rfc9834v1.txt   rfc9834.txt 
skipping to change at line 3943 skipping to change at line 3943
to identify the AC."; to identify the AC.";
} }
uses ac; uses ac;
} }
} }
} }
<CODE ENDS> <CODE ENDS>
7. Security Considerations 7. Security Considerations
This section is modeled after the template described in Section 3.7 Several data nodes ('bgp', 'ospf', 'isis', 'rip', and 'customer-key-
of [YANG-GUIDELINES]. chain') rely upon [RFC8177] for authentication purposes. As such,
the AC service module inherits the security considerations discussed
in Section 5 of [RFC8177]. Also, these data nodes support supplying
explicit keys as strings in ASCII format. The use of keys in
hexadecimal string format would afford greater key entropy with the
same number of key-string octets. However, such a format is not
included in this version of the AC service model because it is not
supported by the underlying device modules (e.g., [RFC8695]).
Section 5.2.5.5 specifies a set of encryption-related parameters that
can be applied to traffic for a given AC.
The remainder of this section is modeled after the template described
in Section 3.7.1 of [YANG-GUIDELINES].
The "ietf-bearer-svc" and "ietf-ac-svc" YANG modules define data The "ietf-bearer-svc" and "ietf-ac-svc" YANG modules define data
models that are designed to be accessed via YANG-based management models that are designed to be accessed via YANG-based management
protocols, such as NETCONF [RFC6241] and RESTCONF [RFC8040]. These protocols, such as NETCONF [RFC6241] and RESTCONF [RFC8040]. These
protocols have to use a secure transport layer (e.g., SSH [RFC4252], protocols have to use a secure transport layer (e.g., SSH [RFC4252],
TLS [RFC8446], and QUIC [RFC9000]) and have to use mutual TLS [RFC8446], and QUIC [RFC9000]) and have to use mutual
authentication. authentication.
Servers MUST verify that requesting clients are entitled to access Servers MUST verify that requesting clients are entitled to access
and manipulate a given bearer or AC. For example, a given customer and manipulate a given bearer or AC. For example, a given customer
skipping to change at line 4032 skipping to change at line 4045
'customer-name', 'l2-connection', and 'ip-connection': An attacker 'customer-name', 'l2-connection', and 'ip-connection': An attacker
can retrieve privacy-related information, which can be used to can retrieve privacy-related information, which can be used to
track a customer. Disclosing such information may be considered a track a customer. Disclosing such information may be considered a
violation of the customer-provider trust relationship. violation of the customer-provider trust relationship.
'keying-material': An attacker can retrieve the cryptographic keys 'keying-material': An attacker can retrieve the cryptographic keys
protecting the underlying connectivity services (routing, in protecting the underlying connectivity services (routing, in
particular). These keys could be used to inject spoofed routing particular). These keys could be used to inject spoofed routing
advertisements. advertisements.
Several data nodes ('bgp', 'ospf', 'isis', 'rip', and 'customer-key- There are no particularly sensitive RPC or action operations.
chain') rely upon [RFC8177] for authentication purposes. As such,
the AC service module inherits the security considerations discussed
in Section 5 of [RFC8177]. Also, these data nodes support supplying
explicit keys as strings in ASCII format. The use of keys in
hexadecimal string format would afford greater key entropy with the
same number of key-string octets. However, such a format is not
included in this version of the AC service model because it is not
supported by the underlying device modules (e.g., [RFC8695]).
Section 5.2.5.5 specifies a set of encryption-related parameters that
can be applied to traffic for a given AC.
8. IANA Considerations 8. IANA Considerations
IANA has registered the following URIs in the "ns" subregistry within IANA has registered the following URIs in the "ns" subregistry within
the "IETF XML Registry" [RFC3688]: the "IETF XML Registry" [RFC3688]:
URI: urn:ietf:params:xml:ns:yang:ietf-bearer-svc URI: urn:ietf:params:xml:ns:yang:ietf-bearer-svc
Registrant Contact: The IESG. Registrant Contact: The IESG.
XML: N/A; the requested URI is an XML namespace. XML: N/A; the requested URI is an XML namespace.
skipping to change at line 4498 skipping to change at line 4500
} }
}, },
"bearer-reference": "line-156" "bearer-reference": "line-156"
} }
} }
] ]
} }
} }
Figure 27: Example of a Message Body of a Response to Assign a Figure 27: Example of a Message Body of a Response to Assign a
Customer VLAN (CVLAN) ID Customer VLAN (C-VLAN) ID
A.3. Create an AC for a Known Peer SAP A.3. Create an AC for a Known Peer SAP
An example of a request to create a simple AC, when the peer SAP is An example of a request to create a simple AC, when the peer SAP is
known, is shown in Figure 28. In this example, the peer SAP known, is shown in Figure 28. In this example, the peer SAP
identifier points to an identifier of an SF. The (topological) identifier points to an identifier of an SF. The (topological)
location of that SF is assumed to be known to the network controller. location of that SF is assumed to be known to the network controller.
For example, this can be determined as part of an on-demand procedure For example, this can be determined as part of an on-demand procedure
to instantiate an SF in a cloud. That instantiated SF can be granted to instantiate an SF in a cloud. That instantiated SF can be granted
a connectivity service via the provider network. a connectivity service via the provider network.
 End of changes. 3 change blocks. 
15 lines changed or deleted 17 lines changed or added

This html diff was produced by rfcdiff 1.48.