Re: [i2rs] Stephen Farrell's No Objection on draft-ietf-i2rs-problem-statement-10: (with COMMENT)
"Susan Hares" <shares@ndzh.com> Thu, 18 February 2016 13:29 UTC
Return-Path: <shares@ndzh.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 41E5E1A88B3; Thu, 18 Feb 2016 05:29:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -96.258
X-Spam-Level:
X-Spam-Status: No, score=-96.258 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DOS_OUTLOOK_TO_MX=2.845, FH_RELAY_NODNS=1.451, HELO_MISMATCH_COM=0.553, RDNS_NONE=0.793, USER_IN_WHITELIST=-100] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ywam15PrCd-9; Thu, 18 Feb 2016 05:29:25 -0800 (PST)
Received: from hickoryhill-consulting.com (unknown [50.245.122.97]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6F2051A88AF; Thu, 18 Feb 2016 05:29:25 -0800 (PST)
X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=74.43.47.30;
From: Susan Hares <shares@ndzh.com>
To: 'Stephen Farrell' <stephen.farrell@cs.tcd.ie>, 'The IESG' <iesg@ietf.org>
References: <20160215193747.13577.67670.idtracker@ietfa.amsl.com>
In-Reply-To: <20160215193747.13577.67670.idtracker@ietfa.amsl.com>
Date: Thu, 18 Feb 2016 08:29:11 -0500
Message-ID: <015801d16a50$5aa8e0c0$0ffaa240$@ndzh.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQEKBJwtMDUNAXUHFZkPBUuQFhXrM6DAl0Pg
Content-Language: en-us
X-Authenticated-User: skh@ndzh.com
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/kYVozTVY1d9bgxPxdx31cLH2RcI>
Cc: i2rs@ietf.org, bill.wu@huawei.com, i2rs-chairs@ietf.org, draft-ietf-i2rs-problem-statement@ietf.org
Subject: Re: [i2rs] Stephen Farrell's No Objection on draft-ietf-i2rs-problem-statement-10: (with COMMENT)
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 18 Feb 2016 13:29:27 -0000
Stephen: Resending my comments in respond to your ballot comment. Cheerily - Sue -------------------- - section 1: "different vendors' routing systems" seems like it's assuming that there is only one vendor involved in each box. I don't think that's consistent with what's behind i2rs so re-wording there might be better. Sue: At this point, the WG considers "routing" system to be a set of software running on some hardware, and not a box. In a server box, you can lots (10s or 100s) of different routing systems. Is there something in that paragraph that caused you to think it was a box? If so, please let the authors know. - figure 1: I'm sure you'll fix the page break Sue: Yes - it will get fix - confidentiality for i2rs protocol: if I can watch i2rs traffic I can probably infer what policies are being used and use that to better attack networks. I think you could easily strengthen the wording there and that'd be better. If one has a way to securely authenticate endpoints, then you can almost as easily ensure confidentiality. Sue: The protocol requirement document specifies confidential (encrypted) transport and securely authenticated endpoints (mutual authenticated identities, passed out of band - in AAA protocol) as the default. For a few data models, we may propose that the data reported (not the configuration or the set-up of the notification) to be in the clear. We hope the security directorate will work with us on these few models to minimize any potential security attacks or issues. - general question: We know that govts target network admins. What are we doing to make i2rs traffic less easily used as a selector? (e.g. make sure it could work over Tor?) Sue: Not sure I grok this comment. I2RS traffic will use existing transports (NETCONF/RESTCONF for config, IPFix/RESTCONF/NETCONF for data transfer). These work in virtual environments (see ODL). - the secdir review [1] called out some nits you may want to consider (if you did already thanks, I didn't check in detail) [1] https://www.ietf.org/mail-archive/web/secdir/current/msg06342.html Sue: We'll work on fixing nits in the next version. Alia Atlas whose got the editor pen should take care of that in a week. -----Original Message----- From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Stephen Farrell Sent: Monday, February 15, 2016 2:38 PM To: The IESG Cc: i2rs@ietf.org; bill.wu@huawei.com; draft-ietf-i2rs-problem-statement@ietf.org; i2rs-chairs@ietf.org Subject: [i2rs] Stephen Farrell's No Objection on draft-ietf-i2rs-problem-statement-10: (with COMMENT) Stephen Farrell has entered the following ballot position for draft-ietf-i2rs-problem-statement-10: No Objection When responding, please keep the subject line intact and reply to all email addresses included in the To and CC lines. (Feel free to cut this introductory paragraph, however.) Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html for more information about IESG DISCUSS and COMMENT positions. The document, along with other ballot positions, can be found here: https://datatracker.ietf.org/doc/draft-ietf-i2rs-problem-statement/ ---------------------------------------------------------------------- COMMENT: ---------------------------------------------------------------------- - section 1: "different vendors' routing systems" seems like it's assuming that there is only one vendor involved in each box. I don't think that's consistent with what's behind i2rs so re-wording there might be better. - figure 1: I'm sure you'll fix the page break - confidentiality for i2rs protocol: if I can watch i2rs traffic I can probably infer what policies are being used and use that to better attack networks. I think you could easily strengthen the wording there and that'd be better. If one has a way to securely authenticate endpoints, then you can almost as easily ensure confidentiality. - general question: We know that govts target network admins. What are we doing to make i2rs traffic less easily used as a selector? (e.g. make sure it could work over Tor?) - the secdir review [1] called out some nits you may want to consider (if you did already thanks, I didn't check in detail) [1] https://www.ietf.org/mail-archive/web/secdir/current/msg06342.html _______________________________________________ i2rs mailing list i2rs@ietf.org https://www.ietf.org/mailman/listinfo/i2rs
- [i2rs] Stephen Farrell's No Objection on draft-ie… Stephen Farrell
- Re: [i2rs] Stephen Farrell's No Objection on draf… Susan Hares