[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
discussions with Wes and results..
- To: Rob Enns <rpe@juniper.net>, netconf <netconf@ops.ietf.org>
- Subject: discussions with Wes and results..
- From: Eliot Lear <lear@cisco.com>
- Date: Mon, 18 Oct 2004 09:20:38 +0200
- Iim-sig: v:"1"; h:"imail.cisco.com"; d:"cisco.com"; z:"home"; m:"krs"; t:"1098084169.486968"; x:"432200"; a:"rsa-sha1"; b:"nofws:4017"; e:"Iw=="; n:"sQYarK2E51MdcTiUqeif3F7cWdxIfoCiXhdfb9vD5ee/j0jXL15gbFxF2pXIw" "eAblu0N6XAgK7k+wrbr7bQDJaCDqOmzqpRUBjIRQAXQ7NzadpmR3pUL6wxaRU" "tW+c43sl9jC50Qg1sXHpPjt8Y+Y16ioyQAQAdSunM4YhevURc="; s:"jH2xryMGH+tSEmihIJ86oFWYHUL0mJNEtBjqs1UggHWTw7o1JK2oKLwAHDVs4" "UnPKQzWIMC1FPKwy5Q2Nq+SnT1kTO2W+zVe5JeYs3+bzqNYYLpsoFHthSpHL4" "SCnPS8D8JXP2JA5XYmfqkuamFFDkj5/x9szZWpZ0jNBNHVagY="; c:"Date: Mon, 18 Oct 2004 09:20:38 +0200"; c:"From: Eliot Lear <lear@cisco.com>"; c:"Subject: discussions with Wes and results.."
- Iim-verify: s:"y"; v:"y"; r:"60"; h:"imail.cisco.com"; c:"message from imail.cisco.com verified; "
- User-agent: Mozilla Thunderbird 0.8 (Macintosh/20041017)
Rob,
Attached are some diffs of the changes that I'd like to see in the draft
to address Wes' security concerns and one other omission.
Thanks,
Eliot
*** draft-ietf-netconf-prot-03.txt Thu Oct 7 17:07:33 2004
--- draft-ietf-netconf-prot-03e.txt Thu Oct 7 18:01:27 2004
***************
*** 521,530 ****
The authentication process should result in an entity whose
permissions and capabilities are known to the device. These
! permissions must be enforced during the NETCONF session. For
! example, if the native user interface restricts users from changing
! the network interface configuration, the user should not be able to
! change this configuration data using NETCONF.
--- 521,529 ----
The authentication process should result in an entity whose
permissions and capabilities are known to the device. These
! permissions must be enforced during the NETCONF session.
!
!
***************
*** 2634,2639 ****
--- 2633,2657 ----
8. Security Considerations
+ This standard does not specify an authorization scheme, as it was
+ viewed that such a scheme should be tied to a meta-data model or a
+ data model. Implementators SHOULD also provide a well thought out
+ authorization scheme with NETCONF.
+
+ Authorization of individual users via the netconf agent may or may
+ not map 1:1 to other interfaces. There are factors. First, the
+ data models may be incompatable. Second, it may be desirable to
+ authorize based on mechanisms such as netconf, telnet, ssh, etc.
+
+ In addition, operations on configurations may have unintended
+ consequences if those operations are also not guarded by the global
+ lock on the files or objects being operated upon. For instance, a
+ partially complete access list could be committed from a candidate
+ configuration unbnownest to the owner of the lock of the candidate
+ configuration, leading to either an insecure or inaccessible device
+ if the lock on the candidate configuration does not also apply to
+ the <copy-config> operation when applied to it.
+
Configuration information is by its very nature sensitive. Its
transmission in the clear and without integrity checking leaves
devices open to classic so-called "person in the middle" attacks.
***************
*** 2679,2687 ****
kill another netconf session programmatically from within netconf if
one knows the session identifier of the offending session. The other
possible way to break a lock is to provide an function within the
! craft interface.
!
!
Enns, Editor Expires December 18, 2004 [Page 48]
^L
--- 2697,2706 ----
kill another netconf session programmatically from within netconf if
one knows the session identifier of the offending session. The other
possible way to break a lock is to provide an function within the
! craft interface. These two mechanisms suffer from a race condition
! that may be ameliorated by removing the offending user from an AAA
! server. However, such a solution is not useful in all deployment
! scenarios, such as those where SSH public/private key pairs are used.
Enns, Editor Expires December 18, 2004 [Page 48]
^L
***************
*** 2766,2772 ****
Margaret Wasserman, ThingMagic
!
--- 2785,2797 ----
Margaret Wasserman, ThingMagic
! The authors would like to awknowledge the members of the NETCONF
! working group. In particular, we would like to thank Wes Hardaker
! for his persistance and patience in assisting us with security
! considerations. We would also like to thank Randy Presuhn, Sharon
! Chisolm, Juergen Schoenwalder, Glenn Waters, David Perkins, Weijing
! Chen, Simon Leinen, Keith Allen and Dave Harrington for all of
! their valuable advice.
--
to unsubscribe send a message to netconf-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.
archive: <http://ops.ietf.org/lists/netconf/>