The observation that these are examples of permission falls more in
line with RFC-4949's concept of a mechanism of access control, as
compared to the ACL Model's traffic filtering definition.  As I've
noted, I prefer the RFC-4949 definition, and see the ACL Model
definition as referring to a specific implementation of ACL 

On 9/13/2016 at 3:23 AM, "John Strassner"  wrote:Hi Rakesh,
I disagree. The three examples you cited are all examples of a
permission to do something.
regards,John
On Mon, Sep 12, 2016 at 10:00 PM, Rakesh Kumar  wrote:
        Hi Linda, 
        As evident (https://en.wikipedia.org/wiki/Access_control_list), the
ACL has different meaning to different folks (IT, Network).  John
rightly pointed out that originally it meant some kind of permission
but networking industry adopted this to associate with packet
filtering as you pointed out. 
        History aside, the ACL have evolved dramatically over the years for
various reasons: 

         ·         Vendor want to give admin control over operational state
of the networking device (override protocols or control plane) 

         ·         SDN controller use ACL to configure operational state
instead of running control plane 

         ·         Feature (forwarding/Security/QoS/Monitoring)
innovation/differentiations by vendors  
        In my opinion, ACL can be lot more than filtering or permission (of
course each vendor has different capability) but I am not sure what is
our (I2NSF) specific goal behind this discussion.  
        Do we just make sure that definition is same across all IETF work no
matter how outdated?  

        Do we want to make sure that it aligns with where the networking
industry is? 

        Do we want to make sure that it aligns with the security work we are
doing in I2NSF? 
        Thanks & Regards, 

        Rakesh 
        From:  I2nsf  on behalf of John Strassner 
 Date: Monday, September 12, 2016 at 5:31 PM
 To: Linda Dunbar , John Strassner , DIEGO LOPEZ GARCIA , "Xialiang
(Frank)" 
 Cc: "[email protected]" , Susan Hares 
 Subject: Re: [I2nsf] I2NSF Terminology's definition on "ACL" is
different from ietf-netmod-acl-model   
        Hi Linda,   
        My vote is NO.   
        With all due respect, RFC4949 predates the acl model by almost 7
years. Furthermore, ACLs may or may not **filter** traffic. The roots
of ACLs go much farther back (at least to 1997 that I can find) and,
fundamentally, are permissions.  A permission is not the same as
filtering. Finally, we would then have to define ACEs, and not all ACL
models have ACEs.   
        regards,   

        John    
        On Mon, Sep 12, 2016 at 10:06 AM, Linda Dunbar  wrote:    

        John, et al,  
        The “ietf-netmod-acl-model” has “ACL” defined as: 

         An ACL is an ordered set of rules that is used to filter traffic on
a 

         networking device. Each rule is represented by an Access Control 

         Entry (ACE). 
        The “draft-ietf-i2nsf-terminology-01” has ACL as:  
         ACL (Acess Control List):  This is a mechanism that implements 

               access control for a system resource by enumerating the system


               entities that are permitted to access the resource and
stating, 

               either implicitly or explicitly, the access modes granted to
each 

               entity [RFC4949]. A YANG description is defined in 

               [I-D.ietf-netmod-acl-model]. 
        Can we make I2NSF’s ACL definition consistent with the
““ietf-netmod-acl-model”?  
        Thanks,  

        Linda      
 --    

        regards,   

        John        
-- 
regards,John 
_______________________________________________
I2nsf mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/i2nsf

Reply via email to