[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
RE: ??NETCONF?over?TLS
Hi,
> > So, adding a <login> rpc to this document is probably a good idea.
> > But do we want to limit TLS usage to using the <login>
> method? People
> > are also using some field in the 'subject' of a client
> certificate to
> > get a user name (or other info) which is then mapped to
> access rights.
> The concern is that not all NETCONF peers can have
> certificates or vendor-certificates to get a user name and
> therefore to map to the access rights. The alternative is to
> establish a TLS session to authenticate the TLS server (the
> NETCONF agent) and then use a NETCONF-specific mechanism
> (<request-login>) to authenticate the manager.
>
> Note that TLS can provide mutual authentication at the
> transport layer using preshared keys. In this case,
> <request-login> may be used for sending more authorization
> and authentication information.
>
so, I personally would prefer we use <request-login> as a new operation
rather than rpc.
The <request-login> maybe provide authentication function via third party
mechanism.
Yuzhi
> -----Original Message-----
> From: owner-netconf@ops.ietf.org
> [mailto:owner-netconf@ops.ietf.org] On Behalf Of badra@isima.fr
> Sent: Monday, June 18, 2007 12:36 AM
> Subject: Re:??NETCONF?over?TLS
>
> Dear Martin,
>
> >
> > I think this is crucial for the TLS transport to work for NETCONF.
> > RFC4741 says in section 2.3:
> >
> > NETCONF connections must be authenticated. The
> transport protocol is
> > responsible for authentication.
> >
> > [...]
> >
> > The authentication process should result in an identity whose
> > permissions are known to the device.
> >
> > I don't see how this requirement is met with the current draft.
> >
> > So, adding a <login> rpc to this document is probably a good idea.
> > But do we want to limit TLS usage to using the <login>
> method? People
> > are also using some field in the 'subject' of a client
> certificate to
> > get a user name (or other info) which is then mapped to
> access rights.
>
> TLS is always responsible for authentication. Section 3 of
> the document explain how peers can examine the certificate
> presented by an entity in order to determine if it meets
> their expectations and therefore to identify the entity's permissions.
>
> The concern is that not all NETCONF peers can have
> certificates or vendor-certificates to get a user name and
> therefore to map to the access rights. The alternative is to
> establish a TLS session to authenticate the TLS server (the
> NETCONF agent) and then use a NETCONF-specific mechanism
> (<request-login>) to authenticate the manager.
>
> Note that TLS can provide mutual authentication at the
> transport layer using preshared keys. In this case,
> <request-login> may be used for sending more authorization
> and authentication information.
>
> In any case, the document doesn't limit TLS usage to using
> the <login> method.
>
> Best regards.
> Badra
>
> --
> to unsubscribe send a message to netconf-request@ops.ietf.org
> with the word 'unsubscribe' in a single line as the message text body.
> archive: <http://ops.ietf.org/lists/netconf/>
>
--
to unsubscribe send a message to netconf-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.
archive: <http://ops.ietf.org/lists/netconf/>