[Anima] Re: Mohamed Boucadair's Discuss on draft-ietf-anima-brski-prm-18: (with DISCUSS and COMMENT)

mohamed.boucadair@orange.com Thu, 10 April 2025 05:11 UTC

Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: anima@mail2.ietf.org
Delivered-To: anima@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id C4CA019FDA6E; Wed, 9 Apr 2025 22:11:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.795
X-Spam-Level:
X-Spam-Status: No, score=-2.795 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H2=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_NONE=0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=orange.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jnSBsCFCLlLc; Wed, 9 Apr 2025 22:11:18 -0700 (PDT)
Received: from smtp-out.orange.com (smtp-out.orange.com [80.12.210.122]) (using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id D79B019FDA64; Wed, 9 Apr 2025 22:11:17 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=orange.com; i=@orange.com; q=dns/txt; s=orange002; t=1744261878; x=1775797878; h=to:cc:subject:date:message-id:references:in-reply-to: mime-version:content-transfer-encoding:from; bh=D/DupOxNIoOSj4zYqGoHgukVLkH2f3mwL/BVx7OhbNM=; b=qCv2RYQv37RRr12EvUOVr05zZVCOdtBe77nJJtoqfVB0K/BTjjh0SFvN a89hQYTDBurPRFyy01EUwmwQjdq4AIRRF1ABkNclRvaZNG7kTHqHL+j+P YIo6f6sdzXTEG4Fjk5KrOOEZJNyxjCnI3e8FgWTwS65kg1BLKrSnxAxzt iTwZMu7m6pwRPAEgdt+tdOuFabCS0ACYYrnqgA8VLEcZCnLMlFRCbTR+V j8k8C5IfMdiKaZ7AVMhZz+wlp9oH6jarqLb3sYaxwj3sYiPr/2Yfby1LB NrJCP519rdkaGw1tEDvuU2BV9bHBEFeW21y6fAop0kmpK+GWFuABZ71op A==;
X-CSE-ConnectionGUID: GfjpSdu2SZihlMq+flst6w==
X-CSE-MsgGUID: LchZB5uERP6195FmYSIljQ==
Received: from unknown (HELO opfedv1rlp0b.nor.fr.ftgroup) ([x.x.x.x]) by smtp-out.orange.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 10 Apr 2025 07:11:17 +0200
Received: from unknown (HELO opzinddimail9.si.fr.intraorange) ([x.x.x.x]) by opfedv1rlp0b.nor.fr.ftgroup with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 10 Apr 2025 07:11:16 +0200
Received: from opzinddimail9.si.fr.intraorange (unknown [127.0.0.1]) by DDEI (Postfix) with SMTP id 7A3FE2673C2; Thu, 10 Apr 2025 07:11:16 +0200 (CEST)
Received: from opzinddimail9.si.fr.intraorange (unknown [127.0.0.1]) by DDEI (Postfix) with ESMTP id 7BDF726739E; Thu, 10 Apr 2025 07:10:51 +0200 (CEST)
Received: from smtp-out365.orange.com (unknown [x.x.x.x]) by opzinddimail9.si.fr.intraorange (Postfix) with ESMTPS; Thu, 10 Apr 2025 07:10:51 +0200 (CEST)
Received: from mail-francecentralazlp17010001.outbound.protection.outlook.com (HELO PA5P264CU001.outbound.protection.outlook.com) ([40.93.76.1]) by smtp-out365.orange.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 10 Apr 2025 07:10:49 +0200
Received: from PASP264MB5786.FRAP264.PROD.OUTLOOK.COM (2603:10a6:102:49b::10) by PAZP264MB2832.FRAP264.PROD.OUTLOOK.COM (2603:10a6:102:1f7::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8632.22; Thu, 10 Apr 2025 05:10:49 +0000
Received: from PASP264MB5786.FRAP264.PROD.OUTLOOK.COM ([fe80::181:ad8:3f16:395]) by PASP264MB5786.FRAP264.PROD.OUTLOOK.COM ([fe80::181:ad8:3f16:395%3]) with mapi id 15.20.8632.024; Thu, 10 Apr 2025 05:10:49 +0000
From: mohamed.boucadair@orange.com
X-CSE-ConnectionGUID: zWfupH01RV2Lv8z4J2s3rA==
X-CSE-MsgGUID: /43LpIdcR0+3MkbpB3eJTQ==
X-TM-AS-ERS: 10.106.160.163-127.5.254.253
X-TM-AS-SMTP: 1.0 c210cC1vdXQzNjUub3JhbmdlLmNvbQ== bW9oYW1lZC5ib3VjYWRhaXJAb 3JhbmdlLmNvbQ==
X-DDEI-TLS-USAGE: Used
X-CSE-ConnectionGUID: Z/dq0Ml1QpSncwyj9Cb/Qg==
X-CSE-MsgGUID: L9uwbKSsQlWMq5YIdYZ0FQ==
Authentication-Results: smtp-out365.orange.com; dkim=none (message not signed) header.i=none
IronPort-Data: A9a23:IzsV3Kv8jwXyUTyKylc2aOKerOfnVCZZMUV32f8akzHdYApBsoF/q tZmKTuOMqyOMzGmLopzbN7loBlQ7cXdzYMxQAds+Sk1Q3kX9ZOVVN+UEBz9bniYRiHhoOOLz Cm8hv3odp1coqr0/0/1WlTZhSAhk/nOHPykU7Ks1hlZHWdMUD0mhQ9oh9k3i4tphcnRKw6Ws LsemeWHULOe82Ayaz98B56r8ks14ayu4WtA5zTSWNgQ1LPgvyhMZH4gDfHpR5fIatE8NvK3Q e/F0Ia48gvxl/v6Ior4+lpTWhRiro/6ZWBiuFIPM0SRqkEqShgJ70oOHKF0hXG7Kdm+t4sZJ N1l7fRcQOqyV0HGsLx1vxJwS0mSMUDakVPKCSDXjCCd86HJW0mrz+w2KUVvBJUj/O1oEGMf3 vZfET9YO3hvh8ruqF66YtFF2/x5cpXAAdtH4zdn0C3TCusgTdbbWaLW6NRE3TA2wMdTAfLZY MlfYj1qBPjCS0EXfAZMTs1g2r7AanrXK1W0rHqQoqo+5mXfigZ2zbPkPNPUYPSNX8xTkUver WXDl4j8Kk5FZIDCk2Lfmp6qrsuegDzxe7kJLbmH0+c3sXyf915LJiRDADNXptHi0RTiBLqzM Xc84TYjo6Y/8gqlVNjwRDWjoXOBsxgHHdFXFoUS6QyWxYLV7hqXQG8eQVZpZMYvutNzRDE22 BqAmdLsDHllqqaWSDeF7LK8rD6uN24SN2BqTSYCTA4MptLjqYAplTrOQ8ptVqmvgbXdEDfxx jmirSUiifMUl8Fj/6S24V7vgDWyr4TSRQ5z4AjLNkq58g5Rb5XjaYW1r1TWhcusN66cR1iF+ XYeks6V4esDC42XnSiEUuEVRe7xvq7daGSahkNzFZ488Tjr42SkYY1b/DB5IgFuL9oAfjjqJ kTUvGu9+aO/IlOYKqNuO6e1Uv0y9q7rCsXnB9veKeNBN80ZmBC8wAliYkuZ3mbImUcqkL0iN ZrzTSpKJSdCYUiA5GrnL9rxwYMWKjYCKXT7a6qT8vhK+b+XZXrQR60MNlCDZe0/8LmNpAzH9 84GaJPTk00HCav5fzXd9pMVIRYSN38nCJvqqstRMOmePg5hH2JnAPjUqV/AR2CHt/oO/gsr1 ijnMqO99LYZrSGWQeltQiw9AI4Dpb4l8RoG0dUEZD5EIUQLb4e197s4fJAqZ7Qh/+EL5acrE 6VfIZ7dWq0eE2mvF9EhgX/V/dQKmPOD1VPmAsZZSGViLsAIq/HhpoG7I1OzqnVm4tSf7pNv+ ub5vu8kfXbzb185VpqJAB5e51awtmIag+V8QwPDJcNLEHgAA6A7QxEdesQfeplWQT2an2Py/ 1/PXX8w+7ORy6drq4Ohrf7f8O+U/x5WQhAy85/zsezubXGyE6vK6dMobdtkihiHDjmkofX6P b0Jpxw+WdVe9Gt3X0NHO+4D5coDCxHH/te2EiwM8K33UmmW
IronPort-HdrOrdr: A9a23:K42ciqDApXB8FdflHegtsceALOsnbusQ8zAXPh9KJCC9I/bzqy nxpp8mPEfP+U4ssHFJo7C90dq7MAjhHPlOkMIs1NaZLUHbUQSTXeVfBOfZrQEIXheOj9K1tp 0QOZSWaueAamSS5PySiGXWLz9j+qjgzEnCv5a8854Zd3AOV0gW1XYaNu/0KCxLbTgDIaB8OI uX58JBqTblU28QdN6HCn4MWPWGj8HXlbr9CCR2SyIP2U2rt3eF+bT6Gx+X0lM1SDVU24ov9m DDjkjQ+rijifem0RXRvlWjoKi+2eGRhOerNvb8yvT9GQ+cyTpAo74RGYFqiQpF4d1HLmxa1e Uk7S1Qe/iboEmhBF1d6SGdpjUIlgxepkMKgGXo/kcKraHCNU4HItsEioRDfhTD7U08+Nl6za JQxmqc84FaFBXagU3Glq/1vjxR5z+JSEAZ4Joupm0aVZFbZK5arIQZ8k8QGJAcHDji4IRiFO V1FsnT6PtfbFvfNhnizyBS6c3pWm52EgaNQ0AEtMDQ2z9KnGphx09dwMAEhH8P+J80VpEB7e XZNaZjkq1IU6YtHNRALfZERdHyBn3GQBrKPm7XKVP7FLsfM3aIsJLz6KVd3pDZRHXJ9upApH 3saiIpiYdpQTORNSSn5uw7zizw
X-Talos-CUID: 9a23:GFchiG5wsXEaybCdmNssxgkYA5gAdiTk1EzWKFCpCzdCQvqsRgrF
X-Talos-MUID: 9a23:tC4TqAgU2guB/sezvOWn8cMpEJZ1/K6NM1s0laojopS1FCBBCW+ztWHi
X-IronPort-AV: E=Sophos;i="6.15,202,1739833200"; d="scan'208";a="77845202"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=JIU6t/SHr0lMQB6MKozqG9ylgG4CUB2qdOL+MSPVm5mv6OaH5ah/Y5HbURp8yX0yb6xQ3xjJWzCeMliVXUR+/7Rf/94DxrwmO18tyd6J66lhjF1rtL4ZwIRXnR5deIO6vMLJMhDbcZiNVWE++NY9EvcfUFfGcd8cvy40MpQqc8GGP7wEl7LUOm3AHHcOf5xMEDV7Oxvv8k0IppjHZMDKyh3qyMdiGlinKpSnBmyPhMkbZfdG0X+M5VzFCCKFhAwjvOQ5l1NzpHC0FF4rltpcZiSsT/1tR9VZaa0z0ezsTCM7/ZfPIb3nJKCefAHhMF86BxlmFtS5sK8pOwbqQ/ONmA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=O/KfF0Km8L+wZ99QUCo20JBgLu7UecAsApXttLPtSwY=; b=GtB6e9ceAyJhkFGNLzKbV5sd2LNNNvultkj6g3nBWiwEN/FeSmLtq1fKT7b/G7HW2PHOPdjdqKh1CPg00utaHfP01yQYkpAOWjgQrnZ7AbERGSp3a9FQwaxFempfurd7dyKxQe775egqIYOkQ5trdwV8W1Q39fdjQ+JWQsuPNjkSpHdU50haU4MRbUtA6MUWFA0w1NM1EhNJ4w/4FQmhPqkK96PutA0IyeAS7DytuKENtvfzndxixqMuc1ZMIHWlvpwB3AXGscB7styCnjGY8C+5AJEvu69TyvaqXVQ3jms/PjeGVoyT24910lxSIY3UG44aylzYPuBQ8A/dqGCdUg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=orange.com; dmarc=pass action=none header.from=orange.com; dkim=pass header.d=orange.com; arc=none
To: "Fries, Steffen" <steffen.fries@siemens.com>, The IESG <iesg@ietf.org>
Thread-Topic: Mohamed Boucadair's Discuss on draft-ietf-anima-brski-prm-18: (with DISCUSS and COMMENT)
Thread-Index: AQHbp9gg5o6EeuFypEeXZYEncA8rwbOZT1hAgACvf4CAAlY9gA==
Date: Thu, 10 Apr 2025 05:10:49 +0000
Message-ID: <PASP264MB5786023DB103D2D1CED0789D88B72@PASP264MB5786.FRAP264.PROD.OUTLOOK.COM>
References: <174395186493.249581.5702510245186761176@dt-datatracker-64c5c9b5f9-hz6qg> <DB9PR10MB6354832B631265E3B2B6A8BFF3AA2@DB9PR10MB6354.EURPRD10.PROD.OUTLOOK.COM> <MR1PPF6395AA9E669F62F704D9545C9A1C688B52@MR1PPF6395AA9E6.FRAP264.PROD.OUTLOOK.COM> <DB9PR10MB6354D719EEC1955A4CFFEA37F3B52@DB9PR10MB6354.EURPRD10.PROD.OUTLOOK.COM>
In-Reply-To: <DB9PR10MB6354D719EEC1955A4CFFEA37F3B52@DB9PR10MB6354.EURPRD10.PROD.OUTLOOK.COM>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_ActionId=4eed68b2-5667-4a9e-9ec2-64711b7250f5;MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_ContentBits=0;MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Enabled=true;MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Method=Privileged;MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Name=unrestricted_parent.2;MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SetDate=2025-04-08T06:29:08Z;MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SiteId=90c7a20a-f34b-40bf-bc48-b9253b6f5d20;MSIP_Label_9d258917-277f-42cd-a3cd-14c4e9ee58bc_ActionId=b1111952-4074-4782-96e8-e31da1f0a93a;MSIP_Label_9d258917-277f-42cd-a3cd-14c4e9ee58bc_ContentBits=0;MSIP_Label_9d258917-277f-42cd-a3cd-14c4e9ee58bc_Enabled=true;MSIP_Label_9d258917-277f-42cd-a3cd-14c4e9ee58bc_Method=Standard;MSIP_Label_9d258917-277f-42cd-a3cd-14c4e9ee58bc_Name=restricted;MSIP_Label_9d258917-277f-42cd-a3cd-14c4e9ee58bc_SetDate=2025-04-07T05:46:55Z;MSIP_Label_9d258917-277f-42cd-a3cd-14c4e9ee58bc_SiteId=38ae3bcd-9579-4fd4-adda-b42e1495d55a;MSIP_Label_9d258917-277f-42cd-a3cd-14c4e9ee58bc_Tag=10, 3, 0, 1;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: PASP264MB5786:EE_|PAZP264MB2832:EE_
x-ms-office365-filtering-correlation-id: d0768a8a-e329-455d-3174-08dd77ee0ef9
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;ARA:13230040|376014|1800799024|366016|38070700018;
x-microsoft-antispam-message-info: 8SBNsZL09sMaCt2FdL32CIiRzdcjpo6gE6dX2We9Kx7/2hKEeZRJk+XYzCrxeKD4LjcF/pfaZtJTjLD3YE52Z8S+i6AXEcNUMna7yXs1dVz8ka/v9OPhNO+kudapnjTJlxFFtdBOYuX/xN463TOY7wFIyuvgw2Bwhu24jRPcUYess/SVsrADv8tTpDrOuq5Af0jTWUQIBi1WzRZna+WR8naocG8zP2DMIDXpFZbSirlDfyjCNSsc2tGyDjGKx4cGCaj+LA+8J/Kkzbj2aIcDR0kt1/b8Y+Dffs4wLB9hSrGv9W/4lG+PXxFyPTVl/L1qbt/h2Q6oosuLG4SZpk85IQGkeKU2WGQbjus/7p/xNZvmxdKZ1Sgzv5PXn6QS7dOCU2ReQ2Hm5suihtKjIWVEJ+hfmerdKH0Usur96j3Q3mzpZq6J9vGy16nNsnOjXOEmkEzIbLNjs9+tnrppVcxPz54spaGAkGJl0+3NjBDCxgcoG1IKZVLQg1803rf1z9vO7CFN6NPe4kTbxc020TeRz66oczsKLSQZ2Y3ppIySZFF9op6gbJ1bWml5XDDoQTWHLrkkzNriUw8Ib44X22Z+x536Tm8bgWMzvYSIipteXBYVZLb1/trwGcxr+LWNcg1OYF9qXGeZO1PyKbJFxwfMG3WQGtoTKWAJd8Jo9TAUu7bisaZG5snqCfPj36FMcgK9ZKQFoVfj3d+xGnTNfYSSebJD1ceZfIMpjKmFr8OZ/3aMzmsoeM4kM3YfnulFMT0j9oJ+7cTeRUn4RK/U1SbDF4QoKUCbH2JyOs0A+NLAummy8okSqQm0HaRXJo2hagYF4zx5/rVOgRJjKfwkrx4B+0udjyH3mjvS48Y+o1jI5UJhrYJmbHOBZzsLmxfjOA0xievKZiqU4EvOIBRJ2rwHBuQesAH6XIVG+o0fRbH9CjA2m9MBZBxyYV0uwiVQ0gGh0GaEwvKUamkJDubOD37GnP6uG3ErXKJttmr8DSwBJ/yKEXQakqhVj53t2FYFNRwt1rMXKOeABJDHpcyUZPmcmk/Z/eBuFTy/+cjXiJ6mOawgH7P4SJu+PA0ffSfem9Rw9UMQDzWqZYZDt4t+Kud8hrG7z0blaJ+dzAPhF7bkTM3V6GB6EU+5Jz6gfj6rY3v/87lgwnuCbG2sjJzV0T0Nzp4uo3DApmG3V+o9al7rLSDQUjdqJ5Luc0Xl6AApSXndiTY5yDe26LpJ9Z4WHO9rnHszdOfKdySY3Pyr/ZJxp/syWFOau2fmZQyFXgvX+wgtIFvuWiSqJB0BwZDGG3u5ZL98hbb+IhaIm/Pg4jQprUQ+1F7q47aQDWTBkdK2PuFK9CgHE8+Swm8/3yfbl8zg5SebgMPVfBC26Uu8xoFfiZW9Y1OMOBL/V2Cv1hM5+i/j6Qm097dMk48PRYqt8nYOrPvY7NLYtDbdMWQO530qH8w=
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PASP264MB5786.FRAP264.PROD.OUTLOOK.COM;PTR:;CAT:NONE;SFS:(13230040)(376014)(1800799024)(366016)(38070700018);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="iso-8859-1"
MIME-Version: 1.0
X-OriginatorOrg: orange.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: PASP264MB5786.FRAP264.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: d0768a8a-e329-455d-3174-08dd77ee0ef9
X-MS-Exchange-CrossTenant-originalarrivaltime: 10 Apr 2025 05:10:49.2984 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 90c7a20a-f34b-40bf-bc48-b9253b6f5d20
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 29ET72ERwLG+2aE2Y3ThztSnwiSzg9PiIKtUePkJWYmh2WpH43s0nMhscaBaXvINdm1+wkFWI252IpK3YA/oSDeWmR2QWqpM9ucOIG80XpI=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAZP264MB2832
X-TM-AS-ERS: 10.106.160.163-127.5.254.253
X-TM-AS-SMTP: 1.0 c210cC1vdXQzNjUub3JhbmdlLmNvbQ== bW9oYW1lZC5ib3VjYWRhaXJAb 3JhbmdlLmNvbQ==
X-TMASE-Version: DDEI-5.1-9.1.1004-29106.005
X-TMASE-Result: 10--44.871300-10.000000
X-TMASE-MatchedRID: fSYce/2kgDy7REX8b2FriCbixKZRJvnJolVO7uyOCDX4qCLIu0mtIMC5 DTEMxpeQhIualSoKckm/cz3s562i5+TfPHhZVG8jg2tbutXuhCLx5KZMlKYS/cJWkMZBXP7D8yq x/L9HXKNVLrHoL1dJSENEEL4+tODZ2QFbUsMkd181Dw+kki/q3gEaayJtYZNtfjJOgArMOCaHOV 1iX68qKetWym0m09Qfwvcs2xlqG5yRlo1QWxTtF/27vtwnQ39AGqSG/c50XgOGiafRvCBWaSkRn 4qIywauEgMr3ompuCG181dOvOx+tLmT+E/JhCeR4DhTNYaHUgMK3Ma88LL+bh7Xjr6Qk+Lo8lPL iuMgo8g8jujIAy4UQEmINtyE+GkxZ+AaDl4DcSDjIFexV2lnNLIxZweUR0NfcV3n4J/0zUNOuRi 6fMc6u38UJsHf0X9zH5LVYZxF9O/mo0hSd9cui7134DSoRSP0F+qQpCWTUjnJ5SXtoJPLyB3eEi PS2ZztMFddv+pLbrdGM6U+hNdDWwgL/TDRGMDcbDqA3h16pu3cgUVP3Cp+vdFycZH4zkiJuJ/W6 j4Xx9uYQ5iPc5f59wjN8Ql23yICfYHg+1tMgtF01502oucCvIt06zoQFEShrB85uDT3cKTZEU+6 htS7LR5WLt2ZJGil47ROJh4ock4sjvWKImPjnWR5WlY/ZLL5joyKzEmtrEca0wEkoeb2eXYdkYO uyxVSCMmWJ6tUT+fzfkvTgzBou2RoE3UV1JrtJ8H7844WHI7f5h1chF2RvBiQw+VUm/OOaq7Dr1 BRCsuB4mFM3ixr3jrv3swh5CGbJbiB51RODNJvIFSwtT818kbgTmf4sxQ0mkCGwliFomtJKYD1W hGOCaPFjJEFr+ol4Vgz4iPA9/Mz2Zgi6BIiPHtEaer/aC7H+gtHj7OwNO2FR9Hau8GO7qfDnZdV cKQklExlQIQeRG0=
X-TMASE-SNAP-Result: 1.821001.0001-0-1-22:0,33:0,34:0-0
X-TMASE-INERTIA: 0-0;;;;
X-TMASE-XGENCLOUD: 13f66c7d-bd86-4f40-86f9-ae8d9a30674b-0-0-200-0
Content-Transfer-Encoding: quoted-printable
Message-ID-Hash: TP5HLEHIMCTP77OF77VQ6ZLRUBTIQL2C
X-Message-ID-Hash: TP5HLEHIMCTP77OF77VQ6ZLRUBTIQL2C
X-MailFrom: mohamed.boucadair@orange.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-anima.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: "draft-ietf-anima-brski-prm@ietf.org" <draft-ietf-anima-brski-prm@ietf.org>, "anima-chairs@ietf.org" <anima-chairs@ietf.org>, "anima@ietf.org" <anima@ietf.org>, "ietf@kovatsch.net" <ietf@kovatsch.net>, "tte@cs.fau.de" <tte@cs.fau.de>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [Anima] Re: Mohamed Boucadair's Discuss on draft-ietf-anima-brski-prm-18: (with DISCUSS and COMMENT)
List-Id: Autonomic Networking Integrated Model and Approach <anima.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/anima/bxjNJlM8TDimzLkSqrsfdX4qz4s>
List-Archive: <https://mailarchive.ietf.org/arch/browse/anima>
List-Help: <mailto:anima-request@ietf.org?subject=help>
List-Owner: <mailto:anima-owner@ietf.org>
List-Post: <mailto:anima@ietf.org>
List-Subscribe: <mailto:anima-join@ietf.org>
List-Unsubscribe: <mailto:anima-leave@ietf.org>

Hi Steffen,

Thanks for the follow-up. 

For my own convenience, I'm using https://tinyurl.com/brskp-prm-diff to track the changes you made so far.

Please see inline.

Cheers,
Med

> -----Message d'origine-----
> De : Fries, Steffen <steffen.fries@siemens.com>
> Envoyé : mardi 8 avril 2025 18:57
> À : BOUCADAIR Mohamed INNOV/NET <mohamed.boucadair@orange.com>;
> The IESG <iesg@ietf.org>
> Cc : draft-ietf-anima-brski-prm@ietf.org; anima-chairs@ietf.org;
> anima@ietf.org; ietf@kovatsch.net; tte@cs.fau.de
> Objet : RE: Mohamed Boucadair's Discuss on draft-ietf-anima-brski-
> prm-18: (with DISCUSS and COMMENT)
> 
> Hi Mohamed
> 
> Thank you for the swift replay.
> I made further changes inline and dropped the already addressed
> and acknowledged parts for better readability.
> 
> Best regards
> Steffen
> 
> > > > ------------------------------------------------------------
> > > > DISCUSS:
> > > > ------------------------------------------------------------
> > > > # DISCUSS
> > > >
> > > > # Unconditional MUST
> > > >
> > > > CURRENT:
> > > >    The pledge MUST respond to all requests regardless of the
> > > >    Host header field provided by the client (i.e., ignore
> it).
> > > >
> > > > I don't think that is safe.
> > > >
> > > > I'm afraid this needs some scoping; as there are other
> legitimate
> > > > conditions where the pledge doe snot have to reply.
> > > [stf] Based on the existing discussion on this, we opened an
> issue
> > > on github to align on the solution The current proposal takes
> your
> > > suggestion into account:
> > > OLD
> > > The pledge MUST respond to all requests regardless of the Host
> > > header field provided by the client (i.e., ignore it).
> > >
> > > NEW
> > > In the absence of a security policy the pledge MUST respond to
> all
> > > requests regardless of the Host header field provided by the
> client
> > > (i.e., ignore it). A security policy may include a rate
> limiting for
> > > a requests to avoid susceptibility of the pledge to overload.
> > >
> > > Once aligned, we will include it in the draft
> >
> > [Med] ACK.
> [stf] included in the latest version available on github:
> https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2F
> github.com%2Fanima-wg%2Fanima-brski-
> prm&data=05%7C02%7Cmohamed.boucadair%40orange.com%7Cd4e9e79794b548
> 0498b608dd76be77ac%7C90c7a20af34b40bfbc48b9253b6f5d20%7C0%7C0%7C63
> 8797282642341814%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsI
> lYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3
> D%7C0%7C%7C%7C&sdata=r7WV295TJXFaNu5Mp4KCoBsTfHllgncYbWEXjjTwCOE%3
> D&reserved=0
> 

[Med] The change looks great. Consider this one closed.

> 
> > > > # Compliance with HTTP BCP (RFC9205)
> > > >
> > > > CURRENT:
> > > >    If the pledge is unable to create the PVR, it SHOULD
> respond with an
> > > >    HTTP error status code to the Registrar-Agent.  The
> following client
> > > >    error status codes SHOULD be used:
> > > >
> > > > The use of normative language is IMO not compliant with the
> > > > guidance in RFC9205, about error handling.
> > > [stf] I created a new issue for this:
> > > From RFC 9205 I understood that we could use the HTTP status
> codes
> > > in this way. What would you suggest here?
> > >
> >
> > [Med] A simple fix here is to remove the normative language.
> Listing
> > the appropriate codes is definitely right, but need to redefine
> the
> > error codes, just be affirmative. For example, an entity will
> return 404 when there is no resources, etc.
> [stf] Hm, after the discussion in the design team, we are not
> quite sure about your concern. Is it the one.-to-one mapping
> referenced in section 4.6 of RFC 9205 or the understanding we re-
> define status codes?
> 

[Med] I'm afraid that you are redefining those. We don't need new normative HTTP behavior here. I suggest we simply make this change (and similar) 

OLD:
   If the pledge is unable to create the PER, it SHOULD respond with an
   HTTP error status code to the Registrar-Agent.  The following client
   error status codes MAY be used:

   *  400 Bad Request: if the pledge detects an error in the format of
      the request.
  ...

NEW:
   If the pledge is unable to create the PER, it responds with an
   HTTP error status code to the Registrar-Agent.  The following client
   error status codes can be used:

   *  400 Bad Request: if the pledge detects an error in the format of
      the request.
   ..


> > > > There are several similar constructs in the document.
> > > >
> > > > # Cluster with 8366bis
> > > >
> > > > CURRENT:
> > > >
> > > >    The JSON PVR Data MUST contain the following fields of
> the "ietf-
> > > >    voucher-request" YANG module as defined in
> > > > [I-D.ietf-anima-rfc8366bis];
> > > >
> > > > I think this spec should be clustered with 8366bis. There
> are
> > > > several structure that used in this document and which
> depends on what is defined in 8366bis.
> > > > Changes to the bis will have implications on this one.
> > > >
> > > > With that in mind, I tend to suggest holding approval of
> this
> > > > specification till we finalize the bis spec.
> > > [stf] As indicated by Michael, we already have a cluster for
> RFC
> > > 8366bis and further drafts related to BRSKI variants to take
> care of
> > > mutual influences. I opened an issue
> >
> > [Med] ACK.
> [stf] Also discussed in design team meeting today. It is less
> about changes in the draft but more to the processing. The
> intention is that all other BRSKI variant documents currently
> handled will go into MISSREF, as draft-ietf-jws-voucher waiting
> for 8366bis. 8366bis collects considerations from the different
> documents and is likely not to lead to addition of new information
> in the respective drafts (at least that is the intention).
> 

[Med] I would be more comfortable if I had more stability signs of 8366 ;-) 

That's said, I think that I have the discussion I wanted to have. I leave it to Mahesh to decide.

> 
> > > > # Requires TLS1.3
> > > >
> > > > CURRENT:
> > > >    As already stated in [RFC8995], the use of TLS 1.3 (or
> newer) is
> > > >    encouraged.  TLS 1.2 or newer is REQUIRED on the
> Registrar-Agent
> > > >    side.  TLS 1.3 (or newer) SHOULD be available on the
> registrar, but
> > > >    TLS 1.2 MAY be used.  TLS 1.3 (or newer) SHOULD be
> available on the
> > > >    MASA, but TLS 1.2 MAY be used.
> > > >
> > > > Please update to take into to reflect draft-ietf-uta-
> require-tls13.
> > > [stf] I saw that there was already discussion on this issue. I
> > > created a corresponding issue as We will discuss the use of
> TLS 1.2
> > > and if there is a desire to also allow or existing pledges,
> that may
> > > have no option to only allow TLS 1.3, we would add a note as
> > > suggested and explain the necessity.
> > >
> >
> > [Med] ACK. I'm neutral on the outcome here, but I'd like we back
> the
> > design and include some reasoning if we don't follow the UTA
> reco. Thanks.
> [stf] BRSKI-PRM is an extension of existing BRSKI, which requires
> TLS 1.2. We aligned with that and also included it in BRSKI-PRM.
> TLS1.3 is currently widely used in browsers, but industry adoption
> is not as fast. There are constraint devices using SDKs, which are
> not updated fast.
> We enhanced the part with following to state the consideration of
> the uta draft.:
> OLD
> As already stated in {{!RFC8995}}, the use of TLS 1.3 (or newer)
> is encouraged.
> NEW
> As already stated in {{!RFC8995}}, and required by {{I-D.ietf-uta-
> require-tls13}}, the use of TLS 1.3 (or newer) is encouraged.
> 

[Med] I suggest we pause on this one and reflect the outcome of the ongoing discussion.

I would at least see in the text a brief mention of the SDK limitations you mentioned. 

BTW, what is currently supported by implementations such as open-brski?

> 
> > > > ------------------------------------------------------------
> ----
> > > > COMMENT:
> > > > ------------------------------------------------------------
> ----
> > > >
> > > > # Consider having a reference figure early in the document
> with
> > > > the various entities.
> > > [stf] We currently have the architecture overview figure in
> section
> > > 5 discussing the solution architecture. To avoid repeating
> that
> > > figure, would it be fine to essentially reference the figure
> from
> > > the introduction to guide the reader to the overview?
> > >
> >
> > [Med] Moving that figure early in the document would be better,
> IMO.
> [stf] after discussion in the ANIMA design team, we felt that
> including a reference to figure 1 and section 5 would be better as
> figure 1 is part of the solution architecture section, which
> covers different deployment options. Ripping it apart may lead to
> confusion when reading the solution architecture section.
> 

[Med] ACK

> 
> 
> > > > # Resource vs. Endpoint
> > > >
> > > > CURRENT:
> > > >    endpoint:  Term equivalent to resource in HTTP [RFC9110]
> and CoAP
> > > >       [RFC7252].  Endpoints are accessible via Well-Known
> URIs
> > > >       [RFC8615].
> > > >
> > > > For the CoAP mention, this may be confusing as CoAP has also
> the
> > > concept of
> > > > "Endpoint", which is not identical to resource.
> > > [stf] Do you have a suggestion on how to address potential
> confusion
> > > here? We tried this already by providing references to both
> RFCs,
> > > but if there is a clearer way of describing it we could
> include it.
> >
> > [Med] I would simply remove the mention of CoAP here. No need to
> dive
> > into subtleties of endpoint vs. resources for a protocol that is
> not
> > used as foundation for this work.
> [stf] okay, removed as suggested to avoid confusion.
> 

[Med] ACK

> > > > # Mysterious
> > > >
> > > > CURRENT: Requirements Discussion and Mapping to Solution-
> Elements
> > > >
> > > > What does Solution-Elements mean?
> > > [stf] In the discussion we handled solution elements as "parts
> of
> > > the solution" like the introduction of the registrar-agent as
> new
> > > component or the reliance on self-contained objects,
> enhancements of
> > > assertion types in the voucher etc. If you have a proposal for
> a
> > > better name, we could change it.
> > >
> >
> > [Med] Thanks for clarifying. I think I would
> > s/Solution-Element/BRSKI-PRM Functional Entities or similar.
> [stf] okay, good suggestion, finally changed from OLD Requirements
> Discussion and Mapping to Solution-Elements NEW Requirements
> Discussion and Mapping to BRSKI-PRM Functional Elements
> 
> 

[Med] ACK

> > > > # Outsource Key Infrastructure
> > > >
> > > > This is currently drawn within the customer domain. Can this
> be
> > > > outsourced/external to the customer domain?
> > > [stf] The intention was to show the supporting infrastructure
> on the
> > > customer side without including the operational model. So the
> PKI
> > > may be customer operated or provided to the customer as
> service.
> > >
> >
> > [Med] Please consider clarifying this in the ops section.
> Thanks.
> [stf] Included the following statement in the ops section:
> NEW
> The key infrastructure as part of the customer domain discussed in
> Section 5 may be operated locally by the operator of that domain
> or may be provided as a third party service.
> 

[Med] Looks good. Thanks.

> 
> > > > # Group OPS considerations in one single section
> > > >
> > > > Consider moving the following to the OPS cons section:
> > > >
> > > > CURRENT:
> > > >    The benefits of BRSKI-PRM can be achieved even without
> the
> > > >    operational complexity of stand-alone Registrar-Agents by
> integrating
> > > >    the necessary functionality of the Registrar-Agent as a
> module into
> > > >    the domain registrar as shown in Figure 3 so that it can
> support the
> > > >    BRSKI-PRM communications to the pledge.
> > >
> > > [stf] Good idea! Included the following in the Ops Con
> section:
> > > NEW
> > > As outlined in {{colo-regagt}} the functional support of
> BRSKI-PRM
> > > can also be achieved using a Registrar-Agent co-located with
> the
> > > Registrar instead of a stand-alone Registrar-Agent, which may
> reduce
> > > operational complexity.
> > > >
> > > > And
> > > >
> > > > CURRENT
> > > >    Overall, this may have
> > > >    operational implications when the registrar is part of a
> scalable
> > > >    framework as described in Section 1.3.1 of
> > > >    [I-D.richardson-anima-registrar-considerations].
> > > [stf] The reference to [I-D.richardson-anima-registrar-
> > > considerations] is already contained in the Ops Con.
> > > So I would propose to move the sentence as suggested to the
> Ops Con
> > > section as following to keep the context:
> > > NEW
> > > Requirements to the utilized credentials authenticating and
> artifact
> > > signatures on the registrar as outlined in Section 6.3 may
> have
> > > operational implications when the registrar is part of a
> scalable
> > > framework as described in Section 1.3.1 of [I-
> > > D.richardson-anima-registrar-considerations].
> > >
> >
> > [Med] This is an enhancement as we do have one reference section
> to
> > look at for these important matters.
> 
> 
> 
> > > > # Configurable knobs
> > > >
> > > > CURRENT:
> > > >    In the absence of a more general discovery as defined in
> > > >    [I-D.ietf-anima-brski-discovery] the Registrar-Agent MUST
> use
> > > >
> > > > Do we need to have a control parameter here to instruct the
> > > behavior of the RA?
> > > [stf] This is covered in the referenced draft. It allows to
> discover
> > > the functionality of the registrar with much more details
> about
> > > operational mode, encoding options, etc.
> > > Would you suggest to provide a sentence that the discovery may
> be a
> > > configuration item of the Registrar-Agent. I had assumed this
> is
> > > already implicitly given through the existing formulation, but
> > > explicit may be better.
> >
> > [Med] Adding that sentence would be may preference here as a
> reader.
> [stf] Added the following:
> NEW
> When supporting different options for discovery, as outlined in
> {{I-D.ietf-anima-brski-discovery}}, a manufacturer may support
> configuration of preferred options.
> 

[Med] Thanks.

> > > > The same applies for the following:
> > > >
> > > > CURRENT:
> > > >    A nonceless voucher MAY be accepted as in [RFC8995] if
> > > allowed by the
> > > >    pledge implementation of the manufacturer.
> > > [stf] As above, the suggestion is to include a sentence that
> the
> > > manufacturer may opt to have this as configuration item?
> > >
> >
> > [Med] Yeah. Thanks.
> [stf] Added the following:
> NEW
> A manufacturer may opt to provide the acceptance of nonceless
> voucher  as configurable item.
> 

[Med] ACK

> 
> > > > # "MUST ...unless" constructs should be "SHOULD ...unless"
> > > >
> > > > OLD:
> > > >    To enable interaction as responder with the Registrar-
> Agent, pledges
> > > >    in responder mode MUST act as servers and MUST provide
> the endpoints
> > > >    defined in Table 1 within the BRSKI-defined /.well-
> known/brski/ URI
> > > >    path, except for the OPTIONAL endpoint "qps".  The
> endpoints are
> > > >    defined with short names to also accommodate for
> resource-constrained
> > > >    devices.
> > > >
> > > > NEW:
> > > >    To enable interaction as responder with a Registrar-
> Agent, pledges
> > > >    in responder mode MUST act as servers and SHOULD provide
> the endpoints
> > > >    defined in Table 1 within the BRSKI-defined /.well-
> known/brski/ URI
> > > >    path, except for the OPTIONAL endpoint "qps".  The
> endpoints are
> > > >    defined with short names to also accommodate for
> resource-constrained
> > > >    devices.
> > > [stf] Hm, for compliance with BRSKI-PRM we require the support
> of
> > > the two stated endpoints in Table 1 to ensure they can be
> trigger.
> > >
> >
> > [Med] The issue here is that MUST is an absolute required, while
> this
> > case we have an exception (unless..). FWIW, 2119 has the
> following:
> >
> > 1. MUST   This word, or the terms "REQUIRED" or "SHALL", mean
> that the
> >    definition is an absolute requirement of the specification.
> >
> > 3. SHOULD   This word, or the adjective "RECOMMENDED", mean that
> there
> >    may exist valid reasons in particular circumstances to ignore
> a
> >    particular item, but the full implications must be understood
> and
> >    carefully weighed before choosing a different course.
> 
> 

[Med] I see that you explored another path. I like that as well.

There is one nit, though: delete an extra "provide the endpoints"

OLD:
   To enable interaction as responder with a Registrar-Agent, pledges in
   responder mode MUST act as servers and MUST provide the endpoints
   provide the endpoints "tpvr", "tper", "svr", "scac", and "ser"
   defined in Table 1 within the BRSKI-defined /.well-known/brski/ URI
   path.  The optional endpoint "qps" SHOULD be supported.

NEW:
   To enable interaction as responder with a Registrar-Agent, pledges in
   responder mode MUST act as servers and MUST 
   provide the endpoints "tpvr", "tper", "svr", "scac", and "ser"
   defined in Table 1 within the BRSKI-defined /.well-known/brski/ URI
   path.  The optional endpoint "qps" SHOULD be supported.


> 
> > > > # TTL
> > > >
> > > > CURRENT:
> > > >    Note that the pledge provisionally accepts the registrar
> EE
> > > >    certificate contained in the tPVR until it receives the
> voucher (see
> > > >    Section 5.4).
> > > >
> > > > Shouldn't that be TTLed as well for better security control?
> > > [stf] Good point we need to discuss this to avoid a dead lock
> of the
> > > pledge. As the situation is different to the TLS connection in
> BRSKI
> > > we may add some further clarification.  Created issue for
> discussion
> >
> > [Med] ACK.
> [stf] Proposal to include that the last received tPVR will be
> taken if the pledge does not have the possibility to store more
> that one provisionally accepted registrar EE certificate

[Med] ACK

> 
> >
> > > > # Missing IANA action
> > > >
> > > > CURRENT: IANA has registered the following service names
> > > >
> > > > Please ad an action for IANA to update that entry. Thanks.
> > > [stf] We've got the following information from IANA:
> > > "The actions requested in this document will not be completed
> until
> > > the document has been approved for publication as an RFC.
> > > This message is meant only to confirm the list of actions that
> will
> > > be performed."
> > > Are there additional actions necessary?
> > >
> >
> > [Med] No, just save a question from IANA in the future when they
> well
> > implement the actions. Add a sentence to say basically what I
> had in my comment. Thanks.

____________________________________________________________________________________________________________
Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.

This message and its attachments may contain confidential or privileged information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
Thank you.