[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: MIB



Ran... seems you read more in my email than I intended.
         And this may indeed be because I am not concise/precise.
Similarly, I may have read more in your email than you meant.

In general, pls do not treat this as a personal attack (I don't think you
do,
but I just want to be clear). 

Maybe when you read my new comments you understand where
I am coming from.


More Comments inline.

Bert

> ----------
> From: 	RJ Atkinson[SMTP:rja@inet.org]
> Sent: 	Monday, June 05, 2000 3:07 PM
> To: 	Wijnen, Bert (Bert)
> Cc: 	Juergen Schoenwaelder; Spencer.Giacalone@predictive.com;
> djoyal@nortelnetworks.com; mibs@ops.ietf.org
> Subject: 	RE: MIB
> 
> At 08:44 05/06/00 , Wijnen, Bert (Bert) wrote:
> 
> > > The discussion in Security Considerations is universally ignored by
> > > implementers.  Sad, but true.  WHile I agree documentation is
> necessary,
> > > I don't think its close to being sufficient for situations like the
> > > particular one in the OSPF MIB.
> > > 
> >Mmm... so why the heck are we in the IETF making so much trouble when
> >authors/editors do not specify such a security section correctly???
> 
>          So that operators can get a clue about what residual security
> risks
> exist in the protocols and standards that they deploy.
> 
>          The issue is that most **implementers** do not care about
> security.
> Please read what I wrote originally.  It was stated precisely.
> 
They SHOULD care about them equally well, and they should read them.
The security section should list security aspects both for users and for
implementers (at least so I think).

> >In any event, the SNMP/MIB/VACM approach is such that we provide the
> >tools for people to use proper access control to sensitive objects. We do
> 
> >not want to prescribe as the IETF how people treat risks. Some people
> >may decide that their network is secure in some other way...... 
> >   - In any event, we give them the tools.
> >   - we make good recommendations
> >   - they (user/customer) must take the responsibility to properly
> deploy.
> 
>          However, when I tried to suggest that a specific object be
> READ-ONLY
> unless those theoretical tools have actually been implemented (hence 
> are actually available to operators, versus not being available,
> as is the current and near-term deployed reality), then the SNMP community
> 
> shoots this down.  This works towards SNMP remaining a monitoring
> tool, rather than a management tool.
> 
See I come from an agent/subagent environment. Those people who implement
a MIB, they do not always know on which plaforms together with which version
of an SNMP agent they get installed/deployed. And in fact, one of the strong
motivators for sub-agent technology (agentX on the stds track, but various
other technologies as well) is the fact that a MIB implementer does not
need to worry about the security mechanisms of the SNMP protocol itself.
All of that supposedly is done by the master agent.
So writing in a particular DESCRIPTION clause of a particular object that
an aboject should not be writable under conditions that are outside the
control of the MIB implementer is sort of strange to me.

>          If you re-read the original proposed text, it did NOT require
> that
> the operator do anything, though it made suggestions.  The original
> proposed text DID require that implementers have a certain object
> as READ-ONLY unless they had *implemented* at least SNMPv3 in the agent.
> 
>          Please stick to what I write and don't imply I said something
> else.
> 
I hope that the above explains why I did not immediately see how an
implementer
even knows if SNMPPPv3 is implemented in the environment where the MIB
gets deployed.

> >For all I know, we (IETF/IESG) do require that protocols provide the
> >proper security tools/mechanisms. 
> 
>          Not consistently, IMHO, though its better now than it
> was several years ago.  In particular, many on the IESG feel that
Well, if people see IETF Last Calls for documents that do not include a
proper 
security section, then they can also alert the IESG that such is the case.
I am pretty sure that the current IESG will take note and action.

> specifying an optional-to-implement security mechanism is sufficient,
> when operational experience shows that options in IETF specs generally
> do not get implemented. (VRRP is a fine example of this, prior to
> the last IETF/DC meeting).
> 
correct, but then (as I am sure you know), the last one did not pass without
proper authentication added (at least that is what I recall off the top of
my head).

> >I do not believe that we require that
> >a user/customer MUST use them... even though we strongly recommend so.
> 
>          I've NEVER suggested this.  Please lets stick to what folks
> actually say in this conversation and not raise red herrings.
> 
Appology. You did not state that in such text. But given how I see a
master/subagent
environment, that is the only way it can be achieved. So that is why I sort
of
concluded that.

>          I've suggested that certain mechanisms be MUST IMPLEMENT
> in order for a particular OID to be writable.  There is significant
> amounts of past precedent within IESG and IETF to make security
> mechanisms mandatory to implement in sundry situations (e.g. IPv6).
> 
Hope the above explanatiuons make it clear why I think that the suggested
text
for the specific object seems not to make sense to me. Access control is
outside the scope of a MIB implementer, and in many implementations
read-write
access vs read-access is not under control of the MIB implementer.

> Thanks,
> 
Welcome,
Bert