Re: [Anima] I-D Action: draft-ietf-anima-bootstrapping-keyinfra-08.txt

Brian E Carpenter <brian.e.carpenter@gmail.com> Fri, 13 October 2017 19:07 UTC

Return-Path: <brian.e.carpenter@gmail.com>
X-Original-To: anima@ietfa.amsl.com
Delivered-To: anima@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 62B0B134216 for <anima@ietfa.amsl.com>; Fri, 13 Oct 2017 12:07:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fxsg5hd7YkJP for <anima@ietfa.amsl.com>; Fri, 13 Oct 2017 12:07:21 -0700 (PDT)
Received: from mail-pg0-x22f.google.com (mail-pg0-x22f.google.com [IPv6:2607:f8b0:400e:c05::22f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 586FA134285 for <anima@ietf.org>; Fri, 13 Oct 2017 12:07:21 -0700 (PDT)
Received: by mail-pg0-x22f.google.com with SMTP id g6so473337pgn.6 for <anima@ietf.org>; Fri, 13 Oct 2017 12:07:21 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=subject:to:references:from:organization:message-id:date:user-agent :mime-version:in-reply-to:content-language:content-transfer-encoding; bh=2X/X6c/rUWNTMyPgIZRLfmu6iuyDP8AdPPdoVXvjnhw=; b=oZb9N2aIlmIkBKdSBUr8zdh0j/XX+mXwIUcohMqrdReefuDdcMBMsE7dL2gHtp/LRD JMKJs3DDsUxsQ5MArOhGh3x4aGJPNoShRpmuSAjzUYQ9iFGKRVaE33T01upNulhnLSYQ Cwfniu4tm7CPeznqe5Yd5LSYr/oNRL6AElSow3ZdPUdV+494C8Ah9MPTyOnL4mLYQ/0n 5ucGO7rFM8kRnSKi/cUOuVzQGtb2ah2ikVrMLUDREgYKtwZjXNn7meVj2R+vVH89sKQq cPHrxGJ+qkzedpN8NhhuuInxeLmbdzYab0DBmEw7sX17KJUvqFkenBHu/ZcP3DTkgl86 1OTA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:references:from:organization :message-id:date:user-agent:mime-version:in-reply-to :content-language:content-transfer-encoding; bh=2X/X6c/rUWNTMyPgIZRLfmu6iuyDP8AdPPdoVXvjnhw=; b=pC8g66yP695giWlwFi5BdBcA+DVUAHspl8tw/eH+DEcToEsm2P8852PE40XDoPUA05 FeQ8H2gkbL3uAymbheGhlDBL98fK6dqbaRvjMJyPROiA5dA2KOytwGXO2kpy32aeUMTb TOiqJUBeDHvYPB9AfPL582d0vSKBTnENhwq7u949S0nvdEU+eQPVU6LlSAtCxVWFdu// 9AigOPQG5KQSczQj4aK6X2DPNRrEkGph0nCmTwOtMB4xcLttQzzowCx2DXqnpYkVHCDG 1OqnxM3N/CHqUsxPAYdwuVbyLQgusEwtHUdHLzLL9fptspQsWUOaXhxTGMSVNGZdgQW+ vLBw==
X-Gm-Message-State: AMCzsaUzTavSYt55oaOqfgRKKmJpqjZFJjY+/6AMs7f01SzHBqAHj/CT 6PjwV/BrWrbe8ptqlEoBTTPudA==
X-Google-Smtp-Source: AOwi7QDK57AtSfAIa6CMi+d4Q4qAIxfSyojuO6qYtLYZWZHt6cnmwpbCm0xjr8gQdAkKgvKyREYm0A==
X-Received: by 10.159.234.68 with SMTP id c4mr2217757plr.52.1507921640359; Fri, 13 Oct 2017 12:07:20 -0700 (PDT)
Received: from ?IPv6:2406:e007:6d3c:1:28cc:dc4c:9703:6781? ([2406:e007:6d3c:1:28cc:dc4c:9703:6781]) by smtp.gmail.com with ESMTPSA id c73sm4760470pfd.139.2017.10.13.12.07.18 for <anima@ietf.org> (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Fri, 13 Oct 2017 12:07:19 -0700 (PDT)
To: anima@ietf.org
References: <150791598017.23771.18187732712497738112@ietfa.amsl.com>
From: Brian E Carpenter <brian.e.carpenter@gmail.com>
Organization: University of Auckland
Message-ID: <649b10ad-6a42-2622-a9b7-21ff53bda9af@gmail.com>
Date: Sat, 14 Oct 2017 08:07:28 +1300
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.3.0
MIME-Version: 1.0
In-Reply-To: <150791598017.23771.18187732712497738112@ietfa.amsl.com>
Content-Type: text/plain; charset="utf-8"
Content-Language: en-US
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/anima/Q1hydXf1STWh4B__x4DsX9knsxQ>
Subject: Re: [Anima] I-D Action: draft-ietf-anima-bootstrapping-keyinfra-08.txt
X-BeenThere: anima@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Autonomic Networking Integrated Model and Approach <anima.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/anima>, <mailto:anima-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/anima/>
List-Post: <mailto:anima@ietf.org>
List-Help: <mailto:anima-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/anima>, <mailto:anima-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 13 Oct 2017 19:07:23 -0000

Hi,

I will review this carefully soon, but I already noticed one nit.
The IANA Considerations needs to include registration of the two
GRASP objectives. There's a model for that at
https://tools.ietf.org/html/draft-ietf-anima-prefix-management-05#section-8
and the registry even exists:
https://www.iana.org/assignments/grasp-parameters/grasp-parameters.xhtml#objective-names

Regards
   Brian

On 14/10/2017 06:33, internet-drafts@ietf.org wrote:
> 
> A New Internet-Draft is available from the on-line Internet-Drafts directories.
> This draft is a work item of the Autonomic Networking Integrated Model and Approach WG of the IETF.
> 
>         Title           : Bootstrapping Remote Secure Key Infrastructures (BRSKI)
>         Authors         : Max Pritikin
>                           Michael C. Richardson
>                           Michael H. Behringer
>                           Steinthor Bjarnason
>                           Kent Watsen
> 	Filename        : draft-ietf-anima-bootstrapping-keyinfra-08.txt
> 	Pages           : 59
> 	Date            : 2017-10-13
> 
> Abstract:
>    This document specifies automated bootstrapping of a remote secure
>    key infrastructure (BRSKI) using vendor installed X.509 certificate,
>    in combination with a vendor's authorizing service, both online and
>    offline.  Bootstrapping a new device can occur using a routable
>    address and a cloud service, or using only link-local connectivity,
>    or on limited/disconnected networks.  Support for lower security
>    models, including devices with minimal identity, is described for
>    legacy reasons but not encouraged.  Bootstrapping is complete when
>    the cryptographic identity of the new key infrastructure is
>    successfully deployed to the device but the established secure
>    connection can be used to deploy a locally issued certificate to the
>    device as well.
> 
> 
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-anima-bootstrapping-keyinfra/
> 
> There are also htmlized versions available at:
> https://tools.ietf.org/html/draft-ietf-anima-bootstrapping-keyinfra-08
> https://datatracker.ietf.org/doc/html/draft-ietf-anima-bootstrapping-keyinfra-08
> 
> A diff from the previous version is available at:
> https://www.ietf.org/rfcdiff?url2=draft-ietf-anima-bootstrapping-keyinfra-08
> 
> 
> Please note that it may take a couple of minutes from the time of submission
> until the htmlized version and diff are available at tools.ietf.org.
> 
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
> 
> _______________________________________________
> I-D-Announce mailing list
> I-D-Announce@ietf.org
> https://www.ietf.org/mailman/listinfo/i-d-announce
> Internet-Draft directories: http://www.ietf.org/shadow.html
> or ftp://ftp.ietf.org/ietf/1shadow-sites.txt
>