Re: [OPSAWG] WG adoption poll for draft-wkumari-opsawg-sdi-04

Qin Wu <bill.wu@huawei.com> Mon, 24 June 2019 01:52 UTC

Return-Path: <bill.wu@huawei.com>
X-Original-To: opsawg@ietfa.amsl.com
Delivered-To: opsawg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7CA22120282; Sun, 23 Jun 2019 18:52:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.301
X-Spam-Level:
X-Spam-Status: No, score=-2.301 tagged_above=-999 required=5 tests=[RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id y45RRhWsnNwO; Sun, 23 Jun 2019 18:51:59 -0700 (PDT)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 56BE312027F; Sun, 23 Jun 2019 18:51:59 -0700 (PDT)
Received: from lhreml704-cah.china.huawei.com (unknown [172.18.7.106]) by Forcepoint Email with ESMTP id B061F62E7858530B450D; Mon, 24 Jun 2019 02:51:56 +0100 (IST)
Received: from NKGEML413-HUB.china.huawei.com (10.98.56.74) by lhreml704-cah.china.huawei.com (10.201.108.45) with Microsoft SMTP Server (TLS) id 14.3.408.0; Mon, 24 Jun 2019 02:51:56 +0100
Received: from NKGEML513-MBX.china.huawei.com ([169.254.1.66]) by NKGEML413-HUB.china.huawei.com ([10.98.56.74]) with mapi id 14.03.0415.000; Mon, 24 Jun 2019 09:51:46 +0800
From: Qin Wu <bill.wu@huawei.com>
To: Michael Richardson <mcr+ietf@sandelman.ca>, Warren Kumari <warren@kumari.net>
CC: "opsawg@ietf.org" <opsawg@ietf.org>, OpsAWG Chairs <opsawg-chairs@ietf.org>
Thread-Topic: [OPSAWG] WG adoption poll for draft-wkumari-opsawg-sdi-04
Thread-Index: AdUqLwqWnJ5uw0F+T0Wnt4E/Ctkl4g==
Date: Mon, 24 Jun 2019 01:51:46 +0000
Message-ID: <B8F9A780D330094D99AF023C5877DABAA49AAE33@nkgeml513-mbx.china.huawei.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.134.31.203]
Content-Type: text/plain; charset="gb2312"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/opsawg/MAFzEb9u2N_54FyT5yhPBQ3gkR4>
Subject: Re: [OPSAWG] WG adoption poll for draft-wkumari-opsawg-sdi-04
X-BeenThere: opsawg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: OPSA Working Group Mail List <opsawg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/opsawg>, <mailto:opsawg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/opsawg/>
List-Post: <mailto:opsawg@ietf.org>
List-Help: <mailto:opsawg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsawg>, <mailto:opsawg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Jun 2019 01:52:02 -0000

Interesting, try to understand the key difference between device enroll in secure environment and device enroll in in secure environment?
Does the mechanism proposed in this draft work for the device behind the firewall or NAT?

-Qin Wu
-----邮件原件-----
发件人: OPSAWG [mailto:opsawg-bounces@ietf.org] 代表 Michael Richardson
发送时间: 2019年6月19日 8:47
收件人: Warren Kumari <warren@kumari.net>
抄送: opsawg@ietf.org; OpsAWG Chairs <opsawg-chairs@ietf.org>
主题: Re: [OPSAWG] WG adoption poll for draft-wkumari-opsawg-sdi-04


Warren Kumari <warren@kumari.net> wrote:
    > Here is a link to the slidedeck from IETF104 to refresh your memory -
    > https://datatracker.ietf.org/meeting/104/materials/slides-104-opsawg-draft-wkumari-opsawg-sdi-01.pdf
    > -- basically the entire document is summarized in 2 slides (slide 9,
    > 10).  If you'd prefer video -- https://youtu.be/a479Zohc5yg?t=1266

    > The main design criteria for this was to be as simple as possible, to
    > make it trivial to implement and use. This is specifically designed to
    > just augment existing auto-install functionality; there are much more
    > ambitious and fully featured solutions (such as ANIMA and RFC 8572)
    > available for those who can / want to use them.

Your claim that BRSKI is too complex is interesting, and I'd like to discuss this with you over beer.  But, I appreciate you trying to do this.
Saving CO2 expended by silly airplane flights is appreciated.

We did consider a protocol such as you describe.
The limitation is that it does not necessarily enroll the new device into the ISP's security domain, and we really wanted that.

The Config file provided could do that, and as you say, some staging mechanism could also use ssh to do that as well.  But, that wouldn't really be a standard, and we needed something more specific.

I think you need a bit more text to explain why the device should trust the DHCP server; and also how the owner convinces the manufacturer to turn over this key.  As written, it looks like if I get a good look at the label of a BFR I have a good chance of getting the key, and I'm sure you intend something more involved.

It's unclear to me if this key should be retained in the factory reset situation or not; I think you offer both possibilities, but each version has some security gotchas, and I think it needs to be explained.

I would like you to consider specifying a standard format for the encrypted
configuration.   CMS, PGP, JOSE, COSE... pick one or more.  That way, we can
have tools that can support a multiple of vendors equipment.

Failing such a choice, I don't see anything in this description which a manufacturer can't unilaterally do today.  So maybe it's a BCP, and and it can go into an RFP. I don't think it's Informational: BCP or STD.

    > I'd really appreciate your review and comment; it's short (if you
    > ignore the ASCII art diagrams and example appendix and similar it is 7
    > or 8 pages, and much of that is background).  W

Adopt it.

ps: it would be nice if the initial DHCP request included a MUD URL, so that
    the infrastructure can know what the device is expected to do,
    particularly if that might involve calling home to get the latest
    firmware before operating.
    Should the device get any kind of Internet access from the DHCP server?

--
Michael Richardson <mcr+IETF@sandelman.ca>, Sandelman Software Works  -= IPv6 IoT consulting =-