Please ignore my responses to Section 9.2. Your proposed changes to this section look good. I mistakenly referred to Section 9.3 instead.
-Tiru On Fri, 28 Mar 2025 at 14:42, tirumal reddy <kond...@gmail.com> wrote: > Hi Madison, > > Please see inline > > On Thu, 27 Mar 2025 at 23:06, Madison Church <mchu...@staff.rfc-editor.org> > wrote: > >> Hi Tirumal, >> >> Thank you for your reply! We have updated the document accordingly and >> have some followup queries marked with [rfced]. >> >> [rfced] Upon sending the initial AUTH48 email, we note that the address " >> blake.ander...@cisco.com" returned an "Undelivered Mail Returned to >> Sender" message. Is there an up-to-date email address for Blake that we can >> reach? >> >> > > 13) <!-- [rfced] Because of your note that the template in rfc8407bis >> > > has been used, we will update this paragraph (which appears in >> Sections >> > > 9.2, 9.3, and 9.4) to match Section 3.7.1 of rfc8407bis as follows. >> > > Please let us know if that is not what you intended. >> > > >> > > Original: >> > > This section follows the template defined in Section 3.7.1 of >> > > [I-D.ietf-netmod-rfc8407bis]. >> > > >> > > The YANG module specified in this document defines a schema for data >> > > can possibly be accessed via network management protocols such as >> > > NETCONF [RFC6241] or RESTCONF [RFC8040]. These network management >> > > protocols are required to use a secure transport layer and mutual >> > > authentication, e.g., SSH [RFC6242] without the "none" >> authentication >> > > option, Transport Layer Security (TLS) [RFC8446] with mutual X.509 >> > > authentication, and HTTPS with HTTP authentication (Section 11 of >> > > [RFC9110]). >> > > >> > > The Network Access Control Model (NACM) [RFC8341] provides the means >> > > to restrict access for particular users to a pre-configured subset >> of >> > > all available protocol operations and content. >> > > >> > > Perhaps (following draft-ietf-netmod-rfc8407bis-22): >> > > This section follows the template defined in Section 3.7.1 of >> > > [YANG-GUIDELINES]. >> > > >> > > The "iana-tls-profile" YANG module defines a data model that is >> > > designed to be accessed via YANG-based management protocols, such as >> > > NETCONF [RFC6241] and RESTCONF [RFC8040]. These protocols have to >> > > use a secure transport layer (e.g., SSH [RFC4252], TLS [RFC8446], >> and >> > > QUIC [RFC9000]) and have to use mutual authentication. >> > > >> > > The Network Configuration Access Control Model (NACM) [RFC8341] >> > > provides the means to restrict access for particular NETCONF or >> > > RESTCONF users to a preconfigured subset of all available NETCONF or >> > > RESTCONF protocol operations and content. >> > > --> >> > > Looks good to me. > > >> > >> > It is aligned with the Security Considerations Section Template in >> Section 3.7.1 of >> https://datatracker.ietf.org/doc/draft-ietf-netmod-rfc8407bis/ >> >> [rfced] Per your reply, we have updated the document as much as possible >> to match the template in Section 3.7.1 of 8407bis. We have the remaining >> questions regarding these updates. Note that this diff file may be best for >> viewing side-by-side updates: >> https://www.rfc-editor.org/authors/rfc9761-auth48rfcdiff.html. >> >> 1) Section 9.2: >> a) May we add the following sentences in Section 9.2 to match the >> template? >> >> "There are no particularly sensitive writable data nodes." >> "There are no particularly sensitive readable data nodes." >> > > No, sensitive writable/readable data nodes are present and the > security/privacy considerations are explained in 4th and 5th paragraphs of > Section 9.3. > > >> >> b) Would you like to add the following text at the end of Section 9.2 as >> per the template’s guidance? >> >> -- If the data model does not define any data nodes (i.e., none >> -- of the above sections or readable/writable data nodes or RPCs >> -- have been included), then add the following text: >> >> "The YANG module defines a set of identities, types, and >> groupings. These nodes are intended to be reused by other YANG >> modules. The module by itself does not expose any data nodes that >> are writable, data nodes that contain read-only state, or RPCs. >> As such, there are no additional security issues related to >> the YANG module that need to be considered." >> > > No, the YANG module defines data nodes. > > >> >> "Modules that use the groupings that are defined in this document >> should identify the corresponding security considerations. For >> example, reusing some of these groupings will expose privacy-related >> information (e.g., 'node-example')." >> >> >> 2) Section 9.3: >> In the "Some of the readable data nodes" paragraph, this sentence (from >> the template) is not present. Is this intentional? >> > > Yes. > > >> "Specifically, the following subtrees and data nodes have particular >> sensitivities/vulnerabilities:" >> >> Instead, the document has this sentence: >> "The YANG module will provide insights into (D)TLS profiles of the IoT >> devices, and the privacy considerations discussed in >> Section 10 need to be taken into account." >> >> >> 3) Section 9.4: >> a) May we add the following sentence per the templates guidance? >> "There are no particularly sensitive readable data nodes." >> > > No. > > >> >> b) For the "Some of the readable data nodes" paragraph, this sentence >> (from the template) is not present. Is this intentional? >> > > Yes. > > >> "Specifically, the following subtrees and data nodes have particular >> sensitivities/vulnerabilities:" >> >> Instead, the document has the following sentences: >> "For instance, update that the device does not support (D)TLS profile >> can dramatically alter the implemented security policy. For this reason, >> the NACM extension "default-deny-write" has been set for all data >> nodes defined in this module." >> >> >> 4) For all sections in the Security Considerations section, may we update >> the sentence below to accurately reflect the template? >> >> Current: >> This module does not define any RPCs, actions, or notifications, and >> thus the security consideration for such is not provided here. >> >> Perhaps: >> There are no particularly sensitive RPC or action operations. >> > > Okay. > > >> >> > > 15) <!-- [rfced] Please review the questions below regarding >> references in this >> > > document. >> > > c) Re: [X501], this reference has been superseded >> > > by the 2019 version of X.501 - available here: >> > > https://www.itu.int/rec/T-REC-X.501-201910-I/en. May we update this >> reference >> > > to use the most current version? FYI, the URL for the >> > > 1993 version of this reference has been included in the reference. >> > > Yes, good to update. > > Cheers, > -Tiru > > >> > > >> > > Current: >> > > [X501] "Information Technology - Open Systems Interconnection - >> > > The Directory: Models", ITU-T Recommendation X.501, >> > > November 1993, >> > > <https://www.itu.int/rec/T-REC-X.501-199311-S/en>. >> >> [rfced] Please note that the question above (15c) is still outstanding. >> >> The updated files have been posted here (please refresh): >> https://www.rfc-editor.org/authors/rfc9761.txt >> https://www.rfc-editor.org/authors/rfc9761.pdf >> https://www.rfc-editor.org/authors/rfc9761.html >> https://www.rfc-editor.org/authors/rfc9761.xml >> >> The updated diffs have been posted here (please refresh): >> https://www.rfc-editor.org/authors/rfc9761-diff.html >> https://www.rfc-editor.org/authors/rfc9761-rfcdiff.html (side by side) >> https://www.rfc-editor.org/authors/rfc9761-auth48diff.html (AUTH48 >> updates only) >> https://www.rfc-editor.org/authors/rfc9761-auth48rfcdiff.html (side >> by side AUTH48 updates) >> >> AUTH48 status page: >> https://www.rfc-editor.org/auth48/rfc9761 >> >> Thank you! >> RFC Editor/mc >> >>
-- auth48archive mailing list -- auth48archive@rfc-editor.org To unsubscribe send an email to auth48archive-le...@rfc-editor.org