I repeat my technical argument: While there may be deployments where
non-secure transports may be reasonable to use, defining these
situations statically as part of data model schemas does not follow
established practices. The IETF has a long tradition of standardizing
data models that can be used in a variety of operational contexts and
I do not see reasons why we should move away from that basic approach.

/js

On Thu, Aug 18, 2016 at 02:35:03PM -0400, Susan Hares wrote:
> Alissa: 
> 
> Just a little input you may not know.  My background is 15 years (1995-2010)  
> developing a routing/switching platform (denoted as GateD) which was sold to 
> over 200 companies.   We developed XML and a binary XML based product that 
> configured this product.  It could do 100K configuration lines and reboot in 
> less than a second on most hardware.  We also provide status messages in 
> secure streams and non-secure streams.    I sold early version of this code 
> to companies that Alia has worked for  - so she has personal viewed the code. 
>   At the height of our work, our development team ran to 50 people which I 
> directed (First as VP of Engineering, and then as CTO). It is due to this 
> level of experience that Alia selected me for the co-chair.   Russ White has 
> understood Cisco's process, and has also directed software development teams 
> for routing. 
> 
> In order to freshen my direct experience with I2RS on open source work, I am 
> working on a publically available work in Quagga based on the confD product 
> suggested by Cisco. 
> 
> In contrast, Juergen is a university professor who has worked on proto-types. 
>   He is not working on an implementation.   I hope he will. 
> 
> I hope you will consider this background in my response to your comments 
> below. 
> 
> Sue 
> 
> 
> -----Original Message-----
> From: Alissa Cooper [mailto:[email protected]] 
> Sent: Thursday, August 18, 2016 12:54 PM
> To: Joel Halpern
> Cc: Susan Hares; Juergen Schoenwaelder; [email protected]; [email protected]; 
> Kathleen Moriarty; IESG; [email protected]; 
> [email protected]
> Subject: Re: [i2rs] Kathleen Moriarty's Discuss on 
> draft-ietf-i2rs-protocol-security-requirements-07: (with DISCUSS and COMMENT)
> 
> Jumping in here because this is relevant to my DISCUSS, hope nobody minds 
> (but if you do, I can go back to the other thread).
> 
> >> On Aug 18, 2016, at 10:30 AM, Joel Halpern <[email protected]> 
> >> wrote:
> >> 
> >> Let me try a different take approach to this particular question.
> >> 
> >> Let me start by putting aside the question of where things are marked, and 
> >> come back to that afterwards.
> >> 
> >> There are a number of cases that I2RS has been asked to cover of high rate 
> >> telemetry data.  This may be BGP update information, it may be frequent 
> >> information about line card activity.  There are other cases, some of 
> >> which have been documented.
> >> 
> >> While not completely insensitive, the operators have made clear that they 
> >> see protecting this data as unnecessary.  While I would hope over time to 
> >> move to a domain where all of it is protect, that is not trivial.  As the 
> >> I2RS Architecture points out, it is expected that what we describe as a 
> >> single I2RS >communication between a client and agent is actually 
> >> associated with multiple channels of communication.
> >> 
> >> Now, if you want to say that the I2RS protocol requirements cannot allow 
> >> for unprotected channels, I guess we have disconnect between the IESG and 
> >> the WG.
> >> 
> >> If we say that we can allow for unprotected channels, we then get to the 
> >> question of which data can be sent over such channels.  While 
> >> architecturally I agree with Juergen that the model is a bad place to 
> >> specify it, the obverse is also true.  Not having some limits on what can 
> >> be sent unprotected >causes concern about insufficient protection.  If I 
> >> recall correctly, earlier security reviews called us to task for being too 
> >> broad in what we allowed.
> >> 
> >> So, if the IESG wants us to just allow it anywhere, because the model is 
> >> an awkward place to define the limitation, I can live with that.  What I 
> >> can't live with is being told both that the model is a bad place to define 
> >> it and that there must be restrictions on what is sent unprotected, 
> >> without any proposal on how we are to move forward.
> 
> > Thank you Joel, this explanation helps me a lot. I think there is a 
> > disconnect about how the restrictions are expressed. From reading the email 
> > traffic about this document, it strikes me that trying to express the 
> > restrictions programmatically doesn’t make much sense in this case. 
> > I agree with Juergen that it will be challenging to make a judgment a 
> > priori in order to bake a restriction into a data model, because data that 
> > is considered sensitive enough to warrant a secure transport in one 
> > deployment may not be considered sensitive in another deployment. 
> > So for any data elements where there is any question at all about whether 
> > they might be sensitive (i.e., any data elements that are not already 
> > routinely made public), 
> > I would expect data model authors to end up indicating that they may be 
> > sent over either secure or insecure transport, which renders the indication 
> > not useful.
> > Perhaps it would make more sense then to just enumerate in the text the 
> > cases that motivate the inclusion of protocol support for insecure 
> > transport:
> > 
> > 1. For conveyance of information that is already routinely made public.
> > 2. For line card activity data where there is no likely upgrade path to 
> > support secure transports in the foreseeable future.
> > 
> > Then the normative requirements would be on clients and agents to use 
> > secure transports unless those clients and agents are deployed where either 
> > of the operational circumstances above necessitate otherwise.
> > Alissa
> 
> Point 1: 
> I disagree with Juergen on the difficulty in specifying the sections of the 
> yang modules.  I have provided a suggested solution in: 
> https://tools.ietf.org/html/draft-hares-i2rs-protocol-strawman-03#section-4.5.2.
>     
> 
> Given the mount schema functionality, we can mount ephemeral state module 
> which augment non-ephemeral state modules which are "in-secure only".  
> 
> Point 2: 
> I am willing to put an enumeration of the use cases in the protocol 
> requirement, but I would like to understand the purpose for the enumeration.  
>  We are not doing a use case, but a requirements document.  This information 
> appears to be a "use case" rather than a technical description.   What 
> purpose are you looking for this enumeration to server.  Are you looking for 
> the enumeration in SEC-REQ-08? 
> 
> Point 3: Could you review -08.txt on this topic, especially the text below.  
> Given your comments, I believe I should change the last line to a MUST. 
> New/   The default mode of transport is
>    secure so data models MUST clearly annotate what data nodes can be
>    passed over an insecure connection.
> /
> 
> Sue 
> 
> =================== 
> As to the normative requirements (-08.txt) version: 
> 
> Section 3: 
>  
>    I2RS allows the use of an insecure transport for portions of data
>    models that clearly indicate the use of an insecure transport.
>    Operators deploying I2RS must determine if they want to populate and
>    deploy the portions of the data model which use insecure transports.
> 
> In Section 3.2 in version -08.txt 
> 
>    SEC-REQ-08: The I2RS protocol MUST be able to transfer data over a
>    secure transport and optionally MAY be able to transfer data over a
>    non-secure transport.  A secure transport MUST provide data
>    confidentiality, data integrity, and replay prevention.
> 
>    The default I2RS transport is a secure transport.
> 
>    A non-secure transport can be used for publishing telemetry data or
>    other operational state that was specifically indicated to non-
>    confidential in the data model in the Yang syntax.
> 
>    The configuration of ephemeral data in the I2RS Agent by the I2RS
>    client SHOULD be done over a secure transport.  It is anticipated
>    that the passing of most I2RS ephemeral state operational status
>    SHOULD be done over a secure transport.  As
>    [I-D.ietf-i2rs-ephemeral-state] notes,  a data model MUST indicate
>    whether the transport exchanging the data between I2RS client and
>    I2RS agent is secure or insecure.  
> 
>    The default mode of transport is
>    secure so data models SHOULD clearly annotate what data nodes can be
>    passed over an insecure connection.
> 
> > 
> > Yours,
> > Joel
> > 
> > -----Original Message-----
> > From: Susan Hares [mailto:[email protected]]
> > Sent: Thursday, August 18, 2016 9:17 AM
> > To: 'Juergen Schoenwaelder' <[email protected]>
> > Cc: [email protected]; [email protected]; 'Kathleen Moriarty' 
> > <[email protected]>; 'The IESG' <[email protected]>; 
> > [email protected]; 
> > [email protected]
> > Subject: RE: [i2rs] Kathleen Moriarty's Discuss on 
> > draft-ietf-i2rs-protocol-security-requirements-07: (with DISCUSS and 
> > COMMENT)
> > 
> > Juergen and Kathleen: 
> > 
> > Let me proceed with two examples: BGP route views data model and the event 
> > for the web-service data.  
> > 
> > The content of these data models are designated as exposed to public.  The 
> > routing system only populates the proposed BGP route views data model with 
> > the data destined for the BGP looking glass.  The policy on the routing 
> > system indicates what information gets transferred.  The data model is 
> > completely available to the public.  The Yang Doctors are going to review 
> > this by seeing the whole model is public and available via non-secure means.
> > The security people are going to review this seeing that the whole model is 
> > public, and available via an unprotect means.  The fact the data model is 
> > all public should simplify the review. 
> > 
> > An event from the I2RS RIB that a web-service route is up is the second 
> > case.  The I2RS RIB has an event based on policy that indicates a 
> > web-service route is up.  The yang-1.1 doctors must review the content of 
> > the event text to see it does not break privacy or provide too much
> > information   The event mechanisms will need to work over secure transport
> > and insecure transport.  Most of the data will go over the secure transport 
> > event stream. However, a small amount of information may go over the 
> > insecure transport stream. 
> > 
> > First, let me know if my use cases are understandable.  Second, let me know 
> > if you disagree with this use cases. 
> > 
> > Fyi -  IESG approved the architecture with the insecure stream. 
> > 
> > Sue
> > 
> > -----Original Message-----
> > From: Juergen Schoenwaelder 
> > [mailto:[email protected]]
> > Sent: Thursday, August 18, 2016 9:06 AM
> > To: Susan Hares
> > Cc: [email protected]; [email protected]; 'Kathleen Moriarty'; 'The 
> > IESG'; [email protected]; 
> > [email protected]
> > Subject: Re: [i2rs] Kathleen Moriarty's Discuss on
> > draft-ietf-i2rs-protocol-security-requirements-07: (with DISCUSS and
> > COMMENT)
> > 
> > I just do not know on which basis a data model writer can decide whether a 
> > data object can be exposed in an unprotected way. How are YANG doctors 
> > going to review this? How are security directorate people going to judge 
> > this? But as promised, I leave (still puzzled) now.
> > 
> > /js
> > 
> > On Thu, Aug 18, 2016 at 09:00:14AM -0400, Susan Hares wrote:
> >> Juergen: 
> >> 
> >> Yes, we seem to disagree on the value of making it hardwired in the model.
> >> For me, the value is a common understanding of deployment 
> >> distribution
> > such
> >> as the route-views.   Since the operators argued strongly for this point,
> > I
> >> think the best idea is to get it working in code and then see if the 
> >> deployment matches the requests.
> >> 
> >> Sue
> >> 
> >> -----Original Message-----
> >> From: i2rs [mailto:[email protected]] On Behalf Of Juergen 
> >> Schoenwaelder
> >> Sent: Thursday, August 18, 2016 8:14 AM
> >> To: Susan Hares
> >> Cc: [email protected]; [email protected]; 'Kathleen Moriarty'; 'The 
> >> IESG'; [email protected]; 
> >> [email protected]
> >> Subject: Re: [i2rs] Kathleen Moriarty's Discuss on
> >> draft-ietf-i2rs-protocol-security-requirements-07: (with DISCUSS and
> >> COMMENT)
> >> 
> >> Sue,
> >> 
> >> I still do not see why the 'mode of exposure' of data benefits from 
> >> being hard-wired in the data model. For me, it is a situational and 
> >> deployment specific question. But I shut up here since I aired this 
> >> concern before (and we simply seem to disagree).
> >> 
> >> /js
> >> 
> >> On Thu, Aug 18, 2016 at 08:07:18AM -0400, Susan Hares wrote:
> >>> Juergen: 
> >>> 
> >>> My example is the looking glass servers for the BGP route views 
> >>> project
> >>> (http://www.routeviews.org/) or a route indicating the presence of a
> >>> web-server that is public.   For the BGP I2RS route, a yang model could
> >>> replace the looking glass function, and provide events for these looking
> >>> glass functions.    For the web-server route,  an event be sent when
> > that
> >>> one route is added.  
> >>> 
> >>> Sue
> >>> 
> >>> 
> >>> -----Original Message-----
> >>> From: Juergen Schoenwaelder
> >>> [mailto:[email protected]]
> >>> Sent: Thursday, August 18, 2016 3:32 AM
> >>> To: Susan Hares
> >>> Cc: 'Kathleen Moriarty'; 'The IESG'; [email protected]; [email protected]; 
> >>> [email protected]; 
> >>> [email protected]
> >>> Subject: Re: [i2rs] Kathleen Moriarty's Discuss on
> >>> draft-ietf-i2rs-protocol-security-requirements-07: (with DISCUSS and
> >>> COMMENT)
> >>> 
> >>> On Wed, Aug 17, 2016 at 09:16:48PM -0400, Susan Hares wrote:
> >>>> ------------------------------------------------------------------
> >>>> --
> >>>> --
> >>>> COMMENT:
> >>>> ------------------------------------------------------------------
> >>>> --
> >>>> --
> >>>> 
> >>>>> Section 3: 
> >>>>> Can you clarify the second to last sentence?  Do you mean there 
> >>>>> are
> >>> sections that indicate an insecure transport should be used?
> >>>>>  I2RS allows the use of an
> >>>>> insecure transport for portions of data models that clearly 
> >>>>> indicate  insecure transport.
> >>>> 
> >>>>> Perhaps:
> >>>>> I2RS allows the use of an
> >>>>> insecure transport for portions of data models that clearly 
> >>>>> indicate the use of an  insecure transport.
> >>> 
> >>> I still wonder how a data model writer can reasonably decide whether 
> >>> a piece of information can be shipped safely over an insecure 
> >>> transport since this decision often depends on the specifics of a 
> >>> deployment
> >> situation.
> >>> 
> >>> /js
> >>> 
> >>> PS: I hope we do not end up with defining data multiple times (once
> >>>    for insecure transport and once for secured transports).
> >>> 
> >>> -- 
> >>> Juergen Schoenwaelder           Jacobs University Bremen gGmbH
> >>> Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
> >>> Fax:   +49 421 200 3103         <http://www.jacobs-university.de/>
> >>> 
> >>> _______________________________________________
> >>> i2rs mailing list
> >>> [email protected]
> >>> https://www.ietf.org/mailman/listinfo/i2rs
> >> 
> >> -- 
> >> Juergen Schoenwaelder           Jacobs University Bremen gGmbH
> >> Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
> >> Fax:   +49 421 200 3103         <http://www.jacobs-university.de/>
> >> 
> >> _______________________________________________
> >> i2rs mailing list
> >> [email protected]
> >> https://www.ietf.org/mailman/listinfo/i2rs
> >> 
> > 
> > -- 
> > Juergen Schoenwaelder           Jacobs University Bremen gGmbH
> > Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
> > Fax:   +49 421 200 3103         <http://www.jacobs-university.de/>
> > 
> 
> 

-- 
Juergen Schoenwaelder           Jacobs University Bremen gGmbH
Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
Fax:   +49 421 200 3103         <http://www.jacobs-university.de/>

_______________________________________________
i2rs mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/i2rs

Reply via email to