Updates to the TLS Transport Model for SNMP
draft-ietf-opsawg-tlstm-update-15
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2023-11-08
|
15 | (System) | IANA registries were updated to include RFC9456 |
2023-11-08
|
15 | (System) | Received changes through RFC Editor sync (created alias RFC 9456, changed abstract to 'This document updates RFC 6353 ("Transport Layer Security (TLS) Transport Model … Received changes through RFC Editor sync (created alias RFC 9456, changed abstract to 'This document updates RFC 6353 ("Transport Layer Security (TLS) Transport Model for the Simple Network Management Protocol (SNMP)") to reflect changes necessary to support Transport Layer Security version 1.3 (TLS 1.3) and Datagram Transport Layer Security version 1.3 (DTLS 1.3), which are jointly known as "(D)TLS 1.3". This document is compatible with (D)TLS 1.2 and is intended to be compatible with future versions of SNMP and (D)TLS. This document updates the SNMP-TLS-TM-MIB as defined in RFC 6353.', changed pages to 30, changed standardization level to Proposed Standard, changed state to RFC, added RFC published event at 2023-11-08, changed IESG state to RFC Published, created updates relation between draft-ietf-opsawg-tlstm-update and RFC 6353) |
2023-11-08
|
15 | (System) | RFC published |
2023-10-30
|
15 | (System) | RFC Editor state changed to AUTH48-DONE from AUTH48 |
2023-08-18
|
15 | (System) | RFC Editor state changed to AUTH48 |
2023-06-19
|
15 | (System) | RFC Editor state changed to RFC-EDITOR from EDIT |
2023-05-08
|
15 | Kenneth Vaughn | New version available: draft-ietf-opsawg-tlstm-update-15.txt |
2023-05-08
|
15 | (System) | New version approved |
2023-05-08
|
15 | (System) | Request for posting confirmation emailed to previous authors: Kenneth Vaughn |
2023-05-08
|
15 | Kenneth Vaughn | Uploaded new revision |
2023-04-25
|
14 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
2023-04-25
|
14 | (System) | IANA Action state changed to Waiting on RFC Editor from In Progress |
2023-04-25
|
14 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2023-04-21
|
14 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2023-04-20
|
14 | Tero Kivinen | Closed request for Last Call review by SECDIR with state 'Overtaken by Events' |
2023-04-20
|
14 | Tero Kivinen | Assignment of request for Last Call review by SECDIR to Tobias Gondrom was marked no-response |
2023-04-17
|
14 | (System) | RFC Editor state changed to EDIT |
2023-04-17
|
14 | (System) | IESG state changed to RFC Ed Queue from Approved-announcement sent |
2023-04-17
|
14 | (System) | Announcement was received by RFC Editor |
2023-04-17
|
14 | (System) | IANA Action state changed to In Progress |
2023-04-17
|
14 | Cindy Morgan | IESG state changed to Approved-announcement sent from Approved-announcement to be sent |
2023-04-17
|
14 | Cindy Morgan | IESG has approved the document |
2023-04-17
|
14 | Cindy Morgan | Closed "Approve" ballot |
2023-04-17
|
14 | Cindy Morgan | Ballot approval text was generated |
2023-04-17
|
14 | (System) | Removed all action holders (IESG state changed) |
2023-04-17
|
14 | Robert Wilton | IESG state changed to Approved-announcement to be sent from IESG Evaluation::AD Followup |
2023-04-05
|
14 | Amanda Baber | IANA Review state changed to IANA OK - Actions Needed from Version Changed - Review Needed |
2023-03-30
|
14 | (System) | Changed action holders to Robert Wilton (IESG state changed) |
2023-03-30
|
14 | (System) | Sub state has been changed to AD Followup from Revised I-D Needed |
2023-03-30
|
14 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed |
2023-03-30
|
14 | Kenneth Vaughn | New version available: draft-ietf-opsawg-tlstm-update-14.txt |
2023-03-30
|
14 | Kenneth Vaughn | New version accepted (logged-in submitter: Kenneth Vaughn) |
2023-03-30
|
14 | Kenneth Vaughn | Uploaded new revision |
2023-03-07
|
13 | Amanda Baber | IANA Review state changed to IANA OK - Actions Needed from Version Changed - Review Needed |
2023-03-02
|
13 | Paul Wouters | [Ballot comment] Thanks for addressing my concerns |
2023-03-02
|
13 | Paul Wouters | [Ballot Position Update] Position for Paul Wouters has been changed to Yes from Discuss |
2023-03-02
|
13 | (System) | Changed action holders to Kenneth Vaughn, Robert Wilton (IESG state changed) |
2023-03-02
|
13 | Cindy Morgan | IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation |
2023-03-02
|
13 | Murray Kucherawy | [Ballot Position Update] New position, No Objection, has been recorded for Murray Kucherawy |
2023-03-02
|
13 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA - Not OK |
2023-03-02
|
13 | Kenneth Vaughn | New version available: draft-ietf-opsawg-tlstm-update-13.txt |
2023-03-02
|
13 | Kenneth Vaughn | New version accepted (logged-in submitter: Kenneth Vaughn) |
2023-03-02
|
13 | Kenneth Vaughn | Uploaded new revision |
2023-03-02
|
12 | Andrew Alston | [Ballot Position Update] New position, No Objection, has been recorded for Andrew Alston |
2023-03-01
|
12 | Amanda Baber | IANA state will be changed back to "IANA OK" after the IANA Considerations has been updated to include a new "Description" field for the registry … IANA state will be changed back to "IANA OK" after the IANA Considerations has been updated to include a new "Description" field for the registry to be created at https://www.iana.org/assignments/smi-numbers. This field is being discussed. |
2023-03-01
|
12 | Amanda Baber | IANA Review state changed to IANA - Not OK from IANA OK - Actions Needed |
2023-03-01
|
13 | (System) | IANA Review state changed to IANA - Not OK from Version Changed - Review Needed |
2023-03-01
|
12 | Paul Wouters | [Ballot discuss] Thanks for this document update. I have a minor DISCUSS that should be easy to resolve, and some comments. Should Section 2.3 or … [Ballot discuss] Thanks for this document update. I have a minor DISCUSS that should be easy to resolve, and some comments. Should Section 2.3 or the Security Considerations not reference RFC 9325 "Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)" ? For one thing, it documents that if one needs to still use TLS 1.2, what options should be used or avoided. |
2023-03-01
|
12 | Paul Wouters | [Ballot comment] REVISION "202209090000Z" DESCRIPTION "This version of this MIB module is part of … [Ballot comment] REVISION "202209090000Z" DESCRIPTION "This version of this MIB module is part of RFC XXXX; see the RFC itself for full legal notices. This version: It will be easy to miss this "RFC XXXX" for the RFC Editor, can be make a clearer note for the RFC editor to update that? The REVISION is a date. Should that be updated to the publication date, or is it used as a sort of early code point ? Historically, the 1-octet hashing algorithm identifier was based on the IANA TLS HashAlgorithm Registry (RFC 5246); however, this registry is only applicable to (D)TLS protocol versions prior to 1.3, which are now designated as obsolete and are not expected to ever support additional values. I'm not sure "obsolete" is the right word? Also, looking at: https://www.iana.org/assignments/tls-parameters/tls-parameters.xhtml#tls-parameters-18 snmpTlstmCertCommonName OBJECT-IDENTITY I don't see a note the registry is closed. Perhaps weaken the claim to just "however, this registry is no longer in use for TLS 1.3 and above and are not expected to have any new registrations added to it." The policy for updates is Expert Review. Why not specification required or RFC required? (Or split the range, as Roman alluded to as well) |
2023-03-01
|
12 | Paul Wouters | [Ballot Position Update] New position, Discuss, has been recorded for Paul Wouters |
2023-03-01
|
12 | Martin Duke | [Ballot Position Update] New position, No Objection, has been recorded for Martin Duke |
2023-03-01
|
12 | Alvaro Retana | [Ballot Position Update] New position, No Objection, has been recorded for Alvaro Retana |
2023-03-01
|
12 | Francesca Palombini | [Ballot comment] Thank you for the work on this document. I was going to have the same comment as Roman's first point. Additionally, and in … [Ballot comment] Thank you for the work on this document. I was going to have the same comment as Roman's first point. Additionally, and in any case, it would be good in my opinion to expand the Expert Guidelines, as the only guideline right now is "consult the security area" (and even then, it's only encouraged). For more input about what I think should be there, RFC 8126 says it best: The required documentation and review criteria, giving clear guidance to the designated expert, should be provided when defining the registry. **It is particularly important to lay out what should be considered when performing an evaluation and reasons for rejecting a request.** It is also a good idea to include, when possible, a sense of whether many registrations are expected over time, or if the registry is expected to be updated infrequently or in exceptional circumstances only. |
2023-03-01
|
12 | Francesca Palombini | [Ballot Position Update] New position, No Objection, has been recorded for Francesca Palombini |
2023-02-28
|
12 | Zaheduzzaman Sarker | [Ballot comment] Thanks for working on this specification. Special thanks for the shepherd's write-up, it was very helpful. I was just wondering - as there … [Ballot comment] Thanks for working on this specification. Special thanks for the shepherd's write-up, it was very helpful. I was just wondering - as there is an intended impact on the future here, "Renegotiation of sessions is not supported as it is not supported by TLS 1.3." what is the intended implication on the application of future versions of TLS? |
2023-02-28
|
12 | Zaheduzzaman Sarker | [Ballot Position Update] New position, No Objection, has been recorded for Zaheduzzaman Sarker |
2023-02-28
|
12 | John Scudder | [Ballot comment] Thanks for this document. Thanks also to Joe Clarke for the detailed and helpful shepherd writeup. I noticed one nit that I don’t … [Ballot comment] Thanks for this document. Thanks also to Joe Clarke for the detailed and helpful shepherd writeup. I noticed one nit that I don’t think I’ve seen mentioned yet, “SMNPv3” -> “SNMPv3”. |
2023-02-28
|
12 | John Scudder | Ballot comment text updated for John Scudder |
2023-02-28
|
12 | John Scudder | [Ballot comment] Thanks for this document. Thanks also to Joe Clarke for the detailed and helpful shepherd right up. I noticed one nit that I … [Ballot comment] Thanks for this document. Thanks also to Joe Clarke for the detailed and helpful shepherd right up. I noticed one nit that I don’t think I’ve seen mentioned yet, “SMNPv3” -> “SNMPv3”. |
2023-02-28
|
12 | John Scudder | [Ballot Position Update] New position, No Objection, has been recorded for John Scudder |
2023-02-28
|
12 | Roman Danyliw | [Ballot comment] ** Section 6. Per the new IANA registry: -- Is the WG sure that expert review for the entire registry is sufficient? I’ll … [Ballot comment] ** Section 6. Per the new IANA registry: -- Is the WG sure that expert review for the entire registry is sufficient? I’ll point out that the “TLS HashAlgorithm” from which it forked defines ranges for code points (to include standards track … expert review). -- I applaud the design of this registry incorporating the notion of “Recommended”. Based on the TLS experience of using that flag, specifically Section 5 of RFC8447, does stronger guidance need to be added on the threshold for getting a “Y” and the semantics of “N”. In RFC8847, “Recommended=Y” requires a standards track; and “Recommended=N” allows for the possibility that the proposed algorithm is not “flawed”, simply that it hasn’t been reviewed by the IETF. |
2023-02-28
|
12 | Roman Danyliw | [Ballot Position Update] New position, No Objection, has been recorded for Roman Danyliw |
2023-02-28
|
12 | Éric Vyncke | [Ballot comment] # Éric Vyncke, INT AD, comments for draft-ietf-opsawg-tlstm-update-12 CC @evyncke Thank you for the work put into this document. Please find below some … [Ballot comment] # Éric Vyncke, INT AD, comments for draft-ietf-opsawg-tlstm-update-12 CC @evyncke Thank you for the work put into this document. Please find below some non-blocking COMMENT points. Special thanks to Joe Clarke for the shepherd's detailed write-up including the WG consensus **and** the justification of the intended status. I hope that this review helps to improve the document, Regards, -éric ## COMMENTS ### MIB Doctor review Like Lars, I wonder whether there was a MIB doctor review. ### Section 3.1 This text is repeated, is it on purpose ? ``` The reason 0-RTT is disallowed is that there are no "safe" messages that if replayed will be guaranteed to cause no harm at a server side: all incoming notification or command responses are meant to be acted upon only once. See Security considerations section for further details ``` ## Notes This review is in the ["IETF Comments" Markdown format][ICMF], You can use the [`ietf-comments` tool][ICT] to automatically convert this review into individual GitHub issues. [ICMF]: https://github.com/mnot/ietf-comments/blob/main/format.md [ICT]: https://github.com/mnot/ietf-comments |
2023-02-28
|
12 | Éric Vyncke | [Ballot Position Update] New position, No Objection, has been recorded for Éric Vyncke |
2023-02-28
|
12 | Lars Eggert | [Ballot comment] # GEN AD review of draft-ietf-opsawg-tlstm-update-12 CC @larseggert Thanks to Joel Halpern for the General Area Review Team (Gen-ART) review (https://mailarchive.ietf.org/arch/msg/gen-art/VI00LPj0gVfsGW_qOfw9JlGAJdE). … [Ballot comment] # GEN AD review of draft-ietf-opsawg-tlstm-update-12 CC @larseggert Thanks to Joel Halpern for the General Area Review Team (Gen-ART) review (https://mailarchive.ietf.org/arch/msg/gen-art/VI00LPj0gVfsGW_qOfw9JlGAJdE). ## Comments ### Paragraph 2 ``` Updates to the TLS Transport Model for SNMP draft-ietf-opsawg-tlstm-update-12 ``` Was there a mibdoctors review of this I-D? Should there be? ### Section 1, paragraph 1 ``` This document updates and clarifies how the rules of [RFC6353] apply when using Transport Layer Security (TLS) or Datagram Transport Layer Security (DTLS) versions later than 1.2. This document jointly refers to these two protocols as "(D)TLS". The update also incorporates the [RFC8996] update, which prohibits the use of TLS versions prior to TLS 1.2. ``` Should this document then not also obsolete RFC8996? ### Missing references No reference entries found for these items, which were mentioned in the text: `[RFC3413]`, `[RFC2579]`, `[RFC3411]`, `[RFC2578]`, and `[RFC2580]`. ### Uncited references Document updates `RFC6353`, but does not cite it as a reference, which is a bit odd. ## Nits All comments below are about very minor potential issues that you may choose to address in some way - or ignore - as you see fit. Some were flagged by automated tools (via https://github.com/larseggert/ietf-reviewtool), so there will likely be some false positives. There is no need to let me know what you did with these suggestions. ### Outdated references Reference `[RFC5953]` to `RFC5953`, which was obsoleted by `RFC6353` (this may be on purpose). Reference `[RFC5246]` to `RFC5246`, which was obsoleted by `RFC8446` (this may be on purpose). ### Grammar/style #### Section 4, paragraph 28 ``` s not specify converting to lowercase so this involves an extra step). This ^^^ ``` Use a comma before "so" if it connects two independent clauses (unless they are closely connected and short). #### Section 4, paragraph 90 ``` nd this hash value MUST match exactly or the connection MUST NOT be establis ^^^ ``` Use a comma before "or" if it connects two independent clauses (unless they are closely connected and short). ## Notes This review is in the ["IETF Comments" Markdown format][ICMF], You can use the [`ietf-comments` tool][ICT] to automatically convert this review into individual GitHub issues. Review generated by the [`ietf-reviewtool`][IRT]. [ICMF]: https://github.com/mnot/ietf-comments/blob/main/format.md [ICT]: https://github.com/mnot/ietf-comments [IRT]: https://github.com/larseggert/ietf-reviewtool |
2023-02-28
|
12 | Lars Eggert | [Ballot Position Update] New position, No Objection, has been recorded for Lars Eggert |
2023-02-27
|
12 | Robert Wilton | Telechat date has been changed to 2023-03-02 from 2023-03-16 |
2023-02-25
|
12 | Erik Kline | [Ballot Position Update] New position, No Objection, has been recorded for Erik Kline |
2023-02-24
|
12 | Cindy Morgan | Placed on agenda for telechat - 2023-03-16 |
2023-02-24
|
12 | Robert Wilton | Ballot has been issued |
2023-02-24
|
12 | Robert Wilton | [Ballot Position Update] New position, Yes, has been recorded for Robert Wilton |
2023-02-24
|
12 | Robert Wilton | Created "Approve" ballot |
2023-02-24
|
12 | Robert Wilton | IESG state changed to IESG Evaluation from Waiting for Writeup |
2023-02-23
|
12 | Robert Wilton | Ballot writeup was changed |
2023-02-20
|
12 | (System) | IESG state changed to Waiting for Writeup from In Last Call |
2023-02-18
|
12 | Di Ma | Request for Last Call review by DNSDIR Completed: Ready. Reviewer: Di Ma. |
2023-02-18
|
12 | Di Ma | Request for Last Call review by DNSDIR Completed: Ready. Reviewer: Di Ma. Sent review to list. Submission of review completed at an earlier date. |
2023-02-15
|
12 | (System) | IANA Review state changed to IANA OK - Actions Needed from IANA - Review Needed |
2023-02-15
|
12 | David Dong | (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: The IANA Functions Operator has completed its review of draft-ietf-opsawg-tlstm-update-12. If any part of this review is inaccurate, please let … (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: The IANA Functions Operator has completed its review of draft-ietf-opsawg-tlstm-update-12. If any part of this review is inaccurate, please let us know. The IANA Functions Operator has a question about one of the actions requested in the IANA Considerations section of this document. The IANA Functions Operator understands that, upon approval of this document, there is a single action which we must complete. A new registry is to be created called the SNMP-TLSTM HashAlgorithm registry. The new registry will be located on the Structure of Management Information (SMI) Numbers (MIB Module Registrations) registry page located at: https://www.iana.org/assignments/smi-numbers/ IANA Question --> It is not completely clear where this registry should be located on the Structure of Management Information (SMI) Numbers (MIB Module Registrations) registry page. Could the authors describe, more precisely, the exact location they would like the new registry to appear on the page? The new registry will be managed through Expert Review as defined by RFC8126. There are initial registrations in the new registry as follows: Value Description Recommended Reference 0 none N [RFC5246] 1 md5 N [RFC5246] 2 sha1 N [RFC5246] 3 sha224 Y [RFC5246] 4 sha256 Y [RFC5246] 5 sha384 Y [RFC5246] 6 sha512 Y [RFC5246] 7 reserved [RFC8447] 8 intrinsic N [RFC8422] 9-223 reserved [RFC8447] 224-255 private [RFC5246] The IANA Functions Operator understands that this is the only action required to be completed upon approval of this document. Note: The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is meant only to confirm the list of actions that will be performed. For definitions of IANA review states, please see: https://datatracker.ietf.org/help/state/draft/iana-review Thank you, David Dong IANA Services Specialist |
2023-02-15
|
12 | Kenneth Vaughn | New version available: draft-ietf-opsawg-tlstm-update-12.txt |
2023-02-15
|
12 | Kenneth Vaughn | New version approved |
2023-02-15
|
12 | (System) | Request for posting confirmation emailed to previous authors: Kenneth Vaughn |
2023-02-15
|
12 | Kenneth Vaughn | Uploaded new revision |
2023-02-09
|
11 | Joel Halpern | Request for Last Call review by GENART Completed: Ready. Reviewer: Joel Halpern. Sent review to list. |
2023-02-09
|
11 | Jean Mahoney | Request for Last Call review by GENART is assigned to Joel Halpern |
2023-02-07
|
11 | Jim Reid | Request for Last Call review by DNSDIR is assigned to Di Ma |
2023-02-06
|
11 | Cindy Morgan | IANA Review state changed to IANA - Review Needed |
2023-02-06
|
11 | Cindy Morgan | The following Last Call announcement was sent out (ends 2023-02-20): From: The IESG To: IETF-Announce CC: draft-ietf-opsawg-tlstm-update@ietf.org, jclarke@cisco.com, opsawg-chairs@ietf.org, opsawg@ietf.org, rwilton@cisco.com … The following Last Call announcement was sent out (ends 2023-02-20): From: The IESG To: IETF-Announce CC: draft-ietf-opsawg-tlstm-update@ietf.org, jclarke@cisco.com, opsawg-chairs@ietf.org, opsawg@ietf.org, rwilton@cisco.com Reply-To: last-call@ietf.org Sender: Subject: Last Call: (Updates to the TLS Transport Model for SNMP) to Proposed Standard The IESG has received a request from the Operations and Management Area Working Group WG (opsawg) to consider the following document: - 'Updates to the TLS Transport Model for SNMP' as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the last-call@ietf.org mailing lists by 2023-02-20. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract This document updates RFC 6353 "Transport Layer Security (TLS) Transport Model for the Simple Network Management Protocol (SNMP)", to reflect changes necessary to support Transport Layer Security Version 1.3 (TLS 1.3) and Datagram Transport Layer Security Version 1.3 (DTLS 1.3), which are jointly known as "(D)TLS 1.3". This document is compatible with (D)TLS 1.2 and is intended to be compatible with future versions of SNMP and (D)TLS. This document updates the SNMP-TLS-TM-MIB as defined in RFC 6353. The file can be obtained via https://datatracker.ietf.org/doc/draft-ietf-opsawg-tlstm-update/ No IPR declarations have been submitted directly on this I-D. |
2023-02-06
|
11 | Cindy Morgan | IESG state changed to In Last Call from Last Call Requested |
2023-02-06
|
11 | Robert Wilton | Last call was requested |
2023-02-06
|
11 | Robert Wilton | Ballot approval text was generated |
2023-02-06
|
11 | Robert Wilton | Ballot writeup was generated |
2023-02-06
|
11 | Robert Wilton | IESG state changed to Last Call Requested from AD Evaluation::AD Followup |
2023-02-06
|
11 | Robert Wilton | Last call announcement was generated |
2022-12-23
|
11 | (System) | Changed action holders to Robert Wilton (IESG state changed) |
2022-12-23
|
11 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2022-12-23
|
11 | Kenneth Vaughn | New version available: draft-ietf-opsawg-tlstm-update-11.txt |
2022-12-23
|
11 | (System) | New version approved |
2022-12-23
|
11 | (System) | Request for posting confirmation emailed to previous authors: Kenneth Vaughn |
2022-12-23
|
11 | Kenneth Vaughn | Uploaded new revision |
2022-12-19
|
10 | (System) | Changed action holders to Kenneth Vaughn, Robert Wilton (IESG state changed) |
2022-12-19
|
10 | Robert Wilton | IESG state changed to AD Evaluation::Revised I-D Needed from AD Evaluation |
2022-12-16
|
10 | (System) | Changed action holders to Robert Wilton (IESG state changed) |
2022-12-16
|
10 | Robert Wilton | IESG state changed to AD Evaluation from Publication Requested |
2022-10-09
|
10 | Joe Clarke | # Document Shepherd Write-Up for Group Documents ## Document History The document was actively discussed between a number of working group individuals as well as … # Document Shepherd Write-Up for Group Documents ## Document History The document was actively discussed between a number of working group individuals as well as in consultation with members of the TLS working group. No one has expressed dissent in the work or its direction, but I would have liked to see reviews from the SEC DIR and from the broader OPS DIR. Requests for those reviews went unanswered. One area to pay special attention to is how new hash algorithms are allocated in the new IANA-maintained registry. One thought was to have new algorithms auto-added based on work happening in TLS 1.3. However, that could lead to a proliferation of algorithms in this registry that are never used. Therefore, the current text stipulates an additional expert review and work on behalf of interested parties to propose a new hash algorithm be added (and that represents the consensus of the group). It is also important to call out that the reason this document requests a new registry vs. adding to the existing one is that the TLS working group did not want to imply that any new algorithms added to the existing fingerprint registry worked with TLS 1.2. Choosing this approach allowed for a much more simplified update to RFC 6353. ## Additional Reviews The contents of this document do interact closely with TLS and thus a review from the TLS WG was requested. Their input was key in choosing this document's current direction (see above). However, I would have liked to have received some other directorate-level reviews to reinforce the approach in the registry is sound. From a MIB standpoint, by taking a simplified approach, the updates were minimal. That is, even though this document moves to a new hash algorithm registry, the semantics of the MIB and the SnmpTLSFingerprint textual convention remain the same, thus backwards compatibility is preserved. This was confirmed by Jürgen Shönwälder. ## Document Shepherd Checks 9. Based on the shepherd's review of the document, is it their opinion that this document is needed, clearly written, complete, correctly designed, and ready to be handed off to the responsible Area Director? Yes. 10. Several IETF Areas have assembled [lists of common issues that their reviewers encounter][6]. For which areas have such issues been identified and addressed? For which does this still need to happen in subsequent reviews? SEC DIR and OPS DIR should review. 11. What type of RFC publication is being requested on the IETF stream ([Best Current Practice][12], [Proposed Standard, Internet Standard][13], [Informational, Experimental or Historic][14])? Why is this the proper type of RFC? Do all Datatracker state attributes correctly reflect this intent? Proposed Standard. This is the correct type based on the RFC it updates and that it defines a [modified] MIB module. This status is correctly reflected in Datatracker. 12. Have reasonable efforts been made to remind all authors of the intellectual property rights (IPR) disclosure obligations described in [BCP 79][7]? To the best of your knowledge, have all required disclosures been filed? If not, explain why. If yes, summarize any relevant discussion, including links to publicly-available messages when applicable. Yes. An IPR call was conducted and no IPR was reported. The author explicitly stated he knows of no IPR. 13. Has each author, editor, and contributor shown their willingness to be listed as such? If the total number of authors and editors on the front page is greater than five, please provide a justification. Yes. 14. Document any remaining I-D nits in this document. Simply running the [idnits tool][8] is not enough; please review the ["Content Guidelines" on authors.ietf.org][15]. (Also note that the current idnits tool generates some incorrect warnings; a rewrite is underway.) Most IDNITS have been sorted. However, this is still a reference to the obsolete RFC 5246, and that is intentional as we are incorporating the values from the old TLS 1.2 registry. Also note, the references from the MIB have been added as norm/inform references (in a style similar to what is done in YANG modules), and in the case of RFC 5890, has been made normative with new language in the MIB. 15. Should any informative references be normative or vice-versa? See the [IESG Statement on Normative and Informative References][16]. References look correct. 16. List any normative references that are not freely available to anyone. Did the community have sufficient access to review any such normative references? All normative references are freely available. 17. Are there any normative downward references (see [RFC 3967][9] and [BCP 97][10]) that are not already listed in the [DOWNREF registry][17]? If so, list them. No. 18. Are there normative references to documents that are not ready to be submitted to the IESG for publication or are otherwise in an unclear state? If so, what is the plan for their completion? No. 19. Will publication of this document change the status of any existing RFCs? If so, does the Datatracker metadata correctly reflect this and are those RFCs listed on the title page, in the abstract, and discussed in the introduction? If not, explain why and point to the part of the document where the relationship of this document to these other RFCs is discussed. It will update RFC 6353. That metadata in the document is correct. 20. Describe the document shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all aspects of the document requiring IANA assignments are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that each newly created IANA registry specifies its initial contents, allocations procedures, and a reasonable name (see [RFC 8126][11]). The ask of IANA is clearly called out. One registry is requested with initial contents clearly spelled out. 21. List any new IANA registries that require Designated Expert Review for future allocations. Are the instructions to the Designated Expert clear? Please include suggestions of designated experts, if appropriate. The one new registry is SNMP-TLSTM HashAlgorithm Registry. It is designated as expert review whereby the Security Area via the TLS WG is consulted as to whether or not a new algorithm should be added. New algorithms should not show up here first. They would appear in the TLS Cipher Suites registry. Someone wanting to use the same algorithm for SNMP TLSTM would then request that algorithm receive a one-byte allocation in this new registry. |
2022-10-09
|
10 | Joe Clarke | Responsible AD changed to Robert Wilton |
2022-10-09
|
10 | Joe Clarke | IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up |
2022-10-09
|
10 | Joe Clarke | IESG state changed to Publication Requested from I-D Exists |
2022-10-09
|
10 | Joe Clarke | IESG process started in state Publication Requested |
2022-10-09
|
10 | Joe Clarke | # Document Shepherd Write-Up for Group Documents ## Document History The document was actively discussed between a number of working group individuals as well as … # Document Shepherd Write-Up for Group Documents ## Document History The document was actively discussed between a number of working group individuals as well as in consultation with members of the TLS working group. No one has expressed dissent in the work or its direction, but I would have liked to see reviews from the SEC DIR and from the broader OPS DIR. Requests for those reviews went unanswered. One area to pay special attention to is how new hash algorithms are allocated in the new IANA-maintained registry. One thought was to have new algorithms auto-added based on work happening in TLS 1.3. However, that could lead to a proliferation of algorithms in this registry that are never used. Therefore, the current text stipulates an additional expert review and work on behalf of interested parties to propose a new hash algorithm be added (and that represents the consensus of the group). It is also important to call out that the reason this document requests a new registry vs. adding to the existing one is that the TLS working group did not want to imply that any new algorithms added to the existing fingerprint registry worked with TLS 1.2. Choosing this approach allowed for a much more simplified update to RFC 6353. ## Additional Reviews The contents of this document do interact closely with TLS and thus a review from the TLS WG was requested. Their input was key in choosing this document's current direction (see above). However, I would have liked to have received some other directorate-level reviews to reinforce the approach in the registry is sound. From a MIB standpoint, by taking a simplified approach, the updates were minimal. That is, even though this document moves to a new hash algorithm registry, the semantics of the MIB and the SnmpTLSFingerprint textual convention remain the same, thus backwards compatibility is preserved. This was confirmed by Jürgen Shönwälder. ## Document Shepherd Checks 9. Based on the shepherd's review of the document, is it their opinion that this document is needed, clearly written, complete, correctly designed, and ready to be handed off to the responsible Area Director? Yes. 10. Several IETF Areas have assembled [lists of common issues that their reviewers encounter][6]. For which areas have such issues been identified and addressed? For which does this still need to happen in subsequent reviews? SEC DIR and OPS DIR should review. 11. What type of RFC publication is being requested on the IETF stream ([Best Current Practice][12], [Proposed Standard, Internet Standard][13], [Informational, Experimental or Historic][14])? Why is this the proper type of RFC? Do all Datatracker state attributes correctly reflect this intent? Proposed Standard. This is the correct type based on the RFC it updates and that it defines a [modified] MIB module. This status is correctly reflected in Datatracker. 12. Have reasonable efforts been made to remind all authors of the intellectual property rights (IPR) disclosure obligations described in [BCP 79][7]? To the best of your knowledge, have all required disclosures been filed? If not, explain why. If yes, summarize any relevant discussion, including links to publicly-available messages when applicable. Yes. An IPR call was conducted and no IPR was reported. The author explicitly stated he knows of no IPR. 13. Has each author, editor, and contributor shown their willingness to be listed as such? If the total number of authors and editors on the front page is greater than five, please provide a justification. Yes. 14. Document any remaining I-D nits in this document. Simply running the [idnits tool][8] is not enough; please review the ["Content Guidelines" on authors.ietf.org][15]. (Also note that the current idnits tool generates some incorrect warnings; a rewrite is underway.) Most IDNITS have been sorted. However, this is still a reference to the obsolete RFC 5246, and that is intentional as we are incorporating the values from the old TLS 1.2 registry. Also note, the references from the MIB have been added as norm/inform references (in a style similar to what is done in YANG modules), and in the case of RFC 5890, has been made normative with new language in the MIB. 15. Should any informative references be normative or vice-versa? See the [IESG Statement on Normative and Informative References][16]. References look correct. 16. List any normative references that are not freely available to anyone. Did the community have sufficient access to review any such normative references? All normative references are freely available. 17. Are there any normative downward references (see [RFC 3967][9] and [BCP 97][10]) that are not already listed in the [DOWNREF registry][17]? If so, list them. No. 18. Are there normative references to documents that are not ready to be submitted to the IESG for publication or are otherwise in an unclear state? If so, what is the plan for their completion? No. 19. Will publication of this document change the status of any existing RFCs? If so, does the Datatracker metadata correctly reflect this and are those RFCs listed on the title page, in the abstract, and discussed in the introduction? If not, explain why and point to the part of the document where the relationship of this document to these other RFCs is discussed. It will update RFC 6353. That metadata in the document is correct. 20. Describe the document shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all aspects of the document requiring IANA assignments are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that each newly created IANA registry specifies its initial contents, allocations procedures, and a reasonable name (see [RFC 8126][11]). The ask of IANA is clearly called out. One registry is requested with initial contents clearly spelled out. 21. List any new IANA registries that require Designated Expert Review for future allocations. Are the instructions to the Designated Expert clear? Please include suggestions of designated experts, if appropriate. The one new registry is SNMP-TLSTM HashAlgorithm Registry. It is designated as expert review whereby the Security Area via the TLS WG is consulted as to whether or not a new algorithm should be added. New algorithms should not show up here first. They would appear in the TLS Cipher Suites registry. Someone wanting to use the same algorithm for SNMP TLSTM would then request that algorithm receive a one-byte allocation in this new registry. |
2022-10-08
|
10 | Kenneth Vaughn | New version available: draft-ietf-opsawg-tlstm-update-10.txt |
2022-10-08
|
10 | Kenneth Vaughn | New version accepted (logged-in submitter: Kenneth Vaughn) |
2022-10-08
|
10 | Kenneth Vaughn | Uploaded new revision |
2022-10-04
|
09 | Kenneth Vaughn | New version available: draft-ietf-opsawg-tlstm-update-09.txt |
2022-10-04
|
09 | Kenneth Vaughn | New version accepted (logged-in submitter: Kenneth Vaughn) |
2022-10-04
|
09 | Kenneth Vaughn | Uploaded new revision |
2022-09-29
|
08 | Kenneth Vaughn | New version available: draft-ietf-opsawg-tlstm-update-08.txt |
2022-09-29
|
08 | Kenneth Vaughn | New version accepted (logged-in submitter: Kenneth Vaughn) |
2022-09-29
|
08 | Kenneth Vaughn | Uploaded new revision |
2022-09-27
|
07 | Joe Clarke | Tag Revised I-D Needed - Issue raised by WG cleared. |
2022-09-27
|
07 | Joe Clarke | IETF WG state changed to WG Consensus: Waiting for Write-Up from In WG Last Call |
2022-09-27
|
07 | Joe Clarke | Changed consensus to Yes from Unknown |
2022-09-27
|
07 | Joe Clarke | Intended Status changed to Proposed Standard from None |
2022-09-27
|
07 | Joe Clarke | Notification list changed to jclarke@cisco.com because the document shepherd was set |
2022-09-27
|
07 | Joe Clarke | Document shepherd changed to Joe Clarke |
2022-09-26
|
07 | Kenneth Vaughn | New version available: draft-ietf-opsawg-tlstm-update-07.txt |
2022-09-26
|
07 | Kenneth Vaughn | New version accepted (logged-in submitter: Kenneth Vaughn) |
2022-09-26
|
07 | Kenneth Vaughn | Uploaded new revision |
2022-09-09
|
06 | Kenneth Vaughn | New version available: draft-ietf-opsawg-tlstm-update-06.txt |
2022-09-09
|
06 | Kenneth Vaughn | New version accepted (logged-in submitter: Kenneth Vaughn) |
2022-09-09
|
06 | Kenneth Vaughn | Uploaded new revision |
2022-09-06
|
05 | Joe Clarke | Extending LC for this to try and get some directorate reviews. Plus, some LC comments came from the WG, and a revised I-D will be … Extending LC for this to try and get some directorate reviews. Plus, some LC comments came from the WG, and a revised I-D will be required. |
2022-09-06
|
05 | Joe Clarke | Tag Revised I-D Needed - Issue raised by WG set. |
2022-08-29
|
05 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Niclas Comstedt |
2022-08-29
|
05 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Niclas Comstedt |
2022-08-25
|
05 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Tobias Gondrom |
2022-08-25
|
05 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Tobias Gondrom |
2022-08-24
|
05 | Joe Clarke | Requested Last Call review by OPSDIR |
2022-08-24
|
05 | Joe Clarke | Requested Last Call review by SECDIR |
2022-08-11
|
05 | Joe Clarke | IETF WG state changed to In WG Last Call from WG Document |
2022-05-26
|
05 | Kenneth Vaughn | New version available: draft-ietf-opsawg-tlstm-update-05.txt |
2022-05-26
|
05 | (System) | New version approved |
2022-05-26
|
05 | (System) | Request for posting confirmation emailed to previous authors: Kenneth Vaughn |
2022-05-26
|
05 | Kenneth Vaughn | Uploaded new revision |
2022-05-16
|
04 | Kenneth Vaughn | New version available: draft-ietf-opsawg-tlstm-update-04.txt |
2022-05-16
|
04 | (System) | New version approved |
2022-05-16
|
04 | (System) | Request for posting confirmation emailed to previous authors: Kenneth Vaughn |
2022-05-16
|
04 | Kenneth Vaughn | Uploaded new revision |
2022-05-05
|
03 | Kenneth Vaughn | New version available: draft-ietf-opsawg-tlstm-update-03.txt |
2022-05-05
|
03 | (System) | New version approved |
2022-05-05
|
03 | (System) | Request for posting confirmation emailed to previous authors: Kenneth Vaughn |
2022-05-05
|
03 | Kenneth Vaughn | Uploaded new revision |
2022-04-06
|
02 | Kenneth Vaughn | New version available: draft-ietf-opsawg-tlstm-update-02.txt |
2022-04-06
|
02 | (System) | New version accepted (logged-in submitter: Kenneth Vaughn) |
2022-04-06
|
02 | Kenneth Vaughn | Uploaded new revision |
2022-03-05
|
01 | Kenneth Vaughn | New version available: draft-ietf-opsawg-tlstm-update-01.txt |
2022-03-05
|
01 | (System) | New version accepted (logged-in submitter: Kenneth Vaughn) |
2022-03-05
|
01 | Kenneth Vaughn | Uploaded new revision |
2021-12-17
|
00 | Joe Clarke | This document now replaces draft-vaughn-tlstm-update instead of None |
2021-12-17
|
00 | Kenneth Vaughn | New version available: draft-ietf-opsawg-tlstm-update-00.txt |
2021-12-17
|
00 | (System) | WG -00 approved |
2021-12-16
|
00 | Kenneth Vaughn | Set submitter to "Kenneth Vaughn ", replaces to draft-vaughn-tlstm-update and sent approval email to group chairs: opsawg-chairs@ietf.org |
2021-12-16
|
00 | Kenneth Vaughn | Uploaded new revision |