Thanks Med, All good. Adrian -----Original Message----- From: mohamed.boucadair@xxxxxxxxxx <mohamed.boucadair@xxxxxxxxxx> Sent: 09 January 2025 08:47 To: adrian@xxxxxxxxxxxx; ops-dir@xxxxxxxx Cc: draft-ietf-opsawg-teas-attachment-circuit.all@xxxxxxxx; last-call@xxxxxxxx; opsawg@xxxxxxxx Subject: RE: [Last-Call] Re: Opsdir telechat review of draft-ietf-opsawg-teas-attachment-circuit-18 Hi Adrian, Thank you for the follow-up. I merged these changes right now and also reflected some of them in the other documents of the AC I-Ds set. Please see inline. Cheers, Med > -----Message d'origine----- > De : Adrian Farrel <adrian@xxxxxxxxxxxx> > Envoyé : mercredi 8 janvier 2025 19:04 > À : BOUCADAIR Mohamed INNOV/NET <mohamed.boucadair@xxxxxxxxxx>; > ops-dir@xxxxxxxx > Cc : draft-ietf-opsawg-teas-attachment-circuit.all@xxxxxxxx; > last-call@xxxxxxxx; opsawg@xxxxxxxx > Objet : RE: [Last-Call] Re: Opsdir telechat review of draft-ietf- > opsawg-teas-attachment-circuit-18 > > > Thanks for the quick response, Med. > > > A diff to track the changes can be found here: > https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2 > Fauthor- > tools.ietf.org%2Fapi%2Fiddiff%3Furl_1%3Dhttps%3A%2F%2Fboucadair.g > ithub.io%2Fattachment-circuit-model%2Fdraft-ietf-opsawg-teas- > attachment- > circuit.txt%26url_2%3Dhttps%3A%2F%2Fboucadair.github.io%2Fattachm > ent-circuit-model%2Fopsdir-review%2Fdraft-ietf-opsawg-teas- > attachment- > circuit.txt&data=05%7C02%7Cmohamed.boucadair%40orange.com%7C3e852 > e3a53c84ff249e108dd300ee03a%7C90c7a20af34b40bfbc48b9253b6f5d20%7C > 0%7C0%7C638719562630950158%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcG > kiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIld > UIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=R1KeNYQjOIJsFz8VtyP2AD7udW5xDbn5 > z9i3BmY7Jmo%3D&reserved=0. Also fixed some nits here and there. > > All very good changes. > Just continuing two minor points. > > No need to respond to me (unless you want to): just fix or don't > fix according to what is the right thing to do. > > Cheers, > Adrian > > >> 6.1 > >> > >> I was surprised that there are so few identities defined in > base > >> bearer-type. Does this reflect reality or convenience? > > > > [Med] The goal was not to be exhaustive but have the key ones. > > It's OK. I was just thinking about whether (and how) people will > need to add new bearer types in the future. > [Med] This is an issue which is not specific to this module. Things would be much more simple if we proceed with approaches such as what is proposed in https://datatracker.ietf.org/doc/draft-boucadair-veloce-yang/ With the current practices, new identities can be added in a future revision of the module or by deviation. Defining arbitrary identities for exhaustiveness is not better either because there is currently no way in YANG/RC/NC that a subset of identities are not implemented. This is an issue that is queued for yang-next, e.g., https://github.com/netmod-wg/yang-next/issues/107. I can point to other relevant issues. This is the reason the draft has only the key ones. > >> 7. > >> > >> I like that you flag 'customer-name' as a vulnerability. But I > don't > >> understand what solution you offer. I suspect that the > solution lies > >> in authentication being applied to control read access not > only to > >> the whole module, but to specific sub-trees in the module. > This needs > >> a little additional text to make it clear. > > > > [Med] This is a covered by this text: > > > > "These > > protocols have to use a secure transport layer (e.g., SSH > [RFC4252], > > TLS [RFC8446], and QUIC [RFC9000]) and have to use mutual > > authentication." > > > > Please note that we are using the security template defined in > > draft-ietf-netmod-rfc8407bis. > > I'm not arguing against anything in the template text or what you > have written. > I am asking whether the authentication grants access to the whole > module or only specific parts. In other words, can someone from > customer A see: > - the existence of customer B > - any information about customer B > A secure transport layer doesn't provide that protection. > And "mutual authentication" is unclear. > [Med] Thank you for clarifying. This is indeed a separate aspect that is covered by the para next the one quoted above. This is related the RBAC guards used out there. The client identity is used to tag which piece of data/operation a client is entitled to. We don't repeat this considerations here as this is covered by rfc8341#section-3.4.5. After thinking about this, I don't think it is harmful to remind this. I made this change: OLD: The Network Configuration Access Control Model (NACM) [RFC8341] provides the means to restrict access for particular NETCONF or RESTCONF users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content. NEW: Servers MUST verify that requesting clients are entitled to access and manipulate a given bearer or AC. For example, a given customer must have access only to its bearers/ACs and be discarded access to bearers/ACs of other customers. The Network Configuration Access Control Model (NACM) [RFC8341] provides the means to restrict access for particular NETCONF or RESTCONF users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content. ____________________________________________________________________________ ________________________________ Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration, Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci. This message and its attachments may contain confidential or privileged information that may be protected by law; they should not be distributed, used or copied without authorisation. If you have received this email in error, please notify the sender and delete this message and its attachments. As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified. Thank you. -- last-call mailing list -- last-call@xxxxxxxx To unsubscribe send an email to last-call-leave@xxxxxxxx