Re: [Last-Call] Yangdoctors last call review of draft-ietf-detnet-yang-14

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi Xufeng

Thanks, I have updated a preliminary version 15 @ https://github.com/detnet-wg/draft-ietf-detnet-yang.

Most updates were straightforward - the security section I think everything is sensitive on write and anything that shows application is sensitive on read. 

Here is how the section reads now: (Please comment if this is OK). 

   There are a number of data nodes defined in the module that are
   writable/creatable/deletable (i.e., config true, which is the
   default).  These data nodes may be considered sensitive or vulnerable
   in some network environments.  Write operations (e.g., edit-config)
   to these data nodes without proper protection can break or
   incorrectly connect DetNet flows.  Since this is a configured Data
   Plane any changes that are not coordinated with all devices along the
   path the whole DetNet module is considered vulnerable and should have
   authorized access only.

   Similarly, the data nodes in these YANG modules may be considered
   sensitive or vulnerable in some network environments.  It is thus
   important to control read access (e.g., via get, get-config, or
   notification) to these data nodes.  These are the subtrees and data
   node and their sensitivity/vulnerability:


   detnet/app-flows: This controls the application details so it could
   be considered sensitive.

   detnet/traffic-profile/member-app: This links traffic profiles to
   applications.

   detnet/service/incoming/app-flow: This links applications to
   services.

   detnet/service/outgoing/app-flow: This links applications to
   services.

Cheers
Don 


-----Original Message-----
From: Xufeng Liu via Datatracker <noreply@xxxxxxxx> 
Sent: Tuesday, November 9, 2021 3:07 PM
To: yang-doctors@xxxxxxxx
Cc: detnet@xxxxxxxx; draft-ietf-detnet-yang.all@xxxxxxxx; last-call@xxxxxxxx
Subject: Yangdoctors last call review of draft-ietf-detnet-yang-14

Reviewer: Xufeng Liu
Review result: Ready with Nits

Thanks to authors for addressing the previous review comments.

The updates look good. The followings are a few additional nits:

1) In the model, “container flow-spec” has been changed to “container traffic-spec”, but the description has not been updated, shown as below:

         container traffic-spec {
           description
             "Flow-specification specifies how the Source transmits
              packets for the flow.  This is the promise/request of the
              Source to the network.  The network uses this flow
              specification to allocate resources and adjust queue
              parameters in network nodes.";

2) Most names of list and leaf-list have been fixes. The following three were
missed: “leaf-list member-apps” should be “leaf-list member-app” “leaf-list member-services” should be “leaf-list member-service” “leaf-list member-fwd-sublayers” should be “leaf-list member-fwd-sublayer”

3) Section 10.  Security Considerations would need to include a list of “sensitive or vulnerable” nodes.  RFC 8349 shows an example.

Thanks,
- Xufeng



-- 
last-call mailing list
last-call@xxxxxxxx
https://www.ietf.org/mailman/listinfo/last-call




[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux