Re: [netmod] Adoption of: draft-bjorklund-netmod-snmp-cfg-02 (respondby 20120420)

Wes Hardaker <wjhns1@hardakers.net> Tue, 17 April 2012 14:09 UTC

Return-Path: <wjhns1@hardakers.net>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4ECE221F84F3 for <netmod@ietfa.amsl.com>; Tue, 17 Apr 2012 07:09:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level:
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, NO_RELAYS=-0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dJqBhoX+aDKH for <netmod@ietfa.amsl.com>; Tue, 17 Apr 2012 07:09:43 -0700 (PDT)
Received: from mail.hardakers.net (unknown [IPv6:2001:470:1f00:187::1]) by ietfa.amsl.com (Postfix) with ESMTP id C8A4A21F84EC for <netmod@ietf.org>; Tue, 17 Apr 2012 07:09:43 -0700 (PDT)
Received: from localhost (unknown [IPv6:2001:470:1f00:187:224:7eff:fe6b:2b3e]) by mail.hardakers.net (Postfix) with ESMTPSA id D724276E; Tue, 17 Apr 2012 07:09:42 -0700 (PDT)
From: Wes Hardaker <wjhns1@hardakers.net>
To: Randy Presuhn <randy_presuhn@mindspring.com>
References: <002f01cd1bf7$18f9ab60$6b01a8c0@oemcomputer> <20120416.202832.486818825.mbj@tail-f.com> <000401cd1c02$aedace60$6b01a8c0@oemcomputer> <20120416.222122.489615035.mbj@tail-f.com> <000e01cd1c40$0d8f6b40$6b01a8c0@oemcomputer>
Date: Tue, 17 Apr 2012 07:09:40 -0700
In-Reply-To: <000e01cd1c40$0d8f6b40$6b01a8c0@oemcomputer> (Randy Presuhn's message of "Mon, 16 Apr 2012 19:16:07 -0700")
Message-ID: <0l8vhujvq3.fsf@wjh.hardakers.net>
User-Agent: Gnus/5.130004 (Ma Gnus v0.4) Emacs/23.3 (gnu/linux)
MIME-Version: 1.0
Content-Type: text/plain
Cc: netmod@ietf.org
Subject: Re: [netmod] Adoption of: draft-bjorklund-netmod-snmp-cfg-02 (respondby 20120420)
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/netmod>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Apr 2012 14:09:44 -0000

"Randy Presuhn" <randy_presuhn@mindspring.com> writes:

> There have been lots of different technologies thrown at the key
> management problem space over the years.  I think it would be
> worthwhile to have a security guru specializing in that topic (and
> that's certainly not me!!) give the WG some pointers to what the
> current state of the art is

I think the current state of the art with respect to shared secrets (eg,
passwords) is quite simple: don't do it.  For exactly the reasons that
are coming up here: configuring a bunch of boxes with a shared secret
means all boxes have access to it (or in the case of USM, a fortunately
local copy).  I'd say the management station should be delivering
localized keys and that's the best you can achieve. Netconf,
fortunately, should always run over an encrypted protocol and thus is
safe to deliver a localized copy.  You could, if really paranoid, define
a negotiated feature such that the localized key config object would
only be available when an encrypted session was in use.

[I understand the desire to not deliver even those like the keychange
algorithm achieves, but even the USM is typically configured the first
time by manual initialization of the secret outside USM and probably
frequently still over the network].

The state of the art, however, is typically to use public/private key
solutions instead and thus delivery of the public key of the opposite
side only requires that it not be modified and disclosure isn't a
concern.  IE, SNMP over (D)TLS (RFC6353: configuration of which is
defined in the draft) or SNMP over SSH (RFC5592: which there are not
configuration objects for at the moment).
-- 
Wes Hardaker
SPARTA, Inc.