Re: [netconf] AD review of draft-ietf-netconf-crypto-types-26

"Rob Wilton (rwilton)" <rwilton@cisco.com> Wed, 28 June 2023 07:57 UTC

Return-Path: <rwilton@cisco.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1977DC14CE31; Wed, 28 Jun 2023 00:57:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.594
X-Spam-Level:
X-Spam-Status: No, score=-9.594 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b="mVU5D73p"; dkim=pass (1024-bit key) header.d=cisco.com header.b="FP1wqxyF"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id d6rG_u_0wi3O; Wed, 28 Jun 2023 00:57:18 -0700 (PDT)
Received: from rcdn-iport-6.cisco.com (rcdn-iport-6.cisco.com [173.37.86.77]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 574F2C14CF1F; Wed, 28 Jun 2023 00:57:18 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=221212; q=dns/txt; s=iport; t=1687939038; x=1689148638; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=fmG6BQCULH3mZEYKZlMSHpINAJUUTvDmlixhsmTtbmo=; b=mVU5D73pNIoe1TlSJCHpYm+NJ6V0Khp2qi1cwr2MtEk2S6G4fRGXNFWH Filkps7ygY7JBczmj0Y4G0OsJKTPTtSane6t9AtlFeM0VAcfz5Pi82uLx fKghsCGQQDeqp5nYCDZ81Nu7DvWvyMUT4gMnYTCc7XGQzz521owKFOdwQ k=;
X-IPAS-Result: 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
IronPort-PHdr: A9a23:b7m4pBdwWd9a+ovlfBh5ZA2plGM/foqcDmcuAtIPkblCdOGk55v9e RWZ7vR2h1iPVoLeuLpIiOvT5rjpQndIoY2Av3YLbIFWWlcbhN8XkQ0tDI/NCUDyIPPwKS1vN M9DT1RiuXq8NBsdA97wMmXbuWb69jsOAlP6PAtxKP7yH9vIkMWzy+e005bSeA5PwjG6ZOA6I BC/tw6ErsANmsMiMvMo1xLTq31UeuJbjW9pPgeVmBDxp4+8qZVi6C9X/fkm8qZ9
IronPort-Data: A9a23:SZExMKlfqchhjgTGFrkQbIHo5gySJkRdPkR7XQ2eYbSJt1+Wr1Gzt xIWX2iPb/uJZmPxeI1+aty0oUgP78CHydE2TgY/qi4xFVtH+JHPbTi7wugcHM8zwunrFh8PA xA2M4GYRCwMZiaA4E/raNANlFEkvU2ybuKU5NXsZGYpHGeIdA970Ug4w7Bj0tYy6TSEK1rlV e3a8pW31GCNg1aYAkpMg05UgEoy1BhakGpwUm0WPZinjneH/5UmJM53yZWKEpfNatI88thW6 Ar05OrREmvxp3/BAz4++1rxWhVirrX6ZWBihpfKMkSvqkAqm8A87ko0HMQ9dHxmzBWbpdFS5 PpD75+ebycsApSZzYzxUzEAe81/FbdN9LmCKn+lvInCiUbHaHDrhf5pCSnaP6VBpb0xWj4Ip KdecWxQBvyAr7reLLaTUPZtgtgkKuHgPZgUvTdryjSx4fMOHsGaE/qVvYMwMDEYn8ZQLOrVP uYiSDtsdBbRajZOPGwKMcdr9AuvriCvL2IHwL6PnoI7+WHd0Elw3aTjddzYZteNQ8sQlVyJv n7BunjoGhwBctWbzRKE/26iwOjVkkvTXo8OH7q++NZrjUGdgGsJB3UruUCTu/K1jAu1XMhSb h1S8Ss1pq90/0uuJjXgY/GmiECloyUtHPpCKewZxC6DkKn6xSacOlFRG1atd+canMMxQDUr0 HqAkNXoGSFjvdWppZS1q+n8QdSaZHZ9EIMSWcMXZVBavIS78enfmjqKH4kzSvfk5jHgMWiom 2jikcQou1kEYSc2O0iT51vLhXenoYLEC19z7QTMVWXj5QR8DGJEW2BKwQaChRqjBN/JJrVkg JTis5THhAzpJc3U/BFhuM1XQNmUCw+taVUwe2JHEZg77CiK8HW+Z41W6zwWDB43YplUKGe3O xSJ5lM5CHpv0J2CM/cfj2WZVZxC8EQcPY+Nug38N4AXOcEhKGdrAgk3PBPOt4wSrKTcufhvZ cjEGSpdJX0bEq9ghCGnXPsQ1KRD+8zN7T27eHwP9Dz+ieD2TCfMEd8taQLSBshnt/nsiFuOr L5i2z6ilk83vBvWOHeHqOb+7DkicBAGOHwBg5YHK7PbeVU4RDxJ5j246epJRrGJVp99z4/g1 nq8QURfjlH4gBX6xc+iMBiPtJuHsU5DkE8G
IronPort-HdrOrdr: A9a23:tRSjdKutBrvND+iS5j2CPbGT7skCxIMji2hC6mlwRA09TyXGra GTdaUguyMc1gx/ZJh5o6H+BEDhexnhHZ4c2/h3AV7QZniZhILIFvAu0WKG+V3d8kLFh5VgPM tbAs1D4ZjLfCRHZKXBkUWF+rQbsaO6GcmT7I+0owYPPGNXguNbnnpE422gYytLrXx9dOIE/e 2nl7N6TlSbCBAqh8KAa0UtbqzmnZnmhZjmaRkJC1oM8w+Vlw6l77b8Dlyxwgoeeykn+8ZtzU H11yjCoomzufCyzRHRk0XJ6Y5NpdfnwtxfQOSRl8kuLCn2gArAXvUhZ1TChkF0nAic0idprD D+mWZkAy210QKUQoiBm2qv5+An6kdo15at8y7fvZKpm72JeNtzMbswuWseSGqX16Ll1+sMiJ 6iGAmixsNqJAKFkyLn69fSURZ20kKyvHo5iOYWy2dSSI0EddZq3MQiFW5uYeE99RjBmckaOf grCNuZ6OddcFucYXyctm5zwMa0VnB2GhudWEANtsGczjATxRlCvgEl7d1amm1F+IM2SpFC6e iBOqN0lKtWRstTaa5mHu8OTca+F2SISxPRN2CZJ0jhCcg8Sjnwgo+y5K9w6PCheZQOwpd3kJ PdUElAvWp3YE7qAd3m5uw9zvkMehTIYd3A8LAq23EigMyOeFPCC1zwdGwT
X-Talos-CUID: 9a23:pN/y7Gsi0Rq/oKqC2zY5uRx+6IsbU2Dm/TDwMXW5KkpGRueWZ3mw/Z9dxp8=
X-Talos-MUID: 9a23:adpS7Qklayd78MAw9795dnp7MtlZ/6/3JHsskJYeudiNHi12ACqk2WE=
X-IronPort-Anti-Spam-Filtered: true
Received: from rcdn-core-9.cisco.com ([173.37.93.145]) by rcdn-iport-6.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 28 Jun 2023 07:57:16 +0000
Received: from rcdn-opgw-1.cisco.com (rcdn-opgw-1.cisco.com [72.163.7.162]) by rcdn-core-9.cisco.com (8.15.2/8.15.2) with ESMTPS id 35S7vFUn003153 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Wed, 28 Jun 2023 07:57:16 GMT
Authentication-Results: rcdn-opgw-1.cisco.com; dkim=pass (signature verified) header.i=@cisco.com; spf=Pass smtp.mailfrom=rwilton@cisco.com; dmarc=pass (p=quarantine dis=none) d=cisco.com
X-IronPort-AV: E=Sophos;i="6.01,165,1684800000"; d="scan'208,217";a="3536226"
Received: from mail-bn8nam11lp2169.outbound.protection.outlook.com (HELO NAM11-BN8-obe.outbound.protection.outlook.com) ([104.47.58.169]) by rcdn-opgw-1.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 28 Jun 2023 07:57:14 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Msw6/0FK13y4lWV9Wo9eqw8PEfav6KGZZHrkEGxG+yzE4tKaBaxs2uhQ1G+EIuq/J13d0enBSW85IjukDQ0Lwfzpf/Mkg2MRSqzvb7TwCr5Mb50oLPpBQKyKqyk26Lmn8yOsoWuJeruoTM34VHnqtG+pKaHkLGcpS85eAiwmOUT/aLRUVhk0TPqvFBYfuol1lNdBwmngc18JIyCiE3ED1eiXEOkfnFAbFttYBRh7a1p8lRwTkAd5wJtkOr4bqrZIhPkWwV+GC0YJ2EKscBrPPSerfIcJZWD9ZjD5xhwDiRXyR0VXV+0ANJvECJuozsmRbzT33CazfhYc4UaG7I6eRQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=fmG6BQCULH3mZEYKZlMSHpINAJUUTvDmlixhsmTtbmo=; b=PSVQMdl0QT+2TZLSyC8r7TG27kl2JgRQ6ejkdTQ6Csjv7Fi5KdIpTvYJzwGWtNAFzF2xKnJ0wPHFoRrLMHH5da2uhtNhqcJ93kozURKVz2vAJWu4yA5Ke3mGTRm7S3M243+iLhlqEVq+cfQI/WN509gGD+5nikTrn4B2EMou3b9Z+d/d0gEwe5b/TyIo0tBOSzb6/7twM7OWcZJX+YFIE7N2w+/EP2BpWC4/B/j5oP5sz+nmoHiJCjTPNXQGaR3RnODM9U6aLr3AbGRGApEevWU4EyK24//GdaM7Oj5SXX4L0gTQdH8hzK7g2rwaU/WcHAPrw+I32JYJm0eDBZc+SQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=fmG6BQCULH3mZEYKZlMSHpINAJUUTvDmlixhsmTtbmo=; b=FP1wqxyFWXwOHA+x9Iz8s3dTMUSqXl0VkNgjaIfpXH9NW3Af9/Ey8UJtvLT04zBiriYU8WZNxjJlA0Yy+Lk5Hvj6pPLASX8oZgxD4iyxxc3mLwgp6/zqkSsFs1UK+aVAU3B7TqyCkyT3eybP/dyo+JwaEd5h4KpJEfQTRsu5tME=
Received: from BY5PR11MB4196.namprd11.prod.outlook.com (2603:10b6:a03:1ce::13) by PH8PR11MB7141.namprd11.prod.outlook.com (2603:10b6:510:22f::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6521.21; Wed, 28 Jun 2023 07:57:11 +0000
Received: from BY5PR11MB4196.namprd11.prod.outlook.com ([fe80::a6a3:7e3b:903b:2035]) by BY5PR11MB4196.namprd11.prod.outlook.com ([fe80::a6a3:7e3b:903b:2035%5]) with mapi id 15.20.6521.024; Wed, 28 Jun 2023 07:57:11 +0000
From: "Rob Wilton (rwilton)" <rwilton@cisco.com>
To: Kent Watsen <kent+ietf@watsen.net>
CC: "netconf@ietf.org" <netconf@ietf.org>, "draft-ietf-netconf-crypto-types.all@ietf.org" <draft-ietf-netconf-crypto-types.all@ietf.org>
Thread-Topic: [netconf] AD review of draft-ietf-netconf-crypto-types-26
Thread-Index: AdlcJlHFqFJT09R4QH66BFQctW2PAwCbv7YAEZRqNoABE3B2gAAX71Xw
Date: Wed, 28 Jun 2023 07:57:11 +0000
Message-ID: <BY5PR11MB41960FBE3A7AFD769B779A98B524A@BY5PR11MB4196.namprd11.prod.outlook.com>
References: <BY5PR11MB41965E5BACB9ABEEA18FBA15B5869@BY5PR11MB4196.namprd11.prod.outlook.com> <0100018715771411-85d9b95b-66ad-4333-92d5-e8e0e6182411-000000@email.amazonses.com> <BY5PR11MB4196E0C74FDBB316FCF9B6F4B522A@BY5PR11MB4196.namprd11.prod.outlook.com> <01000188fe833d41-7ffeef47-8711-40b0-b52d-8ba253cd30df-000000@email.amazonses.com>
In-Reply-To: <01000188fe833d41-7ffeef47-8711-40b0-b52d-8ba253cd30df-000000@email.amazonses.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: BY5PR11MB4196:EE_|PH8PR11MB7141:EE_
x-ms-office365-filtering-correlation-id: f0ed9b04-b8b0-4b12-6b43-08db77ad4752
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BY5PR11MB4196.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230028)(366004)(136003)(346002)(39860400002)(396003)(376002)(451199021)(38100700002)(122000001)(7696005)(166002)(54906003)(38070700005)(478600001)(186003)(66574015)(83380400001)(9686003)(55016003)(53546011)(6506007)(71200400001)(33656002)(2906002)(4326008)(66556008)(66446008)(66476007)(64756008)(66946007)(76116006)(30864003)(316002)(5660300002)(86362001)(52536014)(9326002)(8676002)(41300700001)(8936002)(21314003)(559001)(579004); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: QJplf34TmKBXAhwIs0X+Mw89Hq3LArIp+ai1kR6wmeTzDjuaudt0TiRJ3aBPOuqzE6mmmizEb/STrh0MM6Xi2oQDApYyU4jnVr15uW2MnkL7iDz0mMSAzHSMNrAQS1EVVrtQtlNCaJhWJ+fMo9VXYmgw3HM0Mx0Ma+SxP4+h/zmuFg6MoE7vWwz3jS1xjUX2Jx6AtfRERaOgRsaYAn2ABKRicpGMGByZrtYDnrHbh6w9nVJMA1nQKBAxgWoSD8TgqSQpw0nu0SKm9ZRWHU7mG8duTfK3hL0pulqtUV2dSwzFOfdEOsYUufKkapFVL5E5BFZ7lAYlqdfhuchshP/jU4eplmGFMePEX09JdBRdBz2BC4eTRczhE98ZH9BoTvi2rrOIsjuxqawn97wAEi91XpmnPdqefaq1TsuS8jzNyXO4lsD1GqTi5L4HNS1RuWdLff//orW7QLoRQPkuU/fT06tukFaNptZmd26i1EhfdOSzi0oPuTip8aMgmIwikUoBpA+cf8Xvt65Op7D/HK6u6rngYzP3IGXa8tNu4M+WN6CHl7sUlf9M7R8o9HXiej7c6eoFkVzJMNzwTD0UyvemQuPvCJVZi4picRhnwTS9fvuXZKaMiHuedjF1Z9redkrXYwsrtcw3j6hPPMccYJVSm3FRWykTChzJF5EORR82CmajFX3xQ8i0mQK5jMhnNYQFhxO4MjyCO3jhJNNs7naQm2PdlYAfwvPpSOW+VzX+9rfYe6zfLdJD4OnDPXYsPjim4wViND9EyK9pEoKmTKh+zDfyY3dkLDwfVo5G8/k4gbnxeEvVl0T6cQx+7/9O1SFvI+oKkBUh6snsRc5wq/DxWLYoWCr2EDwfcBJobxPB9qdNOh+Y66rNmfRoPyHfFI69mR1IwYvhG13FObTi9KvqOWTnhmkeA+Dtq8nlFetK+Xk1sxzcdN/3zZAZ8qlNR3lrx/obdZDxTQtgqbfEex1QSiwtyTi5IySxkt0aht6CgfF5dgV8sI7eEWnQI3+NfYGxL3Zawj4olotRVc/njvIGVyMnu4TbfJ69yRe58EThya7gO/52MEkIBDrJUwvHrhzLoMW3bKz5waZ56DNk5oAA2+Bjxqxi/Zl8fa7xFgRRjpZMebDKTDgb0tKxPnPiwVSvYiQfcriQsBzvw/NHVo2TpInTtLqnIkocqfzzw0Y9dyTOHyCJpVlb+ftGMeo1AHZawNpgHgi+wwpiUiGc6H+UGLGju5urzc1wQuxLPmqX55QSLGJaX+1Kcn28/0KwCoTzyKmwXhbUqyX2mx7DWrNGatQrSmmiBIR9a8iwZo6ANTnfooLkzbMXfQuoqPE41OsFmsz3UQxcIRQWkfT+iymsAC4hp6hl8g86RuM1+wX33Y1No2S2ONN8DDxsPFZ/JLsHf3snFXxyYQSNpRZ5Zs0ff50MmUcxYJYbJ8vuQPefF0q8Hl6ykPm14CsqzOHxorIa80/b/o+JKLAJSJ2oD8NeVkbehsegKjQB4LyTv7HLmQIdUsTCDzzPHLEbd9xyP/MOy4mLfrLhS3kszg+tRvVIVmHGCaRdGwP/zxfZC0S+RXsaC8sBf+6dCCxarep4l2YCUhzYzAiUjJKfJKPGFeXNxsUcqxaYtuFisSS9GgnPV/U=
Content-Type: multipart/alternative; boundary="_000_BY5PR11MB41960FBE3A7AFD769B779A98B524ABY5PR11MB4196namp_"
MIME-Version: 1.0
X-OriginatorOrg: cisco.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BY5PR11MB4196.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: f0ed9b04-b8b0-4b12-6b43-08db77ad4752
X-MS-Exchange-CrossTenant-originalarrivaltime: 28 Jun 2023 07:57:11.2554 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: wzxE6bDuHs6Hix8rZCqcOoqE6AVf/yGvi9DY1ubsM9XdBLHzolsQJd5FoShh+hbnmy5n6V/xHbPlY4N+RGVarg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH8PR11MB7141
X-Outbound-SMTP-Client: 72.163.7.162, rcdn-opgw-1.cisco.com
X-Outbound-Node: rcdn-core-9.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/qOQqwj097XKutEXMjnGwUKXm2gI>
Subject: Re: [netconf] AD review of draft-ietf-netconf-crypto-types-26
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 Jun 2023 07:57:23 -0000

Hi Kent,

I’ve also responded inline to close the issues, but in summary I’m good with your proposed changes for the two remaining issues.

Please note, given that your relationship diagram is common between all the drafts in the set, then I did flag a comment on this in the HTTP draft – querying why it doesn’t show the dependency on TLS and TCP.   I think that once this is discuss/resolved then I think my AD review on this draft is complete, and it will be ready to send to IETF LC.


From: Kent Watsen <kent+ietf@watsen.net>
Sent: 27 June 2023 21:20
To: Rob Wilton (rwilton) <rwilton@cisco.com>
Cc: netconf@ietf.org; draft-ietf-netconf-crypto-types.all@ietf.org
Subject: Re: [netconf] AD review of draft-ietf-netconf-crypto-types-26

Hi Rob,

Looking at the five reviews you’ve shared in the last few days, I want to start by sincerely thanking you for your extensive and thoughtful comments!  :)
[Rob Wilton (rwilton)]
No problem.  I’m currently working through the TLS draft, which should hopefully come this week (possibly even today), with NETCONF and RESTCONF still on my pile.  I’ve started looking at those as well, but I don’t know if I will get them all done this week.

I’m hoping that means that I can send crypto-types, keystore and trust store together as the first batch, then tcp, ssh, tls and http as a second batch, and then finally netconf and restconf together as a final batch.



Hi Kent,

Sorry, after a long delay … I have finally got back to you with replies.  I think that there are only a couple of comment still open.

I’ve also checked the changes between -26 and -27 and they all look fine to me.

I’m well aware the size of these documents, despite efforts to keep them short  :sigh:

Responses to your comments inlined below.

Kent


Regards,
Rob




From: Kent Watsen <kent@watsen.net<mailto:kent@watsen.net>>
Sent: 24 March 2023 21:12
To: Rob Wilton (rwilton) <rwilton@cisco.com<mailto:rwilton@cisco.com>>
Cc: netconf@ietf.org<mailto:netconf@ietf.org>; draft-ietf-netconf-crypto-types.all@ietf.org<mailto:draft-ietf-netconf-crypto-types.all@ietf.org>
Subject: Re: [netconf] AD review of draft-ietf-netconf-crypto-types-26

Hi Rob,

Thank you for your review.
Please see below for comments.

Kent // author




On Mar 22, 2023, at 5:39 AM, Rob Wilton (rwilton) <rwilton=40cisco.com@dmarc.ietf.org<mailto:rwilton=40cisco.com@dmarc.ietf.org>> wrote:

Hi Kent,

Here are my review comments for draft-ietf-netconf-crypto-types.  This document is well written, so I would like to thank you, the shepherd, and WG for a high-quality document.

I have a few comments, but will note that I'm not a security expert and hence some of my questions/comments may be due to my security ignorance ...

Few are experts.   Even the experts don't claim to be experts  ;)




Moderate level comments:

(1) p 14, sec 2.1.4.10.  The "asymmetric-key-pair-with-cert-grouping" Grouping

  Comments:
  *  This grouping defines an asymmetric key with at most one
     associated certificate, a commonly needed combination in protocol
     models.

Will it also always be the case that is has to support a CSR Action?

Nope, the action does not always have to be supported:
  1) the "generate-csr" action has a feature-statement on it
  2) the "description" statement clarifies that it is only available when the associated 'public-key-format' node's value is 'subject-public-key-info-format'.
  3) Consuming modules can place additional if-feature statements if more granularity is desired, i.e., the action is enabled for some (not all) keys.

[Rob Wilton (rwilton)]
Okay, this is fine.

I wonder whether the granularity of the features, i.e., being on or off at a module level may ultimately cause longer term modelling issues when used in groupings.  I appreciate that refinements using if-feature statements can be used to mitigate this, but that needs to be considered when the module is being designed.  But this not an issue that needs to be solved here, perhaps one for future YANG Next discussion.

So far I’ve yet to hear a complaint from implementors regarding the number or placement of the if-feature statements.  For my own application, the features placed where they are has allowed me to quickly/nicely turn-off unsupported parts of the configuration.

Resolved with no action.


                                                                                                                                                                                                                                                                                       (2) p 14, sec 2.1.4.11.  The "asymmetric-key-pair-with-certs-grouping" Grouping

  *  This grouping defines an asymmetric key with one or more
     associated certificates, a commonly needed combination in
     configuration models.

Will it also always be the case that is has to support a CSR Action?

Same response as for above.

[Rob Wilton (rwilton)]
Ack.

Resolved with no action.


                                                                                                                                                                                                                                                                                                               (3) p 45, sec 3.2.  No Support for Key Generation

  Early revisions of this document included "rpc" statements for
  generating symmetric and asymmetric keys.  These statements were
  removed due to an inability to obtain consensus for how to identify
  the key-algorithm to use.  Thusly, the solution presented in this
  document only supports keys to be configured via an external client,
  which does not support Security best practice.

There is an obvious risk that the SEC ADs may not accept this, and hence bump this back to the WG to solve, but I still think it is right to try and progress this document now.

Actually, this paragraph is no longer completely true, as later on we put the key-generation RPCs into the SSH- and TLS- client-server drafts (see "rpc generate-public-key" in ietf-[ssh/tls]-common.yang.  How about this?

NEW:

3.2.  No Support for Key Generation

   Early revisions of this document included "rpc" statements for
   generating symmetric and asymmetric keys.  These statements were
   removed due to an inability to obtain consensus for how to
   generically identify the key-algorithm to use.  Thusly, thei solution
   presented in this document only supports keys to be configured via an
   external client.  Separate protocol-specific modules can present
   protocol-specific key-generation RPCs (e.g., "generate-public-key" in
   [I-D.ietf-netconf-ssh-client-server] and

   [I-D.ietf-netconf-tls-client-server]).

[Rob Wilton (rwilton)]
Yes, except s/Thusly, thei/Hence, the/.

Fixed in my local copy (I will publish the full draft-set together once these reviews are complete.)



(4) p 46, sec 3.5.  Strength of Keys Conveyed

  Implementations SHOULD only use secure transport protocols meeting
  local policy.  A reasonable policy may, e.g., state that only
  ciphersuites listed as "recommended" by the IETF be used (e.g.,
  [RFC7525] for TLS).

Should the security considerations mention that passwords can be stored in cleartext and the risks associated with that (i.e., specifically beyond what is already described in section 3.8)?

I think that this is supposed to be that section, albeit the title doesn't seem to line-up with the text.  IIRC, this paragraph got munged in a Sec Dir review.   The general statement is, e.g., don't transfer a 256-key in a 128-protected tunnel.  I can rewrite that paragraph here, but then what title to use for this text?  - "Use of Recommended Ciphersuites"?

[Rob Wilton (rwilton)]
Sorry, my comment was unclear due to my commenting tool.

Section 3.6. covered “Encrypting Passwords”.  What I was asking is whether the security considerations section of the document should highlight that the model allows implementations to enable support for cleartext-keys, and warning of the security considerations associated with that?


I did split the last paragraph of that section into a new section called "Use of Recommended Ciphersuites”.

To you main point, I added this new section:

   Cleartext Passwords and Keys

           The module contained within this document enables, only when
            specific "feature" statements are enabled, for the cleartext
            value of passwords and keys to be stored in the configuration
            database.  Storing cleartext values for passwords and keys is
            NOT RECOMMENDED.

Good?

[Rob Wilton (rwilton)]
Yes, looks good thanks.



(5) p 51, sec 5.2.  Informative References


  [I-D.ietf-netconf-crypto-types]
             Watsen, K., "YANG Data Types and Groupings for
             Cryptography", Work in Progress, Internet-Draft, draft-
             ietf-netconf-crypto-types-25, 19 October 2022,
             <https://www.ietf.org/archive/id/draft-ietf-netconf-
             crypto-types-25.txt<https://www.ietf.org/archive/id/draft-ietf-netconf-%0b%C2%A0%C2%A0%C2%A0%C2%A0%C2%A0%C2%A0%C2%A0%C2%A0%C2%A0%C2%A0%C2%A0%C2%A0%C2%A0crypto-types-25.txt>>.

An informative reference to itself is strange and should be removed.

This has come up before.  The issue stems from a common source file being included into each draft's Introduction section.  I could fork-off custom-text for each draft, but instead chose to put the following into each drat's "Editorial Note" section:


   The "Relation to other RFCs" section Section 1.1 contains a self-

   reference to this draft, along with a corresponding Informative

   Reference in the Appendix.



Effectively asking the copy editor to make the fix.

[Rob Wilton (rwilton)]
Ah, okay.  From that text it wasn’t clear that you were asking the RFC Editor to fix this.  Please can you update the paragraph above in this doc, and the others, to make the request more explicit.  I.e., replace with This RFC and delete the self-reference.


Added the following to the “Editorial Note” section in each draft:

                Please replace the self-reference in this section with "This RFC” (or similar)
                and remove the self-reference in the "Normative/Informative References”
                section, whichever it is in.

Good?
[Rob Wilton (rwilton)]
Yes, looks good thanks.

Thanks,
Rob




Minor level comments:

(6) p 4, sec 1.1.  Relation to other RFCs

                                 crypto-types
                                   ^      ^
                                  /        \
                                 /          \
                        truststore         keystore
                         ^     ^             ^  ^
                         |     +---------+   |  |
                         |               |   |  |
                         |      +------------+  |
  tcp-client-server      |     /         |      |
     ^    ^        ssh-client-server     |      |
     |    |           ^            tls-client-server
     |    |           |              ^     ^        http-client-server
     |    |           |              |     |                 ^
     |    |           |        +-----+     +---------+       |
     |    |           |        |                     |       |
     |    +-----------|--------|--------------+      |       |
     |                |        |              |      |       |
     +-----------+    |        |              |      |       |
                 |    |        |              |      |       |
                 |    |        |              |      |       |
              netconf-client-server       restconf-client-server
  +======================+===========================================+
  |Label in Diagram      | Originating RFC                           |
  +======================+===========================================+
  |crypto-types          | [I-D.ietf-netconf-crypto-types]           |
  +----------------------+-------------------------------------------+
  |truststore            | [I-D.ietf-netconf-trust-anchors]          |
  +----------------------+-------------------------------------------+
  |keystore              | [I-D.ietf-netconf-keystore]               |
  +----------------------+-------------------------------------------+
  |tcp-client-server     | [I-D.ietf-netconf-tcp-client-server]      |
  +----------------------+-------------------------------------------+
  |ssh-client-server     | [I-D.ietf-netconf-ssh-client-server]      |
  +----------------------+-------------------------------------------+
  |tls-client-server     | [I-D.ietf-netconf-tls-client-server]      |
  +----------------------+-------------------------------------------+
  |http-client-server    | [I-D.ietf-netconf-http-client-server]     |
  +----------------------+-------------------------------------------+
  |netconf-client-server | [I-D.ietf-netconf-netconf-client-server]  |
  +----------------------+-------------------------------------------+
  |restconf-client-server| [I-D.ietf-netconf-restconf-client-server] |
  +----------------------+-------------------------------------------+

Rather than having a formal reference to E-D.ietf-netconf-crypto-types, it would probably be better to just label at as "This draft", with a note to change it to "This RFC".

Please see previous comment.
[Rob Wilton (rwilton)]
Okay.

Resolved by previous comment.



(7) p 6, sec 2.1.2.  Identities

  *  The various "leaf" identities define specific encoding formats.
     The derived identities defined in this document are sufficient for
     the effort described in Section 1.1 but, by nature of them being
     identities, additional derived identities MAY be defined by future
     efforts.

Using the term "leaf" applied to identities could be somewhat confusing, please consider using "terminal" or some other definition instead instead.

Now "terminal".
[Rob Wilton (rwilton)]
Okay.

Resolved.



(8) p 9, sec 2.1.4.2.  The "password-grouping" Grouping

     -  The "cleartext-password" node can encode any cleartext value.
     -  The "encrypted-password" node's structure is discussed in
        Section 2.1.4.1.

I noted that there is no feature statement for cleartext passwords or cleartext private keys?  E.g., is it plausible that for security purposes a device may want to disallow the use of cleartext passwords or cleartext private keys, without needing to resort to deviations?

Yes it is plausible.   I added an "feature" statement for the three "cleartext" cases.
[Rob Wilton (rwilton)]
Thanks.

Resolved.




Heads-up: I discovered that the list of features in the documents was out-of-date.  Also, there were mismatches in the naming convention.  Both issues corrected, with the result as follows:


Features:

  +-- one-symmetric-key-format

  +-- one-asymmetric-key-format

  +-- symmetrically-encrypted-value-format

  +-- asymmetrically-encrypted-value-format

  +-- cms-enveloped-data-format

  +-- cms-encrypted-data-format

  +-- csr-generation

  +-- p10-based-csrs

  +-- certificate-expiration-notification

  +-- cleartext-passwords

  +-- encrypted-passwords

  +-- cleartext-symmetric-keys

  +-- hidden-symmetric-keys

  +-- encrypted-symmetric-keys

  +-- cleartext-private-keys

  +-- hidden-private-keys

  +-- encrypted-private-keys



Also, since I discovered missing features in Section 2.1.1, I thought to check if any identities were missing in the next section (Section 2.1.2) and, sure enough, I found two that were missing, added to the end of the list:


     +-- csr-format

           +-- p10-csr-format {p10-csr-format?}

[Rob Wilton (rwilton)]
Okay.

Resolved.



(9) p 15, sec 2.2.1.  The "symmetric-key-grouping" and "asymmetric-key-pair-with-
       certs-grouping" Grouping

  Notably, this example illustrates a hidden asymmetric key (ex-hidden-
  asymmetric-key) has been used to encrypt a symmetric key (ex-
  encrypted-one-symmetric-based-symmetric-key) that has been used to
  encrypt another asymmetric key (ex-encrypted-rsa-based-asymmetric-
  key).  Additionally, the symmetric key is also used to encrypt a
  password (ex-encrypted-password).

When I first read this, I thought that this text was just describing the module and hence the prose regarding the hidden key was slightly confusing.  Hence, perhaps consider tweaking this to:

  Notably, this example module and associated configuration data illustrates ...

Updated - thanks!

Also fixed the Section-title, as 3 (not 2) groupings are illustrated by the example.
[Rob Wilton (rwilton)]
Thanks.

Resolved.


(10) p 15, sec 2.2.1.  The "symmetric-key-grouping" and "asymmetric-key-pair-with-
       certs-grouping" Grouping

    description
      "This module illustrates the 'symmetric-key-grouping'
       and 'asymmetric-key-grouping' groupings defined in
       the 'ietf-crypto-types' module defined in RFC AAAA.";

Suggest "This module" -> "This example module".  Just in case anyone ever manually extracts (copies) this module.

Good point - done.
[Rob Wilton (rwilton)]
Thanks.

Resolved.


(11) p 25, sec 2.3.  YANG Module

    feature p10-based-csrs {
      description
        "Indicates that the erver implements support
         for generating P10-based CSRs, as defined
         in RFC 2986.";
      reference
        "RFC 2986: PKCS #10: Certification Request Syntax
                   Specification Version 1.7";
    }

I'll leave it to the authors discretion but note that the p10-based-csrs feature could be made conditional on the csr-generation feature.

Not exactly, let me explain...

First, recall I mentioned above that mismatches in feature-naming convention were found?   "p10-based-csrs" was one of them.  The fix was to rename it (s/p10-based-csrs/p10-csr-format/) to make sense where used:

  identity p10-csr-format {

    if-feature "p10-csr-format";

    ...

  }

And elsewhere:


    action generate-csr {

      if-feature "csr-generation";

      ...

    }




So you see, one feature controls if an identity-based format exists, and the other feature controls if the action exists.  Different formats and different actions MAY be defined in the future, and thus orthogonal.
[Rob Wilton (rwilton)]
Makes sense.  Thanks for the clarification.

Resolved.



(12) p 26, sec 2.3.  YANG Module

    feature password-encryption {
      description
        "Indicates that the server supports password
         encryption.";
    }

I'm wondering whether this should really be a feature, or whether supporting encrypted passwords should be a base requirement of the module.

That would be a hardline stance to take.  AFAIK, no-one has implemented encrypting passwords, symmetric-keys, or asymmetric keys - the effort being significant (needing to also support a "hidden" key)...

For clarity before proceeding, here's the full grouping in my local repo:


  grouping password-grouping {

    description

      "A password that may be encrypted.";

    choice password-type {

      nacm:default-deny-write;

      mandatory true;

      description

        "Choice between password types.";

      case cleartext-password {

        if-feature "cleartext-passwords";

        leaf cleartext-password {

          nacm:default-deny-all;

          type string;

          description

            "The cleartext value of the password.";

        }

      }

      case encrypted-password {

        if-feature "encrypted-passwords";

        container encrypted-password {

          description

            "A container for the encrypted password value.";

          uses encrypted-value-grouping;

        }

      }

    }

  }



PS: per earlier comment about mismatched naming conventions, this feature was renamed.  s/password-encryption/encrypted-passwords/.


The "choice" is "mandatory true" and (per earlier response).  Both `case` statements defined here (other cases may be augmented in) must be explicitly switched-on.   So it becomes a matter of local-policy.   I imagine most server implementations starting with what's easy (cleartext-passwords), but then switch to encrypted-passwords when a requirement to do so comes in.
[Rob Wilton (rwilton)]
Okay.  We can defer this one to the Sec ADs review.

Resolved (for now)



(13) p 26, sec 2.3.  YANG Module

    feature private-key-encryption {
      description
        "Indicates that the server supports encryption
         of private keys.";
    }

I'm wondering whether this should really be a feature, or whether supporting encrypted private-keys should be a base requirement of the module.

See previous response.

Same goes for what was the "symmetric-key-encryption" feature too.
[Rob Wilton (rwilton)]
Agreed.


Resolved (for now)



(14) p 37, sec 2.3.  YANG Module

         This CMS encodes the degenerate form of the SignedData
         structure that is commonly used to disseminate X.509
         certificates and revocation objects (RFC 5280).";
      reference
        "RFC 5280:
           Internet X.509 Public Key Infrastructure Certificate
           and Certificate Revocation List (CRL) Profile.";
    }
    /*****************/
    /*   Groupings   */
    /*****************/

Up to the authors, but for these groupings you could potentially include reference statements back to the specific section that describe there.


Added a reference to RFC 5652, Section 5.2 for both typedefs: "trust-anchor-cert-cms" and "end-entity-cert-cms".
[Rob Wilton (rwilton)]
Thanks.

Resolved.


(15) p 37, sec 2.3.  YANG Module

           The leaf nodes MUST be direct descendants in the data tree,
           and MAY be direct descendants in the schema tree.";

I presume that the intention here is that intermediate choice/case statements are allowed, but not containers.  I wonder, whether that might also be worth stating (e.g., choice/case statements are allowed, but ...)

Yes, exactly that.  Text updated.
[Rob Wilton (rwilton)]
Thanks.

Resolved.



(16) p 38, sec 2.3.  YANG Module

           For encrypted keys, the value is the same as it would
           have been if the key were not encrypted.";

I don't understand what this sentence is intending to convey.

NEW:


         For encrypted keys, the value is the decrypted key's

         format (i.e., the 'encrypted-value-format' conveys the

         encrypted key's format.";



Better?   (Fixed in both locations where text occurs)
[Rob Wilton (rwilton)]
Yes, thanks.


Resolved.



(17) p 40, sec 2.3.  YANG Module

    grouping asymmetric-key-pair-grouping {
      description
        "A private key and its associated public key.  Implementations
         SHOULD ensure that the two keys are a matching pair.";

By "SHOULD ensure" does this mean "SHOULD validate", or something else?

Essentially, but I was trying to not use the word "validate" as it needs to be implemented outside of YANG-level validation.  Do you think text should change?
[Rob Wilton (rwilton)]
No, I think that what you have is fine.

Thanks.  Resolved.



(18) p 40, sec 2.3.  YANG Module

           For encrypted keys, the value is the same as it would have
           been if the key were not encrypted.";

Another instance of that sentence that I don't follow.

Yep, fixed it before (see earlier response)





(19) p 45, sec 3.3.  Unconstrained Public Key Usage

  The "asymmetric-key-pair-grouping" grouping uses the aforementioned
  "public-key-grouping" grouping, and carries the same traits.

For the two cases above, is there any specific advice that could be given.  E.g., they should only be used when ... or use XXX in preference?  Same comment applies to private keys below.

Ugh.  Not really.  Folks just select what is appropriate for their use-case.
[Rob Wilton (rwilton)]
Okay.

Resolved.


Nit level comments:

(20) p 10, sec 2.1.4.3.  The "symmetric-key-grouping" Grouping

  *  The "key-format" node is an identity-reference to the "symmetric-
     key-format" abstract base identity discussed in Section 2.1.2,
     enabling the symmetric key to be encoded using the format defined
     by any of the derived identities.

Possible better phrasing: ... using any of the formats defined by the derived identities.

Fixed in three places where the text occurs - thanks!



(21) p 13, sec 2.1.4.10.  The "asymmetric-key-pair-with-cert-grouping" Grouping

  This section presents a tree diagram [RFC8340] illustrating the
  "asymmetric-key-pair-with-cert-grouping" grouping.  The this diagram
  does not expand the internally used grouping statement(s):

The this diagram -> This tree diagram

Fixed!





(22) p 36, sec 2.3.  YANG Module

         The CMS MUST contain only a single chain of certificates.
         The client or end-entity certificate MUST only authenticate
         to last intermediate CA certificate listed in the chain.

Should this be "to the last intermediate"?

Fixed!





(23) p 36, sec 2.3.  YANG Module

    typedef end-entity-cert-cms {
      type signed-data-cms;
      description
        "A CMS SignedData structure that MUST contain the end
         entity certificate itself, and MAY contain any number
         of intermediate certificates leading up to a trust
         anchor certificate.  The trust anchor certificate
         MAY be included as well.

The previous description references root certificates, this description references the trust anchor certificate.  Are these the same thing, and if so would it help to align the descriptions?

These are similar but different concepts.

Only in the trivial case is the root and trust-anchor certs the same.
[Rob Wilton (rwilton)]
Ack.

All three points resolved.



Thanks,
Rob


Thank You!

Kent