Re: [netmod] Secdir last call review of draft-ietf-netmod-factory-default-14

Qin Wu <bill.wu@huawei.com> Tue, 10 March 2020 12:14 UTC

Return-Path: <bill.wu@huawei.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 239913A11B9 for <netmod@ietfa.amsl.com>; Tue, 10 Mar 2020 05:14:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9tv6idv-az-d for <netmod@ietfa.amsl.com>; Tue, 10 Mar 2020 05:13:59 -0700 (PDT)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AD1F33A11BB for <netmod@ietf.org>; Tue, 10 Mar 2020 05:13:59 -0700 (PDT)
Received: from LHREML713-CAH.china.huawei.com (unknown [172.18.7.107]) by Forcepoint Email with ESMTP id B0B445DCC9940F3ABD6F for <netmod@ietf.org>; Tue, 10 Mar 2020 12:13:57 +0000 (GMT)
Received: from DGGEML404-HUB.china.huawei.com (10.3.17.39) by LHREML713-CAH.china.huawei.com (10.201.108.36) with Microsoft SMTP Server (TLS) id 14.3.408.0; Tue, 10 Mar 2020 12:13:57 +0000
Received: from DGGEML511-MBS.china.huawei.com ([169.254.4.27]) by DGGEML404-HUB.china.huawei.com ([fe80::b177:a243:7a69:5ab8%31]) with mapi id 14.03.0439.000; Tue, 10 Mar 2020 20:13:52 +0800
From: Qin Wu <bill.wu@huawei.com>
To: =?utf-8?B?QmFsw6F6cyBMZW5neWVs?= <balazs.lengyel=40ericsson.com@dmarc.ietf.org>, "'netmod@ietf.org'" <netmod@ietf.org>
Thread-Topic: Secdir last call review of draft-ietf-netmod-factory-default-14
Thread-Index: AdX21MP/2zkYIfFbQPmpql59+9P4kQ==
Date: Tue, 10 Mar 2020 12:13:51 +0000
Message-ID: <B8F9A780D330094D99AF023C5877DABAAD548070@dggeml511-mbs.china.huawei.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.138.33.123]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/EyFyQ_u72cBvO0P9pfUiJRp0ihk>
Subject: Re: [netmod] Secdir last call review of draft-ietf-netmod-factory-default-14
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 10 Mar 2020 12:14:01 -0000

Thanks Balazs for heads up. I think the security guideline we are currently following is one defined in the following link:
https://trac.ietf.org/trac/ops/wiki/yang-security-guidelines
If it is a issue, I believe it applies to all YANG related documents.

-Qin
-----邮件原件-----
发件人: netmod [mailto:netmod-bounces@ietf.org] 代表 Balázs Lengyel
发送时间: 2020年3月10日 19:59
收件人: 'netmod@ietf.org' <netmod@ietf.org>
主题: [netmod] FW: Secdir last call review of draft-ietf-netmod-factory-default-14

As an author of netmod drafts I would like to see some general guidance on this issue. Can someone help please.
Balazs

-----Original Message-----
From: Stephen Kent via Datatracker <noreply@ietf.org> 
Sent: 2020. március 9., hétfő 20:15
To: secdir@ietf.org
Cc: netmod@ietf.org; draft-ietf-netmod-factory-default.all@ietf.org; last-call@ietf.org
Subject: Secdir last call review of draft-ietf-netmod-factory-default-14

Reviewer: Stephen Kent
Review result: Has Issues

SECDIR review of draft-ietf-netmod-factory-default-14

Section 6, Security Considerations, calls for use of SSH (RFC 6242) with NETCONF and HTTPS (RFC 8446) with RESTCONF. The TLS reference is current, citing TLS v1.3. However, RFC 6242 is a document that describes how to use SSH with NETCONF. That document, in turn, cites RFC 4254, and that RFC cites RFC
4253 for a description of SSH. 4253 is a very much out of date document; the integrity and key management algorithms in the original RFC have been updated 3 times (6668, 8268, and 8332). The encryption algorithms cited in 4253 are all outdated. This discussion of SSH security for use with NETCONF, based on the one citation, seems to be inconsistent with current IETF crypto guidelines.
This is a problem that the net management area should address before this document is approved.

The discussion of how a factory-reset RPC may isolate a device, is good, as is the warning about not relying on this RPC to prevent recovery of security-sensitive data from NV storage.