Hmmm.
I tend to assume that the ability to support non-secure transport is at a device level. That is, and I2RS Agent supports both, or it doesn't.

If we want enforceable controls over which data can be sent over which channels, we are opening a very large additional can of worms. No, the Module is not the right basis, since a module typically includes writeable, readable, and notification related information.

The Node seems equally bad, since trying to guess at Module design team which nodes will be needed by which monitoring and telemetry operations, or will be provided by which kinds of devices, or will be used within vs across organizational boundaries, seems unknowable.

Given that the I2RS approach is to let the operator use the tools in the way he wants, I think the only practical solution is to let him use the channels the way he wants.

Yours,
Joel

On 5/26/16 2:16 PM, Susan Hares wrote:
Joel:
<wg chair hat off>
<author hat on>

Here's what [draft-ietf-i2rs-ephemeral-state-07.txt] says:

SEC-REQ-09: The I2RS protocol MUST be able to transfer data over a
   secure transport and optionally MAY be able to transfer data over a
   non-secure transport.  A secure transport MUST provide data
   confidentiality, data integrity, and replay prevention.

   The default I2RS transport is a secure transport.

   A non-secure transport can be can be used for publishing telemetry
   data or other operational state that was specifically indicated to
   non-confidential in the data model in the Yang syntax.

   The configuration of ephemeral data in the I2RS Agent by the I2RS
   client SHOULD be done over a secure transport.  It is anticipated
   that the passing of most I2RS ephemeral state operational status
   SHOULD be done over a secure transport.  As
   [I-D.ietf-i2rs-ephemeral-state] notes data model MUST indicate
   whether the transport exchanging the data between I2RS client and
   I2RS agent is secure or insecure.  The default mode of transport is
   secure so data models SHOULD clearly annotate what data nodes can be
   passed over an insecure connection.
=============

Are you trying to suggest that the ability to do secure transports should be
at the data model level? If so, does this text change work for you:

Ephemeral-REQ-06: Yang MUST have a way to indicate in a data model that
nodes have the following properties: ephemeral, writable/not-writable and
status/configuration.  Yang MUST have a way to indicate
whether data models can be passed over secure or non-secure transport.
(If you desire examples, please see [I-D.hares-i2rs-protocol-strawman] for
potential yang syntax).

Sue

-----Original Message-----
From: i2rs [mailto:[email protected]] On Behalf Of Joel M. Halpern
Sent: Thursday, May 26, 2016 1:47 PM
To: Susan Hares; [email protected]
Subject: Re: [i2rs] draft-ietf-i2rs-ephemeral-state-07.txt - per-node
transport security

We could take the view that all nodes in a model being used by I2RS had to
have the potential to be ephemeral.  While that would be attractive for
consistency, it puts a massive burden on the routing system implemention.
So we agreed that ephemeral marking was on a per-node basis.  Yes, that
means that the model designer has to look at the usage.  Unfortunate, but a
tradeoff.

When it comes to securing the transfer, the situation is very different.
  Most importantly, the cost for supporting sending whatever the client
requests over an unsecure transport is small.  And trying to guess which
information will be needed by monitoring or telemetry seems like to end up
with "all".  Yes, there is a security risk with saying that telemetry
information may be send unencrypted.  But either wwe accept that or we
don't.  Trying to do node based marking does not seem to help the situation,
and it creates operational restrictions and complications.

Yours,
joel

On 5/26/16 1:08 PM, Susan Hares wrote:
Joel:

The purpose of allowing a non-security transport was to report status or
telemetry information.   This information may be in a specific model, or a
portion of a model.    While nodes may be too small an area, can you
suggest
alternate wording here?

Please look at Ephemeral-REQ-05 for context of the use of "object"

Sue

-----------

   Ephemeral-REQ-06: Yang MUST have a way to indicate in a data model
   that nodes have the following properties: ephemeral, writable/not-
   writable, status/configuration, and secure/non-secure transport.  (If
   you desire examples, please see [I-D.hares-i2rs-protocol-strawman]
   for potential yang syntax).

  Ephemeral-REQ-05: The ability to augment an object with appropriate
   YANG structures that have the property of being ephemeral.  An object
   defined as Yang module, schema tree, a schema node, submodule or
   components of a submodule (derived types, groupings, data node, RPCs,
   actions, and notifications".


-----Original Message-----
From: i2rs [mailto:[email protected]] On Behalf Of Joel Halpern
Sent: Wednesday, May 25, 2016 11:17 PM
To: [email protected]
Subject: Re: [i2rs] draft-ietf-i2rs-ephemeral-state-07.txt - per-node
transport security

While I agree with the overall requirement that I2RS support both
secured and unsecured communication, I find Ephemeral-REQ-06 rather
odd.  Trying to have the module designer specify whether the usage of
a node (get, set,
...?) must be via a secure or unsecure transport seems a very odd
placement of the control.

Why are we mandating this on a per-node level?

Thank you,
Joel

On 5/25/16 9:39 PM, [email protected] wrote:

A New Internet-Draft is available from the on-line Internet-Drafts
directories.
This draft is a work item of the Interface to the Routing System of
the
IETF.

        Title           : I2RS Ephemeral State Requirements
        Authors         : Jeff Haas
                          Susan Hares
        Filename        : draft-ietf-i2rs-ephemeral-state-07.txt
        Pages           : 14
        Date            : 2016-05-25

Abstract:
   This document covers requests to the NETMOD and NETCONF Working
   Groups for functionality to support the ephemeral state requirements
   to implement the I2RS architecture.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-i2rs-ephemeral-state/

There's also a htmlized version available at:
https://tools.ietf.org/html/draft-ietf-i2rs-ephemeral-state-07

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-i2rs-ephemeral-state-07


Please note that it may take a couple of minutes from the time of
submission until the htmlized version and diff are available at
tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

_______________________________________________
I-D-Announce mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/i-d-announce
Internet-Draft directories: http://www.ietf.org/shadow.html or
ftp://ftp.ietf.org/ietf/1shadow-sites.txt


_______________________________________________
i2rs mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/i2rs

_______________________________________________
i2rs mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/i2rs


_______________________________________________
i2rs mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/i2rs



_______________________________________________
i2rs mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/i2rs

Reply via email to