Re: [auth48] [AD] AUTH48: RFC-to-be 9472 <draft-ietf-opsawg-sbom-access-18> for your review

"Rose, Scott W. (Fed)" <scott.rose@nist.gov> Fri, 15 September 2023 12:28 UTC

Return-Path: <scott.rose@nist.gov>
X-Original-To: auth48archive@ietfa.amsl.com
Delivered-To: auth48archive@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BDA95C15198B; Fri, 15 Sep 2023 05:28:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -8.108
X-Spam-Level:
X-Spam-Status: No, score=-8.108 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FROM_GOV_DKIM_AU=-0.999, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=nist.gov
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0UtmM0krBecj; Fri, 15 Sep 2023 05:27:56 -0700 (PDT)
Received: from GCC02-BL0-obe.outbound.protection.outlook.com (mail-bl0gcc02on2070a.outbound.protection.outlook.com [IPv6:2a01:111:f400:7d05::70a]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1FCF4C151074; Fri, 15 Sep 2023 05:27:56 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=IGsnQaBetpzNDzxHEHoJxTelco2RuDMoMyQxdW44XVv1pVrrqjo3v7F1fncGKQYsuAlhnn0cFdNYH1ybU4O/fKFHcPDiB+n6EulCtocCs8GarCL4AiiKlGzV3X1MlbUfzmlRlbaRVh6/GL21K6cPwVmC9g6RUidpBHXaMCt9DqeWOgDxwCSEnziX5f0eTbEedDrCSCds9cZ11UnlgzeBPh1Y+nOqme9Y88XkPnZuGaJQZ6VqGCFqnsM5/pTSj4XUeYXXoS/YOk8q2U1R+TmatJQSZx9iezAX/y7KjUE+SEoDGOD+gKb6eCfAzS77DO0uCpa30Fj5B5rpypzZaw0tzA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=n6GBfyNQB6UPm6jVSs1qwV2fMsXIrsj1JUqMLlOjQ1Q=; b=gJzc7pkSUiaKOotWeH9EPp5EScUpLEDaK/Se3csHIPEGlhQNfmYof010PV3bimeXxIRC4mQHRSY4KZ2vjfJMyl1UH2f0Sk1JYuXi5tKqL/OwlBx9XLtELgJB98rIUbLIo39bP/HJVCSz2nR4cqwLD6XwbK5gLSghF84yibigslyB5MdCHZnTxCXUULqFAHqvyzBrUprNw0hdLrRenkdwDT1rLc5tHaHIjDo8HSctmumu0vAr4aEfE0TI2ABNeSZhaN0gGBO4O1UNtM459VyHERXS2o/2h6bTDKLGYklwra37VlR0MoaLCRDaP7bnL7NA7pQMKclbzd4SzYbI7g3MaA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 129.6.18.29) smtp.rcpttodomain=rfc-editor.org smtp.mailfrom=nist.gov; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nist.gov; dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nist.gov; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=n6GBfyNQB6UPm6jVSs1qwV2fMsXIrsj1JUqMLlOjQ1Q=; b=LLpGLac1bBINQYpRXXv+DkcYq2i/h5RHtid9xPgveU+23lWL5Ipv3P8RFdLp+d12pnhbifI8MI+HX4veIXZ1RrlgyS3FNzgqNLrnMTnkOKNfLPrDgLKGPE7E/7AXhEc44MCDKtePngMk2PZjzF+BzVpX/VvGSDFIxMo41LVmWjag+4zLdv3B8QpOZVACM9cvlFmjR5V+iiLjtQNG1o2FSFzDt4vGdGqx+blr20gYl3MPBsUxvv9brgt74yKDp7126/VSuafL/oAU3lCFStusdLjoaXU1exyg2/yIOMAf7aNbpZSvmIOBmM4EWB6Z76rQgg7teVMwIhqfoxaxLlZpTQ==
Received: from DM6PR09CA0016.namprd09.prod.outlook.com (2603:10b6:5:160::29) by PH0PR09MB8762.namprd09.prod.outlook.com (2603:10b6:510:64::8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6792.22; Fri, 15 Sep 2023 12:27:52 +0000
Received: from DM3GCC02FT010.eop-gcc02.prod.protection.outlook.com (2a01:111:f400:7d04::209) by DM6PR09CA0016.outlook.office365.com (2603:10b6:5:160::29) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6792.21 via Frontend Transport; Fri, 15 Sep 2023 12:27:51 +0000
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 129.6.18.29) smtp.mailfrom=nist.gov; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nist.gov;
Received-SPF: Pass (protection.outlook.com: domain of nist.gov designates 129.6.18.29 as permitted sender) receiver=protection.outlook.com; client-ip=129.6.18.29; helo=smtp1.nist.gov; pr=C
Received: from smtp1.nist.gov (129.6.18.29) by DM3GCC02FT010.mail.protection.outlook.com (10.97.8.148) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6792.21 via Frontend Transport; Fri, 15 Sep 2023 12:27:51 +0000
Received: from [129.6.108.178] ([129.6.108.178]) by smtp1.nist.gov with Microsoft SMTPSVC(10.0.14393.4169); Fri, 15 Sep 2023 08:27:50 -0400
From: "Rose, Scott W. (Fed)" <scott.rose@nist.gov>
To: Sarah Tarrant <starrant@amsl.com>
Cc: Eliot Lear <lear=40cisco.com@dmarc.ietf.org>, "Rob Wilton (rwilton)" <rwilton@cisco.com>, RFC Editor <rfc-editor@rfc-editor.org>, opsawg-ads@ietf.org, opsawg-chairs@ietf.org, bill.wu@huawei.com, auth48archive@rfc-editor.org
Date: Fri, 15 Sep 2023 08:27:50 -0400
X-Mailer: MailMate (1.14r5937)
Message-ID: <51AB7D46-F829-401B-A74A-8D5F20C78056@nist.gov>
In-Reply-To: <96C191BF-2D68-47CF-9672-9DD33EACB4C0@amsl.com>
References: <20230908232621.2FE7CE5EA7@rfcpa.amsl.com> <BE129746-6B47-4FA8-A918-44B728F347C3@nist.gov> <2F1A389E-ABED-4C37-B41A-79A9E15D59CA@amsl.com> <1D2F40E4-3276-49E3-B70C-D6FC5FAC0430@cisco.com> <621E366B-9EC0-4783-B075-8EAD78A75CD6@nist.gov> <96C191BF-2D68-47CF-9672-9DD33EACB4C0@amsl.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
X-OriginalArrivalTime: 15 Sep 2023 12:27:50.0893 (UTC) FILETIME=[0B0FA9D0:01D9E7D0]
X-EOPAttributedMessage: 0
X-MS-PublicTrafficType: Email
X-MS-TrafficTypeDiagnostic: DM3GCC02FT010:EE_|PH0PR09MB8762:EE_
X-MS-Office365-Filtering-Correlation-Id: a48a4e9e-78bb-4bc1-50b7-08dbb5e72e0c
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:129.6.18.29; CTRY:US; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:smtp1.nist.gov; PTR:smtp1.nist.gov; CAT:NONE; SFS:(13230031)(4636009)(1800799009)(186009)(82310400011)(451199024)(36840700001)(40470700004)(46966006)(45080400002)(508600001)(40140700001)(956004)(2616005)(7596003)(7636003)(53546011)(356005)(26005)(82960400001)(40460700003)(86362001)(316002)(450100002)(6706004)(54906003)(30864003)(70206006)(83380400001)(36756003)(5660300002)(47076005)(8676002)(6862004)(8936002)(4326008)(36860700001)(426003)(966005)(336012)(66574015)(33656002)(2906002)(19607625013); DIR:OUT; SFP:1102;
X-OriginatorOrg: nist.gov
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 15 Sep 2023 12:27:51.7064 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: a48a4e9e-78bb-4bc1-50b7-08dbb5e72e0c
X-MS-Exchange-CrossTenant-Id: 2ab5d82f-d8fa-4797-a93e-054655c61dec
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=2ab5d82f-d8fa-4797-a93e-054655c61dec; Ip=[129.6.18.29]; Helo=[smtp1.nist.gov]
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: TreatMessagesAsInternal-DM3GCC02FT010.eop-gcc02.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH0PR09MB8762
Archived-At: <https://mailarchive.ietf.org/arch/msg/auth48archive/cvnoE7Qwt3ZPLre3tKQKGURIRTc>
Subject: Re: [auth48] [AD] AUTH48: RFC-to-be 9472 <draft-ietf-opsawg-sbom-access-18> for your review
X-BeenThere: auth48archive@rfc-editor.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Archiving AUTH48 exchanges between the RFC Production Center, the authors, and other related parties" <auth48archive.rfc-editor.org>
List-Unsubscribe: <https://mailman.rfc-editor.org/mailman/options/auth48archive>, <mailto:auth48archive-request@rfc-editor.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/auth48archive/>
List-Post: <mailto:auth48archive@rfc-editor.org>
List-Help: <mailto:auth48archive-request@rfc-editor.org?subject=help>
List-Subscribe: <https://mailman.rfc-editor.org/mailman/listinfo/auth48archive>, <mailto:auth48archive-request@rfc-editor.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Sep 2023 12:28:00 -0000

Sarah,
I read over the draft and I have no other comment.  I am good with publication.

Thanks,
Scott

On 13 Sep 2023, at 16:34, Sarah Tarrant wrote:

> Hello Eliot and Scott,
>
> Thank you for your replies. We have updated the document accordingly, and all of our questions for the authors have been addressed.
>
> Please review the document carefully to ensure satisfaction as we do not make changes once it has been published as an RFC. Contact us with any further updates or with your approval of the document in its current form. We will await approvals from each author prior to moving forward in the publication process. We also need Rob’s AD approval of the change in Section 1.3 and review of question #10 prior to moving forward.
>
> Updated XML file:
> http://www.rfc-editor.org/authors/rfc9472.xml
>
> Updated output files:
> https://www.rfc-editor.org/authors/rfc9472.html
> https://www.rfc-editor.org/authors/rfc9472.txt
> https://www.rfc-editor.org/authors/rfc9472.pdf
>
> Diff file showing all changes made during AUTH48:
> https://www.rfc-editor.org/authors/rfc9472-auth48diff.html
>
> Diff files showing all changes:
> https://www.rfc-editor.org/authors/rfc9472-diff.html
> https://www.rfc-editor.org/authors/rfc9472-rfcdiff.html (side-by-side diff)
>
> Note that it may be necessary for you to refresh your browser to view the most recent version.
>
> For the AUTH48 status of this document, please see:
> https://www.rfc-editor.org/auth48/rfc9472
>
> Thank you,
>
> RFC Editor/st
>
>> On Sep 13, 2023, at 8:14 AM, Rose, Scott W. (Fed) <scott.rose@nist.gov> wrote:
>>
>> Sarah,
>> I am generally fine with the changes, specific replies below:
>>
>> Thanks,
>> Scott
>>
>> On 13 Sep 2023, at 3:15, Eliot Lear wrote:
>>
>>> Hi Sarah and thanks!  Please see below.
>>>
>>>> On 12 Sep 2023, at 20:50, Sarah Tarrant <starrant@amsl.com> wrote:
>>>>
>>>> Hello Eliot, Scott, and Rob*,
>>>>
>>>> *Rob, as AD, please review the change in the last paragraph of Section 1.3 and let us know if you approve. The change is best viewed in this diff file: https://www.rfc-editor.org/authors/rfc9472-auth48diff.html. Also, please let us know your thoughts on this question (note that RFCs 6242, 8341, and 8446 are included in the template at https://trac.ietf.org/trac/ops/wiki/yang-security-guidelines):
>>>>
>>>>> 10) <!-- [rfced] *[AD] Section 6: The Security Considerations section does not
>>>>> follow the requirements listed on
>>>>> https://trac.ietf.org/trac/ops/wiki/yang-security-guidelines, which says
>>>>> "This section MUST be patterned after the latest approved template."
>>>>> Please confirm if the current text is acceptable per the context of the
>>>>> document or if any further updates are needed in order to follow the
>>>>> template.
>>>>>
>>>>> Also, please confirm if it is acceptable that RFCs 6242, 8341, and
>>>>> 8446 are not listed in the Normative References section or if they
>>>>> should be added.
>>>>> —>
>>>>
>>>>
>>>> Eliot and Scott, thank you for your replies; we have updated the document accordingly. We have a few followup questions:
>>>>
>>>> 1) We added the sentence in ii) per your reply to this question. We also added RFC 7231 as a normative reference. Please confirm that this is correct. Or should it be informative instead?
>>>
>>> That’s correct.
>>>
>>>>
>>>>>> e) We note that RFCs 6991 and 7231 are only referenced in the YANG
>>>>>> module and not in the running text. In order to have a 1:1 matchup
>>>>>> between the references section and the text, may we add an introductory
>>>>>> sentence before the YANG module that includes these citations (option i)?
>>>>>> Alternatively, you may reference all of the RFCs that are mentioned
>>>>>> (option ii). Please let us know your preference.
>>>>>>
>>>>>> Perhaps:
>>>>>> i)  This YANG module references [RFC6991] and [RFC7231].
>>>>>> or
>>>>>> ii) This YANG module references [RFC6991], [RFC7231], [RFC7252],
>>>>>>  [RFC8520], and [RFC9110].
>>>>>
>>>>>
>>>>> ii seems complete.
>>>>
>>>>
>>>> 2) Regarding this question:
>>>>
>>>>>> 11) <!--[rfced] Is this sentence intended to be an ordered list (option A)
>>>>>> or are "any change in a URL" and "any change to the authority
>>>>>> section" the 2 risks that are being referred to (option B)?
>>>>>>
>>>>>> Original:
>>>>>> To address either risk, any change in a URL, and in particular to the
>>>>>> authority section, two approaches may be used:
>>>>>>
>>>>>> Perhaps:
>>>>>> A) To address either risk, any change in a URL, and particularly any change
>>>>>> to the authority section, two approaches may be used:
>>>>>>
>>>>>> or
>>>>>>
>>>>>> B) To address either risk, i.e., any change in a URL and, in particular, to
>>>>>> the authority section, two approaches may be used:
>>>>>> -->
>>>>>
>>>>> How about:
>>>>>
>>>>>> (C)  To address either risk, any change in a URL, and in particular to the
>>>>>> authority section; two approaches may be used:
>>>>>
>>>>> ?
>>>>
>>>> We are still having trouble understanding this sentence. (Note that the text before the semicolon in (C) is not a complete sentence.) Would something like the following work?
>>>>
>>>> Perhaps:
>>>> Two approaches may be used to address these risks and any change in a URL (particularly in the
>>>> authority section):
>>>>
>>>
>>> Ok, having re-read the context, the authority section phrase is redundant, so we can say:
>>>
>>>> To address either of these risks or any tampering of a URL:
>>>
>>
>> This seems fine.
>>
>>>
>>>
>>>>
>>>> 3) Regarding this question:
>>>>
>>>>>> 15) <!-- [rfced] The following lines exceed the 72-character limit for
>>>>>> sourcecode. Please let us know how these lines can be modified.
>>>>>>
>>>>>> Section 5.1 (1 character over):
>>>>>> "systeminfo": "retrieving vuln and SBOM info via a cloud service",
>>>>>>
>>>>>> Section 5.2 (1 character over):
>>>>>> "systeminfo": "mixed example: SBOM on device, vuln info in cloud",
>>>>>>
>>>>>> Section 5.3 (2 characters over):
>>>>>> "contact-info": "https://iot-device.example.com/contact-info.html",
>>>>>>
>>>>>> Section 5.3 (1 character over):
>>>>>> "systeminfo": "retrieving vuln and SBOM info via a cloud service",
>>>>>> -->
>>>>>>
>>>>>
>>>>> Would you mind out-denting these lines?
>>>>
>>>> Please confirm that we updated these correctly. We moved the lines in each example mentioned above one or two spaces (as appropriate) to the left to meet the character limit, though we couldn’t not move the “{“ at the beginning and end of each example as these were already at the left margin.
>>>
>>>
>>> That’s okay.
>>>
>>> Aside: this 72 character limit was VERY important when printers could only print 80 columns, but that was on its way out even when *I* was a student in the 80s (I never saw an actual line printer after college).
>>>
>>> Regards,
>>>
>>> Eliot
>>>
>>>>
>>>> ______________
>>>>
>>>> Updated XML file:
>>>> http://www.rfc-editor.org/authors/rfc9472.xml
>>>>
>>>> Updated output files:
>>>> https://www.rfc-editor.org/authors/rfc9472.html
>>>> https://www.rfc-editor.org/authors/rfc9472.txt
>>>> https://www.rfc-editor.org/authors/rfc9472.pdf
>>>>
>>>> Diff file showing all changes made during AUTH48:
>>>> https://www.rfc-editor.org/authors/rfc9472-auth48diff.html
>>>>
>>>> Diff files showing all changes:
>>>> https://www.rfc-editor.org/authors/rfc9472-diff.html
>>>> https://www.rfc-editor.org/authors/rfc9472-rfcdiff.html (side-by-side diff)
>>>>
>>>> Note that it may be necessary for you to refresh your browser to view the most recent version.
>>>>
>>>> For the AUTH48 status of this document, please see:
>>>> https://www.rfc-editor.org/auth48/rfc9472
>>>>
>>>> Thank you,
>>>>
>>>> RFC Editor/st
>>>>
>>>>> On Sep 11, 2023, at 12:23 PM, Rose, Scott W. (Fed) <scott.rose=40nist.gov@dmarc.ietf.org> wrote:
>>>>>
>>>>> On 8 Sep 2023, at 19:26, rfc-editor@rfc-editor.org wrote:
>>>>>
>>>>>> Authors and *AD,
>>>>>>
>>>>>> While reviewing this document during AUTH48, please resolve (as necessary) the following questions, which are also in the XML file.
>>>>>>
>>>>>
>>>>>>
>>>>>> 17) <!-- [rfced] FYI: We have added expansions for the following abbreviations
>>>>>> per Section 3.6 of RFC 7322 ("RFC Style Guide"). Please review each
>>>>>> expansion in the document carefully to ensure correctness.
>>>>>>
>>>>>> Access Control Lists (ACLs)
>>>>>> Constrained Application Protocol (CoAP)
>>>>>> Internet of Things (IoT)
>>>>>> -->
>>>>>>
>>>>>>
>>>>>> 18) <!-- [rfced] Please review the "Inclusive Language" portion of the online
>>>>>> Style Guide <https://www.rfc-editor.org/styleguide/part2/#inclusive_language>
>>>>>> and let us know if any changes are needed.
>>>>>>
>>>>>> Note that our script did not flag any words in particular, but this should
>>>>>> still be reviewed as a best practice.
>>>>>> -->
>>>>>>
>>>>>
>>>>> FWIW, I did a pass through to match against the NIST inclusive language guidance and did not find anything that needed to be addressed.  Future changes may change that (not likely, but maybe).
>>>>>
>>>>> Thanks
>>>>> Scott
>>>>>
>>>>>
>>>>>
>>>>>
>>>>> ==================================
>>>>> Scott Rose NIST/CTL
>>>>> scott.rose@nist.gov
>>>>> ph: +1-301-975-8439 (w)
>>>>> +1-571-249-3761 (GoogleVoice)
>>>>> ==================================
>>>>
>>
>>
>> ==================================
>> Scott Rose NIST/CTL
>> scott.rose@nist.gov
>> ph: +1-301-975-8439 (w)
>>    +1-571-249-3761 (GoogleVoice)
>> ==================================


==================================
Scott Rose NIST/CTL
scott.rose@nist.gov
ph: +1-301-975-8439 (w)
    +1-571-249-3761 (GoogleVoice)
==================================