[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
RE: discussions with Wes and results..
Thanks Eliot, I'll integrate the changes (and include further
revisions as necessary based on the followup discussion).
Rob
> -----Original Message-----
> From: Eliot Lear [mailto:lear@cisco.com]
> Sent: Monday, October 18, 2004 12:21 AM
> To: Rob Enns; netconf
> Subject: discussions with Wes and results..
>
> Rob,
>
> Attached are some diffs of the changes that I'd like to see
> in the draft
> to address Wes' security concerns and one other omission.
>
> Thanks,
>
> Eliot
>
>
> *** draft-ietf-netconf-prot-03.txt Thu Oct 7 17:07:33 2004
> --- draft-ietf-netconf-prot-03e.txt Thu Oct 7 18:01:27 2004
> ***************
> *** 521,530 ****
>
> The authentication process should result in an entity whose
> permissions and capabilities are known to the device. These
> ! permissions must be enforced during the NETCONF session. For
> ! example, if the native user interface restricts users
> from changing
> ! the network interface configuration, the user should not
> be able to
> ! change this configuration data using NETCONF.
>
>
>
> --- 521,529 ----
>
> The authentication process should result in an entity whose
> permissions and capabilities are known to the device. These
> ! permissions must be enforced during the NETCONF session.
> !
> !
>
>
>
> ***************
> *** 2634,2639 ****
> --- 2633,2657 ----
>
> 8. Security Considerations
>
> + This standard does not specify an authorization scheme, as it was
> + viewed that such a scheme should be tied to a meta-data
> model or a
> + data model. Implementators SHOULD also provide a well
> thought out
> + authorization scheme with NETCONF.
> +
> + Authorization of individual users via the netconf agent
> may or may
> + not map 1:1 to other interfaces. There are factors. First, the
> + data models may be incompatable. Second, it may be desirable to
> + authorize based on mechanisms such as netconf, telnet, ssh, etc.
> +
> + In addition, operations on configurations may have unintended
> + consequences if those operations are also not guarded by
> the global
> + lock on the files or objects being operated upon. For
> instance, a
> + partially complete access list could be committed from a
> candidate
> + configuration unbnownest to the owner of the lock of the
> candidate
> + configuration, leading to either an insecure or
> inaccessible device
> + if the lock on the candidate configuration does not also apply to
> + the <copy-config> operation when applied to it.
> +
> Configuration information is by its very nature sensitive. Its
> transmission in the clear and without integrity checking leaves
> devices open to classic so-called "person in the
> middle" attacks.
> ***************
> *** 2679,2687 ****
> kill another netconf session programmatically from
> within netconf if
> one knows the session identifier of the offending
> session. The other
> possible way to break a lock is to provide an function
> within the
> ! craft interface.
> !
> !
>
> Enns, Editor Expires December 18, 2004
> [Page 48]
> ^L
> --- 2697,2706 ----
> kill another netconf session programmatically from
> within netconf if
> one knows the session identifier of the offending
> session. The other
> possible way to break a lock is to provide an function
> within the
> ! craft interface. These two mechanisms suffer from a
> race condition
> ! that may be ameliorated by removing the offending user
> from an AAA
> ! server. However, such a solution is not useful in all deployment
> ! scenarios, such as those where SSH public/private key
> pairs are used.
>
> Enns, Editor Expires December 18, 2004
> [Page 48]
> ^L
> ***************
> *** 2766,2772 ****
>
> Margaret Wasserman, ThingMagic
>
> !
>
>
>
> --- 2785,2797 ----
>
> Margaret Wasserman, ThingMagic
>
> ! The authors would like to awknowledge the members of the NETCONF
> ! working group. In particular, we would like to thank
> Wes Hardaker
> ! for his persistance and patience in assisting us with security
> ! considerations. We would also like to thank Randy
> Presuhn, Sharon
> ! Chisolm, Juergen Schoenwalder, Glenn Waters, David
> Perkins, Weijing
> ! Chen, Simon Leinen, Keith Allen and Dave Harrington for all of
> ! their valuable advice.
>
>
>
--
to unsubscribe send a message to netconf-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.
archive: <http://ops.ietf.org/lists/netconf/>