[OPSAWG] [Editorial Errata Reported] RFC9291 (7162)

RFC Errata System <rfc-editor@rfc-editor.org> Thu, 13 October 2022 11:23 UTC

Return-Path: <wwwrun@rfcpa.amsl.com>
X-Original-To: opsawg@ietfa.amsl.com
Delivered-To: opsawg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 702F2C1522B2 for <opsawg@ietfa.amsl.com>; Thu, 13 Oct 2022 04:23:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.96
X-Spam-Level:
X-Spam-Status: No, score=-3.96 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HEADER_FROM_DIFFERENT_DOMAINS=0.249, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uMCRos-DA8Ty for <opsawg@ietfa.amsl.com>; Thu, 13 Oct 2022 04:23:02 -0700 (PDT)
Received: from rfcpa.amsl.com (rfc-editor.org [50.223.129.200]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 975AAC14CE40 for <opsawg@ietf.org>; Thu, 13 Oct 2022 04:23:02 -0700 (PDT)
Received: by rfcpa.amsl.com (Postfix, from userid 499) id 4125B13376E; Thu, 13 Oct 2022 04:23:02 -0700 (PDT)
To: rfc-editor@rfc-editor.org
From: RFC Errata System <rfc-editor@rfc-editor.org>
Cc: nmalykh@ieee.org, mohamed.boucadair@orange.com, oscar.gonzalezdedios@telefonica.com, samier.barguilgiraldo.ext@telefonica.com, luis-angel.munoz@vodafone.com, opsawg@ietf.org
Content-Type: text/plain; charset="UTF-8"
Message-Id: <20221013112302.4125B13376E@rfcpa.amsl.com>
Date: Thu, 13 Oct 2022 04:23:02 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/opsawg/T2OeTMFVajmXva5bMwK0RHXk0XA>
Subject: [OPSAWG] [Editorial Errata Reported] RFC9291 (7162)
X-BeenThere: opsawg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: OPSA Working Group Mail List <opsawg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/opsawg>, <mailto:opsawg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/opsawg/>
List-Post: <mailto:opsawg@ietf.org>
List-Help: <mailto:opsawg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsawg>, <mailto:opsawg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 13 Oct 2022 11:23:06 -0000

The following errata report has been submitted for RFC9291,
"A YANG Network Data Model for Layer 2 VPNs".

--------------------------------------
You may review the report below and at:
https://www.rfc-editor.org/errata/eid7162

--------------------------------------
Type: Editorial
Reported by: Nikolai Malykh <nmalykh@ieee.org>

Section: 9

Original Text
-------------
   'ethernet-segments' and 'vpn-services':  An attacker who is able to
      access network nodes can undertake various attacks, such as
      deleting a running L2VPN service, interrupting all the traffic of
      a client.  In addition, an attacker may modify the attributes of a
      running service (e.g., QoS, bandwidth) or an ES, leading to
      malfunctioning of the service and therefore to SLA violations.  In
      addition, an attacker could attempt to create an L2VPN service,
      add a new network access, or intercept/redirect the traffic to a
      non-authorized node.  In addition to using NACM to prevent
      authorized access, such activity can be detected by adequately
      monitoring and tracking network configuration changes.


Corrected Text
--------------
   'ethernet-segments' and 'vpn-services':  An attacker who is able to
      access network nodes can undertake various attacks, such as
      deleting a running L2VPN service, interrupting all the traffic of
      a client.  In addition, an attacker may modify the attributes of a
      running service (e.g., QoS, bandwidth) or an ES, leading to
      malfunctioning of the service and therefore to SLA violations.  In
      addition, an attacker could attempt to create an L2VPN service,
      add a new network access, or intercept/redirect the traffic to a
      non-authorized node.  In addition to using NACM to prevent
      unauthorized access, such activity can be detected by adequately
      monitoring and tracking network configuration changes.


Notes
-----
Typo in last sentence, should be "unauthorized".

Instructions:
-------------
This erratum is currently posted as "Reported". If necessary, please
use "Reply All" to discuss whether it should be verified or
rejected. When a decision is reached, the verifying party  
can log in to change the status and edit the report, if necessary. 

--------------------------------------
RFC9291 (draft-ietf-opsawg-l2nm-19)
--------------------------------------
Title               : A YANG Network Data Model for Layer 2 VPNs
Publication Date    : September 2022
Author(s)           : M. Boucadair, Ed., O. Gonzalez de Dios, Ed., S. Barguil, L. Munoz
Category            : PROPOSED STANDARD
Source              : Operations and Management Area Working Group
Area                : Operations and Management
Stream              : IETF
Verifying Party     : IESG