Re: [secdir] Secdir last call review of draft-ietf-ipsecme-mib-iptfs-05
Don Fedyk <dfedyk@labn.net> Thu, 13 October 2022 12:14 UTC
Return-Path: <dfedyk@labn.net>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 27AE9C14F73B; Thu, 13 Oct 2022 05:14:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.911
X-Spam-Level:
X-Spam-Status: No, score=-1.911 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=labn.onmicrosoft.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zShQHPjbbMr2; Thu, 13 Oct 2022 05:13:59 -0700 (PDT)
Received: from NAM02-SN1-obe.outbound.protection.outlook.com (mail-sn1anam02on2106.outbound.protection.outlook.com [40.107.96.106]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E361FC14F6EC; Thu, 13 Oct 2022 05:13:53 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=BLE3lEJE4fMO0bFXE+vwJHVyahOpk/FLtJ2PIOqGADjaHrmUYIgL6H8K+yGFmcfQlnlWl1/Sfa+NKK8IZBFqJgBmGe5xMvXoh85EcePwx7/OABGjf0wxmBygqaUYVRNw/rop1fiT8o8fNz8Ax7SAWxXOgoSrF7DA2ZyAseIOYu00SEaS+WZ6nkjQ2RLQ9YNDonMjuz8wRdWsb/FFaySn1FlK265N8UZ2UK1cNgpS7dhjGxafQ2SR/5psDi0qoDQa7uzVXHkrwKVU4hexI5ISsFd7y0fktKh2dPIvJKzZ9UTQh07eTLX9166hrOerNw0Xqml6uOR1TID0DdDkYrpObg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=FhbiQ3yS2cauHyqJqGk1nYcKVE4iIHV38jUdnU9nHJw=; b=EO+cUWBb1RhofQ7wT1O8ovs3KAJ4BmiuQMT5U4SViiQe13Us3wdKkXDyl4VTpbZp/9mh8pPgXjDwvbZrQY/ettnoZzt1cGAg6Yh/KLPBgNMF8zNXpjI3T3TRlAlMGTseDdxF48N3EMLEaVLKlePRIGk4jZRalAmo5klejpcXuycuv5IroLBSumvq2cx+jIDx4FH44iDwnpS092u2klHgMLbKqRwEy87ghSBEp27DRrRYwLzJKXpg4M31hYTunmWg1aT/zHCeB14w32gmuoZBbeHR2uWhE6akW08GKXcFfO//zo4gK50lb5VyzpjLIeRBnRlFYv0YHpchknVh+COzyg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=labn.net; dmarc=pass action=none header.from=labn.net; dkim=pass header.d=labn.net; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=labn.onmicrosoft.com; s=selector2-labn-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=FhbiQ3yS2cauHyqJqGk1nYcKVE4iIHV38jUdnU9nHJw=; b=Nia/zuyQMvBeMO8PA1Nk7zboD/YEWr5uPI77IqJWl+A1ddYqnIKQhqxdZb0V7ZK/lC4F4ztyYKzt7sgktL/0Ec6g4rc2uQFjiGxxTrm10yZ3vxWyeWH+jNwzPv7CgsdTpGgdVjprt8Ukx/tl8+fCOPcOYXXQ+AMHQlwX47ECGWw=
Received: from PH7PR14MB5368.namprd14.prod.outlook.com (2603:10b6:510:133::11) by PH0PR14MB4277.namprd14.prod.outlook.com (2603:10b6:510::6) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5723.26; Thu, 13 Oct 2022 12:13:48 +0000
Received: from PH7PR14MB5368.namprd14.prod.outlook.com ([fe80::c285:9424:a2db:84b5]) by PH7PR14MB5368.namprd14.prod.outlook.com ([fe80::c285:9424:a2db:84b5%5]) with mapi id 15.20.5676.028; Thu, 13 Oct 2022 12:13:48 +0000
From: Don Fedyk <dfedyk@labn.net>
To: Ivaylo Petrov <ivaylo@ackl.io>, "draft-ietf-ipsecme-mib-iptfs.all@ietf.org" <draft-ietf-ipsecme-mib-iptfs.all@ietf.org>, "secdir@ietf.org" <secdir@ietf.org>, The IESG <iesg@ietf.org>
Thread-Topic: Secdir last call review of draft-ietf-ipsecme-mib-iptfs-05
Thread-Index: AQHY3noX/4p1upZtpk6xeG29+06Rs64MOQ9w
Date: Thu, 13 Oct 2022 12:13:48 +0000
Message-ID: <PH7PR14MB5368E485C91AD3A5892F9734BB259@PH7PR14MB5368.namprd14.prod.outlook.com>
References: <CAJFkdRy4rG3Xody0FSU_KXtN4+oi1yexQj54p=7CHP8VihnPNQ@mail.gmail.com>
In-Reply-To: <CAJFkdRy4rG3Xody0FSU_KXtN4+oi1yexQj54p=7CHP8VihnPNQ@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=labn.net;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: PH7PR14MB5368:EE_|PH0PR14MB4277:EE_
x-ms-office365-filtering-correlation-id: 61598da6-dbbb-4e25-910a-08daad146222
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:PH7PR14MB5368.namprd14.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230022)(376002)(39830400003)(366004)(396003)(136003)(346002)(451199015)(66899015)(83380400001)(33656002)(110136005)(316002)(52536014)(66446008)(66556008)(66946007)(86362001)(76116006)(64756008)(450100002)(8676002)(8936002)(66476007)(41300700001)(186003)(9686003)(122000001)(2906002)(55016003)(26005)(53546011)(38100700002)(71200400001)(5660300002)(38070700005)(7696005)(6506007)(478600001); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: cjfUa8zL8sReKBjngOwZm0hGpp8NJXX49FJsbxpOOi9mYkJ7q6b4loq2di7y/cqjH2C3J30aXuxVeRiXrQg0KtNwYA9VI5OP/ZTFB6Fm+8yOu6mQUx11aA2KAHFXesTv8XjUStey7xXj8h8d62RPVi8Lt4EsXzkLmWWsbnfSxjyBZ1m4FRXA1+3F2hxeGDaIkVm3tphWI0PTpakuaW8VQVOwMn99HUZpDs1uRFAHuM5TpCYrCYSKQ2Xh8eZ3Oy7EdWvgRlqS0QMXDVH8FJX4QXfbww9rY2WxvHGPZ1+bTm61Is+4SkWdCwlbXZ8AJ0Ti1AP3RbM/5xqtXDYNurL1MQn+ZS9yIWWBRFdLLhhQWq9KmmtURe0d3XVdEa1GqWzjynzVJdJaUv3o4I1NXQj/MAfb4iUQFI1iHCvcibDJEZk=
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: labn.net
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: PH7PR14MB5368.namprd14.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 61598da6-dbbb-4e25-910a-08daad146222
X-MS-Exchange-CrossTenant-originalarrivaltime: 13 Oct 2022 12:13:48.3573 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: eb60ac54-2184-4344-9b60-40c8b2b72561
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 011cTuWUeOGNKGj2Z1YF5So7Kpar10Apf4SFxib0OPOHACP3n8RZHHI0RM5xFws3emFTkMVkhgF8T0+XmY5TxA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH0PR14MB4277
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/cKsaXECBtPtx8OG2-sYfCnMFdV4>
Subject: Re: [secdir] Secdir last call review of draft-ietf-ipsecme-mib-iptfs-05
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 13 Oct 2022 12:14:04 -0000
Hi Ivaylo These paragraphs were added as part of Ipsecme WG last call and implicitly refer to the prior paragraph that states: Access to IP inner and outer traffic flow security statistics can provide information that IP traffic flow security obscures such as the true activity of the flows using IP traffic flow security. If we turn these paragraphs into a bullet list introduced like this: To prevent unauthorized access to SNMP including access to IP-TFS sensitive objects: * Implementations SHOULD provide the security features described by the SNMPv3 framework (see [RFC3410]), and implementations claiming compliance to the SNMPv3 standard MUST include full support for authentication and privacy via the User-based Security Model (USM) [RFC3414] with the AES cipher algorithm [RFC3826]. Implementations MAY also provide support for the Transport Security Model (TSM) [RFC5591] in combination with a secure transport such as SSH [RFC5592] or TLS/DTLS [RFC6353]. * Further, deployment of SNMP versions prior to SNMPv3 is NOT RECOMMENDED. Instead, it is RECOMMENDED to deploy SNMPv3 and to enable cryptographic security. It is then a customer/operator responsibility to ensure that the SNMP entity giving access to an instance of this MIB module is properly configured to give access to the objects only to those principals (users) that have legitimate rights to indeed GET or SET (change/create/delete) them. Does that satisfy your nit? Thanks Don -----Original Message----- From: Ivaylo Petrov <ivaylo@ackl.io> Sent: Wednesday, October 12, 2022 4:34 PM To: draft-ietf-ipsecme-mib-iptfs.all@ietf.org; secdir@ietf.org; The IESG <iesg@ietf.org> Subject: Secdir last call review of draft-ietf-ipsecme-mib-iptfs-05 Reviewer: Ivaylo Petrov Review result: Has Nits Hi, I have reviewed this document as part of the security directorate's ongoing effort to review all IETF documents being processed by the IESG. These comments were written primarily for the benefit of the security area directors. Document editors and WG chairs should treat these comments just like any other last call comments. When seeing SHOULD, RECOMMEND or MAY in the security considerations, I would always like to see some information about what are possible issues if I don't follow the recommendations or what do I gain by implementing them. My reading of the security considerations section left me wanting more such details specifically in the following paragrams: Implementations SHOULD provide the security features described by the SNMPv3 framework (see [RFC3410]), and implementations claiming compliance to the SNMPv3 standard MUST include full support for authentication and privacy via the User-based Security Model (USM) [RFC3414] with the AES cipher algorithm [RFC3826]. Implementations MAY also provide support for the Transport Security Model (TSM) [RFC5591] in combination with a secure transport such as SSH [RFC5592] or TLS/DTLS [RFC6353]. Further, deployment of SNMP versions prior to SNMPv3 is NOT RECOMMENDED. Instead, it is RECOMMENDED to deploy SNMPv3 and to enable cryptographic security. It is then a customer/operator responsibility to ensure that the SNMP entity giving access to an instance of this MIB module is properly configured to give access to the objects only to those principals (users) that have legitimate rights to indeed GET or SET (change/create/delete) them. Regards, Ivaylo
- [secdir] Secdir last call review of draft-ietf-ip… Ivaylo Petrov
- Re: [secdir] Secdir last call review of draft-iet… Don Fedyk
- Re: [secdir] Secdir last call review of draft-iet… Ivaylo Petrov
- Re: [secdir] Secdir last call review of draft-iet… Don Fedyk