Re: [netconf] Virtual "hum" for the "key generation" issue discussed at virtual meeting

"Rob Wilton (rwilton)" <rwilton@cisco.com> Thu, 14 May 2020 11:45 UTC

Return-Path: <rwilton@cisco.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9C9B33A0977 for <netconf@ietfa.amsl.com>; Thu, 14 May 2020 04:45:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.597
X-Spam-Level:
X-Spam-Status: No, score=-9.597 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=kNcOErgZ; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=xfIqRoOt
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dMLj7m3PyxO8 for <netconf@ietfa.amsl.com>; Thu, 14 May 2020 04:45:53 -0700 (PDT)
Received: from rcdn-iport-4.cisco.com (rcdn-iport-4.cisco.com [173.37.86.75]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3DF773A0975 for <netconf@ietf.org>; Thu, 14 May 2020 04:45:53 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=21578; q=dns/txt; s=iport; t=1589456753; x=1590666353; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=LGgwqt34F0PILBJiMLV2Mjt3gWViWMYerc36aUXexvc=; b=kNcOErgZ0RvTty86WHZLlB22tkK84OM7xexAxmyQE7FgMslQdedP8F4/ BtFGg0JbWQ3cvV5qGruitscb8PeZw7rO97oLQomgHQwkN3AAYa3PjOw5m J6cL7LmU864BadSlQv/8apNHi1lKq0yfpDN2Cb6ZVVswI6LdNZbMkMVPX I=;
IronPort-PHdr: 9a23:7Zevehysha4iWJnXCy+N+z0EezQntrPoPwUc9psgjfdUf7+++4j5ZRWBt+pkkETEW8Pd5u4Xw+bVsqW1X2sG7N7BtX0Za5VDWlcDjtlehA0vBsOJSCiZZP7nZiA3BoJOAVli+XzoLkFJA8v4IVvfvi764TsbAB6qMw1zK6z8EZLTiMLi0ee09tXTbgxEiSD7b6l1KUC9rB7asY8dho4xJw==
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AJCAAiLr1e/4UNJK1dCR0BAQEBCQESAQUFAYIHgSUvUQdvWC8sCoQbg0YDjT2TVIRjglIDVAsBAQEMAQEtAgQBAYREAheBfiQ4EwIDAQELAQEFAQEBAgEFBG2FKgYmDIVxAQEBAQMSEQoTAQE3AQ8CAQgRBAEBKwICAjAdCAIEDgUIEweDBYF+TQMuAaZaAoE5iGF2gTKDAQEBBYVFGIIOCYE4gmOIG4FEGoFBP4ERQ4JNPoQiLoMSM4ItkVqGIZsHCoJNmFGdSa1kAgQCBAUCDgEBBYFpIoFWcBWDJFAYDY4ughI4gzqKVnQ3AgYBBwEBAwl8jTgBgQ8BAQ
X-IronPort-AV: E=Sophos;i="5.73,391,1583193600"; d="scan'208,217";a="759758509"
Received: from alln-core-11.cisco.com ([173.36.13.133]) by rcdn-iport-4.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 14 May 2020 11:45:51 +0000
Received: from XCH-RCD-005.cisco.com (xch-rcd-005.cisco.com [173.37.102.15]) by alln-core-11.cisco.com (8.15.2/8.15.2) with ESMTPS id 04EBjpRR012505 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 14 May 2020 11:45:51 GMT
Received: from xhs-rtp-002.cisco.com (64.101.210.229) by XCH-RCD-005.cisco.com (173.37.102.15) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Thu, 14 May 2020 06:45:51 -0500
Received: from xhs-aln-001.cisco.com (173.37.135.118) by xhs-rtp-002.cisco.com (64.101.210.229) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Thu, 14 May 2020 07:45:50 -0400
Received: from NAM10-DM6-obe.outbound.protection.outlook.com (173.37.151.57) by xhs-aln-001.cisco.com (173.37.135.118) with Microsoft SMTP Server (TLS) id 15.0.1497.2 via Frontend Transport; Thu, 14 May 2020 06:45:50 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Lnn0JMuWgN3KIM77YclUpWN28W+Hw2mz8hZEcn3WDv9gkexhg8+nToI2qVELoXQxN5FTqKdpD/7Us91cs2RV8zf4t5INUxjM5ke6A4NO3MlLG/Hk2GD1veHccQ8h3Cjpox8dATT1bCmqRZKFrZKKqbFj0RTpPF55KGj6PyysoUBuaFmbDhaAyFjeBbdz46GT9jeGqLm6wiyN5FB/wOahqZoooix5iGUHYXyNBJLzYsIzqO5Etty/Z6XgM1t6mqPcJPXArbZtrBcCTlqgVABRMoPjHYQqTAUl2+B5rctBr5qUMN3rqrgWubwgqp3S0F9zEp9bOwkWfqADEBxuIpP1Qg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=LGgwqt34F0PILBJiMLV2Mjt3gWViWMYerc36aUXexvc=; b=WuTAdqyeJ+G52vrP+5y87csnFig1q3dQgi4kqRXs49uCMSHaMs2PLPFZlR9uJ1z6lLJyn7HQH3RimCHx80zWrJ7anE73YailgCsLqtccs57OHz63ZI7dHCS9/i6cCpyF80MyhY30oB+ZvhhBXK9IPIFUklHFVs7zPW64hG9ZokjI3ctt/sKx2WZO8d57zh1KH+UoZDz8CxbS7eXh5juoF5NEUXDkEMq/H2+lyf4a2ZHXGnU3NUR2xFyrvbxHReacG8kztR9xeabSxEtwYS6OBBXlkZS5228uCstgtX6nJPMvYDM85ARGBaa7iJaK71kJu7oA8OP0bqQ61at97ncvPA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=LGgwqt34F0PILBJiMLV2Mjt3gWViWMYerc36aUXexvc=; b=xfIqRoOtFjysQk+AmDHuFRppXmZWPb8XB+Hln0I2NQ6e1p8/qsJxW0MHGMykzTZnwdaZhKN12JsSK/3S7uhwiqXhRv5SgCkKsR0+o1n8XnCGAmjgdlAKYQuW4KG62uw6brsLyTxZZljm/594wHRaPS+5+TSHq9VxB/OBDKYgi3k=
Received: from MN2PR11MB4366.namprd11.prod.outlook.com (2603:10b6:208:190::17) by MN2PR11MB3854.namprd11.prod.outlook.com (2603:10b6:208:f0::23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2979.29; Thu, 14 May 2020 11:45:49 +0000
Received: from MN2PR11MB4366.namprd11.prod.outlook.com ([fe80::3:2164:a8e2:33b3]) by MN2PR11MB4366.namprd11.prod.outlook.com ([fe80::3:2164:a8e2:33b3%5]) with mapi id 15.20.2979.033; Thu, 14 May 2020 11:45:49 +0000
From: "Rob Wilton (rwilton)" <rwilton@cisco.com>
To: Kent Watsen <kent+ietf@watsen.net>
CC: "netconf@ietf.org" <netconf@ietf.org>, "Salz, Rich" <rsalz@akamai.com>
Thread-Topic: [netconf] Virtual "hum" for the "key generation" issue discussed at virtual meeting
Thread-Index: AQHWF2bXrSECauZ+fUyn7wWuc6EbxKiDIIkAgAB/rQCACXJewIAZpfgAgADGKaA=
Date: Thu, 14 May 2020 11:45:49 +0000
Message-ID: <MN2PR11MB4366D2A91F5017A2EEA793C6B5BC0@MN2PR11MB4366.namprd11.prod.outlook.com>
References: <0100017199cd7580-240a83ae-9934-4af3-a0e3-3b063286059f-000000@email.amazonses.com> <20200421063956.fgczjrjhh6ppjhnp@anna.jacobs.jacobs-university.de> <010001719d195262-4f097864-625d-437f-8e15-a79c4498342e-000000@email.amazonses.com> <MN2PR11MB4366810254654BAD3A07915AB5AF0@MN2PR11MB4366.namprd11.prod.outlook.com> <010001721019329c-2f818f0f-e2d7-48aa-b513-d4380e88b830-000000@email.amazonses.com>
In-Reply-To: <010001721019329c-2f818f0f-e2d7-48aa-b513-d4380e88b830-000000@email.amazonses.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: watsen.net; dkim=none (message not signed) header.d=none;watsen.net; dmarc=none action=none header.from=cisco.com;
x-originating-ip: [64.103.40.19]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 8dc429dc-c9d4-440a-6c36-08d7f7fc5942
x-ms-traffictypediagnostic: MN2PR11MB3854:
x-microsoft-antispam-prvs: <MN2PR11MB385489292BA8E7D4028326F2B5BC0@MN2PR11MB3854.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 040359335D
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: uAXl1HEXd+VzATJnlI6pMfrO0OJdrmzwZAsWfp2VVSp1xxkJdwSnzXQSvTaB/z8os19nlA50bbb1qL++y+C394BrXIQAOdWW2l+ddfJ68Dcr/y5OP1HJ9ov1zN5YLVPwF7vp18/axam1QROv6x0D/ylnmsPKfNwIocHnnDkw+G+onL1JayGbQJ4d8QrxVh2ptdjV1fhN1Qd+4cl8kVpNHcmVNSGBzonKyimPBcmmRXqiPz9asLQlQqbD4SJBRnR4QEJjFCr8qNNcqHxQ28LN4rmnJis8/Cw84OAXZ6ayNUfq/1sH2InDmusvnZegBOIj2QLw9EwXWUkVWETrebRZdbWGCrh6fjbpo+nByDSNP6wks7Pj0OJEaDLESBHO76LxJRpC2BOdBMbobft1VPLQCgr7PsTot+jojbmgyvxiFBxbFcssVwmUHe1nFQ2Auk+c
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MN2PR11MB4366.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFTY:; SFS:(4636009)(39860400002)(136003)(376002)(396003)(346002)(366004)(8936002)(53546011)(64756008)(316002)(5660300002)(7696005)(52536014)(66946007)(66446008)(66476007)(76116006)(8676002)(86362001)(66556008)(6506007)(33656002)(54906003)(2906002)(186003)(478600001)(55016002)(9326002)(9686003)(4326008)(26005)(71200400001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: mrRulq+EOPQ7rcz4uchQrOUU9MMvtCT6NB4/dx3/1iFGSe6Ht1p6FXnlCAdQ5PTCMlBLdAvsLUf5mfT5j1z6XX71IURClJSKHw7HauM7j/jW/qS6U6KG8s9mRd6WksAUkNUR8N6kRNq2WOBjHQTt7YNfitBp/xtP/71ygAp6YfV+SOqCG50pAep6jeE5ubOSMFr1F6hQmU4H/nW2Jc4lrHrt1X9XHbXcBSSi2QtCHAWfHB22mKLjIZJuGkFIunXTKiePbCXTg8KQoiUtC70jl1ZILdaBcx9EoAz1Gc6YtqR4xcuPtryBI85HkHizzH1c6d0vJzM4+AQloEsFgQlBOTqohmf454yvrBoOJh+RMvx9awauxPrdLpO9aL0NHx8Zz2FMdfgZupUDt6dGVMFHpI+8fuvabhEXfZ4r+E66jICdoJSmJvGJrRX6u7z//SosvsDLRT4yiHV2kTjEJrmxf5LR7m4DGuMPARjTM7Doyf8=
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_MN2PR11MB4366D2A91F5017A2EEA793C6B5BC0MN2PR11MB4366namp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 8dc429dc-c9d4-440a-6c36-08d7f7fc5942
X-MS-Exchange-CrossTenant-originalarrivaltime: 14 May 2020 11:45:49.5100 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: tRaK3+ngY7gkooB0Tde6DT+2IPpvPOf2sVRr2ZLYpmqvHWP0+/GC0HqxTa/Bb/+3FnRxazdBT04HPk1wpP6VVQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR11MB3854
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.15, xch-rcd-005.cisco.com
X-Outbound-Node: alln-core-11.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/mwM_aKbGVG6ereBz9i_1O6qWBeo>
Subject: Re: [netconf] Virtual "hum" for the "key generation" issue discussed at virtual meeting
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 May 2020 11:45:56 -0000

Hi Kent,

I’m not sure that I have sufficient knowledge to properly comment on this point: “enable apps to create proprietary identities that work with the standard model”.

If feels to me that the ultimate solution here is that the individual protocols define protocol specific algorithm identities.  But it is unclear to me (i) whether it is helpful for those protocol specific algorithm identities to derive from a base generic algorithm identity or not, and (ii) whether it is helpful for those algorithm specific identities to be able to inherit a base algorithm specific identity.

As more concrete examples:
(i) Would be helpful for an ssh “rsa4096” identity to derive from “ssh-asymmetric-algorithm” which itself derives from “asymmetric-algorithm”?
(ii) Or would be helpful for an ssh “rsa4096” identity to derive from both “ssh-asymmetric-algorithm” and also a base cypto “rsa4096” identity that derives from “asymmetric-algorithm”?
(iii) Or is it just sufficient to have an ssh “rsa4096” identity derive from a “ssh-asymmetric-algorithm” base identity?

If the answer is (ii) then I think that there is also a further question as to whether the base “asymmetric-algorithm” identity should be defined in crypto-types.yang or in the IANA registry defined YANG file that defines the base identities?

Even if we can figure out what the identity hierarchy should look like, I’m not sure whether it makes sense to still define the “algorithm” leaf nodes in the groupings.  If they are only really truly required for the key generation rpcs then perhaps they are not required in the other places at all.e

At the moment,  I’m leaning towards leaving this out, and solving this in the future.  If we don’t put anything in, then we can’t accidentally constrain a future solution.

Rob
// As an individual contributor

From: Kent Watsen <kent+ietf@watsen.net>
Sent: 13 May 2020 23:13
To: Rob Wilton (rwilton) <rwilton@cisco.com>
Cc: netconf@ietf.org
Subject: Re: [netconf] Virtual "hum" for the "key generation" issue discussed at virtual meeting

Hi Rob,

Before makeing the edits to conform to Option #3 (remove “keygen”), I wanted to follow-up on a comment you made before:


One question I have, is whether the crypto-types could still define identities for the base algorithms.

I know that it’s not what you had in mind, but one possible half-step is as follows...

In ietf-crypto-types.yang, define two base identities:

     identity symmetric-algorithm {
        description "Base identity for symmetric algorithms.";
      }

      identity asymmetric-algorithm {
        description "Base identity for asymmetric algorithms.";
      }

And then, wherever there is an “algorithm” node, change its definition as follows:

OLD:

    leaf algorithm {
      type isa:symmetric-algorithm-type;
      mandatory true;
      description
        "The symmetric key’s algorithm.";
    }

NEW:

    leaf algorithm {
      type identityref {
        base symmetric-algorithm;
      }
      mandatory false;
      description
        "The symmetric key’s algorithm.";
    }

That the node would be “mandatory false” is not a big deal as the node’s existence in the configuration model serves a very passive role, just relaying anecdotal information.   Truly, the only place where the node MUST be set is in the keygen RPCs (e.g., generate-asymmetric-key).  These RPCs would be defined later, and of course would set the “algorithm" input node to “mandatory true”, where it’s needed.


PROs:
   - enable apps to create proprietary identities that work with the standard model
   - maintain placeholders to where the all the “algorithm” nodes are locations
   - negate needing to augment-in the “algorithm” nodes later

CONs:
   - will likely lead to confusion as there is no way to set a correct value until
     someone defines the concrete identities.


Thoughts?

Kent // contributor