Skip to main content

Last Call Review of draft-ietf-ipsecme-mib-iptfs-05
review-ietf-ipsecme-mib-iptfs-05-secdir-lc-petrov-2022-10-13-00

Request Review of draft-ietf-ipsecme-mib-iptfs
Requested revision No specific revision (document currently at 11)
Type Last Call Review
Team Security Area Directorate (secdir)
Deadline 2022-10-04
Requested 2022-09-20
Authors Don Fedyk , Eric Kinzie
I-D last updated 2022-10-13
Completed reviews Tsvart Last Call review of -04 by Brian Trammell (diff)
Genart Last Call review of -04 by Joel M. Halpern (diff)
Secdir Last Call review of -05 by Ivaylo Petrov (diff)
Dnsdir Telechat review of -05 by Ralf Weber (diff)
Assignment Reviewer Ivaylo Petrov
State Completed
Request Last Call review on draft-ietf-ipsecme-mib-iptfs by Security Area Directorate Assigned
Posted at https://mailarchive.ietf.org/arch/msg/secdir/UeiaBWoeDeyu-we1YdD2sceSne4
Reviewed revision 05 (document currently at 11)
Result Has nits
Completed 2022-10-12
review-ietf-ipsecme-mib-iptfs-05-secdir-lc-petrov-2022-10-13-00
Reviewer: Ivaylo Petrov
Review result: Has Nits

Hi,

I have reviewed this document as part of the security directorate's
ongoing effort to review all IETF documents being processed by the
IESG. These comments were written primarily for the benefit of the
security area directors.  Document editors and WG chairs should treat
these comments just like any other last call comments.

When seeing SHOULD, RECOMMEND or MAY in the security considerations, I
would always like to see some information about what are possible
issues if I don't follow the recommendations or what do I gain by
implementing them. My reading of the security considerations section
left me wanting more such details specifically in the following
paragrams:

   Implementations SHOULD provide the security features described by the
   SNMPv3 framework (see [RFC3410]), and implementations claiming
   compliance to the SNMPv3 standard MUST include full support for
   authentication and privacy via the User-based Security Model (USM)
   [RFC3414] with the AES cipher algorithm [RFC3826].  Implementations
   MAY also provide support for the Transport Security Model (TSM)
   [RFC5591] in combination with a secure transport such as SSH
   [RFC5592] or TLS/DTLS [RFC6353].

   Further, deployment of SNMP versions prior to SNMPv3 is NOT
   RECOMMENDED.  Instead, it is RECOMMENDED to deploy SNMPv3 and to
   enable cryptographic security.  It is then a customer/operator
   responsibility to ensure that the SNMP entity giving access to an
   instance of this MIB module is properly configured to give access to
   the objects only to those principals (users) that have legitimate
   rights to indeed GET or SET (change/create/delete) them.

Regards,
Ivaylo