[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Ever onward
At 10:30 PM 2/3/2004, Phil Shafer wrote:
>Wes Hardaker writes:
I agree with Phil. The issue of partial locks is closed.
We are only supporting global locks in v1.0. There are
2 reasons for this:
1) implementing partial locks is difficult, especially
across all access mechanisms like CLI, SNMP, HTTP, etc.
2) identifying a subset of a data model in a standard
way is future work, not in our charter
I think partial locks will be needed, and should be
future work. Developers and operators want partial
locks for better provisioning performance, not for
better security.
I don't think we need <steal-lock>. NETCONF does not
create any new security holes. This attack scenario
falls under the general category of password maintenance.
Andy
>> Or, social engineering attacks (I've always hated
>> that term) is trivial these days
>
>This assumes that the attacker won't acquire a user capable of
>locking the entire config. If not, there's no disadvantage of
>a global lock.
>
>>3) administrator painfully tries to fix all those devices. Notes:
>> can't be fixed without a specific tool or protocol to steal the
>> lock back and delete/modify the compromised user.
>
>The "steal the lock back" program would be a specific tool.
>
>I don't see how does this varies from battling for 'configure
>exclusive' mode in JUNOS or 'enable' mode in IOS. I don't see this
>as a concern there, nor do I see netconf putting additional tools
>in the attackers toolbox.
>
>>4) If you believe you can beat the race condition that has been
>> discussed, you should note that the attack could also involve a
>> DDoS attack against the management station, network, or router in
>> front of same.
>
>The attack could also involve a forest fire or other natural
>disaster, moving it into the realm of "unrealistic scenario". ;^)
>
>Seriously, there are scenarios where the attackers enjoy an advantage.
>These scenarios are not intrinsic to netconf, nor is their solution
>dependent on <steal-lock>. Network resources need protection from
>evil doers. But unless we're adding firewalling and filtering to
>netconf charter, I think most of this is outside the scope of this
>protocol.
>
>>The fundamental problem here is that you're mixing global operations
>>and isolated operations.
>
>No, I want global protection for isolated operations. I want to
>lock the entire configuration while I make my change so that I don't
>have to worry about interference between my script, your script,
>and the other guy's script. Even if we're munging different pieces
>of the configuration, calculating, debugging and recovering from
>the interaction is needless heartache.
>
>>You want to provide fine-grained access for
>>some commands and not for others all of which affect the same objects,
>>which is fundamentally a poor security design.
>
>I don't think so. I want course-grained locking for anything
>affecting the configuration. I want to avoid bizarre interactions,
>making more robust applications and better network reliability.
>
>>I'm confused why disallowing locks to affect non-accessible objects is
>>a problem?
>
>Because it introduces complexity into a problem that is already
>sufficiently complex. We need to build a straight-forward solution
>that can handle the most common network management tasks in as
>simple, robust, and dependable a manner as possible. Adding
>complexity for rare use cases, odd scenarios, and "what if"s is a
>lose.
>
>The most common scenario for netconf will be an application or
>script that hands a chunk of configuration (in XML) to a library
>and tells it to load that configuration onto a specific device.
>The protocol design should maximize that probability that this
>configuration delta can be loaded correctly, or that an appropriate
>error can be returned if it does not.
>
>The second most common scenario will be an application or script
>pulling the entire configuration of the device for archive or
>examination. The protocol design should maximize the probabilty
>that the configuration can be delivered intact, or that an
>appropriate error can be returned if it does not.
>
>Global locks aid in both scenarios. They are simple to understand.
>They are simple to implement. Nuff said?
>
>Thanks,
> Phil
>
>--
>to unsubscribe send a message to netconf-request@ops.ietf.org with
>the word 'unsubscribe' in a single line as the message text body.
>archive: <http://ops.ietf.org/lists/netconf/>
--
to unsubscribe send a message to netconf-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.
archive: <http://ops.ietf.org/lists/netconf/>