[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: NETCONF over TLS



Balazs Lengyel writes:

Hello,
Why do you feel we need a new transport mapping? What would that give us, why is it better then SSH and BEEP? You describe in your document what you intend to do, but please motivate us by stating why is this a good idea?
regards Balazs


Hi Lengyel,


It is not so easy to make a comparison between available security protocols for a specific application and to recommend a single one. It is easier to define a model threat for that application and then looking for a security solution. It is right that BEEP, SSH and other security protocols are able to meet the Netconf security requirements, but TLS could be a good alternative; even if other protocols could be able to give the same services.


There are several reasons why one might want to do Netconf over TLS, but please don't consider them as an XOR to the available solutions. some of these reasons:


- People are interesting to adopt TLS to become the unifying transport for, especially, SYSLOG, IPFIX, SNMP. And I think it is a good idea to do that for Netconf too. One argument is the following text posted out by David Harrington: [BCP72 identifies TLS as the transport security mechanism of choice when traffic is over TCP. SSH is recommended for remote login security, for providing channel-level security directly in the application. Netconf is designed to do "network configuration" as a replacement/supplement to the CLI running over a remote login session].


- TLS natively integrates key distribution and mutual authentication based on certificates, preshared keys, tokens, passwords and other credential types. If you are going to distribute vendor-certificates for your network's devices, TLS will be able to integrate the PKI use in a fashion way.


- TLS can provide a user-based access-control model (RFC 4681) and by its design it provides a facility for secure connection closure (close_notify alert) as well as a flexible way to encapsulate and protect EAP (for OTP, PLAIN, CHAP, etc.), AAA and RADIUS attributes.


- As Juergen Schoenwaelder pointed out, the implementors at that time did not want NETCONF/BEEP+TLS nor NETCONF/SOAP+HTTPS+TLS.


Best regards

--
Mohamad Badra
CNRS - LIMOS Laboratory



--
to unsubscribe send a message to netconf-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.
archive: <http://ops.ietf.org/lists/netconf/>