Re: [i2rs] I2RS Requriements - secure transfer

"Joel M. Halpern" <jmh@joelhalpern.com> Tue, 31 May 2016 21:07 UTC

Return-Path: <jmh@joelhalpern.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A95F012D8CC for <i2rs@ietfa.amsl.com>; Tue, 31 May 2016 14:07:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.702
X-Spam-Level:
X-Spam-Status: No, score=-2.702 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id x-QPS1US17v8 for <i2rs@ietfa.amsl.com>; Tue, 31 May 2016 14:07:14 -0700 (PDT)
Received: from maila2.tigertech.net (maila2.tigertech.net [208.80.4.152]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EFD7912D56C for <i2rs@ietf.org>; Tue, 31 May 2016 14:07:13 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by maila2.tigertech.net (Postfix) with ESMTP id DDDBE267891; Tue, 31 May 2016 14:07:13 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=1.tigertech; t=1464728833; bh=bFTg9esvDfyQIcogiCCtD3WpZyE2yPkj+A9dwCFMot4=; h=Subject:To:References:Cc:From:Date:In-Reply-To:From; b=OWYlzJvGNk1F89UZuN1jQEE9DQ1QrKq5pFDixEj7MpDnGLJbJq55BO90mIRrQ4hca cwbz7GqYztalR8igoznbYgP3k0uxzkcsfUeA+JsB+4W0SL1VoqZH/3kQkqOHlvh5Mj CXB26RJ5xnDmvUnKXqE5NiFE910fCp2mPWQDp3F4=
X-Virus-Scanned: Debian amavisd-new at maila2.tigertech.net
Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by maila2.tigertech.net (Postfix) with ESMTPSA id 5C20B258B0E; Tue, 31 May 2016 14:07:13 -0700 (PDT)
To: Jeffrey Haas <jhaas@pfrc.org>
References: <000601d1bad5$70523090$50f691b0$@ndzh.com> <20160531063840.GA21289@elstar.local> <20160531193640.GL17462@pfrc.org> <92905b12-3422-316c-67e9-1aefbbebc035@joelhalpern.com> <20160531210600.GN10531@pfrc.org>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <d446a97c-f8aa-e123-49e2-ae5b0252111d@joelhalpern.com>
Date: Tue, 31 May 2016 17:07:10 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:45.0) Gecko/20100101 Thunderbird/45.1.0
MIME-Version: 1.0
In-Reply-To: <20160531210600.GN10531@pfrc.org>
Content-Type: text/plain; charset="windows-1252"; format="flowed"
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/ITRByQ-_Q3TxH5UeyiQZ_mMf2pc>
Cc: i2rs@ietf.org, Susan Hares <shares@ndzh.com>
Subject: Re: [i2rs] I2RS Requriements - secure transfer
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 31 May 2016 21:07:15 -0000

All I was saying was that we as I2RS should focus on our requirement 
that it be possible to ship some data in a non-secure transport.  While 
I am tempted to argue against the requirement, it is the WG consensus, 
so it stands.

But when it comes to declaring requirements on marking which pieces of 
data may be shipped insecurely, and specifically marking that in AYNG, I 
think we are overstating the requirement.

Yours,
Joel

On 5/31/16 5:06 PM, Jeffrey Haas wrote:
> Joel,
>
> On Tue, May 31, 2016 at 04:17:50PM -0400, Joel M. Halpern wrote:
>> The more I read the text about marking secure or insecure
>> transports, the I wonder whether it is an I2RS requirement at all.
>> that is, I2RS requires the ability to send notifications via an
>> insecure channel.
>
> The requirements have been getting written in a very proscriptive manner for
> the cases when security *is* required.
>
> We have had numerous discussions about other transports, which *might not*
> be secured.
>
> If your argument is that because we MUST support the secured cases that we
> don't need to cover the insecure cases, I strongly disagree.
>
>> I don't think I2RS cares what granularity this is marked at.
>
> I2RS doesn't give a darn.  Models and security folk reviewing the models do.
>
>> So lets not state a requirement on it?
>
> Let's not try to brush it off.
>
>> Jeff, you allude to using a protocol like IPFIX.  Given that IPFix
>> won't be reading these YANG models at all, it seems that the
>> requirement as stated (marking in the YANG which nodes are allowed
>> to be transferred insecurely) won't help solve the problem.
>
> Please try to have paid attention to the discussion the last two years about
> pub-sub mechanisms for telemtry data.  We have more than one vendor which
> has implemented some form of telemetry state coverable by yang modeling with
> alternate presentation or transport layers.  The most common example
> regularly cited has been GRPC with protobufs encoding. Discussion has
> happened in-hallway, on-list and between vendors about the potential
> programmatic mapping layers between things like protobufs, thrift and even
> IPFIX and yang although to my knowledge only protobufs and thrift had gotten
> more than a smattering of attention.
>
>> I also wonder if the very notion of an I2RS protocol is getting in
>> the way.  If the insecure transfer we envision is some protocol
>> other than NetConf / RestConf, then we seem to be stating the
>> requirement in the wrong place.
>
> IMO, calling it an "I2RS protocol" was mistaken.  The minute we decided we
> were going to attempt to leverage existing mechanisms such as netconf and
> restconf, the framing should have simply been "extensions to support i2rs
> cases".
>
> If netconf proved intransigent against the changes in question, it was
> likely at some point that the vendor set implementing i2rs mechanisms would
> eventually chosen to have forked netconf protocol behaviors to support their
> code and use cases for ephemeral state.  Thus far, it appears that each has
> chosen to stay with their own internal forms of ephemeral configuration and
> avoid exposing netconf mappings until these issues have resolved.
>
> -- Jeff
>
>