Re: [yang-doctors] [Netconf] last call review of draft-ietf-netconf-keystore-02

"t.petch" <ietfc@btconnect.com> Wed, 02 August 2017 10:20 UTC

Return-Path: <ietfc@btconnect.com>
X-Original-To: yang-doctors@ietfa.amsl.com
Delivered-To: yang-doctors@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 462A3131EA6; Wed, 2 Aug 2017 03:20:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.701
X-Spam-Level:
X-Spam-Status: No, score=-4.701 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-2.8, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=btconnect.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oBoSAf3ZmaIF; Wed, 2 Aug 2017 03:20:20 -0700 (PDT)
Received: from EUR01-HE1-obe.outbound.protection.outlook.com (mail-he1eur01on0099.outbound.protection.outlook.com [104.47.0.99]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 00CEC126BF0; Wed, 2 Aug 2017 03:20:19 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=btconnect.onmicrosoft.com; s=selector1-btconnect-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=NBt22fK85J3PxLdSazzz3craS09Ia+w5ZSzHx0Pxm7c=; b=CBn6bHxecW/r3rbDlbqeUWbklSWZZDtEqcd1GkzStY/cJE1hwd5ucNKoxQqa02XrZ+PTVxS/SOH9rtMSqGvGienrJsvtt3+vm25ZpX2a3/Yi9x0t1FzF2Y1qv0d220UXCyg2g4nmM90JpBgRZ6fTwGUV1wLedzhZbRb8F17/+cI=
Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=ietfc@btconnect.com;
Received: from pc6 (86.176.20.38) by DB6PR0701MB2997.eurprd07.prod.outlook.com (2603:10a6:4:73::7) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.1.1304.10; Wed, 2 Aug 2017 10:20:16 +0000
Message-ID: <07d301d30b78$50b9a0c0$4001a8c0@gateway.2wire.net>
From: "t.petch" <ietfc@btconnect.com>
To: Kent Watsen <kwatsen@juniper.net>, Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
Cc: draft-ietf-netconf-keystore.all@ietf.org, yang-doctors@ietf.org, netconf@ietf.org
References: <150028100874.32703.14161403810529927281@ietfa.amsl.com> <B1AC6895-5681-48F8-B7E7-418118120B4E@juniper.net> <20170720165942.GB21506@elstar.local> <F5E9973C-FCCD-4A96-B0D3-8C735CE911D3@juniper.net> <20170728073923.GA28870@elstar.local> <701F31A6-9941-4DE4-AE7E-00E859F103F8@juniper.net> <20170728154008.GA29865@elstar.local> <53886D3E-8A0C-4664-A7BD-1E708A80EE9D@juniper.net> <20170728170930.GA30054@elstar.local> <04f301d30aae$7482e900$4001a8c0@gateway.2wire.net> <7C4C9B41-7343-4FCD-AB0F-0131F64B45BF@juniper.net>
Date: Wed, 02 Aug 2017 11:15:33 +0100
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2800.1106
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1106
X-Originating-IP: [86.176.20.38]
X-ClientProxiedBy: VI1P194CA0012.EURP194.PROD.OUTLOOK.COM (2603:10a6:800:be::22) To DB6PR0701MB2997.eurprd07.prod.outlook.com (2603:10a6:4:73::7)
X-MS-Office365-Filtering-Correlation-Id: 1359c40e-18ff-42d3-4af6-08d4d990124f
X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(2017030254152)(300000503095)(300135400095)(201703131423075)(201703031133081)(201702281549075)(300000504095)(300135200095)(300000505095)(300135600095)(300000506095)(300135500095); SRVR:DB6PR0701MB2997;
X-Microsoft-Exchange-Diagnostics: 1; DB6PR0701MB2997; 3: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
X-MS-PublicTrafficType: Email
X-MS-TrafficTypeDiagnostic: DB6PR0701MB2997:
X-Microsoft-Exchange-Diagnostics: 1; DB6PR0701MB2997; 25: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
X-Microsoft-Exchange-Diagnostics: 1; DB6PR0701MB2997; 31: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
X-Exchange-Antispam-Report-Test: UriScan:(158342451672863)(192374486261705)(138986009662008);
X-Microsoft-Antispam-PRVS: <DB6PR0701MB2997C7F56E2EAE986BA7046CA0B00@DB6PR0701MB2997.eurprd07.prod.outlook.com>
X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(601004)(2401047)(8121501046)(5005006)(93006095)(93001095)(10201501046)(100000703101)(100105400095)(3002001)(6041248)(20161123564025)(20161123562025)(20161123560025)(20161123555025)(20161123558100)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(6072148)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:DB6PR0701MB2997; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:DB6PR0701MB2997;
X-Microsoft-Exchange-Diagnostics: 1;DB6PR0701MB2997;4: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
X-Forefront-PRVS: 0387D64A71
X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10019020)(7370300001)(4630300001)(6009001)(39850400002)(39450400003)(39860400002)(39400400002)(39840400002)(39410400002)(377454003)(199003)(189002)(51444003)(13464003)(1941001)(50466002)(229853002)(62236002)(66066001)(44716002)(47776003)(33646002)(97736004)(189998001)(105586002)(2906002)(84392002)(106356001)(6486002)(44736005)(478600001)(5660300001)(7350300001)(14496001)(4720700003)(25786009)(1556002)(6666003)(4326008)(54906002)(7736002)(9686003)(81816999)(305945005)(76176999)(50986999)(8666007)(6116002)(81686999)(3846002)(230700001)(6496005)(53936002)(38730400002)(81156014)(81166006)(8676002)(50226002)(86362001)(101416001)(68736007)(23676002)(1456003)(6246003)(42186005)(61296003)(551544002)(116806002)(230783001)(93886004)(5820100001)(74416001)(7726001); DIR:OUT; SFP:1102; SCL:1; SRVR:DB6PR0701MB2997; H:pc6; FPR:; SPF:None; PTR:InfoNoRecords; A:0; MX:1; LANG:en;
Received-SPF: None (protection.outlook.com: btconnect.com does not designate permitted sender hosts)
X-Microsoft-Exchange-Diagnostics: 1;DB6PR0701MB2997;23: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
X-Microsoft-Exchange-Diagnostics: 1;DB6PR0701MB2997;6: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
X-Microsoft-Exchange-Diagnostics: 1; DB6PR0701MB2997; 5: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; 24:/OTXyharxp8xrSVzRP6b8KWeRGtRNW6TrFB4WDTRwo0c4cUk0srgQOuGtcqr7CBfEfU65/1jUQdFVLw+JKA9YvU47rF712IZDzgJIjNSems=
SpamDiagnosticOutput: 1:99
SpamDiagnosticMetadata: NSPM
X-Microsoft-Exchange-Diagnostics: 1; DB6PR0701MB2997; 7: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
X-OriginatorOrg: btconnect.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 02 Aug 2017 10:20:16.3974 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6PR0701MB2997
Archived-At: <https://mailarchive.ietf.org/arch/msg/yang-doctors/SeUc9QzfAnVQ3joLxKm061M9nPM>
Subject: Re: [yang-doctors] [Netconf] last call review of draft-ietf-netconf-keystore-02
X-BeenThere: yang-doctors@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Email list of the yang-doctors directorate <yang-doctors.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/yang-doctors>, <mailto:yang-doctors-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/yang-doctors/>
List-Post: <mailto:yang-doctors@ietf.org>
List-Help: <mailto:yang-doctors-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/yang-doctors>, <mailto:yang-doctors-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 02 Aug 2017 10:20:23 -0000

Kent

Mostly yes.

I think the one further change that I would like is to move away from
   o  An unordered list of pinned SSH host key sets...

I think that the scope should be a public key, not limited to SSH and
not restricted to what is referred to as  a host key.  Typically this
would be in a client enabling it to trust a server to establish a secure
channel which may then be used for further authentication.  I see this
as far more common than SSH.

And since the scope is asymmetric cryptography, I would state the
obvious in the

Abstract

This document defines a YANG module for a system-level mechanism,
called a "keystore", containing security-sensitive data including
private keys, pinned certificates, and public keys, such as pinned SSH
host-keys, for use in asymmetric cryptography.

Tom Petch


----- Original Message -----
From: "Kent Watsen" <kwatsen@juniper.net>
Sent: Tuesday, August 01, 2017 7:24 PM

> Hi Tom,
>
> > Changing the subject because my tack is slightly different.
> >
> > I cannot reconcile this I-D with my (mis?)understanding of
cryptography.
> >
> > Stepping back, I see two types of keys, symmetric where one key is
used
> > for encryption and decryption, and asymmetric, where there are two
keys,
> > public and private, mathematically related but impossible to derive
one
> > from the other, one used to encrypt, the other to decrypt.
> >
> > I see this I-D as solely concerned with asymmetric keys.
>
> Correct, though there was a time when we considered having a
"password"
> leaf, which would've been a form of a symmetric key.
>
>
> > Public and private key pairs must be generated together, after which
the
> > private key must stay secret else you have no security.  Public keys
by
> > contrast are public for all to know.  The challenge is
authenticating
> > that the public key really is the public key of who you think it is.
> > Most public keys arrive by certificates which then allow you to
follow a
> > chain thereof to a hopefully trustworthy trust anchor.  SSH, and
some
> > other protocols, are different in distributing naked public keys and
> > relying on some other means of authenticating them (e.g. Trust on
First
> > Use).
>
> Correct, though it's worth noting that SSH can also distribute X.509
certs
> per RFC 6187.
>
>
> > So when you say  "AFAICT, the system should be able to generate its
> > host-key from the private-key itself." that is at odds with my
> > understanding and would lead to an absence of security.
>
> My mistake, I was using the old name "private-key" before we changed
> it to just "key", and what I really meant to say was that the system
> should be able to convert /keystore/keys/key/private-key into a
> representation suitable for software consumption (e.g., an openssh
> host-key file).
>
>
> > When the I-D says, "that might be used to hold onto private keys
> > and certificates "I struggle to see the point.  Indeed, the
> > module contains public keys as well as
> > "leaf public-key {
> >          config false;
> >          mandatory true;"
> > so you are really storing public/private key pairs (which may be
> > generated on the box).
>
> That particular sentence, in the Abstract and Introduction, has been
> rewritten based on Juergen's comments.  The abstract now says:
>
>    This document defines a YANG module for a system-level mechanism,
>    called a "keystore", containing security-sensitive data including
>    private keys, pinned certificates, and pinned SSH host-keys.
>
> The Introduction now says:
>
>    This document defines a YANG [RFC7950] module for a system-level
>    mechanism, herein called a "keystore".  The keystore provides a
>    centralized location for security sensitive data, as described
below.
>
>    This module has the following characteristics:
>
>    o  A configurable list of keys, each a public/private key pair.  If
a
>       key is used to sign a certificate signing request (CSR), which
is
>       then signed by a certificate authority (CA), then the resulting
>       certificate may be configured as being associated with the key.
>       Keys are expected to be configured using standard configuration
>       mechanisms, however, to support hardware that generates keys,
the
>       key may also be created via an action called 'generate-private-
>       key" action.  Keys may also be preinstalled (e.g., a key
>       associated to an IDevID [Std-802.1AR-2009] certificate).
>
>    o  An unordered list of pinned certificate sets...<snip/>
>    o  An unordered list of pinned SSH host key sets...<snip/>
>    o  An action to request the server to generate a new key...<snip/>
>    o  An action to request the server to generate a CSR...<snip/>
>    o  A notification...<snip/>
>
> Does this help?  What "point" are you not seeing?
>
>
> > The I-D also says "Certificates associated with this private key."
> > which defeats me.  A certificate or chain thereof gives me a public
key,
> > never a private one, and the means to authenticate the public key.
>
> Again, this goes back the old name "private-key" before we changed
> it to just "key".  I agree that it's wrong at face-value.  Above you
> can see how this text was changed.  Now what it says makes more sense.
>
>
> > A public key may or may not have a certificate or chain thereof.
>
> true.
>
>
> > A TLS client would likely have both but will rarely have a private
> > key.
>
> True, assuming client certificate based authentication is "rare".
>
>
> > A server of any protocol (except SSH and such like) will have a
> > public/private key pair and a certificate (and likely a chain
thereof)
> > to send to any enquiring client along with the public key.  An SSH
> > server would have a public/private key pair but likely no
certificates.
>
> All true
>
>
> > So, I cannot reconcile my understanding with the I-D.
>
> I think it was mostly due to the whole "private-key" to "key" rename
> not having percolated through all the text yet.  Yes?
>
>
> > Tom Petch
>
> Kent
>
>
>
>
>