Re: [netconf] crypto-types fallback strategy

Martin Bjorklund <mbj@tail-f.com> Wed, 18 September 2019 20:06 UTC

Return-Path: <mbj@tail-f.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C443E120953 for <netconf@ietfa.amsl.com>; Wed, 18 Sep 2019 13:06:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PDLwz6d1QaVS for <netconf@ietfa.amsl.com>; Wed, 18 Sep 2019 13:06:41 -0700 (PDT)
Received: from mail.tail-f.com (mail.tail-f.com [46.21.102.45]) by ietfa.amsl.com (Postfix) with ESMTP id 310A1120086 for <netconf@ietf.org>; Wed, 18 Sep 2019 13:06:41 -0700 (PDT)
Received: from localhost (h-46-233.A165.priv.bahnhof.se [46.59.46.233]) by mail.tail-f.com (Postfix) with ESMTPSA id 84E681AE047F; Wed, 18 Sep 2019 22:06:38 +0200 (CEST)
Date: Wed, 18 Sep 2019 22:06:38 +0200
Message-Id: <20190918.220638.1382892184185166890.mbj@tail-f.com>
To: kent+ietf@watsen.net
Cc: rwilton@cisco.com, netconf@ietf.org, rifaat.ietf@gmail.com
From: Martin Bjorklund <mbj@tail-f.com>
In-Reply-To: <0100016d4553e645-9c5796b8-15da-4a51-b820-5ecef6575eff-000000@email.amazonses.com>
References: <0100016d44bda220-51590a9a-0a15-4b63-a49d-47efe712e82e-000000@email.amazonses.com> <MN2PR11MB436617082A8308A7A8928DDFB58E0@MN2PR11MB4366.namprd11.prod.outlook.com> <0100016d4553e645-9c5796b8-15da-4a51-b820-5ecef6575eff-000000@email.amazonses.com>
X-Mailer: Mew version 6.7 on Emacs 25.2 / Mule 6.0 (HANACHIRUSATO)
Mime-Version: 1.0
Content-Type: Text/Plain; charset="utf-8"
Content-Transfer-Encoding: base64
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/rRjoCtmdfVFPoBStI9rdj4qGXAc>
Subject: Re: [netconf] crypto-types fallback strategy
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 18 Sep 2019 20:06:43 -0000

Kent Watsen <kent+ietf@watsen.net> wrote:
> [moving Russ and Sean to BCC, per Rich's action]
> 
> 
> 
> > Minor: Does the “string” in the description above mean “ASCII string”
> > or “binary string”, RFC 4251 seemingly uses both definitions?
> 
> I don't know, but this is the language found for the "key-data" leaf
> in RFC 7317 (i.e., we've been living with this definition for awhile)

So the definition is:

             leaf key-data {
               type binary;
               mandatory true;
               description
                 "The binary public key data for this SSH key, as
                  specified by RFC 4253, Section 6.6, i.e.:

                    string    certificate or public key format
                              identifier
                    byte[n]   key/certificate data.";

The textual representation of a binary in YANG is base64 encoded.  As
it happens, this is exactly the same as OpenSSH uses for its keys.  So
the open ssh key can be copy/pasted into the NC/RC XML/JSON.


/martin




> 
> 
> > Is putting the encrypted keys into DER-encoded OneSymmetricKey
> > obviously the right thing to do?  Are there other choices?
> 
> 
> Yes, if there was one thing that came out of my discussion with Russ
> and Sean is that OneSymmetricKey and OneAsymmetricKey SHOULD be used
> for encrypting key data.  Anything else would be a BIG effort.
> 
> The real question is if we should also use the One*Key structures for
> unencrypted keys, which could help some ways, but I think that it's
> better to use the values provided by OpenSSL command line.  This
> approach pushes the complexity of using the One*Key structures to just
> the "advanced" case of when encryption is needed and, besides, it
> would primarily be for the NC/RC server to generate/parse; clients
> would rarely encrypt a key themselves, the only case I can think of
> when they might would be for the RMA workflow we discussed a few weeks
> back.
> 
> 
> Kent
> 
>