Re: [Netconf] [saag] I-D Action: draft-ietf-netconf-reverse-ssh-00.txt

Kent Watsen <kwatsen@juniper.net> Wed, 19 June 2013 22:03 UTC

Return-Path: <kwatsen@juniper.net>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 179BF21F9D4D; Wed, 19 Jun 2013 15:03:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.467
X-Spam-Level:
X-Spam-Status: No, score=-1.467 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, SARE_RAND_6=2, UNRESOLVED_TEMPLATE=3.132]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JkAp7Un5GwrA; Wed, 19 Jun 2013 15:03:33 -0700 (PDT)
Received: from co9outboundpool.messaging.microsoft.com (co9ehsobe001.messaging.microsoft.com [207.46.163.24]) by ietfa.amsl.com (Postfix) with ESMTP id 56E2921F9D70; Wed, 19 Jun 2013 15:03:33 -0700 (PDT)
Received: from mail78-co9-R.bigfish.com (10.236.132.249) by CO9EHSOBE012.bigfish.com (10.236.130.75) with Microsoft SMTP Server id 14.1.225.23; Wed, 19 Jun 2013 22:03:32 +0000
Received: from mail78-co9 (localhost [127.0.0.1]) by mail78-co9-R.bigfish.com (Postfix) with ESMTP id AFAB7A01E2; Wed, 19 Jun 2013 22:03:32 +0000 (UTC)
X-Forefront-Antispam-Report: CIP:66.129.224.52; KIP:(null); UIP:(null); IPV:NLI; H:P-EMHUB03-HQ.jnpr.net; RD:none; EFVD:NLI
X-SpamScore: -26
X-BigFish: PS-26(zzbb2dI98dI9371I936eI1432I4015Izz1f42h1ee6h1de0h1fdah1202h1e76h1d1ah1d2ah1fc6hzz1033IL17326ah8275dhz2fh2a8h683h839h944he5bhf0ah1220h1288h12a5h12a9h12bdh137ah13b6h1441h1504h1537h153bh162dh1631h1758h18e1h1946h19b5h1ad9h1b0ah1d0ch1d2eh1d3fh1dc1h1dfeh1dffh1e1dh1155h)
Received-SPF: pass (mail78-co9: domain of juniper.net designates 66.129.224.52 as permitted sender) client-ip=66.129.224.52; envelope-from=kwatsen@juniper.net; helo=P-EMHUB03-HQ.jnpr.net ; -HQ.jnpr.net ;
X-Forefront-Antispam-Report-Untrusted: CIP:157.56.245.197; KIP:(null); UIP:(null); (null); H:CH1PRD0511HT005.namprd05.prod.outlook.com; R:internal; EFV:INT
Received: from mail78-co9 (localhost.localdomain [127.0.0.1]) by mail78-co9 (MessageSwitch) id 1371679410187461_5539; Wed, 19 Jun 2013 22:03:30 +0000 (UTC)
Received: from CO9EHSMHS005.bigfish.com (unknown [10.236.132.230]) by mail78-co9.bigfish.com (Postfix) with ESMTP id 2B9802E0062; Wed, 19 Jun 2013 22:03:30 +0000 (UTC)
Received: from P-EMHUB03-HQ.jnpr.net (66.129.224.52) by CO9EHSMHS005.bigfish.com (10.236.130.15) with Microsoft SMTP Server (TLS) id 14.1.225.23; Wed, 19 Jun 2013 22:03:27 +0000
Received: from P-CLDFE02-HQ.jnpr.net (172.24.192.60) by P-EMHUB03-HQ.jnpr.net (172.24.192.37) with Microsoft SMTP Server (TLS) id 8.3.213.0; Wed, 19 Jun 2013 15:03:26 -0700
Received: from o365mail.juniper.net (207.17.137.224) by o365mail.juniper.net (172.24.192.60) with Microsoft SMTP Server id 14.1.355.2; Wed, 19 Jun 2013 15:03:25 -0700
Received: from CO9EHSOBE038.bigfish.com (207.46.163.27) by o365mail.juniper.net (207.17.137.224) with Microsoft SMTP Server (TLS) id 14.1.355.2; Wed, 19 Jun 2013 15:15:24 -0700
Received: from mail121-co9-R.bigfish.com (10.236.132.254) by CO9EHSOBE038.bigfish.com (10.236.130.101) with Microsoft SMTP Server id 14.1.225.23; Wed, 19 Jun 2013 22:03:25 +0000
Received: from mail121-co9 (localhost [127.0.0.1]) by mail121-co9-R.bigfish.com (Postfix) with ESMTP id 30E66940342; Wed, 19 Jun 2013 22:03:25 +0000 (UTC)
Received: from mail121-co9 (localhost.localdomain [127.0.0.1]) by mail121-co9 (MessageSwitch) id 1371679403250852_30544; Wed, 19 Jun 2013 22:03:23 +0000 (UTC)
Received: from CO9EHSMHS024.bigfish.com (unknown [10.236.132.239]) by mail121-co9.bigfish.com (Postfix) with ESMTP id 31204BC004C; Wed, 19 Jun 2013 22:03:23 +0000 (UTC)
Received: from CH1PRD0511HT005.namprd05.prod.outlook.com (157.56.245.197) by CO9EHSMHS024.bigfish.com (10.236.130.34) with Microsoft SMTP Server (TLS) id 14.1.225.23; Wed, 19 Jun 2013 22:03:21 +0000
Received: from CH1PRD0511MB407.namprd05.prod.outlook.com ([169.254.5.216]) by CH1PRD0511HT005.namprd05.prod.outlook.com ([10.255.159.40]) with mapi id 14.16.0324.000; Wed, 19 Jun 2013 22:03:21 +0000
From: Kent Watsen <kwatsen@juniper.net>
To: Jeffrey Hutzelman <jhutz@cmu.edu>, ietfdbh <ietfdbh@comcast.net>
Thread-Topic: [saag] I-D Action: draft-ietf-netconf-reverse-ssh-00.txt
Thread-Index: AQHObRGgGnqI147cKUqC8qWv6JY1X5k9VGoA
Date: Wed, 19 Jun 2013 22:03:20 +0000
Message-ID: <CDE773CC.3867A%kwatsen@juniper.net>
In-Reply-To: <1371662516.23088.44.camel@destiny.pc.cs.cmu.edu>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/14.3.2.130206
x-originating-ip: [10.255.159.4]
Content-Type: text/plain; charset="us-ascii"
Content-ID: <AF510D2C49BAB64CA7D460D313933937@namprd05.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-FOPE-CONNECTOR: Id%0$Dn%*$RO%0$TLS%0$FQDN%$TlsDn%
X-FOPE-CONNECTOR: Id%12219$Dn%CMU.EDU$RO%2$TLS%5$FQDN%onpremiseedge-1018244.customer.frontbridge.com$TlsDn%o365mail.juniper.net
X-FOPE-CONNECTOR: Id%12219$Dn%COMCAST.NET$RO%2$TLS%5$FQDN%onpremiseedge-1018244.customer.frontbridge.com$TlsDn%o365mail.juniper.net
X-FOPE-CONNECTOR: Id%12219$Dn%TOOLS.IETF.ORG$RO%2$TLS%5$FQDN%onpremiseedge-1018244.customer.frontbridge.com$TlsDn%o365mail.juniper.net
X-FOPE-CONNECTOR: Id%12219$Dn%IETF.ORG$RO%2$TLS%5$FQDN%onpremiseedge-1018244.customer.frontbridge.com$TlsDn%o365mail.juniper.net
X-OriginatorOrg: juniper.net
Cc: "draft-ietf-netconf-reverse-ssh@tools.ietf.org" <draft-ietf-netconf-reverse-ssh@tools.ietf.org>, "netconf@ietf.org" <netconf@ietf.org>, "saag@ietf.org" <saag@ietf.org>
Subject: Re: [Netconf] [saag] I-D Action: draft-ietf-netconf-reverse-ssh-00.txt
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/netconf>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Jun 2013 22:03:39 -0000

Hi Jeff,

You've touched on a lot of points.

First, yes, this was discussed a couple years ago.  I wanted this
submission to indicate it was a continuation of the previous I-D
draft-kwatsen-reverse-ssh-01.  That it doesn't is only because
I didn't see an option to indicate that during submission - I'll
check again...

The discussion from two years ago died because no common ground
could be reached.  It has resurfaced now because operators have
requested the NETCONF WG to define strategies for devices to
"call home" using both NETCONF's transports, SSH and TLS.  The
NETCONF WG has now chartered this work and I volunteered to pick
it up again.

>From a protocol perspective, the solution presented in this draft
is the same as presented in draft-kwatsen-reverse-ssh-01 with one
exception, it now requests an IANA-assigned port, instead of using
port 22, to be consistent with draft-ietf-netconf-rfc5539bis-03,
which makes the same request.

Regarding the security aspects of running SSH "in reverse", this
draft's Security Considerations section has been greatly expanded
to address this concern and I very much hope that the SAAG will
take it up now.  I also hope SAAG will consider the security
aspects of running TLS "in reverse", as one of my comments on
rfc5539bis-03 [1] was that doing so would enable the "client" to
defer sending its client-certificate until after receiving the
server's cert, consistent with draft-agl-tls-encryptedclientcerts
and draft-badra-tls-identity-protection.  Though both of these
drafts are now defunct, it seems that there's sufficient interest
in protecting the client's identity, which a TLS-based "call home"
could only leverage someday if it ran TLS "in reverse" as well.

Finally, regarding the HMAC-* family of public host key algorithms,
I think herein lies a good reason to extract them into a draft of
their own, as it would be a shame for them to distract from the
primary discussion of running SSH (and TLS) in reverse.


[1] http://www.ietf.org/mail-archive/web/netconf/current/msg08075.html

Thanks,
Kent



On 6/19/13 1:21 PM, "Jeffrey Hutzelman" <jhutz@cmu.edu> wrote:

>On Wed, 2013-06-19 at 10:02 -0400, ietfdbh wrote:
>> Hi Kent,
>> 
>> I think your draft needs to target two different audiences - the
>>security
>> audience for SSH security considerations, and application designers that
>> want to use reverse-SSH, such as Netconf.
>
>This was discussed two years ago on the ietf-ssh mailing list, which is
>the appropriate forum for discussion of SSH extensions and protocol
>changes.  There was much discussion about what port number things should
>run on, but unfortunately relatively little discussion of the security
>aspects of running SSH "in reverse" like this.
>
>I haven't read this recent document, but when this came up in 2011, I
>was concerned about the security aspects of running SSH "in reverse"
>like this; it's really not designed for that.  I expressed concerns
>about the new hmac-* host key algorithms defined in that version, about
>the layering violations inherent in using them for negotiation, and
>commented that they don't really provide any operational advantage over
>using X.509 certificates or pre-shared RSA keys.  Those comments were
>never really addressed.
>
>
>The SECSH WG concluded some time ago, but its mailing list is still
>somewhat active and regularly discusses SSH protocol extensions.  I
>would be very concerned if the NETCONF WG were to send the IESG an SSH
>protocol document without the involvement of that group.  I will note
>that the 2011 discussion included approaches that did not require this
>level of protocol change, or indeed any.  I'm fine with NETCONF not
>having chosen one of those approaches, but this really does need to
>involve people with SSH expertise.
>
>-- Jeff
>
>
>