Re: [i2rs] Kathleen Moriarty's Discuss on draft-ietf-i2rs-protocol-security-requirements-07: (with DISCUSS and COMMENT)

Jeffrey Haas <> Mon, 22 August 2016 19:57 UTC

Return-Path: <>
Received: from localhost (localhost []) by (Postfix) with ESMTP id 788B912D5FB; Mon, 22 Aug 2016 12:57:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -2.45
X-Spam-Status: No, score=-2.45 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.548, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id L2TVDhLdA8ee; Mon, 22 Aug 2016 12:57:44 -0700 (PDT)
Received: from ( []) by (Postfix) with ESMTP id 630E712D177; Mon, 22 Aug 2016 12:57:44 -0700 (PDT)
Received: by (Postfix, from userid 1001) id 3C5491E32B; Mon, 22 Aug 2016 15:58:22 -0400 (EDT)
Date: Mon, 22 Aug 2016 15:58:22 -0400
From: Jeffrey Haas <>
To: Kathleen Moriarty <>
Message-ID: <>
References: <> <003801d1f97f$3d16eb10$b744c130$> <20160819085756.GA6759@elstar.local> <01e501d1fa07$6d613fe0$4823bfa0$> <> <027a01d1fa12$3879b270$a96d1750$> <> <> <> <>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <>
User-Agent: Mutt/1.5.21 (2010-09-15)
Archived-At: <>
X-Mailman-Approved-At: Tue, 23 Aug 2016 07:35:38 -0700
Cc: "" <>, Juergen Schoenwaelder <>, Alissa Cooper <>, Andy Bierman <>,, IESG <>, Joel Halpern <>, Lou Berger <>, Susan Hares <>,
Subject: Re: [i2rs] Kathleen Moriarty's Discuss on draft-ietf-i2rs-protocol-security-requirements-07: (with DISCUSS and COMMENT)
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Mon, 22 Aug 2016 19:57:45 -0000

On Mon, Aug 22, 2016 at 03:51:09PM -0400, Kathleen Moriarty wrote:
> > The underlying I2RS question is how to mark nodes in such a way that the
> > insecure transport protocols may be permitted to publish them without
> > requiring every single node to be audited if you have relatively weak
> > deployment considerations?  If the answer is "read the security
> > considerations and write a filter", it's not the answer i2rs is looking for.
> I think it's just that it is easier to mark the items that require
> confidentiality and integrity protection, when that is clear, rather
> than trying to figure out that something is absolutely not in need of
> any confidentiality and integrity protections.

I think I2RS has done generally better than that.  When not so marked, the
intent is secure.

>From a syntactic standpoint, it's much nicer to add keywords for the
exceptions rather than the default. :-)

> In this case, you are
> not saying that items don't need security, you are just not taking an
> official stance and it's up to the user to turn on or off the default
> knob for session transport security.

Mostly I'm saying that once you have annotated some data node as being "okay
to be insecure", the user can have tools to programmatically act upon that
based on information in the model.  Lacking that, we're back in SNMP land
wherein people have to put in per-object filters to implement this.

Note this is "can act".  It'd be fine to have your policy be "even if marked
insecure, leave secure".  It's even fine, IMO (but not as an author of this
document), for such "leave secure unless otherwise configured" to be the
mandatory to implement default.

I'm somewhat curious if you've done such configuration in SNMP.  It's a
PITA. :-)

-- Jeff