Re: [netconf] [Gen-art] Genart last call review of draft-ietf-netconf-crypto-types-28

Lars Eggert <lars@eggert.org> Thu, 01 February 2024 11:35 UTC

Return-Path: <lars@eggert.org>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BE8AFC14F6A7; Thu, 1 Feb 2024 03:35:18 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.107
X-Spam-Level:
X-Spam-Status: No, score=-2.107 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=eggert.org
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aQSEGTW6KRoB; Thu, 1 Feb 2024 03:35:14 -0800 (PST)
Received: from mail.eggert.org (mail.eggert.org [91.190.195.94]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 46766C14F6A4; Thu, 1 Feb 2024 03:35:14 -0800 (PST)
Received: from [127.0.0.1] (localhost [127.0.0.1]) by localhost (Mailerdaemon) with ESMTPSA id CE4CC804AE; Thu, 1 Feb 2024 13:35:10 +0200 (EET)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=eggert.org; s=dkim; t=1706787311; h=from:subject:date:message-id:to:cc:mime-version:content-type: in-reply-to:references; bh=orobJVtvO/Qgnp7mUwmBVP0mhvfXXu2sIHWx9ZGylSw=; b=AYV7cFwWlgBk14c1u/Lj8y8TXs/pNryEzjCLAV/YgefMZZ06mHAlRY6bYjq/EQe6UMhUyf lsx1DlwAh7AUtSEz3WrnrgfrpJySr9KQDks34kD5s+WW+rU1SQz/b6hwi7ki9L3Nba+tLH 8QJHfyPMVRh8qfdksm5P+0d4I6cGagz04F2b6hdcaRjAlE3eW/co66o13pa5iP4hP2DXBP QDbdhmfQXu5QPs5YzNwOnG2GIIjKLG5xI8VWeVEDI/Y9DKI1Z06/Id36ORoE65mTwDEB1j 9vOw/KlYWjcBFuISV/NI7X/yEynLmqhrkCHbXg+i6jdvCgdBUoCLrp7YAA9bmQ==
Content-Type: multipart/signed; boundary="Apple-Mail=_4ABCAE96-FA45-4695-BCDA-06EC00DDC56D"; protocol="application/pgp-signature"; micalg="pgp-sha512"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3774.400.31\))
From: Lars Eggert <lars@eggert.org>
In-Reply-To: <170593840890.54102.14012506624636913765@ietfa.amsl.com>
Date: Thu, 01 Feb 2024 13:35:09 +0200
Cc: General Area Review Team <gen-art@ietf.org>, draft-ietf-netconf-crypto-types.all@ietf.org, last-call@ietf.org, netconf@ietf.org
Message-Id: <582ACD20-C43C-480F-8FAA-07B86D8EC270@eggert.org>
References: <170593840890.54102.14012506624636913765@ietfa.amsl.com>
To: Dale Worley <worley@ariadne.com>
X-Mailer: Apple Mail (2.3774.400.31)
X-Last-TLS-Session-Version: TLSv1.2
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/Mc6DTx3raEX-D6H6QY9TbfhxEm0>
Subject: Re: [netconf] [Gen-art] Genart last call review of draft-ietf-netconf-crypto-types-28
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 01 Feb 2024 11:35:18 -0000

Dale, thank you for your review. I have entered a No Objection ballot for this document.

Lars


> On Jan 22, 2024, at 17:46, Dale Worley via Datatracker <noreply@ietf.org> wrote:
> 
> Reviewer: Dale Worley
> Review result: Ready with Nits
> 
> I am the assigned Gen-ART reviewer for this draft. The General Area
> Review Team (Gen-ART) reviews all IETF documents being processed
> by the IESG for the IETF Chair.  Please treat these comments just
> like any other last call comments.
> 
> For more information, please see the FAQ at
> 
> <https://trac.ietf.org/trac/gen/wiki/GenArtfaq>.
> 
> Document:  review-draft-ietf-netconf-crypto-types-28
> Reviewer:  Dale R. Worley
> Review Date:  2024-01-22
> IETF LC End Date:  2024-01-24
> IESG Telechat date:  [not known]
> 
> Summary:
> 
>    This draft is basically ready for publication, but has nits that
>    should be fixed before publication.
> 
> Nits/editorial comments:
> 
> Editorial Note (To be removed by RFC Editor)
> 
>   Tree-diagrams in this draft may use the '/' line-folding mode defined
>   in RFC 8792.  However, nicer-to-the-eye is when the '//' line-folding
>   mode is used.  The AD suggested suggested putting a request here for
>   the RFC Editor to help convert "ugly" '/' folded examples to use the
>   '//' folding mode.  "Help convert" may be interpreted as, identify
>   what looks ugly and ask the authors to make the adjustment.
> 
> Throughout this paragraph, slash '/' should be replaced by backslash
> '\'.
> 
> 1.1.  Relation to other RFCs
> 
>   The dependency relationship between the primary YANG groupings
>   defined in the various RFCs is presented in the below diagram.
> 
> Perhaps there is a convention that I am not aware of, but when I see
> in the figure e.g.
> 
>                                  crypto-types
>                                    ^      ^
>                                   /        \
>                                  /          \
>                         truststore         keystore
> 
> does that mean that crypto-types contains a reference to truststore,
> or does it mean that truststore contains a reference to crypto-types?
> The usual convention is that arrows point from referencer to
> referenced, but also the usual convention is that the referenced thing
> is written physically below the referencer.  Perhaps add an
> explanatory sentence.
> 
>   Table 1: Label to RFC Mapping
> 
> In -28, this caption appears visually to be the caption of both the
> dependency diagram at the top of page 5 and the label-to-RFC mapping
> table at the bottom of page 5, and so probably should be amended to
> describe both of them together.
> 
> 1.4.  Conventions
> 
>   Various examples used in this document use a placeholder value for
>   binary data that has been base64 encoded (e.g., "BASE64VALUE=").
> 
> This would be clearer if it stated directly that the (only)
> placeholder value used is "BASE64VALUE=".  Perhaps
> 
>   Various examples in this document use "BASE64VALUE=" as a
>   placeholder value for (usually binary) data has has been base64
>   encoded.
> 
> 2.1.2.  Identities
> 
>     +-- csr-format
>           +-- p10-csr-format {p10-csr-format?}
> 
> This construct ends with "?}", whereas a number of other constructs
> end with "}?".  Are all of these correct?
> 
> 2.1.3.  Typedefs
> 
>   *  Additionally, all the typedefs define a type for encoding an ASN.1
>      [ITU.X680.2021] structure using DER [ITU.X690.2021].
> 
> It seems like it would be useful to have a typedef "asn-1-der" that
> extends "binary", to be used specifically for DER-encoded ASN.1 data,
> and which in turn is extended here.  E.g.
> 
>     binary
>       +-- asn-1-der
>   +-- csr-info
>   +-- csr
>   +-- x509
>   |  +-- trust-anchor-cert-x509
>   ...
> 
> Unfortunately, what would make such an extended type valuable is that
> DER-encoded ASH.1 strings are used in a number of RFCs, which means
> that this document might not be the best place to introduce such an
> extended type.
> 
> 2.3.  YANG Module
> 
> I am no expert on Yang, so my examination of the module itself was
> superficial.  The Datatracker says that Yang doctors looked at -18 on
> 2021-01-12, which presumably means that -19 reflected their report.
> The differences between the module in -19 and -28 appear to me to to
> be minor.
> 
> 3.5.  Strength of Keys Conveyed
> 
>   ... it is desireable ...
> 
> Wiktionary describes "desireable" as "an archaic form of desirable".
> The RFC Editor's opinion on this should probably be sought.
> 
>    3.10.  The "ietf-crypto-types" YANG Module
> 
> The title of this section seems to be uninformative given that 'The
> "ietf-crypto-types" YANG Module' is the subject of the entire
> document.  Is this title what was intended?
> 
>   Some of the readable data nodes defined in this YANG module may be
>   considered sensitive or vulnerable in some network environments.  It
>   is thus important to control read access (e.g., via get, get-config,
>   or notification) to these data nodes.  These are the subtrees and
>   data nodes and their sensitivity/vulnerability:
> 
> The use of "These" in the last sentence does not have an unambiguous
> referent as I read it.  Perhaps "These subtrees/data nodes have these
> particular sensitivities/vulnerabilities:"  Similar considerations
> apply to the last sentence of:
> 
>   Some of the operations in this YANG module may be considered
>   sensitive or vulnerable in some network environments.  It is thus
>   important to control access to these operations.  These are the
>   operations and their sensitivity/vulnerability:
> 
> [END]
> 
> 
> 
> _______________________________________________
> Gen-art mailing list
> Gen-art@ietf.org
> https://www.ietf.org/mailman/listinfo/gen-art