Re: [netconf] AD review of draft-ietf-netconf-trust-anchors-20

"Rob Wilton (rwilton)" <rwilton@cisco.com> Fri, 23 June 2023 10:35 UTC

Return-Path: <rwilton@cisco.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7A0E1C14CE29; Fri, 23 Jun 2023 03:35:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.595
X-Spam-Level:
X-Spam-Status: No, score=-14.595 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H5=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b="T9kJnEII"; dkim=pass (1024-bit key) header.d=cisco.com header.b="AeqhonMM"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id owPZ78OkHuNK; Fri, 23 Jun 2023 03:35:37 -0700 (PDT)
Received: from alln-iport-4.cisco.com (alln-iport-4.cisco.com [173.37.142.91]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 55DAFC14F747; Fri, 23 Jun 2023 03:35:37 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=66934; q=dns/txt; s=iport; t=1687516537; x=1688726137; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=M9+nYtA1J6In06IYDQdpbl6syAJzCl3oqKgigciP5mM=; b=T9kJnEIIvJ35d1pG9/gy7A1tR449fVmbxKWYu1nkWIz90CEv/sswEQqx SENHqEKuZsoUyiWO/i3vxvpaLFv73t1FfZjZQqVI0xbuVOahJzgNCbqcA a/IGFD9NbvditY/J6bHsC383PI6LpZb+7XmM6FJ9LgojoNGSsZSYRRWLT k=;
X-IPAS-Result: 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
IronPort-PHdr: A9a23:eUM1ZRfCgHUl6vMWZNeLHUgBlGM/foqcDmcuAtIPgrZKdOGk55v9e RGZ7vR2h1iPVoLeuLpIiOvT5rjpQndIoY2Av3YLbIFWWlcbhN8XkQ0tDI/NCUDyIPPwKS1vN M9DT1RiuXq8NBsdA97wMmXbuWb69jsOAlP6PAtxKP7yH9vIkMWzy+e005bSeA5PwjG6ZOA6I BC/tw6ErsANmsMiMvMo1xLTq31UeuJbjW9pPgeVmBDxp4+8qZVi6C9X/fkm8qZ9
IronPort-Data: A9a23:FfnTJKrS3iPRkEjS056bAgqWEApeBmIyZRIvgKrLsJaIsI4StFCzt garIBmHPPiMajP2etByYNnn9UwCu57Un9JqSQc9rywwECMSp+PIVI+TRqvS04x+DSFioGZPt Zh2hgzodZhsJpPkjk7xdOCn9xGQ7InQLlbGILas1htZG0k8EU/NtTo5w7Ri2tAy2oDga++wk YqaT/P3aQfNNwFcagr424rbwP+4lK2v0N+wlgVWicFj5DcypVFMZH4sDf3Zw0/Df2VhNrXSq 9AvY12O1jixEx8FUrtJm1tgG6EAaua60QOm0hK6V0U+6/RPjnRa70o1CBYTQVZoyAWZsM9D9 PVckoWZZ18pH6z2h81IBnG0EwkmVUFH0LbDJX76usuJwgiYNXDt2P5pSkoxOOX0+M4uXjoIr qJecWtLN0vS7w616OrTpu1EnNsiKNXsOqsUu2prynfSCvNOrZXrGv+QvIEIh2lu7ixINfXGQ 8QSdxNrVTHjYDlNZQgPB4M5xt790xETdBUB+A7K+sLb+VP7wBZ43qSoMdfJdJmMSNlemUCW4 37c4n/lRxgcP9yY0yHD+3aoru7CgS29X5gdfJW+++Jhh1ud7m0eFBNQUkG0ycRVkWa3X9ZZb kcT4Cdr8+459VegSZ/2WBjQTGO4UgA0SuUTI/0V9zOx6rvz+i+3XmglTwReQYlz3CMpfgAC2 liMltLvIDVgtryJVH6Qnot4SxvvZ0D5ykdfO0c5oRs5D8rL+9tj006TJjp3OOvk0ICkSGmYL yWi8XBWulkFsSIcO0xXF3joiiior57FJuLezlqKBj7+hu+ViXLMWmBFwVHf6fAFJ4GDQxzf+ nMFgMOZqusJCPlhdRBhos1TRdlFBN7cb1UwZGKD+bF6qFxBHFb4LOhtDMlWfhsBDyr9UWaBj LXvkQ1Q/oRPG3ChcLV6ZYm8Y+xzk/i/SYm1CKuKNooTCnSUSONh1H82DaJ39z61+HXAbYlkU XtmWZ/2VC1DWfgPIMSeHr1BjtfHORzSNUuKFcykkHxLIJKVZWWeTv8eIUCSY+UihJ5oUy2Lm +uzw/Cikk0FOMWnO3G/2ddKfTgicyNhbbio8JM/SwJ2Clc8cI3XI6WPkepJlk0Mt/k9q9okC VnmAhUIkgWh3SKXQehIA1g6AI7SsV9EhStTFQQnPE2j3D4oZoPH0UvVX8JfkWUPnAC78cNJc g==
IronPort-HdrOrdr: A9a23:4l/12av6xVJ9wFJOxxFm18r67skCxIMji2hC6mlwRA09TyXGra GTdaUguyMc1gx/ZJh5o6H+BEDhexnhHZ4c2/h3AV7QZniZhILIFvAu0WKG+V3d8kLFh5VgPM tbAs1D4ZjLfCRHZKXBkUWF+rQbsaO6GcmT7I+0owYPPGNXguNbnnpE422gYytLrXx9dOIE/e 2nl7N6TlSbCBAqh8KAa0UtbqzmnZnmhZjmaRkJC1oM8w+Vlw6l77b8Dlyxwgoeeykn+8ZtzU H11yjCoomzufCyzRHRk0XJ6Y5NpdfnwtxfQOSRl8kuLCn2gArAXvUhZ1TChkF0nAic0idprD D+mWZkAy210QKUQoiBm2qv5+An6kdo15at8y7fvZKpm72JeNtzMbswuWseSGqX16Ll1+sMiJ 6iGAmixsNqJAKFkyLn69fSURZ20kKyvHo5iOYWy2dSSI0EddZq3MQiFW5uYeE99RjBmckaOf grCNuZ6OddcFucYXyctm5zwMa0VnB2GhudWEANtsGczjATxRlCvgEl7d1amm1F+IM2SpFC6e iBOqN0lKtWRstTaa5mHu8OTca+F2SISxPRN2CZJ0jhCcg8Sjnwgo+y5K9w6PCheZQOwpd3kJ PdUElAvWp3YE7qAd3m5uw9zvkMehTIYd3A8LAq23EigMyOeFPCC1zwdGwT
X-Talos-CUID: 9a23:h1hlr2tFFgOfMGwJ0ei5hXqX6Is0TT7t3FjPEXOYGEFwYZPNSX6RwrxNxp8=
X-Talos-MUID: 9a23:6IDsiARdR+p9TnO8RXTvnBVsP9lB552LK0Mpk8pZo8aVMnZJbmI=
X-IronPort-Anti-Spam-Filtered: true
Received: from alln-core-6.cisco.com ([173.36.13.139]) by alln-iport-4.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 23 Jun 2023 10:35:35 +0000
Received: from alln-opgw-5.cisco.com (alln-opgw-5.cisco.com [173.37.147.253]) by alln-core-6.cisco.com (8.15.2/8.15.2) with ESMTPS id 35NAZZ5Q016171 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Fri, 23 Jun 2023 10:35:35 GMT
Authentication-Results: alln-opgw-5.cisco.com; dkim=pass (signature verified) header.i=@cisco.com; spf=Pass smtp.mailfrom=rwilton@cisco.com; dmarc=pass (p=quarantine dis=none) d=cisco.com
X-IronPort-AV: E=Sophos;i="6.01,151,1684800000"; d="scan'208,217";a="3379025"
Received: from mail-bn8nam12lp2176.outbound.protection.outlook.com (HELO NAM12-BN8-obe.outbound.protection.outlook.com) ([104.47.55.176]) by alln-opgw-5.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 23 Jun 2023 10:35:34 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=LtNtB02fJ6K9XSeK6U6mCviNxDldnrWRyCEDK8RTwS9R0Egtul33q73f8W0TfJ9qDdhnZW+T4xv8OsVlRFX3Dk6xXRvXPt3E7blEZHoTZRkkI2hx5qKPHdp1CwqpdiR6zgxPEMC5oXc+AJ9kUBq3PHf2pW71WGOktKyF2CEDtBbZFVSXcIvf3qqITk3/p4pAX7oT702tNpCFRtqLfuxeftDFzq0O11rga+l45eewt08u4a5sxbJhjAlUTE5WEkXmmbDWTI0+D/d2QLOHsaK97FCRjWeb4k0PIdBOcVsIozyadcmIyuNC2xEwc87eC9i1IhqzGfWn2fWBU70wVt8VWg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=emXfGZA1fUeO4KfEO56966cyU0Vdn4Gr6UufL0OueKY=; b=SUrxQm0lT/sw1J+ALFEFqeJS29iI68I58YKzSa1kWvH+IcFwlkSJX6ut5qzGxONlmB1ziFmNrRHuvweX9mTZ3B67PViInbApF1BscHvzCcrIvQAQbOQwjj4I/O8iC+GvU7rcjiSZltuhMoTe0ycoQXdfaubZcPcm8jtgJ4trZA2UKqWbfHkSwgKXdRQ6Y0UZxqbYHruejIb+HzbU+f4OaO/CnO/4ubhrXNjaG5Ut8Fyssn7p/fdrDeN3LeF2FCVDw8f43v6YOG07vAwy3NtMXq2/F8ED8aQPCmQE6FFxFwoW/nsaLw11Az9r7NPMTBXQamJ9KmmBhK70QiTjQqayuw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=emXfGZA1fUeO4KfEO56966cyU0Vdn4Gr6UufL0OueKY=; b=AeqhonMMObLNPsdfflWTs2EKLHcOdjt1FwKbIHdnZaohzcrpNMq3MpbB+DojxjJNPfE+QtEu1bovt0HZovn0bw/qjGgLPNWsDMjUxtCii7h9eUdQG/13ELwr/Tv1Cm7XALJzR0gGjrWl8Fd4kiRQZfAWqTzdtyWPICSmgb626bs=
Received: from BY5PR11MB4196.namprd11.prod.outlook.com (2603:10b6:a03:1ce::13) by PH7PR11MB7052.namprd11.prod.outlook.com (2603:10b6:510:20f::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6521.24; Fri, 23 Jun 2023 10:35:32 +0000
Received: from BY5PR11MB4196.namprd11.prod.outlook.com ([fe80::a6a3:7e3b:903b:2035]) by BY5PR11MB4196.namprd11.prod.outlook.com ([fe80::a6a3:7e3b:903b:2035%5]) with mapi id 15.20.6521.024; Fri, 23 Jun 2023 10:35:32 +0000
From: "Rob Wilton (rwilton)" <rwilton@cisco.com>
To: Kent Watsen <kent+ietf@watsen.net>
CC: "netconf@ietf.org" <netconf@ietf.org>, "draft-ietf-netconf-trust-anchors.all@ietf.org" <draft-ietf-netconf-trust-anchors.all@ietf.org>
Thread-Topic: [netconf] AD review of draft-ietf-netconf-trust-anchors-20
Thread-Index: AdlcRJMOuoihGhqjT0ebQR9NGj/kUQC8/UGAEW17RmA=
Date: Fri, 23 Jun 2023 10:35:32 +0000
Message-ID: <BY5PR11MB4196075FD7486BD1E2097A7CB523A@BY5PR11MB4196.namprd11.prod.outlook.com>
References: <BY5PR11MB419685E4DE8012B1050759DBB5869@BY5PR11MB4196.namprd11.prod.outlook.com> <0100018719a4bdbb-3411052b-bab3-4aa6-b888-09fec65d0504-000000@email.amazonses.com>
In-Reply-To: <0100018719a4bdbb-3411052b-bab3-4aa6-b888-09fec65d0504-000000@email.amazonses.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: BY5PR11MB4196:EE_|PH7PR11MB7052:EE_
x-ms-office365-filtering-correlation-id: 3d0e5aeb-8f42-4939-37f3-08db73d5924d
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BY5PR11MB4196.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230028)(39860400002)(396003)(376002)(346002)(136003)(366004)(451199021)(55016003)(2906002)(33656002)(66899021)(30864003)(478600001)(54906003)(38100700002)(122000001)(66574015)(5660300002)(7696005)(64756008)(76116006)(66556008)(66446008)(66946007)(83380400001)(66476007)(316002)(166002)(4326008)(38070700005)(86362001)(52536014)(41300700001)(8936002)(8676002)(9326002)(53546011)(6506007)(9686003)(71200400001)(186003)(579004); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_BY5PR11MB4196075FD7486BD1E2097A7CB523ABY5PR11MB4196namp_"
MIME-Version: 1.0
X-OriginatorOrg: cisco.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BY5PR11MB4196.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 3d0e5aeb-8f42-4939-37f3-08db73d5924d
X-MS-Exchange-CrossTenant-originalarrivaltime: 23 Jun 2023 10:35:32.2811 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: wjCKXFNIS/BcExrCzg9iJRkMYeohnsEf/AxtGfz34qnY7xowKnltn3b9SPeTk8ivRScbAFiR7pfC/9M01JpOfQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH7PR11MB7052
X-Outbound-SMTP-Client: 173.37.147.253, alln-opgw-5.cisco.com
X-Outbound-Node: alln-core-6.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/LUwOL9esZt9HUqGDgFsOURXXXyM>
Subject: Re: [netconf] AD review of draft-ietf-netconf-trust-anchors-20
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 23 Jun 2023 10:35:41 -0000

Hi Kent,

And replies to your comments on this draft as well are inline ...


From: Kent Watsen <kent+ietf@watsen.net>
Sent: 25 March 2023 16:41
To: Rob Wilton (rwilton) <rwilton=40cisco.com@dmarc.ietf.org>
Cc: netconf@ietf.org; draft-ietf-netconf-trust-anchors.all@ietf.org
Subject: Re: [netconf] AD review of draft-ietf-netconf-trust-anchors-20

Hi Rob,

Thank you for your review!
Please see below for comments.

Kent // author




On Mar 22, 2023, at 5:51 AM, Rob Wilton (rwilton) <rwilton=40cisco.com@dmarc.ietf.org<mailto:rwilton=40cisco.com@dmarc.ietf.org>> wrote:

Hi Kent,

Here are my review comments for draft-ietf-netconf-trust-anchors.  This document is also well written, so I would like to thank you, the shepherd, and WG for a high-quality document.

As before, I have a few comments, but will note that I'm not a security expert and hence some of my questions/comments may be due to my security ignorance ...

I really think that the key question about copying the certificates into running, and also how that will play with system datastore.  Further details inline below, but I will also flag this as an email to Netmod.  Hopefully there will be some time to discuss this.

It's such a quagmire!

I've always felt the "<runnig> must always be valid" was a statement regarding the server's view of <running>, not the representation returned to clients.  And in that sense, there is no reason to "copy" nodes from <operational> or <system> into <running>, as already we have "<running> + <system> = <intended>".  This is true for the so called "shared-objects" case (aka. "Inactive-Until-Referenced" in draft-ietf-netmod-system-config), which is the primary (by far) use-case in that draft, in my view.


However, there may be a valid use-case of the client wanting to annotate some system-defined configuration (aka. "Modifying/overriding System Configuration" in draft-ietf-netmod-system-config).   Only in this case do I understand the need to copy system-defined config into <running>.

As you say, best discussed in the NETMOD.





Moderate level comments:

(1) p 27, sec 3.  Support for Built-in Trust Anchors

  In order for the built-in bags of trust anchors and/or their trust
  anchors to be referenced by configuration, they MUST first be copied
  into <running>.

Although I am probably partially guilty of pushing this design, reviewing it now, I think that forcing the entire certificates to be copied into running (even via a new parameter in the system-datastore draft) isn't ideal.  Hence, I will raise a separate thread on Netmod to discuss whether it wouldn't be more pragmatic to relax the constraint that <running> must be valid independently from <intended> (e.g., when we discuss <system>).

Hence, I am thinking whether it might be beneficial to tweak the paragraph above to emphasise the need to copy the trust-anchors is only necessary to make that datastore is valid rather than putting a hard requirement of copying them into <running>.  E.g., perhaps text along the lines of:

  "Any built-in bags of trust anchors and/or their trust anchors that are referenced in a valid configuration datastore MUST be copied into that datastore to satisfy the reference constraints (e.g., leafrefs)."

If you modify this text, then I would also try and remove the hard references to <running> in the paragraphs that follow it.

I agree with the sentiment.  Specifically, given the understanding:
   * for <system> before YANG-next: nodes are always coped into <running>.
   * for <system> after YANG-next: nodes are coped into <running> only when needed.

But maybe we can spin it towards the future, by assuming NMDA will be fully realized someday?


   Built-in bags of trust anchors and/or specific trust anchors, that

   are referenced by configutation (e.g., a "leafref"), MUST be present

   in a datastore in order for the datastore to be valid.  For instance,

   built-in nodes originating in <system> (from

   [I-D.ietf-netmod-system-config]) will (per [RFC8342]) implicitly

   propogate to <intended>, ensuring references to them will be resolved

   in <intended>.

Actually, given that the "system-config" draft is now adopted (it didn't even exist when that text was first written), this draft could more broadly replace "built-in" with "system-defined" (no need for another term, right?) and then delete the next three paragraphs (as the mechanics should be defined in the system-config draft):
[Rob Wilton (rwilton)]
Thinking about this over the last couple of days, I wonder if it is better just to say less, and only say (note fixed typo for 'configutation') :


   Built-in bags of trust anchors and/or specific trust anchors, that

   are referenced by configuration (e.g., a "leafref"), MUST be present

   in a datastore in order for the datastore to be valid.

I think that this paragraph may also be worth keeping:


   Built-in bags and/or their trust anchors MAY be copied into other

   parts of the configuration but, by doing so, they lose their

   association to the built-in entries and any assurances afforded by

   knowing they are/were built-in.

But then removing the other two paragraphs, as you suggest.



===START: these 3 paragraphs could be removed===



   The built-in bags and/or their trust anchors MUST be copied into

   <running> using the same "key" values if it is desired for the server

   to maintain/update them (e.g., a software update may update a bag of

   trusted public CA certificates used for TLS-client connections).



   Built-in bags and/or their trust anchors MAY be copied into other

   parts of the configuration but, by doing so, they lose their

   association to the built-in entries and any assurances afforded by

   knowing they are/were built-in.



   The built-in bags and/or their trust anchors are immutable by

   configuration operations.  Servers MUST ignore attempts to modify any

   aspect of built-in bags and/or their trust anchors from <running>.


===STOP: these 3 paragraphs could be removed===


Thoughts?




(2) p 28, sec 3.  Support for Built-in Trust Anchors

  The built-in bags and/or their trust anchors are immutable by
  configuration operations.  Servers MUST ignore attempts to modify any
  aspect of built-in bags and/or their trust anchors from <running>.

Is this really MUST ignore, or MUST reject?  I.e., Should they be rejecting any configuration attempt to modify the built-in bags and/or their trust anchors?  I think that this behaviour is consistent with the system datastore draft, but we should check.

Reject sounds more proper.  That said, this is one of the paragraphs I suggest removing, punting such mechanics to the system draft (and its continuations).
[Rob Wilton (rwilton)]
Yes, I agree to removing this.

But I guess that you also have the issue that if the trust anchors are completely copied into running and the trust store is subsequently updated out of band, then the certificates in the configuration differ from what is in trust-store (and hence system), and this is presumably an example of when they should be ignored.

My current expectation is that the system datastore will probably say that the running configuration always overrides the configuration in the system datastore, but this starts to look like a counter example, which potentially means that it may require special handling.

This is where the "immutable-flag" draft comes into play, so that it's clear when not allowed, and it shouldn't be allowed here.  If running wishes to use a different trust-anchor, then it should define a new trust-anchor and point to it, instead of hacking the built-in trust-anchor.



Finally, are they still immutable even if copied into other parts of the configuration?  Presumably not, since at the point they are copied they lose their association with the built-in trust anchors.

No and true.  But then again, as soon as they're copied somewhere else in the config, they lose all history/association of having originated from a built-in, and therefore there's no need for the immutability to continue.




(3) p 32, sec 6.2.  Informative References

  [I-D.ietf-netconf-trust-anchors]
             Watsen, K., "A YANG Data Model for a Truststore", Work in
             Progress, Internet-Draft, draft-ietf-netconf-trust-
             anchors-19, 19 October 2022,
             <https://datatracker.ietf.org/doc/html/draft-ietf-netconf-
             trust-anchors-19<https://datatracker.ietf.org/doc/html/draft-ietf-netconf-%0b             trust-anchors-19>>.

The same comment as for the other drafts about a document not referencing itself also applies here.

Please see my response to your similar comment in the crypto-types draft review regarding the Editor's Note.
[Rob Wilton (rwilton)]
Ack.  I think that the same solution is needed here, i.e., slightly clearer instructions to the RFC editor.





Minor level comments:

(4) p 3, sec 1.  Introduction

     Provide groupings that enable raw public keys and certificates to
     be configured locally or as references truststore instances.
     Enable the truststore to be instantiated in other data models, in
     addition to or in lieu of the central truststore instance.

Would it be helpful to have a brief sentence in this document, and perhaps the keystore document that highlights the main differences between keystore and truststore.  Alternatively, you could reference another document that defines these.


Yes, it would be helpful, but folks can also read the abstracts of both docs, yes?

Also, all the first-page results from googling "truststore vs keystore" are accurate, AFAICT, suggesting that these are reasonably well-known concepts.
[Rob Wilton (rwilton)]
Okay, I'll leave it to your choice as to whether to add anything here.




(5) p 6, sec 2.1.3.1.  The "local-or-truststore-certs-grouping" Grouping

    grouping local-or-truststore-certs-grouping:
      +-- (local-or-truststore)
         +--:(local) {local-definitions-supported}?
         |  +-- local-definition
         |     +-- certificate* [name]
         |        +-- name?                            string
         |        +---u ct:trust-anchor-cert-grouping
         +--:(truststore) {central-truststore-supported,certificates}?
            +-- truststore-reference?   ts:certificate-bag-ref

I wonder whether "inline" would be a slightly better choice than "local-definition", but presumably this has been previously considered.  I.e., you don't need to change unless you want to.  If you do change, then obviously the public-keys grouping below would similarly change.

Actually, this label has never been discussed.  To be honest, "local-definition" never struck me as ideal either.  "Inline-definition" seems better.   I just made the switch, in "ietf-keystore" too, and throughout  the suite of drafts.  Thank goodness for scripts!  ;)
[Rob Wilton (rwilton)]
Thanks.




(6) p 6, sec 2.1.3.1.  The "local-or-truststore-certs-grouping" Grouping

         +--:(truststore) {central-truststore-supported,certificates}?
            +-- truststore-reference?   ts:certificate-bag-ref

truststore-reference isn't really to a truststore, but to a bag of certs within the truststore, hence also wondering whether 'truststore-certs' or 'truststore-certificates' (and 'truststore-keys' for below) might be clearer than truststore-reference.

It is a bit of a misnomer, but the intent wasn't so much to label the thing pointed to, so much as to label where it came from.  Specifically, the solution doesn't exclude the possibility that the consuming modules might augment in their own location for where certificates can be found.  Indeed, my own product defines a local truststore (i.e., "uses truststore-grouping") and then augments-in alternate "case" statements.  To this end "central-truststore-reference" would be more apt, though I resigned to the idea that, unqualified, "truststore" refers to *the* central truststore and, hence, my product's uses "local-truststore" for its case-statements.  If we wanted to fully expand the label, it would be  "central-truststore-certificate-bag-reference", anything shorter leaves something off, unless using acronyms, e.g., "central-ts-cart-bag-ref", which actually looks okay to me.  Thoughts?
[Rob Wilton (rwilton)]
Based on your explanation, I think that what you have is best.  Please check whether expanding the leaf description in the YANG modules, or the "comments" in section 2.1.3.1 to indicate that this is referencing the central truststore.




(7) p 7, sec 2.1.3.2.  The "local-or-truststore-public-keys-grouping" Grouping

    grouping local-or-truststore-public-keys-grouping:
      +-- (local-or-truststore)
         +--:(local) {local-definitions-supported}?
         |  +-- local-definition
         |     +-- public-key* [name]
         |        +-- name?                     string
         |        +---u ct:public-key-grouping
         +--:(truststore) {central-truststore-supported,public-keys}?
            +-- truststore-reference?   ts:public-key-bag-ref

Given the definition, I presume that it is not common to either want to reference more than one truststore, or to use a mix of truststores and locally defined certificates.  Besides it is only a grouping, so if the need ever arose then it could always be defined inline, or as another grouping.

Correct, in use, only one "case" is ever needed at a time.  Seems okay for now.
[Rob Wilton (rwilton)]
Okay.



(8) p 11, sec 2.2.1.  A Truststore Instance

      <!-- End Entity Certs for Authenticating Servers -->
      <certificate-bag>
        <name>trusted-server-ee-certs</name>
        <description>
          Specific end-entity certificates used to authenticate server
          certificates.  A server certificate is authenticated if its
          end-entity certificate is an exact match to one of these
          certificates.
        </description>
        <certificate>
          <name>My Application #1</name>
          <cert-data>BASE64VALUE=</cert-data>
        </certificate>
        <certificate>
          <name>My Application #2</name>
          <cert-data>BASE64VALUE=</cert-data>
        </certificate>
      </certificate-bag>

Are these effectively for pinned certificates?  If so, a quick web search suggests that they may no longer be recommended because the downsides outweigh the benefits.  If correct, should we add a warning to the description of the example, or not include them in the example?

Yes, and EE-certs come with a mix of plusses and minuses.   I'm not opposed to adding a warning, if correct, and thus wonder if we should ask a Security Area person?
[Rob Wilton (rwilton)]
Let's leave this for now, and we can flag it to the SEC ADs during IESG review.  To be honest, I would expect them to review these drafts very carefully anyway ...





(9) p 26, sec 3.  Support for Built-in Trust Anchors

  As built-in trust anchors are provided by the server, they are
  present in <operational> (and <system> [I-D.ma-netmod-with-system],
  if used).

The reference to system can now be updated to ietf-netmod-with-system.

Already done, in my local repo...
[Rob Wilton (rwilton)]
Thanks.




(10) p 28, sec 3.  Support for Built-in Trust Anchors

  In order for the built-in bags of trust anchors and/or their trust
  anchors to be referenced by configuration, they MUST first be copied
  into <running>.
  The built-in bags and/or their trust anchors MUST be copied into
  <running> using the same "key" values if it is desired for the server
  to maintain/update them (e.g., a software update may update a bag of
  trusted public CA certificates used for TLS-client connections).

I didn't find this text to be entirely clear that the update mechanism is out of band, and not being done by the client trying to update the certificates in running configuration with different values.

True, the text could be clarified.  That said, in a response above, I propose to remove "mechanics" from this draft (including this paragraph), deferring to the "system-config" draft to define.
[Rob Wilton (rwilton)]
I basically agree that we should remove 'mechanics' for this draft, and hopefully reach consensus on how to handle this in the system datastore draft.

PS: IDK if this "update" issue is covered by "system-config" either.



(11) p 28, sec 3.  Support for Built-in Trust Anchors

        <certificate>
          <name>Public Root CA Cert 3</name>
          <cert-data>BASE64VALUE=</cert-data>
        </certificate>
      </certificate-bag>

Is it required to copy the cert-data into running, or is coping the name sufficient?  Checking the YANG, even with the current system-datastore, I think that it would be necessary to copy the cert-data as well.

It is necessary to copy, since the leaf is "mandatory true".
[Rob Wilton (rwilton)]
We don't know really where the discussion regarding system-configuration validation will end up (e.g., can you have an incomplete configuration in <running> that is implicitly valid because only <intended> is validated and that includes configuration from <system> making it valid?)  But, even if we do allow this, then it would still be nice, for operators who want to use it that way, to allow the configuration in <running> to be referentially complete and valid.  To this end, I wonder whether making the cert-data mandatory true (via the refine statement in the truststore-grouping) is not worth it.  Without the mandatory true it would allow the certificate to be referenced by name only without requiring the certificate data to be present in running.

At run time, if the certificate isn't present, then could that just be treated operationally similar to be it being an invalid certificate?


Nit level comments:

(12) p 18, sec 2.2.3.  The "Local or Truststore" Groupings

    description
      "This module illustrates notable groupings defined in
       the 'ietf-truststore' module.";

Suggest "This example module ..."

Fixed.  (In the keystore draft too)
[Rob Wilton (rwilton)]
Thanks.

Regards,
Rob



Regards,
Rob


Kent // author