OK, after reading your explanation and the example, I think I am clearer on the use case and the text you propose seems appropriate. Why don't you provide a new ID and I'll clear my DISCUSS
-Ekr On Tue, Oct 16, 2018 at 9:05 AM joel jaeggli <[email protected]> wrote: > On 10/16/18 06:00, Eric Rescorla wrote: > > I'm sorry, but I still don't think I understand the security impacts of > > this well enough to know if this text is OK. > > > > Can you provide a more detailed explanation of what XPath expressions > > can and cannot do here? Happy to discuss live either on the phone or in > BKK > I'm probably grossly simplifying the goal here, but. > > xpath statement allow for referencing another path or applying > constraints e.g. when / must (rfc 6020) > > the canonical example in 6020 being something like > > container interface { > leaf ifType { > type enumeration { > enum ethernet; > enum atm; > } > } > leaf ifMTU { > type uint32; > } > must "ifType != 'ethernet' or " + > "(ifType = 'ethernet' and ifMTU = 1500)" { > error-message "An ethernet MTU must be 1500"; > } > must "ifType != 'atm' or " + > "(ifType = 'atm' and ifMTU <= 17966 and ifMTU >= 64)" { > error-message "An atm MTU must be 64 .. 17966"; > } > > http://www.yang-central.org/twiki/pub/Main/YangDocuments/rfc6020.html#xpath > > Imposing constraints using nodes in mounted modules is kind of a key > application of schema-mount. > > > -Ekr > > > > > > On Tue, Oct 16, 2018 at 5:45 AM Martin Bjorklund <[email protected] > > <mailto:[email protected]>> wrote: > > > > Hi, > > > > Eric Rescorla <[email protected] <mailto:[email protected]>> wrote: > > > That seems like it's going to have some pretty surprising > > consequences and > > > at minimum needs more information in the Security Considerations. > > > > Ok. Howabout we add a paragraph to the end of the Security > > Considerations section: > > > > Care must be taken when the "parent-reference" XPath expressions > are > > constructed, since the result of the evaluation of these > expressions > > is added to the accessible tree for any XPath expression found in > > the mounted schema. > > > > > > /martin > > > > > On Thu, Oct 11, 2018 at 12:18 AM Martin Bjorklund <[email protected] > > <mailto:[email protected]>> wrote: > > > > > > > Eric Rescorla <[email protected] <mailto:[email protected]>> wrote: > > > > > I'm sorry but I don't understand this. > > > > > > > > > > Does the externally visible behavior of any mounted module > > depend in any > > > > > way on these XPATH references > > > > > > > > Yes, but note that these XPath expressions ("parent-reference") > are > > > > read-only (config false in the YANG model). Thus they are set > > by the > > > > implementation, and used to inform the operator about the > > environment > > > > in which other XPath expressions are evaluated. > > > > > > > > > > > > /martin > > > > > > > > > > > > > > > > > > -Ekr > > > > > > > > > > > > > > > > > > > > > > > > > On Wed, Oct 10, 2018 at 6:38 AM Martin Bjorklund > > <[email protected] <mailto:[email protected]>> wrote: > > > > > > > > > > > Eric Rescorla <[email protected] <mailto:[email protected]>> wrote: > > > > > > > On Wed, Oct 10, 2018 at 5:32 AM Martin Bjorklund > > <[email protected] <mailto:[email protected]>> > > > > wrote: > > > > > > > > > > > > > > > Hi, > > > > > > > > > > > > > > > > Eric Rescorla <[email protected] <mailto:[email protected]>> > wrote: > > > > > > > > > Eric Rescorla has entered the following ballot > > position for > > > > > > > > > draft-ietf-netmod-schema-mount-11: Discuss > > > > > > > > > > > > > > > > > > When responding, please keep the subject line intact > > and reply > > > > to all > > > > > > > > > email addresses included in the To and CC lines. (Feel > > free to > > > > cut > > > > > > this > > > > > > > > > introductory paragraph, however.) > > > > > > > > > > > > > > > > > > > > > > > > > > > Please refer to > > > > > > > > > https://www.ietf.org/iesg/statement/discuss-criteria.html > > > > > > > > > for more information about IESG DISCUSS and COMMENT > > positions. > > > > > > > > > > > > > > > > > > > > > > > > > > > The document, along with other ballot positions, can > > be found > > > > here: > > > > > > > > > > > https://datatracker.ietf.org/doc/draft-ietf-netmod-schema-mount/ > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > ---------------------------------------------------------------------- > > > > > > > > > DISCUSS: > > > > > > > > > > > > > > > > > > ---------------------------------------------------------------------- > > > > > > > > > > > > > > > > > > Rich version of this review at: > > > > > > > > > https://mozphab-ietf.devsvcdev.mozaws.net/D3506 > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > DETAIL > > > > > > > > > S 4. > > > > > > > > > > > > > > > > > > > > It is worth emphasizing that the nodes > specified in > > > > > > > > > > "parent-reference" leaf-list are available in > > the mounted > > > > > > schema > > > > > > > > only > > > > > > > > > > for XPath evaluations. In particular, they > > cannot be > > > > accessed > > > > > > > > there > > > > > > > > > > via network management protocols such as NETCONF > > > > [RFC6241] or > > > > > > > > > > RESTCONF [RFC8040]. > > > > > > > > > > > > > > > > > > What are the security implications of this XPath > reference > > > > outside > > > > > > the > > > > > > > > > mount jail? Specifically, how does it interact with > > the access > > > > > > control > > > > > > > > > for the enclosing module. > > > > > > > > > > > > > > > > There is no such interaction, since access control comes > > into play > > > > > > > > when some external entity accesses the data through some > > management > > > > > > > > protocol, and the nodes from the "parent-reference" > > expressions > > > > cannot > > > > > > > > be accessed via management protocols. > > > > > > > > > > > > > > > > The last sentence of the quoted paragraph was supposed > > to make this > > > > > > > > clear, but it seems we might need some additional > > explanation? > > > > > > > > > > > > > > > > > > > > > > Yes, I think so. I guess I'm not clear on what the XPath > > expressions > > > > are > > > > > > > for if they > > > > > > > can't be accessed via the management protocols. How can > > they be used? > > > > > > > > > > > > These are XPath expressions defined in the YANG models > > themselves, > > > > > > such as "must" expressions or "leafrefs". The description > of > > > > > > "parent-reference" refer to them as: > > > > > > > > > > > > [...] XPath > > > > > > expressions whose context nodes are defined > > in the > > > > > > mounted schema > > > > > > > > > > > > > > > > > > > > > > > > /martin > > > > > > > > > > > > > > >
_______________________________________________ netmod mailing list [email protected] https://www.ietf.org/mailman/listinfo/netmod
