Re: [secdir] secdir review of draft-ietf-pce-pcep-mib-10

Jonathan Hardwick <> Fri, 24 October 2014 15:41 UTC

Return-Path: <>
Received: from localhost ( []) by (Postfix) with ESMTP id 0D1DA1A1A91; Fri, 24 Oct 2014 08:41:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -1.911
X-Spam-Status: No, score=-1.911 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id krVR9_0gA8pA; Fri, 24 Oct 2014 08:41:35 -0700 (PDT)
Received: from ( []) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by (Postfix) with ESMTPS id 0E4EB1A1A87; Fri, 24 Oct 2014 08:41:07 -0700 (PDT)
Received: from ( by ( with Microsoft SMTP Server (TLS) id; Fri, 24 Oct 2014 16:41:01 +0100
Received: from ([fe80::d5d5:c683:a3be:3a19]) by ([fe80::b06d:4d13:5f63:3715%12]) with mapi id 14.03.0195.001; Fri, 24 Oct 2014 16:41:05 +0100
From: Jonathan Hardwick <>
To: David Harrington <>, "" <>
Thread-Topic: [secdir] secdir review of draft-ietf-pce-pcep-mib-10
Thread-Index: AQHP734WKIaVKfF//UO6MsVBo/g09pw/EuEAgAAzC4CAABv6sA==
Date: Fri, 24 Oct 2014 15:41:05 +0000
Message-ID: <>
References: <> <09a201cfef81$51aac740$f50055c0$> <>
In-Reply-To: <>
Accept-Language: en-US, en-GB
Content-Language: en-US
x-originating-ip: []
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Mailman-Approved-At: Fri, 24 Oct 2014 08:42:36 -0700
Cc: "" <>, "" <>, "" <>
Subject: Re: [secdir] secdir review of draft-ietf-pce-pcep-mib-10
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Security Area Directorate <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Fri, 24 Oct 2014 15:41:37 -0000


Thanks for pointing this out. The deviation from the boilerplate text seems to have been accidental - I will fix the document to use the boilerplate text verbatim.

Adrian - there will be a new version of the document uploaded shortly.


-----Original Message-----
From: David Harrington [] 
Sent: 24 October 2014 15:58
Cc: Carl Wallace;;;
Subject: Re: [secdir] secdir review of draft-ietf-pce-pcep-mib-10


I'm a MIB Doctor, not an AD.
But I'll respond anyway.

The text in the boilerplate went through a long negotiation process balancing interoperability, SNMP best current practices, and security best current practices.
The boilerplate represents the result - the best current practices related to interoperable security for SNMP and the MIB.
The boilerplate text should NOT be modified on a MIB-module by MIB-module basis.

The document being reviewed changed the boilerplate, changing SHOULD implement SNMPv3 into MUST implement SNMPv3. 
While desirable, that is actually incorrect for interoperability reasons.
Theoretically, MIB modules are independent of the protocol carrying the data defined in the module.
MIB modules should always be independent of the SNMP version that carries the data. So this MIB module, if correctly designed, should also work using SNMPv1/v2 or (maybe some time in the future) an SNMPv4.
This MIB module should also be able to be used with Netconf, using the MIB-to-YANG conversion standard.
So changing the SHOULD implement SNMPv3 to MUST implement SNMPv3 is incorrect, because SNMPv3 is NOT REQUIRED for this MIB module to work.

The best way for a document to address the security requirements for a MIB module, is to use the boilerplate verbatim, modifying only those places where it calls for a list of the sensitive objects, and the reasons why they are considered sensitive.

David Harrington

On Oct 24, 2014, at 7:54 AM, Adrian Farrel <> wrote:

> Sec and Ops ADs...
> Could you please interpret this review by Carl in the context of the "best current advice" and boilerplate for MIB modules.
> Thanks,
> Adrian
>> -----Original Message-----
>> From: iesg [] On Behalf Of Carl Wallace
>> Sent: 24 October 2014 12:31
>> To:
>> Cc:;
>> Subject: secdir review of draft-ietf-pce-pcep-mib-10
>> I have reviewed this document as part of the security directorate's
>> ongoing effort to review all IETF documents being processed by the IESG.
>> These comments were written primarily for the benefit of the security area
>> directors.  Document editors and WG chairs should treat these comments
>> just like any other last call comments.
>> This document describes a MIB that "describes managed objects for modeling
>> of Path Computation Element communications Protocol (PCEP) for
>> communications between a Path Computation Client (PCC) and a Path
>> Computation Element (PCE), or between two PCEs".
>> I am not a MIB guy and did not review the definitions.  The security
>> considerations section mostly addresses SNMP related considerations in
>> general via references to other specs.  This seems fine.  The only minor
>> nit here is the following:
>> 	Implementations MUST provide the security features described by the
>> SNMPv3 framework (see [RFC3410]), including full support for
>> authentication and privacy via the User-based Security Model (USM)
>> [RFC3414] with the AES cipher algorithm [RFC3826].
>> RFC3410 only defines support for use of CBC-DES.  If support for AES is
>> intended instead of DES, that should be noted more strongly here.  The
>> requirement for "full support" of RFC3414 could be misinterpreted.
> _______________________________________________
> secdir mailing list
> wiki: