueRwZyQ+Q+OUv+G6OvDW/p1plqEbuqxXEjKf9fhKafYC1sXOSMKSuu/EC yhLxqOPLrF4C1zgKJ3mw+/xP6FdOp+5thBihYEb/5HBZ6dvRibKpAlY2y6SV+aJfM1BJF8P2WCl Dfp39pb7kBgCFqTCHVKexfVH8gAh0zWQXCZZ8hjoaO27r+3fTpA2zZYJjv1K7khO7jXSQn4eYE/ JF5KDDG9JyBLvZPZ2qraLu7L2IqfS93LNnu/oI1nuRzhSr7jGFwEGDRX5uw4WUsA5A23IYQIQPw 0DqEHgO6+9/1ecPF7Nc0Uf3Oz0jJDuachUUb9kRs1fAcYNHF+K68qL2G5pt14Aqe8EzF8YNAEf9 mlmAxaq+4jtRyIyXCxwBtA+JKDkbjrxLvJ6LCeAiCmPx4NwFkMvWAuahr8+gD2vYtOFhgqtq5d3 cxkNQP90fJP9eHt
Archived-At: <https://mailarchive.ietf.org/arch/msg/gen-art/j8l62knGVmPnf8o9fTLXhm-Bh9o>
Subject: Re: [Gen-art] Genart last call review of draft-wu-l3sm-rfc8049bis-07
X-BeenThere: gen-art@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "GEN-ART: General Area Review Team" <gen-art.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/gen-art>, <mailto:gen-art-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/gen-art/>
List-Post: <mailto:gen-art@ietf.org>
List-Help: <mailto:gen-art-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/gen-art>, <mailto:gen-art-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 26 Oct 2017 11:59:43 -0000

Top-posting 'cos I'm lazy.

We need to be careful to not confuse two aspects of security in this model.
One is security in the use of the model: who can read and write to the operator, whether the data is protected in transit, etc.
The other is security within the VPN that is modelled: how sites secure their access to the VPN, how VPN data is protected.

The former is handled by the protocol used to exchange the model. We assume Netconf, and that comes with a variety of security features.
The latter is about what VPN (or VPN site) behaviour is configured.

All that said, the points about authentication and authorisation are well made. Authorisation based on unauthenticated identity is not strong security (basically equates to "guess a valid user name").

A

> -----Original Message-----
> From: ietf [mailto:ietf-bounces@ietf.org] On Behalf Of tom p.
> Sent: 26 October 2017 12:10
> To: Qin Wu; Jari Arkko; gen-art@ietf.org
> Cc: ietf@ietf.org; draft-wu-l3sm-rfc8049bis.all@ietf.org
> Subject: Re: Genart last call review of draft-wu-l3sm-rfc8049bis-07
> 
> < see inline>
> Tom Petch
> 
> 
> ----- Original Message -----
> From: "Qin Wu" <bill.wu@huawei.com>
> Sent: Thursday, October 26, 2017 8:02 AM
> 
> > -----邮件原件-----
> > 发件人: Jari Arkko [mailto:jari.arkko@piuha.net]
> > 发送时间: 2017年10月26日 4:53
> >
> > Reviewer: Jari Arkko
> > Review result: Ready with Issues
> >
> > I am the assigned Gen-ART reviewer for this draft. The General Area
> Review Team (Gen-ART) reviews all IETF documents being processed by the
> IESG for the IETF Chair.  Please treat these comments just like any
> other last call comments.
> >
> > For more information, please see the FAQ at
> >
> > <https://trac.ietf.org/trac/gen/wiki/GenArtfaq>.
> >
> > Document: draft-wu-l3sm-rfc8049bis-??
> > Reviewer: Jari Arkko
> > Review Date: 2017-10-25
> > IETF LC End Date: 2017-10-11
> > IESG Telechat date: 2017-10-26
> >
> > Summary: I'm not an expert on YANG *at all*. And not an expert on the
> topic in question either. And I had far too little time to spend on this
> long document.
> > But as far as the textual content of the document goes, it seems
> reasonable. I have a difficulty in assessing how complete and
> implementable this model is however. Are there implementations?
> >
> > [Qin]: Yes, there are implementations, something broken in RFC8049
> needs to get right.
> >
> > I did enjoy the classification of Internet connectivity as a special
> case of cloud service :-) You may be onto something.
> >
> > [Qin]:Yes, internet connectivity is special example of public cloud,
> in my understanding,:-)
> >
> > I did observe a couple of question marks or issues that probably
> deserve some thought or small revisions.
> >
> > Major issues: -
> >
> > Minor issues:
> >
> > I'm not sure I fully understand the need for "SP MUST honour
> <requirement>"
> > language in the document. Are there parts of the described model that
> they SP is *not* required to honour? Other than the explicit strict
> true/false settings? And in any case, sizeable networks are likely to
> have issues that might require negotiation/human involvement.
> >
> > [Qin]: Explicit settings are covered by sub-section of section 6.6,
> such as device constraint, Site Location constraint/parameter, access
> type.
> > Unlike RFC8049, RFC8049bis change "SP SHOULD honor" into "SP MUST
> honor".
> >
> > I don't understand how 6.9.1 can say there is no authentication
> support but then 6.9.2 (encryption) talks about authentication keys. I'd
> suggest some rethinking or at least clarification might be needed here.
> >
> > [Qin]: Authentication provides you access to a resource like a
> computer or a network. Encryption provides confidentiality and controls
> whether an object can be read or not.
> 
> Qin
> 
> I do not see that usage as common in the IETF and I think that it
> reflects a fundamental flaw in this model such that the I-D should not
> go forward in its present form, except that the same flaw is present in
> RFC8049:-(
> 
> Authentication is the process of establishing that a person or object is
> who or what they claim to be, using e.g. pre-shared keys or
> certificates, in an authentication protocol.
> 
> Authorisation is the process of granting rights, privileges, access and
> such like to an authenticated identity.
> 
> Authorisation without authentication is meaningless, a fantasy of
> security
> 
> Scanning the I-D, I think that the usage of authorisation and
> authentication is mostly correct.  As the I-D points it, there is no
> support in the standard model for authentication.  Where the I-D is
> wrong, perhaps dangerously so, is in the Security Considerations where
> it says that because NETCONF may have used TLS or SSH to establish the
> connection, and the NETCONF Access Control may be used to control
> authorisation, then somehow this is secure.
> 
> You haven't a clue what identity has been authenticated and whether or
> not they should be authorised to join a VPN.  This is a common problem
> with applications running over a secure transport, the transport may
> have autheticated an identity but how do you get that identity up to the
> application for the application to verify that the identity really is
> ok?  Channel Binding is one answer but rarely used.
> 
> Tom Petch
> 
> > Both Authentication and Encryption are site level parameters and
> applicable to site connection. Pre-share key as encryption parameter can
> be used, e.g., for routing protocol authentication.
> > But pre-share key parameter is not authentication parameter, one
> example I have for authentication parameter is authentication algorithm
> which is not specified in the model,
> > We will see how to clarify this in the model. thanks.
> >
> > In the security considerations, I would note that if these models are
> used not merely for creation of networks, but also their modification,
> the consequences of inadvertent or malicious modifications can severe
> and network wide. Perhaps that could be discussed.
> >
> > [Qin]:Security consideration section has already considered both
> creation of networks and but also their modification, see the text in
> security consideration section as follows:
> > "
> >    The data nodes defined in the "ietf-l3vpn-svc" YANG module MUST be
> >    carefully created, read, updated, or deleted as appropriate.
> > "
> >
> > Nits/editorial comments:
> >
> > Section 6.12.2. s/fragmented/fragment it/
> >
> > [Qin]: Will fix this, thanks.
> >