Re: [auth48] AUTH48: RFC-to-be 9525 <draft-ietf-uta-rfc6125bis-15> for your review

"Salz, Rich" <rsalz@akamai.com> Mon, 06 November 2023 21:23 UTC

Return-Path: <rsalz@akamai.com>
X-Original-To: auth48archive@ietfa.amsl.com
Delivered-To: auth48archive@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0F1FAC18E1A8; Mon, 6 Nov 2023 13:23:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.806
X-Spam-Level:
X-Spam-Status: No, score=-2.806 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=akamai.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pDDiYSgwdGxu; Mon, 6 Nov 2023 13:23:28 -0800 (PST)
Received: from mx0a-00190b01.pphosted.com (mx0a-00190b01.pphosted.com [IPv6:2620:100:9001:583::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8A028C17C8AF; Mon, 6 Nov 2023 13:23:28 -0800 (PST)
Received: from pps.filterd (m0050093.ppops.net [127.0.0.1]) by m0050093.ppops.net-00190b01. (8.17.1.22/8.17.1.22) with ESMTP id 3A6H8FQp019219; Mon, 6 Nov 2023 21:23:25 GMT
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=akamai.com; h= from:to:cc:subject:date:message-id:references:in-reply-to :content-type:content-id:content-transfer-encoding:mime-version; s=jan2016.eng; bh=g3tOikKVSro5oUR5Tzz6tvXEYXxS1EyMmodhl0c8PeE=; b= ZKggYzjzvQKb9QmN5OLVTFnF8pz6jrLT0yYOEviQJy8jeA6iMkaeu0zQJmMm6iug JQYMLKiDPB7giCB7CjHjCIssBpmNJp2RPUM9Ksy6uivkqi+G+TIpuTEo8l6vr2sO 7qz20BzqqcJ03rFq5udmz8IlNM7gZmyCgTLD3+gWnFKCmu7gCtlfi5WYKzLlZWFV yqVE6U1t+JqBC7u2jSLLnVSeYE0rnKfjnimKfo6oj3PiaMGms6URBAMsO96BfIbS npPKHkmrBgcCpNmUZj8OA2gYNLfD0vS+SEZu66CXP/OBMVDle7eW9kzdB54PtK0s +zFDuatdDTgtnr6e6+JscA==
Received: from prod-mail-ppoint1 (prod-mail-ppoint1.akamai.com [184.51.33.18] (may be forged)) by m0050093.ppops.net-00190b01. (PPS) with ESMTPS id 3u60vq30rn-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Mon, 06 Nov 2023 21:23:24 +0000 (GMT)
Received: from pps.filterd (prod-mail-ppoint1.akamai.com [127.0.0.1]) by prod-mail-ppoint1.akamai.com (8.17.1.19/8.17.1.19) with ESMTP id 3A6KxuTx011776; Mon, 6 Nov 2023 16:23:23 -0500
Received: from email.msg.corp.akamai.com ([172.27.91.25]) by prod-mail-ppoint1.akamai.com (PPS) with ESMTPS id 3u5h9xcdu2-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Mon, 06 Nov 2023 16:23:23 -0500
Received: from usma1ex-dag4mb4.msg.corp.akamai.com (172.27.91.23) by usma1ex-dag4mb6.msg.corp.akamai.com (172.27.91.25) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1258.27; Mon, 6 Nov 2023 16:23:22 -0500
Received: from usma1ex-dag4mb4.msg.corp.akamai.com ([172.27.91.23]) by usma1ex-dag4mb4.msg.corp.akamai.com ([172.27.91.23]) with mapi id 15.02.1258.027; Mon, 6 Nov 2023 16:23:22 -0500
From: "Salz, Rich" <rsalz@akamai.com>
To: Peter Saint-Andre <stpeter@stpeter.im>, Karen Moore <kmoore@amsl.com>, "paul.wouters@aiven.io" <paul.wouters@aiven.io>, Orie Steele <orie@transmute.industries>
CC: "rfc-editor@rfc-editor.org" <rfc-editor@rfc-editor.org>, "uta-ads@ietf.org" <uta-ads@ietf.org>, "uta-chairs@ietf.org" <uta-chairs@ietf.org>, "auth48archive@rfc-editor.org" <auth48archive@rfc-editor.org>
Thread-Topic: AUTH48: RFC-to-be 9525 <draft-ietf-uta-rfc6125bis-15> for your review
Thread-Index: AQHaC0xbMe+DO71h4ESHYpO+NuDWXLBjd+iAgADtQgD//8upAIAAZ2uAgANm0gCAAC7OgIABmUEAgASHvQD//9IzAP//t0eA
Date: Mon, 06 Nov 2023 21:23:22 +0000
Message-ID: <A6A4D963-7340-4840-BA83-BB8E583B63F7@akamai.com>
References: <20231030161554.3447BE5337@rfcpa.amsl.com> <dad38a2d-a875-4193-ba12-8c847b0a4bda@stpeter.im> <CAN8C-_+NeH8y29RCXOoPtuPH_j=maNWmhRAaRFqo4t3=9nPKtQ@mail.gmail.com> <C0362DB3-9D2E-4C80-A52B-B01BFF07DED9@akamai.com> <35dc5a70-f127-4537-82d8-e2099dc68bf9@stpeter.im> <A5A993F4-7F78-4748-9F5A-F9007E4CEFA4@amsl.com> <05bb9527-54df-402c-b33f-8da034dcc26c@stpeter.im> <5941f9da-053f-49bf-9f9b-b035c386dd92@stpeter.im> <385C8A5D-D2EF-47DE-9D86-52CBEAFAACDD@amsl.com> <f523394f-bc01-4435-bcda-87edb2ea0d4a@stpeter.im>
In-Reply-To: <f523394f-bc01-4435-bcda-87edb2ea0d4a@stpeter.im>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.78.23102801
x-originating-ip: [172.27.164.43]
Content-Type: text/plain; charset="utf-8"
Content-ID: <ABE9DAD38FD08A4291E515AA2045FA77@akamai.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.272,Aquarius:18.0.987,Hydra:6.0.619,FMLib:17.11.176.26 definitions=2023-11-06_15,2023-11-02_03,2023-05-22_02
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 mlxscore=0 bulkscore=0 adultscore=0 spamscore=0 suspectscore=0 mlxlogscore=999 malwarescore=0 phishscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2310240000 definitions=main-2311060176
X-Proofpoint-GUID: zX5fPPuYOqp8XrTxIWisB7yzvMQMlBTp
X-Proofpoint-ORIG-GUID: zX5fPPuYOqp8XrTxIWisB7yzvMQMlBTp
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.272,Aquarius:18.0.987,Hydra:6.0.619,FMLib:17.11.176.26 definitions=2023-11-06_15,2023-11-02_03,2023-05-22_02
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 clxscore=1011 mlxscore=0 spamscore=0 impostorscore=0 phishscore=0 mlxlogscore=999 suspectscore=0 lowpriorityscore=0 adultscore=0 priorityscore=1501 malwarescore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.19.0-2310240000 definitions=main-2311060176
Archived-At: <https://mailarchive.ietf.org/arch/msg/auth48archive/D_yEaokI5ueB0YSlABrsB-XV__8>
Subject: Re: [auth48] AUTH48: RFC-to-be 9525 <draft-ietf-uta-rfc6125bis-15> for your review
X-BeenThere: auth48archive@rfc-editor.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Archiving AUTH48 exchanges between the RFC Production Center, the authors, and other related parties" <auth48archive.rfc-editor.org>
List-Unsubscribe: <https://mailman.rfc-editor.org/mailman/options/auth48archive>, <mailto:auth48archive-request@rfc-editor.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/auth48archive/>
List-Post: <mailto:auth48archive@rfc-editor.org>
List-Help: <mailto:auth48archive-request@rfc-editor.org?subject=help>
List-Subscribe: <https://mailman.rfc-editor.org/mailman/listinfo/auth48archive>, <mailto:auth48archive-request@rfc-editor.org?subject=subscribe>
X-List-Received-Date: Mon, 06 Nov 2023 21:23:33 -0000

Same here.   Especially the thanks :)

On 11/6/23, 9:43 PM, "Peter Saint-Andre" <stpeter@stpeter.im <mailto:stpeter@stpeter.im>> wrote:


Thanks, Karen and Alanna.


I approve of publication.


Peter


On 11/6/23 1:27 PM, Karen Moore wrote:
> Hi Peter, Rich, and *Paul (AD),
> 
> Thank you for the updated XML file and your comments. Our files now reflect these changes. Please review and let us know if any additional updates are needed or if you approve the document in its current form. We will await approvals from each author prior to moving forward in the publication process.
> 
> *Paul, thank you for confirming that the most recent changes submitted by Peter (on 11/3/23) are okay; we noted your approval on the AUTH48 status page for this document.
> 
>> On Nov 4, 2023, at 2:58 PM, Paul Wouters <paul.wouters=40aiven.io@dmarc.ietf.org <mailto:40aiven.io@dmarc.ietf.org>> wrote:
>>
>> Thanks did the explanations Peter.
>>
>> All changes Peter proposed are fine with me then.
>>
>> Paul
> 
> 
> 
> FILES (please refresh)
> 
> The updated XML file is here:
> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9525.xml__;!!GjvTz_vk!QLjdjO5qUyrzSWX-_LB3Y7Tu8EWXXsK7RsPOpiejxph7pcvNg3KBMOWuN0djgymH0mXMxES2kiHqo20$ <https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9525.xml__;!!GjvTz_vk!QLjdjO5qUyrzSWX-_LB3Y7Tu8EWXXsK7RsPOpiejxph7pcvNg3KBMOWuN0djgymH0mXMxES2kiHqo20$> 
> 
> The updated output files are here:
> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9525.txt__;!!GjvTz_vk!QLjdjO5qUyrzSWX-_LB3Y7Tu8EWXXsK7RsPOpiejxph7pcvNg3KBMOWuN0djgymH0mXMxES2VesRNXE$ <https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9525.txt__;!!GjvTz_vk!QLjdjO5qUyrzSWX-_LB3Y7Tu8EWXXsK7RsPOpiejxph7pcvNg3KBMOWuN0djgymH0mXMxES2VesRNXE$> 
> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9525.pdf__;!!GjvTz_vk!QLjdjO5qUyrzSWX-_LB3Y7Tu8EWXXsK7RsPOpiejxph7pcvNg3KBMOWuN0djgymH0mXMxES2GnL_NXA$ <https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9525.pdf__;!!GjvTz_vk!QLjdjO5qUyrzSWX-_LB3Y7Tu8EWXXsK7RsPOpiejxph7pcvNg3KBMOWuN0djgymH0mXMxES2GnL_NXA$> 
> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9525.html__;!!GjvTz_vk!QLjdjO5qUyrzSWX-_LB3Y7Tu8EWXXsK7RsPOpiejxph7pcvNg3KBMOWuN0djgymH0mXMxES2SeMeSTI$ <https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9525.html__;!!GjvTz_vk!QLjdjO5qUyrzSWX-_LB3Y7Tu8EWXXsK7RsPOpiejxph7pcvNg3KBMOWuN0djgymH0mXMxES2SeMeSTI$> 
> 
> This diff file shows all changes made during AUTH48:
> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9525-auth48diff.html__;!!GjvTz_vk!QLjdjO5qUyrzSWX-_LB3Y7Tu8EWXXsK7RsPOpiejxph7pcvNg3KBMOWuN0djgymH0mXMxES2VzK1Rks$ <https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9525-auth48diff.html__;!!GjvTz_vk!QLjdjO5qUyrzSWX-_LB3Y7Tu8EWXXsK7RsPOpiejxph7pcvNg3KBMOWuN0djgymH0mXMxES2VzK1Rks$> 
> 
> These diff files show only the changes made during the last editing round:
> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9525-lastdiff.html__;!!GjvTz_vk!QLjdjO5qUyrzSWX-_LB3Y7Tu8EWXXsK7RsPOpiejxph7pcvNg3KBMOWuN0djgymH0mXMxES2Uoevk6M$ <https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9525-lastdiff.html__;!!GjvTz_vk!QLjdjO5qUyrzSWX-_LB3Y7Tu8EWXXsK7RsPOpiejxph7pcvNg3KBMOWuN0djgymH0mXMxES2Uoevk6M$> 
> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9525-lastrfcdiff.html__;!!GjvTz_vk!QLjdjO5qUyrzSWX-_LB3Y7Tu8EWXXsK7RsPOpiejxph7pcvNg3KBMOWuN0djgymH0mXMxES2BB3_szE$ <https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9525-lastrfcdiff.html__;!!GjvTz_vk!QLjdjO5qUyrzSWX-_LB3Y7Tu8EWXXsK7RsPOpiejxph7pcvNg3KBMOWuN0djgymH0mXMxES2BB3_szE$> 
> 
> This diff file shows all changes made to date:
> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9525-diff.html__;!!GjvTz_vk!QLjdjO5qUyrzSWX-_LB3Y7Tu8EWXXsK7RsPOpiejxph7pcvNg3KBMOWuN0djgymH0mXMxES22m1Udis$ <https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9525-diff.html__;!!GjvTz_vk!QLjdjO5qUyrzSWX-_LB3Y7Tu8EWXXsK7RsPOpiejxph7pcvNg3KBMOWuN0djgymH0mXMxES22m1Udis$> 
> 
> For the AUTH48 status of this document, please see:
> https://urldefense.com/v3/__https://www.rfc-editor.org/auth48/rfc9525__;!!GjvTz_vk!QLjdjO5qUyrzSWX-_LB3Y7Tu8EWXXsK7RsPOpiejxph7pcvNg3KBMOWuN0djgymH0mXMxES2A5ZyqUc$ <https://urldefense.com/v3/__https://www.rfc-editor.org/auth48/rfc9525__;!!GjvTz_vk!QLjdjO5qUyrzSWX-_LB3Y7Tu8EWXXsK7RsPOpiejxph7pcvNg3KBMOWuN0djgymH0mXMxES2A5ZyqUc$> 
> 
> Best regards,
> RFC Editor/kc
> 
> 
>> On Nov 3, 2023, at 5:16 PM, Peter Saint-Andre <stpeter@stpeter.im <mailto:stpeter@stpeter.im>> wrote:
>>
>> Hi everyone,
>>
>> I've completed a final reading of the document. I would like to make the following small stylistic and consistency changes, which are reflected in the attached XML file.
>>
>> OLD
>>
>> This document defines procedures for how clients do this
>> verification. It therefore defines requirements on other parties,
>> such as the certification authorities that issue certificates, the
>> service administrators requesting them, and the protocol designers
>> defining how things are named.
>>
>> NEW
>>
>> This document defines procedures for how clients perform this
>> verification. It therefore defines requirements on other parties,
>> such as the certification authorities that issue certificates, the
>> service administrators requesting them, and the protocol designers
>> defining interactions between clients and servers.
>>
>> OLD
>>
>> reference identifier: An identifier used by the client when
>> examining presented identifiers. It is constructed from the
>> source domain and, optionally, an application service type.
>>
>> NEW
>>
>> reference identifier: An identifier expected by the client when
>> examining presented identifiers. It is constructed from the
>> source domain and, optionally, an application service type.
>>
>> OLD
>>
>> The Common Name RDN MUST NOT be used to identify a service because it
>> is not strongly typed (essentially free-form text) and therefore
>> suffers from ambiguities in interpretation.
>>
>> NEW
>>
>> The Common Name RDN MUST NOT be used to identify a service because it
>> is not strongly typed (it is essentially free-form text) and
>> therefore suffers from ambiguities in interpretation.
>>
>> OLD
>>
>> An IP address that is the result of a DNS query is not direct. Use
>> of IP-IDs that are not direct is out of scope for this document.
>>
>> NEW
>>
>> An IP address that is the result of a DNS query is indirect. Use
>> of IP-IDs that are indirect is out of scope for this document.
>>
>> OLD
>>
>> This section defines how protocol designers should reference this
>> document, which would typically be a normative reference in their
>> specification. Its specification MAY choose to allow only one of the
>> identifier types defined here.
>>
>> NEW
>>
>> This section defines how protocol designers should reference this
>> document, which would typically be a normative reference in their
>> specification.
>>
>> A specification MAY choose to allow only one of the identifier
>> types defined here.
>>
>> OLD
>>
>> If the technology does not use DNS SRV records to resolve the DNS
>> domain names of application services, then its specification MUST
>>
>> NEW
>>
>> If the technology does not use DNS SRV records to resolve the DNS
>> domain names of application services, then the specification MUST
>>
>> OLD
>>
>> If the technology does not use URIs to identify application services,
>> then its specification MUST state that URI-ID as defined in this
>>
>> NEW
>>
>> If the technology does not use URIs to identify application services,
>> then the specification MUST state that URI-ID as defined in this
>>
>> OLD
>>
>> 3. If the service using the certificate deploys a technology for
>> which the relevant specification stipulates that certificates
>> should include identifiers of type SRV-ID (e.g., this is true as
>> described in [XMPP]), then the certificate SHOULD include an SRV-
>>
>> NEW
>>
>> 3. If the service using the certificate deploys a technology for
>> which the relevant specification stipulates that certificates
>> should include identifiers of type SRV-ID (e.g., this is true of
>> the Extensible Messaging and Presence Protocol (XMPP) as
>> described in [XMPP]), then the certificate SHOULD include an SRV-
>>
>> OLD
>>
>> 4. If the service using the certificate deploys a technology for
>> which the relevant specification stipulates that certificates
>> should include identifiers of type URI-ID (e.g., this is true of
>> [SIP] as specified by [SIP-CERTS]), then the certificate SHOULD
>>
>> NEW
>>
>> 4. If the service using the certificate deploys a technology for
>> which the relevant specification stipulates that certificates
>> should include identifiers of type URI-ID (e.g., this is true of
>> the Session Initiation Protocol [SIP] as specified by [SIP-
>> CERTS]), then the certificate SHOULD
>>
>> OLD
>>
>> Consider an instant messaging (IM) server that is compatible with the
>> Extensible Messaging and Presence Protocol (XMPP) at the host
>>
>> NEW
>>
>> Consider an XMPP-compatible instant messaging (IM) server at the host
>>
>> OLD
>>
>> If a service provider offers multiple application service types and
>> wishes to limit the applicability of certificates using SRV-IDs or
>> URI-IDs, they SHOULD request that multiple certificates rather than a
>>
>> NEW
>>
>> If a service provider offers multiple application service types and
>> wishes to limit the applicability of certificates using SRV-IDs or
>> URI-IDs, it SHOULD request that multiple certificates rather than a
>>
>> OLD
>>
>> If a service provider offers multiple application service types and
>> wishes to limit the applicability of certificates using SRV-IDs or
>> URI-IDs, they SHOULD request that multiple certificates rather than a
>> single certificate containing multiple SRV-IDs or URI-IDs each
>> identify a different application service type. This rule does not
>>
>> NEW
>>
>> If a service provider offers multiple application service types and
>> wishes to limit the applicability of certificates using SRV-IDs or
>> URI-IDs, they SHOULD request multiple certificates rather than a
>> single certificate containing multiple SRV-IDs or URI-IDs that each
>> identify a different application service type. This rule does not
>>
>> OLD
>>
>> 2. The server provides its identifiers in the form of a PKIX
>> certificate.
>>
>> NEW
>>
>> 2. The server provides its presented identifiers in the form of a
>> PKIX certificate.
>>
>> OLD
>>
>> 3. The client checks each of its reference identifiers against the
>> presented identifiers for the purpose of finding a match. When
>>
>> NEW
>>
>> 3. The client checks each of its reference identifiers against the
>> server's presented identifiers for the purpose of finding a
>> match. When
>>
>> OLD
>>
>> The client MUST construct a list of acceptable reference identifiers
>> and MUST do so independently of the identifiers presented by the
>> service.
>>
>> NEW
>>
>> The client MUST construct a list of acceptable reference identifiers
>> and MUST do so independently of the identifiers presented by the
>> server.
>>
>> OLD
>>
>> For example, a protocol or application could specify
>> that the application service type is obtained through a one-to-one
>> mapping of URI schemes to service types or supports only a restricted
>> set of URI schemes.
>>
>> NEW
>>
>> For example, a protocol or application could specify
>> that the application service type is obtained through a one-to-one
>> mapping of URI schemes to service types or that the protocol or
>> application supports only a restricted set of URI schemes.
>>
>> OLD
>>
>> As one example of the process of generating a reference identifier,
>> from the user input of the URI <sip:alice@college.exam <mailto:alice@college.exam>ple>, a client
>> could derive the application service type sip from the URI scheme and
>> parse the domain name college.example from the "host" component.
>>
>> NEW
>>
>> As one example of the process of generating a reference identifier,
>> from the user input of the URI <sip:alice@voice.college.exam <mailto:alice@voice.college.exam>ple>, a
>> client could derive the application service type sip from the URI
>> scheme and parse the domain name voice.college.example from the
>> "host" component.
>>
>> In Section 6.1.2, for the sake of consistency I've added and removed some angle brackets (URIs should have brackets, whereas domain names, IP addresses, and various IDs should not).
>>
>> OLD
>>
>> * An IP-ID reference identifier MUST exactly match to the value of
>>
>> NEW
>>
>> * An IP-ID reference identifier MUST exactly match the value of
>>
>> OLD
>>
>> These identifiers provide an application service type portion to be
>> checked, but that portion is combined only with the DNS domain name
>> portion of the SRV-ID or URI-ID itself. For example, if a client's
>> list of reference identifiers includes an SRV-ID of _xmpp-
>> client.messenger.example and a DNS-ID of app.example, the client MUST
>> check both the combination of an application service type of xmpp-
>> client and a DNS domain name of messenger.example and, separately, a
>> DNS domain name of app.example. However, the client MUST NOT check
>> the combination of an application service type of xmpp-client and a
>> DNS domain name of app.example because it does not have an SRV-ID of
>> _xmpp-client.app.example in its list of reference identifiers.
>>
>> NEW
>>
>> These identifiers provide an application service type portion to be
>> checked, but that portion is combined only with the DNS domain name
>> portion of the SRV-ID or URI-ID itself. Consider the example of a
>> messaging client that has two reference identifiers: (1) an SRV-ID of
>> _xmpp-client.messenger.example and (2) a DNS-ID of app.example. The
>> client MUST check (1) the combination of (a) an application
>> service type of xmpp-client and (b) a DNS domain name of
>> messenger.example as well as (2) a DNS domain name of app.example.
>> However, the client MUST NOT check the combination of an application
>> service type of xmpp-client and a DNS domain name of app.example
>> because it does not have an SRV-ID of _xmpp-client.app.example in its
>> list of reference identifiers.
>>
>> OLD
>>
>> [DNS-SRV]. Note that per [SRVNAME], the _ character is part of the
>>
>> NEW
>>
>> [DNS-SRV]. Note that per [SRVNAME], the underscore "_" is part of the
>>
>>
>> OLD
>>
>> that the : character is a separator between the scheme name and the
>>
>> NEW
>>
>> that the colon ":" is a separator between the scheme name and the
>>
>> OLD
>>
>> If the client does not find a presented identifier matching any of
>> the reference identifiers, then the client MUST proceed as described
>> as follows.
>>
>> NEW
>>
>> If the client does not find a presented identifier matching any of
>> the reference identifiers, then the client MUST proceed as follows.
>>
>> OLD
>>
>> The textual representation of an IPv4 address might be misinterpreted
>> as a valid FQDN in some contexts. This can result in different
>> security treatment that might cause different components of a system
>> to classify the value differently, which might lead to
>> vulnerabilities. For example, one system component enforces a
>> security rule that is conditional on the type of identifier. This
>> component misclassifies an IP address as an FQDN. A different
>> component correctly classifies the identifier but might incorrectly
>> assume that rules regarding IP addresses have been enforced.
>> Consistent classification of identifiers avoids this problem.
>>
>> NEW
>>
>> The textual representation of an IPv4 address might be misinterpreted
>> as a valid FQDN in some contexts. This can result in different
>> security treatment that might cause different components of a system
>> to classify the value differently, which might lead to
>> vulnerabilities. Consider a system in which one component enforces a
>> security rule that is conditional on the type of identifier but
>> misclassifies an IP address as an FQDN, whereas a second component
>> correctly classifies the identifier but incorrectly assumes that
>> rules regarding IP addresses have been enforced by the first
>> component. As a result, the system as a whole might behave in an
>> insecure manner. Consistent classification of identifiers avoids
>> this problem.
>>
>> Peter
>>
>> On 11/2/23 5:51 PM, Peter Saint-Andre wrote:
>>> Thanks, Alanna. Before replying again, I will read the full document.
>>> On 11/2/23 3:04 PM, Alanna Paloma wrote:
>>>> Hi Peter, Orie, and Rich,
>>>>
>>>> Thank you for your replies and the XML files. We have updated our files accordingly.
>>>>
>>>> The updated XML file is here:
>>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9525.xml__;!!GjvTz_vk!QLjdjO5qUyrzSWX-_LB3Y7Tu8EWXXsK7RsPOpiejxph7pcvNg3KBMOWuN0djgymH0mXMxES2kiHqo20$ <https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9525.xml__;!!GjvTz_vk!QLjdjO5qUyrzSWX-_LB3Y7Tu8EWXXsK7RsPOpiejxph7pcvNg3KBMOWuN0djgymH0mXMxES2kiHqo20$> 
>>>>
>>>> The updated output files are here:
>>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9525.txt__;!!GjvTz_vk!QLjdjO5qUyrzSWX-_LB3Y7Tu8EWXXsK7RsPOpiejxph7pcvNg3KBMOWuN0djgymH0mXMxES2VesRNXE$ <https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9525.txt__;!!GjvTz_vk!QLjdjO5qUyrzSWX-_LB3Y7Tu8EWXXsK7RsPOpiejxph7pcvNg3KBMOWuN0djgymH0mXMxES2VesRNXE$> 
>>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9525.pdf__;!!GjvTz_vk!QLjdjO5qUyrzSWX-_LB3Y7Tu8EWXXsK7RsPOpiejxph7pcvNg3KBMOWuN0djgymH0mXMxES2GnL_NXA$ <https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9525.pdf__;!!GjvTz_vk!QLjdjO5qUyrzSWX-_LB3Y7Tu8EWXXsK7RsPOpiejxph7pcvNg3KBMOWuN0djgymH0mXMxES2GnL_NXA$> 
>>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9525.html__;!!GjvTz_vk!QLjdjO5qUyrzSWX-_LB3Y7Tu8EWXXsK7RsPOpiejxph7pcvNg3KBMOWuN0djgymH0mXMxES2SeMeSTI$ <https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9525.html__;!!GjvTz_vk!QLjdjO5qUyrzSWX-_LB3Y7Tu8EWXXsK7RsPOpiejxph7pcvNg3KBMOWuN0djgymH0mXMxES2SeMeSTI$> 
>>>>
>>>> This diff file shows all changes made during AUTH48:
>>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9525-auth48diff.html__;!!GjvTz_vk!QLjdjO5qUyrzSWX-_LB3Y7Tu8EWXXsK7RsPOpiejxph7pcvNg3KBMOWuN0djgymH0mXMxES2VzK1Rks$ <https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9525-auth48diff.html__;!!GjvTz_vk!QLjdjO5qUyrzSWX-_LB3Y7Tu8EWXXsK7RsPOpiejxph7pcvNg3KBMOWuN0djgymH0mXMxES2VzK1Rks$> 
>>>>
>>>> This diff file shows all changes made to date:
>>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9525-diff.html__;!!GjvTz_vk!QLjdjO5qUyrzSWX-_LB3Y7Tu8EWXXsK7RsPOpiejxph7pcvNg3KBMOWuN0djgymH0mXMxES22m1Udis$ <https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9525-diff.html__;!!GjvTz_vk!QLjdjO5qUyrzSWX-_LB3Y7Tu8EWXXsK7RsPOpiejxph7pcvNg3KBMOWuN0djgymH0mXMxES22m1Udis$> 
>>>>
>>>> Note that it may be necessary for you to refresh your browser to view the most recent version. Please review the document carefully to ensure satisfaction as we do not make changes once it has been published as an RFC.
>>>>
>>>> Please contact us with any further updates or with your approval of the document in its current form. We will await approvals from each author prior to moving forward in the publication process.
>>>>
>>>> For the AUTH48 status of this document, please see:
>>>> https://urldefense.com/v3/__https://www.rfc-editor.org/auth48/rfc9525__;!!GjvTz_vk!QLjdjO5qUyrzSWX-_LB3Y7Tu8EWXXsK7RsPOpiejxph7pcvNg3KBMOWuN0djgymH0mXMxES2A5ZyqUc$ <https://urldefense.com/v3/__https://www.rfc-editor.org/auth48/rfc9525__;!!GjvTz_vk!QLjdjO5qUyrzSWX-_LB3Y7Tu8EWXXsK7RsPOpiejxph7pcvNg3KBMOWuN0djgymH0mXMxES2A5ZyqUc$> 
>>>>
>>>> Best regards,
>>>> RFC Editor/ap
>>>>
>>>>
>>>>> On Oct 31, 2023, at 10:07 AM, Peter Saint-Andre <stpeter@stpeter.im <mailto:stpeter@stpeter.im>> wrote:
>>>>>
>>>>> I've attached an XML file with further updates.
>>>>>
>>>>> Further comments inline, areas of agreement elided.
>>>>>
>>>>> Note: to ease my own mind about changes to this file, I've checked it into source control:
>>>>>
>>>>> https://urldefense.com/v3/__https://github.com/richsalz/draft-ietf-uta-rfc6125bis/pull/115__;!!GjvTz_vk!QLjdjO5qUyrzSWX-_LB3Y7Tu8EWXXsK7RsPOpiejxph7pcvNg3KBMOWuN0djgymH0mXMxES2YEXB7Z8$ <https://urldefense.com/v3/__https://github.com/richsalz/draft-ietf-uta-rfc6125bis/pull/115__;!!GjvTz_vk!QLjdjO5qUyrzSWX-_LB3Y7Tu8EWXXsK7RsPOpiejxph7pcvNg3KBMOWuN0djgymH0mXMxES2YEXB7Z8$> 
>>>>>
>>>>> On 10/31/23 8:57 AM, Salz, Rich wrote:
>>>>>> Sigh.
>>>>>> I followed the instructions and updated the XML. Here it is attached. I believe that we are in agreement but I leave it to you petty criminals to figure out. As a hint, search for “rfced” in the XML and then see my comments that immediately follow those.
>>>>>> *From: *Orie Steele <orie@transmute.indu <mailto:orie@transmute.indu>stries>
>>>>>> *Date: *Tuesday, October 31, 2023 at 10:05 AM
>>>>>> *To: *Peter Saint-Andre <stpeter@stpeter.im <mailto:stpeter@stpeter.im>>
>>>>>> *Cc: *"rfc-editor@rfc-editor.org <mailto:rfc-editor@rfc-editor.org>" <rfc-editor@rfc-editor.org <mailto:rfc-editor@rfc-editor.org>>, Rich Salz <rsalz@akamai.com <mailto:rsalz@akamai.com>>, "uta-ads@ietf.org <mailto:uta-ads@ietf.org>" <uta-ads@ietf.org <mailto:uta-ads@ietf.org>>, "uta-chairs@ietf.org <mailto:uta-chairs@ietf.org>" <uta-chairs@ietf.org <mailto:uta-chairs@ietf.org>>, "paul.wouters@aiven.io <mailto:paul.wouters@aiven.io>" <paul.wouters@aiven.io <mailto:paul.wouters@aiven.io>>, "auth48archive@rfc-editor.org <mailto:auth48archive@rfc-editor.org>" <auth48archive@rfc-editor.org <mailto:auth48archive@rfc-editor.org>>
>>>>>> *Subject: *Re: AUTH48: RFC-to-be 9525 <draft-ietf-uta-rfc6125bis-15> for your review
>>>>>> Inline:
>>>>>> On Mon, Oct 30, 2023 at 6:55 PM Peter Saint-Andre <stpeter@stpeter.im <mailto:stpeter@stpeter.im> <mailto:stpeter@stpeter.im <mailto:stpeter@stpeter.im>>> wrote:
>>>>>> Thanks for working on this document. Comments inline, areas of
>>>>>> agreement
>>>>>> elided.
>>>>>> On 10/30/23 10:15 AM, rfc-editor@rfc-editor.org <mailto:rfc-editor@rfc-editor.org>
>>>>>> <mailto:rfc-editor@rfc-editor.org <mailto:rfc-editor@rfc-editor.org>> wrote:
>>>>>
>>>>> <snip/>
>>>>>
>>>>>> > 7) <!--[rfced] RFC 2818 [HTTP-OVER-TLS] has been obsoleted by RFC
>>>>>> 9110
>>>>>> > [HTTP]. Please let us know if we can replace "[HTTP-OVER-TLS]"
>>>>>> > with "[HTTP]" in the following and also remove the
>>>>>> > "[HTTP-OVER-TLS]" entry from the References section since it is
>>>>>> > not cited elsewhere.
>>>>>> I think this should be done, but would like to hear from Rich.
>>>>>> That's acceptable to me. Rich, do you have concerns?
>>>>>> > In addition, please clarify "when the client uses [SVCB-FOR-HTTPS] or
>>>>>> > [SVCB-FOR-DNS]" - what is the client using or applying the PKIX
>>>>>> > validation rules to in these documents? Or is the intent to state
>>>>>> > that the PKIX validation rules are the same as described in these
>>>>>> > documents? Please clarify.
>>>>>> >
>>>>>> > Original:
>>>>>> > For example, the PKIX validation rules for [HTTP-OVER-TLS] and
>>>>>> > [DNS-OVER-TLS] do not change when the client uses
>>>>>> [SVCB-FOR-HTTPS]
>>>>>> > or [SVCB-FOR-DNS].
>>>>>> >
>>>>>> > Perhaps:
>>>>>> > For example, the PKIX validation rules described in [HTTP] and
>>>>>> > [DNS-OVER-TLS] are the same as described in [SVCB-FOR-HTTPS] and
>>>>>> > [SVCB-FOR-DNS].
>>>>>> > -->
>>>>>> I believe the meaning is explained in the previous sentence; this
>>>>>> sentence is merely an example that points to several of the
>>>>>> documents in
>>>>>> progress regarding SVCB.
>>>>>> I agree, but to answer the question directly I believe the intention is to communicate that the PKIX validation rules are the same,
>>>>>> as of now, and warn that they might not be in the future.
>>>>>
>>>>> OK, I propose the following modified text (also inside a comment in the XML file):
>>>>>
>>>>> For example, the PKIX validation rules for [HTTP-OVER-TLS] and
>>>>> [DNS-OVER-TLS] do not change when the client uses the DNS resource
>>>>> records defined in [SVCB-FOR-HTTPS] or [SVCB-FOR-DNS] to look up
>>>>> connection information.
>>>>>
>>>>>> > 19) <!-- [rfced] Please review the "Inclusive Language" portion
>>>>>> of the online
>>>>>> > Style Guide
>>>>>> <https://urldefense.com/v3/__https://www.rfc-editor.org/styleguide/part2/ <https://urldefense.com/v3/__https://www.rfc-editor.org/styleguide/part2/>*inclusive_language__;Iw!!GjvTz_vk!QLjdjO5qUyrzSWX-_LB3Y7Tu8EWXXsK7RsPOpiejxph7pcvNg3KBMOWuN0djgymH0mXMxES2KVGg9hE$ 
>>>>>> <https://urldefense.com/v3/__https:/www.rfc-editor.org/styleguide/part2/ <https://urldefense.com/v3/__https:/www.rfc-editor.org/styleguide/part2/>*inclusive_language__;Iw!!GjvTz_vk!QdpBBBfoK53ywTtBS24JUSgsd2iO6awbK8himXieJFxEDdi9ri9V_tuSZ4ggGXxFRzWarWtbDLbcFFvJN1c$>>
>>>>>> > and let us know if any changes are needed.
>>>>>> >
>>>>>> > For example, please consider whether "tradition" should be
>>>>>> updated for
>>>>>> > clarity. While the NIST website
>>>>>> >
>>>>>> <https://urldefense.com/v3/__https://www.nist.gov/nist-research-library/nist-technical-series-__;!!GjvTz_vk!QLjdjO5qUyrzSWX-_LB3Y7Tu8EWXXsK7RsPOpiejxph7pcvNg3KBMOWuN0djgymH0mXMxES2sS_5ylI$ <https://urldefense.com/v3/__https://www.nist.gov/nist-research-library/nist-technical-series-__;!!GjvTz_vk!QLjdjO5qUyrzSWX-_LB3Y7Tu8EWXXsK7RsPOpiejxph7pcvNg3KBMOWuN0djgymH0mXMxES2sS_5ylI$> 
>>>>>> <https://urldefense.com/v3/__https:/www.nist.gov/nist-research-library/nist-technical-series-__;!!GjvTz_vk!QdpBBBfoK53ywTtBS24JUSgsd2iO6awbK8himXieJFxEDdi9ri9V_tuSZ4ggGXxFRzWarWtbDLbcNDEGmAk$ <https://urldefense.com/v3/__https:/www.nist.gov/nist-research-library/nist-technical-series-__;!!GjvTz_vk!QdpBBBfoK53ywTtBS24JUSgsd2iO6awbK8himXieJFxEDdi9ri9V_tuSZ4ggGXxFRzWarWtbDLbcNDEGmAk$>>
>>>>>> > publications-author-instructions#table1> indicates that this term is
>>>>>> > potentially biased, it is also ambiguous. "Tradition" is a subjective
>>>>>> > term, as it is not the same for everyone.
>>>>>> > -->
>>>>>> Well, fully qualified domain names conforming to "preferred name
>>>>>> syntax"
>>>>>> as described in Section 3.5 of RFC 1034 were, in fact, the same for
>>>>>> everyone! So I don't consider the use of "traditional" here to be
>>>>>> biased
>>>>>> or ambiguous - that's just how the Internet was defined in IETF RFCs.
>>>>>
>>>>> In the XML file, Rich neatly sidestepped this issue by making this change:
>>>>>
>>>>> OLD
>>>>>
>>>>> If the DNS domain name portion of a reference identifier is a
>>>>> "traditional domain name"
>>>>>
>>>>> NEW:
>>>>>
>>>>> If the DNS domain name portion of a reference identifier
>>>>> is not an internationalized domain name
>>>>>
>>>>> That's fine with me.
>>>>>
>>>>> Peter
>>>>>
>>>>> <rfc9525.xml>
>>>>
>> <rfc9525.xml>
>