Re: [netmod] I-D Action: draft-ietf-netmod-factory-default-13.txt

"Rob Wilton (rwilton)" <rwilton@cisco.com> Tue, 25 February 2020 18:01 UTC

Return-Path: <rwilton@cisco.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 930363A123F for <netmod@ietfa.amsl.com>; Tue, 25 Feb 2020 10:01:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.6
X-Spam-Level:
X-Spam-Status: No, score=-9.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=GdQkUWm+; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=mOyjZBYi
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gZzeu3mGxXcM for <netmod@ietfa.amsl.com>; Tue, 25 Feb 2020 10:01:38 -0800 (PST)
Received: from alln-iport-4.cisco.com (alln-iport-4.cisco.com [173.37.142.91]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 93F6C3A1248 for <netmod@ietf.org>; Tue, 25 Feb 2020 10:01:38 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=5938; q=dns/txt; s=iport; t=1582653698; x=1583863298; h=from:to:subject:date:message-id:references:in-reply-to: content-transfer-encoding:mime-version; bh=t09idkWs0h/SLXzDu3omFHPxHRu7SQjT0nYUVJgvtbQ=; b=GdQkUWm+AZURP1OWg0ePqJ8VySjHUWA2o+TRtbOtrwm/hobsFRILMtGA PyIY25wSDrwB7K7FtfK6vPs7xFSWMfJer+j0x6g/lQmmK3ZQHZvTgN8Dh dwjRNwnO3LpfN8hPyrbDFYTFXQSki+Nu3aobtxvWi2d70AKqqii5W619o U=;
IronPort-PHdr: 9a23:l7U70BfOtty5DZDfecNBU0QrlGMj4e+mNxMJ6pchl7NFe7ii+JKnJkHE+PFxlwGRD57D5adCjOzb++D7VGoM7IzJkUhKcYcEFnpnwd4TgxRmBceEDUPhK/u/dTM7GNhFUndu/mqwNg5eH8OtL1A=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0B4DwCrX1Ve/5hdJa1lHgELHINPUAVsWCAECyoKhAqDRgOKc06CEZgUgUKBEANUCQEBAQwBARgNCAIEAQGDe0UCF4FnJDgTAgMNAQEFAQEBAgEFBG2FNwyFYwEBAQEDAQEQEREMAQEsDAsEAgEGAg4DAQMBAQMCIwMCAgIlCxQBAgYIAQEEARIIARmDBYJKAy4BDpI1kGcCgTmIYnWBMoJ/AQEFgS8BAwIOQYMGGIIMCYEOKowkGoFBP4ERR4JMPoJZCwEBAQEBARiBLwEBAhiDDzKCLJBlnzUKgjyHUY8wgkl9hx6ETot8jnCBTYcvhTCNGwIEAgQFAg4BAQWBaSKBWHAVGiGCbAlHGA2OHYNzhRSFQXQCgSeLGgEnBIEHAYEPAQE
X-IronPort-AV: E=Sophos;i="5.70,485,1574121600"; d="scan'208";a="436836979"
Received: from rcdn-core-1.cisco.com ([173.37.93.152]) by alln-iport-4.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 25 Feb 2020 18:01:36 +0000
Received: from XCH-RCD-003.cisco.com (xch-rcd-003.cisco.com [173.37.102.13]) by rcdn-core-1.cisco.com (8.15.2/8.15.2) with ESMTPS id 01PI1a2m002272 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Tue, 25 Feb 2020 18:01:36 GMT
Received: from xhs-rtp-003.cisco.com (64.101.210.230) by XCH-RCD-003.cisco.com (173.37.102.13) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Tue, 25 Feb 2020 12:01:35 -0600
Received: from xhs-rcd-003.cisco.com (173.37.227.248) by xhs-rtp-003.cisco.com (64.101.210.230) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Tue, 25 Feb 2020 13:01:35 -0500
Received: from NAM02-BL2-obe.outbound.protection.outlook.com (72.163.14.9) by xhs-rcd-003.cisco.com (173.37.227.248) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Tue, 25 Feb 2020 12:01:35 -0600
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=DSNSXdUhPcrc9SgE2mkmBShsuG9x3sUe2QNA2fZExaEkVDJ3ozgUQ1O51g4Zr/A+jyxQpsDtfGAIG56cCIANRt7RSepGPIqbJsD4ad17Nd8JbRBDKHjHqIDNj9zbwxSyYaJWwbFKYz3sJxle/cTLh5kuzR3WUmaPloYUBz2t+8pN62uTLBkebCclY98F1wMmVs0ofAZmxlVxxCaT5Dsk8lBFb4ZezcULbPRCnRjdXsssnrPpgDfYUzTW/TSb+Sg3h4H9RpRIMky5s+5Cloc8+Pqgkfn5dMjvZyeKKe46+XTfD6n6c9psDhe+naPE6rdc2327joS2Y0w3Bw5ocq7m5Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=t09idkWs0h/SLXzDu3omFHPxHRu7SQjT0nYUVJgvtbQ=; b=WiKM79chFpbIZP/lOACmePnrC9qOGbBFgAM+XlM5EtyZ4I3Nifo/HaePrfESic4Bwpw79ZyCRY1ilJoYK0fQdJnkTexcElf7+bN9JIE61uPx6ZG+aXLjfGLZytnyeLUhIoIRuykRn1uFOaINOak1rpL9rCeJLkCBc1T52gBK2aWok5MCAsx7K/NSRYlCYrct1a2MsCanXmonOF7mbeCNtPNSYZsVTWfUpOaBJK2UO7iqDWZJMe32Q+sUMhjMNbpD7uTZ5TjK8XMknMaJYGk5xV/3GXptZKulgQlvFORK1h3hRcXqHwNXW5Ea0SHexHFLTtlsSS8/YyZXqCKEzqJX4g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=t09idkWs0h/SLXzDu3omFHPxHRu7SQjT0nYUVJgvtbQ=; b=mOyjZBYi3EJDtntfEAIbQ9MfxBwUyOAbGDl1ffKjS9wtmTn133jwUL6+Fk2FX27UKOuXzJOceXIYC/uvIswbST/RYaECTSteo/X7gK+g4xjVN6NpOqWetUDyajEMEgwoFBtzod0mDkMpUwKqoWBbPPeojNCVtpVJ8DxYphrW9pk=
Received: from MN2PR11MB4366.namprd11.prod.outlook.com (2603:10b6:208:190::17) by MN2PR11MB3967.namprd11.prod.outlook.com (2603:10b6:208:13d::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2750.17; Tue, 25 Feb 2020 18:01:34 +0000
Received: from MN2PR11MB4366.namprd11.prod.outlook.com ([fe80::b9ce:1058:5fa6:44a1]) by MN2PR11MB4366.namprd11.prod.outlook.com ([fe80::b9ce:1058:5fa6:44a1%7]) with mapi id 15.20.2750.021; Tue, 25 Feb 2020 18:01:34 +0000
From: "Rob Wilton (rwilton)" <rwilton@cisco.com>
To: Qin Wu <bill.wu@huawei.com>, "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: I-D Action: draft-ietf-netmod-factory-default-13.txt
Thread-Index: AdXr2IMAD0g3SlFzSkOFaoDGbtP2GQAKuw9Q
Date: Tue, 25 Feb 2020 18:01:33 +0000
Message-ID: <MN2PR11MB4366AC76CCE57CFCE7B3A620B5ED0@MN2PR11MB4366.namprd11.prod.outlook.com>
References: <B8F9A780D330094D99AF023C5877DABAAD4E3635@dggeml511-mbx.china.huawei.com>
In-Reply-To: <B8F9A780D330094D99AF023C5877DABAAD4E3635@dggeml511-mbx.china.huawei.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=rwilton@cisco.com;
x-originating-ip: [173.38.220.55]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 99d3ff11-c563-4fe0-06d6-08d7ba1cc012
x-ms-traffictypediagnostic: MN2PR11MB3967:
x-microsoft-antispam-prvs: <MN2PR11MB39677421BA8BB05F8FF1B24DB5ED0@MN2PR11MB3967.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-forefront-prvs: 0324C2C0E2
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(136003)(39860400002)(376002)(366004)(396003)(346002)(189003)(199004)(66574012)(81156014)(110136005)(5660300002)(33656002)(316002)(2906002)(8676002)(966005)(478600001)(71200400001)(8936002)(81166006)(6506007)(66556008)(64756008)(76116006)(52536014)(26005)(55016002)(186003)(66946007)(66446008)(66476007)(7696005)(53546011)(86362001)(9686003); DIR:OUT; SFP:1101; SCL:1; SRVR:MN2PR11MB3967; H:MN2PR11MB4366.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-ms-exchange-antispam-messagedata: E3EaA6QCqlxlsLLqVIZc+wKJFwGpppA6I05mVn+7BDt//kzzUoRJypXh530idjBpIMq0a6iDvvmiyWGw0KaZr72NOTcmHBD3XjoQaD85pl9Xc0AzpwOH1vGsSDPWrs5XS1PwfmAm/TOOKv7hiTsdvw==
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 99d3ff11-c563-4fe0-06d6-08d7ba1cc012
X-MS-Exchange-CrossTenant-originalarrivaltime: 25 Feb 2020 18:01:33.7843 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: EErKplLU4cwaep1oITueld0AkGnvL+2BIc/P4E4m9hVLdf0iFP0E2Aimmy0Vb4mnJLraLzLrn8mvqPnlq6zdkQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR11MB3967
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.13, xch-rcd-003.cisco.com
X-Outbound-Node: rcdn-core-1.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/ZxaKycuZuTvT4nom_IhpbJ-k1n4>
Subject: Re: [netmod] I-D Action: draft-ietf-netmod-factory-default-13.txt
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 Feb 2020 18:01:42 -0000

Hi Qin,

I think that you may have accidentally removed the RFC editor instructions in the YANG module that presumably we want to still keep?

	 	// RFC Ed.: update the date below with the date of RFC publication	
 	      // and remove this note.	
 	      // RFC Ed.: replace XXXX with actual RFC number and remove this	
 	      // note.

For the update to the security section, my concern wasn't so much about no longer being able to access a private key, but more that a client cannot rely on any private data being unrecoverable after the factory-reset RPC.  I.e. they can't just use the factory-reset RPC and then sell the device on ebay, with the assumption that all private data has been properly cleansed.

OLD:

	
 	   The non-volatile storage is expected to be wiped clean and reset back	
 	   to the factory default state, but there is no guarantee that the data	
 	   is wiped according to any particular data cleansing standard, and the	
 	   owner of the device MUST NOT rely on any temporary data (e.g.,	
 	   including private keys) for recovery after the factory-reset RPC has	
 	   been invoked.

NEW:

	
 	   The non-volatile storage is expected to be wiped clean and reset back	
 	   to the factory default state, but there is no guarantee that the data	
 	   is wiped according to any particular data cleansing standard, and the	
 	   owner of the device MUST NOT rely on any sensitive data (e.g.,	
 	   private keys) being forensically unrecoverable from the device's
          non-volatile storage after a factory-reset RPC has been invoked.

Thanks,
Rob


> -----Original Message-----
> From: netmod <netmod-bounces@ietf.org> On Behalf Of Qin Wu
> Sent: 25 February 2020 12:39
> To: netmod@ietf.org
> Subject: Re: [netmod] I-D Action: draft-ietf-netmod-factory-default-13.txt
> 
> v-13 is posted, the diff is:
> https://www.ietf.org/rfcdiff?url2=draft-ietf-netmod-factory-default-13
> Thanks Rob for valuable review.
> 
> -Qin
> -----邮件原件-----
> 发件人: I-D-Announce [mailto:i-d-announce-bounces@ietf.org] 代表 internet-
> drafts@ietf.org
> 发送时间: 2020年2月25日 20:36
> 收件人: i-d-announce@ietf.org
> 抄送: netmod@ietf.org
> 主题: I-D Action: draft-ietf-netmod-factory-default-13.txt
> 
> 
> A New Internet-Draft is available from the on-line Internet-Drafts
> directories.
> This draft is a work item of the Network Modeling WG of the IETF.
> 
>         Title           : A YANG Data Model for Factory Default Settings
>         Authors         : Qin Wu
>                           Balazs Lengyel
>                           Ye Niu
> 	Filename        : draft-ietf-netmod-factory-default-13.txt
> 	Pages           : 12
> 	Date            : 2020-02-25
> 
> Abstract:
>    This document defines a YANG data model to allow clients to reset a
>    server back to its factory default condition.  It also defines a
>    "factory-default" datastore to allow clients to read the factory
>    default configuration for the device.
> 
>    The YANG data model in this document conforms to the Network
>    Management Datastore Architecture (NMDA) defined in RFC 8342.
> 
> 
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-netmod-factory-default/
> 
> There are also htmlized versions available at:
> https://tools.ietf.org/html/draft-ietf-netmod-factory-default-13
> https://datatracker.ietf.org/doc/html/draft-ietf-netmod-factory-default-13
> 
> A diff from the previous version is available at:
> https://www.ietf.org/rfcdiff?url2=draft-ietf-netmod-factory-default-13
> 
> 
> Please note that it may take a couple of minutes from the time of
> submission until the htmlized version and diff are available at
> tools.ietf.org.
> 
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
> 
> 
> _______________________________________________
> I-D-Announce mailing list
> I-D-Announce@ietf.org
> https://www.ietf.org/mailman/listinfo/i-d-announce
> Internet-Draft directories: http://www.ietf.org/shadow.html or
> ftp://ftp.ietf.org/ietf/1shadow-sites.txt
> _______________________________________________
> netmod mailing list
> netmod@ietf.org
> https://www.ietf.org/mailman/listinfo/netmod