Re: [secdir] Urgent need for a person from the security directorate to review key pionts in I2RS security

Kathleen Moriarty <> Fri, 14 August 2015 16:51 UTC

Return-Path: <>
Received: from localhost ( []) by (Postfix) with ESMTP id 222B61A88DE for <>; Fri, 14 Aug 2015 09:51:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id OqCr4CH6SpsM for <>; Fri, 14 Aug 2015 09:51:26 -0700 (PDT)
Received: from ( [IPv6:2607:f8b0:400d:c09::22e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by (Postfix) with ESMTPS id C231E1A883C for <>; Fri, 14 Aug 2015 09:51:25 -0700 (PDT)
Received: by qkfj126 with SMTP id j126so27446615qkf.0 for <>; Fri, 14 Aug 2015 09:51:25 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;; s=20120113; h=from:content-type:mime-version:subject:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=pSI81howGKc/7ZLMYWCW5ofE5UetG4iFzr3MLMuTfH8=; b=DZQI4CNayD8Iu5vzcTo/F9lbiwg4KSdUTG5faHNzL8+tioqFTySDY2E7h13jq2wVsD BXejt1fl+GzKZMlfOIktAVMMQhtO/s2ZDP+R025xiumAdwRlv8TTAWvjH+tmT/u/nJH5 rkQmnTMlBYeMe+Ue7zuVeVPfQ4jAAqb0F+Kii3/zb7rESh54nIogfoIRhFuLUAgoWWmL ASXHowmNVTuvvXnUQemr4XzwOKvu/sI/++QSwdEAJQFqZzUcs5bLq05x+mvve+TRlEX6 qckKKvdVwC8GzkIAapL8F9HWYjJ8FhwlT6OmaXewMyrCchYwF6QuhmKOVb02+V8n14Rx dV5w==
X-Received: by with SMTP id 14mr78831339qkw.58.1439571084994; Fri, 14 Aug 2015 09:51:24 -0700 (PDT)
Received: from [] ( []) by with ESMTPSA id 65sm3347278qks.30.2015. (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Fri, 14 Aug 2015 09:51:24 -0700 (PDT)
From: Kathleen Moriarty <>
X-Google-Original-From: Kathleen Moriarty <>
Content-Type: multipart/alternative; boundary="Apple-Mail-F8162CDD-285A-4C7A-90C3-58F76B677B04"
Mime-Version: 1.0 (1.0)
X-Mailer: iPhone Mail (12H143)
In-Reply-To: <010901d0d6b0$e82fcfa0$b88f6ee0$>
Date: Fri, 14 Aug 2015 12:51:23 -0400
Content-Transfer-Encoding: 7bit
Message-Id: <>
References: <010901d0d6b0$e82fcfa0$b88f6ee0$>
To: Susan Hares <>,
Archived-At: <>
Cc: Jeffrey Haas <>, Alia Atlas <>
Subject: Re: [secdir] Urgent need for a person from the security directorate to review key pionts in I2RS security
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Security Area Directorate <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Fri, 14 Aug 2015 16:51:29 -0000


Can we have a volunteer to assist with this request for an early review on I2RS work?

Tero is on vacation and I'm not sure who would be next in the rotation, but it would also be good to have someone interested in the topic.

Thank you!

Sent from my iPhone

> On Aug 14, 2015, at 12:47 PM, Susan Hares <> wrote:
> Security directorate:
> I need help rather urgently.  The I2RS and the NETCONF WGs are collaborating to create the I2RS protocol.  The design team will begin its work next week (8/17) so I need someone who can help for the next 2 weeks.  We really need a security person to help us for the next few weeks to determine what are necessary security requirements for this protocol.   I am willing to provide tutorial and information for the security person.
> NETCONF reviewers have suggested that some of the I2RS security requirements are unclear or “not security” requirements.  The NETCONF reviewers have also suggested that the optional insecure transport for non-configuration data) will not be approved by the security ADs or reviewers.  Rather that both groups arguing over what they think a security reviewer will say – we’d like a person from the security directorate to speak for the security area. 
> The security directorate has really help us in forming our work.  We had a great security review on the I2RS architecture in December 2014/January 2015 from Tero Kivinen ( Also our GEN-ART review from Russ Housley also suggested issues.  After these issues we split our security work into wire-protocol security and environment security.  We need help to determine that we have split the work correctly.  We are heading into WG adoption call on these drafts next week.
> The details are in the message below I sent to Kathleen and Stephen.  However, I recalled that last time I also need to send email to saag group that helped me get a reviewer.
> Sue Hares
> I2RS co-chair.
> From: Susan Hares [] 
> Sent: Friday, August 14, 2015 11:59 AM
> To: 'Kathleen Moriarty'; 'Stephen Farrell'
> Cc: 'Alia Atlas'
> Subject: Urgent need for a person from the security directorate to review key pionts in I2RS security
> Kathleen and Stephen:
> I sent you a request at IETF that we need a security person from the security directorate to review the following I2RS security drafts.
> and a revision of
> Perhaps you will recall I mentioned this to you on Friday of IETF.  My need has turned from urgent (in July) to “very urgent” as we start I2RS-netconf design team to work on the  I2RS protocol design next week.   Would you please find some who can advise me from the security directorate?  The details are below.
> Sue Hares
> ------------------
> Document 1)
> We had editorial feedback on requirements 3 and 4 that these requirement need clarification, and requirement 10 is ambiguous.  We would like feedback on what the security person on this need for editorial review, and
> review of the alternate text.
> In this document, we have feedback from Netconf that Requirement 8 and 12 are not security requirements.
> ·         SEC-REQ-08: Each Identity is associated with one secondary
> identity during a particular read/write sequence, but the
>     secondary identity may vary during the time a connection between
>     the I2RS client and I2RS agent is active.  The variance of the
>     secondary identity allows the I2rs client to be associated with
>     multiple applications and pass along an identifier for these
>     applications in the secondary identifier.
> ·         SEC-REQ-12: The I2RS Client and I2RS Agent protocol SHOULD implement
>    mechanisms that mitigate DoS attacks
> Our input from the Ericsson network security is the mitigation of DDos was important.
> Also, the I2RS protocol will have a multiple message sequence in which the local system can:
>    1.  Perform all or none: All operations succeed or none of them will
>        be applied.  This useful when there are mutual dependencies.
>    2.  Perform until error: Operations are applied in order, and when
>        error occurs the processing stops.  This is useful when
>        dependencies exist between multiple-message operations, and order
>        is important.
>    3.  Perform all storing errors: Perform all actions storing error
>        indications for errors.  This method can be used when there are
>        no dependencies between operations, and the client wants to sort
>        it out.
> Is the ability to do impact security?  If so, we need to craft this work.
> If not, we will pull this from the security section.
> Lastly, the I2RS group early in its architecture decided that it was important to provide some information via an insecure connection.  Publishing information via an insecure connection must consider the information and the context.  This insecure data was going to be used to provide global information that ISPs would want to publish to public from a router.
> The architecture document:
> I will be calling for the I2RS WG to reconsider the insecure connection, but I suspect the I2RS WG will want the secure connection.   I need a person from the security directorate to discuss the issues with during the WG call regarding the insecure connection.   Unless there is overwhelming agreement to get rid of the insecure connection, the I2RS chairs and AD are likely to keep it in.
> Document 2)
> This draft considers the security environment that the I2RS operates within.  The security review in December 2014 indicated several comments that led us to work on a security environment draft.