[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: �NETCONF�over�TLS



Dear Martin,

>
> I think this is crucial for the TLS transport to work for NETCONF.
> RFC4741 says in section 2.3:
>
>    NETCONF connections must be authenticated.  The transport protocol is
>    responsible for authentication.
>
>    [...]
>
>    The authentication process should result in an identity whose
>    permissions are known to the device.
>
> I don't see how this requirement is met with the current draft.
>
> So, adding a <login> rpc to this document is probably a good idea.
> But do we want to limit TLS usage to using the <login> method?  People
> are also using some field in the 'subject' of a client certificate to
> get a user name (or other info) which is then mapped to access
> rights.

TLS is always responsible for authentication. Section 3 of the document
explain how peers can examine the certificate presented by an entity in
order to determine if it meets their expectations and therefore to
identify the entity's permissions.

The concern is that not all NETCONF peers can have certificates or
vendor-certificates to get a user name and therefore to map to the access
rights. The alternative is to establish a TLS session to authenticate the
TLS server (the NETCONF agent) and then use a NETCONF-specific mechanism
(<request-login>) to authenticate the manager.

Note that TLS can provide mutual authentication at the transport layer
using preshared keys. In this case, <request-login> may be used for
sending more authorization and authentication information.

In any case, the document doesn't limit TLS usage to using the <login>
method.

Best regards.
Badra

--
to unsubscribe send a message to netconf-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.
archive: <http://ops.ietf.org/lists/netconf/>