Re: [secdir] Secdir review of draft-ietf-rtgwg-yang-key-chain-17

"Acee Lindem (acee)" <acee@cisco.com> Mon, 10 April 2017 15:15 UTC

Return-Path: <acee@cisco.com>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 579471294F6; Mon, 10 Apr 2017 08:15:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.522
X-Spam-Level:
X-Spam-Status: No, score=-14.522 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sOC_61_Qx9Wj; Mon, 10 Apr 2017 08:15:03 -0700 (PDT)
Received: from alln-iport-3.cisco.com (alln-iport-3.cisco.com [173.37.142.90]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2CA2D129549; Mon, 10 Apr 2017 08:14:48 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=20408; q=dns/txt; s=iport; t=1491837288; x=1493046888; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=lQ9PxPR1XrifjWiKnV9XPRh5lYpD+hxrqcIibFrrync=; b=dx+2+Go8yGcCdPg5NomXGB7J95WUqAKM/nE/qBWXKwunMxF0beQ/bAnp Dqssdh0u1hL7JoG2rjdA60bxScYwOTJTd4H5dAKUNkhdRWw41tln4MBj+ c8c4+a8eQ5joaoTL8GV2oiawqZ3Ejv2h9wMd3XmeU6SWol5olI+SZp6VY E=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AXAQCXoOtY/4sNJK1TChkBAQEBAQEBAQEBAQcBAQEBAYJuOiuBbAeNcpFHlVeCD4YkAoNgPxgBAgEBAQEBAQFrKIUVAQEBAQN5EAIBCBEDAQIZCAcHMhQJCAIEDgWKD6shimMBAQEBAQEBAQIBAQEBAQEBAQEBAR2LQIQuSC6FFwWPakGFdYZbAZJYkUGTfwEfOIEFWxVBhFscgWN1iFKBDQEBAQ
X-IronPort-AV: E=Sophos;i="5.37,182,1488844800"; d="scan'208,217";a="409503411"
Received: from alln-core-6.cisco.com ([173.36.13.139]) by alln-iport-3.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 10 Apr 2017 15:14:47 +0000
Received: from XCH-RTP-002.cisco.com (xch-rtp-002.cisco.com [64.101.220.142]) by alln-core-6.cisco.com (8.14.5/8.14.5) with ESMTP id v3AFEkse019525 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Mon, 10 Apr 2017 15:14:46 GMT
Received: from xch-rtp-015.cisco.com (64.101.220.155) by XCH-RTP-002.cisco.com (64.101.220.142) with Microsoft SMTP Server (TLS) id 15.0.1210.3; Mon, 10 Apr 2017 11:14:46 -0400
Received: from xch-rtp-015.cisco.com ([64.101.220.155]) by XCH-RTP-015.cisco.com ([64.101.220.155]) with mapi id 15.00.1210.000; Mon, 10 Apr 2017 11:14:46 -0400
From: "Acee Lindem (acee)" <acee@cisco.com>
To: Vincent Roca <vincent.roca@inria.fr>
CC: IESG <iesg@ietf.org>, "secdir@ietf.org" <secdir@ietf.org>, "draft-ietf-rtgwg-yang-key-chain.all@ietf.org" <draft-ietf-rtgwg-yang-key-chain.all@ietf.org>, "Brian Weis (bew)" <bew@cisco.com>
Thread-Topic: Secdir review of draft-ietf-rtgwg-yang-key-chain-17
Thread-Index: AQHSsgOCIbru9yr36U22nYG50kP+YKG+r7UAgABGSID//8A6AA==
Date: Mon, 10 Apr 2017 15:14:46 +0000
Message-ID: <D51117B0.A8083%acee@cisco.com>
References: <7B34A968-7AC9-4CBA-9F84-61AB90EDF65F@inria.fr> <D5111166.A8060%acee@cisco.com> <342F77BA-C6E4-4865-9D98-A2923312D80A@inria.fr>
In-Reply-To: <342F77BA-C6E4-4865-9D98-A2923312D80A@inria.fr>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.116.152.197]
Content-Type: multipart/alternative; boundary="_000_D51117B0A8083aceeciscocom_"
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/1YLFOnZxV9aup2hwwIa22MDPxw8>
Subject: Re: [secdir] Secdir review of draft-ietf-rtgwg-yang-key-chain-17
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 10 Apr 2017 15:15:05 -0000

Hi Vincent,

From: Vincent Roca <vincent.roca@inria.fr<mailto:vincent.roca@inria.fr>>
Date: Monday, April 10, 2017 at 11:02 AM
To: Acee Lindem <acee@cisco.com<mailto:acee@cisco.com>>
Cc: Vincent Roca <vincent.roca@inria.fr<mailto:vincent.roca@inria.fr>>, IESG <iesg@ietf.org<mailto:iesg@ietf.org>>, "secdir@ietf.org<mailto:secdir@ietf.org>" <secdir@ietf.org<mailto:secdir@ietf.org>>, "draft-ietf-rtgwg-yang-key-chain.all@ietf.org<mailto:draft-ietf-rtgwg-yang-key-chain.all@ietf.org>" <draft-ietf-rtgwg-yang-key-chain.all@ietf.org<mailto:draft-ietf-rtgwg-yang-key-chain.all@ietf.org>>, "Brian Weis (bew)" <bew@cisco.com<mailto:bew@cisco.com>>
Subject: Re: Secdir review of draft-ietf-rtgwg-yang-key-chain-17

Hello Acee,

Thanks for your review.

You're welcome.


** Question: when saying:

        "When configured, the key-strings can be encrypted using the AES Key Wrap algorithm"

   you do not provide any recommendation. I understand it is possible, but is there any good
   reason to recommend it or do you believe the NETCONF access control feature is sufficient?
   Are there environments where recommending it would be meaningful? I'd like to have more
   information.
   This is a bit surprising when I compare with last paragraph where keys are RECOMMENDED
   to be encrypted when stored within network devices.

This was added after a conversation with Brian Weis who I believe is also on the directorate. At this time, we didn't avail NCAM. As one would surmise, it was for additional security for the key strings themselves. I'm not opposed to removing the feature completely since no one has implemented it and it is somewhat unwieldy to have to distribute the key-encryption password out-of-band.

I don't have any opinion on the topic, just asked the question.
Let's see what our ADs think.

Note that I meant NCACM (RFC 6536). Yes, lets see the opinions here. I believe that RFC 6536 will be substantially more widely implemented and deployed than RFC 5649.


** Minor comment: I don't see any good reason to separate paragraphs 2 and 4.

Where?

I forgot to mention, sorry. I was considering the « Security Considerations » section.
Re-ordering those two closely related paragraphs could make sense.

Yes - I will combine them. The first two paragraphs are recent boiler plate paragraphs for the "Security Considerations" in all YANG model drafts.


Other comments:

** section 1.2: it says:
        " o  Brackets "[" and "]" enclose list keys."
   There may be a confusion with the term "keys" here (i.e., something different from
   a cryptographic key).

   For instance, in section 3.3:
        |  +--rw key-chain* [name]
   name is not a cryptographic key.

This is pretty much boiler plate text for YANG model trees. I guess I could add the statement:

"These YANG list keys should not be confused with the key-chain keys."


Yes, in an I-D entirely devoted to key exchanges, using the key term with a totally
different meaning is error prone (it took me some time to identify the point).


** section 2.2: there's something I don't understand. It says:
    3.  When the send lifetime of the new key becomes valid, the network
        devices within the domain of key chain will start sending the new
        key.

  I have the feeling you mean that this new key will start to be used for transmissions
  (instead of "start sending the new key"). Did I misunderstood something?

Absolutely, I will correct this.

That was a big mistake then.
It's nice to see that SecDir reviews are useful.

Cheers,

  Vincent