Re: [i2rs] Kathleen Moriarty's Discuss on draft-ietf-i2rs-protocol-security-requirements-07: (with DISCUSS and COMMENT)
"Susan Hares" <shares@ndzh.com> Thu, 18 August 2016 15:30 UTC
Return-Path: <shares@ndzh.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B6C2C12DCA3; Thu, 18 Aug 2016 08:30:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.738
X-Spam-Level: *
X-Spam-Status: No, score=1.738 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DOS_OUTLOOK_TO_MX=2.845, RDNS_NONE=0.793] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dMTZHe7BBzRA; Thu, 18 Aug 2016 08:30:57 -0700 (PDT)
Received: from hickoryhill-consulting.com (unknown [50.245.122.97]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4B7CA12DC8A; Thu, 18 Aug 2016 08:30:57 -0700 (PDT)
X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=174.124.167.170;
From: Susan Hares <shares@ndzh.com>
To: 'Joel Halpern' <joel.halpern@ericsson.com>, 'Juergen Schoenwaelder' <j.schoenwaelder@jacobs-university.de>
References: <147146974235.23784.4389421535496134619.idtracker@ietfa.amsl.com> <013b01d1f8ee$31fa09b0$95ee1d10$@ndzh.com> <20160818073203.GA4338@elstar.local> <04b501d1f949$116c63e0$34452ba0$@ndzh.com> <20160818121405.GA5282@elstar.local> <051301d1f950$7739c670$65ad5350$@ndzh.com> <20160818130555.GA5366@elstar.local> <051701d1f952$c4ae0b30$4e0a2190$@ndzh.com> <6BCE198E4EAEFC4CAB45D75826EFB0761525CCD7@eusaamb101.ericsson.se>
In-Reply-To: <6BCE198E4EAEFC4CAB45D75826EFB0761525CCD7@eusaamb101.ericsson.se>
Date: Thu, 18 Aug 2016 11:29:39 -0400
Message-ID: <06b701d1f965$560757f0$021607d0$@ndzh.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQIa7Lz6VgZw6h2A0uGNzOgAA2Ic8QJ/RF5yARxv/coCD6d0AAIDKkFTAYlI9/gCaK/wXAMksAaNAmoTFCSfM3SwkA==
Content-Language: en-us
X-Authenticated-User: skh@ndzh.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/i2rs/QF83JFBAlnTqEiXCakQ8quKndHc>
Cc: i2rs@ietf.org, i2rs-chairs@ietf.org, 'Kathleen Moriarty' <Kathleen.Moriarty.ietf@gmail.com>, 'The IESG' <iesg@ietf.org>, jhaas@pfrc.org, draft-ietf-i2rs-protocol-security-requirements@ietf.org
Subject: Re: [i2rs] Kathleen Moriarty's Discuss on draft-ietf-i2rs-protocol-security-requirements-07: (with DISCUSS and COMMENT)
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 18 Aug 2016 15:31:00 -0000
Joel and Kathleen: Just for the record, I disagree that putting in Yang 1.1 is awkward. It is only a key-word on an item that gives information to a implementation what transports can be used to transport data. If the telemetry information is events (pub/sub), then this telemetry information could encode it to go on secure stream or an insecure stream. If we are going to say that something is too difficult, I would like to discuss this point. Large routing systems are not what NETCONF/RESTCONF has been designing for the last 5 years. This telemetry information is target at those systems. The changes that I2RS is pushing is for routing systems. One of the reasons that Juergen and I disagree on the difficulty of the work is different of focus of IP systems (1-20 interfaces) and the large routing systems. I have given you BGP examples from Large routing systems. I believe this is necessary for large routing systems to give the BGP telemetry information to aid provider networks. I welcome comments from Joel on the usefulness of the BGP Route View information. +1 on the disconnect between the WG and the IESG. The I2RS architecture has the concept of an unsecure channel. Sue -----Original Message----- From: Joel Halpern [mailto:joel.halpern@ericsson.com] Sent: Thursday, August 18, 2016 10:31 AM To: Susan Hares; 'Juergen Schoenwaelder' Cc: i2rs@ietf.org; i2rs-chairs@ietf.org; 'Kathleen Moriarty'; 'The IESG'; jhaas@pfrc.org; draft-ietf-i2rs-protocol-security-requirements@ietf.org Subject: RE: [i2rs] Kathleen Moriarty's Discuss on draft-ietf-i2rs-protocol-security-requirements-07: (with DISCUSS and COMMENT) Let me try a different take approach to this particular question. Let me start by putting aside the question of where things are marked, and come back to that afterwards. There are a number of cases that I2RS has been asked to cover of high rate telemetry data. This may be BGP update information, it may be frequent information about line card activity. There are other cases, some of which have been documented. While not completely insensitive, the operators have made clear that they see protecting this data as unnecessary. While I would hope over time to move to a domain where all of it is protect, that is not trivial. As the I2RS Architecture points out, it is expected that what we describe as a single I2RS communication between a client and agent is actually associated with multiple channels of communication. Now, if you want to say that the I2RS protocol requirements cannot allow for unprotected channels, I guess we have disconnect between the IESG and the WG. If we say that we can allow for unprotected channels, we then get to the question of which data can be sent over such channels. While architecturally I agree with Juergen that the model is a bad place to specify it, the obverse is also true. Not having some limits on what can be sent unprotected causes concern about insufficient protection. If I recall correctly, earlier security reviews called us to task for being too broad in what we allowed. So, if the IESG wants us to just allow it anywhere, because the model is an awkward place to define the limitation, I can live with that. What I can't live with is being told both that the model is a bad place to define it and that there must be restrictions on what is sent unprotected, without any proposal on how we are to move forward. Yours, Joel -----Original Message----- From: Susan Hares [mailto:shares@ndzh.com] Sent: Thursday, August 18, 2016 9:17 AM To: 'Juergen Schoenwaelder' <j.schoenwaelder@jacobs-university.de> Cc: i2rs@ietf.org; i2rs-chairs@ietf.org; 'Kathleen Moriarty' <Kathleen.Moriarty.ietf@gmail.com>; 'The IESG' <iesg@ietf.org>; jhaas@pfrc.org; draft-ietf-i2rs-protocol-security-requirements@ietf.org Subject: RE: [i2rs] Kathleen Moriarty's Discuss on draft-ietf-i2rs-protocol-security-requirements-07: (with DISCUSS and COMMENT) Juergen and Kathleen: Let me proceed with two examples: BGP route views data model and the event for the web-service data. The content of these data models are designated as exposed to public. The routing system only populates the proposed BGP route views data model with the data destined for the BGP looking glass. The policy on the routing system indicates what information gets transferred. The data model is completely available to the public. The Yang Doctors are going to review this by seeing the whole model is public and available via non-secure means. The security people are going to review this seeing that the whole model is public, and available via an unprotect means. The fact the data model is all public should simplify the review. An event from the I2RS RIB that a web-service route is up is the second case. The I2RS RIB has an event based on policy that indicates a web-service route is up. The yang-1.1 doctors must review the content of the event text to see it does not break privacy or provide too much information The event mechanisms will need to work over secure transport and insecure transport. Most of the data will go over the secure transport event stream. However, a small amount of information may go over the insecure transport stream. First, let me know if my use cases are understandable. Second, let me know if you disagree with this use cases. Fyi - IESG approved the architecture with the insecure stream. Sue -----Original Message----- From: Juergen Schoenwaelder [mailto:j.schoenwaelder@jacobs-university.de] Sent: Thursday, August 18, 2016 9:06 AM To: Susan Hares Cc: i2rs@ietf.org; i2rs-chairs@ietf.org; 'Kathleen Moriarty'; 'The IESG'; jhaas@pfrc.org; draft-ietf-i2rs-protocol-security-requirements@ietf.org Subject: Re: [i2rs] Kathleen Moriarty's Discuss on draft-ietf-i2rs-protocol-security-requirements-07: (with DISCUSS and COMMENT) I just do not know on which basis a data model writer can decide whether a data object can be exposed in an unprotected way. How are YANG doctors going to review this? How are security directorate people going to judge this? But as promised, I leave (still puzzled) now. /js On Thu, Aug 18, 2016 at 09:00:14AM -0400, Susan Hares wrote: > Juergen: > > Yes, we seem to disagree on the value of making it hardwired in the model. > For me, the value is a common understanding of deployment distribution such > as the route-views. Since the operators argued strongly for this point, I > think the best idea is to get it working in code and then see if the > deployment matches the requests. > > Sue > > -----Original Message----- > From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Juergen > Schoenwaelder > Sent: Thursday, August 18, 2016 8:14 AM > To: Susan Hares > Cc: i2rs@ietf.org; i2rs-chairs@ietf.org; 'Kathleen Moriarty'; 'The > IESG'; jhaas@pfrc.org; > draft-ietf-i2rs-protocol-security-requirements@ietf.org > Subject: Re: [i2rs] Kathleen Moriarty's Discuss on > draft-ietf-i2rs-protocol-security-requirements-07: (with DISCUSS and > COMMENT) > > Sue, > > I still do not see why the 'mode of exposure' of data benefits from > being hard-wired in the data model. For me, it is a situational and > deployment specific question. But I shut up here since I aired this > concern before (and we simply seem to disagree). > > /js > > On Thu, Aug 18, 2016 at 08:07:18AM -0400, Susan Hares wrote: > > Juergen: > > > > My example is the looking glass servers for the BGP route views > > project > > (http://www.routeviews.org/) or a route indicating the presence of a > > web-server that is public. For the BGP I2RS route, a yang model could > > replace the looking glass function, and provide events for these looking > > glass functions. For the web-server route, an event be sent when that > > one route is added. > > > > Sue > > > > > > -----Original Message----- > > From: Juergen Schoenwaelder > > [mailto:j.schoenwaelder@jacobs-university.de] > > Sent: Thursday, August 18, 2016 3:32 AM > > To: Susan Hares > > Cc: 'Kathleen Moriarty'; 'The IESG'; jhaas@pfrc.org; i2rs@ietf.org; > > i2rs-chairs@ietf.org; > > draft-ietf-i2rs-protocol-security-requirements@ietf.org > > Subject: Re: [i2rs] Kathleen Moriarty's Discuss on > > draft-ietf-i2rs-protocol-security-requirements-07: (with DISCUSS and > > COMMENT) > > > > On Wed, Aug 17, 2016 at 09:16:48PM -0400, Susan Hares wrote: > > > ------------------------------------------------------------------ > > > -- > > > -- > > > COMMENT: > > > ------------------------------------------------------------------ > > > -- > > > -- > > > > > > > Section 3: > > > > Can you clarify the second to last sentence? Do you mean there > > > > are > > sections that indicate an insecure transport should be used? > > > > I2RS allows the use of an > > > > insecure transport for portions of data models that clearly > > > > indicate insecure transport. > > > > > > > Perhaps: > > > > I2RS allows the use of an > > > > insecure transport for portions of data models that clearly > > > > indicate the use of an insecure transport. > > > > I still wonder how a data model writer can reasonably decide whether > > a piece of information can be shipped safely over an insecure > > transport since this decision often depends on the specifics of a > > deployment > situation. > > > > /js > > > > PS: I hope we do not end up with defining data multiple times (once > > for insecure transport and once for secured transports). > > > > -- > > Juergen Schoenwaelder Jacobs University Bremen gGmbH > > Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | Germany > > Fax: +49 421 200 3103 <http://www.jacobs-university.de/> > > > > _______________________________________________ > > i2rs mailing list > > i2rs@ietf.org > > https://www.ietf.org/mailman/listinfo/i2rs > > -- > Juergen Schoenwaelder Jacobs University Bremen gGmbH > Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | Germany > Fax: +49 421 200 3103 <http://www.jacobs-university.de/> > > _______________________________________________ > i2rs mailing list > i2rs@ietf.org > https://www.ietf.org/mailman/listinfo/i2rs > -- Juergen Schoenwaelder Jacobs University Bremen gGmbH Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | Germany Fax: +49 421 200 3103 <http://www.jacobs-university.de/>
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Susan Hares
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Alia Atlas
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… William Atwood
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Susan Hares
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Andy Bierman
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Susan Hares
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… joel jaeggli
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Kathleen Moriarty
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Susan Hares
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Susan Hares
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Susan Hares
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Andy Bierman
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Kathleen Moriarty
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Susan Hares
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Andy Bierman
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Spencer Dawkins at IETF
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Susan Hares
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Susan Hares
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Spencer Dawkins at IETF
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Susan Hares
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Lou Berger
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Susan Hares
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Susan Hares
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Lou Berger
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Susan Hares
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Kathleen Moriarty
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… joel jaeggli
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Andy Bierman
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Andy Bierman
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Susan Hares
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… kathleen.moriarty.ietf
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Juergen Schoenwaelder
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Andy Bierman
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Susan Hares
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Andy Bierman
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Susan Hares
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Susan Hares
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Alissa Cooper
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Susan Hares
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Joel Halpern
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Susan Hares
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Susan Hares
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Kathleen Moriarty
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Susan Hares
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Kathleen Moriarty
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Juergen Schoenwaelder
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Kathleen Moriarty
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Susan Hares
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Juergen Schoenwaelder
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Susan Hares
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Juergen Schoenwaelder
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Susan Hares
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Joel M. Halpern
- [i2rs] Kathleen Moriarty's Discuss on draft-ietf-… Kathleen Moriarty
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Susan Hares
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Juergen Schoenwaelder
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Susan Hares
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Kathleen Moriarty
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Susan Hares
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… kathleen.moriarty.ietf
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Andy Bierman
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Jeffrey Haas
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Kathleen Moriarty
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Jeffrey Haas
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Kathleen Moriarty
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Susan Hares
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Andy Bierman
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Susan Hares
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Susan Hares
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Andy Bierman
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Juergen Schoenwaelder
- Re: [i2rs] Kathleen Moriarty's Discuss on draft-i… Jeffrey Haas