Re: [netconf] netconf-tls wasRe: Summary of updates

tom petch <ietfc@btconnect.com> Fri, 21 May 2021 10:28 UTC

Return-Path: <ietfc@btconnect.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2DE983A22EA for <netconf@ietfa.amsl.com>; Fri, 21 May 2021 03:28:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=btconnect.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MhNoHRbk44nk for <netconf@ietfa.amsl.com>; Fri, 21 May 2021 03:27:58 -0700 (PDT)
Received: from EUR02-AM5-obe.outbound.protection.outlook.com (mail-eopbgr00133.outbound.protection.outlook.com [40.107.0.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 20C943A23B3 for <netconf@ietf.org>; Fri, 21 May 2021 03:27:39 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=DfadMrwSzXGja4j+NRFTL63bPXOs0b1n81L5Xzi5zGW/ALvmH6n/t1BR1ygeUr9xpRHa3SEV4oTKjrogU1bsWKKB/XB1wq1FSGjk5BpJmaebSycixxKImtTdcOvsqcA4cXAXRLrk+I57wPcPBdS5jIEoXEC3UVbUj1jXEBuZgn6sKdK7e5YPZ6RRWQDxIELpNzpFWdIhi/S2ITBkL/xlkU96XPqWuPL+CW0mtKLh0aOa2Su1T9hXJIHgbCw4ABwCjp1c7KP4HO62XXtcjZBxSgwf2EbsJzOuRBgoeiRs2BPNcAjreUDBMpd/SWfMukZxW5vlHf9lsxxzHxsPsSDDVw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=VX1aYa54t8qHjRUFuncAQdODuAKUsPkG1igpkFIUBik=; b=SWhExXTWWHXOcfsqc62EOwK7mwmPuJ2/W+mb6ticN3sILLPrVuF+mIHH9kyo9/g2OPTIggNrAzJX4oQqng+9lgx4ZanG1L+/5P3v0bChl7wxylJDAE8RlwknEy8Af9Cl5NjClDbOwk/D5Z9TrxqxetkVHTDP93oP8yw3xcsSkSQUkDpEfIp8Q3p7NITNUEC+4mTlqEJU5b8b//eknp2SnLFGXOvjdhHfZJvHq5x04J0zPVpAwHyWlOOeKXmHsr2ZDUPj/azKb8dGdr+9hsKuHLh+L7wY1U+1rs4hxJ79Y1x9YfeRapY9KmRcoRFBFTkGESWdTDjx0bcgx5nutn+pag==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=btconnect.com; dmarc=pass action=none header.from=btconnect.com; dkim=pass header.d=btconnect.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=btconnect.onmicrosoft.com; s=selector2-btconnect-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=VX1aYa54t8qHjRUFuncAQdODuAKUsPkG1igpkFIUBik=; b=SA/wwNH8UmVb3n6Tp5inv2mx03pf0RR4N1CqEnVuspQIX7KTxohhRDfkxMiI8uplj4fVEdkZMFZF91/AD1D6+2zk0yoXoyOfFdrYvzvk1A6YRHmAeCZqTbWNkT080122RVylLSFIa1w1iPcrRHai3XRXn9k3NYhd6z2NKJZxTJU=
Received: from AM7PR07MB6248.eurprd07.prod.outlook.com (2603:10a6:20b:134::11) by AM6PR07MB4968.eurprd07.prod.outlook.com (2603:10a6:20b:6a::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4150.17; Fri, 21 May 2021 10:27:37 +0000
Received: from AM7PR07MB6248.eurprd07.prod.outlook.com ([fe80::a05a:a474:bf78:f0a9]) by AM7PR07MB6248.eurprd07.prod.outlook.com ([fe80::a05a:a474:bf78:f0a9%7]) with mapi id 15.20.4173.013; Fri, 21 May 2021 10:27:37 +0000
From: tom petch <ietfc@btconnect.com>
To: Kent Watsen <kent+ietf@watsen.net>
CC: "netconf@ietf.org" <netconf@ietf.org>
Thread-Topic: netconf-tls wasRe: [netconf] Summary of updates
Thread-Index: AQHXTc2q7FdLaIZBFE6d+YVLweKFLqrtuHT6
Date: Fri, 21 May 2021 10:27:37 +0000
Message-ID: <AM7PR07MB6248FF0E1E5A053D4FA2BDC4A0299@AM7PR07MB6248.eurprd07.prod.outlook.com>
References: <0100017980c49236-7975b99d-b591-4da2-a118-f6598517c4e5-000000@email.amazonses.com> <AM7PR07MB624835D8BE54144D97221817A02B9@AM7PR07MB6248.eurprd07.prod.outlook.com>, <010001798c0d947e-4d2d14f5-9f0e-450d-ac99-e18c260f0c2b-000000@email.amazonses.com>
In-Reply-To: <010001798c0d947e-4d2d14f5-9f0e-450d-ac99-e18c260f0c2b-000000@email.amazonses.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: watsen.net; dkim=none (message not signed) header.d=none;watsen.net; dmarc=none action=none header.from=btconnect.com;
x-originating-ip: [86.143.250.49]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: e07c4ecb-701a-4811-0743-08d91c430e10
x-ms-traffictypediagnostic: AM6PR07MB4968:
x-microsoft-antispam-prvs: <AM6PR07MB49683C0729AEC7B301B6D546A0299@AM6PR07MB4968.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:6790;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AM7PR07MB6248.eurprd07.prod.outlook.com; PTR:; CAT:NONE; SFS:(366004)(346002)(376002)(136003)(396003)(39860400002)(186003)(122000001)(38100700002)(478600001)(966005)(66446008)(7696005)(66476007)(5660300002)(71200400001)(2906002)(66556008)(66946007)(76116006)(26005)(55016002)(15650500001)(8676002)(316002)(64756008)(6506007)(9686003)(86362001)(52536014)(4326008)(8936002)(91956017)(83380400001)(33656002); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata: =?Windows-1252?Q?/SAt/nUWk7Otet9/reDHRpdeWgDNQLSWAFBP/iJJQ1tuFXVXttlJvFQT?= =?Windows-1252?Q?mF08py0rJd5fMBNwvADSEGtEzvWZqRICtx3Qkrj4jmigKQYaU545sq77?= =?Windows-1252?Q?GoiGbcHYpp2wewmzWIWMTUKVQKdEZ6t/6kdhAg1uSnpcexj8hgDQBOZX?= =?Windows-1252?Q?hEy+tYoeyQud2HMTtxgY0/sjn8T3zWyufm9drWgEeCHjJgDVtl/O0f/t?= =?Windows-1252?Q?+wqCpacDh3u7tBZaaVN8UIFJlhXDQwtAM4Ut9WwONFPAwAAtllmnFmTa?= =?Windows-1252?Q?KsQ1H0sn1e16bGdpkbAg3NlaocUbSL6ZPjUk7mTfDe94ImqmncHgmqWO?= =?Windows-1252?Q?kKv52TUMx3TxBF7pJN/xmQOg45q4mT+/4s/mCFHR/RUOjt2xYw14rxtR?= =?Windows-1252?Q?+uJMQwDS8rcZ958mcNtiz+CEFjXhwuTpkR8knN292ahnIBmtANTp6JvX?= =?Windows-1252?Q?15x0QM0fiJV716ElpgLwzMCZtNKZgekNGLByTla8MMRMTAcMVFgs6aBw?= =?Windows-1252?Q?NIRT8yy5sWwZxM1OYPQYdKsdWQiNPUzPdLz2a8YaJio+qZS0McLkXtTv?= =?Windows-1252?Q?6uJ/TQ8qDZZL3q3S1dLa2EtWiDgvyN8CMvK85MtoOGI35EJmJgmWF0KK?= =?Windows-1252?Q?+XHE83Ja3b6HWX32N47kOWAGvDXZStBJlMG/G/FQMgxipcK2HYeNS9mr?= =?Windows-1252?Q?g7EWoShSrGCtLyiG1ewHdpPyZw79mem4cIEYYX/2NGW0HMVJRSJU4A1R?= =?Windows-1252?Q?vvAlQeMgPBtibTV8vkk/NUcu+paxGrzXWwZYJ6zeI8Gt9Te1E+QS7cSY?= =?Windows-1252?Q?x60au7TDwOQ7Zf/3JIuhMfRMd5aEPmRfWwUcfiBDPNxfMUpWkR9YtO6W?= =?Windows-1252?Q?hNar5xxpmHfbWEDFW33lPSAM2b9/ZB5mdM5mK6g0JyOyaxQGak9hRWnv?= =?Windows-1252?Q?QoSO/9KzSoio8QnrvEYZcan4PFFoGO1JEwWYpn7Uc2LO4unfiCqXfIon?= =?Windows-1252?Q?jHiBVcDgqtzhH+6eqrGkglzweUVPDHR/Z53/f78GR3KCIMGoaMu5Fnlp?= =?Windows-1252?Q?eejVPoZVyYwyQwFxQKYpFEaVth5mrFH2kq9/bjpJXxbkt3o6OULUYnrL?= =?Windows-1252?Q?Vi6tIxOsDf6Frl7WB2mPlic6tYj2IiY+G/hV4VgkklYkeZr7ItY84E+m?= =?Windows-1252?Q?lecojcJa9/1wtl2w2FU/lLTbGfJd7bsyj3lXkSaeSjp7JdYfVHPHN0AB?= =?Windows-1252?Q?Y7mMplW8+0BR01u241slqUCkz4GrRgXaQrQ0aUq4tbQPa9js/3+cNLur?= =?Windows-1252?Q?ccgZ7KPMRYpsrqRY1JUv1QHAm1SPUeD1B3il7GA/Kf1c5o1xlsNODUoa?= =?Windows-1252?Q?FjBJU/MUhZaWYHctI6kabEUy79IZA/i7AdI=3D?=
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: btconnect.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: AM7PR07MB6248.eurprd07.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: e07c4ecb-701a-4811-0743-08d91c430e10
X-MS-Exchange-CrossTenant-originalarrivaltime: 21 May 2021 10:27:37.3197 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: cf8853ed-96e5-465b-9185-806bfe185e30
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: lwMFv+1Bty8QV8LZQy/4WAxsuUM3i8jprWbQ7JtsriTErZDXDxJuHiIVOjcbVYF+l3QtJu98WwnZlDhmJ90SNg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR07MB4968
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/TcfbMFNeZMMBseI9tvpA5HLd66k>
Subject: Re: [netconf] netconf-tls wasRe: Summary of updates
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 May 2021 10:28:03 -0000

From: Kent Watsen <kent+ietf@watsen.net>
Sent: 21 May 2021 00:12

Hi Tom,

I still think that the I-D lacks clarity about supported versions.

Introduction
TLS Protocol [RFC5246]
Clearly this is TLS1.2 only

Yes.   In keeping with the original intention (to reference just the current, not obsoleted, document), this should be updated to RFC 8446.   But I wonder if you think the document should reference all four documents (2246, 4346, 5246, and 8446) and then have DOWNREFS?

Background: the document generally references TLS 1.2 as that *was* the “current” TLS version when most of the text was written.  TLS 1.3 happened later, and a minimal (and apparently inadequate) update was made to accommodate it.  What you’re finding are the remnants of that history...

PS:  I don’t claim to be a TLS expert.  It would be helpful if corrected text could be provide.  Pointing out the issues is great, but it takes time for me to determine what update is needed, something you may have well in mind?

<tp>
Yes, I did divine that the I-D appeared before TLS1.3 and so that was retrofitted.  Since that is now the current version and has been for a while, I think that all references to TLS1.2 need a parallel reference to 1.3 as long as 1.3 has the same constructs (which in places it has not).  This applied throughout the YANG modules

I was all for ditching any mention of 1.1 and 1.0 if only for the extra complication.  I no longer recall where 1.2 differs from its predecessors e.g. extensions incorporated in the base, signature algorithms, and it is probably overkill to find the relevant references for those older versions and adding them to the YANG as well but do think something needs adding in the body of the I-D to the effect that support for 1.0, 1.1 is partial, identity for the version number but not details of cipher suites, relevant RFC and so on.

I will look some more at the TLS1.3 references next week.

Tom Petch

K.



s.2
This model supports both TLS1.2 and TLS1.3
Ah, no, TLS1.2 and TLS1.3 but not TLS1.0 or TLS1.1

s.2.1.1
Features
tls-1_0
tls-1_1
tls-1_2
tls-1_3
Ah no, it may not support 1.0 and 1.1 but it ........ for them but I know not what.

2.2
an example for 1.1 and 1.2 but not 1.3; interesting.

Reverse engineering the YANG I find that that 'Version 1.0 is supported', 'Version 1.1 is supported'.

hello-params-grouping
Only 1.2 is referenced as indeed is repeatedly the case in the YANG modules

Mmm I dunno!

I want the Introduction to set the scene which subsequent sections expand on and that I see as lacking.  Support fot 1.0 and 1.1 would, for me, catering for the different cipher suites that they have.

In passing, I was wrong about public keys.  I misread the statement that only certificates and PSK are supported in TLS1.3, forgetting that certificate(255) is a public key!

Tom Petch




  4) for the “http” draft, no significant update (really? hmm...)
  5) for the “netconf” draft, whilst not in WGLC, significant updates wrt the "client-identity-mappings” nodes.

Notably, beware that the Last Call YANG-doctor review for some of these four drafts has been pending this update, so expect to see a little more activity on these drafts yet.

K.


DETAILS:

crypto-types:
  *  Nits found via YANG Doctors reviews.
  *  Aligned modules with `pyang -f` formatting.

truststore:
  *  Added prefixes to 'path' statements per trust-anchors/issues/1
  *  Renamed feature "truststore-supported" to "central-truststore-supported".
  *  Associated with above, generally moved text to refer to a
     "central" truststore.
  *  Removed two unecessary/unwanted "min-elements 1" and associated
     "presence" statements.
  *  Aligned modules with `pyang -f` formatting.
  *  Fixed nits found by YANG Doctor reviews.

keystore:
  *  Added prefixes to 'path' statements per trust-anchors/issues/1
  *  Renamed feature "keystore-supported" to "central-keystore-
     supported".
  *  Associated with above, generally moved text to refer to a
     "central" keystore.
  *  Aligned modules with `pyang -f` formatting.
  *  Fixed nits found by YANG Doctor reviews.

tcp-client-server:
  *  Updated Abstract and Intro to address comments by Tom Petch.
  *  Removed the "tcp-connection-grouping" grouping (now models use the
     "tcp-common-grouping" directly).
  *  Added XML-comment above examples explaining the reason for the
     unusual top-most element's presence.
  *  Added Securty Considerations section for the "local-binding-
     supported" feature.
  *  Replaced some hardcoded refs to <xref> elements.
  *  Fixed nits found by YANG Doctor reviews.
  *  Aligned modules with `pyang -f` formatting.
  *  Added an "Acknowledgements" secetion.

ssh-client-server:
  *  Removed the 'supported-authentication-methods' from {grouping ssh-
     server-grouping}/client-authentication.
  *  Added XML-comment above examples explaining the reason for the
     unexepected top-most element's presence.
  *  Added RFC-references to various 'feature' statements.
  *  Renamed "credentials" to "authentication methods"
  *  Renamed "client-auth-*" to "userauth-*"
  *  Renamed "client-identity-*" to "userauth-*"
  *  Fixed nits found by YANG Doctor reviews.
  *  Aligned modules with `pyang -f` formatting.
  *  Added a 'Contributors' section.

tls-client-server:
  *  Added missing reference to "FIPS PUB 180-4".
  *  Added identity "tls-1.3" and updated description statement in
     other identities indicating that the protocol version is obsolete
     and enabling the feature is NOT RECOMMENDED.
  *  Added XML-comment above examples explaining the reason for the
     unexpected top-most element's presence.
  *  Added missing "client-ident-raw-public-key" and "client-ident-psk"
     featutes.
  *  Aligned modules with `pyang -f` formatting.
  *  Fixed nits found by YANG Doctor reviews.
  *  Added a 'Contributors' section.

http-client-server:
  *  Added XML-comment above examples explaining the reason for the
     unusual top-most element's presence.
  *  Renamed 'client-auth-config-supported' to 'client-auth-supported'
     consistent with other drafts.
  *  Wrapped 'container basic' choice inside a 'case basic' per best
     practice.
  *  Aligned modules with `pyang -f` formatting.
  *  Fixed nits found by YANG Doctor reviews.

netconf-client-server:
  *  Floated an 'if-feature' statement in a grouping down to where the
     grouping is used.
  *  Clarified 'client-identity-mappings' for both the SSH and TLS
     transports.
  *  For netconf-client, augmented-in a 'mapping-required' flag into
     'client-identity-mappings' only for the SSH transport, and
     refined-in a 'min-elements 1' only for the TLS transport.
  *  Aligned modules with `pyang -f` formatting.

restconf-client-server:
  *  Further clarified why some 'presence' statements are present.
  *  Addressed nits found in YANG Doctor reviews.
  *  Aligned modules with `pyang -f` formatting.




_______________________________________________
netconf mailing list
netconf@ietf.org<mailto:netconf@ietf.org>
https://www.ietf.org/mailman/listinfo/netconf