YANG Data Model for Key Chains
draft-ietf-rtgwg-yang-key-chain-24
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2017-06-14
|
24 | (System) | RFC Editor state changed to AUTH48-DONE from AUTH48 |
2017-06-08
|
24 | (System) | RFC Editor state changed to AUTH48 from RFC-EDITOR |
2017-05-24
|
24 | (System) | RFC Editor state changed to RFC-EDITOR from EDIT |
2017-05-22
|
24 | Gunter Van de Velde | Closed request for Last Call review by OPSDIR with state 'No Response' |
2017-05-04
|
24 | (System) | RFC Editor state changed to EDIT |
2017-05-04
|
24 | (System) | IESG state changed to RFC Ed Queue from Approved-announcement sent |
2017-05-04
|
24 | (System) | Announcement was received by RFC Editor |
2017-05-04
|
24 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
2017-05-03
|
24 | (System) | IANA Action state changed to Waiting on RFC Editor from Waiting on Authors |
2017-05-03
|
24 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2017-05-03
|
24 | (System) | IANA Action state changed to In Progress |
2017-05-03
|
24 | Cindy Morgan | IESG state changed to Approved-announcement sent from Approved-announcement to be sent |
2017-05-03
|
24 | Cindy Morgan | IESG has approved the document |
2017-05-03
|
24 | Cindy Morgan | Closed "Approve" ballot |
2017-05-03
|
24 | Cindy Morgan | Ballot approval text was generated |
2017-05-03
|
24 | Cindy Morgan | Ballot writeup was changed |
2017-05-03
|
24 | Alia Atlas | IESG state changed to Approved-announcement to be sent from IESG Evaluation::AD Followup |
2017-05-03
|
24 | Alexey Melnikov | [Ballot comment] Thank you for addressing my DISCUSS. Maybe it is just me, but it would have helped to say that "key string in ASCII" … [Ballot comment] Thank you for addressing my DISCUSS. Maybe it is just me, but it would have helped to say that "key string in ASCII" is a passphrase. I was not sure whether "key string" was a term used in Routing and/or YANG circles. The best place to clarify this is in Section 2 (Problem Statement) |
2017-05-03
|
24 | Alexey Melnikov | [Ballot Position Update] Position for Alexey Melnikov has been changed to No Objection from Discuss |
2017-05-03
|
24 | Kathleen Moriarty | [Ballot comment] Thank you for working through the SecDir review and making the suggested updates. |
2017-05-03
|
24 | Kathleen Moriarty | [Ballot Position Update] Position for Kathleen Moriarty has been changed to No Objection from Discuss |
2017-04-30
|
24 | Alexey Melnikov | [Ballot discuss] After reading the discussion between Adam, Kathleen and Alia, I have the following concerns: 1) With the removal of aes-key-wrap from the data … [Ballot discuss] After reading the discussion between Adam, Kathleen and Alia, I have the following concerns: 1) With the removal of aes-key-wrap from the data model it is now not possible to tell whether a particular key string is a passphrase or whether it contains an encrypted key. |
2017-04-30
|
24 | Alexey Melnikov | Ballot discuss text updated for Alexey Melnikov |
2017-04-29
|
24 | Acee Lindem | New version available: draft-ietf-rtgwg-yang-key-chain-24.txt |
2017-04-29
|
24 | (System) | New version approved |
2017-04-29
|
24 | (System) | Request for posting confirmation emailed to previous authors: Yingzhen Qu , rtgwg-chairs@ietf.org, Derek Yeung , Zhaohui Zhang , Ing-Wher Chen , Acee Lindem |
2017-04-29
|
24 | Acee Lindem | Uploaded new revision |
2017-04-28
|
23 | Acee Lindem | New version available: draft-ietf-rtgwg-yang-key-chain-23.txt |
2017-04-28
|
23 | (System) | New version approved |
2017-04-28
|
23 | (System) | Request for posting confirmation emailed to previous authors: Yingzhen Qu , rtgwg-chairs@ietf.org, Derek Yeung , Zhaohui Zhang , Ing-Wher Chen , Acee Lindem |
2017-04-28
|
23 | Acee Lindem | Uploaded new revision |
2017-04-28
|
22 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2017-04-28
|
22 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA - Not OK |
2017-04-28
|
22 | Acee Lindem | New version available: draft-ietf-rtgwg-yang-key-chain-22.txt |
2017-04-28
|
22 | (System) | New version approved |
2017-04-28
|
22 | (System) | Request for posting confirmation emailed to previous authors: Yingzhen Qu , rtgwg-chairs@ietf.org, Derek Yeung , Zhaohui Zhang , Ing-Wher Chen , Acee Lindem |
2017-04-28
|
22 | Acee Lindem | Uploaded new revision |
2017-04-27
|
21 | Cindy Morgan | IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation |
2017-04-27
|
21 | Kathleen Moriarty | [Ballot discuss] Note: My discuss is based on version -20 that contained the AES key wrap. I'd like to see that restored in the draft … [Ballot discuss] Note: My discuss is based on version -20 that contained the AES key wrap. I'd like to see that restored in the draft as it's important for the draft, and the rest of my discuss on that text will make more sense. Thanks for your work on this draft. There is one outstanding issue from the SecDir review that may require some updated text to resolve. It seems use of the key wrap method in RFC5649 requires more guidance for implementations to use it with this YANG module. It's good to know that this is in use for other modules, so having a clear reference either to another draft or the text being in this draft for later reference would be helpful. In looking at this text within the draft, I think it would be better to pull the text out of the Security Considerations section and into an earlier section of the draft. It's better to introduce this prior to enumerating security considerations for the draft since this something that would be implemented. Then security considerations should mention the considerations of using this option versus just what's in NACM. You have the text: When configured, the key-strings can be encrypted using the AES Key Wrap algorithm [AES-KEY-WRAP]. The AES key-encryption key (KEK) is not included in the YANG model and must be set or derived independent of key-chain configuration. When AES key-encryption is used, the hex-key-string feature is also required since the encrypted keys will contain characters that are not representable in the YANG string built-in type [YANG]. AES key-encryption MAY be used for added key security in situations where the NETCONF Access Control Mode is not available. I think it's pretty straightforward after looking at RFC5649, but maybe more text would be helpful to clarify for implementers. This might mean more text from 5649 on what gets placed in the YANG data model where you have already allocated for this or including an example. |
2017-04-27
|
21 | Kathleen Moriarty | Ballot discuss text updated for Kathleen Moriarty |
2017-04-27
|
21 | Alexey Melnikov | [Ballot discuss] After reading the discussion between Adam, Kathleen and Alia, I have the following concerns: 1) With the removal of aes-key-wrap from the data … [Ballot discuss] After reading the discussion between Adam, Kathleen and Alia, I have the following concerns: 1) With the removal of aes-key-wrap from the data model it is now not possible to tell whether a particular key string is a passphrase or whether it contains an encrypted key. 2) I really really think aes-key-wrap should be restored in the document. If there is no facility for doing wrapped keys, implementations will never support them. I would like to at least discuss this. |
2017-04-27
|
21 | Alexey Melnikov | [Ballot comment] Maybe it is just me, but it would have helped to say that "key string in ASCII" is a passphrase. I was not … [Ballot comment] Maybe it is just me, but it would have helped to say that "key string in ASCII" is a passphrase. I was not sure whether "key string" was a term used in Routing and/or YANG circles. |
2017-04-27
|
21 | Alexey Melnikov | [Ballot Position Update] Position for Alexey Melnikov has been changed to Discuss from No Record |
2017-04-27
|
21 | Alexey Melnikov | [Ballot comment] I am very very sad to see any mention of aes-key-wrap being removed. |
2017-04-27
|
21 | Alexey Melnikov | Ballot comment text updated for Alexey Melnikov |
2017-04-26
|
21 | Terry Manderson | [Ballot Position Update] New position, No Objection, has been recorded for Terry Manderson |
2017-04-26
|
21 | (System) | IANA Review state changed to IANA - Not OK from Version Changed - Review Needed |
2017-04-26
|
21 | Suresh Krishnan | [Ballot Position Update] New position, No Objection, has been recorded for Suresh Krishnan |
2017-04-26
|
21 | Spencer Dawkins | [Ballot Position Update] New position, No Objection, has been recorded for Spencer Dawkins |
2017-04-26
|
21 | Acee Lindem | New version available: draft-ietf-rtgwg-yang-key-chain-21.txt |
2017-04-26
|
21 | (System) | New version approved |
2017-04-26
|
21 | (System) | Request for posting confirmation emailed to previous authors: Yingzhen Qu , rtgwg-chairs@ietf.org, Derek Yeung , Zhaohui Zhang , Ing-Wher Chen , Acee Lindem |
2017-04-26
|
21 | Acee Lindem | Uploaded new revision |
2017-04-26
|
20 | Matthew Miller | Request for Telechat review by GENART Completed: Ready. Reviewer: Matthew Miller. Sent review to list. |
2017-04-26
|
20 | Alissa Cooper | [Ballot comment] Matt raised some questions and comments in his Gen-ART review that the authors are engaging with: https://datatracker.ietf.org/doc/review-ietf-rtgwg-yang-key-chain-17-genart-lc-miller-2017-04-07/ Thanks! |
2017-04-26
|
20 | Alissa Cooper | [Ballot Position Update] New position, No Objection, has been recorded for Alissa Cooper |
2017-04-26
|
20 | Kathleen Moriarty | [Ballot discuss] Thanks for your work on this draft. There is one outstanding issue from the SecDir review that may require some updated text to … [Ballot discuss] Thanks for your work on this draft. There is one outstanding issue from the SecDir review that may require some updated text to resolve. It seems use of the key wrap method in RFC5649 requires more guidance for implementations to use it with this YANG module. It's good to know that this is in use for other modules, so having a clear reference either to another draft or the text being in this draft for later reference would be helpful. In looking at this text within the draft, I think it would be better to pull the text out of the Security Considerations section and into an earlier section of the draft. It's better to introduce this prior to enumerating security considerations for the draft since this something that would be implemented. Then security considerations should mention the considerations of using this option versus just what's in NACM. You have the text: When configured, the key-strings can be encrypted using the AES Key Wrap algorithm [AES-KEY-WRAP]. The AES key-encryption key (KEK) is not included in the YANG model and must be set or derived independent of key-chain configuration. When AES key-encryption is used, the hex-key-string feature is also required since the encrypted keys will contain characters that are not representable in the YANG string built-in type [YANG]. AES key-encryption MAY be used for added key security in situations where the NETCONF Access Control Mode is not available. I think it's pretty straightforward after looking at RFC5649, but maybe more text would be helpful to clarify for implementers. This might mean more text from 5649 on what gets placed in the YANG data model where you have already allocated for this or including an example. |
2017-04-26
|
20 | Kathleen Moriarty | [Ballot comment] Thank you for working through the SecDir review and making the suggested updates. Since the following text int he Security Considerations section is … [Ballot comment] Thank you for working through the SecDir review and making the suggested updates. Since the following text int he Security Considerations section is a recommendation, IMO it would be better to drop "or otherwise obfuscated" from the sentence as encrypting the keys really should be the recommendation. Can we make this update? It is RECOMMENDED that keys be encrypted or otherwise obfuscated when stored internally on a network device supporting this specification. If obfuscation is what happens more often in practice, maybe mention this as a fallback from the recommendation, but not make them sound equivalent? |
2017-04-26
|
20 | Kathleen Moriarty | [Ballot Position Update] New position, Discuss, has been recorded for Kathleen Moriarty |
2017-04-26
|
20 | Benoît Claise | [Ballot comment] Editorial: - To be aligned with the other feature descriptions: OLD: feature accept-tolerance { description … [Ballot comment] Editorial: - To be aligned with the other feature descriptions: OLD: feature accept-tolerance { description "To specify the tolerance or acceptance limit."; } NEW: feature accept-tolerance { description "Support the tolerance or acceptance limit."; } - I would spell out "Network Management Datastore Architecture" [NMDA] All lights are green from a tooling point of view. As a side note, since you used the new NMDA tree structure, I would warn all the draft authors with YANG modules that depend on this YANG module that they might have to update their modules. See https://www.yangcatalog.org/yang-search/impact_analysis.php?modules[]=ietf-key-chain&recurse=0&rfcs=0 for the source of information. |
2017-04-26
|
20 | Benoît Claise | [Ballot Position Update] New position, No Objection, has been recorded for Benoit Claise |
2017-04-25
|
20 | Adam Roach | [Ballot comment] - The second paragraph in the Abstract seems very specific for an Abstract. Since this variation is covered in the Introduction, consider removing … [Ballot comment] - The second paragraph in the Abstract seems very specific for an Abstract. Since this variation is covered in the Introduction, consider removing it from the Abstract. - Since the syntax in section 1.2 is used only in section 3.3 (from which I kept referring back to it), consider moving it down into section 3 somewhere. - Section 2.2 describes a scheme in which the key with the "most recent send lifetime" is used for sending. The data model allows for lifetimes to be indicated with "always." It seems that there should be treatment of the interaction between "most recent" and "always". - The second paragraph of section 3 is a bit non-obvious on first reading -- consider spelling out that one chain has a valid send key but invalid receive key, and vice-versa. - Copyright notice in the YANG file is 2015. Is that intentional? - On page 11, in "grouping lifetime", "case start-end-time", "choice end-time", "case infinite", "description", replace "end-time in infinite" with "end-time is infinite". - On page 14, there's a assertion that hex allows specification of "greater entropy with the same number of octets." It might be worth qualifying this as *stored* octets, since it's demonstrably more octets on the wire. - Section 5 discusses the use of a KEK, distributed out-of-band, to decrypt the keys stored in this format. There appears to be no affordance for indicating the identity of which KEK to use, which would come in handy for the types of key rotation schemes I'm familiar with. Mostly, I'm worried about the "try it and see if it works" approach when you have two valid KEKs (as during a transition), as it's not clear that you will be able to distinguish success from failure in all cases. - Section 5 also suggests keys be encrypted or obfuscated on the device that is to use them, presumably in a way that can be decrypted or unobfuscated using information also on the device. I don't know what the current security area thinking around this is, but given that the information needed to retrieve plaintext keys is necessarily present on the device, this seems like a fig-leaf that provides an illusion of security without providing any real benefit. That mis-impression seems potentially harmful. - The IANA considerations section gives the YANG module prefix as "ietf-key-chain". The YANG module itself defines the prefix as "key-chain". I assume these should match each other? |
2017-04-25
|
20 | Adam Roach | [Ballot Position Update] New position, No Objection, has been recorded for Adam Roach |
2017-04-25
|
20 | Deborah Brungard | [Ballot Position Update] New position, No Objection, has been recorded for Deborah Brungard |
2017-04-24
|
20 | Mirja Kühlewind | [Ballot comment] Fully editorial comment: section 1 is just a copy of the abstract… this could be removed and section 2 could be used as … [Ballot comment] Fully editorial comment: section 1 is just a copy of the abstract… this could be removed and section 2 could be used as section 1/intro (with sections 1.1, 1.2, and 2.1 as subsections; and section 2.2. could become the new section 2) |
2017-04-24
|
20 | Mirja Kühlewind | [Ballot Position Update] New position, No Objection, has been recorded for Mirja Kühlewind |
2017-04-24
|
20 | Ben Campbell | [Ballot comment] Just a couple of editorial comments: -2.2: "This MAY be accomplished by accepting all the keys that have a valid accept lifetime and … [Ballot comment] Just a couple of editorial comments: -2.2: "This MAY be accomplished by accepting all the keys that have a valid accept lifetime and sending the key with the most recent send lifetime." As written, that MAY sounds like a statement of fact rather than a normative requirement. If it's intended as normative, please consider restating in terms of actual procedure (e.g. "The receiver MAY accept ...") -3, first paragraph: "Is a "key chain key" a key in the keychain, or something else? (maybe a key _for_ the keychain)? |
2017-04-24
|
20 | Ben Campbell | [Ballot Position Update] New position, No Objection, has been recorded for Ben Campbell |
2017-04-24
|
20 | Warren Kumari | [Ballot comment] I had a few minor comments, mainly on the explanatory text -- I'm not a YANG expert (that's Benoit's job :-)): 1: "A … [Ballot comment] I had a few minor comments, mainly on the explanatory text -- I'm not a YANG expert (that's Benoit's job :-)): 1: "A key chain can be used by any service or application requiring authentication or encryption." - from my reading, this only symmetric keys; should this be "A key chain can be used by any service or application requiring authentication or encryption using symmetric keys"? 2: "They are also used to support of security requirements (e.g., TCP-AO Algorithms [TCP-AO-ALGORITHMS]) not implemented by vendors or only a single vendor." -- if it is not implemented, why put a key string on a device? Perhaps this was intended to be "not **yet** implemented..." ? |
2017-04-24
|
20 | Warren Kumari | [Ballot Position Update] New position, No Objection, has been recorded for Warren Kumari |
2017-04-24
|
20 | Eric Rescorla | [Ballot Position Update] New position, No Objection, has been recorded for Eric Rescorla |
2017-04-24
|
20 | Alvaro Retana | [Ballot Position Update] New position, No Objection, has been recorded for Alvaro Retana |
2017-04-24
|
20 | Alia Atlas | IESG state changed to IESG Evaluation from Waiting for Writeup |
2017-04-24
|
20 | Alia Atlas | Ballot has been issued |
2017-04-24
|
20 | Alia Atlas | [Ballot Position Update] New position, Yes, has been recorded for Alia Atlas |
2017-04-24
|
20 | Alia Atlas | Created "Approve" ballot |
2017-04-24
|
20 | Alia Atlas | Ballot writeup was changed |
2017-04-19
|
20 | Jean Mahoney | Request for Telechat review by GENART is assigned to Matthew Miller |
2017-04-19
|
20 | Jean Mahoney | Request for Telechat review by GENART is assigned to Matthew Miller |
2017-04-18
|
20 | Acee Lindem | New version available: draft-ietf-rtgwg-yang-key-chain-20.txt |
2017-04-18
|
20 | (System) | New version approved |
2017-04-18
|
20 | (System) | Request for posting confirmation emailed to previous authors: Yingzhen Qu , rtgwg-chairs@ietf.org, Derek Yeung , Zhaohui Zhang , Ing-Wher Chen , Acee Lindem |
2017-04-18
|
20 | Acee Lindem | Uploaded new revision |
2017-04-13
|
19 | Tero Kivinen | Request for Last Call review by SECDIR Completed: Has Nits. Reviewer: Vincent Roca. |
2017-04-12
|
19 | Acee Lindem | New version available: draft-ietf-rtgwg-yang-key-chain-19.txt |
2017-04-12
|
19 | (System) | New version approved |
2017-04-12
|
19 | (System) | Request for posting confirmation emailed to previous authors: Yingzhen Qu , rtgwg-chairs@ietf.org, Derek Yeung , Zhaohui Zhang , Ing-Wher Chen , Acee Lindem |
2017-04-12
|
19 | Acee Lindem | Uploaded new revision |
2017-04-11
|
18 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA - Not OK |
2017-04-11
|
18 | Acee Lindem | New version available: draft-ietf-rtgwg-yang-key-chain-18.txt |
2017-04-11
|
18 | (System) | New version approved |
2017-04-11
|
18 | (System) | Request for posting confirmation emailed to previous authors: Yingzhen Qu , rtgwg-chairs@ietf.org, Derek Yeung , Zhaohui Zhang , Ing-Wher Chen , Acee Lindem |
2017-04-11
|
18 | Acee Lindem | Uploaded new revision |
2017-04-07
|
17 | Alia Atlas | Telechat date has been changed to 2017-04-27 from 2017-04-13 |
2017-04-07
|
17 | Matthew Miller | Request for Last Call review by GENART Completed: Almost Ready. Reviewer: Matthew Miller. Sent review to list. |
2017-04-07
|
17 | (System) | IESG state changed to Waiting for Writeup from In Last Call |
2017-04-05
|
17 | (System) | IANA Review state changed to IANA - Not OK from IANA - Review Needed |
2017-04-05
|
17 | Sabrina Tanamal | (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: The IANA Services Operator has completed its review of draft-ietf-rtgwg-yang-key-chain-15.txt. If any part of this review is inaccurate, please let … (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: The IANA Services Operator has completed its review of draft-ietf-rtgwg-yang-key-chain-15.txt. If any part of this review is inaccurate, please let us know. The IANA Services Operator understands that, upon approval of this document, there is a single action which we must complete. In the NS subregistry of the IETF XML registry located at: https://www.iana.org/assignments/xml-registry/ a single, new entry is to be added as follows: ID: yang:ietf-key-chain URI: urn:ietf:params:xml:ns:yang:ietf-key-chain Filename: [ TBD-at-registration ] Reference: [ RFC-to-be ] Because this registry requires Expert Review [RFC5226] for registration, we've contacted the IESG-designated expert in a separate ticket to request approval. Expert review should be completed before your document can be approved for publication as an RFC. The IANA Services Operator understands that this is the only action required to be completed upon approval of this document. Note: The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is only to confirm what actions will be performed. Thank you, Sabrina Tanamal IANA Services Specialist PTI |
2017-03-27
|
17 | Acee Lindem | New version available: draft-ietf-rtgwg-yang-key-chain-17.txt |
2017-03-27
|
17 | (System) | New version approved |
2017-03-27
|
17 | (System) | Request for posting confirmation emailed to previous authors: Yingzhen Qu , rtgwg-chairs@ietf.org, Derek Yeung , Zhaohui Zhang , Ing-Wher Chen , Acee Lindem |
2017-03-27
|
17 | Acee Lindem | Uploaded new revision |
2017-03-27
|
16 | Acee Lindem | New version available: draft-ietf-rtgwg-yang-key-chain-16.txt |
2017-03-27
|
16 | (System) | New version approved |
2017-03-27
|
16 | (System) | Request for posting confirmation emailed to previous authors: Yi Yang , Yingzhen Qu , rtgwg-chairs@ietf.org, Derek Yeung , Zhaohui Zhang , Ing-Wher Chen , … Request for posting confirmation emailed to previous authors: Yi Yang , Yingzhen Qu , rtgwg-chairs@ietf.org, Derek Yeung , Zhaohui Zhang , Ing-Wher Chen , Acee Lindem |
2017-03-27
|
16 | Acee Lindem | Uploaded new revision |
2017-03-23
|
15 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Lionel Morand |
2017-03-23
|
15 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Lionel Morand |
2017-03-23
|
15 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Vincent Roca |
2017-03-23
|
15 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Vincent Roca |
2017-03-22
|
15 | Jean Mahoney | Request for Last Call review by GENART is assigned to Matthew Miller |
2017-03-22
|
15 | Jean Mahoney | Request for Last Call review by GENART is assigned to Matthew Miller |
2017-03-17
|
15 | Cindy Morgan | The following Last Call announcement was sent out: From: The IESG To: IETF-Announce CC: rtgwg-chairs@ietf.org, draft-ietf-rtgwg-yang-key-chain@ietf.org, akatlas@gmail.com, Jeff Tantsura , jefftant.ietf@gmail.com, … The following Last Call announcement was sent out: From: The IESG To: IETF-Announce CC: rtgwg-chairs@ietf.org, draft-ietf-rtgwg-yang-key-chain@ietf.org, akatlas@gmail.com, Jeff Tantsura , jefftant.ietf@gmail.com, rtgwg@ietf.org Reply-To: ietf@ietf.org Sender: Subject: Last Call: (Routing Key Chain YANG Data Model) to Proposed Standard The IESG has received a request from the Routing Area Working Group WG (rtgwg) to consider the following document: - 'Routing Key Chain YANG Data Model' as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the ietf@ietf.org mailing lists by 2017-04-07. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract This document describes the key chain YANG data model. A key chain is a list of elements each containing a key string, send lifetime, accept lifetime, and algorithm (authentication or encryption). By properly overlapping the send and accept lifetimes of multiple key chain elements, key strings and algorithms may be gracefully updated. By representing them in a YANG data model, key distribution can be automated. Key chains are commonly used for routing protocol authentication and other applications. In some applications, the protocols do not use the key chain element key directly, but rather a key derivation function is used to derive a short-lived key from the key chain element key (e.g., the Master Keys used in the TCP Authentication Option. The file can be obtained via https://datatracker.ietf.org/doc/draft-ietf-rtgwg-yang-key-chain/ IESG discussion can be tracked via https://datatracker.ietf.org/doc/draft-ietf-rtgwg-yang-key-chain/ballot/ No IPR declarations have been submitted directly on this I-D. |
2017-03-17
|
15 | Cindy Morgan | Last call announcement was changed |
2017-03-17
|
15 | Alia Atlas | Placed on agenda for telechat - 2017-04-13 |
2017-03-16
|
15 | Cindy Morgan | IANA Review state changed to IANA - Review Needed |
2017-03-16
|
15 | Cindy Morgan | The following Last Call announcement was sent out: From: The IESG To: IETF-Announce CC: rtgwg-chairs@ietf.org, draft-ietf-rtgwg-yang-key-chain@ietf.org, akatlas@gmail.com, Jeff Tantsura , jefftant.ietf@gmail.com, … The following Last Call announcement was sent out: From: The IESG To: IETF-Announce CC: rtgwg-chairs@ietf.org, draft-ietf-rtgwg-yang-key-chain@ietf.org, akatlas@gmail.com, Jeff Tantsura , jefftant.ietf@gmail.com, rtgwg@ietf.org Reply-To: ietf@ietf.org Sender: Subject: Last Call: (Routing Key Chain YANG Data Model) to Proposed Standard The IESG has received a request from the Routing Area Working Group WG (rtgwg) to consider the following document: - 'Routing Key Chain YANG Data Model' as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the ietf@ietf.org mailing lists by 2017-03-30. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract This document describes the key chain YANG data model. A key chain is a list of elements each containing a key string, send lifetime, accept lifetime, and algorithm (authentication or encryption). By properly overlapping the send and accept lifetimes of multiple key chain elements, key strings and algorithms may be gracefully updated. By representing them in a YANG data model, key distribution can be automated. Key chains are commonly used for routing protocol authentication and other applications. In some applications, the protocols do not use the key chain element key directly, but rather a key derivation function is used to derive a short-lived key from the key chain element key (e.g., the Master Keys used in the TCP Authentication Option. The file can be obtained via https://datatracker.ietf.org/doc/draft-ietf-rtgwg-yang-key-chain/ IESG discussion can be tracked via https://datatracker.ietf.org/doc/draft-ietf-rtgwg-yang-key-chain/ballot/ No IPR declarations have been submitted directly on this I-D. |
2017-03-16
|
15 | Cindy Morgan | IESG state changed to In Last Call from Last Call Requested |
2017-03-16
|
15 | Alia Atlas | Last call was requested |
2017-03-16
|
15 | Alia Atlas | Please give this a 3 week IETF Last Call - expiring April 7. |
2017-03-16
|
15 | Alia Atlas | IESG state changed to Last Call Requested from AD Evaluation |
2017-03-16
|
15 | Alia Atlas | IESG state changed to AD Evaluation from Last Call Requested |
2017-03-16
|
15 | Alia Atlas | Last call was requested |
2017-03-16
|
15 | Alia Atlas | Last call announcement was generated |
2017-03-16
|
15 | Alia Atlas | Ballot approval text was generated |
2017-03-16
|
15 | Alia Atlas | Ballot writeup was generated |
2017-03-16
|
15 | Alia Atlas | IESG state changed to Last Call Requested from AD Evaluation |
2017-03-01
|
15 | Alia Atlas | IESG state changed to AD Evaluation from Publication Requested |
2017-02-20
|
15 | Ladislav Lhotka | Request for Early review by YANGDOCTORS Completed: Almost Ready. Reviewer: Ladislav Lhotka. Sent review to list. |
2017-02-16
|
15 | Jeff Tantsura | (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? … (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? The Intended Status is 'Proposed Standard'. The type of RFC is properly indicated in the title page header. This document describes the key chain YANG data model. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary This document describes a YANG data model for key chains. Key chains have been implemented and deployed by most of network equipment vendors. Providing a standard YANG model will facilitate automated key distribution and non-disruptive key rollover in a vendor independent way. Working Group Summary This draft has been thoroughly discussed in the WG, very good feedback had been provided by SP and vendor community. The draft adoption and progress has received full support from the WG. All comments have been addressed. The draft is ready for publication. Document Quality The draft went to many rounds of reviews by YANG-Doctors as well as implementors, which resulted in a very high quality document. There are existing implementations and multiple vendors have shown significant interest in the topic. Personnel Jeff Tantsura is the Document Shepherd. Alia Atlas is the Responsible Area Director. (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. The draft has been thoroughly reviewed by the Shepherd. All comments have been addressed. The draft is ready for publication. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? No concerns. (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. The draft has been reviewed by Security Area, Routing Directorate QA and YANG Doctors (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. N/A (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why. Yes. Every author has confirmed. (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. Yes. The authors have been asked (and they answered) on the WG list about IPR at every step of the process. There haven't been any concerns raised on the list. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? The draft adoption and progress had received full support from the WG. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarize the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No. (11) Identify any ID nits the Document Shepherd has found in this document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. No nits. (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. The draft has been reviewed by YANG-Doctors, all the comments received have been properly addressed. (13) Have all references within this document been identified as either normative or informative? Yes (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? No. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. No. (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. The state of other documents remains unchanged. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). This draft registers a URI in the IETF XML registry and a YANG module in the YANG Module Names registry. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. N/A (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. The draft has been reviewed by YANG-Doctors, all the comments received have been properly addressed. |
2017-02-16
|
15 | Jeff Tantsura | Responsible AD changed to Alia Atlas |
2017-02-16
|
15 | Jeff Tantsura | IETF WG state changed to Submitted to IESG for Publication from In WG Last Call |
2017-02-16
|
15 | Jeff Tantsura | IESG state changed to Publication Requested |
2017-02-16
|
15 | Jeff Tantsura | IESG process started in state Publication Requested |
2017-02-16
|
15 | Jeff Tantsura | Changed document writeup |
2017-02-16
|
15 | Acee Lindem | New version available: draft-ietf-rtgwg-yang-key-chain-15.txt |
2017-02-16
|
15 | (System) | New version approved |
2017-02-16
|
15 | (System) | Request for posting confirmation emailed to previous authors: "Yingzhen Qu" , "Ing-Wher Chen" , "Derek Yeung" , "Yi Yang" , rtgwg-chairs@ietf.org, "Acee Lindem" , … Request for posting confirmation emailed to previous authors: "Yingzhen Qu" , "Ing-Wher Chen" , "Derek Yeung" , "Yi Yang" , rtgwg-chairs@ietf.org, "Acee Lindem" , "Zhaohui Zhang" |
2017-02-16
|
15 | Acee Lindem | Uploaded new revision |
2017-02-15
|
14 | Acee Lindem | New version available: draft-ietf-rtgwg-yang-key-chain-14.txt |
2017-02-15
|
14 | (System) | New version approved |
2017-02-15
|
14 | (System) | Request for posting confirmation emailed to previous authors: "Yingzhen Qu" , "Derek Yeung" , "Yi Yang" , rtgwg-chairs@ietf.org, "I. Chen" , "Acee Lindem" , … Request for posting confirmation emailed to previous authors: "Yingzhen Qu" , "Derek Yeung" , "Yi Yang" , rtgwg-chairs@ietf.org, "I. Chen" , "Acee Lindem" , "Zhaohui Zhang" |
2017-02-15
|
14 | Acee Lindem | Uploaded new revision |
2017-02-08
|
13 | Mehmet Ersue | Request for Early review by YANGDOCTORS is assigned to Ladislav Lhotka |
2017-02-08
|
13 | Mehmet Ersue | Request for Early review by YANGDOCTORS is assigned to Ladislav Lhotka |
2017-02-07
|
13 | Mehmet Ersue | Requested Early review by YANGDOCTORS |
2017-02-06
|
13 | Jeff Tantsura | Tag Doc Shepherd Follow-up Underway cleared. |
2017-02-06
|
13 | Jeff Tantsura | IETF WG state changed to In WG Last Call from WG Consensus: Waiting for Write-Up |
2017-01-19
|
13 | Acee Lindem | New version available: draft-ietf-rtgwg-yang-key-chain-13.txt |
2017-01-19
|
13 | (System) | New version approved |
2017-01-19
|
13 | (System) | Request for posting confirmation emailed to previous authors: "Yingzhen Qu" , "Derek Yeung" , "Yi Yang" , rtgwg-chairs@ietf.org, "I. Chen" , "Acee Lindem" , … Request for posting confirmation emailed to previous authors: "Yingzhen Qu" , "Derek Yeung" , "Yi Yang" , rtgwg-chairs@ietf.org, "I. Chen" , "Acee Lindem" , "Zhaohui Zhang" |
2017-01-19
|
13 | Acee Lindem | Uploaded new revision |
2017-01-18
|
12 | Acee Lindem | New version available: draft-ietf-rtgwg-yang-key-chain-12.txt |
2017-01-18
|
12 | (System) | New version approved |
2017-01-18
|
12 | (System) | Request for posting confirmation emailed to previous authors: "Derek Yeung" , rtgwg-chairs@ietf.org, "I. Chen" , "Yi Yang" , "Acee Lindem" , "Zhaohui Zhang" , … Request for posting confirmation emailed to previous authors: "Derek Yeung" , rtgwg-chairs@ietf.org, "I. Chen" , "Yi Yang" , "Acee Lindem" , "Zhaohui Zhang" , "Yingzhen Qu" |
2017-01-18
|
12 | Acee Lindem | Uploaded new revision |
2016-11-13
|
11 | Acee Lindem | New version available: draft-ietf-rtgwg-yang-key-chain-11.txt |
2016-11-13
|
11 | (System) | New version approved |
2016-11-13
|
11 | (System) | Request for posting confirmation emailed to previous authors: "Derek Yeung" , rtgwg-chairs@ietf.org, "I. Chen" , "Yi Yang" , "Acee Lindem" , "Zhaohui Zhang" , … Request for posting confirmation emailed to previous authors: "Derek Yeung" , rtgwg-chairs@ietf.org, "I. Chen" , "Yi Yang" , "Acee Lindem" , "Zhaohui Zhang" , "Yingzhen Qu" |
2016-11-13
|
11 | Acee Lindem | Uploaded new revision |
2016-11-08
|
10 | Jeff Tantsura | Added to session: IETF-97: rtgwg Tue-0930 |
2016-10-27
|
10 | Acee Lindem | New version available: draft-ietf-rtgwg-yang-key-chain-10.txt |
2016-10-27
|
10 | (System) | New version approved |
2016-10-27
|
10 | (System) | Request for posting confirmation emailed to previous authors: "Derek Yeung" , rtgwg-chairs@ietf.org, "I. Chen" , "Acee Lindem" , "Zhaohui Zhang" , "Yi Yang" , … Request for posting confirmation emailed to previous authors: "Derek Yeung" , rtgwg-chairs@ietf.org, "I. Chen" , "Acee Lindem" , "Zhaohui Zhang" , "Yi Yang" , "Yingzhen Qu" |
2016-10-27
|
10 | Acee Lindem | Uploaded new revision |
2016-10-04
|
09 | Jeff Tantsura | Tag Doc Shepherd Follow-up Underway set. |
2016-10-04
|
09 | Jeff Tantsura | IETF WG state changed to WG Consensus: Waiting for Write-Up from In WG Last Call |
2016-09-19
|
09 | Acee Lindem | New version approved |
2016-09-19
|
09 | Acee Lindem | New version available: draft-ietf-rtgwg-yang-key-chain-09.txt |
2016-09-19
|
09 | Acee Lindem | Request for posting confirmation emailed to previous authors: "Zhaohui (Jeffrey) Zhang" , "Derek M. Yeung" , rtgwg-chairs@ietf.org, "I. Chen" , "Acee Lindem" , "Yi … Request for posting confirmation emailed to previous authors: "Zhaohui (Jeffrey) Zhang" , "Derek M. Yeung" , rtgwg-chairs@ietf.org, "I. Chen" , "Acee Lindem" , "Yi Yang" , "Yingzhen Qu" |
2016-09-19
|
09 | (System) | Uploaded new revision |
2016-09-12
|
08 | Jeff Tantsura | IETF WG state changed to In WG Last Call from WG Document |
2016-09-09
|
08 | Jeff Tantsura | Notification list changed to "Jeff Tantsura" <jefftant.ietf@gmail.com> |
2016-09-09
|
08 | Jeff Tantsura | Document shepherd changed to Jeff Tantsura |
2016-09-01
|
08 | Jonathan Hardwick | Request for Early review by RTGDIR Completed: Has Nits. Reviewer: Ines Robles. |
2016-08-30
|
08 | Jeff Tantsura | Changed consensus to Yes from Unknown |
2016-08-30
|
08 | Jeff Tantsura | Intended Status changed to Proposed Standard from None |
2016-08-30
|
08 | Acee Lindem | New version available: draft-ietf-rtgwg-yang-key-chain-08.txt |
2016-08-17
|
07 | Acee Lindem | New version available: draft-ietf-rtgwg-yang-key-chain-07.txt |
2016-08-15
|
06 | Jonathan Hardwick | Closed request for Early review by RTGDIR with state 'No Response' |
2016-08-15
|
06 | Jonathan Hardwick | Request for Early review by RTGDIR is assigned to Ines Robles |
2016-08-15
|
06 | Jonathan Hardwick | Request for Early review by RTGDIR is assigned to Ines Robles |
2016-07-27
|
06 | Jonathan Hardwick | Request for Early review by RTGDIR is assigned to Papadimitriou Dimitri |
2016-07-27
|
06 | Jonathan Hardwick | Request for Early review by RTGDIR is assigned to Papadimitriou Dimitri |
2016-06-28
|
06 | Acee Lindem | New version available: draft-ietf-rtgwg-yang-key-chain-06.txt |
2016-06-28
|
05 | Acee Lindem | New version available: draft-ietf-rtgwg-yang-key-chain-05.txt |
2016-06-28
|
04 | Acee Lindem | New version available: draft-ietf-rtgwg-yang-key-chain-04.txt |
2016-06-27
|
03 | Acee Lindem | New version available: draft-ietf-rtgwg-yang-key-chain-03.txt |
2016-03-15
|
02 | Acee Lindem | New version available: draft-ietf-rtgwg-yang-key-chain-02.txt |
2016-02-12
|
01 | Acee Lindem | New version available: draft-ietf-rtgwg-yang-key-chain-01.txt |
2015-12-01
|
00 | Jeff Tantsura | This document now replaces draft-acee-rtg-yang-key-chain instead of None |
2015-12-01
|
00 | Acee Lindem | New version available: draft-ietf-rtgwg-yang-key-chain-00.txt |