Re: [netconf] Francesca Palombini's No Objection on draft-ietf-netconf-crypto-types-29: (with COMMENT)

Carsten Bormann <cabo@tzi.org> Fri, 02 February 2024 16:54 UTC

Return-Path: <cabo@tzi.org>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B1855C14F6BD; Fri, 2 Feb 2024 08:54:35 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.906
X-Spam-Level:
X-Spam-Status: No, score=-1.906 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id z9f_AIMkgoGa; Fri, 2 Feb 2024 08:54:32 -0800 (PST)
Received: from smtp.zfn.uni-bremen.de (smtp.zfn.uni-bremen.de [IPv6:2001:638:708:32::21]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 71120C14F6B4; Fri, 2 Feb 2024 08:54:25 -0800 (PST)
Received: from eduroam-0872.wlan.uni-bremen.de (eduroam-0872.wlan.uni-bremen.de [134.102.19.104]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.zfn.uni-bremen.de (Postfix) with ESMTPSA id 4TRMLj0HkGzDCch; Fri, 2 Feb 2024 17:54:21 +0100 (CET)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.120.23.2.7\))
From: Carsten Bormann <cabo@tzi.org>
In-Reply-To: <0100018d6ab9f444-abd558f9-c5a4-4b57-a789-db2f9496308a-000000@email.amazonses.com>
Date: Fri, 02 Feb 2024 17:54:20 +0100
Cc: Francesca Palombini <francesca.palombini@ericsson.com>, The IESG <iesg@ietf.org>, draft-ietf-netconf-crypto-types@ietf.org, "netconf-chairs@ietf.org" <netconf-chairs@ietf.org>, "netconf@ietf.org" <netconf@ietf.org>
X-Mao-Original-Outgoing-Id: 728585660.385138-f39b3f4631d644f889dac3a9f589c63b
Content-Transfer-Encoding: quoted-printable
Message-Id: <884D49C3-37DB-43DD-BD8E-8BB11C6ADD6C@tzi.org>
References: <170670628452.55766.11991207802136495252@ietfa.amsl.com> <8D4289E5-C908-483A-AD82-7297C544BC57@tzi.org> <0100018d61fc9820-ef13abd1-4671-4451-a953-f732f1ddc61b-000000@email.amazonses.com> <DB9F5E80-54BF-46B1-B52D-E972928EAFF7@tzi.org> <0100018d6ab9f444-abd558f9-c5a4-4b57-a789-db2f9496308a-000000@email.amazonses.com>
To: Kent Watsen <kent+ietf@watsen.net>
X-Mailer: Apple Mail (2.3608.120.23.2.7)
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/WBqLWF-YA_aojbnQQvoIwvSPrck>
Subject: Re: [netconf] Francesca Palombini's No Objection on draft-ietf-netconf-crypto-types-29: (with COMMENT)
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 02 Feb 2024 16:54:35 -0000

On 2024-02-02, at 17:49, Kent Watsen <kent+ietf@watsen.net> wrote:
> 
> Hi Carsten,
> 
> I just added "(see Section 4 in <xref target="RFC4648"/>)”
> 
> Here’s the diff:
> 
>           <t>Various examples in this document use "BASE64VALUE=" as a
>             placeholder value for binary data has has been base64
> -            encoded.  This placeholder value is used as real
> -            base64 encoded structures are often many lines long and
> -            hence distracting to the example being presented.</t>
> +            encoded (see Section 4 in <xref target="RFC4648"/>).  This
> +            placeholder value is used as real base64 encoded structures
> +            are often many lines long and hence distracting to the example
> +            being presented.</t>
> 
> Seems okay?

This is not explicitly saying that the reference for doing this is RFC 7950, but I don’t see a lot of danger from this way of putting it.

(please s/used as/used because/ though).

Grüße, Carsten


> 
> Kent
> 
> 
>> On Feb 1, 2024, at 1:26 AM, Carsten Bormann <cabo@tzi.org> wrote:
>> 
>> Hi Kent,
>> 
>> I haven’t seen your changes yet.
>> As long as the restatements are clearly marked as such [1], i.e., they don’t appear to make new normative requirements on their own, there is no damage.
>> 
>> [1]: https://www.ietf.org/archive/id/draft-bormann-restatement-00.html#name-defusing-restatements
>> 
>> Grüße, Carsten
>> 
>> 
>>> On Feb 1, 2024, at 01:06, Kent Watsen <kent+ietf@watsen.net> wrote:
>>> 
>>> Hi Carsten,
>>> 
>>> Whoops, just seeing your comment after making the change.
>>> I agree that it seemed not needed, but I also didn’t see any harm in adding it.
>>> Thoughts?
>>> 
>>> Kent
>>> 
>>> 
>>>> On Jan 31, 2024, at 8:16 AM, Carsten Bormann <cabo@tzi.org> wrote:
>>>> 
>>>> On 2024-01-31, at 14:04, Francesca Palombini via Datatracker <noreply@ietf.org> wrote:
>>>>> 
>>>>> The document is missing a reference to RFC 4648 (and specify which encoding,
>>>>> Section 4 or 5). I assume that this is the same as for RFC 7950 which states:
>>>>> 
>>>>> Binary values are encoded with the base64 encoding scheme (see
>>>>> Section 4 in [RFC4648]).
>>>> 
>>>> I actually would not add a restatement here.  Section 1.4 only explains the substitution of longer base64 encoded values in the examples by BASE64VALUE= (encoding for the meaningless 8 bytes “04 04 84 eb 85 40 2d 41” hex).
>>>> 
>>>> The document uses base64 within YANG-XML and YANG-JSON examples only, and both RFC 7950 and (uncharacteristically for JSON) RFC 7951 use Section 4 of RFC 4648.  This should not be restated — maybe this will be fixed to be base64url in a future version of RFC 7951?
>>>> (RFC 9254 (YANG-CBOR) doesn’t use base64 at all for its representation of YANG “binary”, but then the crypto-types document doesn’t have YANG-CBOR examples.)
>>>> 
>>>> Grüße, Carsten
>>>> 
>>> 
>> 
>