Re: [i2rs] Ben Campbell's Discuss on draft-ietf-i2rs-protocol-security-requirements-07: (with DISCUSS and COMMENT)

"Ben Campbell" <ben@nostrum.com> Wed, 17 August 2016 22:53 UTC

Return-Path: <ben@nostrum.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 574BC12B016; Wed, 17 Aug 2016 15:53:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.147
X-Spam-Level:
X-Spam-Status: No, score=-3.147 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-1.247] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YElhxy4-7_Om; Wed, 17 Aug 2016 15:53:03 -0700 (PDT)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3AAB312D6AD; Wed, 17 Aug 2016 15:53:03 -0700 (PDT)
Received: from [10.0.1.4] (cpe-66-25-7-22.tx.res.rr.com [66.25.7.22]) (authenticated bits=0) by nostrum.com (8.15.2/8.15.2) with ESMTPSA id u7HMr2kS085893 (version=TLSv1 cipher=DHE-RSA-AES128-SHA bits=128 verify=NO); Wed, 17 Aug 2016 17:53:02 -0500 (CDT) (envelope-from ben@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host cpe-66-25-7-22.tx.res.rr.com [66.25.7.22] claimed to be [10.0.1.4]
From: Ben Campbell <ben@nostrum.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>
Date: Wed, 17 Aug 2016 17:53:01 -0500
Message-ID: <2A898F69-FE5D-46A3-8260-6285F5B49C1E@nostrum.com>
In-Reply-To: <7ed760da-c57c-b2f7-9045-b6c033a6bcf3@joelhalpern.com>
References: <147146828725.23668.4809857469458650681.idtracker@ietfa.amsl.com> <7ed760da-c57c-b2f7-9045-b6c033a6bcf3@joelhalpern.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 8bit
X-Mailer: MailMate (1.9.4r5234)
Archived-At: <https://mailarchive.ietf.org/arch/msg/i2rs/MH2n-VA3n1TP2LKIHiqZxwqJ9j0>
Cc: jhaas@pfrc.org, i2rs@ietf.org, draft-ietf-i2rs-protocol-security-requirements@ietf.org, The IESG <iesg@ietf.org>, i2rs-chairs@ietf.org
Subject: Re: [i2rs] Ben Campbell's Discuss on draft-ietf-i2rs-protocol-security-requirements-07: (with DISCUSS and COMMENT)
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Aug 2016 22:53:09 -0000

On 17 Aug 2016, at 17:04, Joel M. Halpern wrote:

> Making sure I understand what is being asked in each of these items, 
> hence in-line.
> Yours,
> Joel
>
> On 8/17/16 5:11 PM, Ben Campbell wrote:

[...]

>> ----------------------------------------------------------------------
>> DISCUSS:
>> ----------------------------------------------------------------------
>>
>> In section 3.4, the text says that the requirements that the 
>> integrity
>> protection mechanisms can actually provide integrity protection are
>> SHOULD because some communication may occur over non-secure channels.
>> That does not follow, since the rationale is about use, while the 
>> actual
>> requirement is about capability.  As currently written, it leaves it
>> possible for people to select a protocol that cannot provide 
>> integrity
>> protection at all. I think the SHOULDs in 14 and 15 need to be MUSTS.
>
> I think what you are asking is that we rephrase these requirements to 
> indicate that implementations must include integrity protection 
> capability which meets these requirements.  And that the current text 
> explaining the SHOULD becomes text about when these mechanisms SHOULD 
> be used?
>

Yes.

>>
>> In the third paragaph of 3.2, Isn't the point to say that ephemeral 
>> data
>> MUST be sent over a secure transport unless the data model explicitly
>> labels it as safe for insecure transports? As written, it seems to 
>> leave
>> room to send data that is not labeled as safe to also be sent over
>> insecure transports.
>
> I am having trouble seeing the problem.  The text, as far as I can 
> tell, says "SHOULD be protect", and then goes on to say "except when 
> the model says it is okay to send unprotected".  That seems to say the 
> right thing.

I take "SHOULD except..." to mean something fundamentally different than 
"MUST except..." SHOULD allows the implementers (or I guess protocol 
designers in this case) the additional flexibility of deciding they have 
some other good reason to deviate from the guidance, in addition to 
whatever might be list. Is that the intent here?

>
>>
>>
>> ----------------------------------------------------------------------
>> COMMENT:
>> ----------------------------------------------------------------------
>>
>> -2.1: I am on the fence about other's comments about copying 
>> definitions
>> here--but if you do copy them here, it seems strange to not mention
>> "client" or "agent".
>
> I can live with just listing the terms and references, without the 
> text.  It makes reading a little more complex for new readers, but 
> avoids any risk of error in copying.

I think that's a good answer to other people's comments :-) My comment 
was, _if_ this draft continues to mention the defined terms, it would be 
good to also mention client and agent.

>
>>
>> I agree with Alissa about equating privacy and confidentiality.
>
> I was going to simply say "sure", but REQ-20 sems to need to still say 
> "privacy".  Not sure what you (individually or collectively) would 
> like us to do.
> I do note that if the terminology has shifted from that documented in 
> 4949, it would be helpful to those of us who do not live with it daily 
> to have some way to know such.
>

It probably makes sense to keep this discussion in the thread from 
Alissa's comments.

>>
>> -3.1,:
>> I’m confused by the first paragraph. I don’t find strings of the 
>> form of
>> SEC-REQ-XX in 7921. I think _this_ doc sets these requirements, 
>> right?
>
> Section 3.1 is trying to recapitulate for context requirements that 
> are stated in textual form in RFC 7921.  No, they are not lsited as 
> SEQ_REQ-XX or even REQ-XX in RFC 7921.  Thus, in addition to context, 
> listing them here allows us to give them numbers for consistency of 
> discussion.  (Thus, this is a case where repetition adds value.)

It think some clarification text would be in order. (I am agnostic about 
Mirja's and Alissa's comments about whether these should be replicated 
at all.)

>
>>
>> It’s not clear to me how 5 and 6 differ. Is it just a matter of the
>> additional “before establishing a connection” part in 6?
>
> As far as I know, it is indeed just a matter of the timing being added 
> in 6.  If this is a problem, we can collapse them.

I'm okay either way on this one.

>
>>
>> -3.4: Isn't 15 simply a restatement of the third item under 14?
>
> that looks like an error on our part.  Maybe I missed something, but I 
> think we can drop that when we rewrite to address your major comment.

Okay. The odd part is that 15 seems to recognize that it's just a 
restatement :-)

>
>>
>> 3.5: The  MAYs in 19 and 20 seem like statements of fact. (That is, 
>> do
>> they simply recognize reality, or to they  grant permission?)
>
> Re-reading these, the MAY in 19 is a description of allowed 
> architecture, and seems to me to wall within the 2119 meaning.

Is the MAY in 19 a materially new statement, or is that already covered 
in the architecture? If the latter, something to the effect of "The 
architecture allows..." might make more sense.

> The may in 20 is subtler.  I think it is recognizing reality, since 
> that mechanism is not something we are going to be defining, as far as 
> I know.  It can be argued that it is saying that these requirements 
> allow such a range of mechanism.  But I agree that 2119 usage is a bit 
> of a stretch there.
>
>>
>>
>> _______________________________________________
>> i2rs mailing list
>> i2rs@ietf.org
>> https://www.ietf.org/mailman/listinfo/i2rs
>>