Re: [netmod] Last Call: draft-ietf-netmod-snmp-cfg-03 (20131220)

"Randy Presuhn" <randy_presuhn@mindspring.com> Sat, 11 January 2014 09:53 UTC

Return-Path: <randy_presuhn@mindspring.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 04BEF1AD7C1 for <netmod@ietfa.amsl.com>; Sat, 11 Jan 2014 01:53:17 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.7
X-Spam-Level:
X-Spam-Status: No, score=0.7 tagged_above=-999 required=5 tests=[BAYES_50=0.8, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZA3EcCwxKPku for <netmod@ietfa.amsl.com>; Sat, 11 Jan 2014 01:53:15 -0800 (PST)
Received: from elasmtp-scoter.atl.sa.earthlink.net (elasmtp-scoter.atl.sa.earthlink.net [209.86.89.67]) by ietfa.amsl.com (Postfix) with ESMTP id 7CFA21AD739 for <netmod@ietf.org>; Sat, 11 Jan 2014 01:53:14 -0800 (PST)
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=dk20050327; d=mindspring.com; b=GbdKSVt1RgJ4L30Au0LPD90l/4ujamALrENbPT0AeEKEg1T9b9+WhGOIW54VeGDr; h=Received:Message-ID:From:To:References:Subject:Date:MIME-Version:Content-Type:Content-Transfer-Encoding:X-Priority:X-MSMail-Priority:X-Mailer:X-MimeOLE:X-ELNK-Trace:X-Originating-IP;
Received: from [99.23.161.2] (helo=oemcomputer) by elasmtp-scoter.atl.sa.earthlink.net with esmtpa (Exim 4.67) (envelope-from <randy_presuhn@mindspring.com>) id 1W1vFX-0001lU-To for netmod@ietf.org; Sat, 11 Jan 2014 04:53:04 -0500
Message-ID: <005c01cf0eb3$56649180$6b01a8c0@oemcomputer>
From: Randy Presuhn <randy_presuhn@mindspring.com>
To: netmod@ietf.org
References: <CA+zZ7Ckt04fm=49ZW7KB_1mbEpQ7zAEXZsbVUHowLQYGWGPRpw@mail.gmail.com> <014201cef85b$81260cf0$837226d0$@comcast.net> <20140111.101300.219049272.mbj@tail-f.com>
Date: Sat, 11 Jan 2014 01:56:01 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2800.1478
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1478
X-ELNK-Trace: 4488c18417c9426da92b9037bc8bcf44d4c20f6b8d69d8889e105617274a0edba77c54f760b5835fbbd3629a50501980350badd9bab72f9c350badd9bab72f9c
X-Originating-IP: 99.23.161.2
Subject: Re: [netmod] Last Call: draft-ietf-netmod-snmp-cfg-03 (20131220)
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 11 Jan 2014 09:53:17 -0000

Hi -
 
> From: "Martin Bjorklund" <mbj@tail-f.com>
> To: <ietfdbh@comcast.net>
> Cc: <netmod@ietf.org>
> Sent: Saturday, January 11, 2014 1:13 AM
> Subject: Re: [netmod] Last Call: draft-ietf-netmod-snmp-cfg-03 (20131220)
...
> > 5) The security implications of not using the RFC3414 method for cloning and
> > key change are not discussed.
> 
> NETCONF generally over a secure and encrypted transport (this is
> pointed out in the Security Considerations section) hence the SNMP
> cloning mechanism is not needed.  I am not sure what kind of text you
> are looking for.
...

There's more to cloning than transport security.  The way keyChange works
requires the cloner to know the authKey/privKey of the clone-from user as
well as the secret key(s) to be used for the new user.

The Netconf client does not need to know a cloneFrom authKey/privKey to
create new users, nor does it need to reference an existing user to clone
from.  Both of these are paths permitting the potential creation of users with
combinations of protocols not represented in the usmUserTable, or to which
clone access would have been effectively blocked by an unpublished key change.
This could, for example, result in a situation where the SNMP security administrator
has blocked the ability for delegated administrators to create a noAuth/noPriv
user, but left them the ability to create auth/priv users; yet the Netconf interface
would restore that ability to those delegated administrators.

That's a fairly obvious security implication.  There are probably subtler ones, too.
I don't know whether you consider it a problem, but the properties *are*
different and should be systematically thought through and documented.

Randy