[It looks like the datatracker didn’t send out the text to Roman’s
DISCUSS.  I didn’t receive it, nor do I see it in the mail archive.  So I’m
pasting it here. — Alvaro.]

- - - - - - - - - - -
DISCUSS
- - - - - - - - - - -

A “discuss to discuss”.  Per the convention outlined in
https://trac.ietf.org/trac/ops/wiki/yang-security-guidelines, thank you for
clearly noting the implication of not securing these nodes properly.

Furthermore, following the convention, I would have expected Section 4 to
have enumerated the sensitive writeable/creatable/deletable data nodes; and
the sensitive readable nodes individually.  For a model this large, I can
imagine that individual enumeration would be a long list.

In the case of read operations, the text opens with saying that “some of
the readable data nodes ...” and later says “The exposure of the ... LSDB
will expose the detailed topology ...”.  Can you help me understand which
part of ietf-ospf.yang is the LSDB and which parts refer to “some of the
readable nodes”?  Is there are a difference, or is this text asserting that
all parts of the modules are sensitive and need access control?

A related line of questioning for the write operation.  The text opens with
saying that “There are a number of data nodes defined in ietf-ospf.yang ...
[and that] [w]rite operations ... to these nodes without proper protection
can have a negative effect on the network operations ... [and] ... the
ability to modify OSPF configuration ...” is problematic.  Can you help me
understand which parts of the text is the “OSPF configuration” vs. “there
are number of data nodes ...”?  If there isn’t a different, is the text
asserting that all parts of the modules are sensitive and need access
control?


- - - - - - - - - - -
COMMENT
- - - - - - - - - - -

(1) Idnits returned a seemingly valid few reference issues:

  ** Downref: Normative reference to an Experimental RFC: RFC 1765

  ** Downref: Normative reference to an Experimental RFC: RFC 4973

(2) Editorial
-- Section 4.  Isn’t RFC8341, “the Network Configuration Access Control
Model” rather than the “NETCONF access control model”?

-- Section 4.  Typo.  s/specificationn/specification/

-- Section 4.  Remove the duplicate instance of the phrase “for legacy
implementations that do not support key-chains”.

-- Section 4.  Typo.  s/The OSPF YANG module support/the OSPF YANG module
supports/

Alvaro Retana
_______________________________________________
Lsr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/lsr

Reply via email to