[Netconf] FW: David Harrington's Discuss on draft-ietf-netconf-rfc4742bis-07: (withDISCUSS and COMMENT)

"Ersue, Mehmet (NSN - DE/Munich)" <mehmet.ersue@nsn.com> Thu, 03 March 2011 16:07 UTC

Return-Path: <mehmet.ersue@nsn.com>
X-Original-To: netconf@core3.amsl.com
Delivered-To: netconf@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0AF7E3A69A1 for <netconf@core3.amsl.com>; Thu, 3 Mar 2011 08:07:01 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.535
X-Spam-Level:
X-Spam-Status: No, score=-106.535 tagged_above=-999 required=5 tests=[AWL=0.064, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0vWBe7t8fIaK for <netconf@core3.amsl.com>; Thu, 3 Mar 2011 08:06:59 -0800 (PST)
Received: from demumfd002.nsn-inter.net (demumfd002.nsn-inter.net [93.183.12.31]) by core3.amsl.com (Postfix) with ESMTP id BC43D3A6821 for <netconf@ietf.org>; Thu, 3 Mar 2011 08:06:56 -0800 (PST)
Received: from demuprx016.emea.nsn-intra.net ([10.150.129.55]) by demumfd002.nsn-inter.net (8.12.11.20060308/8.12.11) with ESMTP id p23G83EU024687 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK) for <netconf@ietf.org>; Thu, 3 Mar 2011 17:08:03 +0100
Received: from demuexc022.nsn-intra.net (demuexc022.nsn-intra.net [10.150.128.35]) by demuprx016.emea.nsn-intra.net (8.12.11.20060308/8.12.11) with ESMTP id p23G7wNh005685 for <netconf@ietf.org>; Thu, 3 Mar 2011 17:08:03 +0100
Received: from DEMUEXC006.nsn-intra.net ([10.150.128.18]) by demuexc022.nsn-intra.net with Microsoft SMTPSVC(6.0.3790.4675); Thu, 3 Mar 2011 17:08:02 +0100
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
Date: Thu, 03 Mar 2011 17:08:01 +0100
Message-ID: <80A0822C5E9A4440A5117C2F4CD36A6401B929D8@DEMUEXC006.nsn-intra.net>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: David Harrington's Discuss on draft-ietf-netconf-rfc4742bis-07: (withDISCUSS and COMMENT)
Thread-Index: AcvXljnURMOJEwOuTVuDCR2OaI5dTAAjNFZwAA02O7AAA23HQABLGLPAAAhiquAAAdH/4AAAfp3g
From: "Ersue, Mehmet (NSN - DE/Munich)" <mehmet.ersue@nsn.com>
To: Netconf <netconf@ietf.org>
X-OriginalArrivalTime: 03 Mar 2011 16:08:02.0779 (UTC) FILETIME=[2C703AB0:01CBD9BD]
Subject: [Netconf] FW: David Harrington's Discuss on draft-ietf-netconf-rfc4742bis-07: (withDISCUSS and COMMENT)
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/netconf>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 03 Mar 2011 16:07:01 -0000

Hi All,

I assume this is the only remaining DISCUSS.

Any comments? Pls also check the mail below from 
David Harrington.

Mehmet 


-----Original Message-----
From: Ersue, Mehmet (NSN - DE/Munich) 
Sent: Thursday, March 03, 2011 5:04 PM
To: 'ext David Harrington'
Cc: draft-ietf-netconf-rfc4742bis@tools.ietf.org; 'ext Romascanu, Dan
(Dan)'; bertietf@bwijnen.net; 'The IESG'
Subject: RE: David Harrington's Discuss on
draft-ietf-netconf-rfc4742bis-07: (withDISCUSS and COMMENT)

Hi David,

I think we need to differentiate between NETCONF message layer 
and transport layer.

I also think the SSH transport document should not define how 
a username should look like nor define any transformation 
algorithm from format A to format X.

SSH transport is kept simple for what it transports and does 
also not interpret any XML content.

SSH transport depends at the end on what it gets from underlying 
SSH implementation.

I believe to define any constraints on the username is more 
appropriate to do in the NETCONF base document rather than 
in 4742bis.

Cheers, 
Mehmet 


> -----Original Message-----
> From: ext David Harrington [mailto:ietfdbh@comcast.net]
> Sent: Thursday, March 03, 2011 4:33 PM
> To: Ersue, Mehmet (NSN - DE/Munich)
> Cc: draft-ietf-netconf-rfc4742bis@tools.ietf.org; 'ext Romascanu, Dan
> (Dan)'; bertietf@bwijnen.net; 'The IESG'
> Subject: RE: David Harrington's Discuss on draft-ietf-netconf-
> rfc4742bis-07: (withDISCUSS and COMMENT)
> 
> Hi Mehmet,
> 
> this looks good as far as it goes.
> 
> However, this does not adress these issues:
> 
> 1) the username is used externally to netconf, e.g. in a config file
> for some access control method. username is not just used *inside*
> netconf. While the default for netconf is utf-8, and the "user name"
> field in SSH is utf-8, it is implementation-dependent what the SSH
> implementation provides to applications. It could be good to specify
> that netconf username MUST be utf-8, for interoperability reasons. If
> what the SSH implementation (for example) provides is not utf-8, then
> the netconf SSH-transport implementation SHOULD convert it to utf-8.
> If the SSH implementation provides an identity already in utf-8, this
> is a no-op.
> 
> 2) But the problem is bigger than just utf-8. the username is used
> externally to netconf, e.g. in a config file for some access control
> method. username is not just used *inside* netconf. At some point, you
> need to do comparisons between what the transport provides for an
> identity, and an access control database representation of identities.
> For example, from draft-ietf-netconf-access-control:
>   3.   Check all the <group> entries for ones that contain a <user-
>         name> entry that matches the user name for the session making
>         the request.  Add to these groups the set of groups provided
> by
>         the transport layer.
> 
> How will you define a matching algorithm that is interoperable across
> implementations? Does the match algorithm include internationalized
> names? control characters? How long is the username allowed to be? How
> large a buffer MUST be supported to handle whatever username is
> provided by a transport? What if an SSH implementation decides to
> simply pass the application a complete X509 certificate representing
> the identity - should netconf implementations be expected to handle
> that? Maybe you want to use the username in scripts; Must the
> characters in username be printable?
> 
> Since you are not specifying an access control mechanism at this
> point, you are relying on existing system access controls to work.
> Assuming a CLI-based approach, possibly with scripting and/or a config
> file, you proibably want username to be in a format that is likely to
> be acceptable to the existing mechanism (or future standardized
> mechanisms). I recommend some constraints (and I would be satisfied
> with RECOMMENDS/SHOULD).
> 
> By not specifying any constraints on username, you are forcing all
> other parts of the system that use username (including all future
> netconf access control standards) to deal with a completely wide-open
> set of requirements to accommodate whatever the SSH implementation
> gives you.
> 
> 3) You still haven't dealt with the uniqueness question. What if the
> SSH transport returns username="dbh" for David B Harrington, and the
> TLS transport returns username="dbh" for Dwight B Harrison? How will
> you accommodate both in an access control rule set?
> 
> dbh
> 
> > -----Original Message-----
> > From: Ersue, Mehmet (NSN - DE/Munich) [mailto:mehmet.ersue@nsn.com]
> > Sent: Thursday, March 03, 2011 7:11 AM
> > To: ext David Harrington
> > Cc: draft-ietf-netconf-rfc4742bis@tools.ietf.org; ext
> > Romascanu, Dan (Dan); bertietf@bwijnen.net
> > Subject: RE: David Harrington's Discuss on
> > draft-ietf-netconf-rfc4742bis-07: (withDISCUSS and COMMENT)
> >
> > Hi David,
> >
> > we copied now following change to the RFC Editors note:
> >
> > See
> > https://datatracker.ietf.org/doc/draft-ietf-netconf-rfc4742bis
> > /writeup/.
> >
> > Thanks & Regards,
> > Mehmet
> > (document shepherd)
> >
> >
> > 2. Section 3.
> >
> > OLD:
> >    How the NETCONF Server extracts the SSH user name from the
> > SSH layer
> >    is implementation-dependent.
> >
> > NEW:
> >     There is no standard way for an application running on an SSH
> >     server to determine a user name for the current session.  How
> the
> >     NETCONF Server extracts the user name from the SSH layer is
> >     therefore implementation-dependent. Any transformations applied
> to
> >     the authenticated user name by the SSH layer are outside the
> scope
> >     of this document.
> >
> >
> > Cheers,
> > Mehmet
> >
> >
> > > -----Original Message-----
> > > From: ext David Harrington [mailto:ietfdbh@comcast.net]
> > > Sent: Wednesday, March 02, 2011 12:20 AM
> > > To: Ersue, Mehmet (NSN - DE/Munich)
> > > Cc: 'The IESG'; draft-ietf-netconf-rfc4742bis@tools.ietf.org; 'ext
> > > Romascanu, Dan (Dan)'; bertietf@bwijnen.net
> > > Subject: RE: David Harrington's Discuss on draft-ietf-netconf-
> > > rfc4742bis-07: (withDISCUSS and COMMENT)
> > >
> > > Hi,
> > >
> > > I just posted a DISCUSS againat 4741bis for a related issue.
> > >
> > > I think username needs to meet some constraints to make it
> > usable for
> > > the foreseeable uses, such as specifying an access policy for a
> > > specific username. Compare tmSecurityName from RFC3411 and
> RFC5590,
> > > which constrain the size, the character set, and the expected
> human
> > > readability. The algorithm must also produce a predictable value
> for
> > > use by human operators, given knowledge of the authentication
> > > parameters.
> > >
> > > I think there is also an issue of the uniqueness of username. If
> you
> > > have multiple transports supported in a NC implementation, must
> the
> > > usernames from, say, the SSH transport be unique only amongst the
> > > usernames generated by the SSH transport, or does the
> > username need to
> > > also be unique across the TLS, SOAP, and BEEP transports as well?
> If
> > > it will be used by an access control mechanism, it will be
> important
> > > to know what parameters must be specified to uniquelyt identify a
> > > "user", such as in VACM, where we need to know the securityname
> AND
> > > the security model that generates the securityName.
> > >
> > > As with RFC5592, I agree that how you convert the authenticated
> > > identity from SSH depends on the SSH implementation, since the
> > > identity used in SSH (and other protocols) can vary dramatically
> > > depending on the underlying authentication mechanism.
> > >
> > > The discuss for 4742bis is the total lack of the
> > explanation REQUIRED
> > > by 4741bis.
> > >
> > > dbh
> > >
> > > > -----Original Message-----
> > > > From: Ersue, Mehmet (NSN - DE/Munich)
> > [mailto:mehmet.ersue@nsn.com]
> > > > Sent: Tuesday, March 01, 2011 4:39 PM
> > > > To: ext David Harrington
> > > > Cc: The IESG; draft-ietf-netconf-rfc4742bis@tools.ietf.org;
> > > > ext Romascanu, Dan (Dan); bertietf@bwijnen.net
> > > > Subject: FW: David Harrington's Discuss on
> > > > draft-ietf-netconf-rfc4742bis-07: (withDISCUSS and COMMENT)
> > > >
> > > > Hi Dave,
> > > >
> > > > we discussed the issue with the username in the NETCONF WG
> > > > intensively
> > > > (see the 4742bis discussion in
> > > > http://www.ietf.org/proceedings/78/minutes/netconf.txt).
> > > >
> > > > Naming policies might differ between administrative domains and
> > > > identities represented as usernames mean different things in
> > > > different operating systems. Following the statement in RFC 5592
> > > > we decided that the method to obtain the username for the
> NETCONF
> > > > Server from SSH should be implementation-dependant.
> > > >
> > > > However, I agree that such an explanation is missing in the
> draft.
> > > >
> > > > We discussed it again in the NETCONF ML and would like to
> suggest
> > > > following text change.
> > > >
> > > > OLD:
> > > >    How the NETCONF Server extracts the SSH user name from the
> > > > SSH layer
> > > >    is implementation-dependent.
> > > >
> > > > NEW:
> > > >     There is no standard way for an application running on an
> SSH
> > > >     server to determine a user name for the current session.
> How
> > > the
> > > >     NETCONF Server extracts the user name from the SSH layer is
> > > >     therefore implementation-dependent. Any
> > transformations applied
> > > to
> > > >     the authenticated user name by the SSH layer are outside the
> > > scope
> > > >     of this document.
> > > >
> > > >
> > > > Would this text be sufficient for you?
> > > >
> > > > Thank you for your support.
> > > >
> > > > Regards,
> > > > Mehmet
> > > > (document shepherd)
> > > >
> > > > -----Original Message-----
> > > > From: ext David Harrington [mailto:ietfdbh@comcast.net]
> > > > Sent: Monday, February 28, 2011 11:23 PM
> > > > To: The IESG
> > > > Cc: netconf-chairs@tools.ietf.org;
> > > > draft-ietf-netconf-rfc4742bis@tools.ietf.org
> > > > Subject: David Harrington's Discuss on
> > > > draft-ietf-netconf-rfc4742bis-07:
> > > > (withDISCUSS and COMMENT)
> > > >
> > > > David Harrington has entered the following ballot position for
> > > > draft-ietf-netconf-rfc4742bis-07: Discuss
> > > >
> > > > When responding, please keep the subject line intact and reply
> to
> > > all
> > > > email addresses included in the To and CC lines. (Feel free
> > > > to cut this
> > > > introductory paragraph, however.)
> > > >
> > > > Please refer to
> > > > http://www.ietf.org/iesg/statement/discuss-criteria.html
> > > > for more information about IESG DISCUSS and COMMENT positions.
> > > >
> > > >
> > > >
> > > >
> > >
> >
> ----------------------------------------------------------------------
> > > > DISCUSS:
> > > >
> > >
> >
> ----------------------------------------------------------------------
> > > >
> > > > 1) 4741bis says: "The authentication process MUST result in an
> > > > authenticated client
> > > >    identity whose permissions are known to the server.  The
> > > >    authenticated identity of a client is commonly
> > referred to as the
> > > >    NETCONF username.  The algorithm used to derive the username
> is
> > > >    transport protocol specific and in addition specific to the
> > > >    authentication mechanism used by the transport
> > protocol.  NETCONF
> > > >    transport protocols therefore MUST explain how a NETCONF
> > > > username is
> > > >    derived from the authentication mechanisms supported by
> > > > the transport
> > > >    protocol.
> > > >
> > > >    The access permissions of a given client, identified by its
> > > NETCONF
> > > >    username, are part of the configuration of the NETCONF
> > > > server.  These
> > > >    permissions MUST be enforced during the remainder of
> > the NETCONF
> > > >    session.  The details how access control is configured is
> > > > outside the
> > > >    scope of this document."
> > > >
> > > > 4742bis says: "How the NETCONF Server extracts the SSH user name
> > > from
> > > > the SSH layer
> > > >    is implementation-dependent."
> > > >
> > > > This is not an explanation. Assuming an operator must
> > specify access
> > > > control rights for a user in the configuration o fthe
> > server, it is
> > > > important that the operator understands what the netconf
> > username(s)
> > > > will be. That is presumably why it is important for the Netconf
> > > > transport protocol specification to explain the algorithm for
> > > deriving
> > > > the username.
> > > >
> > > > RFC5592 defines an SSH subsystem for use with SNMP, and has
> > > > had to deal
> > > > with similar issues, including constraints about not changing
> the
> > > > username associated with a session, allowing "user@host" style
> > > naming,
> > > > etc.
> > > > Maybe those are not needed for netconf, but the above
> > > > "implementation-dependent" explanations seems woefully
> inadequate.
> > > >
> > > >
> > > >
> > > >
> > > >
> > > >
> > >
> >
> ----------------------------------------------------------------------
> > > > COMMENT:
> > > >
> > >
> >
> ----------------------------------------------------------------------
> > > >
> > > > 1) The IANA section does not specify that the assigned
> > port is a TCP
> > > > port. should it?
> > > >
> > > >
> > > >
> >
> >