Re: [secdir] Secdir last call review of draft-ietf-tictoc-1588v2-yang-10

Benjamin Kaduk <kaduk@mit.edu> Thu, 04 October 2018 02:50 UTC

Return-Path: <kaduk@mit.edu>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C828C130DD6; Wed, 3 Oct 2018 19:50:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level:
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6h6K8cJkbo7V; Wed, 3 Oct 2018 19:50:10 -0700 (PDT)
Received: from dmz-mailsec-scanner-1.mit.edu (dmz-mailsec-scanner-1.mit.edu [18.9.25.12]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 12A04130DD5; Wed, 3 Oct 2018 19:50:09 -0700 (PDT)
X-AuditID: 1209190c-b81ff70000004d4b-93-5bb57fdf31e3
Received: from mailhub-auth-4.mit.edu ( [18.7.62.39]) (using TLS with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by dmz-mailsec-scanner-1.mit.edu (Symantec Messaging Gateway) with SMTP id 39.8C.19787.0EF75BB5; Wed, 3 Oct 2018 22:50:08 -0400 (EDT)
Received: from outgoing.mit.edu (OUTGOING-AUTH-1.MIT.EDU [18.9.28.11]) by mailhub-auth-4.mit.edu (8.13.8/8.9.2) with ESMTP id w942o1HG020501; Wed, 3 Oct 2018 22:50:02 -0400
Received: from kduck.kaduk.org (24-107-191-124.dhcp.stls.mo.charter.com [24.107.191.124]) (authenticated bits=56) (User authenticated as kaduk@ATHENA.MIT.EDU) by outgoing.mit.edu (8.13.8/8.12.4) with ESMTP id w942nsnu029563 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Wed, 3 Oct 2018 22:49:56 -0400
Date: Wed, 03 Oct 2018 21:49:53 -0500
From: Benjamin Kaduk <kaduk@mit.edu>
To: Samuel Weiler <weiler@csail.mit.edu>
Cc: secdir@ietf.org, draft-ietf-tictoc-1588v2-yang.all@ietf.org, ietf@ietf.org, tictoc@ietf.org
Message-ID: <20181004024953.GK56675@kduck.kaduk.org>
References: <153857993505.8974.13448340837663409232@ietfa.amsl.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <153857993505.8974.13448340837663409232@ietfa.amsl.com>
User-Agent: Mutt/1.9.1 (2017-09-22)
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFvrFIsWRmVeSWpSXmKPExsUixG6nrvugfmu0wd92K4sbzW/YLZ5tnM9i 8WHhQxaLv8097A4sHkuW/GQKYIzisklJzcksSy3St0vgymhtPsBasIOzoqdzA0sD4w72LkZO DgkBE4kPR9cD2VwcQgKLmSS2zJwI5WxglPj79yEThHOFSaL1+QkWkBYWARWJhQsegtlsQHZD 92VmEFtEQEPiyL0ZrCA2s0CGxJHrp8DiwgIeEhdvnQIaxMHBC7RuSUMkiCkk4CzxZlY8SAWv gKDEyZlPWCA6tSRu/HsJVs0sIC2x/B8HSJhTwEXi3K2XYDeLCihL7O07xD6BUWAWku5ZSLpn IXQvYGRexSibklulm5uYmVOcmqxbnJyYl5dapGuol5tZopeaUrqJERSsnJI8OxjPvPE6xCjA wajEw9vxbku0EGtiWXFl7iFGSQ4mJVHe4Mqt0UJ8SfkplRmJxRnxRaU5qcWHGCU4mJVEeNPj gHK8KYmVValF+TApaQ4WJXHeCS2Lo4UE0hNLUrNTUwtSi2CyMhwcShK8c+qAGgWLUtNTK9Iy c0oQ0kwcnCDDeYCG7wKp4S0uSMwtzkyHyJ9i1OVoe3p9BrMQS15+XqqUOG8TSJEASFFGaR7c HFCSkcjeX/OKURzoLWHeiyBVPMAEBTfpFdASJqAl8jlbQJaUJCKkpBoYd+3T7v5xfGqup2d1 hurqvVuyn3fechUO2rho2hM9aR+dk7919FfvXjGpNTv6Wu8fqxcJ8vcKs6ZG6l+fJ5EoufhI j7xP9P7O3NQ3lsevSufIzKnQ0zP7tuBS1oWYdcaOF9YecHrEfCRpXoWF57IvjNvXvjmbp7mq 9uDd2j3flW6IBHHf4wk+rsRSnJFoqMVcVJwIAMbG2CsNAwAA
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/bOeWouFRRLOeqsSO9MWjRTpYMBs>
Subject: Re: [secdir] Secdir last call review of draft-ietf-tictoc-1588v2-yang-10
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 04 Oct 2018 02:50:12 -0000

On Wed, Oct 03, 2018 at 08:18:55AM -0700, Samuel Weiler wrote:
> Reviewer: Samuel Weiler
> Review result: Has Issues
> 
> I wonder whether there should be a requirement to use authentication when
> making updates.  As the doc says:

The NETCONF and RESTCONF secure transport layers already handle the
authentication requirements.  E.g., RFC 8040 Section 2.5:

   The RESTCONF server MUST authenticate client access to any protected
   resource.  If the RESTCONF client is not authenticated, the server
   SHOULD send an HTTP response with a "401 Unauthorized" status-line,
   as defined in Section 3.1 of [RFC7235].  The error-tag value
   "access-denied" is used in this case.

But thank you for doing the review, and you're right that this is
important!

-Ben

>    Write operations (e.g., edit-config) to these data nodes without
>    proper protection can have a negative effect on network operations.
> 
> I'm sure someone will argue "if this is used in a closed network, we can avoid
> the use of authentication".  Prudence suggests that "closed" networks don't
> remain that way forever, and defense-in-depth is advisable.  Let's add a MUST
> or at least a SHOULD.
> 
>