Re: [sacm] Review on draft-ietf-sacm-ecp-02

Adam Montville <adam.w.montville@gmail.com> Thu, 06 September 2018 17:08 UTC

Return-Path: <adam.w.montville@gmail.com>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A0C4D130DCE for <sacm@ietfa.amsl.com>; Thu, 6 Sep 2018 10:08:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level:
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SsOoaLEQoUMi for <sacm@ietfa.amsl.com>; Thu, 6 Sep 2018 10:07:59 -0700 (PDT)
Received: from mail-oi0-x235.google.com (mail-oi0-x235.google.com [IPv6:2607:f8b0:4003:c06::235]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4400F130ED7 for <sacm@ietf.org>; Thu, 6 Sep 2018 10:07:59 -0700 (PDT)
Received: by mail-oi0-x235.google.com with SMTP id l82-v6so21894614oih.11 for <sacm@ietf.org>; Thu, 06 Sep 2018 10:07:59 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:message-id:mime-version:subject:date:in-reply-to:cc:to :references; bh=DYKlJ+t22U37jCz8wVL+nGcW4AoFICzzSpJoHHkGG3U=; b=JAXKTrOkZBjEYjm3ebqZEagaFS+LklaDA8wgqrOog/UkJmh7Vt5Q31we01MX340XA4 4/hqQ063W/t7Ycoo9CNJmj95dZ4J7uD9w4iTWUQZlt2i6MOCZZaVN3WDK7DzjiT2r8YH SZAmw6AWyn0lZuDowVS3jyMVXyu0H9g5PDsvxHZ0putefPYq/ll0hFQNBs/PKkb0i40p kyPLNX8dTqFdQ27KCmA2CXXKn61KEyZydlSSAagPjRchkCt/rcsnYjrAvLatgK+n58+o wZroN7PP49HcUM8GkLB4edJM4QsxmqM/db8PdHL9OSmANAE5vSvpfcIuekr4tyMU7s5y RK5A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:message-id:mime-version:subject:date :in-reply-to:cc:to:references; bh=DYKlJ+t22U37jCz8wVL+nGcW4AoFICzzSpJoHHkGG3U=; b=VGG17xYKz+citJRAnUjv5EPPkrDrIEtY1xPcqwXu6bJJCxgTwO/oLVUPVeS2J07oZi P4SXIDIMjmVEUF8KrNaTkaqvBYpMKeYRi1GgTIPaegEncIex6frT797ht9zR4yD9tCVw GJnpcpSBH+2LHS1XJcayS7EjyA+jqI0Q3ecshSQWwMLkeUw6SkLfaAVHQUEp52DtXbG3 zC8JZHfwyUv4/fvWmq23sb5sdM6/VlU4N5SYGT/iqDT5bVKZQNi+2wv+qA2Jg7HP3iHU SDjQnNPE3FIvzsHukbHUQNA1J82Wxp38eSs//JB1E9nCAMOrqp5gQTbQn9Dfqzx0Rhvm OlGA==
X-Gm-Message-State: APzg51DjfmAU3DkT5adFxd4Hf3vSMOFUeP/PF/NsAslnsMX61348EhKl EQRHYx7A5pL52aE0VyzeM1zGckGZ
X-Google-Smtp-Source: ANB0VdYURrIMTQ5WlRenowV4QqnvB9FHMHX7AIcs41eiuzonyRncH8K7B3hWTIcg1ceBm9SRgMaeEA==
X-Received: by 2002:aca:45c3:: with SMTP id s186-v6mr3482341oia.289.1536253678397; Thu, 06 Sep 2018 10:07:58 -0700 (PDT)
Received: from afv.lan (99-64-100-131.lightspeed.austtx.sbcglobal.net. [99.64.100.131]) by smtp.gmail.com with ESMTPSA id e205-v6sm14090403oia.9.2018.09.06.10.07.56 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Thu, 06 Sep 2018 10:07:56 -0700 (PDT)
From: Adam Montville <adam.w.montville@gmail.com>
Message-Id: <FA4FDD7C-3257-476F-927A-D389A0ED143A@gmail.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_1AD68284-1943-49AF-95B4-30101B1FFF71"
Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\))
Date: Thu, 06 Sep 2018 12:07:55 -0500
In-Reply-To: <DM6PR09MB27144F552850C264EBC6D323A5010@DM6PR09MB2714.namprd09.prod.outlook.com>
Cc: "<sacm@ietf.org>" <sacm@ietf.org>
To: "Haynes Jr., Dan" <dhaynes@mitre.org>
References: <8662CDE7-A821-4C4C-B003-A12252F94550@gmail.com> <DM6PR09MB27146985B91839BB090516D5A50A0@DM6PR09MB2714.namprd09.prod.outlook.com> <541303E9-FEDE-4B31-BD88-D276AB5EC61F@gmail.com> <DM6PR09MB27145F9C5967B23777180D2FA5020@DM6PR09MB2714.namprd09.prod.outlook.com> <A885C2F0-CBA2-4135-9E49-116BAD0AE6A3@gmail.com> <DM6PR09MB27144F552850C264EBC6D323A5010@DM6PR09MB2714.namprd09.prod.outlook.com>
X-Mailer: Apple Mail (2.3445.9.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/Bnym45VL1O0YqKqifWX-8P33MFE>
Subject: Re: [sacm] Review on draft-ietf-sacm-ecp-02
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 06 Sep 2018 17:08:02 -0000

Thanks, Danny. Looks like it's about buttoned up in terms of my comments?

> On Sep 6, 2018, at 12:04 PM, Haynes Jr., Dan <dhaynes@mitre.org> wrote:
> 
> Hi Adam,
>  
> Even more comments inline :).
>  
> Thanks,
> 
> Danny
>  
> From: Adam Montville <adam.w.montville@gmail.com <mailto:adam.w.montville@gmail.com>> 
> Sent: Wednesday, September 05, 2018 11:38 PM
> To: Haynes Jr., Dan <dhaynes@mitre.org <mailto:dhaynes@mitre.org>>
> Cc: <sacm@ietf.org <mailto:sacm@ietf.org>> <sacm@ietf.org <mailto:sacm@ietf.org>>
> Subject: Re: [sacm] Review on draft-ietf-sacm-ecp-02
>  
> Thanks, Danny. I snipped a bunch of the original content to save space. See inline.
> 
> 
> On Sep 5, 2018, at 3:53 PM, Haynes Jr., Dan <dhaynes@mitre.org <mailto:dhaynes@mitre.org>> wrote:
>  
> Section 5: When is the target endpoint told what attributes matter and their tolerance ranges?
> [Danny]: Wouldn’t it be determined by the data models that are called out in the EPCP Implementations section?
>  
> That seems like an inference :-) To me, it's better to explain that, but mine is just one opinion.
>  
> [Danny]: I think it would be covered in the "provisioning" section in EPCP Transactions. In -03, I updated the "NOTE: TO BE EXPANDED" to say the following.
>  
> "An endpoint is provisioned with one or more attributes that will serve as its unique identifier on the network as well as the components necessary to interact with the posture manager. Examples of such identifiers include MAC addresses, serial numbers, hardware certificates compliant with [IEEE-802-1ar], and the identities of hardware cryptographic modules among others. Furthermore, in some cases, an endpoint may need to be provisioned with instantiations of data models if the posture collection engine is expecting posture information in that format. Once provisioning is complete, the endpoint is deployed on the network."
>  
> Does this help make it clearer? Or, if not, is there any text that you would like to see?
>  
> At first blush this seems helpful. What if the attributes of interest change over time? Not sure they will, or even should. But, the more likely scenario is when a new attribute is introduced. At that point, how do we tell the endpoint we're interested in monitoring that new attribute?
> 
> [Danny]: I think those are both possible situations that we want to account for. If there is a Posture Collector on the endpoint that can collect the attributes, it just needs to be configured via the Administrative Interface or API. If there isn’t a Posture Collector on the endpoint that can collect the attributes, a new Posture Collector needs to be installed on the endpoint and then configured by the Administrative Interface or API. We can add some text to this section stating that components and data models may need to be added or updated over time to fulfill the collection needs of the enterprise. Maybe something like the following.
>  
> "An endpoint is provisioned with one or more attributes that will serve as its unique identifier on the network as well as the components and data models necessary to interact with the posture manager. Examples of such identifiers include MAC addresses, serial numbers, hardware certificates compliant with [IEEE-802-1ar], and the identities of hardware cryptographic modules among others. Once provisioning is complete, the endpoint is deployed on the network. Over time, components and data models may need to be added to the endpoint or updated to support the collection needs of an enterprise."
>  
> Section 5.1: NOTE: TO BE EXPANDED before WGLC?
> [Danny]: Yes, we will update this in the next draft.
> Section 5.6: It feels odd to allow authorized repo access w/o specifying an interface. That said…may have a good idea for such a draft down the road a place.
> [Danny]: Given that we don’t actually have a protocol or interface for this, I think it’s more of a note of what we want when we develop one. So, I think we are in agreement here? 
>  
> Seems that way.
> Section 6.2.4: Why not support fetch/polling via NETCONF and RESTCONF now?
> [Danny]: This should be supported through NETCONF and RESTCONF now. This text is just trying to say that we also want to support the self-reporting capabilities provided by Yang Push once it’s an RFC. 
>  
> Ok. Is it worthwhile to also state NETCONF/RESTCONF?
>  
> [Danny]: Section 6.2 contains normative references to NETCONF/RESTCONF. Are you looking for something more?
>  
> Sorry. This is my oversight, I think. Seems sane.
>  
> Section 6.3: Change “Update the policy…” to “Establish and update the policy…”
> [Danny]: Addressed.
> Section 6.3: Why shouldn’t the API offer commands and policy interaction?
> [Danny]: Are you asking why the API shouldn’t offer endpoints the ability to issue commands and policy interactions?
>  
> No. The API is enabling query, but no proactive tasks. How are policies managed? Seems that the API should enable that as well.
>  
> [Danny]: I think I am confused. Doesn't the API already support managing the policy  in section 6.3 (i.e., establish and update the policy)?
>  
> I'm probably the one who is confused. :-) The way I read that section is that it addresses two means of interaction: 1) administrative interface, 2) API. I took the first three bullets as applicable to the administrative interface, and the solitary bullet as applicable to the API. If all of the bullets are applied to each, then I think the section could be rearranged to combine the two bulleted lists and state something to the effect that the list applies to both the administrative interface and the API.
>  
> [Danny]: Sorry my bad. I read it wrong. I don’t see anything wrong with the interface and API supporting the same capabilities especially since it isn’t defined yet :). I will update the text to make them both support the same capabilities.