Hi Paul,

This is a friendly reminder that we await your review and approval for the 
changes listed in the thread below. These changes are best viewed in the diff 
files below:
https://www.rfc-editor.org/authors/rfc9761-auth48diff.html
https://www.rfc-editor.org/authors/rfc9761-auth48rfcdiff.html (side-by-side 
diff)

Thank you,
RFC Editor/mc

> On Apr 1, 2025, at 2:08 PM, Madison Church <mchu...@staff.rfc-editor.org> 
> wrote:
> 
> Hi Authors and *Paul,
> 
> Thank you for your replies! We have noted your approvals on the AUTH48 status 
> page for this document (see https://www.rfc-editor.org/auth48/rfc9761). 
> 
> *Paul - As the Responsible AD for this document, please review and approve 
> the following changes. These changes are best viewed in the diff files below:
> https://www.rfc-editor.org/authors/rfc9761-auth48diff.html
> https://www.rfc-editor.org/authors/rfc9761-auth48rfcdiff.html (side-by-side 
> diff)
> 
> 1. Changes in Paragraph 5 of Section 9.3: 
> 
> The Security Considerations Section for this document has been updated to 
> follow the Security Considerations Section Template in Section 3.7.1 of 
> rfc8407bis (see 
> https://www.ietf.org/id/draft-ietf-netmod-rfc8407bis-22.html#name-security-considerations-sect).
>  The following text appears in the template, but not in the document (the 
> authors have stated that this intentional):
> 
>   "Specifically, the following subtrees and data nodes have particular 
> sensitivities/vulnerabilities:"
> 
> Instead, the paragraph contains the following sentence:
> 
>   "The YANG module will provide insights into (D)TLS profiles of the IoT 
> devices, and the privacy considerations discussed in Section 10 need to be 
> taken into account."
> 
> Please let us know if this is acceptable.
> 
> 
> 2. Changes in Paragraph 4 of Section 9.4: Similar to the above, the following 
> text appears in the template, but not in the document (the authors have 
> stated that this intentional):
> 
>   "Specifically, the following subtrees and data nodes have particular 
> sensitivities/vulnerabilities:"
> 
> Instead, the paragraph contains the following text:
> 
>   "For instance, update that the device does not support (D)TLS profile can 
> dramatically alter the implemented security policy. For this reason, the NACM 
>    
>   extension "default-deny-write" has been set for all data nodes defined in 
> this module."
> 
> Please let us know if this is acceptable.
> 
> 
> 3. Normative References: Note that RFCs 6242 and 9110 have been updated to 
> RFCs 4252 and 9000 to match the second paragraph of the Security 
> Considerations Section Template in rfc8407bis (see 
> https://www.ietf.org/id/draft-ietf-netmod-rfc8407bis-22.html#name-security-considerations-sect).
>  Please let us know any objections.
> 
> Once we receive your approval, we will send our updates along to IANA.
> 
> Thank you!
> RFC Editor/mc
> 
> 
>> On Apr 1, 2025, at 1:34 AM, tirumal reddy <kond...@gmail.com> wrote:
>> 
>> Hi Madison,
>> 
>> Updates to the draft look good. I approve publication of the document.
>> 
>> Cheers,
>> -Tiru
>> 
>> On Tue, 1 Apr 2025 at 02:04, Madison Church <mchu...@staff.rfc-editor.org> 
>> wrote:
>> Hi Tirumal,
>> 
>> Thank you for your reply! We have updated the document accordingly and all 
>> of our questions have been addressed.
>> 
>> Please review the document carefully to ensure satisfaction as we do not 
>> make changes once it has been published as an RFC. Contact us with any 
>> further updates or with your approval of the document in its current form. 
>> We will await approvals from each party listed on the AUTH48 status page 
>> prior to moving forward in the publication process. 
>> 
>> The files have been posted here (please refresh):
>>   https://www.rfc-editor.org/authors/rfc9761.txt
>>   https://www.rfc-editor.org/authors/rfc9761.pdf
>>   https://www.rfc-editor.org/authors/rfc9761.html
>>   https://www.rfc-editor.org/authors/rfc9761.xml
>> 
>> The relevant diff files have been posted here (please refresh):
>>   https://www.rfc-editor.org/authors/rfc9761-diff.html
>>   https://www.rfc-editor.org/authors/rfc9761-rfcdiff.html (side by side)
>>   https://www.rfc-editor.org/authors/rfc9761-auth48diff.html
>>   https://www.rfc-editor.org/authors/rfc9761-auth48rfcdiff.html (side by 
>> side)
>> 
>> For the AUTH48 status of this document, please see:
>>   https://www.rfc-editor.org/auth48/rfc9761
>> 
>> Thank you,
>> RFC Editor/mc
>> 
>>> On Mar 29, 2025, at 2:31 AM, tirumal reddy <kond...@gmail.com> wrote:
>>> 
>>> On Sat, 29 Mar 2025 at 02:23, Madison Church <mchu...@staff.rfc-editor.org> 
>>> wrote:
>>> Hi Authors,
>>> 
>>> Dan - Thank you for your reply! We have noted your approval on the AUTH48 
>>> status page (see https://www.rfc-editor.org/auth48/rfc9761).
>>> 
>>> Tirumal - Thank you for your response to our followup questions! We have 
>>> updated the document as requested. We have one followup comment and updated 
>>> files can be found below.
>>> 
>>>> On Mar 28, 2025, at 4:42 AM, tirumal reddy <kond...@gmail.com> wrote:
>>>> 
>>>> Please ignore my responses to Section 9.2. Your proposed changes to this 
>>>> section look good. I mistakenly referred to Section 9.3 instead.  
>>> 
>>> [rfced] We updated Section 9.2 to add the "writeable/readable data nodes" 
>>> sentences per your note. We weren’t sure if this note also included 
>>> Question 1b per your first response, so we have not added the additional 
>>> text at the end of Section 9.2. 
>>> 
>>> There are no data nodes defined by the IANA maintained iana-tls-profile. 
>>> Please proceed to add the text proposed by you for Section 9.2.
>>> 
>>> Please review and let us know if this section (or any section in the 
>>> Security Considerations) needs any further updates.
>>> 
>>> Updates to the draft look good to me. 
>>> 
>>> Cheers,
>>> -Tiru
>>> 
>>> 
>>>> -Tiru
>>>> 
>>>> On Fri, 28 Mar 2025 at 14:42, tirumal reddy <kond...@gmail.com> wrote:
>>>> Hi Madison,
>>>> 
>>>> Please see inline 
>>>> 
>>>> On Thu, 27 Mar 2025 at 23:06, Madison Church 
>>>> <mchu...@staff.rfc-editor.org> wrote:
>>>> Hi Tirumal,
>>>> 
>>>> Thank you for your reply! We have updated the document accordingly and 
>>>> have some followup queries marked with [rfced].
>>>> 
>>>> [rfced] Upon sending the initial AUTH48 email, we note that the address 
>>>> "blake.ander...@cisco.com" returned an "Undelivered Mail Returned to 
>>>> Sender" message. Is there an up-to-date email address for Blake that we 
>>>> can reach? 
>>>> 
>>>>>> 13) <!-- [rfced] Because of your note that the template in rfc8407bis
>>>>>> has been used, we will update this paragraph (which appears in Sections
>>>>>> 9.2, 9.3, and 9.4) to match Section 3.7.1 of rfc8407bis as follows.
>>>>>> Please let us know if that is not what you intended.
>>>>>> 
>>>>>> Original:
>>>>>>  This section follows the template defined in Section 3.7.1 of
>>>>>>  [I-D.ietf-netmod-rfc8407bis].
>>>>>> 
>>>>>>  The YANG module specified in this document defines a schema for data
>>>>>>  can possibly be accessed via network management protocols such as
>>>>>>  NETCONF [RFC6241] or RESTCONF [RFC8040].  These network management
>>>>>>  protocols are required to use a secure transport layer and mutual
>>>>>>  authentication, e.g., SSH [RFC6242] without the "none" authentication
>>>>>>  option, Transport Layer Security (TLS) [RFC8446] with mutual X.509
>>>>>>  authentication, and HTTPS with HTTP authentication (Section 11 of
>>>>>>  [RFC9110]).
>>>>>> 
>>>>>>  The Network Access Control Model (NACM) [RFC8341] provides the means
>>>>>>  to restrict access for particular users to a pre-configured subset of
>>>>>>  all available protocol operations and content.
>>>>>> 
>>>>>> Perhaps (following draft-ietf-netmod-rfc8407bis-22): 
>>>>>>  This section follows the template defined in Section 3.7.1 of
>>>>>>  [YANG-GUIDELINES].
>>>>>> 
>>>>>>  The "iana-tls-profile" YANG module defines a data model that is
>>>>>>  designed to be accessed via YANG-based management protocols, such as
>>>>>>  NETCONF [RFC6241] and RESTCONF [RFC8040]. These protocols have to
>>>>>>  use a secure transport layer (e.g., SSH [RFC4252], TLS [RFC8446], and
>>>>>>  QUIC [RFC9000]) and have to use mutual authentication.
>>>>>> 
>>>>>>  The Network Configuration Access Control Model (NACM) [RFC8341]
>>>>>>  provides the means to restrict access for particular NETCONF or
>>>>>>  RESTCONF users to a preconfigured subset of all available NETCONF or
>>>>>>  RESTCONF protocol operations and content.
>>>>>> -->
>>>> 
>>>> Looks good to me.
>>>>> 
>>>>> It is aligned with the Security Considerations Section Template in 
>>>>> Section 3.7.1 of 
>>>>> https://datatracker.ietf.org/doc/draft-ietf-netmod-rfc8407bis/
>>>> 
>>>> [rfced] Per your reply, we have updated the document as much as possible 
>>>> to match the template in Section 3.7.1 of 8407bis. We have the remaining 
>>>> questions regarding these updates. Note that this diff file may be best 
>>>> for viewing side-by-side updates: 
>>>> https://www.rfc-editor.org/authors/rfc9761-auth48rfcdiff.html.
>>>> 
>>>> 1) Section 9.2:
>>>> a) May we add the following sentences in Section 9.2 to match the template?
>>>> 
>>>> "There are no particularly sensitive writable data nodes." 
>>>> "There are no particularly sensitive readable data nodes."
>>>> 
>>>> No, sensitive writable/readable data nodes are present and the 
>>>> security/privacy considerations are explained in 4th and 5th paragraphs of 
>>>> Section 9.3.
>>>> 
>>>> b) Would you like to add the following text at the end of Section 9.2 as 
>>>> per the template’s guidance?
>>>> 
>>>> -- If the data model does not define any data nodes (i.e., none
>>>> -- of the above sections or readable/writable data nodes or RPCs
>>>> -- have been included), then add the following text:
>>>> 
>>>> "The YANG module defines a set of identities, types, and
>>>> groupings. These nodes are intended to be reused by other YANG
>>>> modules. The module by itself does not expose any data nodes that
>>>> are writable, data nodes that contain read-only state, or RPCs.
>>>> As such, there are no additional security issues related to
>>>> the YANG module that need to be considered."
>>>> 
>>>> No, the YANG module defines data nodes. 
>>>> 
>>>> "Modules that use the groupings that are defined in this document
>>>> should identify the corresponding security considerations. For
>>>> example, reusing some of these groupings will expose privacy-related
>>>> information (e.g., 'node-example')."
>>>> 
>>>> 
>>>> 2) Section 9.3:
>>>> In the "Some of the readable data nodes" paragraph, this sentence (from 
>>>> the template) is not present. Is this intentional?
>>>> 
>>>> Yes. 
>>>>     "Specifically, the following subtrees and data nodes have particular 
>>>> sensitivities/vulnerabilities:"
>>>> 
>>>> Instead, the document has this sentence:
>>>>   "The YANG module will provide insights into (D)TLS profiles of the IoT 
>>>> devices, and the privacy considerations discussed in 
>>>>   Section 10 need to be taken into account."
>>>> 
>>>> 
>>>> 3) Section 9.4:
>>>> a) May we add the following sentence per the templates guidance? 
>>>>   "There are no particularly sensitive readable data nodes."
>>>> 
>>>> No. 
>>>> 
>>>> b) For the "Some of the readable data nodes" paragraph, this sentence 
>>>> (from the template) is not present. Is this intentional?
>>>> 
>>>> Yes. 
>>>>     "Specifically, the following subtrees and data nodes have particular 
>>>> sensitivities/vulnerabilities:" 
>>>> 
>>>> Instead, the document has the following sentences:
>>>>   "For instance, update that the device does not support (D)TLS profile 
>>>> can dramatically alter the implemented security policy. For this reason, 
>>>>   the NACM extension "default-deny-write" has been set for all data nodes 
>>>> defined in this module."
>>>> 
>>>> 
>>>> 4) For all sections in the Security Considerations section, may we update 
>>>> the sentence below to accurately reflect the template?
>>>> 
>>>> Current:
>>>>   This module does not define any RPCs, actions, or notifications, and
>>>>   thus the security consideration for such is not provided here.
>>>> 
>>>> Perhaps:
>>>>   There are no particularly sensitive RPC or action operations.
>>>> 
>>>> Okay. 
>>>> 
>>>>>> 15) <!-- [rfced] Please review the questions below regarding references 
>>>>>> in this
>>>>>> document.
>>>>>> c) Re: [X501], this reference has been superseded
>>>>>> by the 2019 version of X.501 - available here:
>>>>>> https://www.itu.int/rec/T-REC-X.501-201910-I/en. May we update this 
>>>>>> reference
>>>>>> to use the most current version?  FYI, the URL for the
>>>>>> 1993 version of this reference has been included in the reference.
>>>> 
>>>> Yes, good to update.
>>>> 
>>>> Cheers,
>>>> -Tiru
>>> 
>>> Please review the document carefully to ensure satisfaction as we do not 
>>> make changes once it has been published as an RFC. Contact us with any 
>>> further updates or with your approval of the document in its current form. 
>>> We will await approvals from each author prior to moving forward in the 
>>> publication process.
>>> 
>>> The updated files have been posted here (please refresh):
>>>   https://www.rfc-editor.org/authors/rfc9761.txt
>>>   https://www.rfc-editor.org/authors/rfc9761.pdf
>>>   https://www.rfc-editor.org/authors/rfc9761.html
>>>   https://www.rfc-editor.org/authors/rfc9761.xml
>>> 
>>> The updated diffs have been posted here (please refresh):
>>>   https://www.rfc-editor.org/authors/rfc9761-diff.html
>>>   https://www.rfc-editor.org/authors/rfc9761-rfcdiff.html (side by side)
>>>   https://www.rfc-editor.org/authors/rfc9761-auth48diff.html (AUTH48 
>>> updates only)
>>>   https://www.rfc-editor.org/authors/rfc9761-auth48rfcdiff.html (side by 
>>> side AUTH48 updates)
>>> 
>>> AUTH48 status page:
>>>   https://www.rfc-editor.org/auth48/rfc9761
>>> 
>>> Thank you!
>>> RFC Editor/mc
>> 
> 

-- 
auth48archive mailing list -- auth48archive@rfc-editor.org
To unsubscribe send an email to auth48archive-le...@rfc-editor.org

Reply via email to