[netconf] Genart last call review of draft-ietf-netconf-keystore-29

Reese Enghardt via Datatracker <noreply@ietf.org> Tue, 23 January 2024 01:36 UTC

Return-Path: <noreply@ietf.org>
X-Original-To: netconf@ietf.org
Delivered-To: netconf@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 58605C15793B; Mon, 22 Jan 2024 17:36:08 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
From: Reese Enghardt via Datatracker <noreply@ietf.org>
To: gen-art@ietf.org
Cc: draft-ietf-netconf-keystore.all@ietf.org, last-call@ietf.org, netconf@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 12.3.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <170597376834.13133.6247342665505753709@ietfa.amsl.com>
Reply-To: Reese Enghardt <ietf@tenghardt.net>
Date: Mon, 22 Jan 2024 17:36:08 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/k5p-QeLLPCmemPJxb80Cp0AAmwg>
Subject: [netconf] Genart last call review of draft-ietf-netconf-keystore-29
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.39
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 23 Jan 2024 01:36:08 -0000

Reviewer: Reese Enghardt
Review result: Ready with Issues

I am the assigned Gen-ART reviewer for this draft. The General Area
Review Team (Gen-ART) reviews all IETF documents being processed
by the IESG for the IETF Chair.  Please treat these comments just
like any other last call comments.

For more information, please see the FAQ at

<https://wiki.ietf.org/en/group/gen/GenArtFAQ>.

Document: draft-ietf-netconf-keystore-29
Reviewer: Reese Enghardt
Review Date: 2024-01-22
IETF LC End Date: 2024-01-24
IESG Telechat date: Not scheduled for a telechat

Summary: The document is clear and fairly concise, and seems useful. It is
ready to be published after confirming that all important security
considerations have been documented.

Major issues: None, assuming the use of clear text keys has been sufficiently
discussed and its impacts carefully considered.

Minor issues:

I was surprised to see that the model allows to store keys in the clear. I
assume that the WG has carefully considered the security implications here, and
at least Section 4.2 says a key SHOULD be encrypted. Still, I wonder, if it's
worth giving a bit of context in the Introduction, maybe saying why clear text
keys are supported but that they SHOULD NOT be used unless there's no other way?

Introduction:
"This document intends to support existing practices; it does not intend to
define new behavior for servers to implement." This document is a Proposed
Standard, so I find the above sentence a bit confusing. If the point here is
that many or most server implementations already support the features and
conform to the behavior defined in this document, that's great. But otherwise I
assume we do want the implementations to change so they support the features or
conform to the behavior? If I got the intention of this sentence right, I
suggest changing it to "This document is intended to reflect existing practices
that many server implementations already support at the time of writing" or
some such.

Section 5 (Security Considerations):
Given the sensitive nature of the data stored using this model, I suggest
another pass at this section following RFC 3552 (BCP 72): Are there any other
possible attacks on confidentiality, integrity, authenticity, or availability,
which are in scope for this section? Is there any specific threat model that
needs to be considered? I also suggest naming some of the possible impacts of
these attacks. Some possible impacts seem obvious, but I wonder if I'm missing
any significant impacts because I'm not very familiar with the model.

Section 5.3:
"access control mechanisms like NACM SHOULD be used to limit access to the
key's secret data to only the most trusted authorized clients (e.g., an
organization’s crypto officer)." Does "client" refer to a person here, rather
than the RFC 6241 definition of client, which the document says it uses? If so,
I suggest finding a different term here.

Nits/editorial comments:

Section 5.1:
"The YANG module defined in this document defines a mechanism called a
"keystore" that, by its name, suggests that it will protect its contents from
unauthorized disclosure and modification." This might be semantics, but: In my
mind, the name suggests that there's sensitive data, which implies that the
data needs to be protected, with obvious consequences otherwise. Please
consider rephrasing this sentence.