Skip to main content

Early Review of draft-ietf-netconf-crypto-types-10
review-ietf-netconf-crypto-types-10-secdir-early-shekh-yusef-2019-07-22-00

Request Review of draft-ietf-netconf-crypto-types-10
Requested revision 10 (document currently at 34)
Type Early Review
Team Security Area Directorate (secdir)
Deadline 2019-07-22
Requested 2019-07-09
Requested by Mahesh Jethanandani
Authors Kent Watsen
I-D last updated 2019-07-22
Completed reviews Genart Last Call review of -28 by Dale R. Worley (diff)
Opsdir Last Call review of -30 by Gyan Mishra (diff)
Secdir Early review of -10 by Rifaat Shekh-Yusef (diff)
Yangdoctors Last Call review of -18 by Jürgen Schönwälder (diff)
Secdir Last Call review of -20 by Valery Smyslov (diff)
Comments
If possible, schedule a call with the NETCONF chairs prior to the IETF 105 meeting.  This meeting would primarily to have the SecDir reviewer up to speed on the draft in question, in hopes that they could attend the NETCONF WG session on Monday morning.
Assignment Reviewer Rifaat Shekh-Yusef
State Partially completed
Request Early review on draft-ietf-netconf-crypto-types by Security Area Directorate Assigned
Posted at https://mailarchive.ietf.org/arch/msg/secdir/nnmvjYbOTrA_gTua7Bs7k081QXs
Reviewed revision 10 (document currently at 34)
Result Not ready
Completed 2019-07-22
review-ietf-netconf-crypto-types-10-secdir-early-shekh-yusef-2019-07-22-00
There is the open issue of the proper structure of this YANG model, which was 
discussed with the security ADs and IESG, and still to be discussed with IANA.


Meanwhile, I have the following comments:

Page 6, hash-algorithm_t
Why would you include SHA1 and indicate that it is obsolete? why not just drop it?

Page 8, hash-algorithm-t
Why would the default be 0, i.e. NONE?
I think you should select a minimum algorithm that would be considered acceptable as the default.

page 17, encryption-algorithm-t
Why would you include RC4 algorithms?

page 19, signature-algorithm-t
Why would you include dsa-sha1?

page 40, grouping symmetric-key-grouping, leaf hidden-key { nacm:default-deny-write
If I understand hidden-key, it is a key that is not accessible through this model. 
So, what is this meant to describe?

page 45, grouping symmetric-key-pair-with-cert-grouping, input { leaf subject...
The user of Subject field is discouraged, and the SAN field should be used instead.
Take a look at the following:
https://tools.ietf.org/html/rfc6125#section-4