Hi Joe,

Thank you for your reply! We have updated the document as requested. Please see 
below for updated files as well as a followup query.

> >> 9) <!--[rfced] Security Considerations: This text does not 
> >> exactly match the text provided for security 
> >> considerations of documents that contain YANG modules:
> >> https://wiki.ietf.org/group/ops/yang-security-guidelines
> >> Should this document be updated to match those?
> >> For example: usage of "all" vs. "some" and the additional sentences
> >> in the 5th paragraph (which start with "Logging" and "If logging").
> >> 
> >> Original: 
> >>    There are a number of data nodes defined in this YANG module that are
> >>    writable/creatable/deletable (i.e., config true, which is the
> >>    default).  These data nodes should be considered sensitive or
> >>    vulnerable in all network environments.  Logging in particular is
> >>    used to assess the state of systems and can be used to indicate a
> >>    network compromise.  If logging were to be disabled through malicious
> >>    means, attacks may not be readily detectable.  Therefore write
> >>    operations (e.g., edit-config) to these data nodes without proper
> >>    protection can have a negative effect on network operations and on
> >>    network security.
> >> 
> >> Corresponding text on 
> >> https://wiki.ietf.org/group/ops/yang-security-guidelines:
> >> 
> >>    There are a number of data nodes defined in this YANG module that are
> >>    writable/creatable/deletable (i.e., config true, which is the
> >>    default). These data nodes may be considered sensitive or vulnerable in
> >>    some network environments. Write operations (e.g., edit-config) to these
> >>    data nodes without proper protection can have a negative effect on 
> >> network
> >>    operations. These are the subtrees and data nodes and their
> >>    sensitivity/vulnerability:
> >> -->
> >>  [JMC] Your mods to Security Considerations are good.  I think breaking 
> >> out the boilerplate text and the additional “logging” text into separate 
> >> paragraphs is a good choice.  Virtually the entire module is read-write, 
> >> but the critical “top-level” nodes are “console”, “file”, and “remote” as 
> >> each of these can have actions that disable logging.  The “remote” branch 
> >> can also be used as a means to exfiltrate data to a nefarious destination.
> > 
> > The Security Considerations section template has been further updated by 
> > draft-ietf-netmod-rfc8407bis. In particular, the second paragraph has been 
> > updated. This will affect your next point #10.
> > 
> > This is a reminder to myself to get the yang-security-guidelines page 
> > updated once rfc8407bis is approved.
> 
> 6) Thank you for letting us know! We have updated the Security Considerations 
> to reflect what appears in draft-ietf-netmod-rfc8407bis. Please let us know 
> if the updates are correct.
> [JMC] Some of the changes you mentioned last time for the template are not 
> reflected (e.g., changing “all” to “some”).  That change would also be 
> required by 8407bis.
> Joe

[rfced] Thank you for pointing this out (and apologies for missing this 
earlier). We have updated the Security Considerations section to match what 
appears in 8407bis [1].

Additionally, please note that we have removed the following text from the 
Security Considerations to match 8407bis. If this text should be re-added to 
the paragraph (or if there are any further updates needed), please let us know. 

Logging in particular is used to assess the state of systems and can be used    
to indicate a network compromise.  If logging were to be disabled through       
 
malicious means, attacks may not be readily detectable.

Current:
8. Security Considerations

This section is modeled after the template defined in Section 3.7.1
of [RFC8407].

The "ietf-syslog" YANG module defines a data model that is designed
to be accessed via YANG-based management protocols, such as NETCONF
[RFC6241] and RESTCONF [RFC8040]. These protocols have to use a
secure transport layer (e.g., SSH [RFC4252], TLS [RFC8446], and QUIC
[RFC9000]) and have to use mutual authentication.

The Network Configuration Access Control Model (NACM) [RFC8341]
provides the means to restrict access for particular NETCONF or
RESTCONF users to a preconfigured subset of all available NETCONF or
RESTCONF protocol operations and content.

This module imports groupings from ietf-crypto-types YANG module
defined in YANG Groupings for Crypto Types [RFC9640]. Security
considerations described in that document apply to this module also.

There are a number of data nodes defined in this YANG module that are
writable/creatable/deletable (i.e., "config true", which is the
default). All writable data nodes are likely to be reasonably
sensitive or vulnerable in some network environments. Write
operations (e.g., edit-config) and delete operations to these data
nodes without proper protection or authentication can have a negative
effect on network operations. The following subtrees and data nodes
have particular sensitivities/vulnerabilities:

...

Some of the readable data nodes in this YANG module may be considered
sensitive or vulnerable in some network environments. It is thus
important to control read access (e.g., via get, get-config, or
notification) to these data nodes. Specifically, the following
subtrees and data nodes have particular sensitivities/
vulnerabilities:

…

There are no particularly sensitive RPC or action operations.

----------

Updated files have been posted here (please refresh): 
   https://www.rfc-editor.org/authors/rfc9742.txt
   https://www.rfc-editor.org/authors/rfc9742.pdf
   https://www.rfc-editor.org/authors/rfc9742.html
   https://www.rfc-editor.org/authors/rfc9742.xml

Updated diff files:
   https://www.rfc-editor.org/authors/rfc9742-diff.html (comprehensive edits)
   https://www.rfc-editor.org/authors/rfc9742-rfcdiff.html (side by side)
   https://www.rfc-editor.org/authors/rfc9742-auth48diff.html (AUTH48 changes 
only)
   https://www.rfc-editor.org/authors/rfc9742-auth48rfcdiff.html (side by side)

For the AUTH48 status page, see: 
   https://www.rfc-editor.org/auth48/rfc9742

[1] https://datatracker.ietf.org/doc/draft-ietf-netmod-rfc8407bis/ 

Safe travels to those who are attending IETF 122 in Bangkok!

Thank you,
RFC Editor/mc

-- 
auth48archive mailing list -- auth48archive@rfc-editor.org
To unsubscribe send an email to auth48archive-le...@rfc-editor.org

Reply via email to