Hi Alvaro, Roman, See nits only response.
From: Alvaro Retana <aretana.i...@gmail.com> Date: Wednesday, August 21, 2019 at 11:11 AM To: "draft-ietf-ospf-y...@ietf.org" <draft-ietf-ospf-y...@ietf.org> Cc: Roman Danyliw <r...@cert.org>, Stephane Litkowski <stephane.litkow...@orange.com>, "lsr-cha...@ietf.org" <lsr-cha...@ietf.org>, "lsr@ietf.org" <lsr@ietf.org>, The IESG <i...@ietf.org> Subject: Roman Danyliw’s DISCUSS on draft-ietf-ospf-yang-26 Resent-From: <alias-boun...@ietf.org> Resent-To: Yingzhen Qu <yingzhen.i...@gmail.com>, Christian Hopps <cho...@chopps.org>, Acee Lindem <a...@cisco.com> Resent-Date: Wednesday, August 21, 2019 at 11:08 AM [It looks like the datatracker didn’t send out the text to Roman’s DISCUSS. I didn’t receive it, nor do I see it in the mail archive. So I’m pasting it here. — Alvaro.] - - - - - - - - - - - DISCUSS - - - - - - - - - - - A “discuss to discuss”. Per the convention outlined in https://trac.ietf.org/trac/ops/wiki/yang-security-guidelines, thank you for clearly noting the implication of not securing these nodes properly. Furthermore, following the convention, I would have expected Section 4 to have enumerated the sensitive writeable/creatable/deletable data nodes; and the sensitive readable nodes individually. For a model this large, I can imagine that individual enumeration would be a long list. In the case of read operations, the text opens with saying that “some of the readable data nodes ...” and later says “The exposure of the ... LSDB will expose the detailed topology ...”. Can you help me understand which part of ietf-ospf.yang is the LSDB and which parts refer to “some of the readable nodes”? Is there are a difference, or is this text asserting that all parts of the modules are sensitive and need access control? A related line of questioning for the write operation. The text opens with saying that “There are a number of data nodes defined in ietf-ospf.yang ... [and that] [w]rite operations ... to these nodes without proper protection can have a negative effect on the network operations ... [and] ... the ability to modify OSPF configuration ...” is problematic. Can you help me understand which parts of the text is the “OSPF configuration” vs. “there are number of data nodes ...”? If there isn’t a different, is the text asserting that all parts of the modules are sensitive and need access control? - - - - - - - - - - - COMMENT - - - - - - - - - - - (1) Idnits returned a seemingly valid few reference issues: ** Downref: Normative reference to an Experimental RFC: RFC 1765 ** Downref: Normative reference to an Experimental RFC: RFC 4973 As Alvaro indicated, this was discussed and both these are implemented. (2) Editorial -- Section 4. Isn’t RFC8341, “the Network Configuration Access Control Model” rather than the “NETCONF access control model”? This refers to the NACM model itself and not the RFC title. However, I believe “ NETCONF Access Control Model (NACM)” is better and have updated. -- Section 4. Typo. s/specificationn/specification/ Fixed in -27. -- Section 4. Remove the duplicate instance of the phrase “for legacy implementations that do not support key-chains”. Fixed in -27. -- Section 4. Typo. s/The OSPF YANG module support/the OSPF YANG module supports/ Fixed in -27. Thanks, Acee Alvaro Retana
_______________________________________________ Lsr mailing list Lsr@ietf.org https://www.ietf.org/mailman/listinfo/lsr