Re: [OPSAWG] I-D Action: draft-ietf-opsawg-sdi-06.txt

tom petch <ietfc@btconnect.com> Mon, 06 April 2020 15:50 UTC

Return-Path: <ietfc@btconnect.com>
X-Original-To: opsawg@ietfa.amsl.com
Delivered-To: opsawg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C67E13A0F88 for <opsawg@ietfa.amsl.com>; Mon, 6 Apr 2020 08:50:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=btconnect.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id d_c6I0u5mhtj for <opsawg@ietfa.amsl.com>; Mon, 6 Apr 2020 08:50:03 -0700 (PDT)
Received: from EUR02-AM5-obe.outbound.protection.outlook.com (mail-eopbgr00119.outbound.protection.outlook.com [40.107.0.119]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E46D23A0B4D for <opsawg@ietf.org>; Mon, 6 Apr 2020 08:49:39 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=fjkZP93f/WDvoRHT81zrK8N10qtKed4/ai12R0elMvoCwM0mTKjzY5McR5lZ7pjcZYNzCvERNVhMgL2vCG9D/fWadg0pQX4nofqZWVt8iieGCE2nUrZi6h1l5BKB0LXUnwVhSdJIHZqwUiorFjG1T/nO80r4sM3TMhMcHMVCHhQxuLXMXYjZAfmK8q98qgSShHKRCcqrca0i8iJzgIUf2odLFSN2rH5Y4BTFrqSSuytIuzGHrK9Z74NUjiHXR7P3zr3Vpe97ZV9nk0ssx+KxR/OHxc8nZAiqFkEPDL0LyPVTxjlVod6mLK7vg8SuZNUHs2MzcyceaeTMnEW7rmEmMQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=hD+03j1mYpm646DVvfq72R5arAagIN5zY0eNcShCPsI=; b=gMJzFf6Ecc8cAfY+ZJiRQTy0Kc4oZAQEUJJM7CGvwcx6nZF4ZcK/ccdxD6v+Sp3+HCoabkMHxclC7s7rAs5rlc/9clpVlRdI7Eaf7hW06OJS88RCWCbYfuXcvP9ezJPXAr15Z6XMoHd4FFj0TsaeCoTL0Gobh1udgvw4guo7MctdhvAHUnA0PDUwBJ+pb0gJ6tpevlFVBzy8bmHNWDNBewMMFPfDVrnuGS6WPwFPm4gnrZ7jo3vDv6bI1oKjXzBAi9kA4ylTk9F7B76mmjMtwEtkESXpfdV7CtdfSxmk/pLVLePlMGWdjFq2KpBchgmIplz9rQ4zIfdfr8tXEtI8dg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=btconnect.com; dmarc=pass action=none header.from=btconnect.com; dkim=pass header.d=btconnect.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=btconnect.onmicrosoft.com; s=selector2-btconnect-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=hD+03j1mYpm646DVvfq72R5arAagIN5zY0eNcShCPsI=; b=d4muWN2ixlO7CuyMzSP8FDNLId85S4G3GidFFuu7v6gZTVcJAV9hFvblBAw2mHs5ROvo5GNZ1wp8AedR7ZJoxRCrwl0z8htfeibWSe1x+EXNX3B5NfAdY2ReajzKXOdzpf+Y+0wW7r0I2YxT0e1j3C0zwKx7rhhTmWoX0Vmd2Ok=
Received: from DB7PR07MB5657.eurprd07.prod.outlook.com (20.178.85.222) by DB7PR07MB5658.eurprd07.prod.outlook.com (20.178.107.144) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2900.12; Mon, 6 Apr 2020 15:49:37 +0000
Received: from DB7PR07MB5657.eurprd07.prod.outlook.com ([fe80::a438:bbc9:2ffe:33ee]) by DB7PR07MB5657.eurprd07.prod.outlook.com ([fe80::a438:bbc9:2ffe:33ee%5]) with mapi id 15.20.2900.012; Mon, 6 Apr 2020 15:49:37 +0000
From: tom petch <ietfc@btconnect.com>
To: Warren Kumari <warren@kumari.net>
CC: "opsawg@ietf.org" <opsawg@ietf.org>
Thread-Topic: [OPSAWG] I-D Action: draft-ietf-opsawg-sdi-06.txt
Thread-Index: AQHWCfg7OICJyubiukuZB1JQVnMIPahr51s+gABOyoCAAAibXw==
Date: Mon, 06 Apr 2020 15:49:37 +0000
Message-ID: <DB7PR07MB5657A3756C15B82A65F2D72DA0C20@DB7PR07MB5657.eurprd07.prod.outlook.com>
References: <158594643249.23574.16483224996635431528@ietfa.amsl.com> <DB7PR07MB5657863B6A4D9948881C2DBCA0C20@DB7PR07MB5657.eurprd07.prod.outlook.com>, <CAHw9_iKn56LbAwgPvXjsXuQ=6JDQGozvMO4P6LjQgTzM2X0-6g@mail.gmail.com>
In-Reply-To: <CAHw9_iKn56LbAwgPvXjsXuQ=6JDQGozvMO4P6LjQgTzM2X0-6g@mail.gmail.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=ietfc@btconnect.com;
x-originating-ip: [81.131.229.19]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 58d76af1-d71a-428b-7d2a-08d7da421c8b
x-ms-traffictypediagnostic: DB7PR07MB5658:
x-microsoft-antispam-prvs: <DB7PR07MB56588E4C6EC6AF0E4A6E58F7A0C20@DB7PR07MB5658.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:8882;
x-forefront-prvs: 0365C0E14B
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DB7PR07MB5657.eurprd07.prod.outlook.com; PTR:; CAT:NONE; SFTY:; SFS:(10019020)(136003)(346002)(376002)(39860400002)(396003)(366004)(6916009)(66446008)(45080400002)(76116006)(478600001)(64756008)(316002)(4326008)(2906002)(91956017)(66946007)(71200400001)(66476007)(66556008)(966005)(26005)(8676002)(6506007)(53546011)(7696005)(8936002)(86362001)(81166006)(81156014)(186003)(52536014)(33656002)(9686003)(55016002)(5660300002)(66574012); DIR:OUT; SFP:1102;
received-spf: None (protection.outlook.com: btconnect.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: xs8ixYLoX6uLVyxhHAOQXCv9L6scylHRP/v86fIHx3cOe0WPJ8C4s+QuKixsu4NWpyjHabnPinKl9b7Xe/CERasdNALDEcmkSKwFoby+LelpcMw4wEdfZn1iKrAAjW6Gpbs4bLmC4toQXQzAjYbL9vY7T+Ikho0k+7cUfMvVAAOAjsy4CB4KRORULGOLgkTbw8KmXzywG21++rs4or65P9GdtBCHUHMZ99yA1JmJceCqQjyWZNDs5M0nApDNhVOn33rFYQsliFb4X7w3UQUMlwR0cFFV9qoAMynI2WrUHl3pd7X8myVxvbyAP4sQU3gUCXXah/GiCU1sf7+8uDxq5N6qzkCWxlkiuGTpm5MNPAY30bA4JUlIylxF8tPVjBWtElwylWVHMph/6Ps0WjxLyeJN82ROHhSexUaOY1EWUG2fYGMJ/oJ+PYZf/Z3iiNwOTHxPeIOM0Bd4m22OnEqfVln4Z9ZFC/zREsYldRT+mZFyFqnN4+iawTJCgvOWpbCF
x-ms-exchange-antispam-messagedata: eJyRXUXkZB+uulj36W+3JkLaw0SBfEtDppRKSAACZpPgHHKDRKIUfm5LUYo2MBEYC5skms9d78BuCBKupmmUlpqb3mxdH0xd98JGCsjb63qy3WEOHa5J1oOxwKpBpL78IQPwsHFSoe/W1FIi/p5Vdw==
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: btconnect.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 58d76af1-d71a-428b-7d2a-08d7da421c8b
X-MS-Exchange-CrossTenant-originalarrivaltime: 06 Apr 2020 15:49:37.7045 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: cf8853ed-96e5-465b-9185-806bfe185e30
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: Mei1FKVvZL6us/66vEI4JpVDWJwE4Uil1y9fQrEizFF+XObQ+8om+Csqay8hls8+bhv4hziOt9WaT483pzuNUg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB7PR07MB5658
Archived-At: <https://mailarchive.ietf.org/arch/msg/opsawg/rrYL4BbYe-gfrUF1e4V4vXPJmko>
Subject: Re: [OPSAWG] I-D Action: draft-ietf-opsawg-sdi-06.txt
X-BeenThere: opsawg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: OPSA Working Group Mail List <opsawg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/opsawg>, <mailto:opsawg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/opsawg/>
List-Post: <mailto:opsawg@ietf.org>
List-Help: <mailto:opsawg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsawg>, <mailto:opsawg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 06 Apr 2020 15:50:10 -0000

From: Warren Kumari <warren@kumari.net>
Sent: 06 April 2020 16:07

On Mon, Apr 6, 2020 at 6:36 AM tom petch <ietfc@btconnect.com> wrote:
>
> Warren
>
> Where I think I get confused with this is its context.  Abstract talks of travelling to a datacentre and elsewhere there are references to a POP, both of which to me have a flavour of a well-staffed high in technical expertise locations where this sort of work is little needed.  I think more of enterprise, where an organisation may have two well equipped data centres and dozens or hundreds of locations with little or no support staff where this issue is paramount.  I think that this is more a question of language than of changing the technical details but it does keep jarring with me.  In the same vein, the references to routers jars with me since while that may be an issue in an operator POP, I see the need to configure other kinds of servers as more pressing.
>
> The other more technical issue is TFTP which yes, I expect will be widely used but which, IMHO, is only ever used over a LAN and so, short of VLAN, which indeed some enterprise do use, implies that the device and config server are on the same LAN, ie in the same building or at least campus.  Again, it is a question of context, is it assumed that device and server are proximal?

It is often surprising to me just how much one's experiences and
situations influence one's assumptions and outlook - it seems that I
may have assumed that others have the same experiences / didn't
explain the context well.

It is quite common that operators want to install a peering router /
switch at a location where they have no employees - common examples of
this are IXP / POP / data-center / anywhere where they peer with
others (e.g Ashburn Equinix). While there are (often) technical people
at the location, they are either employed by the datacenter operator
(e.g Equinix, AMS-IX), or by one's "competitors" - this means that you
really don't want to hand them a copy of your config file and ask them
to stick it on the device. Operators generally order a circuit from
inside their network to the location, and then order a device to be
shipped there... and then have to dispatch a person to stick the
initial config on the device. Traditional (unencrypted) autoboot
doesn't solve this, because $whoever could just plug their laptop into
the newly installed circuit, perform the autoboot routine, and have a
copy of the config.

Another very common case is for an ISP (think Verizon, or Telus) to
deliver a circuit to a customer - they have a contractor which
delivers the fiber, and then roll a truck to have someone physically
plug in a PE / CPE router and install the initial config. Again, they
don't really want to hand the config to the user, and also cannot use
the current autoboot solutions for the same reason - the customer
could just plug their own device / laptop into the newly installed
circuit, autoboot and grab the config / join the IGP / whatever.

These are the specific use-case that this is intending to solve - many
/ almost all network devices already support some sort of autoboot
where they DHCP (or similar) and then fetch (TFTP is a very common
mechanism[0], but by no means the only one) an **unencrypted** config
file -- all that this document does is say "keep doing that, but
download an encrypted config instead". It intentionally is kept simple
- vendors already have their own autoboot functionality and this is a
simple patch to that. Vendors also already have a way to put
per-device state (such as a serial number, licence, and often crypto
goop in a TPM, etc) - in some cases all they will need to do is
publish the public key, indexed by the serial number (a number of
vendors have said that this will be trivial). The document is
intentionally kept flexible because so much of this builds on vendor
proprietary solutions; and so instead of saying "Step 1: Do X. Step 2:
Do Y, ... Step N: Do N", it describes the concept, and leaves it to
the (more than capable) vendors to figure out how to implement it in
their system.

This also is only aimed at network devices - other types of servers
may be more pressing, but this document tries not to boil the ocean -
it simply says "instead of grabbing an unencrypted config, grab an
encrypted one, decrypt it and done!"

Hopefully this better sets the scene / explains the context and use
case? I'm not sure if there is a concise way to explain this in the
draft...

<tp>
Warren, thanks for that.,  I sort of guessed the first but not the second.   For the second, do you get TFTP over a newly laid fibre?  I was thinking not based on what I have seen but if you do then that is fine..
 
Scenarios I have encountered do not fit either of these two e.g. upgrades to a remote enterprise office with lots of staff but no technical expertise or the installation of a single device that must be secure (e.g.  Hole in the Wall) but that is ok, it is just that I do not quite see the draft excluding them,

I think that it is possible to write an introduction that limits the scope along the lines you sketch out.  Do you have any other scenario?

Tom Petch

W
[0]: I'm using in the document because it is the archetype, and
familiar to the intended audience...


>
> I would like to see these two points nailed down more after which I could propose some refinement to the language.
>
> Tom Petch
>
> ________________________________________
> From: OPSAWG <opsawg-bounces@ietf.org> on behalf of internet-drafts@ietf.org <internet-drafts@ietf.org>
> Sent: 03 April 2020 21:40
> To: i-d-announce@ietf.org
> Cc: opsawg@ietf.org
> Subject: [OPSAWG] I-D Action: draft-ietf-opsawg-sdi-06.txt
>
>
> A New Internet-Draft is available from the on-line Internet-Drafts directories.
> This draft is a work item of the Operations and Management Area Working Group WG of the IETF.
>
>         Title           : Secure Device Install
>         Authors         : Warren Kumari
>                           Colin Doyle
>         Filename        : draft-ietf-opsawg-sdi-06.txt
>         Pages           : 18
>         Date            : 2020-04-03
>
> Abstract:
>    Deploying a new network device often requires that an employee
>    physically travel to a datacenter to perform the initial install and
>    configuration, even in shared datacenters with "smart-hands" type
>    support.  In many cases, this could be avoided if there were a
>    standard, secure way to initially provision the devices.
>
>    This document extends existing auto-install / Zero-Touch Provisioning
>    mechanisms to make the process more secure.
>
>    [ Ed note: Text inside square brackets ([]) is additional background
>    information, answers to frequently asked questions, general musings,
>    etc.  They will be removed before publication.  This document is
>    being collaborated on in Github at: https://github.com/wkumari/draft-
>    wkumari-opsawg-sdi.  The most recent version of the document, open
>    issues, etc should all be available here.  The authors (gratefully)
>    accept pull requests. ]
>
>    [ Ed note: This document introduces concepts and serves as the basic
>    for discussion - because of this, it is conversational, and would
>    need to be firmed up before being published ]
>
>
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-opsawg-sdi/
>
> There are also htmlized versions available at:
> https://tools.ietf.org/html/draft-ietf-opsawg-sdi-06
> https://datatracker.ietf.org/doc/html/draft-ietf-opsawg-sdi-06
>
> A diff from the previous version is available at:
> https://www.ietf.org/rfcdiff?url2=draft-ietf-opsawg-sdi-06
>
>
> Please note that it may take a couple of minutes from the time of submission
> until the htmlized version and diff are available at tools.ietf.org.
>
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
>
>
> _______________________________________________
> OPSAWG mailing list
> OPSAWG@ietf.org
> https://www.ietf.org/mailman/listinfo/opsawg
>
> _______________________________________________
> OPSAWG mailing list
> OPSAWG@ietf.org
> https://www.ietf.org/mailman/listinfo/opsawg



--
I don't think the execution is relevant when it was obviously a bad
idea in the first place.
This is like putting rabid weasels in your pants, and later expressing
regret at having chosen those particular rabid weasels and that pair
of pants.
   ---maf