Re: [Gen-art] Gen-art LC Review of draft-ietf-anima-autonomic-control-plane-13

Brian E Carpenter <brian.e.carpenter@gmail.com> Thu, 01 March 2018 01:45 UTC

Return-Path: <brian.e.carpenter@gmail.com>
X-Original-To: gen-art@ietfa.amsl.com
Delivered-To: gen-art@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 36E6312D887; Wed, 28 Feb 2018 17:45:42 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tKRK1S2ecmwf; Wed, 28 Feb 2018 17:45:39 -0800 (PST)
Received: from mail-pg0-x242.google.com (mail-pg0-x242.google.com [IPv6:2607:f8b0:400e:c05::242]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C2ACE1205F0; Wed, 28 Feb 2018 17:45:36 -0800 (PST)
Received: by mail-pg0-x242.google.com with SMTP id l131so1700776pga.2; Wed, 28 Feb 2018 17:45:36 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=sender:subject:to:cc:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-language:content-transfer-encoding; bh=njiaXoUwqM2Zn5vISZhVva7bu8qXJ4uMnfs4nFSJp7c=; b=e/kSnUm/vJBmrlHwWIQ1Jvym962dMKzSabVxR2zp1mcIB+ve4Uxa4qPjkg+yb1Qu26 dPJsxDQ5nWYkmm6FoUXp07WXbrV9cgRnuOKnNqcdu9HTEb3Gx7oySY3mzER76Lxzr22n a9+wPNSy00vDpz9CgaoSBsjfMr+Rmn4RaF5Oedl2XB0q/qimjF6VtmM1wJfW8qFzHhpn /OEOtTvUcntmJBbjT4E5IxuhmV9l7wyH9x6MkFS2ngLTrW/ejTHgzmI6tnYzbW36e+yN XY873olzvkgr24k4xiMXJuNwrYAcYORgDDiYpvnI0OAM18zCdJXwlHiN2PoMPvQjkV7C /CYw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:subject:to:cc:references:from:message-id :date:user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=njiaXoUwqM2Zn5vISZhVva7bu8qXJ4uMnfs4nFSJp7c=; b=PSQHLqiH9zKcrbEnXn7YWCE6QFrgxh46liq4rtJqRrcu82rSh/z06kLuu3mhiY75D2 4FoZLBS0yjWviLO/FsZZQ7Nmj0cYgwaMV45+mUXo2v5y5XokM+3ulw/SuqqjQAXgTkty 9SHtwyHiut0e1qX2ieVYBeVJpu5vE2eQbPVCLYyoPnmX6LzwkgSTNHx0xT7pyjkDM9l3 /3yhBYRfJXhoKjqh/rgz5zbmLXPW1NSVAN7nFBOMLc07jr/3+xIqWLKunRkczQ/3KX6Q qWVLFvculBVTFsYVJrETlrEFlB2WsRsex/Ivm+lPnKNvDMBRINFwCquqgPa244/cjQRP TVrA==
X-Gm-Message-State: APf1xPCULTKtAfMgHxmkj80/pS9T1gBLW8DYGyT8ic+rsdoazKUtqUT6 vNcQixTD9wJPLB3P4vRvrlvcZcbv
X-Google-Smtp-Source: AG47ELvZKOIqBaJYb+NhZMjPfRZmh1oG2Z/RchJTWbu+BST+vAmO4AY9i24Lhpu8yY7GN+wAYSXEsg==
X-Received: by 10.98.61.73 with SMTP id k70mr185189pfa.10.1519868735884; Wed, 28 Feb 2018 17:45:35 -0800 (PST)
Received: from [192.168.182.31] ([114.23.138.211]) by smtp.gmail.com with ESMTPSA id c188sm4124963pga.14.2018.02.28.17.45.33 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 28 Feb 2018 17:45:35 -0800 (PST)
Sender: Brian Carpenter <becarpenter46@gmail.com>
To: Elwyn Davies <elwynd@dial.pipex.com>, "gen-art@ietf.org" <gen-art@ietf.org>
Cc: draft-ietf-anima-autonomic-control-plane.all@ietf.org
References: <a6351b48-ae97-5212-58cb-40a1f242fafb@dial.pipex.com>
From: Brian E Carpenter <brian.e.carpenter@gmail.com>
Message-ID: <59154ae1-b818-ad36-cafa-0e91faab3dac@gmail.com>
Date: Thu, 01 Mar 2018 14:45:36 +1300
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.6.0
MIME-Version: 1.0
In-Reply-To: <a6351b48-ae97-5212-58cb-40a1f242fafb@dial.pipex.com>
Content-Type: text/plain; charset="utf-8"
Content-Language: en-US
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/gen-art/u5PIN-kuZvlxQgV5sAjFmiVqVXE>
Subject: Re: [Gen-art] Gen-art LC Review of draft-ietf-anima-autonomic-control-plane-13
X-BeenThere: gen-art@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "GEN-ART: General Area Review Team" <gen-art.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/gen-art>, <mailto:gen-art-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/gen-art/>
List-Post: <mailto:gen-art@ietf.org>
List-Help: <mailto:gen-art-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/gen-art>, <mailto:gen-art-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 01 Mar 2018 01:45:42 -0000

Replying as a protagonist -

First thanks for the really thorough review with many good points.

Now a few replies in-line:

On 28/02/2018 15:24, Elwyn Davies wrote:
> I am the assigned Gen-ART reviewer for this draft. The General Area
> Review Team (Gen-ART) reviews all IETF documents being processed
> by the IESG for the IETF Chair.  Please treat these comments just
> like any other last call comments.
> 
> For more information, please see the FAQ at
> 
> <https://trac.ietf.org/trac/gen/wiki/GenArtfaq>.
> 
> Document: draft-ietf-anima-autonomic-control-plane-13.txt
> Reviewer: Elwyn Davies
> Review Date: 2016/02/27
> IETF LC End Date:  2016/02/26
> IESG Telechat date: (if known) -
> 
> Summary:  Not ready.  There are a number of minor issues and a host of nits and editorial fixes needed.  I would also consider that the expected status (expeimental vs standards track) ought to be discussed on account of the areas where it is incomplete (e.g., incompleteness of the key Intent mechanism).

An Intent mechanism is not required to build and operate the ACP, and if
the draft gives that impression, it needs to be fixed.

> 
> Major issues:
> I am sure this has been considered elsewhere, but the amount of future work and areas where operation might discover problems indicates to me that maybe this should be an experimental proposal rather than standards track.

It's chartered as standards track and other drafts have a normative
dependency on it. So changing the intended status would be very
problematic. Of course it's a judgment call, but there's nothing
dubious that it depends on - ULAs, IPSEC, RPL, VRF functionality,
in fact all the normative references except GRASP and BRSKI are well
established. (GRASP has a mutual normative reference to this document,
and is already in the RFC Editor queue; BRSKI is not out of the
WG yet, so is likely to become a MISSREF.)

Yes, I'd be happier if I had running code for the ACP, but as far as
I know that isn't a requirement for Proposed Standard.
 
> Minor issues:
> Clarity regarding limitations of the ACP approach:The document is relentlessly positive about the ACP approach.  Clearly certain problems will not allow the ACP to function.  For example it implies that the physical network and interfaces are a shared resource: low level failures or misconfiguration at (say) Level 2, may still knockout the ACP as well as the data-plane.  Some brief words on this would not go amiss.  This could well be in s4.
> 
> s2, para 2: There are several instances in the terminology definitions that are confusing before the term has been fully introduced later (and in some cases even then, e.g., the cryptic reference to 'paragraph 21' in the ACP address definition.)  This should be cleared up.  Notes are given in the Nits/Editorial comments below,
> 
> s4, "ACP4", also s6.8.2:
>> Clients of the ACP MUST
>>            NOT be tied to a particular application or transport protocol.
> 
> It may be that I don't understand the problem, but the communication between the ACP nodes seems to be tied to the secure channels.  

Yes, but those are IPv6-in-something channels, that being the nature of a VRF.
So anything that runs over IPv6 is OK. (I'm not sure that this MUST NOT
actually matters: once we know it's an IPv6 channel, do we care?)

> I am not sure how this is compatible with the any transport protocol requirement.  There doesn't seem to be any further explanation of how this requirement is fufilled.  This is linked to he means that is not specified by which the ACP address TLS connections are connected to the secure channels.  This may be because I don't understand the problem
> 
> s6.1.1:  RFC 5280 discusses the option of leaving the subjectName blank if the subjectAltName is present.  What would we expect to find in the subjectName field of the ACP Domain cert?
> 
> s6.1.1:  I don't understand where the routing-subdomain element is
> carried.  routing-subdomain is a top level production in the ABNF that
> isn't referenced in the rest of the ABNF and a separate example is
> given.  Is the intention that the subjectAltName would consist of a
> sequence of two rfc822names as allowed by the X.509 syntax if the
> routing-subdomain is required?
> 
> s6.1.3: I don't understand why the EST renewal server address has to (or, at least, might) be configured into all ACP nodes when the EST server announces itself with M_FLOOD messages.  For one thing it goes (further) against automicity.
> 
> s6.7.x, Security algorithm agility?:  Each of the options specifies a
> MTI, minimum (in today's tems) capability set of cyypto algorithms. It
> is not clear (to me) how this will be adapted if and when these
> algorithms are no longer adequately secure.  Some words on ths may be
> necessary.
> 
> s9.1, "Network Partition":  I am not sure I believe the story on partition - It seems possinle that one of the segments could be left without an enrollment server after partition.  Am I right and does it matter?

Yes, that could happen, I think. We could perhaps have stand-by servers
in every router, ready to leap into action after a partition (and be
discoverable via GRASP), but if there is no server after partition, that
part of the network is stuck. It's like emergency generators (in fact,
I'd say that everywhere you need a stand-by generator, you need a stand-by
enrollment server).

<snip>
 
> s15.2: I think some of these references are normative:
> especially  ietf-anima-reference-model, 

Definitely not, it's an informational document.

Regards
    Brian