Re: [netconf] truststore usage in ietf-ssh/tls-client/server

Kent Watsen <kent+ietf@watsen.net> Tue, 08 October 2019 20:56 UTC

Return-Path: <0100016dad284c4d-821b1403-49d4-41bb-87bf-275f611e6fe1-000000@amazonses.watsen.net>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9CDE8120046 for <netconf@ietfa.amsl.com>; Tue, 8 Oct 2019 13:56:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=amazonses.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kRz3e61gI2Ai for <netconf@ietfa.amsl.com>; Tue, 8 Oct 2019 13:56:04 -0700 (PDT)
Received: from a8-32.smtp-out.amazonses.com (a8-32.smtp-out.amazonses.com [54.240.8.32]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E2C6A120033 for <netconf@ietf.org>; Tue, 8 Oct 2019 13:56:03 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=6gbrjpgwjskckoa6a5zn6fwqkn67xbtw; d=amazonses.com; t=1570568162; h=From:Message-Id:Content-Type:Mime-Version:Subject:Date:In-Reply-To:Cc:To:References:Feedback-ID; bh=DjMAOjPuVWtxli5DmNj6HQ23D2uYwM//U6ENO0D0p0c=; b=Rn3wnK3Es0nvtCQoL33OUl5mE04BLPMUhPDFtwrh0xK/Xk8tmA2fAJ4Fs8ib60mM P6qcU1vN+STVZS0t2gJies0soxGf+fAP8zQDI7/HCfbAJZ/I3RgXU3IjXVGvkS8YzhK mskKuUIFnWYLOh9tO6IYav2QAxp9ulLgFB8SS4XM=
From: Kent Watsen <kent+ietf@watsen.net>
Message-ID: <0100016dad284c4d-821b1403-49d4-41bb-87bf-275f611e6fe1-000000@email.amazonses.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_E51F2018-2D72-4DEC-89B9-C268C4023B24"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
Date: Tue, 08 Oct 2019 20:56:02 +0000
In-Reply-To: <AM0PR07MB51877236CE073078C5B90F9A839A0@AM0PR07MB5187.eurprd07.prod.outlook.com>
Cc: "netconf@ietf.org" <netconf@ietf.org>
To: Balázs Kovács <balazs.kovacs@ericsson.com>
References: <AM0PR07MB51879334FAD36D55675307E3839E0@AM0PR07MB5187.eurprd07.prod.outlook.com> <0100016da755ddce-18e94501-441b-471d-af1e-03ba88fde0ba-000000@email.amazonses.com> <AM0PR07MB51877236CE073078C5B90F9A839A0@AM0PR07MB5187.eurprd07.prod.outlook.com>
X-Mailer: Apple Mail (2.3445.104.11)
X-SES-Outgoing: 2019.10.08-54.240.8.32
Feedback-ID: 1.us-east-1.DKmIRZFhhsBhtmFMNikgwZUWVrODEw9qVcPhqJEI2DA=:AmazonSES
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/fuX4-V8aD6LDhXHJ4ioZPenBKHY>
Subject: Re: [netconf] truststore usage in ietf-ssh/tls-client/server
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 08 Oct 2019 20:56:06 -0000

Hi Balazs,


> 1.
>  
> In ssh-client and ssh-server:
>  
> "Indicates that the client can authenticate servers
> using the configured trust anchor certificates.";
>  
> "Indicates that the server can authenticate this user
> using the configured trust anchor certificates.";
>  
> Do you prefer ‘trust anchor’ or could it be changed to ‘certificate authority’?

Good question.  I was cognizant of the fact the the surrounding nodes and text uses CA (e.g., ca-certs).  But crypto-types uses the term "trust-anchor" (in contrast to "end-entity"), which seems more exact.  I was half-thinking to swap "ca-cert" for "trust-anchor" everywhere in the SSH and TLS models.  I think the result would be more consistent, but haven't looked carefully.  Thoughts?



>  2.
>                                                                        
> What’s the rationale of the new presence containers in ssh models but not in the tls models?

Good catch.  The examples didn't test this "case" and hence the issue was missed.  I added this to the TLS models here: https://github.com/netconf-wg/tls-client-server/commit/0eb86e7c9644cc396de7ab49037ed9ea40d5a75b <https://github.com/netconf-wg/tls-client-server/commit/0eb86e7c9644cc396de7ab49037ed9ea40d5a75b>.

FWIW, ts:local-or-truststore-certs-grouping contains a mandatory choice that was forcing the nodes to be defined all the time...



Kent // contributor