[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: access control on the <eventStreams> data model



Randy Presuhn wrote:
Hi -

From: "Andy Bierman" <ietf@andybierman.com>
To: "Netconf (E-mail)" <netconf@ops.ietf.org>
Sent: Thursday, July 12, 2007 1:09 PM
Subject: access control on the <eventStreams> data model
...
It is not even clear that access control "by stream" even
makes any sense.  Access control by namespace and element name
within the data stream makes sense.  What if the same data
can appear in multiple streams?  It is also more robust
to simply exclude restricted data from the particular subscription,
rather than reject the entire subscription, because the manager
has access to most (but not all) of the possible data that
could be generated in a stream.  This is how access control
works in SNMP.  If you to a getnext or getbulk, it skips restricted data,
rather than rejecting the PDU with an error.
....

But, FWIW, that's not how access control for notifications works in SNMP.
RFC 3413 3.3 (2)

Do you mean para 2:

   Notification originator applications require a mechanism for
   identifying the management targets to which notifications should be
   sent.  The particular mechanism used is implementation dependent.
   However, if an implementation makes the configuration of management
   targets SNMP manageable, it MUST use the SNMP-TARGET-MIB module
   described in this document.

I think you mean para 4, point 2:

   (2) The appropriate set of variable-bindings is retrieved from local
       MIB instrumentation within the relevant MIB view.  The relevant
       MIB view is determined by the securityLevel, securityModel,
       contextName, and securityName of the management target.  To
       determine whether a particular object instance is within the
       relevant MIB view, the isAccessAllowed abstract service interface
       is used, in the same manner as described in the preceding
       section, except that the viewType indicates a Notification-Class
       operation.  If the statusInformation returned by isAccessAllowed
       does not indicate accessAllowed, the notification is not sent to
       the management target.

The difference seems to be that (on a PER-NOTIFICATION basis)
the entire PDU is dropped if any data within it is restricted.
This is fine -- easier on the agent than pruning the restricted data
and sending the rest.

But this is much different than refusing to let the manager see
the name of the stream or rejecting the <create-subscription>
because individual notifications may not be delivered.


Randy

Andy



--
to unsubscribe send a message to netconf-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.
archive: <http://ops.ietf.org/lists/netconf/>




--
to unsubscribe send a message to netconf-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.
archive: <http://ops.ietf.org/lists/netconf/>