[OPSAWG] [Editorial Errata Reported] RFC9291 (7162)
RFC Errata System <rfc-editor@rfc-editor.org> Thu, 13 October 2022 11:23 UTC
Return-Path: <wwwrun@rfcpa.amsl.com>
X-Original-To: opsawg@ietfa.amsl.com
Delivered-To: opsawg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 702F2C1522B2 for <opsawg@ietfa.amsl.com>; Thu, 13 Oct 2022 04:23:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.96
X-Spam-Level:
X-Spam-Status: No, score=-3.96 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HEADER_FROM_DIFFERENT_DOMAINS=0.249, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uMCRos-DA8Ty for <opsawg@ietfa.amsl.com>; Thu, 13 Oct 2022 04:23:02 -0700 (PDT)
Received: from rfcpa.amsl.com (rfc-editor.org [50.223.129.200]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 975AAC14CE40 for <opsawg@ietf.org>; Thu, 13 Oct 2022 04:23:02 -0700 (PDT)
Received: by rfcpa.amsl.com (Postfix, from userid 499) id 4125B13376E; Thu, 13 Oct 2022 04:23:02 -0700 (PDT)
To: rfc-editor@rfc-editor.org
From: RFC Errata System <rfc-editor@rfc-editor.org>
Cc: nmalykh@ieee.org, mohamed.boucadair@orange.com, oscar.gonzalezdedios@telefonica.com, samier.barguilgiraldo.ext@telefonica.com, luis-angel.munoz@vodafone.com, opsawg@ietf.org
Content-Type: text/plain; charset="UTF-8"
Message-Id: <20221013112302.4125B13376E@rfcpa.amsl.com>
Date: Thu, 13 Oct 2022 04:23:02 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/opsawg/T2OeTMFVajmXva5bMwK0RHXk0XA>
Subject: [OPSAWG] [Editorial Errata Reported] RFC9291 (7162)
X-BeenThere: opsawg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: OPSA Working Group Mail List <opsawg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/opsawg>, <mailto:opsawg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/opsawg/>
List-Post: <mailto:opsawg@ietf.org>
List-Help: <mailto:opsawg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsawg>, <mailto:opsawg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 13 Oct 2022 11:23:06 -0000
The following errata report has been submitted for RFC9291, "A YANG Network Data Model for Layer 2 VPNs". -------------------------------------- You may review the report below and at: https://www.rfc-editor.org/errata/eid7162 -------------------------------------- Type: Editorial Reported by: Nikolai Malykh <nmalykh@ieee.org> Section: 9 Original Text ------------- 'ethernet-segments' and 'vpn-services': An attacker who is able to access network nodes can undertake various attacks, such as deleting a running L2VPN service, interrupting all the traffic of a client. In addition, an attacker may modify the attributes of a running service (e.g., QoS, bandwidth) or an ES, leading to malfunctioning of the service and therefore to SLA violations. In addition, an attacker could attempt to create an L2VPN service, add a new network access, or intercept/redirect the traffic to a non-authorized node. In addition to using NACM to prevent authorized access, such activity can be detected by adequately monitoring and tracking network configuration changes. Corrected Text -------------- 'ethernet-segments' and 'vpn-services': An attacker who is able to access network nodes can undertake various attacks, such as deleting a running L2VPN service, interrupting all the traffic of a client. In addition, an attacker may modify the attributes of a running service (e.g., QoS, bandwidth) or an ES, leading to malfunctioning of the service and therefore to SLA violations. In addition, an attacker could attempt to create an L2VPN service, add a new network access, or intercept/redirect the traffic to a non-authorized node. In addition to using NACM to prevent unauthorized access, such activity can be detected by adequately monitoring and tracking network configuration changes. Notes ----- Typo in last sentence, should be "unauthorized". Instructions: ------------- This erratum is currently posted as "Reported". If necessary, please use "Reply All" to discuss whether it should be verified or rejected. When a decision is reached, the verifying party can log in to change the status and edit the report, if necessary. -------------------------------------- RFC9291 (draft-ietf-opsawg-l2nm-19) -------------------------------------- Title : A YANG Network Data Model for Layer 2 VPNs Publication Date : September 2022 Author(s) : M. Boucadair, Ed., O. Gonzalez de Dios, Ed., S. Barguil, L. Munoz Category : PROPOSED STANDARD Source : Operations and Management Area Working Group Area : Operations and Management Stream : IETF Verifying Party : IESG
- [OPSAWG] [Editorial Errata Reported] RFC9291 (716… RFC Errata System
- Re: [OPSAWG] [Editorial Errata Reported] RFC9291 … mohamed.boucadair
- Re: [OPSAWG] [Editorial Errata Reported] RFC9291 … Joe Clarke (jclarke)
- Re: [OPSAWG] [Editorial Errata Reported] RFC9291 … Rob Wilton (rwilton)