Re: [auth48] [AD] AUTH48: RFC-to-be 9472 <draft-ietf-opsawg-sbom-access-18> for your review

Sarah Tarrant <starrant@amsl.com> Thu, 14 September 2023 19:26 UTC

Return-Path: <starrant@amsl.com>
X-Original-To: auth48archive@ietfa.amsl.com
Delivered-To: auth48archive@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C910CC15108D; Thu, 14 Sep 2023 12:26:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.907
X-Spam-Level:
X-Spam-Status: No, score=-1.907 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qeBE9fycDq7m; Thu, 14 Sep 2023 12:26:37 -0700 (PDT)
Received: from c8a.amsl.com (c8a.amsl.com [4.31.198.40]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3C821C14CE52; Thu, 14 Sep 2023 12:26:37 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by c8a.amsl.com (Postfix) with ESMTP id 20A9E424B43F; Thu, 14 Sep 2023 12:26:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
Received: from c8a.amsl.com ([127.0.0.1]) by localhost (c8a.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6H-NqLlMfy1b; Thu, 14 Sep 2023 12:26:37 -0700 (PDT)
Received: from smtpclient.apple (unknown [IPv6:2600:1700:8f1d:4000:5827:385c:f3b0:beda]) by c8a.amsl.com (Postfix) with ESMTPSA id 8EA88424B42C; Thu, 14 Sep 2023 12:26:36 -0700 (PDT)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3731.700.6\))
From: Sarah Tarrant <starrant@amsl.com>
In-Reply-To: <D94AFD07-1B21-474D-8F4D-693EFD7B84F8@cisco.com>
Date: Thu, 14 Sep 2023 14:26:25 -0500
Cc: "Rose, Scott W. (Fed)" <scott.rose@nist.gov>, RFC Editor <rfc-editor@rfc-editor.org>, "opsawg-ads@ietf.org" <opsawg-ads@ietf.org>, "opsawg-chairs@ietf.org" <opsawg-chairs@ietf.org>, "bill.wu@huawei.com" <bill.wu@huawei.com>, "auth48archive@rfc-editor.org" <auth48archive@rfc-editor.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <CB6B20F1-5B8C-48AE-9FA4-2063276ECB7F@amsl.com>
References: <20230908232621.2FE7CE5EA7@rfcpa.amsl.com> <BE129746-6B47-4FA8-A918-44B728F347C3@nist.gov> <2F1A389E-ABED-4C37-B41A-79A9E15D59CA@amsl.com> <1D2F40E4-3276-49E3-B70C-D6FC5FAC0430@cisco.com> <621E366B-9EC0-4783-B075-8EAD78A75CD6@nist.gov> <96C191BF-2D68-47CF-9672-9DD33EACB4C0@amsl.com> <BY5PR11MB4196DE4DB8FF4436F15EB830B5F7A@BY5PR11MB4196.namprd11.prod.outlook.com> <D94AFD07-1B21-474D-8F4D-693EFD7B84F8@cisco.com>
To: Eliot Lear <lear@cisco.com>, "Rob Wilton (rwilton)" <rwilton=40cisco.com@dmarc.ietf.org>
X-Mailer: Apple Mail (2.3731.700.6)
Archived-At: <https://mailarchive.ietf.org/arch/msg/auth48archive/ASTUM6_tNHEwRus5tIx2yAbw03w>
Subject: Re: [auth48] [AD] AUTH48: RFC-to-be 9472 <draft-ietf-opsawg-sbom-access-18> for your review
X-BeenThere: auth48archive@rfc-editor.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Archiving AUTH48 exchanges between the RFC Production Center, the authors, and other related parties" <auth48archive.rfc-editor.org>
List-Unsubscribe: <https://mailman.rfc-editor.org/mailman/options/auth48archive>, <mailto:auth48archive-request@rfc-editor.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/auth48archive/>
List-Post: <mailto:auth48archive@rfc-editor.org>
List-Help: <mailto:auth48archive-request@rfc-editor.org?subject=help>
List-Subscribe: <https://mailman.rfc-editor.org/mailman/listinfo/auth48archive>, <mailto:auth48archive-request@rfc-editor.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Sep 2023 19:26:40 -0000

Hello Rob and Eliot,

Rob, thank you for your reply. We have marked your approval on the AUTH48 status page for this document (see https://www.rfc-editor.org/auth48/rfc9472). 

Eliot, we look forward to your review. 

We will await approvals from each of the parties listed at the AUTH48 status page prior to moving this document forward in the publication process.

Thank you,
RFC Editor/st

> On Sep 14, 2023, at 7:25 AM, Eliot Lear <lear@cisco.com> wrote:
> 
> Thanks, Rob.  @Sarah In the next day or three, I will do a deep read to confirm everything is ok.
> 
> Eliot
> 
>> On 14 Sep 2023, at 14:00, Rob Wilton (rwilton) <rwilton=40cisco.com@dmarc.ietf.org> wrote:
>> 
>> Hi Sarah,
>> 
>> The rewording on section 1.3 is fine with me.
>> 
>> For question 10, I approve of the current security text.  I have flagged this previously with the authors and there are good reasons for the text to deviate from the standard YANG security considerations template.
>> 
>> Regards,
>> Rob
>> 
>> 
>>> -----Original Message-----
>>> From: Sarah Tarrant <starrant@amsl.com>
>>> Sent: 13 September 2023 21:35
>>> To: Rose, Scott W. (Fed) <scott.rose@nist.gov>; Eliot Lear
>>> <lear=40cisco.com@dmarc.ietf.org>
>>> Cc: Rob Wilton (rwilton) <rwilton@cisco.com>; RFC Editor <rfc-editor@rfc-
>>> editor.org>; opsawg-ads@ietf.org; opsawg-chairs@ietf.org;
>>> bill.wu@huawei.com; auth48archive@rfc-editor.org
>>> Subject: Re: [AD] AUTH48: RFC-to-be 9472 <draft-ietf-opsawg-sbom-access-18>
>>> for your review
>>> 
>>> Hello Eliot and Scott,
>>> 
>>> Thank you for your replies. We have updated the document accordingly, and all
>>> of our questions for the authors have been addressed.
>>> 
>>> Please review the document carefully to ensure satisfaction as we do not make
>>> changes once it has been published as an RFC. Contact us with any further
>>> updates or with your approval of the document in its current form. We will
>>> await approvals from each author prior to moving forward in the publication
>>> process. We also need Rob’s AD approval of the change in Section 1.3 and
>>> review of question #10 prior to moving forward.
>>> 
>>> Updated XML file:
>>> http://www.rfc-editor.org/authors/rfc9472.xml
>>> 
>>> Updated output files:
>>> https://www.rfc-editor.org/authors/rfc9472.html
>>> https://www.rfc-editor.org/authors/rfc9472.txt
>>> https://www.rfc-editor.org/authors/rfc9472.pdf
>>> 
>>> Diff file showing all changes made during AUTH48:
>>> https://www.rfc-editor.org/authors/rfc9472-auth48diff.html
>>> 
>>> Diff files showing all changes:
>>> https://www.rfc-editor.org/authors/rfc9472-diff.html
>>> https://www.rfc-editor.org/authors/rfc9472-rfcdiff.html (side-by-side diff)
>>> 
>>> Note that it may be necessary for you to refresh your browser to view the most
>>> recent version.
>>> 
>>> For the AUTH48 status of this document, please see:
>>> https://www.rfc-editor.org/auth48/rfc9472
>>> 
>>> Thank you,
>>> 
>>> RFC Editor/st
>>> 
>>>> On Sep 13, 2023, at 8:14 AM, Rose, Scott W. (Fed) <scott.rose@nist.gov>
>>> wrote:
>>>> 
>>>> Sarah,
>>>> I am generally fine with the changes, specific replies below:
>>>> 
>>>> Thanks,
>>>> Scott
>>>> 
>>>> On 13 Sep 2023, at 3:15, Eliot Lear wrote:
>>>> 
>>>>> Hi Sarah and thanks!  Please see below.
>>>>> 
>>>>>> On 12 Sep 2023, at 20:50, Sarah Tarrant <starrant@amsl.com> wrote:
>>>>>> 
>>>>>> Hello Eliot, Scott, and Rob*,
>>>>>> 
>>>>>> *Rob, as AD, please review the change in the last paragraph of Section 1.3
>>> and let us know if you approve. The change is best viewed in this diff file:
>>> https://www.rfc-editor.org/authors/rfc9472-auth48diff.html. Also, please let us
>>> know your thoughts on this question (note that RFCs 6242, 8341, and 8446 are
>>> included in the template at https://trac.ietf.org/trac/ops/wiki/yang-security-
>>> guidelines):
>>>>>> 
>>>>>>> 10) <!-- [rfced] *[AD] Section 6: The Security Considerations section does
>>> not
>>>>>>> follow the requirements listed on
>>>>>>> https://trac.ietf.org/trac/ops/wiki/yang-security-guidelines, which says
>>>>>>> "This section MUST be patterned after the latest approved template."
>>>>>>> Please confirm if the current text is acceptable per the context of the
>>>>>>> document or if any further updates are needed in order to follow the
>>>>>>> template.
>>>>>>> 
>>>>>>> Also, please confirm if it is acceptable that RFCs 6242, 8341, and
>>>>>>> 8446 are not listed in the Normative References section or if they
>>>>>>> should be added.
>>>>>>> —>
>>>>>> 
>>>>>> 
>>>>>> Eliot and Scott, thank you for your replies; we have updated the document
>>> accordingly. We have a few followup questions:
>>>>>> 
>>>>>> 1) We added the sentence in ii) per your reply to this question. We also
>>> added RFC 7231 as a normative reference. Please confirm that this is correct.
>>> Or should it be informative instead?
>>>>> 
>>>>> That’s correct.
>>>>> 
>>>>>> 
>>>>>>>> e) We note that RFCs 6991 and 7231 are only referenced in the YANG
>>>>>>>> module and not in the running text. In order to have a 1:1 matchup
>>>>>>>> between the references section and the text, may we add an
>>> introductory
>>>>>>>> sentence before the YANG module that includes these citations (option
>>> i)?
>>>>>>>> Alternatively, you may reference all of the RFCs that are mentioned
>>>>>>>> (option ii). Please let us know your preference.
>>>>>>>> 
>>>>>>>> Perhaps:
>>>>>>>> i)  This YANG module references [RFC6991] and [RFC7231].
>>>>>>>> or
>>>>>>>> ii) This YANG module references [RFC6991], [RFC7231], [RFC7252],
>>>>>>>> [RFC8520], and [RFC9110].
>>>>>>> 
>>>>>>> 
>>>>>>> ii seems complete.
>>>>>> 
>>>>>> 
>>>>>> 2) Regarding this question:
>>>>>> 
>>>>>>>> 11) <!--[rfced] Is this sentence intended to be an ordered list (option A)
>>>>>>>> or are "any change in a URL" and "any change to the authority
>>>>>>>> section" the 2 risks that are being referred to (option B)?
>>>>>>>> 
>>>>>>>> Original:
>>>>>>>> To address either risk, any change in a URL, and in particular to the
>>>>>>>> authority section, two approaches may be used:
>>>>>>>> 
>>>>>>>> Perhaps:
>>>>>>>> A) To address either risk, any change in a URL, and particularly any
>>> change
>>>>>>>> to the authority section, two approaches may be used:
>>>>>>>> 
>>>>>>>> or
>>>>>>>> 
>>>>>>>> B) To address either risk, i.e., any change in a URL and, in particular, to
>>>>>>>> the authority section, two approaches may be used:
>>>>>>>> -->
>>>>>>> 
>>>>>>> How about:
>>>>>>> 
>>>>>>>> (C)  To address either risk, any change in a URL, and in particular to the
>>>>>>>> authority section; two approaches may be used:
>>>>>>> 
>>>>>>> ?
>>>>>> 
>>>>>> We are still having trouble understanding this sentence. (Note that the text
>>> before the semicolon in (C) is not a complete sentence.) Would something like
>>> the following work?
>>>>>> 
>>>>>> Perhaps:
>>>>>> Two approaches may be used to address these risks and any change in a
>>> URL (particularly in the
>>>>>> authority section):
>>>>>> 
>>>>> 
>>>>> Ok, having re-read the context, the authority section phrase is redundant, so
>>> we can say:
>>>>> 
>>>>>> To address either of these risks or any tampering of a URL:
>>>>> 
>>>> 
>>>> This seems fine.
>>>> 
>>>>> 
>>>>> 
>>>>>> 
>>>>>> 3) Regarding this question:
>>>>>> 
>>>>>>>> 15) <!-- [rfced] The following lines exceed the 72-character limit for
>>>>>>>> sourcecode. Please let us know how these lines can be modified.
>>>>>>>> 
>>>>>>>> Section 5.1 (1 character over):
>>>>>>>> "systeminfo": "retrieving vuln and SBOM info via a cloud service",
>>>>>>>> 
>>>>>>>> Section 5.2 (1 character over):
>>>>>>>> "systeminfo": "mixed example: SBOM on device, vuln info in cloud",
>>>>>>>> 
>>>>>>>> Section 5.3 (2 characters over):
>>>>>>>> "contact-info": "https://iot-device.example.com/contact-info.html",
>>>>>>>> 
>>>>>>>> Section 5.3 (1 character over):
>>>>>>>> "systeminfo": "retrieving vuln and SBOM info via a cloud service",
>>>>>>>> -->
>>>>>>>> 
>>>>>>> 
>>>>>>> Would you mind out-denting these lines?
>>>>>> 
>>>>>> Please confirm that we updated these correctly. We moved the lines in
>>> each example mentioned above one or two spaces (as appropriate) to the left
>>> to meet the character limit, though we couldn’t not move the “{“ at the
>>> beginning and end of each example as these were already at the left margin.
>>>>> 
>>>>> 
>>>>> That’s okay.
>>>>> 
>>>>> Aside: this 72 character limit was VERY important when printers could only
>>> print 80 columns, but that was on its way out even when *I* was a student in
>>> the 80s (I never saw an actual line printer after college).
>>>>> 
>>>>> Regards,
>>>>> 
>>>>> Eliot
>>>>> 
>>>>>> 
>>>>>> ______________
>>>>>> 
>>>>>> Updated XML file:
>>>>>> http://www.rfc-editor.org/authors/rfc9472.xml
>>>>>> 
>>>>>> Updated output files:
>>>>>> https://www.rfc-editor.org/authors/rfc9472.html
>>>>>> https://www.rfc-editor.org/authors/rfc9472.txt
>>>>>> https://www.rfc-editor.org/authors/rfc9472.pdf
>>>>>> 
>>>>>> Diff file showing all changes made during AUTH48:
>>>>>> https://www.rfc-editor.org/authors/rfc9472-auth48diff.html
>>>>>> 
>>>>>> Diff files showing all changes:
>>>>>> https://www.rfc-editor.org/authors/rfc9472-diff.html
>>>>>> https://www.rfc-editor.org/authors/rfc9472-rfcdiff.html (side-by-side diff)
>>>>>> 
>>>>>> Note that it may be necessary for you to refresh your browser to view the
>>> most recent version.
>>>>>> 
>>>>>> For the AUTH48 status of this document, please see:
>>>>>> https://www.rfc-editor.org/auth48/rfc9472
>>>>>> 
>>>>>> Thank you,
>>>>>> 
>>>>>> RFC Editor/st
>>>>>> 
>>>>>>> On Sep 11, 2023, at 12:23 PM, Rose, Scott W. (Fed)
>>> <scott.rose=40nist.gov@dmarc.ietf.org> wrote:
>>>>>>> 
>>>>>>> On 8 Sep 2023, at 19:26, rfc-editor@rfc-editor.org wrote:
>>>>>>> 
>>>>>>>> Authors and *AD,
>>>>>>>> 
>>>>>>>> While reviewing this document during AUTH48, please resolve (as
>>> necessary) the following questions, which are also in the XML file.
>>>>>>>> 
>>>>>>> 
>>>>>>>> 
>>>>>>>> 17) <!-- [rfced] FYI: We have added expansions for the following
>>> abbreviations
>>>>>>>> per Section 3.6 of RFC 7322 ("RFC Style Guide"). Please review each
>>>>>>>> expansion in the document carefully to ensure correctness.
>>>>>>>> 
>>>>>>>> Access Control Lists (ACLs)
>>>>>>>> Constrained Application Protocol (CoAP)
>>>>>>>> Internet of Things (IoT)
>>>>>>>> -->
>>>>>>>> 
>>>>>>>> 
>>>>>>>> 18) <!-- [rfced] Please review the "Inclusive Language" portion of the
>>> online
>>>>>>>> Style Guide <https://www.rfc-
>>> editor.org/styleguide/part2/#inclusive_language>
>>>>>>>> and let us know if any changes are needed.
>>>>>>>> 
>>>>>>>> Note that our script did not flag any words in particular, but this should
>>>>>>>> still be reviewed as a best practice.
>>>>>>>> -->
>>>>>>>> 
>>>>>>> 
>>>>>>> FWIW, I did a pass through to match against the NIST inclusive language
>>> guidance and did not find anything that needed to be addressed.  Future
>>> changes may change that (not likely, but maybe).
>>>>>>> 
>>>>>>> Thanks
>>>>>>> Scott
>>>>>>> 
>>>>>>> 
>>>>>>> 
>>>>>>> 
>>>>>>> ==================================
>>>>>>> Scott Rose NIST/CTL
>>>>>>> scott.rose@nist.gov
>>>>>>> ph: +1-301-975-8439 (w)
>>>>>>> +1-571-249-3761 (GoogleVoice)
>>>>>>> ==================================
>>>>>> 
>>>> 
>>>> 
>>>> ==================================
>>>> Scott Rose NIST/CTL
>>>> scott.rose@nist.gov
>>>> ph: +1-301-975-8439 (w)
>>>>  +1-571-249-3761 (GoogleVoice)
>>>> ==================================
>>> 
>> 
>