Alissa: 

A follow-up email on this topic.  Joel suggests that I missing your question. 
Are you asking  who is in a position to determine that certain data is 
reasonable to send unprotected?  
Are you asking if it is the operator, the data model designer, or our original 
WG designing the protocol? 

If this is the case, the final authority is the owner of the data - the 
operator.   The closer the operator works with vendors who supply code and 
standardize it, the better the vendors understand the need.  It is hoped that 
the vendors and the operators will help I2RS or other WG to define these data 
modules.  We hope the security people from these operators and security people 
from vendors and research will validate the security needs.   We believe we 
have a sense from the WG discussions on the categories I mentioned:  a) 
publically available data (route-views),  b) events specific to operators that 
are public, and c) interface/data that can be seen publically (IXP ports or MEF 
exchange ports) 

Personally, I also want to be very careful with any data that can be linked to 
a person.  To me, this must be done over a secure transport.  

Does this help?  Like Joel - I am proactively answering you, but confused on 
what you want me to change.  

Sue 

-----Original Message-----
From: Alissa Cooper [mailto:[email protected]] 
Sent: Thursday, August 18, 2016 12:54 PM
To: Joel Halpern
Cc: Susan Hares; Juergen Schoenwaelder; [email protected]; [email protected]; 
Kathleen Moriarty; IESG; [email protected]; 
[email protected]
Subject: Re: [i2rs] Kathleen Moriarty's Discuss on 
draft-ietf-i2rs-protocol-security-requirements-07: (with DISCUSS and COMMENT)

Jumping in here because this is relevant to my DISCUSS, hope nobody minds (but 
if you do, I can go back to the other thread).

> On Aug 18, 2016, at 10:30 AM, Joel Halpern <[email protected]> wrote:
> 
> Let me try a different take approach to this particular question.
> 
> Let me start by putting aside the question of where things are marked, and 
> come back to that afterwards.
> 
> There are a number of cases that I2RS has been asked to cover of high rate 
> telemetry data.  This may be BGP update information, it may be frequent 
> information about line card activity.  There are other cases, some of which 
> have been documented.
> 
> While not completely insensitive, the operators have made clear that they see 
> protecting this data as unnecessary.  While I would hope over time to move to 
> a domain where all of it is protect, that is not trivial.  As the I2RS 
> Architecture points out, it is expected that what we describe as a single 
> I2RS communication between a client and agent is actually associated with 
> multiple channels of communication.
> 
> Now, if you want to say that the I2RS protocol requirements cannot allow for 
> unprotected channels, I guess we have disconnect between the IESG and the WG.
> 
> If we say that we can allow for unprotected channels, we then get to the 
> question of which data can be sent over such channels.  While architecturally 
> I agree with Juergen that the model is a bad place to specify it, the obverse 
> is also true.  Not having some limits on what can be sent unprotected causes 
> concern about insufficient protection.  If I recall correctly, earlier 
> security reviews called us to task for being too broad in what we allowed.
> 
> So, if the IESG wants us to just allow it anywhere, because the model is an 
> awkward place to define the limitation, I can live with that.  What I can't 
> live with is being told both that the model is a bad place to define it and 
> that there must be restrictions on what is sent unprotected, without any 
> proposal on how we are to move forward.

Thank you Joel, this explanation helps me a lot. I think there is a disconnect 
about how the restrictions are expressed. From reading the email traffic about 
this document, it strikes me that trying to express the restrictions 
programmatically doesn’t make much sense in this case. I agree with Juergen 
that it will be challenging to make a judgment a priori in order to bake a 
restriction into a data model, because data that is considered sensitive enough 
to warrant a secure transport in one deployment may not be considered sensitive 
in another deployment. So for any data elements where there is any question at 
all about whether they might be sensitive (i.e., any data elements that are not 
already routinely made public), I would expect data model authors to end up 
indicating that they may be sent over either secure or insecure transport, 
which renders the indication not useful.

Perhaps it would make more sense then to just enumerate in the text the cases 
that motivate the inclusion of protocol support for insecure transport:

1. For conveyance of information that is already routinely made public.
2. For line card activity data where there is no likely upgrade path to support 
secure transports in the foreseeable future.

Then the normative requirements would be on clients and agents to use secure 
transports unless those clients and agents are deployed where either of the 
operational circumstances above necessitate otherwise.

Alissa

> 
> Yours,
> Joel
> 
> -----Original Message-----
> From: Susan Hares [mailto:[email protected]]
> Sent: Thursday, August 18, 2016 9:17 AM
> To: 'Juergen Schoenwaelder' <[email protected]>
> Cc: [email protected]; [email protected]; 'Kathleen Moriarty' 
> <[email protected]>; 'The IESG' <[email protected]>; 
> [email protected]; 
> [email protected]
> Subject: RE: [i2rs] Kathleen Moriarty's Discuss on 
> draft-ietf-i2rs-protocol-security-requirements-07: (with DISCUSS and 
> COMMENT)
> 
> Juergen and Kathleen: 
> 
> Let me proceed with two examples: BGP route views data model and the event 
> for the web-service data.  
> 
> The content of these data models are designated as exposed to public.  The 
> routing system only populates the proposed BGP route views data model with 
> the data destined for the BGP looking glass.  The policy on the routing 
> system indicates what information gets transferred.  The data model is 
> completely available to the public.  The Yang Doctors are going to review 
> this by seeing the whole model is public and available via non-secure means.
> The security people are going to review this seeing that the whole model is 
> public, and available via an unprotect means.  The fact the data model is all 
> public should simplify the review. 
> 
> An event from the I2RS RIB that a web-service route is up is the second case. 
>  The I2RS RIB has an event based on policy that indicates a web-service route 
> is up.  The yang-1.1 doctors must review the content of the event text to see 
> it does not break privacy or provide too much
> information   The event mechanisms will need to work over secure transport
> and insecure transport.  Most of the data will go over the secure transport 
> event stream. However, a small amount of information may go over the insecure 
> transport stream. 
> 
> First, let me know if my use cases are understandable.  Second, let me know 
> if you disagree with this use cases. 
> 
> Fyi -  IESG approved the architecture with the insecure stream. 
> 
> Sue
> 
> -----Original Message-----
> From: Juergen Schoenwaelder 
> [mailto:[email protected]]
> Sent: Thursday, August 18, 2016 9:06 AM
> To: Susan Hares
> Cc: [email protected]; [email protected]; 'Kathleen Moriarty'; 'The 
> IESG'; [email protected]; 
> [email protected]
> Subject: Re: [i2rs] Kathleen Moriarty's Discuss on
> draft-ietf-i2rs-protocol-security-requirements-07: (with DISCUSS and
> COMMENT)
> 
> I just do not know on which basis a data model writer can decide whether a 
> data object can be exposed in an unprotected way. How are YANG doctors going 
> to review this? How are security directorate people going to judge this? But 
> as promised, I leave (still puzzled) now.
> 
> /js
> 
> On Thu, Aug 18, 2016 at 09:00:14AM -0400, Susan Hares wrote:
>> Juergen: 
>> 
>> Yes, we seem to disagree on the value of making it hardwired in the model.
>> For me, the value is a common understanding of deployment 
>> distribution
> such
>> as the route-views.   Since the operators argued strongly for this point,
> I
>> think the best idea is to get it working in code and then see if the 
>> deployment matches the requests.
>> 
>> Sue
>> 
>> -----Original Message-----
>> From: i2rs [mailto:[email protected]] On Behalf Of Juergen 
>> Schoenwaelder
>> Sent: Thursday, August 18, 2016 8:14 AM
>> To: Susan Hares
>> Cc: [email protected]; [email protected]; 'Kathleen Moriarty'; 'The 
>> IESG'; [email protected]; 
>> [email protected]
>> Subject: Re: [i2rs] Kathleen Moriarty's Discuss on
>> draft-ietf-i2rs-protocol-security-requirements-07: (with DISCUSS and
>> COMMENT)
>> 
>> Sue,
>> 
>> I still do not see why the 'mode of exposure' of data benefits from 
>> being hard-wired in the data model. For me, it is a situational and 
>> deployment specific question. But I shut up here since I aired this 
>> concern before (and we simply seem to disagree).
>> 
>> /js
>> 
>> On Thu, Aug 18, 2016 at 08:07:18AM -0400, Susan Hares wrote:
>>> Juergen: 
>>> 
>>> My example is the looking glass servers for the BGP route views 
>>> project
>>> (http://www.routeviews.org/) or a route indicating the presence of a
>>> web-server that is public.   For the BGP I2RS route, a yang model could
>>> replace the looking glass function, and provide events for these looking
>>> glass functions.    For the web-server route,  an event be sent when
> that
>>> one route is added.  
>>> 
>>> Sue
>>> 
>>> 
>>> -----Original Message-----
>>> From: Juergen Schoenwaelder
>>> [mailto:[email protected]]
>>> Sent: Thursday, August 18, 2016 3:32 AM
>>> To: Susan Hares
>>> Cc: 'Kathleen Moriarty'; 'The IESG'; [email protected]; [email protected]; 
>>> [email protected]; 
>>> [email protected]
>>> Subject: Re: [i2rs] Kathleen Moriarty's Discuss on
>>> draft-ietf-i2rs-protocol-security-requirements-07: (with DISCUSS and
>>> COMMENT)
>>> 
>>> On Wed, Aug 17, 2016 at 09:16:48PM -0400, Susan Hares wrote:
>>>> ------------------------------------------------------------------
>>>> --
>>>> --
>>>> COMMENT:
>>>> ------------------------------------------------------------------
>>>> --
>>>> --
>>>> 
>>>>> Section 3: 
>>>>> Can you clarify the second to last sentence?  Do you mean there 
>>>>> are
>>> sections that indicate an insecure transport should be used?
>>>>>  I2RS allows the use of an
>>>>> insecure transport for portions of data models that clearly 
>>>>> indicate  insecure transport.
>>>> 
>>>>> Perhaps:
>>>>> I2RS allows the use of an
>>>>> insecure transport for portions of data models that clearly 
>>>>> indicate the use of an  insecure transport.
>>> 
>>> I still wonder how a data model writer can reasonably decide whether 
>>> a piece of information can be shipped safely over an insecure 
>>> transport since this decision often depends on the specifics of a 
>>> deployment
>> situation.
>>> 
>>> /js
>>> 
>>> PS: I hope we do not end up with defining data multiple times (once
>>>    for insecure transport and once for secured transports).
>>> 
>>> -- 
>>> Juergen Schoenwaelder           Jacobs University Bremen gGmbH
>>> Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
>>> Fax:   +49 421 200 3103         <http://www.jacobs-university.de/>
>>> 
>>> _______________________________________________
>>> i2rs mailing list
>>> [email protected]
>>> https://www.ietf.org/mailman/listinfo/i2rs
>> 
>> -- 
>> Juergen Schoenwaelder           Jacobs University Bremen gGmbH
>> Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
>> Fax:   +49 421 200 3103         <http://www.jacobs-university.de/>
>> 
>> _______________________________________________
>> i2rs mailing list
>> [email protected]
>> https://www.ietf.org/mailman/listinfo/i2rs
>> 
> 
> -- 
> Juergen Schoenwaelder           Jacobs University Bremen gGmbH
> Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
> Fax:   +49 421 200 3103         <http://www.jacobs-university.de/>
> 


_______________________________________________
i2rs mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/i2rs

Reply via email to