Re: [Ace] Roman Danyliw's No Objection on draft-ietf-ace-cmpv2-coap-transport-09: (with COMMENT)

Mohit Sahni <msahni@paloaltonetworks.com> Mon, 08 May 2023 21:03 UTC

Return-Path: <prvs=149202be89=msahni@paloaltonetworks.com>
X-Original-To: ace@ietfa.amsl.com
Delivered-To: ace@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E04D5C14CF1E for <ace@ietfa.amsl.com>; Mon, 8 May 2023 14:03:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.794
X-Spam-Level:
X-Spam-Status: No, score=-2.794 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=paloaltonetworks.com header.b="Mjw9N3SN"; dkim=pass (2048-bit key) header.d=paloaltonetworks.com header.b="ArzZpY3F"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fHk0WcfDK_z3 for <ace@ietfa.amsl.com>; Mon, 8 May 2023 14:03:29 -0700 (PDT)
Received: from mx0b-00169c01.pphosted.com (mx0b-00169c01.pphosted.com [67.231.156.123]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C164DC151552 for <ace@ietf.org>; Mon, 8 May 2023 14:03:29 -0700 (PDT)
Received: from pps.filterd (m0048189.ppops.net [127.0.0.1]) by mx0b-00169c01.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 348KNNDk020463 for <ace@ietf.org>; Mon, 8 May 2023 13:44:04 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=paloaltonetworks.com; h=mime-version : references : in-reply-to : from : date : message-id : subject : to : cc : content-type; s=PPS12012017; bh=YHGnXSVZQhzGrTW5slSn64GFjabmhICEwGkIEAidkfg=; b=Mjw9N3SN/gw2S9YM2ROYiBaJt3Phdpty3F7q5wS1Znl8TcNyCYSwrOusa1KpGXJXMeK6 HPFl8iQyBL8XQjk4PDn1C+wyMDeRcJjEdBiuc+BEp0O4SaLUxm7pT4an5FYPkoKtoYSY YWuB3oXruB5LbHn33h3+r56IiyDFRau6fZcGFnM6sR5vGQi0y/loO5yAF6SbcCTKXlGb tbAmFITD2q6y/i0YjLrbiOZaxENRGaQ3cMH64x7dM0I113Xb4HkXYuRMHxl64TtwFbMu jvHmX2u8wDsEkzAYekFp5cOhNg5QyCh5qf2D8Xf7kGJpoz82059n66rH1PWm3J2m/Pru Ww==
Received: from mail-yb1-f200.google.com (mail-yb1-f200.google.com [209.85.219.200]) by mx0b-00169c01.pphosted.com (PPS) with ESMTPS id 3qf79cg4uy-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NOT) for <ace@ietf.org>; Mon, 08 May 2023 13:44:03 -0700
Received: by mail-yb1-f200.google.com with SMTP id 3f1490d57ef6-b9a792ff423so10199612276.1 for <ace@ietf.org>; Mon, 08 May 2023 13:44:03 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=paloaltonetworks.com; s=google.paloaltonetworks.com; t=1683578642; x=1686170642; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=YHGnXSVZQhzGrTW5slSn64GFjabmhICEwGkIEAidkfg=; b=ArzZpY3Fr7yMK4b29SSJlUAN/teHKVYnIHA+tId2b77QLv5FqTUDCAczAMkQbh9iqQ 3TMIGSRK49v8+4IMwIbdgpUOzBhQH81OUrU5tdQdrEJg8LkzxPOP4w9yE3djXQL8rJLQ IUQb2flAFlIcigVcMLmrnXq+yACz0BR2oEkjcpMXJhhonb3QTfx080W1+wHuXQGRN55B 291MsBncRle9RsuvDiLZxg890QjUU7WeW3+h7u+wFBOfpK39K1lTb2Ubk59KrZhIzPxt vGoDPf2WIFDnIcf97MR9zyXYvTiNAiEXyZwrdpPsJurpPYt9E2PZPVsKcleUJThjlG7L 0rWA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1683578642; x=1686170642; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=YHGnXSVZQhzGrTW5slSn64GFjabmhICEwGkIEAidkfg=; b=WY8CV1SkdDJACo6/dEHwV0ZJBg2ii6dt/pBxJ30SQpAwZxdNv8q1miMRWasSyDrf33 Pb88wfM3KUciB/+wzq0ntfjZ6EV9BV1buO+q89TCxtUY1a6vm3ji08Ts3xPyL7n4jSfb 8onzd7C9Y+kroUxYOuBEW7r0zgEgeAMrklqDje66ezHb919U/WC/ADEbtpPw8t6MqAaA Qxom3x1b2bpfQ5e09P4fbUxiXUkSFA1FzDSIlpJZCROKUpTVSiaJjK9yGdYfUa+s7j15 HklG8/mjU7kbuhEREGsx7FXibDPRBTUS1z1iw0b0O6umjOCR5Zm7dAP0Y48ZUvnSLbGi ZtJw==
X-Gm-Message-State: AC+VfDw8IB2sEF9NOxwnNtvxqyPPAZnmg2RaPQbOeLvUF2o/wsHTUIdI n0jYnMfkOUqhTYZFcwtk7wjrbrUg0A9Z/3lgvMXoiFcmqngBpjuJgWN0MPYH94Jrw/6SrocjxZs 1ql4CJ1ndgh1TXjaK7BT6CoMkjKdpWg==
X-Received: by 2002:a25:4087:0:b0:b9e:5006:42af with SMTP id n129-20020a254087000000b00b9e500642afmr11999919yba.58.1683578642587; Mon, 08 May 2023 13:44:02 -0700 (PDT)
X-Google-Smtp-Source: ACHHUZ5PreclFc87hIUlmZTCN+yKHvlPjb8JBPoLTPkN2yq5P5d49q1haXBk/UBEK1ADxJXJRYB4t1/xA0lyUhQEJd8=
X-Received: by 2002:a25:4087:0:b0:b9e:5006:42af with SMTP id n129-20020a254087000000b00b9e500642afmr11999897yba.58.1683578642261; Mon, 08 May 2023 13:44:02 -0700 (PDT)
MIME-Version: 1.0
References: <168235811695.48250.4123585075002915222@ietfa.amsl.com>
In-Reply-To: <168235811695.48250.4123585075002915222@ietfa.amsl.com>
From: Mohit Sahni <msahni@paloaltonetworks.com>
Date: Mon, 08 May 2023 13:43:51 -0700
Message-ID: <CAMRcsGRuw-=ht0f_ycf8ALAavOwSKXnz2WWOg9pJtKEfbJat=w@mail.gmail.com>
To: Roman Danyliw <rdd@cert.org>
Cc: The IESG <iesg@ietf.org>, draft-ietf-ace-cmpv2-coap-transport@ietf.org, ace-chairs@ietf.org, ace@ietf.org, mglt.ietf@gmail.com
Content-Type: multipart/alternative; boundary="000000000000ec7eec05fb34b2ec"
X-Proofpoint-GUID: 2tbvY0RzFUV2owQSbOcUcYhn0hR7xLJx
X-Proofpoint-ORIG-GUID: 2tbvY0RzFUV2owQSbOcUcYhn0hR7xLJx
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.254,Aquarius:18.0.942,Hydra:6.0.573,FMLib:17.11.170.22 definitions=2023-05-08_16,2023-05-05_01,2023-02-09_01
X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 mlxscore=0 lowpriorityscore=0 clxscore=1015 spamscore=0 malwarescore=0 suspectscore=0 mlxlogscore=999 priorityscore=1501 adultscore=0 phishscore=0 bulkscore=0 impostorscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2304280000 definitions=main-2305080137
Archived-At: <https://mailarchive.ietf.org/arch/msg/ace/74BwHsW9mY0-1-jHMQqt-ZlyEls>
Subject: Re: [Ace] Roman Danyliw's No Objection on draft-ietf-ace-cmpv2-coap-transport-09: (with COMMENT)
X-BeenThere: ace@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Authentication and Authorization for Constrained Environments \(ace\)" <ace.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ace>, <mailto:ace-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ace/>
List-Post: <mailto:ace@ietf.org>
List-Help: <mailto:ace-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ace>, <mailto:ace-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 08 May 2023 21:03:34 -0000

Hi Roman,
Thanks for your review and comments. Please find my response below:
>** RFC6712 chose to formally “update” RFC4210.  Would such symmetry be
appropriate in this document for RFC4210 and [I-D.ietf-lamps-cmp-updates]?
<M.S.> I will change the draft to update the RFC4210.

>  == The document seems to lack the recommended RFC 2119 boilerplate, even
if
>     it appears to use RFC 2119 keywords -- however, there's a paragraph
with
>     a matching beginning. Boilerplate error?

<M.S.> This is auto generated text from the XML format of the draft I
submitted.

>  == Unused Reference: 'RFC5280' is defined on line 432, but no explicit
>     reference was found in the text
<M.S.> I will update the draft to add the reference for CRL.

>-- Editorial.  There are extra spaces between the reference and
punctuation.
<M.S.> I will fix that.
>** Section 4.
>What is “CMP-Level metadata”?
CMP-Level Metadata is the metadata used in CMP messages for example message
type or if it's a request or a response etc.

>Should this text be added to the following text bullet:
<M.S.> I had this text initially in the draft but it was removed based on
comments from reviewers in the ACE WG.

>Section 3.7 seems to allow for these over CoAP.  Should similar guidance
be provided?
<M.S.> Section 5.1.3 of RFC 4210 gives some guidance regarding protection
of PKI messages and I assume it covers the announcement messages too.


Thanks
Mohit

On Mon, May 8, 2023 at 12:02 PM Roman Danyliw via Datatracker <
noreply@ietf.org> wrote:

> Roman Danyliw has entered the following ballot position for
> draft-ietf-ace-cmpv2-coap-transport-09: No Objection
>
> When responding, please keep the subject line intact and reply to all
> email addresses included in the To and CC lines. (Feel free to cut this
> introductory paragraph, however.)
>
>
> Please refer to
> https://urldefense.proofpoint.com/v2/url?u=https-3A__www.ietf.org_about_groups_iesg_statements_handling-2Dballot-2Dpositions_&d=DwIDaQ&c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&r=J7DgfMyeL26OZuy8d3qTy_h24Ff1NatxSKMgDUj2Kxg&m=7ijT-lNR3AYdO0EKaS1okVJbYegF7wYZCIgvimVi0WlsJfP4FTxi4siyvnKKgx_u&s=BEK6aj1f--zSVKAg-KqROTUJOMk2txpoQMCcAK7p7X4&e=
>
> for more information about how to handle DISCUSS and COMMENT positions.
>
>
> The document, along with other ballot positions, can be found here:
>
> https://urldefense.proofpoint.com/v2/url?u=https-3A__datatracker.ietf.org_doc_draft-2Dietf-2Dace-2Dcmpv2-2Dcoap-2Dtransport_&d=DwIDaQ&c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&r=J7DgfMyeL26OZuy8d3qTy_h24Ff1NatxSKMgDUj2Kxg&m=7ijT-lNR3AYdO0EKaS1okVJbYegF7wYZCIgvimVi0WlsJfP4FTxi4siyvnKKgx_u&s=5l659rbFaKFBHHA5Hodw9AjYimCv1NpmQa_mkFxun2A&e=
>
>
>
> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
>
> Thank you to Valery Smyslov for the SECDIR review.
>
> ** RFC6712 chose to formally “update” RFC4210.  Would such symmetry be
> appropriate in this document for RFC4210 and [I-D.ietf-lamps-cmp-updates]?
>
> ** Idnits returned the following actionable feedback:
>   == The document seems to lack the recommended RFC 2119 boilerplate, even
> if
>      it appears to use RFC 2119 keywords -- however, there's a paragraph
> with
>      a matching beginning. Boilerplate error?
>
>      (The document does seem to have the reference to RFC 2119 which the
>      ID-Checklist requires).
>
>   == Unused Reference: 'RFC5280' is defined on line 432, but no explicit
>      reference was found in the text
>
> ** Section 1.
>    This document specifies the use of CoAP over UDP as a transport
>    medium for the CMP version 2 [RFC4210] , CMP version 3
>    [I-D.ietf-lamps-cmp-updates] designated as CMP in this document and
>    Lightweight CMP Profile [I-D.ietf-lamps-lightweight-cmp-profile] .
>
> -- Editorial.  There are extra spaces between the reference and
> punctuation.
>
> -- What does it mean for “CMP version 3” to be “designated as CMP in this
> document”?  Are all statements which use “CMP” only referring to a
> particular
> version of CMP, specifically, [I-D.ietf-lamps-cmp-updates]?
>
> ** Section 4.
>       Since the Proxy may have access to the CMP-Level metadata and
>       control over the flow of CMP messages therefore proper role based
>       access control should be in place.
>
> What is “CMP-Level metadata”?
>
> ** Section 4.
> -- RFC6712 provides the following caution to motivate the use of TLS:
>        CMP provides inbuilt integrity protection and authentication.
>        The information communicated unencrypted in CMP messages does not
>        contain sensitive information endangering the security of the PKI
>        when intercepted.  However, it might be possible for an
>        eavesdropper to utilize the available information to gather
>        confidential technical or business critical information.
>
> Should this text be added to the following text bullet:
>       The CMP protocol does not provide confidentiality of the CMP
>       payloads.  If confidentiality is desired, CoAP over DTLS [RFC9147]
>       MAY be used to provide confidentiality for the CMP payloads,
>       although it cannot conceal that the CMP protocol is used within
>       the DTLS layer.
>
> -- RFC6712 also provides the following caution about unprotected HTTP
> Announcement messages:
>
>     4.  If no measures to authenticate and protect the HTTP responses to
>        pushed Announcement messages are in place, their information
>        regarding the Announcement's processing state may not be trusted.
>        In that case, the overall design of the PKI system must not
>        depend on the Announcements being reliably received and processed
>        by their destination.
>
> Section 3.7 seems to allow for these over CoAP.  Should similar guidance be
> provided?
>
>
>
>