All,

We have now received all necessary approvals and consider AUTH48 complete (see 
https://www.rfc-editor.org/auth48/rfc9761).

Thank you for your attention and guidance during the AUTH48 process! We will 
prepare the document for publication at this time.

Best regards,
RFC Editor/mc

> On Apr 14, 2025, at 1:03 PM, Madison Church <mchu...@staff.rfc-editor.org> 
> wrote:
> 
> Hi Sabrina,
> 
> The changes look good. Thank you!
> 
> RFC Editor/mc
> 
>> On Apr 14, 2025, at 12:11 PM, Sabrina Tanamal via RT <iana-mat...@iana.org> 
>> wrote:
>> 
>> Hi Madison, 
>> 
>> These changes are complete: 
>> 
>> https://www.iana.org/assignments/acl-tls
>> 
>> Thanks,
>> Sabrina
>> 
>> On Mon Apr 14 14:27:05 2025, mchu...@staff.rfc-editor.org wrote:
>>> Resending with my correct address.
>>> 
>>> Thank you,
>>> RFC Editor/mc
>>> 
>>>> On Apr 14, 2025, at 9:22 AM, Madison Church <mchu...@amsl.com> wrote:
>>>> 
>>>> IANA,
>>>> 
>>>> Please make the following capitalization changes to the Description
>>>> column in the "ACL (D)TLS Paramaters" registry
>>>> (https://www.iana.org/assignments/acl-tls/acl-tls.xhtml#acl-dtls-
>>>> parameters):
>>>> 
>>>> 1) pre-shared key exchange mode to Pre-shared key exchange mode
>>>> 2) Cipher Suite to Cipher suite
>>>> 
>>>> Thank you,
>>>> RFC Editor/mc
>>>> 
>>>>> On Apr 14, 2025, at 9:14 AM, Madison Church <mchu...@staff.rfc-
>>>>> editor.org> wrote:
>>>>> 
>>>>> Hi Paul, Authors,
>>>>> 
>>>>> Paul - Thank you for your reply! We have noted your approval on the
>>>>> AUTH48 status page (see https://www.rfc-editor.org/auth48/rfc9761).
>>>>> 
>>>>> Authors - We will now ask IANA to make their updates.
>>>>> 
>>>>> Thank you,
>>>>> RFC Editor/mc
>>>>> 
>>>>>> On Apr 9, 2025, at 7:38 AM, Paul Wouters <paul.wout...@aiven.io>
>>>>>> wrote:
>>>>>> 
>>>>>> Thanks for the reminder ping,
>>>>>> 
>>>>>> I approve of the changes.
>>>>>> 
>>>>>> Paul
>>>>>> 
>>>>>> 
>>>>>> On Tue, Apr 8, 2025 at 12:47 PM Madison Church <mchu...@staff.rfc-
>>>>>> editor.org> wrote:
>>>>>> Hi Paul,
>>>>>> 
>>>>>> This is a friendly reminder that we await your review and approval
>>>>>> for the changes listed in the thread below. These changes are best
>>>>>> viewed in the diff files below:
>>>>>> https://www.rfc-editor.org/authors/rfc9761-auth48diff.html
>>>>>> https://www.rfc-editor.org/authors/rfc9761-auth48rfcdiff.html
>>>>>> (side-by-side diff)
>>>>>> 
>>>>>> Thank you,
>>>>>> RFC Editor/mc
>>>>>> 
>>>>>>> On Apr 1, 2025, at 2:08 PM, Madison Church <mchu...@staff.rfc-
>>>>>>> editor.org> wrote:
>>>>>>> 
>>>>>>> Hi Authors and *Paul,
>>>>>>> 
>>>>>>> Thank you for your replies! We have noted your approvals on the
>>>>>>> AUTH48 status page for this document (see https://www.rfc-
>>>>>>> editor.org/auth48/rfc9761).
>>>>>>> 
>>>>>>> *Paul - As the Responsible AD for this document, please review and
>>>>>>> approve the following changes. These changes are best viewed in
>>>>>>> the diff files below:
>>>>>>> https://www.rfc-editor.org/authors/rfc9761-auth48diff.html
>>>>>>> https://www.rfc-editor.org/authors/rfc9761-auth48rfcdiff.html
>>>>>>> (side-by-side diff)
>>>>>>> 
>>>>>>> 1. Changes in Paragraph 5 of Section 9.3:
>>>>>>> 
>>>>>>> The Security Considerations Section for this document has been
>>>>>>> updated to follow the Security Considerations Section Template in
>>>>>>> Section 3.7.1 of rfc8407bis (see https://www.ietf.org/id/draft-
>>>>>>> ietf-netmod-rfc8407bis-22.html#name-security-considerations-sect).
>>>>>>> The following text appears in the template, but not in the
>>>>>>> document (the authors have stated that this intentional):
>>>>>>> 
>>>>>>> "Specifically, the following subtrees and data nodes have
>>>>>>> particular sensitivities/vulnerabilities:"
>>>>>>> 
>>>>>>> Instead, the paragraph contains the following sentence:
>>>>>>> 
>>>>>>> "The YANG module will provide insights into (D)TLS profiles of the
>>>>>>> IoT devices, and the privacy considerations discussed in Section
>>>>>>> 10 need to be taken into account."
>>>>>>> 
>>>>>>> Please let us know if this is acceptable.
>>>>>>> 
>>>>>>> 
>>>>>>> 2. Changes in Paragraph 4 of Section 9.4: Similar to the above,
>>>>>>> the following text appears in the template, but not in the
>>>>>>> document (the authors have stated that this intentional):
>>>>>>> 
>>>>>>> "Specifically, the following subtrees and data nodes have
>>>>>>> particular sensitivities/vulnerabilities:"
>>>>>>> 
>>>>>>> Instead, the paragraph contains the following text:
>>>>>>> 
>>>>>>> "For instance, update that the device does not support (D)TLS
>>>>>>> profile can dramatically alter the implemented security policy.
>>>>>>> For this reason, the NACM
>>>>>>> extension "default-deny-write" has been set for all data nodes
>>>>>>> defined in this module."
>>>>>>> 
>>>>>>> Please let us know if this is acceptable.
>>>>>>> 
>>>>>>> 
>>>>>>> 3. Normative References: Note that RFCs 6242 and 9110 have been
>>>>>>> updated to RFCs 4252 and 9000 to match the second paragraph of the
>>>>>>> Security Considerations Section Template in rfc8407bis (see
>>>>>>> https://www.ietf.org/id/draft-ietf-netmod-rfc8407bis-22.html#name-
>>>>>>> security-considerations-sect). Please let us know any objections.
>>>>>>> 
>>>>>>> Once we receive your approval, we will send our updates along to
>>>>>>> IANA.
>>>>>>> 
>>>>>>> Thank you!
>>>>>>> RFC Editor/mc
>>>>>>> 
>>>>>>> 
>>>>>>>> On Apr 1, 2025, at 1:34 AM, tirumal reddy <kond...@gmail.com>
>>>>>>>> wrote:
>>>>>>>> 
>>>>>>>> Hi Madison,
>>>>>>>> 
>>>>>>>> Updates to the draft look good. I approve publication of the
>>>>>>>> document.
>>>>>>>> 
>>>>>>>> Cheers,
>>>>>>>> -Tiru
>>>>>>>> 
>>>>>>>> On Tue, 1 Apr 2025 at 02:04, Madison Church <mchu...@staff.rfc-
>>>>>>>> editor.org> wrote:
>>>>>>>> Hi Tirumal,
>>>>>>>> 
>>>>>>>> Thank you for your reply! We have updated the document
>>>>>>>> accordingly and all of our questions have been addressed.
>>>>>>>> 
>>>>>>>> Please review the document carefully to ensure satisfaction as we
>>>>>>>> do not make changes once it has been published as an RFC. Contact
>>>>>>>> us with any further updates or with your approval of the document
>>>>>>>> in its current form. We will await approvals from each party
>>>>>>>> listed on the AUTH48 status page prior to moving forward in the
>>>>>>>> publication process.
>>>>>>>> 
>>>>>>>> The files have been posted here (please refresh):
>>>>>>>> https://www.rfc-editor.org/authors/rfc9761.txt
>>>>>>>> https://www.rfc-editor.org/authors/rfc9761.pdf
>>>>>>>> https://www.rfc-editor.org/authors/rfc9761.html
>>>>>>>> https://www.rfc-editor.org/authors/rfc9761.xml
>>>>>>>> 
>>>>>>>> The relevant diff files have been posted here (please refresh):
>>>>>>>> https://www.rfc-editor.org/authors/rfc9761-diff.html
>>>>>>>> https://www.rfc-editor.org/authors/rfc9761-rfcdiff.html (side by
>>>>>>>> side)
>>>>>>>> https://www.rfc-editor.org/authors/rfc9761-auth48diff.html
>>>>>>>> https://www.rfc-editor.org/authors/rfc9761-auth48rfcdiff.html
>>>>>>>> (side by side)
>>>>>>>> 
>>>>>>>> For the AUTH48 status of this document, please see:
>>>>>>>> https://www.rfc-editor.org/auth48/rfc9761
>>>>>>>> 
>>>>>>>> Thank you,
>>>>>>>> RFC Editor/mc
>>>>>>>> 
>>>>>>>>> On Mar 29, 2025, at 2:31 AM, tirumal reddy <kond...@gmail.com>
>>>>>>>>> wrote:
>>>>>>>>> 
>>>>>>>>> On Sat, 29 Mar 2025 at 02:23, Madison Church <mchu...@staff.rfc-
>>>>>>>>> editor.org> wrote:
>>>>>>>>> Hi Authors,
>>>>>>>>> 
>>>>>>>>> Dan - Thank you for your reply! We have noted your approval on
>>>>>>>>> the AUTH48 status page (see https://www.rfc-
>>>>>>>>> editor.org/auth48/rfc9761).
>>>>>>>>> 
>>>>>>>>> Tirumal - Thank you for your response to our followup questions!
>>>>>>>>> We have updated the document as requested. We have one followup
>>>>>>>>> comment and updated files can be found below.
>>>>>>>>> 
>>>>>>>>>> On Mar 28, 2025, at 4:42 AM, tirumal reddy <kond...@gmail.com>
>>>>>>>>>> wrote:
>>>>>>>>>> 
>>>>>>>>>> Please ignore my responses to Section 9.2. Your proposed
>>>>>>>>>> changes to this section look good. I mistakenly referred to
>>>>>>>>>> Section 9.3 instead.
>>>>>>>>> 
>>>>>>>>> [rfced] We updated Section 9.2 to add the "writeable/readable
>>>>>>>>> data nodes" sentences per your note. We weren’t sure if this
>>>>>>>>> note also included Question 1b per your first response, so we
>>>>>>>>> have not added the additional text at the end of Section 9.2.
>>>>>>>>> 
>>>>>>>>> There are no data nodes defined by the IANA maintained iana-tls-
>>>>>>>>> profile. Please proceed to add the text proposed by you for
>>>>>>>>> Section 9.2.
>>>>>>>>> 
>>>>>>>>> Please review and let us know if this section (or any section in
>>>>>>>>> the Security Considerations) needs any further updates.
>>>>>>>>> 
>>>>>>>>> Updates to the draft look good to me.
>>>>>>>>> 
>>>>>>>>> Cheers,
>>>>>>>>> -Tiru
>>>>>>>>> 
>>>>>>>>> 
>>>>>>>>>> -Tiru
>>>>>>>>>> 
>>>>>>>>>> On Fri, 28 Mar 2025 at 14:42, tirumal reddy <kond...@gmail.com>
>>>>>>>>>> wrote:
>>>>>>>>>> Hi Madison,
>>>>>>>>>> 
>>>>>>>>>> Please see inline
>>>>>>>>>> 
>>>>>>>>>> On Thu, 27 Mar 2025 at 23:06, Madison Church
>>>>>>>>>> <mchu...@staff.rfc-editor.org> wrote:
>>>>>>>>>> Hi Tirumal,
>>>>>>>>>> 
>>>>>>>>>> Thank you for your reply! We have updated the document
>>>>>>>>>> accordingly and have some followup queries marked with [rfced].
>>>>>>>>>> 
>>>>>>>>>> [rfced] Upon sending the initial AUTH48 email, we note that the
>>>>>>>>>> address "blake.ander...@cisco.com" returned an "Undelivered
>>>>>>>>>> Mail Returned to Sender" message. Is there an up-to-date email
>>>>>>>>>> address for Blake that we can reach?
>>>>>>>>>> 
>>>>>>>>>>>> 13) <!-- [rfced] Because of your note that the template in
>>>>>>>>>>>> rfc8407bis
>>>>>>>>>>>> has been used, we will update this paragraph (which appears
>>>>>>>>>>>> in Sections
>>>>>>>>>>>> 9.2, 9.3, and 9.4) to match Section 3.7.1 of rfc8407bis as
>>>>>>>>>>>> follows.
>>>>>>>>>>>> Please let us know if that is not what you intended.
>>>>>>>>>>>> 
>>>>>>>>>>>> Original:
>>>>>>>>>>>> This section follows the template defined in Section 3.7.1 of
>>>>>>>>>>>> [I-D.ietf-netmod-rfc8407bis].
>>>>>>>>>>>> 
>>>>>>>>>>>> The YANG module specified in this document defines a schema
>>>>>>>>>>>> for data
>>>>>>>>>>>> can possibly be accessed via network management protocols
>>>>>>>>>>>> such as
>>>>>>>>>>>> NETCONF [RFC6241] or RESTCONF [RFC8040].  These network
>>>>>>>>>>>> management
>>>>>>>>>>>> protocols are required to use a secure transport layer and
>>>>>>>>>>>> mutual
>>>>>>>>>>>> authentication, e.g., SSH [RFC6242] without the "none"
>>>>>>>>>>>> authentication
>>>>>>>>>>>> option, Transport Layer Security (TLS) [RFC8446] with mutual
>>>>>>>>>>>> X.509
>>>>>>>>>>>> authentication, and HTTPS with HTTP authentication (Section
>>>>>>>>>>>> 11 of
>>>>>>>>>>>> [RFC9110]).
>>>>>>>>>>>> 
>>>>>>>>>>>> The Network Access Control Model (NACM) [RFC8341] provides
>>>>>>>>>>>> the means
>>>>>>>>>>>> to restrict access for particular users to a pre-configured
>>>>>>>>>>>> subset of
>>>>>>>>>>>> all available protocol operations and content.
>>>>>>>>>>>> 
>>>>>>>>>>>> Perhaps (following draft-ietf-netmod-rfc8407bis-22):
>>>>>>>>>>>> This section follows the template defined in Section 3.7.1 of
>>>>>>>>>>>> [YANG-GUIDELINES].
>>>>>>>>>>>> 
>>>>>>>>>>>> The "iana-tls-profile" YANG module defines a data model that
>>>>>>>>>>>> is
>>>>>>>>>>>> designed to be accessed via YANG-based management protocols,
>>>>>>>>>>>> such as
>>>>>>>>>>>> NETCONF [RFC6241] and RESTCONF [RFC8040]. These protocols
>>>>>>>>>>>> have to
>>>>>>>>>>>> use a secure transport layer (e.g., SSH [RFC4252], TLS
>>>>>>>>>>>> [RFC8446], and
>>>>>>>>>>>> QUIC [RFC9000]) and have to use mutual authentication.
>>>>>>>>>>>> 
>>>>>>>>>>>> The Network Configuration Access Control Model (NACM)
>>>>>>>>>>>> [RFC8341]
>>>>>>>>>>>> provides the means to restrict access for particular NETCONF
>>>>>>>>>>>> or
>>>>>>>>>>>> RESTCONF users to a preconfigured subset of all available
>>>>>>>>>>>> NETCONF or
>>>>>>>>>>>> RESTCONF protocol operations and content.
>>>>>>>>>>>> -->
>>>>>>>>>> 
>>>>>>>>>> Looks good to me.
>>>>>>>>>>> 
>>>>>>>>>>> It is aligned with the Security Considerations Section
>>>>>>>>>>> Template in Section 3.7.1 of
>>>>>>>>>>> https://datatracker.ietf.org/doc/draft-ietf-netmod-rfc8407bis/
>>>>>>>>>> 
>>>>>>>>>> [rfced] Per your reply, we have updated the document as much as
>>>>>>>>>> possible to match the template in Section 3.7.1 of 8407bis. We
>>>>>>>>>> have the remaining questions regarding these updates. Note that
>>>>>>>>>> this diff file may be best for viewing side-by-side updates:
>>>>>>>>>> https://www.rfc-editor.org/authors/rfc9761-auth48rfcdiff.html.
>>>>>>>>>> 
>>>>>>>>>> 1) Section 9.2:
>>>>>>>>>> a) May we add the following sentences in Section 9.2 to match
>>>>>>>>>> the template?
>>>>>>>>>> 
>>>>>>>>>> "There are no particularly sensitive writable data nodes."
>>>>>>>>>> "There are no particularly sensitive readable data nodes."
>>>>>>>>>> 
>>>>>>>>>> No, sensitive writable/readable data nodes are present and the
>>>>>>>>>> security/privacy considerations are explained in 4th and 5th
>>>>>>>>>> paragraphs of Section 9.3.
>>>>>>>>>> 
>>>>>>>>>> b) Would you like to add the following text at the end of
>>>>>>>>>> Section 9.2 as per the template’s guidance?
>>>>>>>>>> 
>>>>>>>>>> -- If the data model does not define any data nodes (i.e., none
>>>>>>>>>> -- of the above sections or readable/writable data nodes or
>>>>>>>>>> RPCs
>>>>>>>>>> -- have been included), then add the following text:
>>>>>>>>>> 
>>>>>>>>>> "The YANG module defines a set of identities, types, and
>>>>>>>>>> groupings. These nodes are intended to be reused by other YANG
>>>>>>>>>> modules. The module by itself does not expose any data nodes
>>>>>>>>>> that
>>>>>>>>>> are writable, data nodes that contain read-only state, or RPCs.
>>>>>>>>>> As such, there are no additional security issues related to
>>>>>>>>>> the YANG module that need to be considered."
>>>>>>>>>> 
>>>>>>>>>> No, the YANG module defines data nodes.
>>>>>>>>>> 
>>>>>>>>>> "Modules that use the groupings that are defined in this
>>>>>>>>>> document
>>>>>>>>>> should identify the corresponding security considerations. For
>>>>>>>>>> example, reusing some of these groupings will expose privacy-
>>>>>>>>>> related
>>>>>>>>>> information (e.g., 'node-example')."
>>>>>>>>>> 
>>>>>>>>>> 
>>>>>>>>>> 2) Section 9.3:
>>>>>>>>>> In the "Some of the readable data nodes" paragraph, this
>>>>>>>>>> sentence (from the template) is not present. Is this
>>>>>>>>>> intentional?
>>>>>>>>>> 
>>>>>>>>>> Yes.
>>>>>>>>>> "Specifically, the following subtrees and data nodes have
>>>>>>>>>> particular sensitivities/vulnerabilities:"
>>>>>>>>>> 
>>>>>>>>>> Instead, the document has this sentence:
>>>>>>>>>> "The YANG module will provide insights into (D)TLS profiles of
>>>>>>>>>> the IoT devices, and the privacy considerations discussed in
>>>>>>>>>> Section 10 need to be taken into account."
>>>>>>>>>> 
>>>>>>>>>> 
>>>>>>>>>> 3) Section 9.4:
>>>>>>>>>> a) May we add the following sentence per the templates
>>>>>>>>>> guidance?
>>>>>>>>>> "There are no particularly sensitive readable data nodes."
>>>>>>>>>> 
>>>>>>>>>> No.
>>>>>>>>>> 
>>>>>>>>>> b) For the "Some of the readable data nodes" paragraph, this
>>>>>>>>>> sentence (from the template) is not present. Is this
>>>>>>>>>> intentional?
>>>>>>>>>> 
>>>>>>>>>> Yes.
>>>>>>>>>> "Specifically, the following subtrees and data nodes have
>>>>>>>>>> particular sensitivities/vulnerabilities:"
>>>>>>>>>> 
>>>>>>>>>> Instead, the document has the following sentences:
>>>>>>>>>> "For instance, update that the device does not support (D)TLS
>>>>>>>>>> profile can dramatically alter the implemented security policy.
>>>>>>>>>> For this reason,
>>>>>>>>>> the NACM extension "default-deny-write" has been set for all
>>>>>>>>>> data nodes defined in this module."
>>>>>>>>>> 
>>>>>>>>>> 
>>>>>>>>>> 4) For all sections in the Security Considerations section, may
>>>>>>>>>> we update the sentence below to accurately reflect the
>>>>>>>>>> template?
>>>>>>>>>> 
>>>>>>>>>> Current:
>>>>>>>>>> This module does not define any RPCs, actions, or
>>>>>>>>>> notifications, and
>>>>>>>>>> thus the security consideration for such is not provided here.
>>>>>>>>>> 
>>>>>>>>>> Perhaps:
>>>>>>>>>> There are no particularly sensitive RPC or action operations.
>>>>>>>>>> 
>>>>>>>>>> Okay.
>>>>>>>>>> 
>>>>>>>>>>>> 15) <!-- [rfced] Please review the questions below regarding
>>>>>>>>>>>> references in this
>>>>>>>>>>>> document.
>>>>>>>>>>>> c) Re: [X501], this reference has been superseded
>>>>>>>>>>>> by the 2019 version of X.501 - available here:
>>>>>>>>>>>> https://www.itu.int/rec/T-REC-X.501-201910-I/en. May we
>>>>>>>>>>>> update this reference
>>>>>>>>>>>> to use the most current version?  FYI, the URL for the
>>>>>>>>>>>> 1993 version of this reference has been included in the
>>>>>>>>>>>> reference.
>>>>>>>>>> 
>>>>>>>>>> Yes, good to update.
>>>>>>>>>> 
>>>>>>>>>> Cheers,
>>>>>>>>>> -Tiru
>>>>>>>>> 
>>>>>>>>> Please review the document carefully to ensure satisfaction as
>>>>>>>>> we do not make changes once it has been published as an RFC.
>>>>>>>>> Contact us with any further updates or with your approval of the
>>>>>>>>> document in its current form. We will await approvals from each
>>>>>>>>> author prior to moving forward in the publication process.
>>>>>>>>> 
>>>>>>>>> The updated files have been posted here (please refresh):
>>>>>>>>> https://www.rfc-editor.org/authors/rfc9761.txt
>>>>>>>>> https://www.rfc-editor.org/authors/rfc9761.pdf
>>>>>>>>> https://www.rfc-editor.org/authors/rfc9761.html
>>>>>>>>> https://www.rfc-editor.org/authors/rfc9761.xml
>>>>>>>>> 
>>>>>>>>> The updated diffs have been posted here (please refresh):
>>>>>>>>> https://www.rfc-editor.org/authors/rfc9761-diff.html
>>>>>>>>> https://www.rfc-editor.org/authors/rfc9761-rfcdiff.html (side by
>>>>>>>>> side)
>>>>>>>>> https://www.rfc-editor.org/authors/rfc9761-auth48diff.html
>>>>>>>>> (AUTH48 updates only)
>>>>>>>>> https://www.rfc-editor.org/authors/rfc9761-auth48rfcdiff.html
>>>>>>>>> (side by side AUTH48 updates)
>>>>>>>>> 
>>>>>>>>> AUTH48 status page:
>>>>>>>>> https://www.rfc-editor.org/auth48/rfc9761
>>>>>>>>> 
>>>>>>>>> Thank you!
>>>>>>>>> RFC Editor/mc

-- 
auth48archive mailing list -- auth48archive@rfc-editor.org
To unsubscribe send an email to auth48archive-le...@rfc-editor.org

Reply via email to