[i2rs] info-model for traceability and accountability??

Alia Atlas <akatlas@gmail.com> Wed, 14 August 2013 19:26 UTC

Return-Path: <akatlas@gmail.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DD5C811E80FF for <i2rs@ietfa.amsl.com>; Wed, 14 Aug 2013 12:26:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.501
X-Spam-Level:
X-Spam-Status: No, score=-2.501 tagged_above=-999 required=5 tests=[AWL=0.098, BAYES_00=-2.599, HTML_MESSAGE=0.001, NO_RELAYS=-0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aG0dfS8mITFS for <i2rs@ietfa.amsl.com>; Wed, 14 Aug 2013 12:26:16 -0700 (PDT)
Received: from mail-ob0-x22f.google.com (mail-ob0-x22f.google.com [IPv6:2607:f8b0:4003:c01::22f]) by ietfa.amsl.com (Postfix) with ESMTP id 2835521F99DD for <i2rs@ietf.org>; Wed, 14 Aug 2013 12:26:16 -0700 (PDT)
Received: by mail-ob0-f175.google.com with SMTP id xn12so12568363obc.34 for <i2rs@ietf.org>; Wed, 14 Aug 2013 12:26:15 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:date:message-id:subject:from:to:cc:content-type; bh=dLJ13JK0p6uVIiZnK9Raj0ipXOOAK1jex/uGXwPbDOo=; b=LS0O3G6dho1LV86EN7uzkD5L5+h69BmAoEiMExfhJQjISFqbWg8bXCeZJe+w4Ctgk2 TPKs6W9Ogn3/Kwoyn2GO8xUN+Zg6matLHg3Y4k+ccw2yUDNvOUhqyN3C1Q/2I/SiwB78 CPP0CO/bY95BUgXTBtnAxRwFusm3aYv22qC7bZF8nwnxD5cHoZvdDn3aK3P67bgxjpt2 MTHbehipy1ySnU2gsdyBYgv8VlKzkC5JcJD9Uy2E8Y/9n/LASrIFs/GtzqY/wwY6szeF QLnXwsTQLn0IfnordCEMAvOl/9VTtPJ5e7cAe2DG3JBwApTkVzhXYhFK6ew/oA0QOPId j2+Q==
MIME-Version: 1.0
X-Received: by 10.182.241.71 with SMTP id wg7mr13496855obc.50.1376508375597; Wed, 14 Aug 2013 12:26:15 -0700 (PDT)
Received: by 10.182.221.98 with HTTP; Wed, 14 Aug 2013 12:26:15 -0700 (PDT)
Date: Wed, 14 Aug 2013 15:26:15 -0400
Message-ID: <CAG4d1rcZWnXZBukLD+1E-S+Ccf42jLR_=tYozs9tZDwkugyU6g@mail.gmail.com>
From: Alia Atlas <akatlas@gmail.com>
To: Joe Marcus Clarke <jclarke@cisco.com>
Content-Type: multipart/alternative; boundary="001a11c2e0f0c20a1004e3ed54b7"
Cc: "i2rs@ietf.org" <i2rs@ietf.org>, Joel Halpern <joel.halpern@ericsson.com>, "lberger@labn.net" <lberger@labn.net>
Subject: [i2rs] info-model for traceability and accountability??
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/i2rs>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 14 Aug 2013 19:26:18 -0000

I am pulling this into a separate thread because I think that it merits
some discussion.
There seems to be a strong desire for easy
traceability/accountability/troubleshooting that is better than just syslog
or screen-scraping - something that is vendor-agnostic.

The idea of having the I2RS Agent store all the operations and attribution
done is not appealing.  Clearly, the most recent writer of data will need
to be stored.

Perhaps an info-model would be useful - and then an I2RS agent could write
the data to a file in a structured format?  Perhaps there needs to be some
specific interactions with the files - ability to fetch, rotate, clear?
 I'm not sure what's needed.

Should this be the same info-model that describes the connections to the
I2RS agent and relevant information and counters?

Do we have anyone motivated and interested in this particular area enough
to write up a short/quick draft and drive discussion?

Thanks,
Alia

On Wed, Aug 14, 2013 at 1:49 PM, Joe Marcus Clarke <jclarke@cisco.com>wrote:

> On 8/13/13 4:58 PM, Alia Atlas wrote:
> > I am going to publish an updated version of
> > draft-atlas-i2rs-architecture without fully addressing this point.
> >
> > I did add in a new subsection (6.4.1 Client Redundancy) under 6.4
> > Identity and Security Role that says:
> >
> > "I2RS must support client redundancy.  At the simplest, this can be
> > handled by having a primary and a backup network application that both
> > use the same client identity and can successfully authenticate as
> > such.  Since I2RS does not require a continuous transport connection
> > and supports multiple transport sessions, this can provide some basic
> > redundancy.  However, it does not address concerns for troubleshooting
> > and accountability about knowing which network application is actually
> > active.  At a minimum, basic transport information about each
> > connection and time can be logged with the identity.  Further
> > discussion is necessary to determine whether additional client
> > identification information is necessary.[[Editor's
> > note: This requires more discussion in the working group.]]"
>
> This is fine as a start.  I would want to strengthen the language to
> ensure that an I2RS Agent always stores Client connection information
> with a timestamp.  This information should be queriable via I2RS (with
> appropriate read scope).
>
> Joe
>
> >
> > Alia
> >
> >
> > On Thu, Aug 1, 2013 at 7:28 PM, Joe Marcus Clarke <jclarke@cisco.com
> > <mailto:jclarke@cisco.com>> wrote:
> >
> >     On 8/1/13 11:19 AM, Alia Atlas wrote:
> >     > Joe,
> >     >
> >     > Ok - so what I hear from you is needed is the
> >     >    client role
> >     >    client identity
> >     >    sub-client identity?
> >     >
> >     > Where the permissions and ownership of state is tied to the client
> >     role?
> >     >  Does that match to what you are saying?  I believe we're assuming
> >     that
> >     > the ownership of state is tied to the client identity - and you are
> >     > suggesting that if so, we need a client sub-identity or such?
> >
> >     Yes, I think that is in line with what I'm suggesting.  If we can
> allow
> >     Client A to assume the identity of Client B using the same
> credentials,
> >     I would want some way to know that this is indeed Client B now
> acting on
> >     behalf of either itself or some northbound controller.
> >
> >     Joe
> >
> >     >
> >     > Alia
> >     >
> >     >
> >     > On Thu, Aug 1, 2013 at 11:15 AM, Joe Marcus Clarke
> >     <jclarke@cisco.com <mailto:jclarke@cisco.com>
> >     > <mailto:jclarke@cisco.com <mailto:jclarke@cisco.com>>> wrote:
> >     >
> >     >     On 8/1/13 11:11 AM, Joel Halpern wrote:
> >     >     > The client is the entity that is authenticated and
> >     authorized. If the
> >     >     > client is acting on behalf of someone else, we assume that
> the
> >     >     > authentication and authorization of that party is the task
> >     of the
> >     >     client
> >     >     > and outside our scope. However we include that identity so
> that
> >     >     actions
> >     >     > can be easily correlated with originators.
> >     >
> >     >     Right.  I get that.  I had thought we were talking about two
> >     clients
> >     >     that might be redundant to each other where Client 1 dies and
> >     Client 2
> >     >     assumes its identity to make changes possibly driven by
> northbound
> >     >     actors.  Even in this case, I feel Client 2 still needs to
> >     maintain a
> >     >     unique identification to the I2RS agent so that one can trace
> the
> >     >     operation back to the specific I2RS client (in addition to the
> >     >     northbound actor).
> >     >
> >     >     Joe
> >     >
> >     >     >
> >     >     > Yours,
> >     >     > Joel
> >     >     >
> >     >     > Sent from my Android phone using TouchDown
> >     (www.nitrodesk.com <http://www.nitrodesk.com>
> >     >     <http://www.nitrodesk.com>)
> >     >     >
> >     >     > -----Original Message-----
> >     >     > *From:* Joe Marcus Clarke [jclarke@cisco.com
> >     <mailto:jclarke@cisco.com>
> >     >     <mailto:jclarke@cisco.com <mailto:jclarke@cisco.com>>]
> >     >     > *Received:* Thursday, 01 Aug 2013, 17:07
> >     >     > *To:* Alia Atlas [akatlas@gmail.com
> >     <mailto:akatlas@gmail.com> <mailto:akatlas@gmail.com
> >     <mailto:akatlas@gmail.com>>]
> >     >     > *CC:* Lou Berger [lberger@labn.net <mailto:lberger@labn.net>
> >     <mailto:lberger@labn.net <mailto:lberger@labn.net>>];
> >     >     i2rs@ietf.org <mailto:i2rs@ietf.org> <mailto:i2rs@ietf.org
> >     <mailto:i2rs@ietf.org>> [i2rs@ietf.org <mailto:i2rs@ietf.org>
> >     >     <mailto:i2rs@ietf.org <mailto:i2rs@ietf.org>>]; Joel
> >     >     > Halpern [joel.halpern@ericsson.com
> >     <mailto:joel.halpern@ericsson.com> <mailto:joel.halpern@ericsson.com
> >     <mailto:joel.halpern@ericsson.com>>]
> >     >     > *Subject:* Re: [i2rs] Provisions for Client Redundancy/Fault
> >     Tolerance
> >     >     > in draft-atlas-i2rs-architecture-01
> >     >     >
> >     >     > On 8/1/13 7:51 AM, Alia Atlas wrote:
> >     >     >> Not to answer for Joel, but my view is that a client is
> >     identified by
> >     >     >> its identity.  A different application can take over from
> the
> >     >     first by
> >     >     >> using the same identity.  Loss of a transport session does
> >     not cause
> >     >     >> existing client state to be removed (in the architecture) -
> so
> >     >     there is
> >     >     >> the ability for a new application to take over.
> >     >     >>
> >     >     >> Does that help?
> >     >     >
> >     >     > That worries me without more discussion about authentication.
> >     >     > Additionally, from a troubleshooting standpoint, if I can
> >     assume the
> >     >     > same identity as another client, how can I be absolutely
> >     sure which
> >     >     > client does what to the agent?  I feel there needs to be
> more to
> >     >     ensure
> >     >     > accountability of what client does what, certainly from a
> >     security
> >     >     > perspective, but also from a troubleshooting perspective.
> >     >     >
> >     >     > Joe
> >     >     >
> >     >     >>
> >     >     >> Alia
> >     >     >>
> >     >     >>
> >     >     >> On Thu, Aug 1, 2013 at 7:40 AM, Lou Berger
> >     <lberger@labn.net <mailto:lberger@labn.net>
> >     >     <mailto:lberger@labn.net <mailto:lberger@labn.net>>
> >     >     >> <mailto:lberger@labn.net <mailto:lberger@labn.net>
> >     <mailto:lberger@labn.net <mailto:lberger@labn.net>>>> wrote:
> >     >     >>
> >     >     >>     Hi Joel,
> >     >     >>             In today's session, I asked about provisions in
> the
> >     >     architecture
> >     >     >>     (document) for Client Redundancy/Fault Tolerance. I
> believe
> >     >     you stated
> >     >     >>     that "it's not needed" and that you'd elaborate on the
> >     list.
> >     >     >>
> >     >     >>     I believe you also answered a latter question by
> >     stating that
> >     >     clients
> >     >     >>     are free to coordinate between themselves to provide
> >     >     redundancy. Is this
> >     >     >>     the simple answer?  If not, can you elaborate?
> >     >     >>
> >     >     >>     Thanks,
> >     >     >>     Lou
> >     >     >>     _______________________________________________
> >     >     >>     i2rs mailing list
> >     >     >>     i2rs@ietf.org <mailto:i2rs@ietf.org>
> >     <mailto:i2rs@ietf.org <mailto:i2rs@ietf.org>> <mailto:i2rs@ietf.org
> >     <mailto:i2rs@ietf.org>
> >     >     <mailto:i2rs@ietf.org <mailto:i2rs@ietf.org>>>
> >     >     >>     https://www.ietf.org/mailman/listinfo/i2rs
> >     >     >>
> >     >     >>
> >     >     >>
> >     >     >>
> >     >     >> _______________________________________________
> >     >     >> i2rs mailing list
> >     >     >> i2rs@ietf.org <mailto:i2rs@ietf.org> <mailto:i2rs@ietf.org
> >     <mailto:i2rs@ietf.org>>
> >     >     >> https://www.ietf.org/mailman/listinfo/i2rs
> >     >     >>
> >     >     >
> >     >     >
> >     >     > --
> >     >     > Joe Marcus Clarke, CCIE #5384,         |          |
> >     >     > SCJP, SCSA, SCNA, SCSECA, VCP        |||||      |||||
> >     >     > Distinguished Services Engineer ..:|||||||||::|||||||||:..
> >     >     > Phone: +1 (919) 392-2867 <tel:%2B1%20%28919%29%20392-2867>
> >     <tel:%2B1%20%28919%29%20392-2867>
> >     >     c i s c o  S y s t e m s
> >     >     > Email: jclarke@cisco.com <mailto:jclarke@cisco.com>
> >     <mailto:jclarke@cisco.com <mailto:jclarke@cisco.com>>
> >     >     >
> >     >     >
> >     >
> >
> ----------------------------------------------------------------------------
> >     >
> >     >
> >     >     --
> >     >     Joe Marcus Clarke, CCIE #5384,         |          |
> >     >     SCJP, SCSA, SCNA, SCSECA, VCP        |||||      |||||
> >     >     Distinguished Services Engineer ..:|||||||||::|||||||||:..
> >     >     Phone: +1 (919) 392-2867 <tel:%2B1%20%28919%29%20392-2867>
> >     <tel:%2B1%20%28919%29%20392-2867>         c
> >     >     i s c o  S y s t e m s
> >     >     Email: jclarke@cisco.com <mailto:jclarke@cisco.com>
> >     <mailto:jclarke@cisco.com <mailto:jclarke@cisco.com>>
> >     >
> >     >
> >
> ----------------------------------------------------------------------------
> >     >
> >     >
> >
> >
> >     --
> >     Joe Marcus Clarke, CCIE #5384,         |          |
> >     SCJP, SCSA, SCNA, SCSECA, VCP        |||||      |||||
> >     Distinguished Services Engineer ..:|||||||||::|||||||||:..
> >     Phone: +1 (919) 392-2867 <tel:%2B1%20%28919%29%20392-2867>         c
> >     i s c o  S y s t e m s
> >     Email: jclarke@cisco.com <mailto:jclarke@cisco.com>
> >
> >
> ----------------------------------------------------------------------------
> >
> >
> >
> >
> > _______________________________________________
> > i2rs mailing list
> > i2rs@ietf.org
> > https://www.ietf.org/mailman/listinfo/i2rs
> >
>
>
> --
> Joe Marcus Clarke, CCIE #5384,         |          |
> SCJP, SCSA, SCNA, SCSECA, VCP        |||||      |||||
> Distinguished Services Engineer ..:|||||||||::|||||||||:..
> Phone: +1 (919) 392-2867         c i s c o  S y s t e m s
> Email: jclarke@cisco.com
>
>
> ----------------------------------------------------------------------------
>