Re: [netconf] [Gen-art] Genart last call review of draft-ietf-netconf-crypto-types-28
Lars Eggert <lars@eggert.org> Thu, 01 February 2024 11:35 UTC
Return-Path: <lars@eggert.org>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BE8AFC14F6A7; Thu, 1 Feb 2024 03:35:18 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.107
X-Spam-Level:
X-Spam-Status: No, score=-2.107 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=eggert.org
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aQSEGTW6KRoB; Thu, 1 Feb 2024 03:35:14 -0800 (PST)
Received: from mail.eggert.org (mail.eggert.org [91.190.195.94]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 46766C14F6A4; Thu, 1 Feb 2024 03:35:14 -0800 (PST)
Received: from [127.0.0.1] (localhost [127.0.0.1]) by localhost (Mailerdaemon) with ESMTPSA id CE4CC804AE; Thu, 1 Feb 2024 13:35:10 +0200 (EET)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=eggert.org; s=dkim; t=1706787311; h=from:subject:date:message-id:to:cc:mime-version:content-type: in-reply-to:references; bh=orobJVtvO/Qgnp7mUwmBVP0mhvfXXu2sIHWx9ZGylSw=; b=AYV7cFwWlgBk14c1u/Lj8y8TXs/pNryEzjCLAV/YgefMZZ06mHAlRY6bYjq/EQe6UMhUyf lsx1DlwAh7AUtSEz3WrnrgfrpJySr9KQDks34kD5s+WW+rU1SQz/b6hwi7ki9L3Nba+tLH 8QJHfyPMVRh8qfdksm5P+0d4I6cGagz04F2b6hdcaRjAlE3eW/co66o13pa5iP4hP2DXBP QDbdhmfQXu5QPs5YzNwOnG2GIIjKLG5xI8VWeVEDI/Y9DKI1Z06/Id36ORoE65mTwDEB1j 9vOw/KlYWjcBFuISV/NI7X/yEynLmqhrkCHbXg+i6jdvCgdBUoCLrp7YAA9bmQ==
Content-Type: multipart/signed; boundary="Apple-Mail=_4ABCAE96-FA45-4695-BCDA-06EC00DDC56D"; protocol="application/pgp-signature"; micalg="pgp-sha512"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3774.400.31\))
From: Lars Eggert <lars@eggert.org>
In-Reply-To: <170593840890.54102.14012506624636913765@ietfa.amsl.com>
Date: Thu, 01 Feb 2024 13:35:09 +0200
Cc: General Area Review Team <gen-art@ietf.org>, draft-ietf-netconf-crypto-types.all@ietf.org, last-call@ietf.org, netconf@ietf.org
Message-Id: <582ACD20-C43C-480F-8FAA-07B86D8EC270@eggert.org>
References: <170593840890.54102.14012506624636913765@ietfa.amsl.com>
To: Dale Worley <worley@ariadne.com>
X-Mailer: Apple Mail (2.3774.400.31)
X-Last-TLS-Session-Version: TLSv1.2
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/Mc6DTx3raEX-D6H6QY9TbfhxEm0>
Subject: Re: [netconf] [Gen-art] Genart last call review of draft-ietf-netconf-crypto-types-28
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 01 Feb 2024 11:35:18 -0000
Dale, thank you for your review. I have entered a No Objection ballot for this document. Lars > On Jan 22, 2024, at 17:46, Dale Worley via Datatracker <noreply@ietf.org> wrote: > > Reviewer: Dale Worley > Review result: Ready with Nits > > I am the assigned Gen-ART reviewer for this draft. The General Area > Review Team (Gen-ART) reviews all IETF documents being processed > by the IESG for the IETF Chair. Please treat these comments just > like any other last call comments. > > For more information, please see the FAQ at > > <https://trac.ietf.org/trac/gen/wiki/GenArtfaq>. > > Document: review-draft-ietf-netconf-crypto-types-28 > Reviewer: Dale R. Worley > Review Date: 2024-01-22 > IETF LC End Date: 2024-01-24 > IESG Telechat date: [not known] > > Summary: > > This draft is basically ready for publication, but has nits that > should be fixed before publication. > > Nits/editorial comments: > > Editorial Note (To be removed by RFC Editor) > > Tree-diagrams in this draft may use the '/' line-folding mode defined > in RFC 8792. However, nicer-to-the-eye is when the '//' line-folding > mode is used. The AD suggested suggested putting a request here for > the RFC Editor to help convert "ugly" '/' folded examples to use the > '//' folding mode. "Help convert" may be interpreted as, identify > what looks ugly and ask the authors to make the adjustment. > > Throughout this paragraph, slash '/' should be replaced by backslash > '\'. > > 1.1. Relation to other RFCs > > The dependency relationship between the primary YANG groupings > defined in the various RFCs is presented in the below diagram. > > Perhaps there is a convention that I am not aware of, but when I see > in the figure e.g. > > crypto-types > ^ ^ > / \ > / \ > truststore keystore > > does that mean that crypto-types contains a reference to truststore, > or does it mean that truststore contains a reference to crypto-types? > The usual convention is that arrows point from referencer to > referenced, but also the usual convention is that the referenced thing > is written physically below the referencer. Perhaps add an > explanatory sentence. > > Table 1: Label to RFC Mapping > > In -28, this caption appears visually to be the caption of both the > dependency diagram at the top of page 5 and the label-to-RFC mapping > table at the bottom of page 5, and so probably should be amended to > describe both of them together. > > 1.4. Conventions > > Various examples used in this document use a placeholder value for > binary data that has been base64 encoded (e.g., "BASE64VALUE="). > > This would be clearer if it stated directly that the (only) > placeholder value used is "BASE64VALUE=". Perhaps > > Various examples in this document use "BASE64VALUE=" as a > placeholder value for (usually binary) data has has been base64 > encoded. > > 2.1.2. Identities > > +-- csr-format > +-- p10-csr-format {p10-csr-format?} > > This construct ends with "?}", whereas a number of other constructs > end with "}?". Are all of these correct? > > 2.1.3. Typedefs > > * Additionally, all the typedefs define a type for encoding an ASN.1 > [ITU.X680.2021] structure using DER [ITU.X690.2021]. > > It seems like it would be useful to have a typedef "asn-1-der" that > extends "binary", to be used specifically for DER-encoded ASN.1 data, > and which in turn is extended here. E.g. > > binary > +-- asn-1-der > +-- csr-info > +-- csr > +-- x509 > | +-- trust-anchor-cert-x509 > ... > > Unfortunately, what would make such an extended type valuable is that > DER-encoded ASH.1 strings are used in a number of RFCs, which means > that this document might not be the best place to introduce such an > extended type. > > 2.3. YANG Module > > I am no expert on Yang, so my examination of the module itself was > superficial. The Datatracker says that Yang doctors looked at -18 on > 2021-01-12, which presumably means that -19 reflected their report. > The differences between the module in -19 and -28 appear to me to to > be minor. > > 3.5. Strength of Keys Conveyed > > ... it is desireable ... > > Wiktionary describes "desireable" as "an archaic form of desirable". > The RFC Editor's opinion on this should probably be sought. > > 3.10. The "ietf-crypto-types" YANG Module > > The title of this section seems to be uninformative given that 'The > "ietf-crypto-types" YANG Module' is the subject of the entire > document. Is this title what was intended? > > Some of the readable data nodes defined in this YANG module may be > considered sensitive or vulnerable in some network environments. It > is thus important to control read access (e.g., via get, get-config, > or notification) to these data nodes. These are the subtrees and > data nodes and their sensitivity/vulnerability: > > The use of "These" in the last sentence does not have an unambiguous > referent as I read it. Perhaps "These subtrees/data nodes have these > particular sensitivities/vulnerabilities:" Similar considerations > apply to the last sentence of: > > Some of the operations in this YANG module may be considered > sensitive or vulnerable in some network environments. It is thus > important to control access to these operations. These are the > operations and their sensitivity/vulnerability: > > [END] > > > > _______________________________________________ > Gen-art mailing list > Gen-art@ietf.org > https://www.ietf.org/mailman/listinfo/gen-art
- [netconf] Genart last call review of draft-ietf-n… Dale Worley via Datatracker
- Re: [netconf] [Last-Call] Genart last call review… Salz, Rich
- Re: [netconf] Genart last call review of draft-ie… Kent Watsen
- Re: [netconf] [Last-Call] Genart last call review… Kent Watsen
- Re: [netconf] Genart last call review of draft-ie… worley
- Re: [netconf] Genart last call review of draft-ie… Kent Watsen
- Re: [netconf] Genart last call review of draft-ie… worley
- Re: [netconf] [Gen-art] Genart last call review o… Lars Eggert
- Re: [netconf] [Gen-art] Genart last call review o… mohamed.boucadair