Re: [Ace] Genart telechat review of draft-ietf-ace-cbor-web-token-12

Jim Schaad <ietf@augustcellars.com> Tue, 27 February 2018 23:05 UTC

Return-Path: <ietf@augustcellars.com>
X-Original-To: ace@ietfa.amsl.com
Delivered-To: ace@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 79A3112E8CD; Tue, 27 Feb 2018 15:05:17 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.909
X-Spam-Level:
X-Spam-Status: No, score=-1.909 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0jrH2QGXYbII; Tue, 27 Feb 2018 15:05:14 -0800 (PST)
Received: from mail2.augustcellars.com (augustcellars.com [50.45.239.150]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0C50D12E89E; Tue, 27 Feb 2018 15:05:14 -0800 (PST)
Received: from Jude (73.180.8.170) by mail2.augustcellars.com (192.168.0.56) with Microsoft SMTP Server (TLS) id 15.0.1347.2; Tue, 27 Feb 2018 15:03:18 -0800
From: Jim Schaad <ietf@augustcellars.com>
To: 'Dan Romascanu' <dromasca@gmail.com>
CC: 'Benjamin Kaduk' <kaduk@mit.edu>, 'gen-art' <gen-art@ietf.org>, draft-ietf-ace-cbor-web-token.all@ietf.org, 'ietf' <ietf@ietf.org>, ace@ietf.org
References: <151967178760.21771.14005895812023525211@ietfa.amsl.com> <021201d3af3e$1f204cc0$5d60e640$@augustcellars.com> <CAFgnS4USoaMrDSbvOZj4Pwg3DprMNNxrHoPn+DK-YjVNB-Jrog@mail.gmail.com> <20180227034009.GT50954@kduck.kaduk.org> <CAFgnS4VJDs0Xm2zFG5jXQ3eTC0umNvLxBmkLzQKzbPARZq1RVA@mail.gmail.com> <028701d3aff3$df7ef6f0$9e7ce4d0$@augustcellars.com> <CAFgnS4WrfRHPiMqETyOK=2g-bNKp66i-9NC9JLbbO6eh7brV6w@mail.gmail.com>
In-Reply-To: <CAFgnS4WrfRHPiMqETyOK=2g-bNKp66i-9NC9JLbbO6eh7brV6w@mail.gmail.com>
Date: Tue, 27 Feb 2018 15:05:00 -0800
Message-ID: <02c001d3b01f$67349390$359dbab0$@augustcellars.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_02C1_01D3AFDC.5912B320"
X-Mailer: Microsoft Outlook 16.0
Content-Language: en-us
Thread-Index: AQFwM0g/CEx2cEygtLHnG1KjSGnjDwJPOi8kAfvAzWwBSk2I/AHosYLBAeXFl70CQ4Q+zaQinKsw
X-Originating-IP: [73.180.8.170]
Archived-At: <https://mailarchive.ietf.org/arch/msg/ace/vGCv4R6N8VtwncEct21i4GQ61kk>
Subject: Re: [Ace] Genart telechat review of draft-ietf-ace-cbor-web-token-12
X-BeenThere: ace@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Authentication and Authorization for Constrained Environments \(ace\)" <ace.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ace>, <mailto:ace-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ace/>
List-Post: <mailto:ace@ietf.org>
List-Help: <mailto:ace-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ace>, <mailto:ace-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 27 Feb 2018 23:05:17 -0000

 

 

From: Dan Romascanu [mailto:dromasca@gmail.com] 
Sent: Tuesday, February 27, 2018 2:23 PM
To: Jim Schaad <ietf@augustcellars.com>
Cc: Benjamin Kaduk <kaduk@mit.edu>; gen-art <gen-art@ietf.org>; draft-ietf-ace-cbor-web-token.all@ietf.org; ietf <ietf@ietf.org>; ace@ietf.org
Subject: Re: [Ace] Genart telechat review of draft-ietf-ace-cbor-web-token-12

 

Hi Jim,

There are still a few problems: 

1. The policies and mapping to the values ranges are hidden in the Claim Key field in the template (the comment also made by Kathleen)

[JLS] True, but not an issue as far as I am concerned.  I am totally neutral about moving this up a level (I don’t really like duplication).

2. At least one incorrect policy name is used: Standards Track Required - do you mean Standards Action (?)

[JLS] Yes, I missed that although I assume IANA would have complained about it.

3. You describe a process that involves a mail list (cwt-reg-review@ietf.org <mailto:cwt-reg-review@ietf.org> ) and Experts Review. This description is not clear. Usually IANA approaches one DE for advice and expects the advice from the same DE in a reasonable period of time. If I understand correctly the process described in Section 9.1 one or more DEs make a recommendation and run it with the mail list. Who establishes the consensus on the mail list? Assuming the mail list disagrees with the DE recommendation, who decides?

[JLS] The process is not one that I would have described, but is the one that Mike has used for the documents that he has written.  The time period was a response to the time out issues that the IESG was trying to address at the time.  I have always assumed that the email list was intended to function in the same way as the announce list for media types would be done.  In practice IANA has sent requests to the list for JOSE with a request for review and a request about how the review is to be handled by the set of DEs on the list.   My assumption is the set of DEs would define how the consensus is reached and it might change both over time and as the set of DEs changes.

Jim

Regards,

Dan

 

On Tue, Feb 27, 2018 at 7:53 PM, Jim Schaad <ietf@augustcellars.com <mailto:ietf@augustcellars.com> > wrote:

Integer values between -256 and 255 and strings of length 1 are designated as Standards Track Required.

 

Integer values from -65536 to 65535 and strings of length 2 are designated as Specification Required.

 

Integer values of greater than 65535 and strings of length greater than 2 are designated as Expert Review.  

 

Integer values less than -65536 are marked as Private Use.

 

So that says what IANA policy is to be used for each of the different items.  This defines the policies and the ranges for those policies.

 

There is not anything that is making a distinction on what the criteria to be used by the DE in the document which is separate, but I don’t think that is needed.  This is why they are DEs.

 

I still don’t see what you think is missing.

 

Jim

 

 

From: Dan Romascanu [mailto:dromasca@gmail.com <mailto:dromasca@gmail.com> ] 
Sent: Tuesday, February 27, 2018 2:00 AM
To: Benjamin Kaduk <kaduk@mit.edu <mailto:kaduk@mit.edu> >
Cc: Jim Schaad <ietf@augustcellars.com <mailto:ietf@augustcellars.com> >; gen-art <gen-art@ietf.org <mailto:gen-art@ietf.org> >; draft-ietf-ace-cbor-web-token.all@ietf.org <mailto:draft-ietf-ace-cbor-web-token.all@ietf.org> ; ietf <ietf@ietf.org <mailto:ietf@ietf.org> >; ace@ietf.org <mailto:ace@ietf.org> 
Subject: Re: [Ace] Genart telechat review of draft-ietf-ace-cbor-web-token-12

 

Hi,

See also my other notes. 

I believe that what the document tries to say is: 

Register R is divided into four different ranges R1, R2, R3, R4 (defining the value limits may be useful)

Values in range R1 are allocated according to policy P1 in the case that ...
Values in range R2 are allocated according to policy P2 in the case that ...
Values in range R3 are allocated according to policy P3 in the case that ...
Values in range R4 are allocated according to policy P4 in the case that ...

But it doesn't say it. Mentioning four concurrent policies for the same registry without separation of values range, and without providing clear instructions when each policy is recommended to be used, seems confusing to me, and may be confusing for users of this document in the future. 

Regards,

Dan

 

On Tue, Feb 27, 2018 at 5:40 AM, Benjamin Kaduk <kaduk@mit.edu <mailto:kaduk@mit.edu> > wrote:

On Mon, Feb 26, 2018 at 11:19:04PM +0200, Dan Romascanu wrote:
> Hi Jim,
>
> Thank you for your answer and for addressing my comments.
>
> On item #2:
>
>
>
> On Mon, Feb 26, 2018 at 10:12 PM, Jim Schaad <ietf@augustcellars.com <mailto:ietf@augustcellars.com> > wrote:
>
> >
> >
> > > -----Original Message-----
> > > From: Dan Romascanu [mailto:dromasca@gmail.com <mailto:dromasca@gmail.com> ]
> > >
> >
> > ...
>
> > >
> > > 2. I am a little confused by the definition of policies in Section 9.1:
> > >
> > >    Depending upon the values being requested, registration requests are
> > >    evaluated on a Standards Track Required, Specification Required,
> > >    Expert Review, or Private Use basis [RFC8126] after a three-week
> > >    review period on the cwt-reg-review@ietf.org <mailto:cwt-reg-review@ietf.org>  mailing list, on the
> > >    advice of one or more Designated Experts.
> > >
> > > How does this work? The request is forwarded to the designated expert,
> > > he/she make a recommendation concerning the policy on the mail list, and
> > > depending on the feedback received a policy is selected? Who establishes
> > > consensus?
> > >
> > > Frankly, I wonder if this can work at all. Are there other examples of
> > four
> > > different policies for the same registry, applied on a case-to-case
> > basis?
> >
> > This is the same approach that is being used for the COSE registries.  As
> > an example, you can look at https://www.iana.org/
> > assignments/cose/cose.xhtml#algorithms.
> >
> > Part of the issue about this is that the JOSE/JWT registries do have the
> > same different policies, but that differences are hidden from the IANA
> > registry.  Since they allow for a URI to be used as the identifier of a
> > field, only the plain text versions are registered.  Thus I can use "
> > http://augustcellars.com/JWT/My_Tag" as an identifier.  Since for CBOR
> > the set of tag values is closed and does not have this escape (nor would
> > one want the length of the tag) it is necessary to have this break down of
> > tag fields.
> >
> >
> >
> >
> This does not seem to be exactly the same approach. The COSE RFC 8152
> defines the registry policy in a different manner. There is only one policy
> that is proposed 'Expert Review' and than the Expert Review Instructions
> are used to define the cases when a Standards Track specification is
> required. No such text exists in the current I-D. There is no separation of
> the values space in the registry according to the type of assignment here,
> as  in RFC 8152.

The template in section 9.1.1 has the different policies for the
different integer ranges, under the 'Claim Key' section.  Kathleen
(IIRC) already noted that this should probably be repeated in the
introductory part of section 9.1 as well, and that will be done
before the document is sent to the IESG.

-Benjamin