Re: [homenet] standard way of configuring homenets

Ted Lemon <mellon@fugue.com> Wed, 25 July 2018 16:56 UTC

Return-Path: <mellon@fugue.com>
X-Original-To: homenet@ietfa.amsl.com
Delivered-To: homenet@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7304D130E29 for <homenet@ietfa.amsl.com>; Wed, 25 Jul 2018 09:56:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level:
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_MED=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=fugue-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kG5bkLTpGPpJ for <homenet@ietfa.amsl.com>; Wed, 25 Jul 2018 09:56:40 -0700 (PDT)
Received: from mail-io0-x22b.google.com (mail-io0-x22b.google.com [IPv6:2607:f8b0:4001:c06::22b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4DD5B130E1B for <homenet@ietf.org>; Wed, 25 Jul 2018 09:56:40 -0700 (PDT)
Received: by mail-io0-x22b.google.com with SMTP id i18-v6so6882060ioj.13 for <homenet@ietf.org>; Wed, 25 Jul 2018 09:56:40 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fugue-com.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=fIfulXxdSjzSM+Qjb0Qu5qeW+ugCdi1zWOkHQp2ZLEc=; b=suzdGURdOCEDscvR0gtNnXkEhJekTaF4rrZiffAS35cJp0yGMzntQ7tAlXyBHd5Lab vGsLHk+9G8voiGnXyggNro5VveTreC9TeDys0ZCxKjnzdoU4Art2KLrr1rUduapI2jjB l/UZ2/I5mpquYEhIi6z3n91cZABfX8/cK5rBQ+vFlkDAOrs/Z/HBndEiBFooCOmiMYk+ fUk1gdivywRQOgulr106bE3fGCW7idYjwHb4zHhifmRugxswEYhyTFd5+AVmDb3Ixx6u phroFUDoKH5UxFIOL1tJZTgVA/o8OEepnxaFRxhPuOxjz4C9IY104gcp9gc42Kk9lyPW P0ng==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=fIfulXxdSjzSM+Qjb0Qu5qeW+ugCdi1zWOkHQp2ZLEc=; b=bXRGURnR4dLFtrLq4k3+nWkMO9Or21i1cCC8O8jzkcfV8imcJ3VYNEnBTy8dEbOf/H /9qb8CcDPBG4SeidtizoawMo8Px/LCSkzVGNHyDwFQgihra6OQRG//4h2QXkzXpsUTwz n2T+pgHULicjhNuuK/KPxmHG3A5WattVRbVrKbdJcwSAK1QkEtDBjgSDjdLaFK++oQpw BfChrTXRGl2HosX+vB1Ri0+jnaYV/Jcxjrg18PxD2QOFmsxyWeRcbk42iSgCYR+FZYa1 5KRz9bJcrllK5b1AE3ktMqjMUP3sNeF2LGOkwwa4iC3enacktukcz9jKw4UYxfAj9aR4 OdLw==
X-Gm-Message-State: AOUpUlGdCjKP6qVBNsHtIwxCc8d+VDz78MNmZpJwr+qYXALfK/4jsL3c VJ5fWeo/68u3gFkIBRObit1jQmXq7krM26PbpxpCDw==
X-Google-Smtp-Source: AAOMgpfRW/QUz+80sasYtt6ulmqfKMxOKLYiYVZlxHGCQssMFzZcCcxbO4M0fNZoyPYL73DQCcJtA+5xz0BuHakk++Q=
X-Received: by 2002:a6b:9d0b:: with SMTP id g11-v6mr18532739ioe.85.1532537799489; Wed, 25 Jul 2018 09:56:39 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:a4f:b442:0:0:0:0:0 with HTTP; Wed, 25 Jul 2018 09:55:58 -0700 (PDT)
In-Reply-To: <2D09D61DDFA73D4C884805CC7865E6114DE526ED@GAALPA1MSGUSRBF.ITServices.sbc.com>
References: <27765.1532468911@localhost> <CAPt1N1mO8KFH+M-bq7LKqQcjtyigUPwdchMA11U_vPXYTzcNSw@mail.gmail.com> <2D09D61DDFA73D4C884805CC7865E6114DE51281@GAALPA1MSGUSRBF.ITServices.sbc.com> <d7e85f2a-b613-7e8a-a18a-c6ae79bd8d79@gmail.com> <2D09D61DDFA73D4C884805CC7865E6114DE526ED@GAALPA1MSGUSRBF.ITServices.sbc.com>
From: Ted Lemon <mellon@fugue.com>
Date: Wed, 25 Jul 2018 12:55:58 -0400
Message-ID: <CAPt1N1kFFFA344FGWD4S66sFmwM4OdaqN2m0-nTOVMsbXALNcw@mail.gmail.com>
To: "STARK, BARBARA H" <bs7652@att.com>
Cc: Brian E Carpenter <brian.e.carpenter@gmail.com>, Michael Richardson <mcr+ietf@sandelman.ca>, homenet <homenet@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000024e2af0571d5c301"
Archived-At: <https://mailarchive.ietf.org/arch/msg/homenet/1hQzjgntm25UVJRxxJHLCQ1dVas>
Subject: Re: [homenet] standard way of configuring homenets
X-BeenThere: homenet@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: IETF Homenet WG mailing list <homenet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/homenet>, <mailto:homenet-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/homenet/>
List-Post: <mailto:homenet@ietf.org>
List-Help: <mailto:homenet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/homenet>, <mailto:homenet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 25 Jul 2018 16:56:45 -0000

Hm, possibly there's been some miscommunication here: we aren't talking
about using tools developed for managed networks for amateurishly-managed
networks.   We are talking about the problem of making it possible to do
some degree of management of homenets.   I don't think anybody is assuming
that we will just forklift in SNMP or Netconf/Yang; indeed, at least one
suggestion was to just use HNCP.   HNCP actually possesses exactly the
attack surface you are talking about if we don't have some kind of
enrollment protocol.

On Wed, Jul 25, 2018 at 12:40 PM, STARK, BARBARA H <bs7652@att.com> wrote:

> > > <individual hat> Since homenet is supposed to be about an unmanaged
> > > network, and configuration via a management protocol requires somebody
> > > who knows what they’re doing,
> >
> > Traditionally, yes, but we do actually want to get away from that.
> > (It's our explicit goal to do that in ANIMA, for which homenets are out
> of
> > scope, but we assume that the starting point is a NOC staffed by people
> who
> > know what they are doing.)
> >
> > The idea of capturing a homenet config and saving it for future use
> doesn't
> > seem outlandish to me, and using tools developed for managed networks,
> > but operated robotically instead of manually, doesn't seem crazy either.
> But
> > it might be a big effort and a distraction.
>
> <as individual contributor>
> Using tools developed for managed networks in amateurishly-managed (or
> unmanaged) home network environments has historically turned out very badly.
> Poorly implemented management protocols and "backdoors" are a leading
> cause of security vulnerabilities. These poor implementations are common
> and prevalent.
> Improperly secured, but (otherwise) well-implemented management protocols
> are another leading cause of security vulnerabilities. This is also common
> and prevalent.
> And I'm not just talking about the device's or home network's security.
> I'm talking about Internet security -- this is how DDoS attacks are enabled.
> As a data point: providers like Comcast actively block SNMP ports because
> SNMP is so easy to use in DDoS attacks. (https://www.xfinity.com/
> support/articles/list-of-blocked-ports)
> I realize netconf and restconf aren't SNMP. But please don't think that if
> these protocols were to be deployed in millions of consumer devices and
> placed under the control of end users we would discover them to be
> magically immune to poor implementations and being improperly secured. I
> have yet to see a management protocol that is immune to either of these
> issues.
>
> Which isn't to say it couldn't be done or there might not be a good use
> case for it. I'm saying that it is a huge effort that would need to be done
> with extreme foresight and care. We would need to understand extremely well
> exactly what we do and don't want from such a management solution --
> exactly what problems we are trying to solve and what our requirements are.
> Does it need to be a single management protocol to solve everything, or do
> we separate reporting of statistics from configuration backup from UI for
> user configuration? We would have to be rock-solid on requirements for
> securing any such management interface, understand what our strategy is for
> minimizing occurrence of poor implementations, and understand what our
> strategy is for minimizing occurrence of improperly-secured implementations.
>
> On the plus side -- maybe if we were able to do this, it would keep
> developers from creating their own custom vulnerabilities (aka management
> interfaces) by giving them a viable properly secured solution.
> Barbara
>
>