Resending with my correct address.

Thank you,
RFC Editor/mc

> On Apr 14, 2025, at 9:22 AM, Madison Church <mchu...@amsl.com> wrote:
> 
> IANA,
> 
> Please make the following capitalization changes to the Description column in 
> the "ACL (D)TLS Paramaters" registry 
> (https://www.iana.org/assignments/acl-tls/acl-tls.xhtml#acl-dtls-parameters):
> 
> 1) pre-shared key exchange mode to Pre-shared key exchange mode
> 2) Cipher Suite to Cipher suite
> 
> Thank you,
> RFC Editor/mc
> 
>> On Apr 14, 2025, at 9:14 AM, Madison Church <mchu...@staff.rfc-editor.org> 
>> wrote:
>> 
>> Hi Paul, Authors,
>> 
>> Paul - Thank you for your reply! We have noted your approval on the AUTH48 
>> status page (see https://www.rfc-editor.org/auth48/rfc9761).
>> 
>> Authors - We will now ask IANA to make their updates.
>> 
>> Thank you,
>> RFC Editor/mc
>> 
>>> On Apr 9, 2025, at 7:38 AM, Paul Wouters <paul.wout...@aiven.io> wrote:
>>> 
>>> Thanks for the reminder ping,
>>> 
>>> I approve of the changes.
>>> 
>>> Paul
>>> 
>>> 
>>> On Tue, Apr 8, 2025 at 12:47 PM Madison Church 
>>> <mchu...@staff.rfc-editor.org> wrote:
>>> Hi Paul,
>>> 
>>> This is a friendly reminder that we await your review and approval for the 
>>> changes listed in the thread below. These changes are best viewed in the 
>>> diff files below:
>>> https://www.rfc-editor.org/authors/rfc9761-auth48diff.html
>>> https://www.rfc-editor.org/authors/rfc9761-auth48rfcdiff.html (side-by-side 
>>> diff)
>>> 
>>> Thank you,
>>> RFC Editor/mc
>>> 
>>>> On Apr 1, 2025, at 2:08 PM, Madison Church <mchu...@staff.rfc-editor.org> 
>>>> wrote:
>>>> 
>>>> Hi Authors and *Paul,
>>>> 
>>>> Thank you for your replies! We have noted your approvals on the AUTH48 
>>>> status page for this document (see 
>>>> https://www.rfc-editor.org/auth48/rfc9761). 
>>>> 
>>>> *Paul - As the Responsible AD for this document, please review and approve 
>>>> the following changes. These changes are best viewed in the diff files 
>>>> below:
>>>> https://www.rfc-editor.org/authors/rfc9761-auth48diff.html
>>>> https://www.rfc-editor.org/authors/rfc9761-auth48rfcdiff.html 
>>>> (side-by-side diff)
>>>> 
>>>> 1. Changes in Paragraph 5 of Section 9.3: 
>>>> 
>>>> The Security Considerations Section for this document has been updated to 
>>>> follow the Security Considerations Section Template in Section 3.7.1 of 
>>>> rfc8407bis (see 
>>>> https://www.ietf.org/id/draft-ietf-netmod-rfc8407bis-22.html#name-security-considerations-sect).
>>>>  The following text appears in the template, but not in the document (the 
>>>> authors have stated that this intentional):
>>>> 
>>>> "Specifically, the following subtrees and data nodes have particular 
>>>> sensitivities/vulnerabilities:"
>>>> 
>>>> Instead, the paragraph contains the following sentence:
>>>> 
>>>> "The YANG module will provide insights into (D)TLS profiles of the IoT 
>>>> devices, and the privacy considerations discussed in Section 10 need to be 
>>>> taken into account."
>>>> 
>>>> Please let us know if this is acceptable.
>>>> 
>>>> 
>>>> 2. Changes in Paragraph 4 of Section 9.4: Similar to the above, the 
>>>> following text appears in the template, but not in the document (the 
>>>> authors have stated that this intentional):
>>>> 
>>>> "Specifically, the following subtrees and data nodes have particular 
>>>> sensitivities/vulnerabilities:"
>>>> 
>>>> Instead, the paragraph contains the following text:
>>>> 
>>>> "For instance, update that the device does not support (D)TLS profile can 
>>>> dramatically alter the implemented security policy. For this reason, the 
>>>> NACM    
>>>> extension "default-deny-write" has been set for all data nodes defined in 
>>>> this module."
>>>> 
>>>> Please let us know if this is acceptable.
>>>> 
>>>> 
>>>> 3. Normative References: Note that RFCs 6242 and 9110 have been updated to 
>>>> RFCs 4252 and 9000 to match the second paragraph of the Security 
>>>> Considerations Section Template in rfc8407bis (see 
>>>> https://www.ietf.org/id/draft-ietf-netmod-rfc8407bis-22.html#name-security-considerations-sect).
>>>>  Please let us know any objections.
>>>> 
>>>> Once we receive your approval, we will send our updates along to IANA.
>>>> 
>>>> Thank you!
>>>> RFC Editor/mc
>>>> 
>>>> 
>>>>> On Apr 1, 2025, at 1:34 AM, tirumal reddy <kond...@gmail.com> wrote:
>>>>> 
>>>>> Hi Madison,
>>>>> 
>>>>> Updates to the draft look good. I approve publication of the document.
>>>>> 
>>>>> Cheers,
>>>>> -Tiru
>>>>> 
>>>>> On Tue, 1 Apr 2025 at 02:04, Madison Church 
>>>>> <mchu...@staff.rfc-editor.org> wrote:
>>>>> Hi Tirumal,
>>>>> 
>>>>> Thank you for your reply! We have updated the document accordingly and 
>>>>> all of our questions have been addressed.
>>>>> 
>>>>> Please review the document carefully to ensure satisfaction as we do not 
>>>>> make changes once it has been published as an RFC. Contact us with any 
>>>>> further updates or with your approval of the document in its current 
>>>>> form. We will await approvals from each party listed on the AUTH48 status 
>>>>> page prior to moving forward in the publication process. 
>>>>> 
>>>>> The files have been posted here (please refresh):
>>>>> https://www.rfc-editor.org/authors/rfc9761.txt
>>>>> https://www.rfc-editor.org/authors/rfc9761.pdf
>>>>> https://www.rfc-editor.org/authors/rfc9761.html
>>>>> https://www.rfc-editor.org/authors/rfc9761.xml
>>>>> 
>>>>> The relevant diff files have been posted here (please refresh):
>>>>> https://www.rfc-editor.org/authors/rfc9761-diff.html
>>>>> https://www.rfc-editor.org/authors/rfc9761-rfcdiff.html (side by side)
>>>>> https://www.rfc-editor.org/authors/rfc9761-auth48diff.html
>>>>> https://www.rfc-editor.org/authors/rfc9761-auth48rfcdiff.html (side by 
>>>>> side)
>>>>> 
>>>>> For the AUTH48 status of this document, please see:
>>>>> https://www.rfc-editor.org/auth48/rfc9761
>>>>> 
>>>>> Thank you,
>>>>> RFC Editor/mc
>>>>> 
>>>>>> On Mar 29, 2025, at 2:31 AM, tirumal reddy <kond...@gmail.com> wrote:
>>>>>> 
>>>>>> On Sat, 29 Mar 2025 at 02:23, Madison Church 
>>>>>> <mchu...@staff.rfc-editor.org> wrote:
>>>>>> Hi Authors,
>>>>>> 
>>>>>> Dan - Thank you for your reply! We have noted your approval on the 
>>>>>> AUTH48 status page (see https://www.rfc-editor.org/auth48/rfc9761).
>>>>>> 
>>>>>> Tirumal - Thank you for your response to our followup questions! We have 
>>>>>> updated the document as requested. We have one followup comment and 
>>>>>> updated files can be found below.
>>>>>> 
>>>>>>> On Mar 28, 2025, at 4:42 AM, tirumal reddy <kond...@gmail.com> wrote:
>>>>>>> 
>>>>>>> Please ignore my responses to Section 9.2. Your proposed changes to 
>>>>>>> this section look good. I mistakenly referred to Section 9.3 instead.  
>>>>>> 
>>>>>> [rfced] We updated Section 9.2 to add the "writeable/readable data 
>>>>>> nodes" sentences per your note. We weren’t sure if this note also 
>>>>>> included Question 1b per your first response, so we have not added the 
>>>>>> additional text at the end of Section 9.2. 
>>>>>> 
>>>>>> There are no data nodes defined by the IANA maintained iana-tls-profile. 
>>>>>> Please proceed to add the text proposed by you for Section 9.2.
>>>>>> 
>>>>>> Please review and let us know if this section (or any section in the 
>>>>>> Security Considerations) needs any further updates.
>>>>>> 
>>>>>> Updates to the draft look good to me. 
>>>>>> 
>>>>>> Cheers,
>>>>>> -Tiru
>>>>>> 
>>>>>> 
>>>>>>> -Tiru
>>>>>>> 
>>>>>>> On Fri, 28 Mar 2025 at 14:42, tirumal reddy <kond...@gmail.com> wrote:
>>>>>>> Hi Madison,
>>>>>>> 
>>>>>>> Please see inline 
>>>>>>> 
>>>>>>> On Thu, 27 Mar 2025 at 23:06, Madison Church 
>>>>>>> <mchu...@staff.rfc-editor.org> wrote:
>>>>>>> Hi Tirumal,
>>>>>>> 
>>>>>>> Thank you for your reply! We have updated the document accordingly and 
>>>>>>> have some followup queries marked with [rfced].
>>>>>>> 
>>>>>>> [rfced] Upon sending the initial AUTH48 email, we note that the address 
>>>>>>> "blake.ander...@cisco.com" returned an "Undelivered Mail Returned to 
>>>>>>> Sender" message. Is there an up-to-date email address for Blake that we 
>>>>>>> can reach? 
>>>>>>> 
>>>>>>>>> 13) <!-- [rfced] Because of your note that the template in rfc8407bis
>>>>>>>>> has been used, we will update this paragraph (which appears in 
>>>>>>>>> Sections
>>>>>>>>> 9.2, 9.3, and 9.4) to match Section 3.7.1 of rfc8407bis as follows.
>>>>>>>>> Please let us know if that is not what you intended.
>>>>>>>>> 
>>>>>>>>> Original:
>>>>>>>>> This section follows the template defined in Section 3.7.1 of
>>>>>>>>> [I-D.ietf-netmod-rfc8407bis].
>>>>>>>>> 
>>>>>>>>> The YANG module specified in this document defines a schema for data
>>>>>>>>> can possibly be accessed via network management protocols such as
>>>>>>>>> NETCONF [RFC6241] or RESTCONF [RFC8040].  These network management
>>>>>>>>> protocols are required to use a secure transport layer and mutual
>>>>>>>>> authentication, e.g., SSH [RFC6242] without the "none" authentication
>>>>>>>>> option, Transport Layer Security (TLS) [RFC8446] with mutual X.509
>>>>>>>>> authentication, and HTTPS with HTTP authentication (Section 11 of
>>>>>>>>> [RFC9110]).
>>>>>>>>> 
>>>>>>>>> The Network Access Control Model (NACM) [RFC8341] provides the means
>>>>>>>>> to restrict access for particular users to a pre-configured subset of
>>>>>>>>> all available protocol operations and content.
>>>>>>>>> 
>>>>>>>>> Perhaps (following draft-ietf-netmod-rfc8407bis-22): 
>>>>>>>>> This section follows the template defined in Section 3.7.1 of
>>>>>>>>> [YANG-GUIDELINES].
>>>>>>>>> 
>>>>>>>>> The "iana-tls-profile" YANG module defines a data model that is
>>>>>>>>> designed to be accessed via YANG-based management protocols, such as
>>>>>>>>> NETCONF [RFC6241] and RESTCONF [RFC8040]. These protocols have to
>>>>>>>>> use a secure transport layer (e.g., SSH [RFC4252], TLS [RFC8446], and
>>>>>>>>> QUIC [RFC9000]) and have to use mutual authentication.
>>>>>>>>> 
>>>>>>>>> The Network Configuration Access Control Model (NACM) [RFC8341]
>>>>>>>>> provides the means to restrict access for particular NETCONF or
>>>>>>>>> RESTCONF users to a preconfigured subset of all available NETCONF or
>>>>>>>>> RESTCONF protocol operations and content.
>>>>>>>>> -->
>>>>>>> 
>>>>>>> Looks good to me.
>>>>>>>> 
>>>>>>>> It is aligned with the Security Considerations Section Template in 
>>>>>>>> Section 3.7.1 of 
>>>>>>>> https://datatracker.ietf.org/doc/draft-ietf-netmod-rfc8407bis/
>>>>>>> 
>>>>>>> [rfced] Per your reply, we have updated the document as much as 
>>>>>>> possible to match the template in Section 3.7.1 of 8407bis. We have the 
>>>>>>> remaining questions regarding these updates. Note that this diff file 
>>>>>>> may be best for viewing side-by-side updates: 
>>>>>>> https://www.rfc-editor.org/authors/rfc9761-auth48rfcdiff.html.
>>>>>>> 
>>>>>>> 1) Section 9.2:
>>>>>>> a) May we add the following sentences in Section 9.2 to match the 
>>>>>>> template?
>>>>>>> 
>>>>>>> "There are no particularly sensitive writable data nodes." 
>>>>>>> "There are no particularly sensitive readable data nodes."
>>>>>>> 
>>>>>>> No, sensitive writable/readable data nodes are present and the 
>>>>>>> security/privacy considerations are explained in 4th and 5th paragraphs 
>>>>>>> of Section 9.3.
>>>>>>> 
>>>>>>> b) Would you like to add the following text at the end of Section 9.2 
>>>>>>> as per the template’s guidance?
>>>>>>> 
>>>>>>> -- If the data model does not define any data nodes (i.e., none
>>>>>>> -- of the above sections or readable/writable data nodes or RPCs
>>>>>>> -- have been included), then add the following text:
>>>>>>> 
>>>>>>> "The YANG module defines a set of identities, types, and
>>>>>>> groupings. These nodes are intended to be reused by other YANG
>>>>>>> modules. The module by itself does not expose any data nodes that
>>>>>>> are writable, data nodes that contain read-only state, or RPCs.
>>>>>>> As such, there are no additional security issues related to
>>>>>>> the YANG module that need to be considered."
>>>>>>> 
>>>>>>> No, the YANG module defines data nodes. 
>>>>>>> 
>>>>>>> "Modules that use the groupings that are defined in this document
>>>>>>> should identify the corresponding security considerations. For
>>>>>>> example, reusing some of these groupings will expose privacy-related
>>>>>>> information (e.g., 'node-example')."
>>>>>>> 
>>>>>>> 
>>>>>>> 2) Section 9.3:
>>>>>>> In the "Some of the readable data nodes" paragraph, this sentence (from 
>>>>>>> the template) is not present. Is this intentional?
>>>>>>> 
>>>>>>> Yes. 
>>>>>>>   "Specifically, the following subtrees and data nodes have particular 
>>>>>>> sensitivities/vulnerabilities:"
>>>>>>> 
>>>>>>> Instead, the document has this sentence:
>>>>>>> "The YANG module will provide insights into (D)TLS profiles of the IoT 
>>>>>>> devices, and the privacy considerations discussed in 
>>>>>>> Section 10 need to be taken into account."
>>>>>>> 
>>>>>>> 
>>>>>>> 3) Section 9.4:
>>>>>>> a) May we add the following sentence per the templates guidance? 
>>>>>>> "There are no particularly sensitive readable data nodes."
>>>>>>> 
>>>>>>> No. 
>>>>>>> 
>>>>>>> b) For the "Some of the readable data nodes" paragraph, this sentence 
>>>>>>> (from the template) is not present. Is this intentional?
>>>>>>> 
>>>>>>> Yes. 
>>>>>>>   "Specifically, the following subtrees and data nodes have particular 
>>>>>>> sensitivities/vulnerabilities:" 
>>>>>>> 
>>>>>>> Instead, the document has the following sentences:
>>>>>>> "For instance, update that the device does not support (D)TLS profile 
>>>>>>> can dramatically alter the implemented security policy. For this 
>>>>>>> reason, 
>>>>>>> the NACM extension "default-deny-write" has been set for all data nodes 
>>>>>>> defined in this module."
>>>>>>> 
>>>>>>> 
>>>>>>> 4) For all sections in the Security Considerations section, may we 
>>>>>>> update the sentence below to accurately reflect the template?
>>>>>>> 
>>>>>>> Current:
>>>>>>> This module does not define any RPCs, actions, or notifications, and
>>>>>>> thus the security consideration for such is not provided here.
>>>>>>> 
>>>>>>> Perhaps:
>>>>>>> There are no particularly sensitive RPC or action operations.
>>>>>>> 
>>>>>>> Okay. 
>>>>>>> 
>>>>>>>>> 15) <!-- [rfced] Please review the questions below regarding 
>>>>>>>>> references in this
>>>>>>>>> document.
>>>>>>>>> c) Re: [X501], this reference has been superseded
>>>>>>>>> by the 2019 version of X.501 - available here:
>>>>>>>>> https://www.itu.int/rec/T-REC-X.501-201910-I/en. May we update this 
>>>>>>>>> reference
>>>>>>>>> to use the most current version?  FYI, the URL for the
>>>>>>>>> 1993 version of this reference has been included in the reference.
>>>>>>> 
>>>>>>> Yes, good to update.
>>>>>>> 
>>>>>>> Cheers,
>>>>>>> -Tiru
>>>>>> 
>>>>>> Please review the document carefully to ensure satisfaction as we do not 
>>>>>> make changes once it has been published as an RFC. Contact us with any 
>>>>>> further updates or with your approval of the document in its current 
>>>>>> form. We will await approvals from each author prior to moving forward 
>>>>>> in the publication process.
>>>>>> 
>>>>>> The updated files have been posted here (please refresh):
>>>>>> https://www.rfc-editor.org/authors/rfc9761.txt
>>>>>> https://www.rfc-editor.org/authors/rfc9761.pdf
>>>>>> https://www.rfc-editor.org/authors/rfc9761.html
>>>>>> https://www.rfc-editor.org/authors/rfc9761.xml
>>>>>> 
>>>>>> The updated diffs have been posted here (please refresh):
>>>>>> https://www.rfc-editor.org/authors/rfc9761-diff.html
>>>>>> https://www.rfc-editor.org/authors/rfc9761-rfcdiff.html (side by side)
>>>>>> https://www.rfc-editor.org/authors/rfc9761-auth48diff.html (AUTH48 
>>>>>> updates only)
>>>>>> https://www.rfc-editor.org/authors/rfc9761-auth48rfcdiff.html (side by 
>>>>>> side AUTH48 updates)
>>>>>> 
>>>>>> AUTH48 status page:
>>>>>> https://www.rfc-editor.org/auth48/rfc9761
>>>>>> 
>>>>>> Thank you!
>>>>>> RFC Editor/mc
>>>>> 
>>>> 
>>> 
>> 
> 

-- 
auth48archive mailing list -- auth48archive@rfc-editor.org
To unsubscribe send an email to auth48archive-le...@rfc-editor.org

Reply via email to