Re: [i2rs] Stephen Farrell's No Objection on draft-ietf-i2rs-problem-statement-10: (with COMMENT)

"Susan Hares" <shares@ndzh.com> Thu, 18 February 2016 13:29 UTC

Return-Path: <shares@ndzh.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 41E5E1A88B3; Thu, 18 Feb 2016 05:29:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -96.258
X-Spam-Level:
X-Spam-Status: No, score=-96.258 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DOS_OUTLOOK_TO_MX=2.845, FH_RELAY_NODNS=1.451, HELO_MISMATCH_COM=0.553, RDNS_NONE=0.793, USER_IN_WHITELIST=-100] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ywam15PrCd-9; Thu, 18 Feb 2016 05:29:25 -0800 (PST)
Received: from hickoryhill-consulting.com (unknown [50.245.122.97]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6F2051A88AF; Thu, 18 Feb 2016 05:29:25 -0800 (PST)
X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=74.43.47.30;
From: Susan Hares <shares@ndzh.com>
To: 'Stephen Farrell' <stephen.farrell@cs.tcd.ie>, 'The IESG' <iesg@ietf.org>
References: <20160215193747.13577.67670.idtracker@ietfa.amsl.com>
In-Reply-To: <20160215193747.13577.67670.idtracker@ietfa.amsl.com>
Date: Thu, 18 Feb 2016 08:29:11 -0500
Message-ID: <015801d16a50$5aa8e0c0$0ffaa240$@ndzh.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQEKBJwtMDUNAXUHFZkPBUuQFhXrM6DAl0Pg
Content-Language: en-us
X-Authenticated-User: skh@ndzh.com
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/kYVozTVY1d9bgxPxdx31cLH2RcI>
Cc: i2rs@ietf.org, bill.wu@huawei.com, i2rs-chairs@ietf.org, draft-ietf-i2rs-problem-statement@ietf.org
Subject: Re: [i2rs] Stephen Farrell's No Objection on draft-ietf-i2rs-problem-statement-10: (with COMMENT)
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 18 Feb 2016 13:29:27 -0000

Stephen: 

Resending my comments in respond to your ballot comment. 

Cheerily - Sue 
--------------------

- section 1: "different vendors' routing systems" seems like
it's assuming that there is only one vendor involved in each
box. I don't think that's consistent with what's behind i2rs so
re-wording there might be better. 

Sue: At this point, the WG considers "routing" system to be a set of
software running on some hardware, and not a box.  In a server box, you can
lots (10s or 100s) of different routing systems.  Is there something in that
paragraph that caused you to think it was a box?  If so, please let the
authors know. 


- figure 1: I'm sure you'll fix the page break
Sue: Yes - it will get fix 

- confidentiality for i2rs protocol: if I can watch i2rs traffic
I can probably infer what policies are being used and use that
to better attack networks. I think you could easily strengthen
the wording there and that'd be better.  If one has a way to
securely authenticate endpoints, then you can almost as easily
ensure confidentiality. 

Sue: The protocol requirement document specifies confidential (encrypted)
transport and securely authenticated endpoints (mutual authenticated
identities,  passed out of band - in AAA protocol) as the default. For a few
data models, we may propose that the data reported (not the configuration or
the set-up of the notification) to be in the clear.  We hope the security
directorate will work with us on these few models to minimize any potential
security attacks or issues.  
 
- general question: We know that govts target network admins.
What are we doing to make i2rs traffic less easily used as a
selector? (e.g. make sure it could work over Tor?)

Sue: Not sure I grok this comment.  I2RS traffic will use existing
transports (NETCONF/RESTCONF for config, IPFix/RESTCONF/NETCONF for data
transfer).  These work in virtual environments (see ODL). 


- the secdir review [1] called out some nits you may want to
consider (if you did already thanks, I didn't check in detail)

  [1] https://www.ietf.org/mail-archive/web/secdir/current/msg06342.html
Sue: We'll work on fixing nits in the next version.  Alia Atlas whose got
the editor pen should take care of that in a week. 


-----Original Message-----
From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Stephen Farrell
Sent: Monday, February 15, 2016 2:38 PM
To: The IESG
Cc: i2rs@ietf.org; bill.wu@huawei.com;
draft-ietf-i2rs-problem-statement@ietf.org; i2rs-chairs@ietf.org
Subject: [i2rs] Stephen Farrell's No Objection on
draft-ietf-i2rs-problem-statement-10: (with COMMENT)

Stephen Farrell has entered the following ballot position for
draft-ietf-i2rs-problem-statement-10: No Objection

When responding, please keep the subject line intact and reply to all email
addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-i2rs-problem-statement/



----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------


- section 1: "different vendors' routing systems" seems like it's assuming
that there is only one vendor involved in each box. I don't think that's
consistent with what's behind i2rs so re-wording there might be better. 

- figure 1: I'm sure you'll fix the page break

- confidentiality for i2rs protocol: if I can watch i2rs traffic I can
probably infer what policies are being used and use that to better attack
networks. I think you could easily strengthen the wording there and that'd
be better.  If one has a way to securely authenticate endpoints, then you
can almost as easily ensure confidentiality. 

- general question: We know that govts target network admins.
What are we doing to make i2rs traffic less easily used as a selector? (e.g.
make sure it could work over Tor?)

- the secdir review [1] called out some nits you may want to consider (if
you did already thanks, I didn't check in detail)

  [1] https://www.ietf.org/mail-archive/web/secdir/current/msg06342.html


_______________________________________________
i2rs mailing list
i2rs@ietf.org
https://www.ietf.org/mailman/listinfo/i2rs