[OPSAWG] [Errata Verified] RFC9291 (7162)
RFC Errata System <rfc-editor@rfc-editor.org> Fri, 14 October 2022 10:53 UTC
Return-Path: <wwwrun@rfcpa.amsl.com>
X-Original-To: opsawg@ietfa.amsl.com
Delivered-To: opsawg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 53197C1524A6; Fri, 14 Oct 2022 03:53:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.66
X-Spam-Level:
X-Spam-Status: No, score=-6.66 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HEADER_FROM_DIFFERENT_DOMAINS=0.249, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XPQi5SRYw6mc; Fri, 14 Oct 2022 03:53:17 -0700 (PDT)
Received: from rfcpa.amsl.com (rfc-editor.org [50.223.129.200]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 79B11C14F5E1; Fri, 14 Oct 2022 03:53:17 -0700 (PDT)
Received: by rfcpa.amsl.com (Postfix, from userid 499) id 4CBD755E27; Fri, 14 Oct 2022 03:53:17 -0700 (PDT)
To: nmalykh@ieee.org, mohamed.boucadair@orange.com, oscar.gonzalezdedios@telefonica.com, samier.barguilgiraldo.ext@telefonica.com, luis-angel.munoz@vodafone.com
From: RFC Errata System <rfc-editor@rfc-editor.org>
Cc: rwilton@cisco.com, iesg@ietf.org, opsawg@ietf.org, iana@iana.org
Content-Type: text/plain; charset="UTF-8"
Message-Id: <20221014105317.4CBD755E27@rfcpa.amsl.com>
Date: Fri, 14 Oct 2022 03:53:17 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/opsawg/xoJwDHeVl-CTluosEvRNsFseOxc>
Subject: [OPSAWG] [Errata Verified] RFC9291 (7162)
X-BeenThere: opsawg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: OPSA Working Group Mail List <opsawg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/opsawg>, <mailto:opsawg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/opsawg/>
List-Post: <mailto:opsawg@ietf.org>
List-Help: <mailto:opsawg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsawg>, <mailto:opsawg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Oct 2022 10:53:21 -0000
The following errata report has been verified for RFC9291, "A YANG Network Data Model for Layer 2 VPNs". -------------------------------------- You may review the report below and at: https://www.rfc-editor.org/errata/eid7162 -------------------------------------- Status: Verified Type: Editorial Reported by: Nikolai Malykh <nmalykh@ieee.org> Date Reported: 2022-10-13 Verified by: Rob Wilton (IESG) Section: 9 Original Text ------------- 'ethernet-segments' and 'vpn-services': An attacker who is able to access network nodes can undertake various attacks, such as deleting a running L2VPN service, interrupting all the traffic of a client. In addition, an attacker may modify the attributes of a running service (e.g., QoS, bandwidth) or an ES, leading to malfunctioning of the service and therefore to SLA violations. In addition, an attacker could attempt to create an L2VPN service, add a new network access, or intercept/redirect the traffic to a non-authorized node. In addition to using NACM to prevent authorized access, such activity can be detected by adequately monitoring and tracking network configuration changes. Corrected Text -------------- 'ethernet-segments' and 'vpn-services': An attacker who is able to access network nodes can undertake various attacks, such as deleting a running L2VPN service, interrupting all the traffic of a client. In addition, an attacker may modify the attributes of a running service (e.g., QoS, bandwidth) or an ES, leading to malfunctioning of the service and therefore to SLA violations. In addition, an attacker could attempt to create an L2VPN service, add a new network access, or intercept/redirect the traffic to a non-authorized node. In addition to using NACM to prevent unauthorized access, such activity can be detected by adequately monitoring and tracking network configuration changes. Notes ----- Typo in last sentence, should be "unauthorized". -------------------------------------- RFC9291 (draft-ietf-opsawg-l2nm-19) -------------------------------------- Title : A YANG Network Data Model for Layer 2 VPNs Publication Date : September 2022 Author(s) : M. Boucadair, Ed., O. Gonzalez de Dios, Ed., S. Barguil, L. Munoz Category : PROPOSED STANDARD Source : Operations and Management Area Working Group Area : Operations and Management Stream : IETF Verifying Party : IESG
- [OPSAWG] [Errata Verified] RFC9291 (7162) RFC Errata System