Re: [netconf] I-D Action: draft-ietf-netconf-keystore-27.txt

tom petch <ietfc@btconnect.com> Wed, 18 January 2023 16:48 UTC

Return-Path: <ietfc@btconnect.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 953FCC14F72D for <netconf@ietfa.amsl.com>; Wed, 18 Jan 2023 08:48:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.899
X-Spam-Level:
X-Spam-Status: No, score=-6.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=btconnect.onmicrosoft.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vEdP6F298wqR for <netconf@ietfa.amsl.com>; Wed, 18 Jan 2023 08:48:43 -0800 (PST)
Received: from EUR04-DB3-obe.outbound.protection.outlook.com (mail-db3eur04on2128.outbound.protection.outlook.com [40.107.6.128]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7B86AC14F720 for <netconf@ietf.org>; Wed, 18 Jan 2023 08:48:43 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=BWEqa2Rb4DH1tmeGWnmt2gWB4qf+zywmR5hzKpaPtqDchJ/lzkpPCz0n7gWyB3XuKlX4kiRXdu7oo+HP9Jb3CXPbem1a6w5LY/n9rZ6slOIxiasDBP/qG8HcD67rIyjibjXhfmT0ZT1QmvVVUSuMSk8naM1BLSW40DhD3P5hn/36Zgu99Ltx+DH2yGf+n1R101qyeT8l63xzXsMiGwuRufnR4+jwCbb0OZySnwsXc2Vj80Hjl9tEs5mmifzcJl35RD00er+UOkFq9m3qm7Szc3BFgCKSGnPGtdxaK22Jh+pznRJ+CL+BCgat+ZipA7m8hy7wMG9t8fuyzfwFiQ/1gg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=+EFA9OuttZDdeQ0g4XOlbUJoMiOy/xguPB2wCRpUf+A=; b=SkLn8bZnEkswKo7jDswppTCsjrA/lEA8iojr1PTBmJ5utLXQ1P7/GFzptnYGWiwW6u/jgsi8AfrV5lGw+PX79KpNtczdC7cb4S1a/J/tdzoVU6r1Pf8IV+G+FCeQHTIKsRXCUCKv9NsQ4iBrksseCKE1d8WP8U+MXbkDuc/HcmLP9PUUWczPxAvK1IbfN+0BQu9Imzygtu2b8HcbI+6oPvV2n3dT2Lgwztlj0MPSm8Gz9EhEO7+kt7fu4liRkbDn+T+BsH85NlgsnMJuR9tif2nnrH5Q4BAwpW0GYK6z9dKwNHoziiIBHUdVfhsaBu1VuLwpiujt2b1zIOQ9a9Gp/Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=btconnect.com; dmarc=pass action=none header.from=btconnect.com; dkim=pass header.d=btconnect.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=btconnect.onmicrosoft.com; s=selector2-btconnect-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=+EFA9OuttZDdeQ0g4XOlbUJoMiOy/xguPB2wCRpUf+A=; b=xVzNEousnwpaBOEqfOj0kan5agwY0YuuNEERPlWVG408qsiBW9YZOInMOvE7AIVBscvgpEK2t8xrA+pSwVRUSq1TOXIJBjS2zs1CsfGGN5pGiyU1IvDnjSHB+znsENOiln7SwNfq2c1h8n08ovx+1NW4SIS2EjyMvwOL6Y85O24=
Received: from AM7PR07MB6248.eurprd07.prod.outlook.com (2603:10a6:20b:134::11) by AM8PR07MB7650.eurprd07.prod.outlook.com (2603:10a6:20b:248::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6002.24; Wed, 18 Jan 2023 16:48:39 +0000
Received: from AM7PR07MB6248.eurprd07.prod.outlook.com ([fe80::86cd:e36d:9333:8537]) by AM7PR07MB6248.eurprd07.prod.outlook.com ([fe80::86cd:e36d:9333:8537%5]) with mapi id 15.20.6002.024; Wed, 18 Jan 2023 16:48:39 +0000
From: tom petch <ietfc@btconnect.com>
To: Henk Birkholz <henk.birkholz@sit.fraunhofer.de>, "netconf@ietf.org" <netconf@ietf.org>
Thread-Topic: [netconf] I-D Action: draft-ietf-netconf-keystore-27.txt
Thread-Index: AQHZDlqJEQexgEdWrU6y3VkhOjn+T66kSplrgAARNACAAEAsdQ==
Date: Wed, 18 Jan 2023 16:48:39 +0000
Message-ID: <AM7PR07MB6248AF994BDAE1934A9A3D8EA0C79@AM7PR07MB6248.eurprd07.prod.outlook.com>
References: <167087094875.45631.5752947059896213334@ietfa.amsl.com> <AM7PR07MB6248CDDEA380E553031F4622A0C79@AM7PR07MB6248.eurprd07.prod.outlook.com> <c95d0f80-9ee9-8960-098c-1ec8060eb98d@sit.fraunhofer.de>
In-Reply-To: <c95d0f80-9ee9-8960-098c-1ec8060eb98d@sit.fraunhofer.de>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=btconnect.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: AM7PR07MB6248:EE_|AM8PR07MB7650:EE_
x-ms-office365-filtering-correlation-id: 00bbe435-f85b-443e-c9e7-08daf973d986
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AM7PR07MB6248.eurprd07.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230022)(136003)(39860400002)(396003)(366004)(346002)(376002)(451199015)(66899015)(7696005)(71200400001)(6506007)(55016003)(38100700002)(966005)(316002)(110136005)(26005)(186003)(478600001)(53546011)(9686003)(66556008)(76116006)(64756008)(66946007)(66446008)(91956017)(66476007)(66574015)(8936002)(41300700001)(5660300002)(83380400001)(8676002)(52536014)(122000001)(4001150100001)(2906002)(82960400001)(38070700005)(33656002)(86362001); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: btconnect.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: AM7PR07MB6248.eurprd07.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 00bbe435-f85b-443e-c9e7-08daf973d986
X-MS-Exchange-CrossTenant-originalarrivaltime: 18 Jan 2023 16:48:39.1752 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: cf8853ed-96e5-465b-9185-806bfe185e30
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: Y+JCmIthytlYSg5wFjBQ5RBSoGz9429vXGNlZg0Dbe+a9WA4XaOEoZuRYgbdnK7IznJQCEHE33rLoznhVRcG7w==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM8PR07MB7650
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/q2YmcmE17Vufal6WyLw-tYKTd0A>
Subject: Re: [netconf] I-D Action: draft-ietf-netconf-keystore-27.txt
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 18 Jan 2023 16:48:47 -0000

From: Henk Birkholz <henk.birkholz@sit.fraunhofer.de>
Sent: 18 January 2023 12:56

Hi Tom,

to your comment on "Security 101" content. I do not see that basic
repetition as a flaw considering the scope of audience, as implementers
might occasionally tend not to read all useful, but only the minimal
essential documents.

Having said that. Maybe the "Security 101" problem can be avoided by
some well-selected references to the extend of "Security Considerations
about key management of RFC-XXXX apply"? That could avoid the repetition
a bit.

<tp>
Henk

I am contrasting this I-D with RFC8177 on key chains which says
'  Implementations with keys provided via this model should store them
   using best current security practices.'
which is the sort of statement I would expect to see in a routing or ops RFC, leaving the technical detail to a Security Area one!

Tom Petch

 

Viele Grüße,

Henk

On 18.01.23 13:37, tom petch wrote:
> Some thoughts, editorial mostly, on this version of this I-D.
>
> Generally, I find many of the identifiers cumbersome, up to nine hyphen separated elements; I would see three or four as good and five as tolerable, more than that error prone,
>
>       grouping local-or-keystore-end-entity-cert-with-key-grouping
> As ever, I see -grouping as prolix.  I would also like to shorten local-or-keystore as a generic term for well, locality, or location, or place or site or   .... there are lots of possible synonyms.  Also where the grouping is about a cert then I think that that should come before locality.  To me it is the cert that matters not the option about its locality
>
> I would also like to shorten 'cert-with-key' which occurs many times but do not have an alternative to offer.
>
> The other general comment is that in places this reads as Security 101, which I do not think that the Netconf WG should be publishing (even if the text has come from Security ADs or such like).  The changes here would be small, deletions mostly,  but I think should be made.  Thus comments about built-in keys SHOULD NOT be cleartext are nothing to do with a YANG module, they are or they are not and no YANG module is going to change that.   There are several such statements in sections 3, 4 and 5 which to me belong in a BCP from the Security Area.
>
> Some less contentious points.
>
>       grouping asymmetric-key-pair-with-cert-grouping
>       grouping asymmetric-key-pair-with-certs-grouping
> I think an unfortunate pairing; that letter 's' buried in the middle will be missed.  Even
>       grouping asymmetric-key-pair-with-cert
>       grouping asymmetric-key-pair-with-certs
> could cause erors.
>
>     The term "keystore" is defined in this /draft /document/
>
> The term "key" may be used to mean one of three things in this /draft:/document/
> Well, four to be picky - you also have it from RFC2119
>
> In the tree diagrams. the type 'string' seems to wander around, as in 2.1.3.7, and not stay in a predictable place
>
> What happens to choice/case if no features are defined?  I do not know if YANG can enforce or cope with that.
>
> s.2.1.4
> 'The protocol-accessible nodes for the "ietf-keystore" module are an instance'
> perhaps instances
>
> s.2.2.3
>   a big section when there are no pages numbers - worth splitting into subsections IMHO
>
> prefix eku
> we could do with a documentation-only YANG prefix; to me this looks too real, perhaps ex-eku
>
> s.3
> built-in keys
> Built into what?  The YANG module?  suggest 'built into the device' or some such.
>
> I-D.ma-netmod-with-system
> needs to be Normative IMHO - I cannot understand system without it
>
> copied into <running>
> copied from where?
>
> all key types may be copied
> again, copied from where?
>
> built-in key
> lacks a terminal period
>
> <running> data tree
> Why data tree here when every else is just <running>?
>
> s.4 Nothing to do with Netconf IMHO!
>
> s.5.3
> SSH, TLS lack references
>
> Tom Petch
>
> _______________________________________
> From: netconf <netconf-bounces@ietf.org> on behalf of internet-drafts@ietf.org <internet-drafts@ietf.org>
> Sent: 12 December 2022 18:49
> To: i-d-announce@ietf.org
> Cc: netconf@ietf.org
> Subject: [netconf] I-D Action: draft-ietf-netconf-keystore-27.txt
>
>
> A New Internet-Draft is available from the on-line Internet-Drafts directories.
> This draft is a work item of the Network Configuration WG of the IETF.
>
>          Title           : A YANG Data Model for a Keystore
>          Author          : Kent Watsen
>    Filename        : draft-ietf-netconf-keystore-27.txt
>    Pages           : 52
>    Date            : 2022-12-12
>
> Abstract:
>     This document defines a YANG module called "ietf-keystore" that
>     enables centralized configuration of both symmetric and asymmetric
>     keys.  The secret value for both key types may be encrypted or
>     hidden.  Asymmetric keys may be associated with certificates.
>     Notifications are sent when certificates are about to expire.
>
>
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-netconf-keystore/
>
> There is also an HTML version available at:
> https://www.ietf.org/archive/id/draft-ietf-netconf-keystore-27.html
>
> A diff from the previous version is available at:
> https://author-tools.ietf.org/iddiff?url2=draft-ietf-netconf-keystore-27
>
>
> Internet-Drafts are also available by rsync at rsync.ietf.org::internet-drafts
>
>
> ____________________________
> _______________________________________________
> netconf mailing list
> netconf@ietf.org
> https://www.ietf.org/mailman/listinfo/netconf