[dhcwg] Roman Danyliw's No Objection on draft-ietf-dhc-dhcpv6-yang-24: (with COMMENT)

Roman Danyliw via Datatracker <noreply@ietf.org> Tue, 14 December 2021 23:06 UTC

Return-Path: <noreply@ietf.org>
X-Original-To: dhcwg@ietf.org
Delivered-To: dhcwg@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id B5DD53A0B35; Tue, 14 Dec 2021 15:06:24 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
From: Roman Danyliw via Datatracker <noreply@ietf.org>
To: The IESG <iesg@ietf.org>
Cc: draft-ietf-dhc-dhcpv6-yang@ietf.org, dhc-chairs@ietf.org, dhcwg@ietf.org, Timothy Winters <tim@qacafe.com>, tim@qacafe.com
X-Test-IDTracker: no
X-IETF-IDTracker: 7.41.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: Roman Danyliw <rdd@cert.org>
Message-ID: <163952318471.6405.13202229024853663670@ietfa.amsl.com>
Date: Tue, 14 Dec 2021 15:06:24 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/dhcwg/VB70DEjaaDip_SuhFJBmWDk3ztc>
Subject: [dhcwg] Roman Danyliw's No Objection on draft-ietf-dhc-dhcpv6-yang-24: (with COMMENT)
X-BeenThere: dhcwg@ietf.org
X-Mailman-Version: 2.1.29
List-Id: Dynamic Host Configuration <dhcwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dhcwg/>
List-Post: <mailto:dhcwg@ietf.org>
List-Help: <mailto:dhcwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 14 Dec 2021 23:06:25 -0000

Roman Danyliw has entered the following ballot position for
draft-ietf-dhc-dhcpv6-yang-24: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/blog/handling-iesg-ballot-positions/
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-dhc-dhcpv6-yang/



----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

Thank you to Vincent Roca for the SECDIR review.

** (Editorial) Regex constraining hex strings.  When I first read the pattern
constraining typedef duid-base (and the same is true in other places), I didn’t
appreciate that this regex was operating on a string containing a hex
representation of octets.

** There are a few places in the three yang modules where it appears that
human-readable messages are being returned.  What is the expected approach (if
any) for conveying a language tag per the guidance in Section 4.2 of BCP18?  An
incomplete list of these places are:

-- Section 4.1. grouping status and status-code-option-group has a leaf message

-- Section 4.2. rpc delete-address-lease and delete-prefix-lease return a leaf
return-message

-- Section 4.3. leaf return-message in the rpcs

** Section 4.1. grouping status has a leaf message which is explicitly
described as of “type string” and is clarified as being a “UTF-8 encoded string
... that isn’t null-terminated”.  No issues with that guidance.  I’m wonder
whether the other strings mentioned in the previous comment should also be
described in this way.

** Section 5.  Additionally threats to document would be:

-- Generalize the threat of redirecting clients to services under the
attackers’ control (e.g., DNS server or WPAP).  Say:

OLD
* Various attacks based on re-configuring the contents of DHCPv6
      options, leading to several types of security or privacy threats.
      For example, changing the address of a DNS server supplied in a
      DHCP option to point to a rogue server.

NEW
* Various attacks based on re-configuring the contents of DHCPv6 options,
leading to several types of security or privacy threats.  These options could
redirect clients to services under an attacker’s control. For example, changing
the address of a DNS server supplied in a DHCP option to point to a rogue
server.

-- Ability to read the leases from the Server or Relay could help the attacker
fingerprint device types.

OLD
These subtrees and
   data nodes can be misused to track the activity of a host:

NEW
These subtrees and data nodes can be misused to track the activity or
fingerprint the device type of the host: