Re: [secdir] Secdir last call review of draft-ietf-ipsecme-mib-iptfs-05

Don Fedyk <dfedyk@labn.net> Fri, 14 October 2022 01:38 UTC

Return-Path: <dfedyk@labn.net>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 044C1C14CE44; Thu, 13 Oct 2022 18:38:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.911
X-Spam-Level:
X-Spam-Status: No, score=-1.911 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=labn.onmicrosoft.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vmTSFOl_4VHe; Thu, 13 Oct 2022 18:38:42 -0700 (PDT)
Received: from NAM11-CO1-obe.outbound.protection.outlook.com (mail-co1nam11on2139.outbound.protection.outlook.com [40.107.220.139]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 48B89C14CE3D; Thu, 13 Oct 2022 18:38:41 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=VGZ9bXmSLNC74oJXeW/AEKRkH2mBBLfXZ/hR6d/Ef60vHMrAO11tewgQrDNZoxUeMfKKK9pdshQx/pxekZrdRH3V1IqowN8jRtOdYHqgRG3o+ahb1iHwcYrLdNA+VU60dfopWi+B/EnOVoqfxEiDtBwCwPVN9TUns5rYdISLKeLWkA2q2ArbRcqrQfalZfMtja8vFU/AGzwWAU1LCwNBiEn51KyO5B1XwvwNV5M6xtP5LY00sA70NSiDml+zZ0/oMctExFUImY9jh2Jg36VlrFWHD7oJGWYrrh/TfCem/BRUI7rIOnUqi9JIHjYhbitBQrQ5tiwcAkFcDCIzovKqsA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=z7STc+iFDiu55HtJsd6NnL+OiG/FHq4EapS+bSB8tjw=; b=oEfg/m1s1BP1XnblsHNpCGbIMmU2Pzn0VTbUwFfnSvXsrCfOkkqS9Zy4ct/GfNmYVPH9uxKT5EV1JcArh+HlJXqTFTrQnvqRqogFnOrX9a2cEWEy64DUO+2PQDGw4gQvQn9+zSsd2DnIJ7KMg+OB1WV6dYFyRDBoH3nzyE60aBD9zbxZ0b1B3DSqbuSH6rKgHzudnYBvlJXcZHbPakmlk+97YxXNbXYefJoVEW5ZwEIFHNJMWn1X05zSO/i/+28BWhZjTNuqDBLS9bhziOjuCq8xXK0kwwOAb2z49wR24C6IVvhxM6lfOt60bpgaytO2cwJwocgJDsTWBX26MpB86w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=labn.net; dmarc=pass action=none header.from=labn.net; dkim=pass header.d=labn.net; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=labn.onmicrosoft.com; s=selector2-labn-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=z7STc+iFDiu55HtJsd6NnL+OiG/FHq4EapS+bSB8tjw=; b=REfppvBd/NHugV8sx4C+8gY9dYQoRgYLNWvsieTJBZ0slxlmV4rs8iNlvEBLhXWER5YE55N1KwUrD1Kp/SFO4XZvHJsOabLWFzJ8+rc5dzO8ly80toCcKtZxfa3BjqXhThHMakc8Ja2xQeHHQOC0yXE56QrkvXnSDeSrbMyq8Xg=
Received: from PH7PR14MB5368.namprd14.prod.outlook.com (2603:10b6:510:133::11) by DM4PR14MB6303.namprd14.prod.outlook.com (2603:10b6:8:105::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5723.29; Fri, 14 Oct 2022 01:38:39 +0000
Received: from PH7PR14MB5368.namprd14.prod.outlook.com ([fe80::c285:9424:a2db:84b5]) by PH7PR14MB5368.namprd14.prod.outlook.com ([fe80::c285:9424:a2db:84b5%5]) with mapi id 15.20.5676.028; Fri, 14 Oct 2022 01:38:37 +0000
From: Don Fedyk <dfedyk@labn.net>
To: Ivaylo Petrov <ivaylo@ackl.io>
CC: "draft-ietf-ipsecme-mib-iptfs.all@ietf.org" <draft-ietf-ipsecme-mib-iptfs.all@ietf.org>, "secdir@ietf.org" <secdir@ietf.org>, The IESG <iesg@ietf.org>
Thread-Topic: Secdir last call review of draft-ietf-ipsecme-mib-iptfs-05
Thread-Index: AQHY3noX/4p1upZtpk6xeG29+06Rs64MOQ9wgACFVwCAAF8FcA==
Date: Fri, 14 Oct 2022 01:38:37 +0000
Message-ID: <PH7PR14MB53684B96C2EA2B27ADE8067FBB249@PH7PR14MB5368.namprd14.prod.outlook.com>
References: <CAJFkdRy4rG3Xody0FSU_KXtN4+oi1yexQj54p=7CHP8VihnPNQ@mail.gmail.com> <PH7PR14MB5368E485C91AD3A5892F9734BB259@PH7PR14MB5368.namprd14.prod.outlook.com> <CAJFkdRzHhq30QGrmw3qd5R3Ugz2iUfTEdiKZwyAYf59D05e0iQ@mail.gmail.com>
In-Reply-To: <CAJFkdRzHhq30QGrmw3qd5R3Ugz2iUfTEdiKZwyAYf59D05e0iQ@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=labn.net;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: PH7PR14MB5368:EE_|DM4PR14MB6303:EE_
x-ms-office365-filtering-correlation-id: 6f0dbf8c-28c0-4cf8-09a2-08daad84d098
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:PH7PR14MB5368.namprd14.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230022)(136003)(39830400003)(366004)(346002)(396003)(376002)(451199015)(478600001)(66899015)(66446008)(64756008)(53546011)(8936002)(66476007)(66556008)(41300700001)(9686003)(5660300002)(26005)(33656002)(6862004)(2906002)(71200400001)(450100002)(4326008)(8676002)(66946007)(38070700005)(76116006)(83380400001)(316002)(7696005)(38100700002)(55016003)(6506007)(86362001)(52536014)(186003)(122000001)(54906003); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: GZD+lvOW/hPgRdSDoN7ehhJ8siBAPwaPpsk+oVZIbVNskfBtMdFVvL59MFWKZ9gNjAVufWhfCI2DQenv66h6w73FGU5zX06PP9CLpEUCwLwntm3kZXY2M83WkO3aoNQ2TNzEkvHIk0QUVQw9mPYj+8Y1EzramiQZaDes2XPcqLrln5pOMPHrbYLZBlsVKNDjVXXGUcQVgazk4vZHQbvI60omJ757zAjYCLY6ZYmB7QiHnU4r0GCAje0tAp+kMhQEBN7BQ4YxRnDxfaiWIpyr8sEAnpnzAHgRCU2QV35OwK2d3+5RaneaTfSqP0SGi4elVs2O0HDwg2Vi/SyHbWOI7YHsCGu+ZZbUOLaLnq4vQxpo9LndSMrYPNnplgqIkf/ACNxcOjNXL3SmxqmnmBfdRUcGrL/weoCzlUCQX2it8yQ=
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: labn.net
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: PH7PR14MB5368.namprd14.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 6f0dbf8c-28c0-4cf8-09a2-08daad84d098
X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Oct 2022 01:38:37.2634 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: eb60ac54-2184-4344-9b60-40c8b2b72561
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: NQ775NVIDnXnBu7uVWYAHhXfQ1tws+JBG5Fp6O1VtYPNcTk/nMBmj1MjI7cZKIhUGh5vRsiwyDHaPQUPOVAkcQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM4PR14MB6303
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/jhGlxAtMYKpRt8P996ByeAf2U_8>
Subject: Re: [secdir] Secdir last call review of draft-ietf-ipsecme-mib-iptfs-05
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Oct 2022 01:38:47 -0000

Hi 

I have made this change and the changes from IANA Review. I also adjusted the mib name based on what I found for other drafts and a reference to informative also based on other drafts and the error I was getting from idnits.

Thanks
Don   

-----Original Message-----
From: Ivaylo Petrov <ivaylo@ackl.io> 
Sent: Thursday, October 13, 2022 3:55 PM
To: Don Fedyk <dfedyk@labn.net>
Cc: draft-ietf-ipsecme-mib-iptfs.all@ietf.org; secdir@ietf.org; The IESG <iesg@ietf.org>
Subject: Re: Secdir last call review of draft-ietf-ipsecme-mib-iptfs-05

Hi Don,

Thank you for the quick response! Yes, that looks good to me.

Thanks,
Ivaylo

On Thu, Oct 13, 2022 at 2:13 PM Don Fedyk <dfedyk@labn.net> wrote:
>
> Hi Ivaylo
>
> These paragraphs were added as part of Ipsecme WG last call and implicitly refer to the prior paragraph that states:
>
>       Access to IP inner
>       and outer traffic flow security statistics can provide information
>       that IP traffic flow security obscures such as the true activity
>       of the flows using IP traffic flow security.
>
> If we turn these paragraphs into a bullet list introduced like this:
>
> To prevent unauthorized access to SNMP including access to IP-TFS 
> sensitive objects:
>
>  * Implementations SHOULD provide the security features described by the
>    SNMPv3 framework (see [RFC3410]), and implementations claiming
>    compliance to the SNMPv3 standard MUST include full support for
>    authentication and privacy via the User-based Security Model (USM)
>    [RFC3414] with the AES cipher algorithm [RFC3826].  Implementations
>    MAY also provide support for the Transport Security Model (TSM)
>    [RFC5591] in combination with a secure transport such as SSH
>    [RFC5592] or TLS/DTLS [RFC6353].
>
>  * Further, deployment of SNMP versions prior to SNMPv3 is NOT
>    RECOMMENDED.  Instead, it is RECOMMENDED to deploy SNMPv3 and to
>    enable cryptographic security.  It is then a customer/operator
>    responsibility to ensure that the SNMP entity giving access to an
>    instance of this MIB module is properly configured to give access to
>    the objects only to those principals (users) that have legitimate
>    rights to indeed GET or SET (change/create/delete) them.
>
>
> Does that satisfy your nit?
>
> Thanks
> Don
>
> -----Original Message-----
> From: Ivaylo Petrov <ivaylo@ackl.io>
> Sent: Wednesday, October 12, 2022 4:34 PM
> To: draft-ietf-ipsecme-mib-iptfs.all@ietf.org; secdir@ietf.org; The 
> IESG <iesg@ietf.org>
> Subject: Secdir last call review of draft-ietf-ipsecme-mib-iptfs-05
>
> Reviewer: Ivaylo Petrov
> Review result: Has Nits
>
> Hi,
>
> I have reviewed this document as part of the security directorate's ongoing effort to review all IETF documents being processed by the IESG. These comments were written primarily for the benefit of the security area directors.  Document editors and WG chairs should treat these comments just like any other last call comments.
>
> When seeing SHOULD, RECOMMEND or MAY in the security considerations, I 
> would always like to see some information about what are possible 
> issues if I don't follow the recommendations or what do I gain by 
> implementing them. My reading of the security considerations section 
> left me wanting more such details specifically in the following
> paragrams:
>
>    Implementations SHOULD provide the security features described by the
>    SNMPv3 framework (see [RFC3410]), and implementations claiming
>    compliance to the SNMPv3 standard MUST include full support for
>    authentication and privacy via the User-based Security Model (USM)
>    [RFC3414] with the AES cipher algorithm [RFC3826].  Implementations
>    MAY also provide support for the Transport Security Model (TSM)
>    [RFC5591] in combination with a secure transport such as SSH
>    [RFC5592] or TLS/DTLS [RFC6353].
>
>    Further, deployment of SNMP versions prior to SNMPv3 is NOT
>    RECOMMENDED.  Instead, it is RECOMMENDED to deploy SNMPv3 and to
>    enable cryptographic security.  It is then a customer/operator
>    responsibility to ensure that the SNMP entity giving access to an
>    instance of this MIB module is properly configured to give access to
>    the objects only to those principals (users) that have legitimate
>    rights to indeed GET or SET (change/create/delete) them.
>
> Regards,
> Ivaylo