Kathleen Moriarty's Discuss on draft-ietf-rtgwg-yang-key-chain-20: (with DISCUSS and COMMENT)

Kathleen Moriarty <Kathleen.Moriarty.ietf@gmail.com> Wed, 26 April 2017 16:34 UTC

Return-Path: <Kathleen.Moriarty.ietf@gmail.com>
X-Original-To: rtgwg@ietf.org
Delivered-To: rtgwg@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 31A6212953D; Wed, 26 Apr 2017 09:34:32 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: Kathleen Moriarty <Kathleen.Moriarty.ietf@gmail.com>
To: The IESG <iesg@ietf.org>
Cc: draft-ietf-rtgwg-yang-key-chain@ietf.org, Jeff Tantsura <jefftant.ietf@gmail.com>, rtgwg-chairs@ietf.org, jefftant.ietf@gmail.com, rtgwg@ietf.org
Subject: Kathleen Moriarty's Discuss on draft-ietf-rtgwg-yang-key-chain-20: (with DISCUSS and COMMENT)
X-Test-IDTracker: no
X-IETF-IDTracker: 6.50.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <149322447211.30122.5870367500760951821.idtracker@ietfa.amsl.com>
Date: Wed, 26 Apr 2017 09:34:32 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtgwg/IPj3BXVyOliH6r5a-kkBUJ8tiUA>
X-BeenThere: rtgwg@ietf.org
X-Mailman-Version: 2.1.22
List-Id: Routing Area Working Group <rtgwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtgwg>, <mailto:rtgwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtgwg/>
List-Post: <mailto:rtgwg@ietf.org>
List-Help: <mailto:rtgwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtgwg>, <mailto:rtgwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 26 Apr 2017 16:34:32 -0000

Kathleen Moriarty has entered the following ballot position for
draft-ietf-rtgwg-yang-key-chain-20: Discuss

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-rtgwg-yang-key-chain/



----------------------------------------------------------------------
DISCUSS:
----------------------------------------------------------------------

Thanks for your work on this draft.  There is one outstanding issue from
the SecDir review that may require some updated text to resolve.  It
seems use of the key wrap method in RFC5649 requires more guidance for
implementations to use it with this YANG module.  It's good to know that
this is in use for other modules, so having a clear reference either to
another draft or the text being in this draft for later reference would
be helpful.

In looking at this text within the draft, I think it would be better to
pull the text out of the Security Considerations section and into an
earlier section of the draft.  It's better to introduce this prior to
enumerating security considerations for the draft since this something
that would be implemented.  Then security considerations should mention
the considerations of using this option versus just what's in NACM.

You have the text:

  When configured, the key-strings can be encrypted using the AES Key
   Wrap algorithm [AES-KEY-WRAP].  The AES key-encryption key (KEK) is
   not included in the YANG model and must be set or derived
independent
   of key-chain configuration.  When AES key-encryption is used, the
   hex-key-string feature is also required since the encrypted keys
will
   contain characters that are not representable in the YANG string
   built-in type [YANG].  AES key-encryption MAY be used for added key
   security in situations where the NETCONF Access Control Mode is not
   available.

I think it's pretty straightforward after looking at RFC5649, but maybe
more text would be helpful to clarify for implementers.  This might mean
more text from 5649 on what gets placed in the YANG data model where you
have already allocated for this or including an example.


----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

Thank you for working through the SecDir review and making the suggested
updates.

Since the following text int he Security Considerations section is a
recommendation, IMO it would be better to drop "or otherwise obfuscated"
from the sentence as encrypting the keys really should be the
recommendation.  Can we make this update?

   It is RECOMMENDED that keys be encrypted or otherwise obfuscated
when
   stored internally on a network device supporting this specification.

If obfuscation is what happens more often in practice, maybe mention this
as a fallback from the recommendation, but not make them sound
equivalent?