Re: [netconf] netconf-tls wasRe: Summary of updates
tom petch <ietfc@btconnect.com> Fri, 21 May 2021 10:28 UTC
Return-Path: <ietfc@btconnect.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2DE983A22EA for <netconf@ietfa.amsl.com>; Fri, 21 May 2021 03:28:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=btconnect.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MhNoHRbk44nk for <netconf@ietfa.amsl.com>; Fri, 21 May 2021 03:27:58 -0700 (PDT)
Received: from EUR02-AM5-obe.outbound.protection.outlook.com (mail-eopbgr00133.outbound.protection.outlook.com [40.107.0.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 20C943A23B3 for <netconf@ietf.org>; Fri, 21 May 2021 03:27:39 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=DfadMrwSzXGja4j+NRFTL63bPXOs0b1n81L5Xzi5zGW/ALvmH6n/t1BR1ygeUr9xpRHa3SEV4oTKjrogU1bsWKKB/XB1wq1FSGjk5BpJmaebSycixxKImtTdcOvsqcA4cXAXRLrk+I57wPcPBdS5jIEoXEC3UVbUj1jXEBuZgn6sKdK7e5YPZ6RRWQDxIELpNzpFWdIhi/S2ITBkL/xlkU96XPqWuPL+CW0mtKLh0aOa2Su1T9hXJIHgbCw4ABwCjp1c7KP4HO62XXtcjZBxSgwf2EbsJzOuRBgoeiRs2BPNcAjreUDBMpd/SWfMukZxW5vlHf9lsxxzHxsPsSDDVw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=VX1aYa54t8qHjRUFuncAQdODuAKUsPkG1igpkFIUBik=; b=SWhExXTWWHXOcfsqc62EOwK7mwmPuJ2/W+mb6ticN3sILLPrVuF+mIHH9kyo9/g2OPTIggNrAzJX4oQqng+9lgx4ZanG1L+/5P3v0bChl7wxylJDAE8RlwknEy8Af9Cl5NjClDbOwk/D5Z9TrxqxetkVHTDP93oP8yw3xcsSkSQUkDpEfIp8Q3p7NITNUEC+4mTlqEJU5b8b//eknp2SnLFGXOvjdhHfZJvHq5x04J0zPVpAwHyWlOOeKXmHsr2ZDUPj/azKb8dGdr+9hsKuHLh+L7wY1U+1rs4hxJ79Y1x9YfeRapY9KmRcoRFBFTkGESWdTDjx0bcgx5nutn+pag==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=btconnect.com; dmarc=pass action=none header.from=btconnect.com; dkim=pass header.d=btconnect.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=btconnect.onmicrosoft.com; s=selector2-btconnect-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=VX1aYa54t8qHjRUFuncAQdODuAKUsPkG1igpkFIUBik=; b=SA/wwNH8UmVb3n6Tp5inv2mx03pf0RR4N1CqEnVuspQIX7KTxohhRDfkxMiI8uplj4fVEdkZMFZF91/AD1D6+2zk0yoXoyOfFdrYvzvk1A6YRHmAeCZqTbWNkT080122RVylLSFIa1w1iPcrRHai3XRXn9k3NYhd6z2NKJZxTJU=
Received: from AM7PR07MB6248.eurprd07.prod.outlook.com (2603:10a6:20b:134::11) by AM6PR07MB4968.eurprd07.prod.outlook.com (2603:10a6:20b:6a::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4150.17; Fri, 21 May 2021 10:27:37 +0000
Received: from AM7PR07MB6248.eurprd07.prod.outlook.com ([fe80::a05a:a474:bf78:f0a9]) by AM7PR07MB6248.eurprd07.prod.outlook.com ([fe80::a05a:a474:bf78:f0a9%7]) with mapi id 15.20.4173.013; Fri, 21 May 2021 10:27:37 +0000
From: tom petch <ietfc@btconnect.com>
To: Kent Watsen <kent+ietf@watsen.net>
CC: "netconf@ietf.org" <netconf@ietf.org>
Thread-Topic: netconf-tls wasRe: [netconf] Summary of updates
Thread-Index: AQHXTc2q7FdLaIZBFE6d+YVLweKFLqrtuHT6
Date: Fri, 21 May 2021 10:27:37 +0000
Message-ID: <AM7PR07MB6248FF0E1E5A053D4FA2BDC4A0299@AM7PR07MB6248.eurprd07.prod.outlook.com>
References: <0100017980c49236-7975b99d-b591-4da2-a118-f6598517c4e5-000000@email.amazonses.com> <AM7PR07MB624835D8BE54144D97221817A02B9@AM7PR07MB6248.eurprd07.prod.outlook.com>, <010001798c0d947e-4d2d14f5-9f0e-450d-ac99-e18c260f0c2b-000000@email.amazonses.com>
In-Reply-To: <010001798c0d947e-4d2d14f5-9f0e-450d-ac99-e18c260f0c2b-000000@email.amazonses.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: watsen.net; dkim=none (message not signed) header.d=none;watsen.net; dmarc=none action=none header.from=btconnect.com;
x-originating-ip: [86.143.250.49]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: e07c4ecb-701a-4811-0743-08d91c430e10
x-ms-traffictypediagnostic: AM6PR07MB4968:
x-microsoft-antispam-prvs: <AM6PR07MB49683C0729AEC7B301B6D546A0299@AM6PR07MB4968.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:6790;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AM7PR07MB6248.eurprd07.prod.outlook.com; PTR:; CAT:NONE; SFS:(366004)(346002)(376002)(136003)(396003)(39860400002)(186003)(122000001)(38100700002)(478600001)(966005)(66446008)(7696005)(66476007)(5660300002)(71200400001)(2906002)(66556008)(66946007)(76116006)(26005)(55016002)(15650500001)(8676002)(316002)(64756008)(6506007)(9686003)(86362001)(52536014)(4326008)(8936002)(91956017)(83380400001)(33656002); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: btconnect.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: AM7PR07MB6248.eurprd07.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: e07c4ecb-701a-4811-0743-08d91c430e10
X-MS-Exchange-CrossTenant-originalarrivaltime: 21 May 2021 10:27:37.3197 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: cf8853ed-96e5-465b-9185-806bfe185e30
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: lwMFv+1Bty8QV8LZQy/4WAxsuUM3i8jprWbQ7JtsriTErZDXDxJuHiIVOjcbVYF+l3QtJu98WwnZlDhmJ90SNg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR07MB4968
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/TcfbMFNeZMMBseI9tvpA5HLd66k>
Subject: Re: [netconf] netconf-tls wasRe: Summary of updates
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 May 2021 10:28:03 -0000
From: Kent Watsen <kent+ietf@watsen.net> Sent: 21 May 2021 00:12 Hi Tom, I still think that the I-D lacks clarity about supported versions. Introduction TLS Protocol [RFC5246] Clearly this is TLS1.2 only Yes. In keeping with the original intention (to reference just the current, not obsoleted, document), this should be updated to RFC 8446. But I wonder if you think the document should reference all four documents (2246, 4346, 5246, and 8446) and then have DOWNREFS? Background: the document generally references TLS 1.2 as that *was* the “current” TLS version when most of the text was written. TLS 1.3 happened later, and a minimal (and apparently inadequate) update was made to accommodate it. What you’re finding are the remnants of that history... PS: I don’t claim to be a TLS expert. It would be helpful if corrected text could be provide. Pointing out the issues is great, but it takes time for me to determine what update is needed, something you may have well in mind? <tp> Yes, I did divine that the I-D appeared before TLS1.3 and so that was retrofitted. Since that is now the current version and has been for a while, I think that all references to TLS1.2 need a parallel reference to 1.3 as long as 1.3 has the same constructs (which in places it has not). This applied throughout the YANG modules I was all for ditching any mention of 1.1 and 1.0 if only for the extra complication. I no longer recall where 1.2 differs from its predecessors e.g. extensions incorporated in the base, signature algorithms, and it is probably overkill to find the relevant references for those older versions and adding them to the YANG as well but do think something needs adding in the body of the I-D to the effect that support for 1.0, 1.1 is partial, identity for the version number but not details of cipher suites, relevant RFC and so on. I will look some more at the TLS1.3 references next week. Tom Petch K. s.2 This model supports both TLS1.2 and TLS1.3 Ah, no, TLS1.2 and TLS1.3 but not TLS1.0 or TLS1.1 s.2.1.1 Features tls-1_0 tls-1_1 tls-1_2 tls-1_3 Ah no, it may not support 1.0 and 1.1 but it ........ for them but I know not what. 2.2 an example for 1.1 and 1.2 but not 1.3; interesting. Reverse engineering the YANG I find that that 'Version 1.0 is supported', 'Version 1.1 is supported'. hello-params-grouping Only 1.2 is referenced as indeed is repeatedly the case in the YANG modules Mmm I dunno! I want the Introduction to set the scene which subsequent sections expand on and that I see as lacking. Support fot 1.0 and 1.1 would, for me, catering for the different cipher suites that they have. In passing, I was wrong about public keys. I misread the statement that only certificates and PSK are supported in TLS1.3, forgetting that certificate(255) is a public key! Tom Petch 4) for the “http” draft, no significant update (really? hmm...) 5) for the “netconf” draft, whilst not in WGLC, significant updates wrt the "client-identity-mappings” nodes. Notably, beware that the Last Call YANG-doctor review for some of these four drafts has been pending this update, so expect to see a little more activity on these drafts yet. K. DETAILS: crypto-types: * Nits found via YANG Doctors reviews. * Aligned modules with `pyang -f` formatting. truststore: * Added prefixes to 'path' statements per trust-anchors/issues/1 * Renamed feature "truststore-supported" to "central-truststore-supported". * Associated with above, generally moved text to refer to a "central" truststore. * Removed two unecessary/unwanted "min-elements 1" and associated "presence" statements. * Aligned modules with `pyang -f` formatting. * Fixed nits found by YANG Doctor reviews. keystore: * Added prefixes to 'path' statements per trust-anchors/issues/1 * Renamed feature "keystore-supported" to "central-keystore- supported". * Associated with above, generally moved text to refer to a "central" keystore. * Aligned modules with `pyang -f` formatting. * Fixed nits found by YANG Doctor reviews. tcp-client-server: * Updated Abstract and Intro to address comments by Tom Petch. * Removed the "tcp-connection-grouping" grouping (now models use the "tcp-common-grouping" directly). * Added XML-comment above examples explaining the reason for the unusual top-most element's presence. * Added Securty Considerations section for the "local-binding- supported" feature. * Replaced some hardcoded refs to <xref> elements. * Fixed nits found by YANG Doctor reviews. * Aligned modules with `pyang -f` formatting. * Added an "Acknowledgements" secetion. ssh-client-server: * Removed the 'supported-authentication-methods' from {grouping ssh- server-grouping}/client-authentication. * Added XML-comment above examples explaining the reason for the unexepected top-most element's presence. * Added RFC-references to various 'feature' statements. * Renamed "credentials" to "authentication methods" * Renamed "client-auth-*" to "userauth-*" * Renamed "client-identity-*" to "userauth-*" * Fixed nits found by YANG Doctor reviews. * Aligned modules with `pyang -f` formatting. * Added a 'Contributors' section. tls-client-server: * Added missing reference to "FIPS PUB 180-4". * Added identity "tls-1.3" and updated description statement in other identities indicating that the protocol version is obsolete and enabling the feature is NOT RECOMMENDED. * Added XML-comment above examples explaining the reason for the unexpected top-most element's presence. * Added missing "client-ident-raw-public-key" and "client-ident-psk" featutes. * Aligned modules with `pyang -f` formatting. * Fixed nits found by YANG Doctor reviews. * Added a 'Contributors' section. http-client-server: * Added XML-comment above examples explaining the reason for the unusual top-most element's presence. * Renamed 'client-auth-config-supported' to 'client-auth-supported' consistent with other drafts. * Wrapped 'container basic' choice inside a 'case basic' per best practice. * Aligned modules with `pyang -f` formatting. * Fixed nits found by YANG Doctor reviews. netconf-client-server: * Floated an 'if-feature' statement in a grouping down to where the grouping is used. * Clarified 'client-identity-mappings' for both the SSH and TLS transports. * For netconf-client, augmented-in a 'mapping-required' flag into 'client-identity-mappings' only for the SSH transport, and refined-in a 'min-elements 1' only for the TLS transport. * Aligned modules with `pyang -f` formatting. restconf-client-server: * Further clarified why some 'presence' statements are present. * Addressed nits found in YANG Doctor reviews. * Aligned modules with `pyang -f` formatting. _______________________________________________ netconf mailing list netconf@ietf.org<mailto:netconf@ietf.org> https://www.ietf.org/mailman/listinfo/netconf
- [netconf] Summary of updates Kent Watsen
- [netconf] netconf-tls wasRe: Summary of updates tom petch
- Re: [netconf] netconf-tls wasRe: Summary of updat… Kent Watsen
- Re: [netconf] netconf-tls wasRe: Summary of updat… tom petch
- Re: [netconf] netconf-tls wasRe: Summary of updat… tom petch
- Re: [netconf] netconf-tls wasRe: Summary of updat… Kent Watsen
- Re: [netconf] netconf-tls wasRe: Summary of updat… Kent Watsen
- Re: [netconf] netconf-tls wasRe: Summary of updat… tom petch
- Re: [netconf] netconf-tls wasRe: Summary of updat… tom petch
- Re: [netconf] netconf-tls wasRe: Summary of updat… Juergen Schoenwaelder
- Re: [netconf] netconf-tls wasRe: Summary of updat… Kent Watsen
- Re: [netconf] netconf-tls wasRe: Summary of updat… Juergen Schoenwaelder
- Re: [netconf] netconf-tls wasRe: Summary of updat… tom petch
- Re: [netconf] netconf-tls wasRe: Summary of updat… Juergen Schoenwaelder
- Re: [netconf] netconf-tls wasRe: Summary of updat… Kent Watsen
- Re: [netconf] netconf-tls wasRe: Summary of updat… Kent Watsen
- Re: [netconf] netconf-tls wasRe: Summary of updat… Kent Watsen
- Re: [netconf] netconf-tls wasRe: Summary of updat… Juergen Schoenwaelder
- Re: [netconf] netconf-tls wasRe: Summary of updat… tom petch
- Re: [netconf] netconf-tls wasRe: Summary of updat… Juergen Schoenwaelder
- Re: [netconf] netconf-tls wasRe: Summary of updat… Kent Watsen
- Re: [netconf] netconf-tls wasRe: Summary of updat… tom petch
- Re: [netconf] netconf-tls wasRe: Summary of updat… tom petch
- [netconf] More complications was Re: netconf-tls … tom petch
- Re: [netconf] More complications Kent Watsen
- Re: [netconf] More complications tom petch
- Re: [netconf] More complications Henk Birkholz
- Re: [netconf] More complications Juergen Schoenwaelder
- Re: [netconf] More complications Kent Watsen
- Re: [netconf] More complications tom petch
- [netconf] TLS 1.3 and pre-shared-keys and raw-pub… Kent Watsen
- Re: [netconf] TLS 1.3 and pre-shared-keys and raw… tom petch
- Re: [netconf] netconf-tls wasRe: Summary of updat… tom petch
- Re: [netconf] TLS 1.3 and pre-shared-keys and raw… Kent Watsen
- Re: [netconf] TLS 1.3 and pre-shared-keys and raw… Rob Wilton (rwilton)
- Re: [netconf] TLS 1.3 and pre-shared-keys and raw… tom petch
- Re: [netconf] More complications Kent Watsen