Re: [i2rs] Kathleen Moriarty's No Objection on draft-ietf-i2rs-yang-l3-topology-08: (with COMMENT)

Thomas Nadeau <tnadeau@lucidvision.com> Mon, 23 January 2017 16:30 UTC

Return-Path: <tnadeau@lucidvision.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8C11A129599; Mon, 23 Jan 2017 08:30:32 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.991
X-Spam-Level:
X-Spam-Status: No, score=-1.991 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=lucidvision.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IXrl98TonTE3; Mon, 23 Jan 2017 08:30:29 -0800 (PST)
Received: from lucidvision.com (lucidab1.miniserver.com [78.31.106.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E5B7C12959B; Mon, 23 Jan 2017 08:30:27 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=lucidvision.com; s=default; t=1485188953; bh=zTFP29XeSx+LZ3YCszzcEDYVwawlJfS6djEkvZurdVI=; h=Subject:From:In-Reply-To:Date:Cc:References:To; b=XWnPm4U70aUOUUiVeEeN+kfjBTJU0qfbLDg46L9WnsP4VHKMQqmtqVApezr659zF/ rsGGIdk1hW9j26w57EgcdFF3eozi6aTaUknD0td7DqOWkFOIDh+6zFetsF2DZKPHMt HFDdQ2R0ZIVU/4F0QJzMAJlQO/fr7XG0Z4hVmaxc=
X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=50.255.148.181;
Content-Type: multipart/alternative; boundary="Apple-Mail=_C46BEAF2-8ACA-41E1-BADE-B3F21B59697A"
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
From: Thomas Nadeau <tnadeau@lucidvision.com>
In-Reply-To: <741C5CFE-3ED8-46FE-953A-8F905F184583@gmail.com>
Date: Mon, 23 Jan 2017 11:30:05 -0500
Message-Id: <6340C9C8-F2BA-4F3D-B7EE-3D9279AE6004@lucidvision.com>
References: <148479382192.2016.17507851181705214581.idtracker@ietfa.amsl.com> <026f01d27260$45554a10$cfffde30$@ndzh.com> <20170119153400.GA8004@elstar.local> <036401d2727f$fc114910$f433db30$@ndzh.com> <20170123083903.GB29022@elstar.local> <01ee01d27568$784b6020$68e22060$@ndzh.com> <20170123112904.GA29980@elstar.local> <B6F497AF-1610-457A-9BCE-128960C54AAA@gmail.com> <023901d27586$ad63c4f0$082b4ed0$@ndzh.com> <741C5CFE-3ED8-46FE-953A-8F905F184583@gmail.com>
To: Giles Heron <giles.heron@gmail.com>
X-Mailer: Apple Mail (2.3124)
X-Authenticated-User: tnadeau@lucidvision.com
X-Info: aspam skipped due to (g_smite_skip_relay)
X-Encryption: SSL encrypted
X-MyRbl: Color=Yellow Age=0 Spam=0 Notspam=4 Stars=0 Good=0 Friend=0 Surbl=0 Catch=0 r=0 ip=50.255.148.181
X-IP-stats: Notspam Incoming Last 0, First 619, in=4701, out=0, spam=0 Known=true ip=50.255.148.181
Archived-At: <https://mailarchive.ietf.org/arch/msg/i2rs/kBmlx0kAb0S9A4MkJPn4Ivn_IDw>
Cc: i2rs@ietf.org, draft-ietf-i2rs-yang-l3-topology@ietf.org, Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>, i2rs-chairs@ietf.org, Kathleen Moriarty <Kathleen.Moriarty.ietf@gmail.com>, The IESG <iesg@ietf.org>, Susan Hares <shares@ndzh.com>
Subject: Re: [i2rs] Kathleen Moriarty's No Objection on draft-ietf-i2rs-yang-l3-topology-08: (with COMMENT)
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 23 Jan 2017 16:30:32 -0000

> On Jan 23, 2017:11:25 AM, at 11:25 AM, Giles Heron <giles.heron@gmail.com> wrote:
> 
> Hi Sue,
> 
>> On 23 Jan 2017, at 14:40, Susan Hares <shares@ndzh.com <mailto:shares@ndzh.com>> wrote:
>> 
>> Giles:
>>  
>> Thank you for your comments on ODL and your implementation within ODL.   There are two different issues in discussion:  guidelines for I2RS Yang modules and the application of these guidelines to the I2RS Yang Topology model.   The guidelines for the I2RS Yang Module have three security considerations: a)  basic yang considerations,  b) I2RS ephemeral state considerations, and c) insecure considerations.   Since the topology model does not operate over an insecure transport, the only thing that I believe you are questioning is the "I2RS Yang Models for Secure-Only transports".     Let's walk through the draft-ietf-i2rs-yang-l3-topology model (ietf-l3-unicast-topology) and the draft-ietf-i2rs-yang-network-topo models (ietf-network, ietf-network-topology).
> 
> i wasn’t the implementer of those models in ODL.   But I’ve used them a fair bit.
> 
> at any rate applying the I2RS security guidelines to the I2RS YANG topology model is a bit tricky IMHO as the topology model doesn’t really “fit” with the original goal of I2RS (ephemeral configuration of RIBs, ACLs etc. on network elements)

	I totally agree. The model was and is currently used as just that and without any of the I2RS semantics.  There are examples other than ODL too.

>> 
>> The topology model as described in draft-ietf-i2rs-yang-network-topo-10.txt has read/write nodes at the network, link and termination point.  Please see the copy of the YHL diagrams below. Therefore, the basic topology model is read-write.  The L3 model  (draft-ietf-i2rs-yang-l3-topology-08.txt) is read write.  Please see a copy of the YHL diagrams below.  Therefore, although your implementation is read-only, the approved YANG modules are read-write.  This must be considered in the Security considerations section.  The basic requirements for I2RS are: 
> 
> Sure - the models are read/write but ODL’s implementation is generally read-only (as I understand it, it’s down to each individual protocol or application that leverages the models to decide whether to use them in read-write or read-only mode).
> 
>> 1) NETCONF over TLS with X.509v3 as mandatory to implement protocol, 
> 
> most NETCONF implementations I’m aware of use ssh.

	+1.  Again this is a model. Trying to hoist semantics from I2RS is ill advised as the model is used in many places that are absent of anything I2RS.

	—Tom


> And this is mandatory only per an individual ID, right?   Or is it in a WG draft now?  And do we have WG consensus that this applies to read-only data as well as to read-write?
> 
>> 2) RESTCONF which uses HTTP over TLS with X.509v3 mutual authentication as a permissible implementation alternative. 
> 
> again isn’t that only specified as mandatory in an individual ID?
> 
>> 3) write contention for two clients writing a node using I2RS priority (linked to I2RS User-ID) 
> 
> so that one isn’t an issue for read-only implementations…
> 
>> If the ODL model does not support writes to these data models, then it would not have to support the priority mechanism to resolve two clients writing one data node.   
> 
> indeed.
> 
> Giles
> 
>> A) Basic Yang considerations 
>>  
>> 1) readable nodes with sensitive data:  Kathleen Moriarty and Stephen indicate that the topology data could be considered sensitive read data.  A paragraph needs to be added to each draft indicating risks involved in providing this information, and how deployments can keep this data safe.   Privacy issues are involved if the topologies are within homes or indicate user's personal devices.   
>>  
>> If the I2RS mandatory transport is utilized, the data streams utilize mutual authentication, confidentiality, data integrity, and [practical] replay protection for I2RS messages" and support "mechanism that mitigate DoS attacks" and "DDos prevention".  This level of security is useful when protecting sensitive data.  
>>  
>> 2) writeable nodes with sensitive data:  Since the topology nodes are writeable,  a security considerations needs to consider how these sensitive data nodes will be protected.   While ODL does not support writes to any data node, the base models do. Therefore, security considerations must be written here. 
>>  
>> 3) RPCs: No new RPCs are considered, but providing information on the notification data may be also useful. 
>>  
>> I2RS YANG Model Security Considerations
>>  
>> The requirement for this section is the following information: 
>>  
>> 1) Indication of deployment requirement for mandatory-to-implement NETCONF (RFC7589) or optional RESTCONF (draft-ietf-netconf-restconf), 
>> 2) Discussion of RPCs specific to I2RS control plane data store,   
>> 3) NACM policy impacts the read-write state and augmentation of NACM by access control for read/writing of routing protocols (RACM),  system information (SACM), and between datastores (config to/from ephemeral state). 
>> 4) Discussion of data retrieved from routing protocols, system information, dynamic configuration (dhcp) 
>> 5) Any suggestion for operational knobs that control overlay of I2RS configuration over normal configuration and I2RS operational state over other operational state. 
>>  
>> For the topology data models (ietf-network, ietf-network-topology),  the paragraph could be: 
>>  
>> “The I2RS topology data models (ietf-network, ietf-network-topology) require mutual authentication, confidentiality, data integrity, and [practical] replay protection for I2RS messages. Therefore, there is a mandatory-to-implement transport protocol of TLS (see RFC7589), or an optional transport support of RESTCONF (draft-ietf-netconf-restconf).     This data model does not implement any additional RPCs specific to this data model or any notifications.   
>>  
>> NACM policies may restrict exterior access to this YANG model to simply read-only.  For those NACM policies allowing write-access, there is a risk that a write to a topology may create a looping topology or overload a particular node.  NACM policies may be augment by routing protocol access control methods (RACM), system data access control methods (SACM), and inter-data store access control mechanisms (DACM).  The engagement of this policy should also be control by user policy switches (on/of).  
>>  
>> For the topology mode, the access to information on interfaces may be control by SACM related to the interface model.  Any I2RS topology model termination point configuration which takes augments must take care not to cause fluctuation in the interface state.   Dynamic configuration protocols such as DHCP or DHCPv6 may also alter the IP Addresses associated with an interface.  DACM related to the inter-datastore policy on the precedence between configuration of interface IP addresses, DHCP/DHCPv6 configuration, or Topology configuration will need to make sure the interface IP address does not cause fluctuations in the system.  Deployments may provide general configuration knobs that set the default state for NACM, RACM, SACM and DACM for the topology database. “
>>  
>> For the L3 topology data models (ietf-l3-unicast-topology),  the paragraph could be: 
>>  
>> “The I2RS L3 Unicast topology data model (ietf-l3-unicast-topology) require mutual authentication, confidentiality, data integrity, and [practical] replay protection for I2RS messages. Therefore, there is a mandatory-to-implement transport protocol of NETCONF over TLS with X.509v3 mutual authentication (RFC7589), or an optional transport support of RESTCONF (draft-ietf-netconf-restconf).     This data model does not implement any additional RPCs specific to this data model.  This data model does support the following new notifications: l3-node-event, l3-link-event, l3-prefix-event, and termination-point-event.   These events provide the information about the changing L3 topology which may provide information regarding key nodes.  Since these events are only transported over secure transports that support mutual authentication, confidentiality, data integrity, and [practice] replay protection, the use of this information for DoS of an I2RS agent (aka NETCONF server) requires the mutual authenticated client to be suborned.  
>>  
>> NACM policies may restrict exterior access to this YANG model to simply read-only.  For those NACM policies allowing write-access, there is a risk that a write to a topology may create a looping topology or overload a particular node.  NACM policies may be augment by routing protocol access control methods (RACM), system data access control methods (SACM), and inter-data store access control mechanisms (DACM).  The engagement of this policy should also be control by user policy switches (on/of).  
>>  
>> For the L3 topology mode, the access to information on interfaces may be control by SACM related to the interface model.  Any I2RS topology model termination point configuration which takes augments must take care not to cause fluctuation in the interface state.   Dynamic configuration protocols such as DHCP or DHCPv6 may also alter the IP Addresses associated with an interface.  DACM related to the inter-datastore policy on the precedence between configuration of interface IP addresses, DHCP/DHCPv6 configuration, or Topology configuration will need to make sure the interface IP address does not cause fluctuations in the system.   The L3 Topology model may also read information from the routing protocols (ospf, isis or others), or write data to the routing protocol.  RACM policy should be carefully set so that the routing protocols do not form a place to launch a DoS attack.  Deployments may provide general configuration knobs that set the default state for NACM, RACM, SACM and DACM for the topology database. “
>>  
>>  
>> Hopefully, this makes the suggestion for I2RS security policy a bit more concrete. 
> 
>> Sue Hares 
>>  
>>  
>> ===========================================================
>>  
>> High-level Yang diagrams for draft-ietf-i2rs-yang-network-topo-10.txt 
>>  
>>       +--rw networks
>>          +--rw network* [network-id]
>>             +--rw network-types
>>             +--rw network-id            network-id
>>             +--ro server-provided?      boolean
>>             +--rw supporting-network* [network-ref]
>>             |  +--rw network-ref    -> /networks/network/network-id
>>             +--rw node* [node-id]
>>                +--rw node-id            node-id
>>                +--rw supporting-node* [network-ref node-ref]
>>                   +--rw network-ref    -> ../../../supporting-network/ +
>>                   |                    network-ref
>>                   +--rw node-ref       -> /networks/network/node/node-id
>>  
>> module: ietf-network-topology
>> augment /nd:networks/nd:network:
>>    +--rw link* [link-id]
>>       +--rw source
>>       |  +--rw source-node?   -> ../../../nd:node/node-id
>>       |  +--rw source-tp?     -> ../../../nd:node[nd:node-id=current()/+
>>       |                       ../source-node]/termination-point/tp-id
>>       +--rw destination
>>       |  +--rw dest-node?   -> ../../../nd:node/node-id
>>       |  +--rw dest-tp?     -> ../../../nd:node[nd:node-id=current()/+
>>       |                     ../dest-node]/termination-point/tp-id
>>       +--rw link-id            link-id
>>       +--rw supporting-link* [network-ref link-ref]
>>          +--rw network-ref    -> ../../../nd:supporting-network/+
>>          |                    network-ref
>>          +--rw link-ref       -> /nd:networks/network+
>>                               [nd:network-id=current()/../network-ref]/+
>>                               link/link-id
>>  
>> augment /nd:networks/nd:network/nd:node:
>>    +--rw termination-point* [tp-id]
>>       +--rw tp-id                           tp-id
>>       +--rw supporting-termination-point* [network-ref node-ref tp-ref]
>>          +--rw network-ref    -> ../../../nd:supporting-node/network-ref
>>          +--rw node-ref       -> ../../../nd:supporting-node/node-ref
>>          +--rw tp-ref         -> /nd:networks/network[nd:network-id=+
>>                               current()/../network-ref]/node+
>>                               [nd:node-id=current()/../node-ref]/+
>>                               termination-point/tp-id
>>  
>>  
>>    module: ietf-l3-unicast-topology
>>    augment /nd:networks/nd:network/nd:network-types:
>>       +--rw l3-unicast-topology!
>>    augment /nd:networks/nd:network:
>>       +--rw l3-topology-attributes
>>          +--rw name?   string
>>          +--rw flag*   l3-flag-type
>>    augment /nd:networks/nd:network/nd:node:
>>       +--rw l3-node-attributes
>>          +--rw name?        inet:domain-name
>>          +--rw flag*        node-flag-type
>>          +--rw router-id*   inet:ip-address
>>          +--rw prefix* [prefix]
>>             +--rw prefix    inet:ip-prefix
>>             +--rw metric?   uint32
>>             +--rw flag*     prefix-flag-type
>>    augment /nd:networks/nd:network/lnk:link:
>>       +--rw l3-link-attributes
>>          +--rw name?     string
>>          +--rw flag*     link-flag-type
>>          +--rw metric?   uint32
>>    augment /nd:networks/nd:network/nd:node/lnk:termination-point:
>>       +--rw l3-termination-point-attributes
>>          +--rw (termination-point-type)?
>>             +--:(ip)
>>             |  +--rw ip-address*      inet:ip-address
>>             +--:(unnumbered)
>>             |  +--rw unnumbered-id?   uint32
>>             +--:(interface-name)
>>                +--ro interface-name?  string
>>  
>>  
>>  
>>  
>>  
>> -----Original Message-----
>> From: Giles Heron [mailto:giles.heron@gmail.com <mailto:giles.heron@gmail.com>] 
>> Sent: Monday, January 23, 2017 6:45 AM
>> To: Juergen Schoenwaelder
>> Cc: Susan Hares; draft-ietf-i2rs-yang-l3-topology@ietf.org <mailto:draft-ietf-i2rs-yang-l3-topology@ietf.org>; i2rs@ietf.org <mailto:i2rs@ietf.org>; Kathleen Moriarty; The IESG; i2rs-chairs@ietf.org <mailto:i2rs-chairs@ietf.org>
>> Subject: Re: [i2rs] Kathleen Moriarty's No Objection on draft-ietf-i2rs-yang-l3-topology-08: (with COMMENT)
>>  
>> ODL does, indeed, implement the topology models, but generally the data in the topology model is operational data, so I’m not sure how that fits with “designed for the I2RS ephemeral control plane data store” - since users don’t write to the models directly (making validation, priority etc. non-issues).
>>  
>> > On 23 Jan 2017, at 11:29, Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de <mailto:j.schoenwaelder@jacobs-university.de>> wrote:
>> > 
>> > I thought the topology models are coming more or less from 
>> > OpenDaylight. If so, is ODL and I2RS implementation?
>> > 
>> > /js
>> > 
>> > On Mon, Jan 23, 2017 at 06:04:28AM -0500, Susan Hares wrote:
>> >> Juergen: 
>> >> 
>> >> Let's focus on your second point.  The topology drafts are I2RS drafts
>> >> designed for the I2RS ephemeral control plane data store.   How can these be
>> >> generic YANG modules when the following is true: 
>> >> 
>> >> 1) I2RS Data models do not utilize the configuration data store,
>> >> 2) I2RS Data Models do not require the same validation as 
>> >> configuration data store,
>> >> 3) I2RS Data models require the use of priority to handle the 
>> >> multi-write contention problem into the I2RS Control Plane data 
>> >> store,
>> >> 4) I2RS require TLS with X.509v3 over TCP for the 
>> >> mandatory-to-implement transport,
>> >> 
>> >> Do you disagree with draft-ietf-netmod-revised-datastores?  If so,  
>> >> the discussion should be taken up with netmod WG list.
>> >> Do you disagree with i2rs-protocol-security-requirements?  That issue 
>> >> is closed based on IESG approval.
>> >> 
>> >> Sue Hares
>> >> 
>> >> -----Original Message-----
>> >> From: Juergen Schoenwaelder 
>> >> [mailto:j.schoenwaelder@jacobs-university.de <mailto:j.schoenwaelder@jacobs-university.de>]
>> >> Sent: Monday, January 23, 2017 3:39 AM
>> >> To: Susan Hares
>> >> Cc: 'Kathleen Moriarty'; 'The IESG';
>> >> draft-ietf-i2rs-yang-l3-topology@ietf.org <mailto:draft-ietf-i2rs-yang-l3-topology@ietf.org>; i2rs@ietf.org <mailto:i2rs@ietf.org>; 
>> >> i2rs-chairs@ietf.org <mailto:i2rs-chairs@ietf.org>
>> >> Subject: Re: [i2rs] Kathleen Moriarty's No Objection on
>> >> draft-ietf-i2rs-yang-l3-topology-08: (with COMMENT)
>> >> 
>> >> Susan,
>> >> 
>> >> I consider tagging a YANG object statically and universally in the 
>> >> data model as "does not need secure communication" fundamentally 
>> >> flawed; I am not having an issue with insecure communication in certain deployment contexts.
>> >> 
>> >> The topology drafts are regular generic YANG models that just happen 
>> >> to be done in I2RS - I believe that using the generic YANG security 
>> >> guidelines we have is good enough to progress these drafts.
>> >> 
>> >> /js
>> >> 
>> >> On Thu, Jan 19, 2017 at 01:15:15PM -0500, Susan Hares wrote:
>> >>> Juergen: 
>> >>> 
>> >>> I recognize that dislike insecure communication.  You made a similar 
>> >>> comment during the WG LC and IETF review of 
>> >>> draft-ietf-i2rs-protocol-security-requirements.  However, the 
>> >>> draft-ietf-i2rs-protocol-security-requirements were passed by the 
>> >>> I2RS WG and approved by the IESG for RFC publication and it contains 
>> >>> the non-secure communication.  The mandate from the I2RS WG for this 
>> >>> shepherd/co-chair is clear.
>> >>> 
>> >>> As the shepherd for the topology drafts, I try to write-up something 
>> >>> that might address Kathleen's Moriarty's concerns about the topology 
>> >>> draft's security issues about privacy and the I2RS ephemeral control 
>> >>> plane
>> >> data
>> >>> store.   I welcome an open discussion on my ideas
>> >>> (https://datatracker.ietf.org/doc/draft-hares-i2rs-yang-sec-consider <https://datatracker.ietf.org/doc/draft-hares-i2rs-yang-sec-consider>).
>> >> The
>> >>> yang doctor's YANG  security consideration template
>> >>> (https://trac.ietf.org/trac/ops/wiki/yang-security-guidelines <https://trac.ietf.org/trac/ops/wiki/yang-security-guidelines>) and 
>> >>> the privacy related RFCs (RFC6973) note that some information is sensitive.
>> >>> Hopefully, this document extends these guidelines to a new data store. 
>> >>> 
>> >>> Cheerily,
>> >>> Sue Hares
>> >>> 
>> >>> -----Original Message-----
>> >>> From: Juergen Schoenwaelder
>> >>> [mailto:j.schoenwaelder@jacobs-university.de <mailto:j.schoenwaelder@jacobs-university.de>]
>> >>> Sent: Thursday, January 19, 2017 10:34 AM
>> >>> To: Susan Hares
>> >>> Cc: 'Kathleen Moriarty'; 'The IESG'; 
>> >>> draft-ietf-i2rs-yang-l3-topology@ietf.org <mailto:draft-ietf-i2rs-yang-l3-topology@ietf.org>; i2rs@ietf.org <mailto:i2rs@ietf.org>; 
>> >>> i2rs-chairs@ietf.org <mailto:i2rs-chairs@ietf.org>
>> >>> Subject: Re: [i2rs] Kathleen Moriarty's No Objection on
>> >>> draft-ietf-i2rs-yang-l3-topology-08: (with COMMENT)
>> >>> 
>> >>> For what it is worth, I find the notion that data models may be 
>> >>> written for a specific non-secure transport plain broken. There is 
>> >>> hardly any content of a data model I can think of which is generally 
>> >>> suitable for insecure transports.
>> >>> 
>> >>> Can we please kill this idea of _standardizing_ information that is 
>> >>> suitable to send over non-secure transports? I really do not see how 
>> >>> the IETF can make a claim that a given piece of information is never 
>> >>> worth protecting (= suitable for non-secure transports).
>> >>> 
>> >>> Note that I am fine if in a certain trusted tightly-coupled 
>> >>> deployment information is shipped in whatever way but this is then a 
>> >>> property of the _deployment_ and not a property of the _information_.
>> >>> 
>> >>> /js
>> >>> 
>> >>> On Thu, Jan 19, 2017 at 09:28:14AM -0500, Susan Hares wrote:
>> >>>> Kathleen: 
>> >>>> 
>> >>>> I have written a draft suggesting a template for the I2RS YANG 
>> >>>> modules
>> >>> which are designed to exist in the I2RS Ephemeral Control Plane data store
>> >>> (configuration and operational state).    
>> >>>> 
>> >>>> Draft location: 
>> >>>> https://datatracker.ietf.org/doc/draft-hares-i2rs-yang-sec-consider <https://datatracker.ietf.org/doc/draft-hares-i2rs-yang-sec-consider>
>> >>>> /
>> >>>> 
>> >>>> I would appreciate an email discussion with the security ADs, 
>> >>>> OPS/NM ADs,
>> >>> and Routing AD (Alia Atlas).  I agree that this I2RS YANG data model
>> >>> (L3) and the base I2RS topology model should both provide updated 
>> >>> YANG Security Considerations sections. I would appreciate if Benoit 
>> >>> or you hold a discuss until we sort out these issues.
>> >>>> 
>> >>>> Thank you,
>> >>>> 
>> >>>> Sue
>> >>>> 
>> >>>> -----Original Message-----
>> >>>> From: Kathleen Moriarty [mailto:Kathleen.Moriarty.ietf@gmail.com <mailto:Kathleen.Moriarty.ietf@gmail.com>]
>> >>>> Sent: Wednesday, January 18, 2017 9:44 PM
>> >>>> To: The IESG
>> >>>> Cc: draft-ietf-i2rs-yang-l3-topology@ietf.org <mailto:draft-ietf-i2rs-yang-l3-topology@ietf.org>; shares@ndzh.com <mailto:shares@ndzh.com>; 
>> >>>> i2rs-chairs@ietf.org <mailto:i2rs-chairs@ietf.org>; shares@ndzh.com <mailto:shares@ndzh.com>; i2rs@ietf.org <mailto:i2rs@ietf.org>
>> >>>> Subject: Kathleen Moriarty's No Objection on
>> >>>> draft-ietf-i2rs-yang-l3-topology-08: (with COMMENT)
>> >>>> 
>> >>>> Kathleen Moriarty has entered the following ballot position for
>> >>>> draft-ietf-i2rs-yang-l3-topology-08: No Objection
>> >>>> 
>> >>>> When responding, please keep the subject line intact and reply to 
>> >>>> all email addresses included in the To and CC lines. (Feel free to 
>> >>>> cut this introductory paragraph, however.)
>> >>>> 
>> >>>> 
>> >>>> Please refer to
>> >>>> https://www.ietf.org/iesg/statement/discuss-criteria.html <https://www.ietf.org/iesg/statement/discuss-criteria.html>
>> >>>> for more information about IESG DISCUSS and COMMENT positions.
>> >>>> 
>> >>>> 
>> >>>> The document, along with other ballot positions, can be found here:
>> >>>> https://datatracker.ietf.org/doc/draft-ietf-i2rs-yang-l3-topology/ <https://datatracker.ietf.org/doc/draft-ietf-i2rs-yang-l3-topology/>
>> >>>> 
>> >>>> 
>> >>>> 
>> >>>> -------------------------------------------------------------------
>> >>>> -
>> >>>> --
>> >>>> COMMENT:
>> >>>> -------------------------------------------------------------------
>> >>>> -
>> >>>> --
>> >>>> 
>> >>>> I agree with Alissa's comment that the YANG module security 
>> >>>> consideration
>> >>> section guidelines need to be followed and this shouldn't go forward 
>> >>> until that is corrected.  I'm told it will be, thanks.
>> >>>> 
>> >>>> 
>> >>>> 
>> >>>> _______________________________________________
>> >>>> i2rs mailing list
>> >>>> i2rs@ietf.org <mailto:i2rs@ietf.org>
>> >>>> https://www.ietf.org/mailman/listinfo/i2rs <https://www.ietf.org/mailman/listinfo/i2rs>
>> >>> 
>> >>> -- 
>> >>> Juergen Schoenwaelder           Jacobs University Bremen gGmbH
>> >>> Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
>> >>> Fax:   +49 421 200 3103         <http://www.jacobs-university.de/ <http://www.jacobs-university.de/>>
>> >>> 
>> >> 
>> >> -- 
>> >> Juergen Schoenwaelder           Jacobs University Bremen gGmbH
>> >> Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
>> >> Fax:   +49 421 200 3103         <http://www.jacobs-university.de/ <http://www.jacobs-university.de/>>
>> >> 
>> > 
>> > -- 
>> > Juergen Schoenwaelder           Jacobs University Bremen gGmbH
>> > Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
>> > Fax:   +49 421 200 3103         <http://www.jacobs-university.de/ <http://www.jacobs-university.de/>>
>> > 
>> > _______________________________________________
>> > i2rs mailing list
>> > i2rs@ietf.org <mailto:i2rs@ietf.org>
>> > https://www.ietf.org/mailman/listinfo/i2rs <https://www.ietf.org/mailman/listinfo/i2rs>
> _______________________________________________
> i2rs mailing list
> i2rs@ietf.org
> https://www.ietf.org/mailman/listinfo/i2rs