[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Reply to reveiw comments from Pekka Savola (2 of ?)



On Thu, 26 Feb 2004, Pekka Savola wrote:

> On Wed, 25 Feb 2004, George Jones wrote:
> > ps>   Requirement. If it is possible to change the default console
> > ps>       communication profile, then there MUST be a method defined and
> > ps>       published for returning to the default configuration.
> > ps> ==> this seems like too obvious to be true.  If you can change the
> > ps> profile, you obviously can change it back :-).  I assume you mean
> > ps> something like, "must be able to reset the console configuration
> > ps> without console access" or something -- if so, say it!
> >
> > Better ?
>
> Yep [snipped].
>
> > ps> ==> unless this mechanism is standardized (different key sequences for
> > ps> 10 different vendors) I don't think this really helps that much
> > :-).
> >
> > Having to remember, or have a cheat sheet 10 different sequences is a
> > far better problem to have than not having any way at all to reset
> > forgotten parameters.
>
> Agreed, of course :)
>
> > ps> 2.3.5 'Console' Supports Fall-back Authentication
> > ps>
> > ps>   Requirement. The 'console' SHOULD support an authentication
> > ps>   mechanism
> > ps>       which does not require functional IP or depend on external
> > ps>       services.  This authentication mechanism MAY be disabled until a
> > ps>       failure of other preferred mechanisms is detected.  In the event
> > ps>       of fall-back AUTHENTICATION, the interface SHOULD either im
> > ps>   a locally defined AUTHORIZATION profile or consider all commands
> > ps>       to be AUTHORIZED. This mechanism SHOULD be implemented as a
> > ps>       fall-back if the preferred authentication method is not "LOCAL".
> > ps>
> > ps> ==> there seem to be multiple requirements here?  Does it make sense
> > ps> to include these in one requirement?
> >
> > Right again.  The basic thing this is trying to say is "support
> > fallback authenticadtion when IP dosn't work".  This was just to busy.
> > I've shortened the req to its core:
> >
> > 04> 2.3.4 'Console' Supports Fall-back Authentication
> > 04>
> > 04>    Requirement. The 'console' SHOULD support an authentication
> > 04>    mechanism which does not require functional IP or depend on
> > 04>    external services.  This authentication mechanism MAY be disabled
> > 04>    until a failure of other preferred mechanisms is detected.
>
> OK, but be sure that the Warnings section then has a caveat about that
> MAY -- if the failure detection fails (murphy's law.. :), you wouldn't
> want to be stuck with no mechanism at all :)
>
> > ps>
> > ps> 2.4.8 Support Text Configuration Files
> > ps>
> > ps>   Requirement. The device MUST provide a means to remotely save a copy
> > ps>       of the system configuration file(s) in a textual format.  It
> > ps>       MUST
> > ps>       NOT be necessary to use a proprietary program to view the
> > ps>       configuration. The configuration MUST also be viewable as text
> > ps>       on
> > ps>       the device itself. Sensitive information such as passwords that
> > ps>       could be used to compromise the security of the device MAY be
> > ps>       excluded from the saved configuration.
> > ps>
> > ps> ==> is text compression using e.g. gzip or bzip2 allowed, though?
> >
> > Hmm.  Remotely savable.  No propritary format.   I'd say yes, but I
> > can't think of a good way to reword this.  Thoughts ?
>
> Hmm. "The configuration MAY be compressed using a compression
> algorithm which is openly available, as long as the fact is clearly
> identified, and the compression can be disabled." ?

OK. Added to req for storing remote configs.

This whole req has been rewoked a bit (Don, see if you like
this better).

04> 2.4.8 Support Text Configuration Files
04>
04>    Requirement. The device MUST support display, backup and restore of
04>       system configuration in a simple well defined textual
04>       format. The configuration MUST also be viewable as text on the
04>       device itself.  It MUST NOT be necessary to use a proprietary
04>       program to view the configuration.
04>
04>    Justification. Simple,  well-defined textual configurations
04>       facilitate human understanding of the operational state of the
04>       device, enable off-line audits, and facilitate automation.
04>       Requiring the use of a proprietary program to access the
04>       configuration inhibits these goals.
04>
04>    Examples. A 7-bit ASCII configuration file that shows the current
04>       settings of the various configuration options wold satisfy the
04>       requirement, as would a Unicode configuration or any other
04>       "textual" representation. A structured binary format intended
04>       only
04>       for consumption by programs would not be acceptable.
04>
04>    Warnings.
04>
04>       Offline copies of configurations should be well protected as
04>       they often contain sensitive information such as SNMP community
04>       strings, passwords, network blocks, customer information, etc.
04>
04>       "Well defined" and "textual" are open to interpretation. Clearly
04>       an ASCII configuration file with a regular, documented command
04>       oriented-syntax would meet the definition.  These are currently
04>       in wide use.  Future options, such as XML based configuration
04>       may meet the requirement.  Determining this will require
04>       evaluation against the justifications listed above.

> > ps> 2.5.4 Ability to Control Service Bindings for Listening Services
> > ps>
> > ps>   Requirement. The device MUST provide a means for the user to specify
> > ps>       the bindings used for all listening services.  It MUST support
> > ps>       binding to a list of addresses and netblocks.  It MUST also
> > ps>       support configuration of binding services to any interface local
> > ps>       to the device, physical or non-physical (e.g. "loopbacks").
> > ps>
> > ps> ==> it should be clearer what's in scope for this.  Is e.g. the his
> > ps> like:
> >
> > no ?  Perhaps the longish justifcaiotn (result of discussinon on the
> > opsec list IIRC) before that confused the issue ?
>
> I'm trying to figure out what my point was.  Oh yes, I believe it was
> that currently, I'm not aware of implementations providing this kind
> of binding feature.

I thought that IOS's "ip [logging|tacacs|telnet...] source-interface ..."
provided this granularity of control, at least for some services.

>  The fact is achieved using access lists, which
> are created by the user ("ip receive acl" in IOS or "loopback acl" in
> JunOS).  I think one should be clearer whether such user-created
> mechanisms are sufficient in this context, or do you require
> additional mechanisms?

Added the following to "examples".

04>      Similar effects may be achieved with the use of global filters,
04>      sometimes called "receive" or "loopback" ACLs, that filter
04>      traffic destined for the device itself on all interfaces.

>
> > ps> 2.7.5 Support Route Filtering

> Ok.  For now, I guess this issue could be sneaked in by adding a
> Warning, like, "Warnings.  Filtering Interior Gateway Protocols (e.g.,
> OSPF or IS-IS) could be dangerous, and as these should only be used
> inside a domain, this is less of a problem."

The current working is:

04> 2.7.5 Support Route Filtering
04>
04>    Requirement. The device MUST provide a means to filter routing
04>       updates for all protocols to be used to exchange external
04>       routing information.
04>
04>    Justification. See [RFC3013] and section 3.2 of [RFC2196].
04>
04>    Examples. Operators may wish to ignore advertisements for routes to
04>       addresses allocated for private internets. See eBGP.
04>
04>    Warnings. None.

Let me know if you think some language about interior/external gateway
protocols would help (& possible refs).

Thanks,
----George