Re: [auth48] AUTH48: RFC-to-be 9525 <draft-ietf-uta-rfc6125bis-15> for your review

Peter Saint-Andre <stpeter@stpeter.im> Mon, 06 November 2023 20:43 UTC

Return-Path: <stpeter@stpeter.im>
X-Original-To: auth48archive@ietfa.amsl.com
Delivered-To: auth48archive@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1C6ADC18FCB7; Mon, 6 Nov 2023 12:43:49 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.806
X-Spam-Level:
X-Spam-Status: No, score=-2.806 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=stpeter.im header.b="nDgeyWog"; dkim=pass (2048-bit key) header.d=messagingengine.com header.b="DDA7WYKR"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5hK52J3IG0BK; Mon, 6 Nov 2023 12:43:45 -0800 (PST)
Received: from out1-smtp.messagingengine.com (out1-smtp.messagingengine.com [66.111.4.25]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E1ADAC18FCAE; Mon, 6 Nov 2023 12:43:44 -0800 (PST)
Received: from compute2.internal (compute2.nyi.internal [10.202.2.46]) by mailout.nyi.internal (Postfix) with ESMTP id 862475C0061; Mon, 6 Nov 2023 15:43:40 -0500 (EST)
Received: from mailfrontend1 ([10.202.2.162]) by compute2.internal (MEProxy); Mon, 06 Nov 2023 15:43:40 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=stpeter.im; h=cc :cc:content-transfer-encoding:content-type:content-type:date :date:from:from:in-reply-to:in-reply-to:message-id:mime-version :references:reply-to:sender:subject:subject:to:to; s=fm1; t= 1699303420; x=1699389820; bh=owSU+5+S/HnNgJri64ZOUww0R+wmC+Nu/dD ADVJCQGs=; b=nDgeyWogF+lJR0sGxEh5/qfEAtvvQ7wre3XxHPC9pq4KdzKOeUY N3iFokQmU3GotireW9QqqWczFScF6U145q/FKG9NB0oAG9ToJeHJyyd61Ixd19wb LC+Ov115vzhsSwTb7qUdmdi1SwaqoGw43PEm2piPi7mwiMNXiBtCXfVkWjtOeO5m 7CG8EUyIRdrh9Fzl5hPOeuwfPcOdYcJzmkj0k24yCtzaxCgWZ6nCLORYdxjufK1t BDoF0oiyOCYU9eULNOhqjQyp4x+M2I++iBbSYNZyCY9mR6vXy/BQlELhP57DpSic ZizyB/6xmA4u2hi8gGvMtegrDoMt1ehIlOw==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:cc:content-transfer-encoding :content-type:content-type:date:date:feedback-id:feedback-id :from:from:in-reply-to:in-reply-to:message-id:mime-version :references:reply-to:sender:subject:subject:to:to:x-me-proxy :x-me-proxy:x-me-sender:x-me-sender:x-sasl-enc; s=fm3; t= 1699303420; x=1699389820; bh=owSU+5+S/HnNgJri64ZOUww0R+wmC+Nu/dD ADVJCQGs=; b=DDA7WYKRFm6qZJiecCLMjoPKeJ9x99fX15HjsVR48LgTp8xjEjL +rXTe6o7D3i8NF7pWk9bSBlVfpej4kKmIs9vS69VzQ5v+uA9lr+w1xz/fV3nJKOC Wpxg0Z7qfkD04DfYeAkKNke7orfWInz1NwTG4QDk3qZzdLa1bSCjxXGhloS5/GBE +o0owKoVsuWtm5M0fF6cn9IPgUcsYiBZPC5vVeCFV8MUdSCbNc9uVVUy1WZmobw1 rGwlaPWXcv4//4gcvyAhKb16+m0uRzNoBH4tYvoSo0xi5bBt38Mv4FbE4F5KUA90 RN44UZuPbiucwx2vtiWJIQzDwRchXIgpx7g==
X-ME-Sender: <xms:_E9JZVX3NLsgeKRErRmYKcQWnA6tbPKtXB8I4OPdNe4sYfrIjTu-dA> <xme:_E9JZVnJFUypOy9sSZCkQevEZ1gBqNKsbz62XLMmTrgNrGv9-0_4f7GauHyihVo_F sQJzZtcSXJ3bETJYg>
X-ME-Received: <xmr:_E9JZRYJmbtDDNTTFBhUl5VewoQSiFeWVPgNOLPAQ7V8m0fhub_uLUScJnVEENqm>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvkedruddugedgudefkecutefuodetggdotefrod ftvfcurfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfgh necuuegrihhlohhuthemuceftddtnecusecvtfgvtghiphhivghnthhsucdlqddutddtmd enfghrlhcuvffnffculddqfedmnecujfgurhepkfffgggfuffvvehfhfgjtgfgsehtkeer tddtvdejnecuhfhrohhmpefrvghtvghrucfurghinhhtqdetnhgurhgvuceoshhtphgvth gvrhesshhtphgvthgvrhdrihhmqeenucggtffrrghtthgvrhhnpedtgeeuieelgeehgefh hfdvfeeuvdehveethfegvdefveduueduvddvieehffdvvdenucffohhmrghinheprhhftg dqvgguihhtohhrrdhorhhgpdhgihhthhhusgdrtghomhdpuhhrlhguvghfvghnshgvrdgt ohhmpdhnihhsthdrghhovhenucevlhhushhtvghrufhiiigvpedtnecurfgrrhgrmhepmh grihhlfhhrohhmpehsthhpvghtvghrsehsthhpvghtvghrrdhimh
X-ME-Proxy: <xmx:_E9JZYUOfhdrFG4O044oAdv3PppLoeZjslO02XDeHXIfDjtC6TfPWw> <xmx:_E9JZflwlzaCEusY5sGSGtvEkMzHUqqBF6jP765zu9yZvW74VtOHHA> <xmx:_E9JZVdsbeLV9fyaIzdP8drCcccKzlwk_oz-CCG4KpsxioyaEIrZUQ> <xmx:_E9JZdVb2AvNS74iFLJynQvaHCb2_usxFfbNo_UrHHjK98g4YyKcKQ>
Feedback-ID: i24394279:Fastmail
Received: by mail.messagingengine.com (Postfix) with ESMTPA; Mon, 6 Nov 2023 15:43:39 -0500 (EST)
Message-ID: <f523394f-bc01-4435-bcda-87edb2ea0d4a@stpeter.im>
Date: Mon, 06 Nov 2023 13:43:38 -0700
MIME-Version: 1.0
User-Agent: Mozilla Thunderbird
Content-Language: en-US
To: Karen Moore <kmoore@amsl.com>, "Salz, Rich" <rsalz@akamai.com>, "paul.wouters@aiven.io" <paul.wouters@aiven.io>, Orie Steele <orie@transmute.industries>
Cc: "rfc-editor@rfc-editor.org" <rfc-editor@rfc-editor.org>, "uta-ads@ietf.org" <uta-ads@ietf.org>, "uta-chairs@ietf.org" <uta-chairs@ietf.org>, "auth48archive@rfc-editor.org" <auth48archive@rfc-editor.org>
References: <20231030161554.3447BE5337@rfcpa.amsl.com> <dad38a2d-a875-4193-ba12-8c847b0a4bda@stpeter.im> <CAN8C-_+NeH8y29RCXOoPtuPH_j=maNWmhRAaRFqo4t3=9nPKtQ@mail.gmail.com> <C0362DB3-9D2E-4C80-A52B-B01BFF07DED9@akamai.com> <35dc5a70-f127-4537-82d8-e2099dc68bf9@stpeter.im> <A5A993F4-7F78-4748-9F5A-F9007E4CEFA4@amsl.com> <05bb9527-54df-402c-b33f-8da034dcc26c@stpeter.im> <5941f9da-053f-49bf-9f9b-b035c386dd92@stpeter.im> <385C8A5D-D2EF-47DE-9D86-52CBEAFAACDD@amsl.com>
From: Peter Saint-Andre <stpeter@stpeter.im>
Autocrypt: addr=stpeter@stpeter.im; keydata= xsFNBFETDzsBEAC0FOv1N3ZJzIIxN6cKD475KVS9CHDPeYpegcOIPnL5eY1DCHeh/IwS1S7R CePtmiybNoV9FsI4PKUknzXQxA6LVEdAR/LUlhgJKjq+gsgp8lqbEILhg13ecH66HwLS9rar bQkC47T7kL8miIPBFC6E3A4Lq1L+eueO6UcLhKgoYkMxOjdiWrMgKTnVpch5ydLkPm/z0Zo8 zRgqlPuTLeCrXXZYnjHXLVFN2xy04UzOs7P5u5KVfx5Z7uQisr8pXtyLd6SpTZo6SHgKBv15 uz0rqXhsJojiGtOXfWznAjaS5FUOORq9CklG5cMOUAT8TNftv0ktsxaWDL1ELDVQPy1m7mtz o+VREG+0xmU6AjMo/GHblW1UU7MI9yCiuMLsp/HLrFuiosqLVZ85wuLQ2junPe3tK8h15Ucx IXAcpQ1VqIaDQFbeuLOXJTF8YHpHdpHYt/ZM1ll7ZBKGAo8yd7uF7wJ9D3gUazwdz9fFjWV7 oIk7ATwOlFllzmWDn+M2ygbHOGUGMX5hSaa8eDSieiR2QoLdn27Fip7kMBTJ2+GISrfnJTN/ OQvmj0DXXAdxHmu2C4QgmZbkge35n129yzXn9NcqzrGLroV62lL3LgX6cSbiH5i7GgWY6CAP b1pMogV0K475n9FvOSDRiG4QSO5yqKiA3OP5aKrIRp2TNAk4IwARAQABzSZQZXRlciBTYWlu dC1BbmRyZSA8c3RwZXRlckBzdHBldGVyLmltPsLBeQQTAQIAIwUCURMPOwIbAwcLCQgHAwIB BhUIAgkKCwQWAgMBAh4BAheAAAoJEOoGpJErxa2p6bgQAKpxu07cMDOLc4+EG8H19NWXIVVy bOEvfGuHYZaLKkPrhrMZwJiOwBpyISNRt9qzX1eLCVaojaoEVX6kD8MGc5zKFfiJZy3j7lBW l+Ybr7FfXYy2BbAXKx49e1n6ci9LmBrmVfAEaxtDNPITZ9N9oUAb9vS0nrG036EwteEHAveQ vlDjO7lhz6+Cv7lZQgBj9rZ6khfcQ4S3nSCQaKLQ9Iav4fqxI7SfuPKnx6quHX3JNLGnVo3w l+j/foCK0iTrmtHxCI3kc/bx6g32pRjHEPX0ALMBhmzU2uca+TE0zCEC96mgYXAUCwdnCFWy beIEbt6pz65iML13kAVAq0H/GqncnMGN0MbOatnw1Tdz/vkLojIy7QbPcQ0plUFxv5491xPf IrHhOWdRXp6WUt88fcqhT6MHZpVRtusj2ornKVVn+Y0GLsMMCTcrXJRG7Ao1YV72t/pJpzfG WSaaxolxDIZ6B+76jrIhUhiWgo/4nf+DN6BIlCZQ6j6xxjjx462cu02kuhIILTk2pzaMOufT BWx0uJhZk/KP2Fay/41pX7pvVOwRC4uIlKsLnJKLPS7EDa4BUUxENfd/9LqOGwlII8BbSe98 PLMI8sXkcigc3UXMVda9ll0YhQa+lbP1NaszmnBhwuiCsgnPGbImsJuRzgEEgckwP/dNeyr6 MlFMyfaezsFNBFETDzsBEADBzOsEHpUmhkRUjH9Tek87dn5P/Yh/L/HptgCGk40TL/C+kYdk d3HyteMEf061PNmsS/Rq8k37Fu3VODYb9SPYKxtgksKSYUtIkPKvao09K9QNWPqyWuNf0F+i AjVMUudaEVFJ7bHF310RDwLY5IvLeCXxtvG+Vv/i+g77d2WdPDp+zLJ8306C4yBKjSJV8xW0 cn2fd7NviIEN6cNHTsZNDZVMlgYPrxnwSq8GTEPGC7HsLIwGcx3hIe9QjnPw9CpAmQENpDEy WcxgF5uwo2NJECoDswKz1Nb0gfawF3ZIbD+GcLujTu94iJuVg25jATWm9wTgcfZo4UPllRGX dIb8uWwUFQlLQgd4ROLZZtXNGmHIymJrV2crx53gxup+1j0XqhlzKg8xbImWhEfS9oHZkRK8 VHgmWSIt7TNwNir6N5j3lqwWVBhnu6GzF01sKGNySlqNRbd0fqhakCkK71b8ot8tYTcYG5Lg 10z6HTbgQx2UwLthUjqbblDQ+GLmrOhiWklLXRsnlnPMwnEyFePAnsT5tasy2Cn9qjpttNDa h7PB8iFUi9mtTF/XDVgpFaB5G3CDV7Q2NgbAI6g6QhLIAmXzSP635G83mda0TKXHQXHDyLJT Tn+WVFU7t4m4uLt+0DsWU8jXHQWyUTNG9WPUrXhusDUAPHxFCQ/n/lQVBwARAQABwsFfBBgB AgAJBQJREw87AhsMAAoJEOoGpJErxa2pqfgP/ApN+TRu2bBIgaw1dr3AznSSha84DIpXUDh3 udZvQrGbUtz8/mA+e3iZEN/cmmBw2LGlAuQoJNILTZQ318yTP+E5QU7fJH7FVsohUyvrMfyt 3IMA9jg0Z9MuloLezvIjjMfFeNa0ROgDb/ubOT7JQzi1kwN8Lu3lO80HwqBHXEeOLoislUSn ZajRKvITbKWkZ6PHRjlMw1Wk4oIi6VLHgGgj79zzL3uhML2663m7imShvz1QcHTwvyR5i8cZ bNOEkotZyERiA1p7YHuruS+QvTi3ZPoQbnMUB3a7py9d11bw1+w3LiAUGZE/z5hBWOFxYtw+ w/U/Vx0BwJGYlwU3M2W20uEXe+qxz7wnakygKjmLiD2z4njfKjcNCiV3FmXrpmWgADln1c4j fxDh0NrndrsM8FPDf1TMPtOZgFDkKripc9xkZ/25P6xn27oTOHWKcAC0QhxSH+HuVBBRk8Ag F+zAbDZe4/L6+kanSrycIXW+wCzwBq61aWsz2QhhuKjozVkhk4dRG+CfjzAFjnyxwYERn3uX VKQAwTwcdNcTI9RV98IsNrw9Y4lJEAg6CjNPmiD5+EASycqaOuToRSGukr8sOQLWLPyTnez/ aG8Xf7a+fntWzK2HuDYoSDhJJrylWw/lMklOBm4wtMeNA0zcQH6AQV/GzQVQkSGqrLuMVIV/
In-Reply-To: <385C8A5D-D2EF-47DE-9D86-52CBEAFAACDD@amsl.com>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/auth48archive/2ZKNuzu_susltOVxOAMO8rzJVp0>
Subject: Re: [auth48] AUTH48: RFC-to-be 9525 <draft-ietf-uta-rfc6125bis-15> for your review
X-BeenThere: auth48archive@rfc-editor.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Archiving AUTH48 exchanges between the RFC Production Center, the authors, and other related parties" <auth48archive.rfc-editor.org>
List-Unsubscribe: <https://mailman.rfc-editor.org/mailman/options/auth48archive>, <mailto:auth48archive-request@rfc-editor.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/auth48archive/>
List-Post: <mailto:auth48archive@rfc-editor.org>
List-Help: <mailto:auth48archive-request@rfc-editor.org?subject=help>
List-Subscribe: <https://mailman.rfc-editor.org/mailman/listinfo/auth48archive>, <mailto:auth48archive-request@rfc-editor.org?subject=subscribe>
X-List-Received-Date: Mon, 06 Nov 2023 20:43:49 -0000

Thanks, Karen and Alanna.

I approve of publication.

Peter

On 11/6/23 1:27 PM, Karen Moore wrote:
> Hi Peter, Rich, and *Paul (AD),
> 
> Thank you for the updated XML file and your comments.  Our files now reflect these changes. Please review and let us know if any additional updates are needed or if you approve the document in its current form. We will await approvals from each author prior to moving forward in the publication process.
> 
> *Paul, thank you for confirming that the most recent changes submitted by Peter (on 11/3/23) are okay; we noted your approval on the AUTH48 status page for this document.
> 
>> On Nov 4, 2023, at 2:58 PM, Paul Wouters <paul.wouters=40aiven.io@dmarc.ietf.org> wrote:
>>
>> Thanks did the explanations Peter.
>>
>> All changes Peter proposed are fine with me then.
>>
>> Paul
> 
> 
> 
> FILES (please refresh)
> 
> The updated XML file is here:
> https://www.rfc-editor.org/authors/rfc9525.xml
> 
> The updated output files are here:
>   https://www.rfc-editor.org/authors/rfc9525.txt
>   https://www.rfc-editor.org/authors/rfc9525.pdf
>   https://www.rfc-editor.org/authors/rfc9525.html
> 
> This diff file shows all changes made during AUTH48:
>   https://www.rfc-editor.org/authors/rfc9525-auth48diff.html
> 
> These diff files show only the changes made during the last editing round:
>   https://www.rfc-editor.org/authors/rfc9525-lastdiff.html
>   https://www.rfc-editor.org/authors/rfc9525-lastrfcdiff.html
> 
> This diff file shows all changes made to date:
>   https://www.rfc-editor.org/authors/rfc9525-diff.html
> 
> For the AUTH48 status of this document, please see:
>   https://www.rfc-editor.org/auth48/rfc9525
> 
> Best regards,
> RFC Editor/kc
> 
> 
>> On Nov 3, 2023, at 5:16 PM, Peter Saint-Andre <stpeter@stpeter.im> wrote:
>>
>> Hi everyone,
>>
>> I've completed a final reading of the document. I would like to make the following small stylistic and consistency changes, which are reflected in the attached XML file.
>>
>> OLD
>>
>>    This document defines procedures for how clients do this
>>    verification.  It therefore defines requirements on other parties,
>>    such as the certification authorities that issue certificates, the
>>    service administrators requesting them, and the protocol designers
>>    defining how things are named.
>>
>> NEW
>>
>>    This document defines procedures for how clients perform this
>>    verification.  It therefore defines requirements on other parties,
>>    such as the certification authorities that issue certificates, the
>>    service administrators requesting them, and the protocol designers
>>    defining interactions between clients and servers.
>>
>> OLD
>>
>>    reference identifier:  An identifier used by the client when
>>       examining presented identifiers.  It is constructed from the
>>       source domain and, optionally, an application service type.
>>
>> NEW
>>
>>    reference identifier:  An identifier expected by the client when
>>       examining presented identifiers.  It is constructed from the
>>       source domain and, optionally, an application service type.
>>
>> OLD
>>
>>    The Common Name RDN MUST NOT be used to identify a service because it
>>    is not strongly typed (essentially free-form text) and therefore
>>    suffers from ambiguities in interpretation.
>>
>> NEW
>>
>>    The Common Name RDN MUST NOT be used to identify a service because it
>>    is not strongly typed (it is essentially free-form text) and
>>    therefore suffers from ambiguities in interpretation.
>>
>> OLD
>>
>>    An IP address that is the result of a DNS query is not direct.  Use
>>    of IP-IDs that are not direct is out of scope for this document.
>>
>> NEW
>>
>>    An IP address that is the result of a DNS query is indirect.  Use
>>    of IP-IDs that are indirect is out of scope for this document.
>>
>> OLD
>>
>>    This section defines how protocol designers should reference this
>>    document, which would typically be a normative reference in their
>>    specification.  Its specification MAY choose to allow only one of the
>>    identifier types defined here.
>>
>> NEW
>>
>>    This section defines how protocol designers should reference this
>>    document, which would typically be a normative reference in their
>>    specification.
>>
>>    A specification MAY choose to allow only one of the identifier
>>    types defined here.
>>
>> OLD
>>
>>    If the technology does not use DNS SRV records to resolve the DNS
>>    domain names of application services, then its specification MUST
>>
>> NEW
>>
>>    If the technology does not use DNS SRV records to resolve the DNS
>>    domain names of application services, then the specification MUST
>>
>> OLD
>>
>>    If the technology does not use URIs to identify application services,
>>    then its specification MUST state that URI-ID as defined in this
>>
>> NEW
>>
>>    If the technology does not use URIs to identify application services,
>>    then the specification MUST state that URI-ID as defined in this
>>
>> OLD
>>
>>    3.  If the service using the certificate deploys a technology for
>>        which the relevant specification stipulates that certificates
>>        should include identifiers of type SRV-ID (e.g., this is true as
>>        described in [XMPP]), then the certificate SHOULD include an SRV-
>>
>> NEW
>>
>>    3.  If the service using the certificate deploys a technology for
>>        which the relevant specification stipulates that certificates
>>        should include identifiers of type SRV-ID (e.g., this is true of
>>        the Extensible Messaging and Presence Protocol (XMPP) as
>>        described in [XMPP]), then the certificate SHOULD include an SRV-
>>
>> OLD
>>
>>    4.  If the service using the certificate deploys a technology for
>>        which the relevant specification stipulates that certificates
>>        should include identifiers of type URI-ID (e.g., this is true of
>>        [SIP] as specified by [SIP-CERTS]), then the certificate SHOULD
>>
>> NEW
>>
>>    4.  If the service using the certificate deploys a technology for
>>        which the relevant specification stipulates that certificates
>>        should include identifiers of type URI-ID (e.g., this is true of
>>        the Session Initiation Protocol [SIP] as specified by [SIP-
>>        CERTS]), then the certificate SHOULD
>>
>> OLD
>>
>>    Consider an instant messaging (IM) server that is compatible with the
>>    Extensible Messaging and Presence Protocol (XMPP) at the host
>>
>> NEW
>>
>>    Consider an XMPP-compatible instant messaging (IM) server at the host
>>
>> OLD
>>
>>    If a service provider offers multiple application service types and
>>    wishes to limit the applicability of certificates using SRV-IDs or
>>    URI-IDs, they SHOULD request that multiple certificates rather than a
>>
>> NEW
>>
>>    If a service provider offers multiple application service types and
>>    wishes to limit the applicability of certificates using SRV-IDs or
>>    URI-IDs, it SHOULD request that multiple certificates rather than a
>>
>> OLD
>>
>>    If a service provider offers multiple application service types and
>>    wishes to limit the applicability of certificates using SRV-IDs or
>>    URI-IDs, they SHOULD request that multiple certificates rather than a
>>    single certificate containing multiple SRV-IDs or URI-IDs each
>>    identify a different application service type.  This rule does not
>>
>> NEW
>>
>>    If a service provider offers multiple application service types and
>>    wishes to limit the applicability of certificates using SRV-IDs or
>>    URI-IDs, they SHOULD request multiple certificates rather than a
>>    single certificate containing multiple SRV-IDs or URI-IDs that each
>>    identify a different application service type.  This rule does not
>>
>> OLD
>>
>>    2.  The server provides its identifiers in the form of a PKIX
>>        certificate.
>>
>> NEW
>>
>>    2.  The server provides its presented identifiers in the form of a
>>        PKIX certificate.
>>
>> OLD
>>
>>    3.  The client checks each of its reference identifiers against the
>>        presented identifiers for the purpose of finding a match.  When
>>
>> NEW
>>
>>    3.  The client checks each of its reference identifiers against the
>>        server's presented identifiers for the purpose of finding a
>>        match.  When
>>
>> OLD
>>
>>    The client MUST construct a list of acceptable reference identifiers
>>    and MUST do so independently of the identifiers presented by the
>>    service.
>>
>> NEW
>>
>>    The client MUST construct a list of acceptable reference identifiers
>>    and MUST do so independently of the identifiers presented by the
>>    server.
>>
>> OLD
>>
>> For example, a protocol or application could specify
>>    that the application service type is obtained through a one-to-one
>>    mapping of URI schemes to service types or supports only a restricted
>>    set of URI schemes.
>>
>> NEW
>>
>> For example, a protocol or application could specify
>>    that the application service type is obtained through a one-to-one
>>    mapping of URI schemes to service types or that the protocol or
>>    application supports only a restricted set of URI schemes.
>>
>> OLD
>>
>>    As one example of the process of generating a reference identifier,
>>    from the user input of the URI <sip:alice@college.example>, a client
>>    could derive the application service type sip from the URI scheme and
>>    parse the domain name college.example from the "host" component.
>>
>> NEW
>>
>>    As one example of the process of generating a reference identifier,
>>    from the user input of the URI <sip:alice@voice.college.example>, a
>>    client could derive the application service type sip from the URI
>>    scheme and parse the domain name voice.college.example from the
>>    "host" component.
>>
>> In Section 6.1.2, for the sake of consistency I've added and removed some angle brackets (URIs should have brackets, whereas domain names, IP addresses, and various IDs should not).
>>
>> OLD
>>
>>    *  An IP-ID reference identifier MUST exactly match to the value of
>>
>> NEW
>>
>>    *  An IP-ID reference identifier MUST exactly match the value of
>>
>> OLD
>>
>>    These identifiers provide an application service type portion to be
>>    checked, but that portion is combined only with the DNS domain name
>>    portion of the SRV-ID or URI-ID itself.  For example, if a client's
>>    list of reference identifiers includes an SRV-ID of _xmpp-
>>    client.messenger.example and a DNS-ID of app.example, the client MUST
>>    check both the combination of an application service type of xmpp-
>>    client and a DNS domain name of messenger.example and, separately, a
>>    DNS domain name of app.example.  However, the client MUST NOT check
>>    the combination of an application service type of xmpp-client and a
>>    DNS domain name of app.example because it does not have an SRV-ID of
>>    _xmpp-client.app.example in its list of reference identifiers.
>>
>> NEW
>>
>>    These identifiers provide an application service type portion to be
>>    checked, but that portion is combined only with the DNS domain name
>>    portion of the SRV-ID or URI-ID itself.  Consider the example of a
>>    messaging client that has two reference identifiers: (1) an SRV-ID of
>>    _xmpp-client.messenger.example and (2) a DNS-ID of app.example. The
>>    client MUST check (1) the combination of (a) an application
>>    service type of xmpp-client and (b) a DNS domain name of
>>    messenger.example as well as (2) a DNS domain name of app.example.
>>    However, the client MUST NOT check the combination of an application
>>    service type of xmpp-client and a DNS domain name of app.example
>>    because it does not have an SRV-ID of _xmpp-client.app.example in its
>>    list of reference identifiers.
>>
>> OLD
>>
>>    [DNS-SRV].  Note that per [SRVNAME], the _ character is part of the
>>
>> NEW
>>
>>    [DNS-SRV].  Note that per [SRVNAME], the underscore "_" is part of the
>>
>>
>> OLD
>>
>>    that the : character is a separator between the scheme name and the
>>
>> NEW
>>
>>    that the colon ":" is a separator between the scheme name and the
>>
>> OLD
>>
>>    If the client does not find a presented identifier matching any of
>>    the reference identifiers, then the client MUST proceed as described
>>    as follows.
>>
>> NEW
>>
>>    If the client does not find a presented identifier matching any of
>>    the reference identifiers, then the client MUST proceed as follows.
>>
>> OLD
>>
>>    The textual representation of an IPv4 address might be misinterpreted
>>    as a valid FQDN in some contexts.  This can result in different
>>    security treatment that might cause different components of a system
>>    to classify the value differently, which might lead to
>>    vulnerabilities.  For example, one system component enforces a
>>    security rule that is conditional on the type of identifier.  This
>>    component misclassifies an IP address as an FQDN.  A different
>>    component correctly classifies the identifier but might incorrectly
>>    assume that rules regarding IP addresses have been enforced.
>>    Consistent classification of identifiers avoids this problem.
>>
>> NEW
>>
>>    The textual representation of an IPv4 address might be misinterpreted
>>    as a valid FQDN in some contexts.  This can result in different
>>    security treatment that might cause different components of a system
>>    to classify the value differently, which might lead to
>>    vulnerabilities.  Consider a system in which one component enforces a
>>    security rule that is conditional on the type of identifier but
>>    misclassifies an IP address as an FQDN, whereas a second component
>>    correctly classifies the identifier but incorrectly assumes that
>>    rules regarding IP addresses have been enforced by the first
>>    component.  As a result, the system as a whole might behave in an
>>    insecure manner.  Consistent classification of identifiers avoids
>>    this problem.
>>
>> Peter
>>
>> On 11/2/23 5:51 PM, Peter Saint-Andre wrote:
>>> Thanks, Alanna. Before replying again, I will read the full document.
>>> On 11/2/23 3:04 PM, Alanna Paloma wrote:
>>>> Hi Peter, Orie, and Rich,
>>>>
>>>> Thank you for your replies and the XML files. We have updated our files accordingly.
>>>>
>>>> The updated XML file is here:
>>>> https://www.rfc-editor.org/authors/rfc9525.xml
>>>>
>>>> The updated output files are here:
>>>> https://www.rfc-editor.org/authors/rfc9525.txt
>>>> https://www.rfc-editor.org/authors/rfc9525.pdf
>>>> https://www.rfc-editor.org/authors/rfc9525.html
>>>>
>>>> This diff file shows all changes made during AUTH48:
>>>> https://www.rfc-editor.org/authors/rfc9525-auth48diff.html
>>>>
>>>> This diff file shows all changes made to date:
>>>> https://www.rfc-editor.org/authors/rfc9525-diff.html
>>>>
>>>> Note that it may be necessary for you to refresh your browser to view the most recent version. Please review the document carefully to ensure satisfaction as we do not make changes once it has been published as an RFC.
>>>>
>>>> Please contact us with any further updates or with your approval of the document in its current form.  We will await approvals from each author prior to moving forward in the publication process.
>>>>
>>>> For the AUTH48 status of this document, please see:
>>>> https://www.rfc-editor.org/auth48/rfc9525
>>>>
>>>> Best regards,
>>>> RFC Editor/ap
>>>>
>>>>
>>>>> On Oct 31, 2023, at 10:07 AM, Peter Saint-Andre <stpeter@stpeter.im> wrote:
>>>>>
>>>>> I've attached an XML file with further updates.
>>>>>
>>>>> Further comments inline, areas of agreement elided.
>>>>>
>>>>> Note: to ease my own mind about changes to this file, I've checked it into source control:
>>>>>
>>>>> https://github.com/richsalz/draft-ietf-uta-rfc6125bis/pull/115
>>>>>
>>>>> On 10/31/23 8:57 AM, Salz, Rich wrote:
>>>>>> Sigh.
>>>>>> I followed the instructions and updated the XML.  Here it is attached.  I believe that we are in agreement  but I leave it to you petty criminals to figure out.  As a hint, search for “rfced” in the XML and then see my comments that immediately follow those.
>>>>>> *From: *Orie Steele <orie@transmute.industries>
>>>>>> *Date: *Tuesday, October 31, 2023 at 10:05 AM
>>>>>> *To: *Peter Saint-Andre <stpeter@stpeter.im>
>>>>>> *Cc: *"rfc-editor@rfc-editor.org" <rfc-editor@rfc-editor.org>, Rich Salz <rsalz@akamai.com>, "uta-ads@ietf.org" <uta-ads@ietf.org>, "uta-chairs@ietf.org" <uta-chairs@ietf.org>, "paul.wouters@aiven.io" <paul.wouters@aiven.io>, "auth48archive@rfc-editor.org" <auth48archive@rfc-editor.org>
>>>>>> *Subject: *Re: AUTH48: RFC-to-be 9525 <draft-ietf-uta-rfc6125bis-15> for your review
>>>>>> Inline:
>>>>>> On Mon, Oct 30, 2023 at 6:55 PM Peter Saint-Andre <stpeter@stpeter.im <mailto:stpeter@stpeter.im>> wrote:
>>>>>>      Thanks for working on this document. Comments inline, areas of
>>>>>>      agreement
>>>>>>      elided.
>>>>>>      On 10/30/23 10:15 AM, rfc-editor@rfc-editor.org
>>>>>>      <mailto:rfc-editor@rfc-editor.org> wrote:
>>>>>
>>>>> <snip/>
>>>>>
>>>>>>       > 7) <!--[rfced] RFC 2818 [HTTP-OVER-TLS] has been obsoleted by RFC
>>>>>>      9110
>>>>>>       > [HTTP]. Please let us know if we can replace "[HTTP-OVER-TLS]"
>>>>>>       > with "[HTTP]" in the following and also remove the
>>>>>>       > "[HTTP-OVER-TLS]" entry from the References section since it is
>>>>>>       > not cited elsewhere.
>>>>>> I think this should be done, but would like to hear from Rich.
>>>>>>      That's acceptable to me. Rich, do you have concerns?
>>>>>>       > In addition, please clarify "when the client uses [SVCB-FOR-HTTPS] or
>>>>>>       > [SVCB-FOR-DNS]" - what is the client using or applying the PKIX
>>>>>>       > validation rules to in these documents? Or is the intent to state
>>>>>>       > that the PKIX validation rules are the same as described in these
>>>>>>       > documents? Please clarify.
>>>>>>       >
>>>>>>       > Original:
>>>>>>       >     For example, the PKIX validation rules for [HTTP-OVER-TLS] and
>>>>>>       >     [DNS-OVER-TLS] do not change when the client uses
>>>>>>      [SVCB-FOR-HTTPS]
>>>>>>       >     or [SVCB-FOR-DNS].
>>>>>>       >
>>>>>>       > Perhaps:
>>>>>>       >     For example, the PKIX validation rules described in [HTTP] and
>>>>>>       >     [DNS-OVER-TLS] are the same as described in [SVCB-FOR-HTTPS] and
>>>>>>       >     [SVCB-FOR-DNS].
>>>>>>       > -->
>>>>>>      I believe the meaning is explained in the previous sentence; this
>>>>>>      sentence is merely an example that points to several of the
>>>>>>      documents in
>>>>>>      progress regarding SVCB.
>>>>>> I agree, but to answer the question directly I believe the intention is to communicate that the PKIX validation rules are the same,
>>>>>> as of now, and warn that they might not be in the future.
>>>>>
>>>>> OK, I propose the following modified text (also inside a comment in the XML file):
>>>>>
>>>>>     For example, the PKIX validation rules for [HTTP-OVER-TLS] and
>>>>>     [DNS-OVER-TLS] do not change when the client uses the DNS resource
>>>>>     records defined in [SVCB-FOR-HTTPS] or [SVCB-FOR-DNS] to look up
>>>>>     connection information.
>>>>>
>>>>>>       > 19) <!-- [rfced] Please review the "Inclusive Language" portion
>>>>>>      of the online
>>>>>>       > Style Guide
>>>>>>      <https://www.rfc-editor.org/styleguide/part2/#inclusive_language
>>>>>>     <https://urldefense.com/v3/__https:/www.rfc-editor.org/styleguide/part2/*inclusive_language__;Iw!!GjvTz_vk!QdpBBBfoK53ywTtBS24JUSgsd2iO6awbK8himXieJFxEDdi9ri9V_tuSZ4ggGXxFRzWarWtbDLbcFFvJN1c$>>
>>>>>>       > and let us know if any changes are needed.
>>>>>>       >
>>>>>>       > For example, please consider whether "tradition" should be
>>>>>>      updated for
>>>>>>       > clarity.  While the NIST website
>>>>>>       >
>>>>>>      <https://www.nist.gov/nist-research-library/nist-technical-series-
>>>>>>     <https://urldefense.com/v3/__https:/www.nist.gov/nist-research-library/nist-technical-series-__;!!GjvTz_vk!QdpBBBfoK53ywTtBS24JUSgsd2iO6awbK8himXieJFxEDdi9ri9V_tuSZ4ggGXxFRzWarWtbDLbcNDEGmAk$>
>>>>>>       > publications-author-instructions#table1> indicates that this term is
>>>>>>       > potentially biased, it is also ambiguous. "Tradition" is a subjective
>>>>>>       > term, as it is not the same for everyone.
>>>>>>       > -->
>>>>>>      Well, fully qualified domain names conforming to "preferred name
>>>>>>      syntax"
>>>>>>      as described in Section 3.5 of RFC 1034 were, in fact, the same for
>>>>>>      everyone! So I don't consider the use of "traditional" here to be
>>>>>>      biased
>>>>>>      or ambiguous - that's just how the Internet was defined in IETF RFCs.
>>>>>
>>>>> In the XML file, Rich neatly sidestepped this issue by making this change:
>>>>>
>>>>> OLD
>>>>>
>>>>>     If the DNS domain name portion of a reference identifier is a
>>>>>     "traditional domain name"
>>>>>
>>>>> NEW:
>>>>>
>>>>>     If the DNS domain name portion of a reference identifier
>>>>>     is not an internationalized domain name
>>>>>
>>>>> That's fine with me.
>>>>>
>>>>> Peter
>>>>>
>>>>> <rfc9525.xml>
>>>>
>> <rfc9525.xml>
>