Re: [sacm] Review on draft-ietf-sacm-ecp-02

Adam Montville <adam.w.montville@gmail.com> Thu, 06 September 2018 03:38 UTC

Return-Path: <adam.w.montville@gmail.com>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8DDE112D7EA for <sacm@ietfa.amsl.com>; Wed, 5 Sep 2018 20:38:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level:
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id W6BN6y264ivD for <sacm@ietfa.amsl.com>; Wed, 5 Sep 2018 20:38:28 -0700 (PDT)
Received: from mail-oi0-x230.google.com (mail-oi0-x230.google.com [IPv6:2607:f8b0:4003:c06::230]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 64B931286E3 for <sacm@ietf.org>; Wed, 5 Sep 2018 20:38:28 -0700 (PDT)
Received: by mail-oi0-x230.google.com with SMTP id y207-v6so17827630oie.13 for <sacm@ietf.org>; Wed, 05 Sep 2018 20:38:28 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:message-id:mime-version:subject:date:in-reply-to:cc:to :references; bh=1Cs/TGqxpsSdoE3O/V3wGt4MCvryHY6sX9+XEWye6nQ=; b=M+SqYydO1QyMvKmNcCtXjJnXSbezKTY0DsgPwAxXmKX5AX5o1lLFVSrf+7bitdNHlb jKBnftjYuuImjAIYcuP5sLj64MyUuikys1zovz4WqT+PqcOQatQX5C4snEQHzkZQRfyo 2lnK0dcXu+Nz0eERa9eMv/D0/HHxNAxl2QioJ11zD54E113Ch3McI7MWRJgvmu2/lRhD X7mobI8jDEKJZscfJ0EuvObAkyC+iZrtMlB9fvNA4LFS2m/8Fp4kcZQxZRpFSMNOVWT9 9DinC5YomzLCsHTouNSrm6Drmt7g+EmktCwr1TDSDWYYBkIApwrYfA8tbK3B+vdMXLON gQHQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:message-id:mime-version:subject:date :in-reply-to:cc:to:references; bh=1Cs/TGqxpsSdoE3O/V3wGt4MCvryHY6sX9+XEWye6nQ=; b=cpjNAluePU7paKBn00vKXWqftlKwrBPX1ZMcPWvR9rPWcdhj/gPlSnrg2ZtCiCXjBV zy4djdG03Sg7rDbWk3XwbzBnPetaBJ4ldR6ZznHAR4RTHqFiXL41VEVZrsSnLAO1sY+T 7XDiJZE/n/WXkE9wsXeeO4BTD/aulh6Z7Ld5iS0t2DiRqjba4nDB68GIfoEAAyALyRWp 2tIHr329KJMibfwyMgYfw7lKpcqMRhxNE1MOz/8oHivOV4Hd9YtyJ6cTAmCHn/Ymrmq4 y1X74xrTuNl7GM2izd6Y8+lEL4RXU796R3lkDugfk0mBL9O++6EQ3iUFnBJ1sgFX/0bl iujQ==
X-Gm-Message-State: APzg51ASur/vfDeeOi5uc7aDJb/PdaYQ3zGGGvwoMFwKKQ/DYeeqECQn Hzs3RzlF3VfH1jg2XO+/wZo=
X-Google-Smtp-Source: ANB0VdbLDiLK71lX9VqPME55CFoB+KE1bZBXItCK8bq+ndxBTSYTdEj0DawnOYDQQ/zaOtJsdcYgLg==
X-Received: by 2002:aca:3110:: with SMTP id x16-v6mr908621oix.126.1536205107299; Wed, 05 Sep 2018 20:38:27 -0700 (PDT)
Received: from afv.lan (99-64-100-131.lightspeed.austtx.sbcglobal.net. [99.64.100.131]) by smtp.gmail.com with ESMTPSA id k85-v6sm10902383oiy.2.2018.09.05.20.38.25 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 05 Sep 2018 20:38:25 -0700 (PDT)
From: Adam Montville <adam.w.montville@gmail.com>
Message-Id: <A885C2F0-CBA2-4135-9E49-116BAD0AE6A3@gmail.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_1575FF0E-FD99-412F-A209-787FF571C72B"
Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\))
Date: Wed, 05 Sep 2018 22:38:24 -0500
In-Reply-To: <DM6PR09MB27145F9C5967B23777180D2FA5020@DM6PR09MB2714.namprd09.prod.outlook.com>
Cc: "<sacm@ietf.org>" <sacm@ietf.org>
To: "Haynes Jr., Dan" <dhaynes@mitre.org>
References: <8662CDE7-A821-4C4C-B003-A12252F94550@gmail.com> <DM6PR09MB27146985B91839BB090516D5A50A0@DM6PR09MB2714.namprd09.prod.outlook.com> <541303E9-FEDE-4B31-BD88-D276AB5EC61F@gmail.com> <DM6PR09MB27145F9C5967B23777180D2FA5020@DM6PR09MB2714.namprd09.prod.outlook.com>
X-Mailer: Apple Mail (2.3445.9.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/V128V-xOI3xjeNKsoySr4iRvbNk>
Subject: Re: [sacm] Review on draft-ietf-sacm-ecp-02
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 06 Sep 2018 03:38:31 -0000

Thanks, Danny. I snipped a bunch of the original content to save space. See inline.

> On Sep 5, 2018, at 3:53 PM, Haynes Jr., Dan <dhaynes@mitre.org> wrote:
> 
>> Section 5: When is the target endpoint told what attributes matter and their tolerance ranges?
>> [Danny]: Wouldn’t it be determined by the data models that are called out in the EPCP Implementations section?
> 
> That seems like an inference :-) To me, it's better to explain that, but mine is just one opinion.
> 
> [Danny]: I think it would be covered in the "provisioning" section in EPCP Transactions. In -03, I updated the "NOTE: TO BE EXPANDED" to say the following.
> 
> "An endpoint is provisioned with one or more attributes that will serve as its unique identifier on the network as well as the components necessary to interact with the posture manager. Examples of such identifiers include MAC addresses, serial numbers, hardware certificates compliant with [IEEE-802-1ar], and
> the identities of hardware cryptographic modules among others. Furthermore, in some cases, an endpoint may need to be provisioned with instantiations of data models if the posture collection engine is expecting posture information in that format. Once provisioning is complete, the endpoint is deployed on the network."
> 
> Does this help make it clearer? Or, if not, is there any text that you would like to see?

At first blush this seems helpful. What if the attributes of interest change over time? Not sure they will, or even should. But, the more likely scenario is when a new attribute is introduced. At that point, how do we tell the endpoint we're interested in monitoring that new attribute?

> 
>> Section 5.1: NOTE: TO BE EXPANDED before WGLC?
>> [Danny]: Yes, we will update this in the next draft.
>> Section 5.6: It feels odd to allow authorized repo access w/o specifying an interface. That said…may have a good idea for such a draft down the road a place.
>> [Danny]: Given that we don’t actually have a protocol or interface for this, I think it’s more of a note of what we want when we develop one. So, I think we are in agreement here? 
> 
> Seems that way.
>> Section 6.2.4: Why not support fetch/polling via NETCONF and RESTCONF now?
>> [Danny]: This should be supported through NETCONF and RESTCONF now. This text is just trying to say that we also want to support the self-reporting capabilities provided by Yang Push once it’s an RFC. 
> 
> Ok. Is it worthwhile to also state NETCONF/RESTCONF?
> 
> [Danny]: Section 6.2 contains normative references to NETCONF/RESTCONF. Are you looking for something more?

Sorry. This is my oversight, I think. Seems sane.

>> Section 6.3: Change “Update the policy…” to “Establish and update the policy…”
>> [Danny]: Addressed.
>> Section 6.3: Why shouldn’t the API offer commands and policy interaction?
>> [Danny]: Are you asking why the API shouldn’t offer endpoints the ability to issue commands and policy interactions?
> 
> No. The API is enabling query, but no proactive tasks. How are policies managed? Seems that the API should enable that as well.
> 
> [Danny]: I think I am confused. Doesn't the API already support managing the policy  in section 6.3 (i.e., establish and update the policy)?

I'm probably the one who is confused. :-) The way I read that section is that it addresses two means of interaction: 1) administrative interface, 2) API. I took the first three bullets as applicable to the administrative interface, and the solitary bullet as applicable to the API. If all of the bullets are applied to each, then I think the section could be rearranged to combine the two bulleted lists and state something to the effect that the list applies to both the administrative interface and the API.