[Anima] Re: Mohamed Boucadair's Discuss on draft-ietf-anima-brski-prm-18: (with DISCUSS and COMMENT)
mohamed.boucadair@orange.com Tue, 08 April 2025 06:58 UTC
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: anima@mail2.ietf.org
Delivered-To: anima@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id AB7F318C860E; Mon, 7 Apr 2025 23:58:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.695
X-Spam-Level:
X-Spam-Status: No, score=-2.695 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTTP_ESCAPED_HOST=0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H2=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_NONE=0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=orange.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vHyCRH4yCatb; Mon, 7 Apr 2025 23:58:12 -0700 (PDT)
Received: from smtp-out.orange.com (smtp-out.orange.com [80.12.126.236]) (using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 40D6F18C8609; Mon, 7 Apr 2025 23:58:10 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=orange.com; i=@orange.com; q=dns/txt; s=orange002; t=1744095492; x=1775631492; h=to:cc:subject:date:message-id:references:in-reply-to: mime-version:content-transfer-encoding:from; bh=pC3w+AePRFyKc0AbQkAjdAUz/G7M1FLslzRfqZfAvmY=; b=ZbOfjNsxyDFl/qZcNPvx5QgaWBGtqm5DvccTCXMUgzmHNpTRMqysgype 1eKCldWuOnJsBjez+YECl+1c5byGzGvjiehtO5q1VIAO2kWc2iVEVgAct 8al7JovV8qUPOQiNWoux+AbBDn3w8nmxqnUFI95pSc9Qv6piVvcimf8CW /92W3TVcjlQkFRujjxUZGmL0v5RdKjxEOlzyAWMrvJ0Tttu72fcpH3Src aRzDr7liNP2R9wjjyNucZd5WGuo3IIAe+SboFvTGNoPDdX5JQxGtyv6NO YW2+Bc7khdFDiB2PF3Sh1xzaFOL/Y9Py9DFLE52CXy0LvYXpjeQcIcs/m w==;
X-CSE-ConnectionGUID: pE+QgpZYToGtpAcD/PRIyw==
X-CSE-MsgGUID: udLIfDS1TZ6fc5cmF2Nueg==
Received: from unknown (HELO opfedv1rlp0a.nor.fr.ftgroup) ([x.x.x.x]) by smtp-out.orange.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 08 Apr 2025 08:58:09 +0200
Received: from unknown (HELO opzinddimail8.si.fr.intraorange) ([x.x.x.x]) by opfedv1rlp0a.nor.fr.ftgroup with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 08 Apr 2025 08:58:09 +0200
Received: from opzinddimail8.si.fr.intraorange (unknown [127.0.0.1]) by DDEI (Postfix) with ESMTP id BA634762670; Tue, 8 Apr 2025 08:58:08 +0200 (CEST)
Received: from opzinddimail8.si.fr.intraorange (unknown [127.0.0.1]) by DDEI (Postfix) with ESMTP id B5CFF76266E; Tue, 8 Apr 2025 08:58:08 +0200 (CEST)
Received: from smtp-out365.orange.com (unknown [x.x.x.x]) by opzinddimail8.si.fr.intraorange (Postfix) with ESMTPS; Tue, 8 Apr 2025 08:58:08 +0200 (CEST)
Received: from mail-francecentralazlp17011030.outbound.protection.outlook.com (HELO PAUP264CU001.outbound.protection.outlook.com) ([40.93.76.30]) by smtp-out365.orange.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 08 Apr 2025 08:58:09 +0200
Received: from MR1PPF6395AA9E6.FRAP264.PROD.OUTLOOK.COM (2603:10a6:508:1::231) by PR0P264MB2904.FRAP264.PROD.OUTLOOK.COM (2603:10a6:102:1d3::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8606.35; Tue, 8 Apr 2025 06:58:05 +0000
Received: from MR1PPF6395AA9E6.FRAP264.PROD.OUTLOOK.COM ([fe80::36c7:4fc0:8447:155b]) by MR1PPF6395AA9E6.FRAP264.PROD.OUTLOOK.COM ([fe80::36c7:4fc0:8447:155b%8]) with mapi id 15.20.8606.033; Tue, 8 Apr 2025 06:58:05 +0000
From: mohamed.boucadair@orange.com
X-CSE-ConnectionGUID: 9493GhLiTtmHBz7TYeBK3g==
X-CSE-MsgGUID: VIDiYDm6T5m9j+N53OAjyQ==
X-TM-AS-ERS: 10.218.35.125-127.5.254.253
X-TM-AS-SMTP: 1.0 c210cC1vdXQzNjUub3JhbmdlLmNvbQ== bW9oYW1lZC5ib3VjYWRhaXJAb 3JhbmdlLmNvbQ==
X-DDEI-TLS-USAGE: Used
X-CSE-ConnectionGUID: D5t+A7c+Tqq2w2Tf5BglQQ==
X-CSE-MsgGUID: sk2QFLsCSyu6Z8k8b/lxEw==
Authentication-Results: smtp-out365.orange.com; dkim=none (message not signed) header.i=none
IronPort-Data: A9a23:2ls7qaCmyGrUyRVW/1rkw5YqxClBgxIJ4kV8jS/XYbTApDoqgTYPy WNJWTuDOauMYmH0eN12YIrjoEIB6MXWytAxTANkpHpgcSlH+JHPbTi7wuYcHM8wwunrFh8PA xA2M4GYRCwMZiaB4E/raP659iUUOZigHtLUEPTDNj16WThqQSIgjQMLs+Mii+aEu/Dha++2k Y20+pC31GONgWYubzpIs/Lb8XuDgdyp0N8mlg1nDRx0lA+G/5UlJMp3Db28KXL+Xr5VEoaSL woU5Ojklo9x105F5uKNyt4XQGVTKlLhFVHmZk5tZkSXqkMqShrecEoMHKF0hU9/011llj3qo TlHncTYpQwBZsUglAmBOvVVO3kWAEFIxFPICVTirY+6kEaFT2L1meo0ME9rF4Icw98iVAmi9 dRAQNwMRiiqutrsnu6Qd7E034IkMdXhO54Ztjd41zbFAP06QJfFBaLX+dtf2zR2jcdLdRrcT 5ZBL2s0KkueJUYXUrsUIMpWcOOAg37/ejhVpBSforc86mTazRZZ16LkNtXYPNeNQK25m27H9 jmdozqgXXn2MvSEymC83Fa3rdTegH3JCIFCHvq85tN11Qj7Kms7U0ZMCQTTTeOColWiVtxRJ kpS9DAvoLMa702mS9T7RFuzp3vslh8RQNV4EuAm5keK0KW8ywqDD2YYCz9MdNJjvck3QDVv3 EWSnNKsHSZqmLyYVXzb8a2bxRu7PykQJCoJZSYFVxAt4tT/rsc0lB2nZt9lEau8ptz4BT+2x CqFxAA/iqkdpc0Myayn5lvHxTShuvDhUhI4zg7MGGys80V1aeaYi5eA7FHa6bNONo+fRVSKs X4YgcGa5fIKFcjSzHXUGL5VWra0+/yCLTvQx0Z1GIUs/Cis/Hjlep1M5DZ5JwFiNcNslSLVj FH7lV5Np7YMNziWdLYtfNiNBZkAwqzZLIGwPhzLVeZmbp90fQ6B2ShhY0+Mwmzg+HTAd4lva P93lu78XR4n5bRb8dagewsK+ZERrh3SKEvWTJH/ihq92LyVaXWYT6sfOV+HfOQhtfzc+VyNq I4ZMNaWwRJCVuG4ejPQ7YMYMVENKz48GIzyrMtUMOWEJ2KK+V3N6dePndvNmKQ8xcy5c9skG FngAie0L3Kj2xX6xf2iMCwLVV8Wdc8XQYgHFSItJ020/HMofJyi6qwSH7NuIuV7rLE7kqAlH qNZEyllPhipYmWfk9j6RcmsxLGOiDz22FjUV8ZYSGRhIMM4G1KVkjMaVlC3r3BRVUJbSvfSU 5X7jVmHHvLvtixnDc3Mb+mowU/5tn8HgIpPs7jgc7FulLHX2NEycUTZ16ZvS+lVcEmr7mXAi 26+X0xCzcGT+NBdzTU8rfzex2tfO7ckRhICd4QahJ7qXRTnEp2Lm98eALjUJ2uBBAsZOsyKP I1o8h01C9Vf9H4ijma2O+8DIX4Wjzc3m4Jn8w==
IronPort-HdrOrdr: A9a23:35RXqaw2qXlKpFXiXJshKrPxreskLtp133Aq2lEZdPULSKGlfp GV9sjziyWetN9IYgBZpTiBUJPhfZquz+8P3WB3B8boYOCGghrhEGgM1/qH/9SNIUPDH6tmpN 5dmstFeZfN5DpB/KHHCWCDer5Nr+VvsprY49s2pE0dLj2CHpsQijuRfTzrcHGeKjMmObMJUL 6nouZXrTupfnoaKu6hAGMeYuTFr9rX0Lr7fB8vHXccmUWzpALtzIS/PwmT3x8YXT8K66wl63 L5nwvw4bjmm+2nyyXby3TY4/1t6ZTcI5p4dYKxY/ouW3XRYzWTFcdcsnq5zXIISdSUmRcXeR /30lId1opImjfslyqO0GHQMkHboUsTAjnZuBKlaDLY0LPErD5WMbs8uatJNhTe8EYup9d6ze ZC2H+YrYNeCVfakD36/MWgbWAcqqOYmwtWrQcotQ0qbaIOLLtK6YAP9kJcF5kNWCr89YA8Ce FrSMXR/uxff1+WZ23Q+jAH+q3kYl0jWhOdBkQSsM2c1DZb2Hh/0ksD3cQa2nMN7og0RZVI7/ nNdq5oiLZNRMkLar8VPpZ2feKnTmjWBR7cOmObJlrqUKkBJnLWspbypK444em7EaZ4vqfaWK 6xI2+wmVRCC34GU/f+oqGj2iq9MVmAYQ==
X-Talos-CUID: 9a23:0Sx78mm6z4QyfopiO5A5T8Xt4tbXOVGA0DT5fET7NX9wEqLPdVHN0qxgqvM7zg==
X-Talos-MUID: 9a23:ftSooArc+eCTuZG16ccezyphbv5Gx7+FM1EQz6dWuJmOcihgFijI2Q==
X-IronPort-AV: E=Sophos;i="6.15,197,1739833200"; d="scan'208";a="78334617"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=GGfG5E26LkZF0rJiadmxD+8T5YL2EUVdODzzBVPWcGes+gRgkZAPE3zh2gqLEHZENZ1ecPwQWq7wtssrs1xZO/IsLWWu0bHZCLl9+NgJ14eLHj7son2a/ynJQi0An4Yh3WzT6IC/MlfTApYFHH2NA8UIeb6ozGfXFU0QtlbiJT2wYhBmD1laKqHd5G1D6UOzlB7J/xpr0q89xoXmaqYRDSKu2UUO/O88sYQaX8YPh22HH0MXFaDdU3DwHdgYzu5gspF81TMRN7qFzm8cjIWO3BOaz7uEhB7P9VHEBJOY+Qbo/sPzf+JGbUz/CqFVA0znOd2xntHRpukpANBUFLCFjQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=AUAfAGs9dNJ+y9L+EfS22vIGnXa9/d4qZ1dBq+w8VBg=; b=zV/otoMrMRv3xg/dOmP368TNZ4kfZmFVyGKQVjAUGV7d2VdKLgP3US6nKYTkw+krWcNDZNfBzSCivLhmEcvFJLIDiUE1oyUD4uupE03tEvOtXPkj8tUniakxPqzVhsFPJmvzUhzWgntq8p3oKyObVKjq7xd0e8PbXzpLohA3BlbJeKxI6/5xTdENNfMyuRGvmvDP8mpjMosKbtBimFZtxzwWnfhEdtLGfr3bcPGLT5KW1HcaZTXscJNQWK0R/eKFajCstHGZCr370662C+sM0eDKdBCNrkwZWb8Pg3OsOjsy5B/GCd4lAX39fi51V4+XJA3oBY9t3tL/kLMIk7/Q0g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=orange.com; dmarc=pass action=none header.from=orange.com; dkim=pass header.d=orange.com; arc=none
To: "Fries, Steffen" <steffen.fries@siemens.com>, The IESG <iesg@ietf.org>
Thread-Topic: Mohamed Boucadair's Discuss on draft-ietf-anima-brski-prm-18: (with DISCUSS and COMMENT)
Thread-Index: AQHbp9gg5o6EeuFypEeXZYEncA8rwbOZT1hA
Date: Tue, 08 Apr 2025 06:58:05 +0000
Message-ID: <MR1PPF6395AA9E669F62F704D9545C9A1C688B52@MR1PPF6395AA9E6.FRAP264.PROD.OUTLOOK.COM>
References: <174395186493.249581.5702510245186761176@dt-datatracker-64c5c9b5f9-hz6qg> <DB9PR10MB6354832B631265E3B2B6A8BFF3AA2@DB9PR10MB6354.EURPRD10.PROD.OUTLOOK.COM>
In-Reply-To: <DB9PR10MB6354832B631265E3B2B6A8BFF3AA2@DB9PR10MB6354.EURPRD10.PROD.OUTLOOK.COM>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_ActionId=4eed68b2-5667-4a9e-9ec2-64711b7250f5;MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_ContentBits=0;MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Enabled=true;MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Method=Privileged;MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Name=unrestricted_parent.2;MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SetDate=2025-04-08T06:29:08Z;MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SiteId=90c7a20a-f34b-40bf-bc48-b9253b6f5d20;MSIP_Label_9d258917-277f-42cd-a3cd-14c4e9ee58bc_ActionId=b1111952-4074-4782-96e8-e31da1f0a93a;MSIP_Label_9d258917-277f-42cd-a3cd-14c4e9ee58bc_ContentBits=0;MSIP_Label_9d258917-277f-42cd-a3cd-14c4e9ee58bc_Enabled=true;MSIP_Label_9d258917-277f-42cd-a3cd-14c4e9ee58bc_Method=Standard;MSIP_Label_9d258917-277f-42cd-a3cd-14c4e9ee58bc_Name=restricted;MSIP_Label_9d258917-277f-42cd-a3cd-14c4e9ee58bc_SetDate=2025-04-07T05:46:55Z;MSIP_Label_9d258917-277f-42cd-a3cd-14c4e9ee58bc_SiteId=38ae3bcd-9579-4fd4-adda-b42e1495d55a;MSIP_Label_9d258917-277f-42cd-a3cd-14c4e9ee58bc_Tag=10, 3, 0, 1;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: MR1PPF6395AA9E6:EE_|PR0P264MB2904:EE_
x-ms-office365-filtering-correlation-id: def47a6d-f3f9-40a5-e4f9-08dd766ab672
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;ARA:13230040|376014|1800799024|366016|38070700018|13003099007;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:MR1PPF6395AA9E6.FRAP264.PROD.OUTLOOK.COM;PTR:;CAT:NONE;SFS:(13230040)(376014)(1800799024)(366016)(38070700018)(13003099007);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: XRVKt6j64oU3QzialVj3Za4/qW0nJwYADMtKQ67hOEO8NgfmynQe9Wwblv/fC8aycZqu5WdCvJqIvBAYZbjktUrZ4wLEdZiN9tnDPIS8jara46DcKCDC7g28dPsR3SV0qzPBKYKcC1bXGcICnjOoevDLzd+IzaJSAibnnkjxOqU7ioFbYQdUy7SMydldr+bfI+nUqmbUm7N5pv6tyPvW/7bxzH3rmgXhvHnKYAUWszWcB4ZCaKSynwb6Po3m6pmv2Z8UCGHidBhFeiaUSGj/qCWePMrI42cpfyX9zGAhl27LmL8JUOCrv0uop8rcY1aYfacb/Kqeu/hpqS0IwVjjhwBVUAEPz4FniF1ahZKTkZeZKSGmSK8I5b+T4Gak4r5fN6ZhjaChjGiT/swp3cY1Ybewc/BgRKUV7o+fdYaqoVY3Wggy5+zOBRJLHbXvLDejkUnlao2ODoAwBJ7EvhJf801/Cc3nAf2yeXeRPFS8vASJaf6QC+QYGNwHMhTMIROhY/LXPPeN8t75PSxFY3ODYlqw93b/ZnDi+PFQOc4kNv3bkz9Rwn16ESBBDmrD+YXd4aYt02J2SylJt5OpnFtOBGIsIz5Hf8GHaZL49xbjiBWPz+jNap33s2T63RCqZc8sJ4VQhMinmHkBjBk0QzhtPk+OFaiNTSONSW3v2xhaWTEoMxJU6jqsTNMgW6RYaJXTz7Y/r3A3tVPZ2hq/DTcWmotTn+aFLIi9b3VHO6mVtetsVqdzqsU4WtcvDppOghLmbleWnwj+Km1UoTnHI6DGPFQpNtHHR+F3W1BhvC/0CIp3yjqwU59ktlD5WUiIe0OfCft5SPPKjQR2MV/ZFuyMr/GnrFbOveg21Z7pV8BOigxhQx959CB41+ux8cDUR+seSt7KFIEY1JR8yrpJsIv2e28IvEwq0fvJOyu7yYMYXGS5h5Ei9rx1BQpdNo2pD6GoVkoc7P+B7w2VSyLCNhyPVGKhCLqwB2y06PZN3mHxZaaGs7PpKZpX9UrQHNkdJX2DzSTg3ECs3MZ77A66U7KuOz9QVEZglwTpW7pp5ft8Gcs1eqNYnMZGUv7DusMM9xl4RSvimVen0yg/cWhZ1Cx5r/Fgm8fbSw0K8imT7Rc4EUXNCPX2Yq1voEC7ogP8qti3geE/SeX633t3g+oXJ9AY9qXgQlNBBSsVF0eSfQzw4iWNTbWo5c/i5v+4af36Wa3VQZWLco+W6JWUM02V3HIfQlLNBBzdxAxt8wmq3it3oQDTOeztBheyzWkFUvU55h8ZBPWc1HRdsriHShVkGFyKZeqvbyusEsYrgnGDGXTGaT7ylfOmHVkgqsc+e6mEq4qdkBGR9R8CRupErR5aH8ImqWMSRYUFZLYOpW88rTZZgYjelYLTw9fDoP/YvcSDOINaS1a/R42csYV0ZvQcoYN7vU3AMO77+wruteTf2HomavCGME7d9LA463WvJpMzjNHAimF+9VBpb74Y1tRzhbA+w/Nmc2rZsB4V73/HrMyMlt82Mv3tzVoK0uOC3gLFZyXJKTaq3z0CAfmLk0S6Bv2u/+QQoR0qnLAwxw5ncx+lvFJijfcRrpxg92wAzVek1IY3C4+W1RBRmixFBY4Iyrb6oA==
Content-Type: text/plain; charset="iso-8859-1"
MIME-Version: 1.0
X-OriginatorOrg: orange.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MR1PPF6395AA9E6.FRAP264.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: def47a6d-f3f9-40a5-e4f9-08dd766ab672
X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Apr 2025 06:58:05.5888 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 90c7a20a-f34b-40bf-bc48-b9253b6f5d20
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: FIjHvUX8AgxX9U04NmDOTy+yPMcC+EwBbRE6yivmpxnC7MJoYR9xXK6ZYp0DDK2I62pySX1R8CX8sRqcvM6L3AhRgobR4IqeugwK85MhKY4=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PR0P264MB2904
X-TM-AS-ERS: 10.218.35.125-127.5.254.253
X-TM-AS-SMTP: 1.0 c210cC1vdXQzNjUub3JhbmdlLmNvbQ== bW9oYW1lZC5ib3VjYWRhaXJAb 3JhbmdlLmNvbQ==
X-TMASE-Version: DDEI-5.1-9.1.1004-29102.005
X-TMASE-Result: 10--51.870400-10.000000
X-TMASE-MatchedRID: fSYce/2kgDy7REX8b2FriCbixKZRJvnJvHKClHGjjr1vQ1w4VLB58lKE 7f99FnHcTU0nYw36c+Tcv1sBZ/NtL7qTTgHqmFGOtGAwPutv9PUrT6V6InEuVz7JpnLen5simel O0IZKkZ4/2z5u7TubFAIwhzm9NC1T+fwMEFwjV65lmfQm2WX/m5pWgCLYjjT9ktxvVMaWMbC1eX 0jEQ9c6l2ZL0p8x9NlnKB3fdyGk3TE0wVehO9792C5k6NopKxYolVO7uyOCDUcsx3IH4sq3BzlI Yo2TUIbQ/PboKU01e6i158km0j0L24vcRIisBGXhcZp1UvdHVWB381iZ59HqPioIsi7Sa0gCedn jFOfspzeh8MWgFJfn+KtJ8HqKPQg0PQLUH9yN6EMPDZrnvcM9/gWrMZvbmeHojQrbrPpzzq5sqk 1xxsSyGcLCYzjwLP32A+ak7rP4jlUIeWBPbgx+9HnM4Hnu4tT9Ib/6w+1lWRh0Eb5uGGI1FSOym iJfTYXtgm2cLA+SNeEm1sE8Ofsmw7rKhsXnVu6dNedNqLnArxZNYSHk3Zr0QO3/A5KGHP/yPRAw D/3abbu8ukit0IkMEMUzUCEfen+7thx3aWqRParBnUSBU2L84eAntdoMxBaALR/3svM0affc2Xd 6VJ+yvnItl+AaIQwnwsOuiSmqIx4wF+t9wBop2UBEQJYvh8NPxuOLiA4BvmsQIX/xj6Jn9Z5C2t ydwt9FFyos4QuK8O4n012CGbmMaAMxzLI/W2By7wkkAA3Fk2jrlYm3WTU7wTHaede/M0jx4aARM rh3G1CIyKeBKUqgjDljM++ffnJKfSmj2qiztMOxfiA/rhNoUbgTmf4sxQ0mkCGwliFomubKItl6 1J/yeQD/sqqL0mZ9/6tBPDUrmoDBun3ky4wIGNkfhZ/mYm9KrauXd3MZDXwMUUgHNDhDSLiYnjV b876ftwZ3X11IV0=
X-TMASE-SNAP-Result: 1.821001.0001-0-1-22:0,33:0,34:0-0
X-TMASE-INERTIA: 0-0;;;;
X-TMASE-XGENCLOUD: 07ace3f6-44bc-4678-99c3-21090aa04d8b-0-0-200-0
Content-Transfer-Encoding: quoted-printable
Message-ID-Hash: ZXEUKWK4CZFENCKDAYFLO4JCU7WC2RON
X-Message-ID-Hash: ZXEUKWK4CZFENCKDAYFLO4JCU7WC2RON
X-MailFrom: mohamed.boucadair@orange.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-anima.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: "draft-ietf-anima-brski-prm@ietf.org" <draft-ietf-anima-brski-prm@ietf.org>, "anima-chairs@ietf.org" <anima-chairs@ietf.org>, "anima@ietf.org" <anima@ietf.org>, "ietf@kovatsch.net" <ietf@kovatsch.net>, "tte@cs.fau.de" <tte@cs.fau.de>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [Anima] Re: Mohamed Boucadair's Discuss on draft-ietf-anima-brski-prm-18: (with DISCUSS and COMMENT)
List-Id: Autonomic Networking Integrated Model and Approach <anima.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/anima/oYf7Smwq57GQeDM8PXJ4h2wElHM>
List-Archive: <https://mailarchive.ietf.org/arch/browse/anima>
List-Help: <mailto:anima-request@ietf.org?subject=help>
List-Owner: <mailto:anima-owner@ietf.org>
List-Post: <mailto:anima@ietf.org>
List-Subscribe: <mailto:anima-join@ietf.org>
List-Unsubscribe: <mailto:anima-leave@ietf.org>
Hi Steffen, Thanks for the follow-up. Please see inline. Cheers, Med > -----Message d'origine----- > De : Fries, Steffen <steffen.fries@siemens.com> > Envoyé : lundi 7 avril 2025 18:14 > À : BOUCADAIR Mohamed INNOV/NET <mohamed.boucadair@orange.com>; > The IESG <iesg@ietf.org> > Cc : draft-ietf-anima-brski-prm@ietf.org; anima-chairs@ietf.org; > anima@ietf.org; ietf@kovatsch.net; tte@cs.fau.de > Objet : RE: Mohamed Boucadair's Discuss on draft-ietf-anima-brski- > prm-18: (with DISCUSS and COMMENT) > > > Hello Mohamed, > > Thank you for the review and the feedback. > Regarding the nits you sent, we will address them in the next > version of the document. > > I put my comments inline > > Best regards > Steffen > > > -----Original Message----- > > From: Mohamed Boucadair via Datatracker <noreply@ietf.org> > > Sent: Sunday, April 6, 2025 5:04 PM > > Subject: Mohamed Boucadair's Discuss on draft-ietf-anima-brski- > prm-18: > > (with DISCUSS and COMMENT) > > > > > > ---------------------------------------------------------------- > > DISCUSS: > > ---------------------------------------------------------------- > > # DISCUSS > > > > # Unconditional MUST > > > > CURRENT: > > The pledge MUST respond to all requests regardless of the > > Host header field provided by the client (i.e., ignore it). > > > > I don't think that is safe. > > > > I'm afraid this needs some scoping; as there are other > legitimate > > conditions where the pledge doe snot have to reply. > [stf] Based on the existing discussion on this, we opened an issue > on github to align on the solution > (https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2 > Fgithub.com%2Fanima-wg%2Fanima-brski- > prm%2Fissues%2F136&data=05%7C02%7Cmohamed.boucadair%40orange.com%7 > Ceddc725b341946fbca5008dd75ef55af%7C90c7a20af34b40bfbc48b9253b6f5d > 20%7C0%7C0%7C638796392977500974%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU > 1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIs > IldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=6t59MA7TXOc6K8UqDWNIdB4AcNmChZ > kMfunB286iFvQ%3D&reserved=0). The current proposal takes your > suggestion into account: > OLD > The pledge MUST respond to all requests regardless of the Host > header field provided by the client (i.e., ignore it). > > NEW > In the absence of a security policy the pledge MUST respond to all > requests regardless of the Host header field provided by the > client (i.e., ignore it). A security policy may include a rate > limiting for a requests to avoid susceptibility of the pledge to > overload. > > Once aligned, we will include it in the draft [Med] ACK. > > > > # Compliance with HTTP BCP (RFC9205) > > > > CURRENT: > > If the pledge is unable to create the PVR, it SHOULD respond > with an > > HTTP error status code to the Registrar-Agent. The following > client > > error status codes SHOULD be used: > > > > The use of normative language is IMO not compliant with the > guidance > > in RFC9205, about error handling. > [stf] I created a new issue for this: > https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2F > github.com%2Fanima-wg%2Fanima-brski- > prm%2Fissues%2F137&data=05%7C02%7Cmohamed.boucadair%40orange.com%7 > Ceddc725b341946fbca5008dd75ef55af%7C90c7a20af34b40bfbc48b9253b6f5d > 20%7C0%7C0%7C638796392977521493%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU > 1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIs > IldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=i%2B4HkuwPdz9psQko2w%2BKFOo64w > xCycDViH8xn0iO8cc%3D&reserved=0 > From RFC 9205 I understood that we could use the HTTP status codes > in this way > (https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2 > Fdatatracker.ietf.org%2Fdoc%2Fhtml%2Frfc9205%23section- > 4.6&data=05%7C02%7Cmohamed.boucadair%40orange.com%7Ceddc725b341946 > fbca5008dd75ef55af%7C90c7a20af34b40bfbc48b9253b6f5d20%7C0%7C0%7C63 > 8796392977530669%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsI > lYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3 > D%7C0%7C%7C%7C&sdata=30Wv7lV48UnxMlpMa9wQB7ripnoM8kKJ4%2BmYwBvrggY > %3D&reserved=0 ) What would you suggest here? > [Med] A simple fix here is to remove the normative language. Listing the appropriate codes is definitely right, but need to redefine the error codes, just be affirmative. For example, an entity will return 404 when there is no resources, etc. > > > > There are several similar constructs in the document. > > > > # Cluster with 8366bis > > > > CURRENT: > > > > The JSON PVR Data MUST contain the following fields of the > "ietf- > > voucher-request" YANG module as defined in > > [I-D.ietf-anima-rfc8366bis]; > > > > I think this spec should be clustered with 8366bis. There are > several > > structure that used in this document and which depends on what > is defined in 8366bis. > > Changes to the bis will have implications on this one. > > > > With that in mind, I tend to suggest holding approval of this > > specification till we finalize the bis spec. > [stf] As indicated by Michael, we already have a cluster for RFC > 8366bis and further drafts related to BRSKI variants to take care > of mutual influences. I opened an issue > (https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2 > Fgithub.com%2Fanima-wg%2Fanima-brski- > prm%2Fissues%2F138&data=05%7C02%7Cmohamed.boucadair%40orange.com%7 > Ceddc725b341946fbca5008dd75ef55af%7C90c7a20af34b40bfbc48b9253b6f5d > 20%7C0%7C0%7C638796392977539661%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU > 1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIs > IldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=atD1nebKphWi1qh3MFPKoD71vn%2BU > hncvx%2BJ%2Bu0s9fBE%3D&reserved=0) to discuss optimization in > handling of the documents. > > [Med] ACK. > > > > # Requires TLS1.3 > > > > CURRENT: > > As already stated in [RFC8995], the use of TLS 1.3 (or newer) > is > > encouraged. TLS 1.2 or newer is REQUIRED on the Registrar- > Agent > > side. TLS 1.3 (or newer) SHOULD be available on the > registrar, but > > TLS 1.2 MAY be used. TLS 1.3 (or newer) SHOULD be available > on the > > MASA, but TLS 1.2 MAY be used. > > > > Please update to take into to reflect draft-ietf-uta-require- > tls13. > [stf] I saw that there was already discussion on this issue. I > created a corresponding issue as > https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2F > github.com%2Fanima-wg%2Fanima-brski- > prm%2Fissues%2F139&data=05%7C02%7Cmohamed.boucadair%40orange.com%7 > Ceddc725b341946fbca5008dd75ef55af%7C90c7a20af34b40bfbc48b9253b6f5d > 20%7C0%7C0%7C638796392977548468%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU > 1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIs > IldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=WqjjxqsAWc9oufFDjJGYsHRdYK9cku > v2CnKiUb5yHrA%3D&reserved=0 > We will discuss the use of TLS 1.2 and if there is a desire to > also allow or existing pledges, that may have no option to only > allow TLS 1.3, we would add a note as suggested and explain the > necessity. > [Med] ACK. I'm neutral on the outcome here, but I'd like we back the design and include some reasoning if we don't follow the UTA reco. Thanks. > > > > > > ---------------------------------------------------------------- > > COMMENT: > > ---------------------------------------------------------------- > > > > # Consider having a reference figure early in the document with > the > > various entities. > [stf] We currently have the architecture overview figure in > section 5 discussing the solution architecture. To avoid repeating > that figure, would it be fine to essentially reference the figure > from the introduction to guide the reader to the overview? > [Med] Moving that figure early in the document would be better, IMO. > > > # Be consistent through the document about how you expand as > both > > forms are > > used: Xccc Xccc Xcc (XXX) or XXX (Xccc Xccc Xcc). > [stf] okay, we will double check the referencing. Changed > according to proposals in the NITs. > [Med] Thanks. > > > # Entities are functional one: There might be multiple servers, > RAs, > > pledges, etc. Consider fixing this through the document. For > example: > > > > OLD: > > EST in turn > > relies for the authentication and authorization of the > certification > > request on the credentials used by the underlying TLS between > the EST > > client and the EST server. > > NEW: > > EST in turn > > relies for the authentication and authorization of the > certification > > request on the credentials used by the underlying TLS between > the EST > > client and an EST server. > > > > OLD: BRSKI addresses scenarios in which the pledge initiates the > > NEW: BRSKI addresses scenarios in which a pledge initiates the > > > > OLD: > > * introduces the Registrar-Agent as new component to > facilitate the > > communication between the pledge and the domain registrar. > > > > NEW: > > * introduces the Registrar-Agent as new component to > facilitate the > > communication between the pledge and a domain registrar. > > > > OLD: is cryptographically bound to the end entity (EE) > certificate. > > NEW: is cryptographically bound to an end entity (EE) > certificate. > [stf] agree to all of the above. Will be changed accordingly. > > > Etc. > [stf] we will look for further places to ensure openness to > utilize multiple instances > [Med] ACK. > > > # Consider providing an example of non-IP > > > > CURRENT: > > * also enables the usage of alternative transports, both IP- > based > > and non-IP, > > [stf] we discussed connectivity via Bluetooth or NFC and can > include it as example. > Would lead to > NEW > * also enables the usage of alternative transports, both IP- > based > and non-IP (e.g., Bluetooth-based or NFC-based > communication), > > [Med] Thanks. > > # Capability management: > > > > CURRENT > > There may be pledges that can support both modes, initiator > and > > responder mode. In these cases, BRSKI-PRM can be combined > with BRSKI > > as defined in [RFC8995] or BRSKI-AE [I-D.ietf-anima-brski-ae] > to > > allow for more bootstrapping flexibility. > > > > Do we need to expose these capabilities to a management system? > How this can > > be managed/controlled? > [stf] good point, we address this capability exchange options > later on in the discovery section by referencing the ongoing work > on BRSKI-Discovery, but keeping it at a minimum in BRSKI-PRM. The > BRSKI-Discovery discusses solutions for all existing variants of > BRSKI > > Proposal to add after the stated sentence > NEW > Providing information about capabilities of BRSKI components like > the pledge or registrar is handled as part of the discovery. > BRSKI-PRM relies only on a minimum necessary set of capabilities > for the interaction and leaves the definition of more advanced > mechanisms allowing to signal specific capabilities to [I-D.ietf- > anima-brski-discovery]. > [Med] Deal! > > > # Not a definition > > > > CURRENT: > > CSR: Certificate Signing Request. > > > > This is not a definition. May be point to the RFC you cited in > the doc. > [stf] We do this in later sections of the document, but it is good > to also include it here. > OLD > CSR: Certificate Signing Request. > NEW > CSR: Certificate Signing Request, as defined in [RFC2986]. > [Med] Better, thanks. > > > # Resource vs. Endpoint > > > > CURRENT: > > endpoint: Term equivalent to resource in HTTP [RFC9110] and > CoAP > > [RFC7252]. Endpoints are accessible via Well-Known URIs > > [RFC8615]. > > > > For the CoAP mention, this may be confusing as CoAP has also the > concept of > > "Endpoint", which is not identical to resource. > [stf] Do you have a suggestion on how to address potential > confusion here? We tried this already by providing references to > both RFCs, but if there is a clearer way of describing it we could > include it. [Med] I would simply remove the mention of CoAP here. No need to dive into subtleties of endpoint vs. resources for a protocol that is not used as foundation for this work. > > > > # Lack of reference > > > > CURRENT: > > mTLS: mutual Transport Layer Security. > > > [stf] proposal to enhance the description to > OLD > mTLS: mutual Transport Layer Security. > > NEW > mTLS: mutual Transport Layer Security, refers to mutual > authenticated TLS as specified in [RFC 8446]. [Med] ACK. > > > # Unfortunate acronym > > > > PoP: Unfortunate as this one is widely used for Point of > Presence. No need to > > change anything, though. > [stf] hm, that is unfortunate indeed, but proof-of-possession > (PoP) is already used in other RFCs (RFC 7030, RFC 9483) and we > aligned with that terminology. > > > > # Consistency > > > > OLD: Registrar_Agent > > NEW: Registrar-Agent > [stf] good catch, most importantly, it needs to be correct in the > terminology section. Changed as suggested. > [Med] ACK > > > # Mysterious > > > > CURRENT: Requirements Discussion and Mapping to Solution- > Elements > > > > What does Solution-Elements mean? > [stf] In the discussion we handled solution elements as "parts of > the solution" like the introduction of the registrar-agent as new > component or the reliance on self-contained objects, enhancements > of assertion types in the voucher etc. If you have a proposal for > a better name, we could change it. > [Med] Thanks for clarifying. I think I would s/Solution-Element/BRSKI-PRM Functional Entities or similar. > > > # Thanks! > > > > CURRENT: > > An abstract overview of the BRSKI-PRM protocol can be found > on slide > > 8 of [BRSKI-PRM-abstract]. > > > > That figure is helpful. I didn't checked though that all the > steps are still > > valid in the latest version of the spec. I trust you have done > that check. > [stf] yes, the steps are still fine. We did no include the details > on the data objects but the exchanges are still valid. > [Med] Thank you for confirming. > > # Outsource Key Infrastructure > > > > This is currently drawn within the customer domain. Can this be > > outsourced/external to the customer domain? > [stf] The intention was to show the supporting infrastructure on > the customer side without including the operational model. So the > PKI may be customer operated or provided to the customer as > service. > [Med] Please consider clarifying this in the ops section. Thanks. > > > # HTTP(S) > > > > CURRENT: the pledge and the Registrar-Agent is assumed to be > HTTP(S) > > > > In which case the non-secure mode is allowed? > [stf] The communication between the pledge and the registrar-agent > is protected by relying on self-contained objects for the > integrity protection. So it is not "non-secured". TLS is intended > to provide confidentiality protection if needed. As the pledge in > BRSKI-PRM would act as server, it needs a certificate (this is at > least what we targeted for BRSKI-PRM) to authenticate accordingly. > This comes with certain boundary conditions for the handling, > which we put together in Annex B: > https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2F > www.ietf.org%2Farchive%2Fid%2Fdraft-ietf-anima-brski-prm- > 18.html%23pledgehttps&data=05%7C02%7Cmohamed.boucadair%40orange.co > m%7Ceddc725b341946fbca5008dd75ef55af%7C90c7a20af34b40bfbc48b9253b6 > f5d20%7C0%7C0%7C638796392977557238%7CUnknown%7CTWFpbGZsb3d8eyJFbXB > 0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpb > CIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=SrqZXhjTBSJ46GqTwXsZosseJnV > guVWUAGycpA9hgUI%3D&reserved=0 [Med] Thanks. > > > # Group OPS considerations in one single section > > > > Consider moving the following to the OPS cons section: > > > > CURRENT: > > The benefits of BRSKI-PRM can be achieved even without the > > operational complexity of stand-alone Registrar-Agents by > integrating > > the necessary functionality of the Registrar-Agent as a > module into > > the domain registrar as shown in Figure 3 so that it can > support the > > BRSKI-PRM communications to the pledge. > > [stf] Good idea! Included the following in the Ops Con section: > NEW > As outlined in {{colo-regagt}} the functional support of BRSKI-PRM > can also be achieved using a Registrar-Agent co-located with the > Registrar instead of a stand-alone Registrar-Agent, which may > reduce operational complexity. > > > > And > > > > CURRENT > > Overall, this may have > > operational implications when the registrar is part of a > scalable > > framework as described in Section 1.3.1 of > > [I-D.richardson-anima-registrar-considerations]. > [stf] The reference to [I-D.richardson-anima-registrar- > considerations] is already contained in the Ops Con. > So I would propose to move the sentence as suggested to the Ops > Con section as following to keep the context: > NEW > Requirements to the utilized credentials authenticating and > artifact signatures on the registrar as outlined in Section 6.3 > may have operational implications when the registrar is part of a > scalable framework as described in Section 1.3.1 of [I- > D.richardson-anima-registrar-considerations]. > [Med] This is an enhancement as we do have one reference section to look at for these important matters. > > # Need concrete behavior > > > > CURRENT: Further, the Registrar-Agent SHOULD have synchronized > time. > > > > Should we provide more concrete behavior here? > [stf] We have certain considerations added for the pledge, that > may have no synchronized time, but not for the registrar-agent. > I created an issue > (https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2 > Fgithub.com%2Fanima-wg%2Fanima-brski- > prm%2Fissues%2F140&data=05%7C02%7Cmohamed.boucadair%40orange.com%7 > Ceddc725b341946fbca5008dd75ef55af%7C90c7a20af34b40bfbc48b9253b6f5d > 20%7C0%7C0%7C638796392977566988%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU > 1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIs > IldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=A%2FAsfvGfLwEjULaUAA9sVInsIUus > BFyB3u8Uuk%2Ff9k8%3D&reserved=0) to discuss the further approach > as there exist different options > [Med] ACK. > > > # Non-discovery > > > > CURRENT: > > 6.1.1. Discovery of the Registrar > > > > This is more about non-discovery :-) > > > > Consider changing to "Explicit Configuration of Registrars" > [stf] Well, besides the configuration, there is also the reference > to the standard discovery approach as already specified in RFC > 8995 and the pointer to the BRSKI discovery draft for a more > flexible discovery my feeling is it would be good to keep the > naming. > [Med] Let' not change then. > > > # hostname and intermittent connectivity > > > > CURRENT: > > While the Registrar-Agent requires the IP address of the > domain > > registrar to initiate a TLS session, a separate discovery of > the > > registrar is likely not needed and a configuration of the > domain > > registrar IP address or hostname is assumed. > > > > How to reconcile this with the intermittent connectivity > condition mentioned > > early in the document, including with a name resolution service > which may not > > be reachable? > > > > BTW, multiple IP addresses may be available. Consider updating > to: > > > > NEW: > > While the Registrar-Agent requires an IP address of the > domain > > registrar to initiate a TLS session, a separate discovery of > the > > registrar is likely not needed and a configuration of the > domain > > registrar IP address or hostname is assumed. > [stf] I would be fine with the suggested text. > [Med] OK. > > > # Configurable knobs > > > > CURRENT: > > In the absence of a more general discovery as defined in > > [I-D.ietf-anima-brski-discovery] the Registrar-Agent MUST use > > > > Do we need to have a control parameter here to instruct the > behavior of the RA? > [stf] This is covered in the referenced draft. It allows to > discover the functionality of the registrar with much more details > about operational mode, encoding options, etc. > Would you suggest to provide a sentence that the discovery may be > a configuration item of the Registrar-Agent. I had assumed this is > already implicitly given through the existing formulation, but > explicit may be better. [Med] Adding that sentence would be may preference here as a reader. > > > The same applies for the following: > > > > CURRENT: > > A nonceless voucher MAY be accepted as in [RFC8995] if > allowed by the > > pledge implementation of the manufacturer. > [stf] As above, the suggestion is to include a sentence that the > manufacturer may opt to have this as configuration item? > [Med] Yeah. Thanks. > > > # Expired I-Ds > > > > CURRENT: e.g., as proposed in [I-D.richardson-emu-eap- > onboarding]. > > > > I suggest to remove citations of expired individual I-Ds. > [stf] Yes, we could remove it as it is just intended as example. > Will double check with Michael if there will be an update of the > draft > [Med] Thank you. > > # "MUST ...unless" constructs should be "SHOULD ...unless" > > > > OLD: > > To enable interaction as responder with the Registrar-Agent, > pledges > > in responder mode MUST act as servers and MUST provide the > endpoints > > defined in Table 1 within the BRSKI-defined /.well- > known/brski/ URI > > path, except for the OPTIONAL endpoint "qps". The endpoints > are > > defined with short names to also accommodate for resource- > constrained > > devices. > > > > NEW: > > To enable interaction as responder with a Registrar-Agent, > pledges > > in responder mode MUST act as servers and SHOULD provide the > endpoints > > defined in Table 1 within the BRSKI-defined /.well- > known/brski/ URI > > path, except for the OPTIONAL endpoint "qps". The endpoints > are > > defined with short names to also accommodate for resource- > constrained > > devices. > [stf] Hm, for compliance with BRSKI-PRM we require the support of > the two stated endpoints in Table 1 to ensure they can be trigger. > [Med] The issue here is that MUST is an absolute required, while this case we have an exception (unless..). FWIW, 2119 has the following: 1. MUST This word, or the terms "REQUIRED" or "SHALL", mean that the definition is an absolute requirement of the specification. 3. SHOULD This word, or the adjective "RECOMMENDED", mean that there may exist valid reasons in particular circumstances to ignore a particular item, but the full implications must be understood and carefully weighed before choosing a different course. > > (also s/the/a) > [stf] done in the original text > [Med] Thanks. > > > # Redundant language (many occurrences in the text) > > > > OLD: Optionally, TLS MAY be used to provide transport security > > NEW: TLS MAY be used to provide transport security > [stf] Thank you, done as suggested for all occurrences. > [Med] ACK > > > # TTL > > > > CURRENT: > > Note that the pledge provisionally accepts the registrar EE > > certificate contained in the tPVR until it receives the > voucher (see > > Section 5.4). > > > > Shouldn't that be TTLed as well for better security control? > [stf] Good point we need to discuss this to avoid a dead lock of > the pledge. As the situation is different to the TLS connection in > BRSKI we may add some further clarification. Created issue for > discussion > https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2F > github.com%2Fanima-wg%2Fanima-brski- > prm%2Fissues%2F142&data=05%7C02%7Cmohamed.boucadair%40orange.com%7 > Ceddc725b341946fbca5008dd75ef55af%7C90c7a20af34b40bfbc48b9253b6f5d > 20%7C0%7C0%7C638796392977575689%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU > 1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIs > IldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=gfUuod7F2FJm3CQbFDHGctbqROf%2F > yuDeMubdxf4perM%3D&reserved=0 > [Med] ACK. > > > # Inappropriate use of normative language > > > > CURRENT: > > The following assumes that a Registrar-Agent MAY need to > query the > > overall status of a pledge. > > > > This is an assumption, s/MAY/may > [stf] yes, true. Changed to lower case. > [Med] ACK. > > > # Rate-limit log actions > > > > CURRENT: > > The registrar SHOULD log certain events to provide an audit > trail for > > the onboarding of pledges into its domain. > > > > In order to protect the registrar from overload attacks, > consider adding a > > rate-limit guard for logging the same event. > [stf] Added the following at the end of the section > NEW > In order to protect the registrar from overload attacks, a rate- > limiting may be used by logging events from the same type just > once. > [Med] Looks good to me. > > # Missing IANA action > > > > CURRENT: IANA has registered the following service names > > > > Please ad an action for IANA to update that entry. Thanks. > [stf] We've got the following information from IANA: > "The actions requested in this document will not be completed > until the document has been approved for publication as an RFC. > This message is meant only to confirm the list of actions that > will be performed." > Are there additional actions necessary? > [Med] No, just save a question from IANA in the future when they well implement the actions. Add a sentence to say basically what I had in my comment. Thanks. > > # You are allowed to not use the template! > > > > CURRENT: > > The use of YANG to define data structures via the [RFC8971] > > "structure" statement, is relatively new and distinct from > the common > > use of YANG to define an API accessed by network management > protocols > > such as NETCONF [RFC6241] and RESTCONF [RFC8040]. For this > reason, > > these guidelines do not follow the template described by > Section 3.7 > > of [RFC8407] (Security Considerations). > > > > You can delete this text. 8407bis have the required provisions > for you :-) > > > > Documents that define exclusively modules following the > extension in > > [RFC8791] are not required to include the security template > in > > Section 3.7.1. Likewise, following the template is not > required for > > modules that define YANG extensions such as [RFC7952]. > [stf] Updated the text as suggested > [Med] Thanks > > > > > Hope this helps. > [stf] definitely, again thanks for the review. > > > > Cheers, > > Med > > > > ____________________________________________________________________________________________________________ Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration, Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci. This message and its attachments may contain confidential or privileged information that may be protected by law; they should not be distributed, used or copied without authorisation. If you have received this email in error, please notify the sender and delete this message and its attachments. As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified. Thank you.
- [Anima] Mohamed Boucadair's Discuss on draft-ietf… Mohamed Boucadair via Datatracker
- [Anima] Re: Mohamed Boucadair's Discuss on draft-… Michael Richardson
- [Anima] Re: Mohamed Boucadair's Discuss on draft-… mohamed.boucadair
- [Anima] Re: Mohamed Boucadair's Discuss on draft-… Fries, Steffen
- [Anima] Re: Mohamed Boucadair's Discuss on draft-… mohamed.boucadair
- [Anima] Re: Mohamed Boucadair's Discuss on draft-… Fries, Steffen
- [Anima] Re: Mohamed Boucadair's Discuss on draft-… mohamed.boucadair
- [Anima] Re: Mohamed Boucadair's Discuss on draft-… Fries, Steffen
- [Anima] Re: Mohamed Boucadair's Discuss on draft-… mohamed.boucadair
- [Anima] Re: Mohamed Boucadair's Discuss on draft-… Fries, Steffen