Re: [i2rs] Kathleen Moriarty's No Objection on draft-ietf-i2rs-yang-l3-topology-08: (with COMMENT)

"Susan Hares" <shares@ndzh.com> Mon, 23 January 2017 19:50 UTC

Return-Path: <shares@ndzh.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AD2D1129801; Mon, 23 Jan 2017 11:50:11 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.945
X-Spam-Level:
X-Spam-Status: No, score=0.945 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DOS_OUTLOOK_TO_MX=2.845] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id K9Uf5vGfVcVH; Mon, 23 Jan 2017 11:50:09 -0800 (PST)
Received: from hickoryhill-consulting.com (50-245-122-97-static.hfc.comcastbusiness.net [50.245.122.97]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D158B1297F3; Mon, 23 Jan 2017 11:50:08 -0800 (PST)
X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=50.36.161.15;
From: Susan Hares <shares@ndzh.com>
To: 'Juergen Schoenwaelder' <j.schoenwaelder@jacobs-university.de>
References: <026f01d27260$45554a10$cfffde30$@ndzh.com> <20170119153400.GA8004@elstar.local> <036401d2727f$fc114910$f433db30$@ndzh.com> <20170123083903.GB29022@elstar.local> <01ee01d27568$784b6020$68e22060$@ndzh.com> <20170123112904.GA29980@elstar.local> <B6F497AF-1610-457A-9BCE-128960C54AAA@gmail.com> <023901d27586$ad63c4f0$082b4ed0$@ndzh.com> <20170123183401.GB33438@elstar.local> <00dd01d275ab$97ff6400$c7fe2c00$@ndzh.com> <20170123191514.GB33573@elstar.local>
In-Reply-To: <20170123191514.GB33573@elstar.local>
Date: Mon, 23 Jan 2017 14:45:57 -0500
Message-ID: <011901d275b1$51574260$f405c720$@ndzh.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQG9jePVIS5uC4TbhX28EOTtM+D9KAG1tmZ1AoDFVVMBtqxAPgL2Isg2AfLRVfYCOn1PKQKeDvdTAp8FxJ8CAdLlWQJj8NkjoLqo5XA=
Content-Language: en-us
X-Authenticated-User: skh@ndzh.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/i2rs/Tup8UcOPWanLimcd153uAzwnly4>
Cc: i2rs@ietf.org, draft-ietf-i2rs-yang-l3-topology@ietf.org, 'Kathleen Moriarty' <Kathleen.Moriarty.ietf@gmail.com>, i2rs-chairs@ietf.org, 'Giles Heron' <giles.heron@gmail.com>, 'The IESG' <iesg@ietf.org>
Subject: Re: [i2rs] Kathleen Moriarty's No Objection on draft-ietf-i2rs-yang-l3-topology-08: (with COMMENT)
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 23 Jan 2017 19:50:11 -0000

Juergen: 

First of all, I posted an individual I-D to start a discussion.  I indicated to Benoit Claise that this was my personal recommendation as shepherd after looking at the problem.  I have not mandated anything.  

Second, I hear that you want to use the YANG security guidelines, but there are 6 differences between the Yang security considerations and the references in the I2RS security documents and the draft-ietf-nemod-ietf-revised-datastore-00.txt.  If you want to debate these 6 differences or the suggestions for the yang security considerations, I am still willing to continue this discussion. 

My understanding from this email messages  is that you do not want to discuss these differences and how to craft a security considerations section that addresses these differences.  

Cheerily,  Sue Hares  

-----Original Message-----
From: Juergen Schoenwaelder [mailto:j.schoenwaelder@jacobs-university.de] 
Sent: Monday, January 23, 2017 2:15 PM
To: Susan Hares
Cc: 'Giles Heron'; draft-ietf-i2rs-yang-l3-topology@ietf.org; i2rs@ietf.org; 'Kathleen Moriarty'; 'The IESG'; i2rs-chairs@ietf.org
Subject: Re: [i2rs] Kathleen Moriarty's No Objection on draft-ietf-i2rs-yang-l3-topology-08: (with COMMENT)

I suggest to use the YANG security guidelines.

Or, as Martin said, there needs to be a clear statement that these YANG models only apply to I2RS agents and nothing else.

In any case, I think you can't post an individual I-D and simply declare it guidelines others are expected to follow.

/js

On Mon, Jan 23, 2017 at 02:04:58PM -0500, Susan Hares wrote:
> Juergen: 
> 
> There are two I2RS drafts related to security:  draft-ietf-i2rs-protocol-security-requirements and draft-ietf-i2rs-security-environment-reqs-02.  The draft-ietf-i2rs-protocol-security-requirements has pass IESG review and is waiting for the RFC editor. The draft-i2rs-security-environment-reqs-02.txt has not passed WG LC.  You are correct that draft-hares-i2rs-yang-sec-consider-00.txt is an individual draft.  This individual draft is also based on draft-ietf-netmod-ietf-revised-datastores-00.txt.  
> 
> The impetus for this individual draft (draft-hares-i2rs-yang-sec-consider) was the DISCUSS by the security ADs regarding security consideration section in two drafts: draft-ietf-i2rs-yang-network-topology and draft-ietf-i2rs-yang-l3-topology-08.txt.   The draft indicates the following 6 areas where the I2RS protocol and environment security requirements differ:  1) mandatory-to-implement transport layer, 2) priority and secondary opaque identifier, 3) different data store,  4) different validations in I2RS control plane data store, 5) different NACM policy, and 6) optional insecure protocol.   None of these are handled in the current YANG security considerations template.   Items 1, 2, and 5 are specified in  draft-ietf-protocol-security-requirements plus SEC-ENV-REQ-8 AND SEC-ENV-REQ-9 from the draft-i2rs-security-environment-reqs-02.txt.  Item 5 arises out of SEC-ENV-REQ-05 and SEC-ENV-REQ-06 in the draft-ietf-i2rs-security-environment-reqs-02.txt.  Items 3 and 4 arise out of the draft-ietf-netmod-revised-datastores-00.txt.   I welcome a discussion on whether this individual draft truly represents the content of these 3 drafts.    
> 
> The individual draft tries to provide the information from the draft-ietf-i2rs-protocol-security-requirements and draft-ietf-i2rs-security-environment-reqs-02.txt in a format consistent with the current Yang Considerations model.   I welcome comments on whether this draft provides a format consistent with the current yang considerations model formats.  The purpose behind this draft is to establish a template for security considerations that the netmod/netconf experts, I2RS protocol experts, and the security ADs would accept.  The urgency for this discussion is to resolve the valid points made in the security AD's DISCUSS on these two YANG modules which are key to other YANG modules.  
> 
> Cheerily,
> Sue Hares
> 
> -----Original Message-----
> From: Juergen Schoenwaelder 
> [mailto:j.schoenwaelder@jacobs-university.de]
> Sent: Monday, January 23, 2017 1:34 PM
> To: Susan Hares
> Cc: 'Giles Heron'; draft-ietf-i2rs-yang-l3-topology@ietf.org; 
> i2rs@ietf.org; 'Kathleen Moriarty'; 'The IESG'; i2rs-chairs@ietf.org
> Subject: Re: [i2rs] Kathleen Moriarty's No Objection on 
> draft-ietf-i2rs-yang-l3-topology-08: (with COMMENT)
> 
> There are no I2RS security guidelines. We should not confuse an individual I-D with guidelines.
> 
> I believe the regular YANG security guidelines do the work.
> 
> /js
> 
> On Mon, Jan 23, 2017 at 09:40:43AM -0500, Susan Hares wrote:
> > Giles:
> > 
> >  
> > 
> > Thank you for your comments on ODL and your implementation within ODL.   There are two different issues in discussion:  guidelines for I2RS Yang modules and the application of these guidelines to the I2RS Yang Topology model.   The guidelines for the I2RS Yang Module have three security considerations: a)  basic yang considerations,  b) I2RS ephemeral state considerations, and c) insecure considerations.   Since the topology model does not operate over an insecure transport, the only thing that I believe you are questioning is the "I2RS Yang Models for Secure-Only transports".     Let's walk through the draft-ietf-i2rs-yang-l3-topology model (ietf-l3-unicast-topology) and the draft-ietf-i2rs-yang-network-topo models (ietf-network, ietf-network-topology).
> > 
> >  
> > 
> > The topology model as described in draft-ietf-i2rs-yang-network-topo-10.txt has read/write nodes at the network, link and termination point.  Please see the copy of the YHL diagrams below. Therefore, the basic topology model is read-write.  The L3 model  (draft-ietf-i2rs-yang-l3-topology-08.txt) is read write.  Please see a copy of the YHL diagrams below.  Therefore, although your implementation is read-only, the approved YANG modules are read-write.  This must be considered in the Security considerations section.  The basic requirements for I2RS are: 
> > 
> >  
> > 
> > 1) NETCONF over TLS with X.509v3 as mandatory to implement protocol,
> > 
> > 2) RESTCONF which uses HTTP over TLS with X.509v3 mutual authentication as a permissible implementation alternative. 
> > 
> > 3) write contention for two clients writing a node using I2RS 
> > priority (linked to I2RS User-ID)
> > 
> >    
> > 
> > If the ODL model does not support writes to these data models, then it would not have to support the priority mechanism to resolve two clients writing one data node.   
> > 
> >  
> > 
> > A) Basic Yang considerations
> > 
> >  
> > 
> > 1) readable nodes with sensitive data:  Kathleen Moriarty and Stephen indicate that the topology data could be considered sensitive read data.  A paragraph needs to be added to each draft indicating risks involved in providing this information, and how deployments can keep this data safe.   Privacy issues are involved if the topologies are within homes or indicate user's personal devices.   
> > 
> >  
> > 
> > If the I2RS mandatory transport is utilized, the data streams utilize mutual authentication, confidentiality, data integrity, and [practical] replay protection for I2RS messages" and support "mechanism that mitigate DoS attacks" and "DDos prevention".  This level of security is useful when protecting sensitive data.  
> > 
> >  
> > 
> > 2) writeable nodes with sensitive data:  Since the topology nodes are writeable,  a security considerations needs to consider how these sensitive data nodes will be protected.   While ODL does not support writes to any data node, the base models do. Therefore, security considerations must be written here. 
> > 
> >  
> > 
> > 3) RPCs: No new RPCs are considered, but providing information on the notification data may be also useful. 
> > 
> >  
> > 
> > I2RS YANG Model Security Considerations
> > 
> >  
> > 
> > The requirement for this section is the following information: 
> > 
> >  
> > 
> > 1) Indication of deployment requirement for mandatory-to-implement 
> > NETCONF (RFC7589) or optional RESTCONF 
> > (draft-ietf-netconf-restconf),
> > 
> > 2) Discussion of RPCs specific to I2RS control plane data store,   
> > 
> > 3) NACM policy impacts the read-write state and augmentation of NACM by access control for read/writing of routing protocols (RACM),  system information (SACM), and between datastores (config to/from ephemeral state). 
> > 
> > 4) Discussion of data retrieved from routing protocols, system 
> > information, dynamic configuration (dhcp)
> > 
> > 5) Any suggestion for operational knobs that control overlay of I2RS configuration over normal configuration and I2RS operational state over other operational state. 
> > 
> >  
> > 
> > For the topology data models (ietf-network, ietf-network-topology),  the paragraph could be: 
> > 
> >  
> > 
> > “The I2RS topology data models (ietf-network, ietf-network-topology) require mutual authentication, confidentiality, data integrity, and [practical] replay protection for I2RS messages. Therefore, there is a mandatory-to-implement transport protocol of TLS (see RFC7589), or an optional transport support of RESTCONF (draft-ietf-netconf-restconf).     This data model does not implement any additional RPCs specific to this data model or any notifications.   
> > 
> >  
> > 
> > NACM policies may restrict exterior access to this YANG model to simply read-only.  For those NACM policies allowing write-access, there is a risk that a write to a topology may create a looping topology or overload a particular node.  NACM policies may be augment by routing protocol access control methods (RACM), system data access control methods (SACM), and inter-data store access control mechanisms (DACM).  The engagement of this policy should also be control by user policy switches (on/of).  
> > 
> >  
> > 
> > For the topology mode, the access to information on interfaces may be control by SACM related to the interface model.  Any I2RS topology model termination point configuration which takes augments must take care not to cause fluctuation in the interface state.   Dynamic configuration protocols such as DHCP or DHCPv6 may also alter the IP Addresses associated with an interface.  DACM related to the inter-datastore policy on the precedence between configuration of interface IP addresses, DHCP/DHCPv6 configuration, or Topology configuration will need to make sure the interface IP address does not cause fluctuations in the system.  Deployments may provide general configuration knobs that set the default state for NACM, RACM, SACM and DACM for the topology database. “
> > 
> >  
> > 
> > For the L3 topology data models (ietf-l3-unicast-topology),  the paragraph could be: 
> > 
> >  
> > 
> > “The I2RS L3 Unicast topology data model (ietf-l3-unicast-topology) require mutual authentication, confidentiality, data integrity, and [practical] replay protection for I2RS messages. Therefore, there is a mandatory-to-implement transport protocol of NETCONF over TLS with X.509v3 mutual authentication (RFC7589), or an optional transport support of RESTCONF (draft-ietf-netconf-restconf).     This data model does not implement any additional RPCs specific to this data model.  This data model does support the following new notifications: l3-node-event, l3-link-event, l3-prefix-event, and termination-point-event.   These events provide the information about the changing L3 topology which may provide information regarding key nodes.  Since these events are only transported over secure transports that support mutual authentication, confidentiality, data integrity, and [practice] replay protection, the use of this information for DoS of an I2RS agent (aka NETCONF server) requires the mutual authenticated client to be suborned.  
> > 
> >  
> > 
> > NACM policies may restrict exterior access to this YANG model to simply read-only.  For those NACM policies allowing write-access, there is a risk that a write to a topology may create a looping topology or overload a particular node.  NACM policies may be augment by routing protocol access control methods (RACM), system data access control methods (SACM), and inter-data store access control mechanisms (DACM).  The engagement of this policy should also be control by user policy switches (on/of).  
> > 
> >  
> > 
> > For the L3 topology mode, the access to information on interfaces may be control by SACM related to the interface model.  Any I2RS topology model termination point configuration which takes augments must take care not to cause fluctuation in the interface state.   Dynamic configuration protocols such as DHCP or DHCPv6 may also alter the IP Addresses associated with an interface.  DACM related to the inter-datastore policy on the precedence between configuration of interface IP addresses, DHCP/DHCPv6 configuration, or Topology configuration will need to make sure the interface IP address does not cause fluctuations in the system.   The L3 Topology model may also read information from the routing protocols (ospf, isis or others), or write data to the routing protocol.  RACM policy should be carefully set so that the routing protocols do not form a place to launch a DoS attack.  Deployments may provide general configuration knobs that set the default state for NACM, RACM, SACM and DACM for the topology database. “
> > 
> >  
> > 
> >  
> > 
> > Hopefully, this makes the suggestion for I2RS security policy a bit more concrete.  
> > 
> >  
> > 
> > Sue Hares
> > 
> >  
> > 
> >  
> > 
> > ===========================================================
> > 
> >  
> > 
> > High-level Yang diagrams for 
> > draft-ietf-i2rs-yang-network-topo-10.txt
> > 
> >  
> > 
> >       +--rw networks
> > 
> >          +--rw network* [network-id]
> > 
> >             +--rw network-types
> > 
> >             +--rw network-id            network-id
> > 
> >             +--ro server-provided?      boolean
> > 
> >             +--rw supporting-network* [network-ref]
> > 
> >             |  +--rw network-ref    -> /networks/network/network-id
> > 
> >             +--rw node* [node-id]
> > 
> >                +--rw node-id            node-id
> > 
> >                +--rw supporting-node* [network-ref node-ref]
> > 
> >                   +--rw network-ref    -> ../../../supporting-network/ +
> > 
> >                   |                    network-ref
> > 
> >                   +--rw node-ref       -> /networks/network/node/node-id
> > 
> >  
> > 
> > module: ietf-network-topology
> > 
> > augment /nd:networks/nd:network:
> > 
> >    +--rw link* [link-id]
> > 
> >       +--rw source
> > 
> >       |  +--rw source-node?   -> ../../../nd:node/node-id
> > 
> >       |  +--rw source-tp?     -> ../../../nd:node[nd:node-id=current()/+
> > 
> >       |                       ../source-node]/termination-point/tp-id
> > 
> >       +--rw destination
> > 
> >       |  +--rw dest-node?   -> ../../../nd:node/node-id
> > 
> >       |  +--rw dest-tp?     -> ../../../nd:node[nd:node-id=current()/+
> > 
> >       |                     ../dest-node]/termination-point/tp-id
> > 
> >       +--rw link-id            link-id
> > 
> >       +--rw supporting-link* [network-ref link-ref]
> > 
> >          +--rw network-ref    -> ../../../nd:supporting-network/+
> > 
> >          |                    network-ref
> > 
> >          +--rw link-ref       -> /nd:networks/network+
> > 
> >                               
> > [nd:network-id=current()/../network-ref]/+
> > 
> >                               link/link-id
> > 
> >  
> > 
> > augment /nd:networks/nd:network/nd:node:
> > 
> >    +--rw termination-point* [tp-id]
> > 
> >       +--rw tp-id                           tp-id
> > 
> >       +--rw supporting-termination-point* [network-ref node-ref 
> > tp-ref]
> > 
> >          +--rw network-ref    -> ../../../nd:supporting-node/network-ref
> > 
> >          +--rw node-ref       -> ../../../nd:supporting-node/node-ref
> > 
> >          +--rw tp-ref         -> /nd:networks/network[nd:network-id=+
> > 
> >                               current()/../network-ref]/node+
> > 
> >                               [nd:node-id=current()/../node-ref]/+
> > 
> >                               termination-point/tp-id
> > 
> >  
> > 
> >  
> > 
> >    module: ietf-l3-unicast-topology
> > 
> >    augment /nd:networks/nd:network/nd:network-types:
> > 
> >       +--rw l3-unicast-topology!
> > 
> >    augment /nd:networks/nd:network:
> > 
> >       +--rw l3-topology-attributes
> > 
> >          +--rw name?   string
> > 
> >          +--rw flag*   l3-flag-type
> > 
> >    augment /nd:networks/nd:network/nd:node:
> > 
> >       +--rw l3-node-attributes
> > 
> >          +--rw name?        inet:domain-name
> > 
> >          +--rw flag*        node-flag-type
> > 
> >          +--rw router-id*   inet:ip-address
> > 
> >          +--rw prefix* [prefix]
> > 
> >             +--rw prefix    inet:ip-prefix
> > 
> >             +--rw metric?   uint32
> > 
> >             +--rw flag*     prefix-flag-type
> > 
> >    augment /nd:networks/nd:network/lnk:link:
> > 
> >       +--rw l3-link-attributes
> > 
> >          +--rw name?     string
> > 
> >          +--rw flag*     link-flag-type
> > 
> >          +--rw metric?   uint32
> > 
> >    augment /nd:networks/nd:network/nd:node/lnk:termination-point:
> > 
> >       +--rw l3-termination-point-attributes
> > 
> >          +--rw (termination-point-type)?
> > 
> >             +--:(ip)
> > 
> >             |  +--rw ip-address*      inet:ip-address
> > 
> >             +--:(unnumbered)
> > 
> >             |  +--rw unnumbered-id?   uint32
> > 
> >             +--:(interface-name)
> > 
> >                +--ro interface-name?  string
> > 
> >  
> > 
> >  
> > 
> >  
> > 
> >  
> > 
> >  
> > 
> > -----Original Message-----
> > From: Giles Heron [mailto:giles.heron@gmail.com]
> > Sent: Monday, January 23, 2017 6:45 AM
> > To: Juergen Schoenwaelder
> > Cc: Susan Hares; draft-ietf-i2rs-yang-l3-topology@ietf.org;
> > i2rs@ietf.org; Kathleen Moriarty; The IESG; i2rs-chairs@ietf.org
> > Subject: Re: [i2rs] Kathleen Moriarty's No Objection on
> > draft-ietf-i2rs-yang-l3-topology-08: (with COMMENT)
> > 
> >  
> > 
> > ODL does, indeed, implement the topology models, but generally the data in the topology model is operational data, so I’m not sure how that fits with “designed for the I2RS ephemeral control plane data store” - since users don’t write to the models directly (making validation, priority etc. non-issues).
> > 
> >  
> > 
> > > On 23 Jan 2017, at 11:29, Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de> wrote:
> > 
> > > 
> > 
> > > I thought the topology models are coming more or less from
> > 
> > > OpenDaylight. If so, is ODL and I2RS implementation?
> > 
> > > 
> > 
> > > /js
> > 
> > > 
> > 
> > > On Mon, Jan 23, 2017 at 06:04:28AM -0500, Susan Hares wrote:
> > 
> > >> Juergen: 
> > 
> > >> 
> > 
> > >> Let's focus on your second point.  The topology drafts are I2RS 
> > >> drafts
> > 
> > >> designed for the I2RS ephemeral control plane data store.   How can these be
> > 
> > >> generic YANG modules when the following is true: 
> > 
> > >> 
> > 
> > >> 1) I2RS Data models do not utilize the configuration data store,
> > 
> > >> 2) I2RS Data Models do not require the same validation as
> > 
> > >> configuration data store,
> > 
> > >> 3) I2RS Data models require the use of priority to handle the
> > 
> > >> multi-write contention problem into the I2RS Control Plane data
> > 
> > >> store,
> > 
> > >> 4) I2RS require TLS with X.509v3 over TCP for the
> > 
> > >> mandatory-to-implement transport,
> > 
> > >> 
> > 
> > >> Do you disagree with draft-ietf-netmod-revised-datastores?  If 
> > >> so,
> > 
> > >> the discussion should be taken up with netmod WG list.
> > 
> > >> Do you disagree with i2rs-protocol-security-requirements?  That 
> > >> issue
> > 
> > >> is closed based on IESG approval.
> > 
> > >> 
> > 
> > >> Sue Hares
> > 
> > >> 
> > 
> > >> -----Original Message-----
> > 
> > >> From: Juergen Schoenwaelder
> > 
> > >> [ <mailto:j.schoenwaelder@jacobs-university.de>
> > >> mailto:j.schoenwaelder@jacobs-university.de]
> > 
> > >> Sent: Monday, January 23, 2017 3:39 AM
> > 
> > >> To: Susan Hares
> > 
> > >> Cc: 'Kathleen Moriarty'; 'The IESG';
> > 
> > >>  <mailto:draft-ietf-i2rs-yang-l3-topology@ietf.org>
> > >> draft-ietf-i2rs-yang-l3-topology@ietf.org;  
> > >> <mailto:i2rs@ietf.org> i2rs@ietf.org;
> > 
> > >>  <mailto:i2rs-chairs@ietf.org> i2rs-chairs@ietf.org
> > 
> > >> Subject: Re: [i2rs] Kathleen Moriarty's No Objection on
> > 
> > >> draft-ietf-i2rs-yang-l3-topology-08: (with COMMENT)
> > 
> > >> 
> > 
> > >> Susan,
> > 
> > >> 
> > 
> > >> I consider tagging a YANG object statically and universally in 
> > >> the
> > 
> > >> data model as "does not need secure communication" fundamentally
> > 
> > >> flawed; I am not having an issue with insecure communication in certain deployment contexts.
> > 
> > >> 
> > 
> > >> The topology drafts are regular generic YANG models that just 
> > >> happen
> > 
> > >> to be done in I2RS - I believe that using the generic YANG 
> > >> security
> > 
> > >> guidelines we have is good enough to progress these drafts.
> > 
> > >> 
> > 
> > >> /js
> > 
> > >> 
> > 
> > >> On Thu, Jan 19, 2017 at 01:15:15PM -0500, Susan Hares wrote:
> > 
> > >>> Juergen: 
> > 
> > >>> 
> > 
> > >>> I recognize that dislike insecure communication.  You made a 
> > >>> similar
> > 
> > >>> comment during the WG LC and IETF review of
> > 
> > >>> draft-ietf-i2rs-protocol-security-requirements.  However, the
> > 
> > >>> draft-ietf-i2rs-protocol-security-requirements were passed by 
> > >>> the
> > 
> > >>> I2RS WG and approved by the IESG for RFC publication and it 
> > >>> contains
> > 
> > >>> the non-secure communication.  The mandate from the I2RS WG for 
> > >>> this
> > 
> > >>> shepherd/co-chair is clear.
> > 
> > >>> 
> > 
> > >>> As the shepherd for the topology drafts, I try to write-up 
> > >>> something
> > 
> > >>> that might address Kathleen's Moriarty's concerns about the 
> > >>> topology
> > 
> > >>> draft's security issues about privacy and the I2RS ephemeral 
> > >>> control
> > 
> > >>> plane
> > 
> > >> data
> > 
> > >>> store.   I welcome an open discussion on my ideas
> > 
> > >>> ( <https://datatracker.ietf.org/doc/draft-hares-i2rs-yang-sec-consider> https://datatracker.ietf.org/doc/draft-hares-i2rs-yang-sec-consider).
> > 
> > >> The
> > 
> > >>> yang doctor's YANG  security consideration template
> > 
> > >>> ( <https://trac.ietf.org/trac/ops/wiki/yang-security-guidelines>
> > >>> https://trac.ietf.org/trac/ops/wiki/yang-security-guidelines) 
> > >>> and
> > 
> > >>> the privacy related RFCs (RFC6973) note that some information is sensitive.
> > 
> > >>> Hopefully, this document extends these guidelines to a new data store. 
> > 
> > >>> 
> > 
> > >>> Cheerily,
> > 
> > >>> Sue Hares
> > 
> > >>> 
> > 
> > >>> -----Original Message-----
> > 
> > >>> From: Juergen Schoenwaelder
> > 
> > >>> [ <mailto:j.schoenwaelder@jacobs-university.de>
> > >>> mailto:j.schoenwaelder@jacobs-university.de]
> > 
> > >>> Sent: Thursday, January 19, 2017 10:34 AM
> > 
> > >>> To: Susan Hares
> > 
> > >>> Cc: 'Kathleen Moriarty'; 'The IESG';
> > 
> > >>>  <mailto:draft-ietf-i2rs-yang-l3-topology@ietf.org>
> > >>> draft-ietf-i2rs-yang-l3-topology@ietf.org;  
> > >>> <mailto:i2rs@ietf.org> i2rs@ietf.org;
> > 
> > >>>  <mailto:i2rs-chairs@ietf.org> i2rs-chairs@ietf.org
> > 
> > >>> Subject: Re: [i2rs] Kathleen Moriarty's No Objection on
> > 
> > >>> draft-ietf-i2rs-yang-l3-topology-08: (with COMMENT)
> > 
> > >>> 
> > 
> > >>> For what it is worth, I find the notion that data models may be
> > 
> > >>> written for a specific non-secure transport plain broken. There 
> > >>> is
> > 
> > >>> hardly any content of a data model I can think of which is 
> > >>> generally
> > 
> > >>> suitable for insecure transports.
> > 
> > >>> 
> > 
> > >>> Can we please kill this idea of _standardizing_ information that 
> > >>> is
> > 
> > >>> suitable to send over non-secure transports? I really do not see 
> > >>> how
> > 
> > >>> the IETF can make a claim that a given piece of information is 
> > >>> never
> > 
> > >>> worth protecting (= suitable for non-secure transports).
> > 
> > >>> 
> > 
> > >>> Note that I am fine if in a certain trusted tightly-coupled
> > 
> > >>> deployment information is shipped in whatever way but this is 
> > >>> then a
> > 
> > >>> property of the _deployment_ and not a property of the _information_.
> > 
> > >>> 
> > 
> > >>> /js
> > 
> > >>> 
> > 
> > >>> On Thu, Jan 19, 2017 at 09:28:14AM -0500, Susan Hares wrote:
> > 
> > >>>> Kathleen: 
> > 
> > >>>> 
> > 
> > >>>> I have written a draft suggesting a template for the I2RS YANG
> > 
> > >>>> modules
> > 
> > >>> which are designed to exist in the I2RS Ephemeral Control Plane 
> > >>> data store
> > 
> > >>> (configuration and operational state).    
> > 
> > >>>> 
> > 
> > >>>> Draft location: 
> > 
> > >>>>  
> > >>>> <https://datatracker.ietf.org/doc/draft-hares-i2rs-yang-sec-con
> > >>>> si
> > >>>> der> 
> > >>>> https://datatracker.ietf.org/doc/draft-hares-i2rs-yang-sec-cons
> > >>>> id
> > >>>> er
> > 
> > >>>> /
> > 
> > >>>> 
> > 
> > >>>> I would appreciate an email discussion with the security ADs,
> > 
> > >>>> OPS/NM ADs,
> > 
> > >>> and Routing AD (Alia Atlas).  I agree that this I2RS YANG data 
> > >>> model
> > 
> > >>> (L3) and the base I2RS topology model should both provide 
> > >>> updated
> > 
> > >>> YANG Security Considerations sections. I would appreciate if 
> > >>> Benoit
> > 
> > >>> or you hold a discuss until we sort out these issues.
> > 
> > >>>> 
> > 
> > >>>> Thank you,
> > 
> > >>>> 
> > 
> > >>>> Sue
> > 
> > >>>> 
> > 
> > >>>> -----Original Message-----
> > 
> > >>>> From: Kathleen Moriarty [
> > >>>> <mailto:Kathleen.Moriarty.ietf@gmail.com>
> > >>>> mailto:Kathleen.Moriarty.ietf@gmail.com]
> > 
> > >>>> Sent: Wednesday, January 18, 2017 9:44 PM
> > 
> > >>>> To: The IESG
> > 
> > >>>> Cc:  <mailto:draft-ietf-i2rs-yang-l3-topology@ietf.org>
> > >>>> draft-ietf-i2rs-yang-l3-topology@ietf.org;
> > >>>> <mailto:shares@ndzh.com> shares@ndzh.com;
> > 
> > >>>>  <mailto:i2rs-chairs@ietf.org> i2rs-chairs@ietf.org; 
> > >>>> <mailto:shares@ndzh.com> shares@ndzh.com;  
> > >>>> <mailto:i2rs@ietf.org> i2rs@ietf.org
> > 
> > >>>> Subject: Kathleen Moriarty's No Objection on
> > 
> > >>>> draft-ietf-i2rs-yang-l3-topology-08: (with COMMENT)
> > 
> > >>>> 
> > 
> > >>>> Kathleen Moriarty has entered the following ballot position for
> > 
> > >>>> draft-ietf-i2rs-yang-l3-topology-08: No Objection
> > 
> > >>>> 
> > 
> > >>>> When responding, please keep the subject line intact and reply 
> > >>>> to
> > 
> > >>>> all email addresses included in the To and CC lines. (Feel free 
> > >>>> to
> > 
> > >>>> cut this introductory paragraph, however.)
> > 
> > >>>> 
> > 
> > >>>> 
> > 
> > >>>> Please refer to
> > 
> > >>>>  <https://www.ietf.org/iesg/statement/discuss-criteria.html>
> > >>>> https://www.ietf.org/iesg/statement/discuss-criteria.html
> > 
> > >>>> for more information about IESG DISCUSS and COMMENT positions.
> > 
> > >>>> 
> > 
> > >>>> 
> > 
> > >>>> The document, along with other ballot positions, can be found here:
> > 
> > >>>>  
> > >>>> <https://datatracker.ietf.org/doc/draft-ietf-i2rs-yang-l3-topol
> > >>>> og
> > >>>> y/>
> > >>>> https://datatracker.ietf.org/doc/draft-ietf-i2rs-yang-l3-topolo
> > >>>> gy
> > >>>> /
> > 
> > >>>> 
> > 
> > >>>> 
> > 
> > >>>> 
> > 
> > >>>> ---------------------------------------------------------------
> > >>>> --
> > >>>> --
> > 
> > >>>> -
> > 
> > >>>> --
> > 
> > >>>> COMMENT:
> > 
> > >>>> ---------------------------------------------------------------
> > >>>> --
> > >>>> --
> > 
> > >>>> -
> > 
> > >>>> --
> > 
> > >>>> 
> > 
> > >>>> I agree with Alissa's comment that the YANG module security
> > 
> > >>>> consideration
> > 
> > >>> section guidelines need to be followed and this shouldn't go 
> > >>> forward
> > 
> > >>> until that is corrected.  I'm told it will be, thanks.
> > 
> > >>>> 
> > 
> > >>>> 
> > 
> > >>>> 
> > 
> > >>>> _______________________________________________
> > 
> > >>>> i2rs mailing list
> > 
> > >>>>  <mailto:i2rs@ietf.org> i2rs@ietf.org
> > 
> > >>>>  <https://www.ietf.org/mailman/listinfo/i2rs>
> > >>>> https://www.ietf.org/mailman/listinfo/i2rs
> > 
> > >>> 
> > 
> > >>> --
> > 
> > >>> Juergen Schoenwaelder           Jacobs University Bremen gGmbH
> > 
> > >>> Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
> > 
> > >>> Fax:   +49 421 200 3103         < <http://www.jacobs-university.de/> http://www.jacobs-university.de/>
> > 
> > >>> 
> > 
> > >> 
> > 
> > >> --
> > 
> > >> Juergen Schoenwaelder           Jacobs University Bremen gGmbH
> > 
> > >> Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
> > 
> > >> Fax:   +49 421 200 3103         < <http://www.jacobs-university.de/> http://www.jacobs-university.de/>
> > 
> > >> 
> > 
> > > 
> > 
> > > --
> > 
> > > Juergen Schoenwaelder           Jacobs University Bremen gGmbH
> > 
> > > Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
> > 
> > > Fax:   +49 421 200 3103         < <http://www.jacobs-university.de/> http://www.jacobs-university.de/>
> > 
> > > 
> > 
> > > _______________________________________________
> > 
> > > i2rs mailing list
> > 
> > >  <mailto:i2rs@ietf.org> i2rs@ietf.org
> > 
> > >  <https://www.ietf.org/mailman/listinfo/i2rs>
> > > https://www.ietf.org/mailman/listinfo/i2rs
> > 
> >  
> > 
> 
> -- 
> Juergen Schoenwaelder           Jacobs University Bremen gGmbH
> Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
> Fax:   +49 421 200 3103         <http://www.jacobs-university.de/>
> 

-- 
Juergen Schoenwaelder           Jacobs University Bremen gGmbH
Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
Fax:   +49 421 200 3103         <http://www.jacobs-university.de/>