I agree. The statement you refer to is sufficient. 
We really need to get away from having to be more specific
than that in Yang models.

        —Tom


> On Jan 5, 2017:8:55 AM, at 8:55 AM, Benoit Claise <[email protected]> wrote:
> 
> Dear all,
>> Stephen:
>> 
>> Thank you for letting the authors know about your security concerns.  I 
>> think we have some discussion that needs to take place with the authors, 
>> Alia, and Benoit on whether the yang security guidelines are sufficient or 
>> if these need to be expanded based on the I2RS protocol security 
>> requirements.
> This document contains a YANG model, a generic YANG model that could be 
> accessed by NETCONF, RESTCONF, or the future I2RS protocol.
> This document doesn't say (and that would be a mistake IMO if it would) that 
> this YANG model can only be accessed by the I2RS protocol.
> Hence I'm advocating that the security considerations diligently follow 
> https://trac.ietf.org/trac/ops/wiki/yang-security-guidelines, and that they 
> don't go in the I2RS protocol specific details.
> 
> Regards, Benoit
>> 
>> I appreciate Kathleen, you, Ben, and Benoit mentioning the privacy and 
>> security issues.  It will help us make sure the next I2RS documents 
>> submitted to the IESG have the appropriate security considerations and 
>> threat analysis.
>> 
>> On the 6 authors, we really did investigate each authors active contribution.
>> 
>> Sue Hares
>> Document shepherd.
>> 
>> -----Original Message-----
>> From: Stephen Farrell [mailto:[email protected]]
>> Sent: Thursday, January 5, 2017 7:52 AM
>> To: The IESG
>> Cc: [email protected]; Susan Hares; 
>> [email protected]; [email protected]; [email protected]
>> Subject: Stephen Farrell's No Objection on 
>> draft-ietf-i2rs-yang-network-topo-10: (with COMMENT)
>> 
>> Stephen Farrell has entered the following ballot position for
>> draft-ietf-i2rs-yang-network-topo-10: No Objection
>> 
>> When responding, please keep the subject line intact and reply to all email 
>> addresses included in the To and CC lines. (Feel free to cut this 
>> introductory paragraph, however.)
>> 
>> 
>> Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
>> for more information about IESG DISCUSS and COMMENT positions.
>> 
>> 
>> The document, along with other ballot positions, can be found here:
>> https://datatracker.ietf.org/doc/draft-ietf-i2rs-yang-network-topo/
>> 
>> 
>> 
>> ----------------------------------------------------------------------
>> COMMENT:
>> ----------------------------------------------------------------------
>> 
>> 
>> I agree with Kathleen's discuss points and have one more aspect to offer 
>> that I hope you include in that
>> discussion:
>> 
>> This model I think will lead designers to only think about the nodes that 
>> are supposed to have access to traffic.  (See also below about broadcast 
>> media.) The model will generally not capture the reality that some other 
>> nodes can also actually see or influence traffic and I think that will lead 
>> to vulnerabilities not being recognised. I don't have a good suggestion for 
>> how to fix that problem but I do think you ought mention it as a security 
>> consideration, e.g. something
>> like: "For models such as these - the real world network may allow 
>> additional communications or links that are not represented in the model and 
>> such links may enable vulnerabilities that are liable to be missed when 
>> considering only the model. These models don't really capture the security 
>> or privacy aspects of the network."
>> 
>> - 4.2 and generally: It is not clear to me how to represent broadcast media 
>> (e.g. radio) nor how IP multicast would be reflected in this model. I assume 
>> those can be done but as a bit of a hack.
>> 
>> - nit: 6 authors and 4 contributors. I wish people (esp chairs) would just 
>> enforce the 5 author guideline and say why that's inappropriate in the few 
>> instances in which that is the case.
>> 
>> 
>> 
>> .
>> 
> 
> _______________________________________________
> i2rs mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/i2rs

_______________________________________________
i2rs mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/i2rs

Reply via email to