Wes,

Comments inline.

spt

On 2/27/13 5:39 PM, George, Wes wrote:
I gave this a review since I am one of the folks who raised my hand as willing to be the 
resident PKI n00b to make sure that things like this are clear to "router guys" 
who are dealing with PKI for the first time outside of maybe generating the SSH keys for 
tty access to a router.

Thanks for following through.

The second paragraph of the intro, starting with the sentence "The router-driven model is 
most..." is difficult to parse (grammatically). I recommend re-wording to eliminate 
"often times for human subscribers" from the middle of the phrase and generally 
streamline the point being made here.

We're trying to head off the typical knee-jerk reaction about non-client generated keys where somebody says oh no can't do that because that's what their BPKI does. But, I get your point. How about:

The difference between the two methods is where the keys are generated: on the router in the router-driven method and elsewhere in the operator-driven model. Different equipment necessitates the two methods. Some equipment doesn't allow the private key to be off-loaded while other equipment does. Off-loading private keys supports hot-swappable routers that need to have the same private key needs installed in the soon-to-be online router that was installed in the soon-to-be offline router.

Do you think we need to say anything like:

NOTE: Unlike humans, routers can be easily cloned; hence, operators generating the private keys make sense.

Editorial nit: multiple instances of %s/drive/driven

I must have had Bullitt on the TV in the background when I was revising this draft.

3. instead of serial/craft, I'd just say console.
Or more generally, you could refer to in-band management vs out of band, as that covers a 
wider set of scenarios than specifically referring to an Ethernet port and a serial port. 
Yes, that doesn't exactly cover the hair-split when people use a management Ethernet port 
connected to a separate management network for "in band" (non-console) 
management of the device, but maybe that's clear enough, I don't know.

I can go with in-band vs out-of-band management.

I also don't think proprietary is the right word. Console access via a terminal server is 
pretty universal, and unless there's some sort of a tool pushing out the initial config 
snippets over console to bootstrap the box so that it can talk to it inband and finish 
the provisioning, "operator going typey-typey on a terminal" is definitely not 
proprietary either.

roger that console it is.

Another thought - console access via remote terminal server isn't actually 
secure in every case. In a typical setup you have:
User host -> (ssh) bastion/jump box -> (telnet) local terminal server -> 
RS232/USB connection to console
Unless the path between the jump box and the local terminal server is such that 
it is nearly impossible to sniff the traffic (private network, direct 
connection, etc) using this to provision sensitive config might be ill-advised. 
Might be worth explicitly stating that for this reason, use of the console to 
provision the SIDR keys is NOT recommended.

This sounds like a good security consideration.

It's not clear to me whether the method being described in this first part of section 3 
is actually important. Do you actually have to do something different in the way that you 
bring a router online (get it basic connectivity to the network) in this process in order 
to preserve proper security and trust for the keys, or is this just illustrating a 
typical process to provision a router from bare metal such that you have secure access to 
it to further manipulate the configuration? Is certificate-based authentication (instead 
of password auth) a MUST, or a SHOULD, or does it matter? If this is just illustrating a 
standard example, you can probably just say something like "this assumes that 
standard (BCP?) procedures have been followed to initially configure the router for 
secure remote access, via either inband or out of band means" and then just specify 
that it's necessary to have the secure connection between the router and operator before 
the router keying for SIDR is done
 (because

....). Some of this is down in the security considerations today, and I think it's important to actually discuss it here instead since it's basically a critical part of the provisioning process. The key (pun very much intended) thing here is to highlight things that are different from normal provisioning and explain why they're important.

I was shooting for something more narrative, but yeah I could see that it would make sense to say here's what's different. Now, any idea where this BCP is? :) I'm not sure there is one.

3.1 - wouldn't it be sFTP/SCP or HTTPS or some similar?

I think you're referring to this:

 The response can be returned using
 the application/pkcs7-mime media type [RFC5751] if the router
 supports protocols such as FTP and HTTP.

And the answer might be maybe. In the router-generated case, what's being returned in the public key certificate, which is well going to be made public so it's not necessary to secure it. Then, again if there's a protected channel open continuing to use it is okay. Not sure how to explain that but I can give it a shot.

Direct/indirect makes sense, but the process for indirect transfer is a little 
light on details - what steps must be taken to ensure that the keys are not 
compromised in this transfer, either from the router or to the RPKI CA? Even a 
reference to section 5 might be enough to cover this.

Ah for this section, the only key transferred is public and it's in the PKCS#10, which is the only thing that gets transferred. But, you asking this question makes me think I should make it clearer about what's being transfer and why anybody'd care.

Also, I don't follow your last sentence "...linkage between private key and a 
router..." - why is that important?

The idea is that you want to be able to know the router's got the private key associated with the public key. Another way to say this is POP - and I agree this could be made clearer. Something like:

 Note that even if the operator can not get the private key off the
 router this still provides a linkage between a private key and a
 router.  That is the server can do a proof of possession (POP),
  as required by [RFC6484].

3.2 "installed over the ssh session..." - are we talking simple copy and paste 
of a huge string of text representing the key, or is it actually SCP/SFTP of a file that 
is then read into the router's config via additional commands?
If you're talking copy/paste, it's probably worth warning that for keys over a 
certain size, this method is error-prone. I've seen a lot of mangled config 
because someone exceeded a paste buffer when trying to copy/paste a config, 
especially over a 9600 bps console at the other end of 90ms of latency.

An excellent point, but I'm sure hope it's commands and not ctrl-c/v.

5. when you talk about offload methods, you should probably specify the 
required/recommended security precautions associated with handling the key so 
that it isn't intercepted across the transfer method used (e.g. use SNMPv3 with 
encryption, use sFTP/SCP, CLI with SSH, etc, as well as any considerations 
around chain of possession and level of trust as the keys are stored and 
transferred between old and new box. There are a lot of risk factors if a tech 
is transferring it to his (possibly compromised) laptop when compared with 
transferring to parts of the infrastructure (a config repository server, for 
example) that are properly hardened.
Also need to discuss sneakernet transfer, where I dump the key to a local 
storage device so that the tech can plug it into the new RP/RE and upload it 
that way. This is sometimes important if the box is having issues and as a 
result has limited connectivity to offload the keys. Any considerations to 
ensure proper security in a transfer like that?

All good points and that means I need to get out a new version ;)

Thanks,

Wes George



-----Original Message-----
From: [email protected] [mailto:[email protected]] On Behalf Of
[email protected]
Sent: Saturday, February 23, 2013 10:41 AM
To: [email protected]
Cc: [email protected]
Subject: [sidr] I-D Action: draft-ietf-sidr-rtr-keying-01.txt


A New Internet-Draft is available from the on-line Internet-Drafts
directories.
  This draft is a work item of the Secure Inter-Domain Routing Working
Group of the IETF.

       Title           : Router Keying for BGPsec
       Author(s)       : Sean Turner
                           Keyur Patel
                           Randy Bush
       Filename        : draft-ietf-sidr-rtr-keying-01.txt
       Pages           : 9
       Date            : 2013-02-23

Abstract:
    BGPsec-speaking routers must be provisioned with private keys and the
    corresponding public key must be published in the global RPKI
    (Resource Public Key Infrastructure).  This document describes two
    ways of provisioning public/private keys, router-driven and operator-
    driven.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-sidr-rtr-keying

There's also a htmlized version available at:
http://tools.ietf.org/html/draft-ietf-sidr-rtr-keying-01

A diff from the previous version is available at:
http://www.ietf.org/rfcdiff?url2=draft-ietf-sidr-rtr-keying-01


Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.

_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to