Re: [netmod] WG Last Call: draft-ietf-netmod-acl-model-15

Robert Wilton <rwilton@cisco.com> Fri, 02 February 2018 09:53 UTC

Return-Path: <rwilton@cisco.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B138112FA97 for <netmod@ietfa.amsl.com>; Fri, 2 Feb 2018 01:53:09 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.511
X-Spam-Level:
X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MYRxgQAqSw1X for <netmod@ietfa.amsl.com>; Fri, 2 Feb 2018 01:53:08 -0800 (PST)
Received: from aer-iport-2.cisco.com (aer-iport-2.cisco.com [173.38.203.52]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B8AE4127873 for <netmod@ietf.org>; Fri, 2 Feb 2018 01:53:07 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=3155; q=dns/txt; s=iport; t=1517565187; x=1518774787; h=subject:to:references:from:message-id:date:mime-version: in-reply-to:content-transfer-encoding; bh=Hb9inp3yIAnRGg1zexPAPoqsYeVklBF2dQLL2xmEySQ=; b=T0zzQzrOW33orpN8wQ+aGWTUdeIMh24yoUg59+zdpiQ5IOtXtj7zuGKi BSE58MrGyNICukJqB7qTfgg9NAjKqNsKz+4iDv2vJzhO9iTJ42VZaC5b4 rfKDDWUnvveNuDX6hzSDUKrEwWUuSC+rUUmdUA56XSqMBUyeMSsNCW3oE w=;
X-IronPort-AV: E=Sophos;i="5.46,448,1511827200"; d="scan'208";a="1809756"
Received: from aer-iport-nat.cisco.com (HELO aer-core-4.cisco.com) ([173.38.203.22]) by aer-iport-2.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 02 Feb 2018 09:53:06 +0000
Received: from [10.63.23.78] (dhcp-ensft1-uk-vla370-10-63-23-78.cisco.com [10.63.23.78]) by aer-core-4.cisco.com (8.14.5/8.14.5) with ESMTP id w129r5UP012750; Fri, 2 Feb 2018 09:53:05 GMT
To: Eliot Lear <lear@cisco.com>, Kristian Larsson <kristian@spritelink.net>, netmod@ietf.org
References: <8C19AD4C-0DCA-4D96-A070-0D76BE92BFA4@juniper.net> <20180117224916.4xtwnxgsw3snzwvf@elstar.local> <B3AAE9DB-1F4B-40F5-91BC-7A283B6E5F8B@gmail.com> <BA276029-048F-4B80-A104-924DD1C488F1@juniper.net> <4EB04703-CD66-43D3-8653-BFC62B2C0FA1@gmail.com> <B1BA5D27-FF55-4DBB-B4FA-2697896F5F12@juniper.net> <788291A3-8BB6-494A-A7CF-D68B3FC70F98@gmail.com> <543B7D01-A491-4BFB-B74B-786002F31022@juniper.net> <5cdb95e6-35ab-8120-7f35-4d6d8df0274c@spritelink.net> <34e50e66-1522-4d77-be26-27284a91d7e9@cisco.com>
From: Robert Wilton <rwilton@cisco.com>
Message-ID: <0440ec8a-d2d5-9c53-c695-f9d46f5694d1@cisco.com>
Date: Fri, 02 Feb 2018 09:53:05 +0000
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.5.2
MIME-Version: 1.0
In-Reply-To: <34e50e66-1522-4d77-be26-27284a91d7e9@cisco.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Content-Language: en-US
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/85b_3niUYO3pP68tUhcW2i-uDnc>
Subject: Re: [netmod] WG Last Call: draft-ietf-netmod-acl-model-15
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 02 Feb 2018 09:53:10 -0000


On 02/02/2018 07:48, Eliot Lear wrote:
> Hi Kristian,
>
>
> On 02.02.18 08:44, Kristian Larsson wrote:
>> Mahesh,
>>
>> I've reviewed this model, I think I largely caused the last couple of
>> updates to it late last year. Overall I think it is a good model.
>> Placement of feature-statements could be debated - no clear answers.
>> object groupings is something I would like to see in the model but it
>> was always deferred.
>>
>>
>> On 2018-01-22 16:50, Kent Watsen wrote:
>>> Hi Mahesh,
>>>
>>> Thanks, it doesn't get much more concrete then a pull request  ;)
>>>
>>> Okay, so from a chair/shepherd perspective, can folks please consider
>>> this update to -15 as the LC solution to removing the open issue
>>> Juergen found in the draft?
>>>
>>> As a contributor, I don't think the name of the groupings or their
>>> description statements should allude to something that doesn't exist
>>> yet.  Rather than e.g. "source-or-group", could it be instead
>>> something like "source-type"?
>> +1
>>
>>> Also, the update seems to be for both when specifying networks as
>>> well as when specifying port-ranges, but the original issue (see
>>> below) only mentioned addresses - is the pull-request actually what's
>>> needed and the description of the issue in Section 8 is incomplete?
>>>
>>>       8.  Open Issues
>>>
>>>          o  The current model does not support the concept of
>>> "containers"
>>>
>>>               used to contain multiple addresses per rule entry.
>> Object groupings are useful whenever there are many of something.
>> There are usually more address entries than ports, so perhaps more
>> useful for addresses, but it can still be useful to say "NFS-PORTS"
>> and mean all the ports that NFS use (god knows what they are).
>>
>> Other have mentioned scale ACL and that it can be solved in other
>> ways. To me, this sort of object-groupings is not about optimising
>> things for the hardware but rather making it easy for me to write
>> rules. I think it is paramount for security that ACLs can be easily
>> read and understood. If we do not understand them, then we cannot say
>> they are effective and secure. Object groupings greatly improves the
>> readability of ACLs and thus makes it easier to write secure ACLs.
>>
>> I understand the authors wishes to get the first version out the door
>> but I can't help but wonder if it isn't just easier to add in object
>> groupings now. It's not that damn complicated (they are just lists).
>> If not, I'm happy to work with them on the next version which could
>> include object groupings.
> Please let's aim for the next version.  This document just completed
> what I think is its FIFTH last call, which to me is nothing short of insane.
+1 for publishing the draft now.

If there are further bells and whistles that need to be added then 
ideally they would be covered by an ACL-extensions model that augments 
the base ACL model.  If tweaks are required to the base model to achieve 
it then I think that creating a v2 version of the ACL model is also OK.

Thanks,
Rob