[Anima] Secdir early review of draft-ietf-anima-constrained-voucher-23

Kathleen Moriarty via Datatracker <noreply@ietf.org> Thu, 18 January 2024 18:23 UTC

Return-Path: <noreply@ietf.org>
X-Original-To: anima@ietf.org
Delivered-To: anima@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 1584EC14F71F; Thu, 18 Jan 2024 10:23:27 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: Kathleen Moriarty via Datatracker <noreply@ietf.org>
To: secdir@ietf.org
Cc: anima@ietf.org, draft-ietf-anima-constrained-voucher.all@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 12.3.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <170560220706.54904.302129301326194526@ietfa.amsl.com>
Reply-To: Kathleen Moriarty <Kathleen.Moriarty.ietf@gmail.com>
Date: Thu, 18 Jan 2024 10:23:27 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/anima/HEWa-k0gH0A_IyinC2F_1nbCYI8>
Subject: [Anima] Secdir early review of draft-ietf-anima-constrained-voucher-23
X-BeenThere: anima@ietf.org
X-Mailman-Version: 2.1.39
List-Id: Autonomic Networking Integrated Model and Approach <anima.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/anima>, <mailto:anima-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/anima/>
List-Post: <mailto:anima@ietf.org>
List-Help: <mailto:anima-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/anima>, <mailto:anima-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 18 Jan 2024 18:23:27 -0000

Reviewer: Kathleen Moriarty
Review result: Ready

The updates contained in draft-ietf-anima-constrained-voucher are important for
both security and to align with other protocols updates and trends (e.g. SNI in
TLS). The security considerations in section 15 are well detailed covering
identity, root of trust and allowances for looser restrictions are justified
for a self-signed certificate, UDP/DTLS, use of a localized protocol to limit
the scope of response to the immediate network, and justification for a
constrained protocol (CoAP) for communication is well considered.

The work builds on several other protocols and represents some important and
well considered updates.

Best regards,
Kathleen