Hi Madison,

Please see inline

On Thu, 27 Mar 2025 at 23:06, Madison Church <mchu...@staff.rfc-editor.org>
wrote:

> Hi Tirumal,
>
> Thank you for your reply! We have updated the document accordingly and
> have some followup queries marked with [rfced].
>
> [rfced] Upon sending the initial AUTH48 email, we note that the address "
> blake.ander...@cisco.com" returned an "Undelivered Mail Returned to
> Sender" message. Is there an up-to-date email address for Blake that we can
> reach?
>
> > > 13) <!-- [rfced] Because of your note that the template in rfc8407bis
> > > has been used, we will update this paragraph (which appears in Sections
> > > 9.2, 9.3, and 9.4) to match Section 3.7.1 of rfc8407bis as follows.
> > > Please let us know if that is not what you intended.
> > >
> > > Original:
> > >   This section follows the template defined in Section 3.7.1 of
> > >   [I-D.ietf-netmod-rfc8407bis].
> > >
> > >   The YANG module specified in this document defines a schema for data
> > >   can possibly be accessed via network management protocols such as
> > >   NETCONF [RFC6241] or RESTCONF [RFC8040].  These network management
> > >   protocols are required to use a secure transport layer and mutual
> > >   authentication, e.g., SSH [RFC6242] without the "none" authentication
> > >   option, Transport Layer Security (TLS) [RFC8446] with mutual X.509
> > >   authentication, and HTTPS with HTTP authentication (Section 11 of
> > >   [RFC9110]).
> > >
> > >   The Network Access Control Model (NACM) [RFC8341] provides the means
> > >   to restrict access for particular users to a pre-configured subset of
> > >   all available protocol operations and content.
> > >
> > > Perhaps (following draft-ietf-netmod-rfc8407bis-22):
> > >   This section follows the template defined in Section 3.7.1 of
> > >   [YANG-GUIDELINES].
> > >
> > >   The "iana-tls-profile" YANG module defines a data model that is
> > >   designed to be accessed via YANG-based management protocols, such as
> > >   NETCONF [RFC6241] and RESTCONF [RFC8040]. These protocols have to
> > >   use a secure transport layer (e.g., SSH [RFC4252], TLS [RFC8446], and
> > >   QUIC [RFC9000]) and have to use mutual authentication.
> > >
> > >   The Network Configuration Access Control Model (NACM) [RFC8341]
> > >   provides the means to restrict access for particular NETCONF or
> > >   RESTCONF users to a preconfigured subset of all available NETCONF or
> > >   RESTCONF protocol operations and content.
> > > -->
>

Looks good to me.


> >
> > It is aligned with the Security Considerations Section Template in
> Section 3.7.1 of
> https://datatracker.ietf.org/doc/draft-ietf-netmod-rfc8407bis/
>
> [rfced] Per your reply, we have updated the document as much as possible
> to match the template in Section 3.7.1 of 8407bis. We have the remaining
> questions regarding these updates. Note that this diff file may be best for
> viewing side-by-side updates:
> https://www.rfc-editor.org/authors/rfc9761-auth48rfcdiff.html.
>
> 1) Section 9.2:
> a) May we add the following sentences in Section 9.2 to match the template?
>
> "There are no particularly sensitive writable data nodes."
> "There are no particularly sensitive readable data nodes."
>

No, sensitive writable/readable data nodes are present and the
security/privacy considerations are explained in 4th and 5th paragraphs of
Section 9.3.


>
> b) Would you like to add the following text at the end of Section 9.2 as
> per the template’s guidance?
>
> -- If the data model does not define any data nodes (i.e., none
> -- of the above sections or readable/writable data nodes or RPCs
> -- have been included), then add the following text:
>
> "The YANG module defines a set of identities, types, and
> groupings. These nodes are intended to be reused by other YANG
> modules. The module by itself does not expose any data nodes that
> are writable, data nodes that contain read-only state, or RPCs.
> As such, there are no additional security issues related to
> the YANG module that need to be considered."
>

No, the YANG module defines data nodes.


>
> "Modules that use the groupings that are defined in this document
> should identify the corresponding security considerations. For
> example, reusing some of these groupings will expose privacy-related
> information (e.g., 'node-example')."
>
>
> 2) Section 9.3:
> In the "Some of the readable data nodes" paragraph, this sentence (from
> the template) is not present. Is this intentional?
>

Yes.


>    "Specifically, the following subtrees and data nodes have particular
> sensitivities/vulnerabilities:"
>
> Instead, the document has this sentence:
>    "The YANG module will provide insights into (D)TLS profiles of the IoT
> devices, and the privacy considerations discussed in
>    Section 10 need to be taken into account."
>
>
> 3) Section 9.4:
> a) May we add the following sentence per the templates guidance?
>    "There are no particularly sensitive readable data nodes."
>

No.


>
> b) For the "Some of the readable data nodes" paragraph, this sentence
> (from the template) is not present. Is this intentional?
>

Yes.


>    "Specifically, the following subtrees and data nodes have particular
> sensitivities/vulnerabilities:"
>
> Instead, the document has the following sentences:
>    "For instance, update that the device does not support (D)TLS profile
> can dramatically alter the implemented security policy. For this reason,
>    the NACM extension "default-deny-write" has been set for all data nodes
> defined in this module."
>
>
> 4) For all sections in the Security Considerations section, may we update
> the sentence below to accurately reflect the template?
>
> Current:
>    This module does not define any RPCs, actions, or notifications, and
>    thus the security consideration for such is not provided here.
>
> Perhaps:
>    There are no particularly sensitive RPC or action operations.
>

Okay.


>
> > > 15) <!-- [rfced] Please review the questions below regarding
> references in this
> > > document.
> > > c) Re: [X501], this reference has been superseded
> > > by the 2019 version of X.501 - available here:
> > > https://www.itu.int/rec/T-REC-X.501-201910-I/en. May we update this
> reference
> > > to use the most current version?  FYI, the URL for the
> > > 1993 version of this reference has been included in the reference.
>

Yes, good to update.

Cheers,
-Tiru


> > >
> > > Current:
> > >   [X501]     "Information Technology - Open Systems Interconnection -
> > >              The Directory: Models", ITU-T Recommendation X.501,
> > >              November 1993,
> > >              <https://www.itu.int/rec/T-REC-X.501-199311-S/en>.
>
> [rfced] Please note that the question above (15c) is still outstanding.
>
> The updated files have been posted here (please refresh):
>    https://www.rfc-editor.org/authors/rfc9761.txt
>    https://www.rfc-editor.org/authors/rfc9761.pdf
>    https://www.rfc-editor.org/authors/rfc9761.html
>    https://www.rfc-editor.org/authors/rfc9761.xml
>
> The updated diffs have been posted here (please refresh):
>    https://www.rfc-editor.org/authors/rfc9761-diff.html
>    https://www.rfc-editor.org/authors/rfc9761-rfcdiff.html (side by side)
>    https://www.rfc-editor.org/authors/rfc9761-auth48diff.html (AUTH48
> updates only)
>    https://www.rfc-editor.org/authors/rfc9761-auth48rfcdiff.html (side by
> side AUTH48 updates)
>
> AUTH48 status page:
>    https://www.rfc-editor.org/auth48/rfc9761
>
> Thank you!
> RFC Editor/mc
>
>
-- 
auth48archive mailing list -- auth48archive@rfc-editor.org
To unsubscribe send an email to auth48archive-le...@rfc-editor.org

Reply via email to