Skip to main content

Early Review of draft-ietf-netconf-over-quic-04
review-ietf-netconf-over-quic-04-yangdoctors-early-schoenwaelder-2025-06-16-00

Request Review of draft-ietf-netconf-over-quic
Requested revision No specific revision (document currently at 07)
Type Early Review
Team YANG Doctors (yangdoctors)
Deadline 2025-07-02
Requested 2025-06-11
Requested by Kent Watsen
Authors Jinyou Dai , Shaohua Yu , Weiqiang Cheng , Marc Blanchet , Per Andersson
I-D last updated 2026-01-18 (Latest revision 2026-01-18)
Completed reviews Tsvart Early review of -04 by Martin Duke (diff)
Yangdoctors Early review of -04 by Jürgen Schönwälder (diff)
Opsdir Early review of -04 by Will (Shucheng) LIU (diff)
Comments
The document is about to enter WGLC.
Assignment Reviewer Jürgen Schönwälder
State Completed
Request Early review on draft-ietf-netconf-over-quic by YANG Doctors Assigned
Posted at https://mailarchive.ietf.org/arch/msg/yang-doctors/5Ez9m-dWhh55_EwQJpB2W4bFYu0
Reviewed revision 04 (document currently at 07)
Result Not ready
Completed 2025-06-16
review-ietf-netconf-over-quic-04-yangdoctors-early-schoenwaelder-2025-06-16-00
- The abstract talks about "encryption properties" and "privacy
  properties". Perhaps this should be "security properties" since
  other security aspects such as authentication and integrity are
  important as well. And eliminating TCP head-of-line blocking issues
  depends on how QUIC streams are used. I would rewrite the abstract
  as follows:

    This document specifies how to use QUIC as a secure transport for
    exchanging Network Configuration Protocol (NETCONF) messages.
    NETCONF over QUIC allows to take advantage of QUIC streams, for
    example, to eliminate some TCP head-of-line blocking issues.
    NETCONF over QUIC provides security properties similar to NETCONF
    over TLS.

  The idea is to say what it is, why one might consider it, and what
  roughly the security implications are.

- Section 3.1. says "QUIC support is indicated by selecting the ALPN
  token as listed in Section 9 in the cryptographic handshake." I was
  not sure which section 9 was referenced here. Section 9 of RFC is
  about connection migration, so I assume this is section 9 of this
  document, the IANA considerations.  Perhaps the intention was "QUIC
  support is indicated by selecting the ALNP token registered for
  NETCONF over QUIC (see Section 9) in the cryptographic handshake."

- It is unclear to me how NC sessions related to QUIC streams and this
  may have impact on the connection termination section. I think this
  deserves to be clarified early on as this impacts some of the
  following text. Right now, section 3.2.2 reads as if there is a 1:1
  relation between NETCONF sessions and QUIC connections. If so, say
  this explicitly. If not, well, perhaps the text needs more work.

- Avoid starting sentences with "[RFC6241] ..." (perhaps the RFC
  editor fixes such editorial issues).

- Avoid "above table" and instead use an explicit reference like
  "Table 1".

- "So the messages used to exchange configuration data SHOULD be
   mapped into one unidirectional stream whose stream type is 0x3
   according to the above table." This seems to be plain wrong, I
   guess you mean "notification data" and not "configuration data".  I
   also find "notification data exchanged between client and server"
   potentially misleading since it is really "notification data sent
   from the client to the server" (stress that it is directional).

- I am unsure whether section 4.3 covers all details necessary for an
  interoperable call home implementation over QUIC, in particular also
  in view of section 5 which talks about servers and clients (without
  being very clear how this relates to the NC notion of server and
  clients or the QUIC notion of server and clients.

- The YANG module is rather straight forward since the real details
  are defined generically in ietf-netconf-quic-client-server-01.txt.
  That document, however, does not seem	to be ready yet. (I will post
  comments to the list).

- Note: /* FIXME seems pyang don't support this augment */
  It is unclear what the intention and purpose of these augments is.

- Security considerations: In which sense is RFC 7589 relevant here?
  If the algorithm defined in RFC 7589 is applicable here, I would
  have expected this to be documented in the main part of the
  document.

- The document is silent about message framing. But then the security
  considerations warn about attacks via inserted delimiter sequences.
  Given that this is a new transport mapping, why not require chunked
  framing everywhere, which avoids this problem?

- Why do you refer to RFC 6242 (NC over SSH)? How does this help to
  understand the security of NC over QUIC?