Yes to all that. In particular:

> It would be great if followup work in ANIMA would tackle the
> problem of role management.

I think that is necessary, and it's quite closely tied to the question
of the domain boundary, which will presumably limit the scope of
a role. And I have draft-choi-anima-trust-networking high on my
reading list, too.

Regards
   Brian Carpenter



On 10/07/2018 18:06, Toerless Eckert wrote:
> Thanks Brian, as always, great recommendation.
> 
> It would be great if followup work in ANIMA would tackle the
> problem of role management. In the case of this drafts
> simple view at the world its a simple master/slave role
> assignment: You have few master nodes such as those in the NOC
> and registrars that are still "manually" configured, and a
> much larger number of "zero-touch" slave nodes (all the other nodes)
> that are controlled by the masters via a combination of
> ANIMA/ANI and SDN. And we could easily add this model
> via simple binary distinctions in the Domain Certificates.
> And appropriate signing element in GRASP messages.
> 
> I just wonder if its worth tackling this role management
> problem if we only have an idea how to solve this simple 
> "SDN"'ish case. Would be a lot more useful if we had a more
> generalized solution that would also work in more
> autonomic networks with a lot more ASA - aka: how do
> we manage the privileges/roles of ASAs... ? The classic
> solution is probably role/privilege assignment from those
> NOC-master nodes. And if such schemes can distribute
> appropriate credentials (role certificates), we can easily add
> this too.
> 
> Then again, i think more fully distributed, autonomic
> networks might want to have a more innovative solution approach
> to roles. There is for example the proposal direction
> we wanted to present in DINRG to use blockchain/distributed
> ledger technologies. Or in other words: An ASA could
> ultimately raise to a particular role by collecting credit
> in the blockchain through "proof of doing a good job and
> being trustworthy".
> 
> This would be cool stuff to get into ANIMA, but of course, i
> at this point in time i am no sure how far away this type
> of technology is from being applicable to IETF (as opposed
> to being refined in IRTF).
> 
> Cheers
>     Toerless
> 
> 
> On Mon, Jul 09, 2018 at 03:57:38PM +1200, Brian E Carpenter wrote:
>> Hi,
>>
>> I've had a very quick look at this draft, and it didn't ring any alarms.
>> Just one small comment on the Security Considerations, which starts:
>>
>>>    There is no protection against "unauthorized" ACP nodes to generate
>>>    service announcements, because there is no authorization scheme in
>>>    GRASP.
>>
>> That sounds a bit brutal. I suggest replacing the sentence:
>>
>> All ACP nodes are at the same level of trust, as a result of
>> successfully enrolling and joining the ACP. However, there is
>> currently no mechanism in GRASP for indicating and authorizing
>> the role of a node. Therefore there is no protection against ACP
>> nodes generating inappropriate service announcments.
>>
>> Regards
>>    Brian
>>
>> _______________________________________________
>> Anima mailing list
>> [email protected]
>> https://www.ietf.org/mailman/listinfo/anima
> 

_______________________________________________
Anima mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/anima

Reply via email to