Re: [auth48] [AD] AUTH48: RFC-to-be 9472 <draft-ietf-opsawg-sbom-access-18> for your review

Eliot Lear <lear@cisco.com> Tue, 19 September 2023 05:42 UTC

Return-Path: <lear@cisco.com>
X-Original-To: auth48archive@ietfa.amsl.com
Delivered-To: auth48archive@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 56B3AC1526E9; Mon, 18 Sep 2023 22:42:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.608
X-Spam-Level:
X-Spam-Status: No, score=-14.608 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id F8ayBTLWpWBm; Mon, 18 Sep 2023 22:42:32 -0700 (PDT)
Received: from aer-iport-4.cisco.com (aer-iport-4.cisco.com [173.38.203.54]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 01B0FC1519B9; Mon, 18 Sep 2023 22:42:31 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=18453; q=dns/txt; s=iport; t=1695102152; x=1696311752; h=mime-version:subject:from:in-reply-to:date:cc:message-id: references:to; bh=XBEhAnfX13hKaAVPv3OFkoeUp3Ju7uXa2EwvdueNpRU=; b=NHmS2DVoB1yTIvIhqZJMoE8fS040fnt44O1mlV6AIPf5GUIWSK0CD4DY knghjtTkl24B7qy17lJ0J4XbmhEphy3Eog/maWeajniGm0YI+SNXSf3x2 Ogsr4TZDSn22IEcYqLzaCtEIC6PII46JBXGMinEWYgq05DDQ79TcB1Bat g=;
X-CSE-ConnectionGUID: VhzUEz20S6Gc3nEcOgBzFg==
X-CSE-MsgGUID: DADRYctFRBOdkC5tF+LXYw==
X-Files: signature.asc : 488
X-IronPort-AV: E=Sophos; i="6.02,158,1688428800"; d="asc'?scan'208"; a="8964481"
Received: from aer-iport-nat.cisco.com (HELO aer-core-6.cisco.com) ([173.38.203.22]) by aer-iport-4.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 19 Sep 2023 05:42:30 +0000
Received: from smtpclient.apple ([10.61.156.22]) by aer-core-6.cisco.com (8.15.2/8.15.2) with ESMTPS id 38J5gTkn107161 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NO); Tue, 19 Sep 2023 05:42:29 GMT
Content-Type: multipart/signed; boundary="Apple-Mail=_3F0CE244-7588-4261-9EA3-59AE0F24EF08"; protocol="application/pgp-signature"; micalg="pgp-sha256"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3731.700.6\))
From: Eliot Lear <lear@cisco.com>
In-Reply-To: <6ED283CE-8A6F-4AF3-BF24-86EC4F088DA2@amsl.com>
Date: Tue, 19 Sep 2023 07:42:19 +0200
Cc: "Rob Wilton (rwilton)" <rwilton@cisco.com>, "Rose, Scott W. (Fed)" <scott.rose@nist.gov>, RFC Editor <rfc-editor@rfc-editor.org>, opsawg-ads@ietf.org, opsawg-chairs@ietf.org, bill.wu@huawei.com, auth48archive@rfc-editor.org
Message-Id: <7E392C5B-CA0D-440A-9C10-9668D7AD4F79@cisco.com>
References: <20230908232621.2FE7CE5EA7@rfcpa.amsl.com> <BE129746-6B47-4FA8-A918-44B728F347C3@nist.gov> <2F1A389E-ABED-4C37-B41A-79A9E15D59CA@amsl.com> <1D2F40E4-3276-49E3-B70C-D6FC5FAC0430@cisco.com> <621E366B-9EC0-4783-B075-8EAD78A75CD6@nist.gov> <96C191BF-2D68-47CF-9672-9DD33EACB4C0@amsl.com> <4F18F944-A918-4AFE-B56D-606E48497E32@cisco.com> <6ED283CE-8A6F-4AF3-BF24-86EC4F088DA2@amsl.com>
To: Sarah Tarrant <starrant@amsl.com>
X-Mailer: Apple Mail (2.3731.700.6)
X-Outbound-SMTP-Client: 10.61.156.22, [10.61.156.22]
X-Outbound-Node: aer-core-6.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/auth48archive/MXKt0G0QvfLLz4sVW80ERHRqjEY>
Subject: Re: [auth48] [AD] AUTH48: RFC-to-be 9472 <draft-ietf-opsawg-sbom-access-18> for your review
X-BeenThere: auth48archive@rfc-editor.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Archiving AUTH48 exchanges between the RFC Production Center, the authors, and other related parties" <auth48archive.rfc-editor.org>
List-Unsubscribe: <https://mailman.rfc-editor.org/mailman/options/auth48archive>, <mailto:auth48archive-request@rfc-editor.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/auth48archive/>
List-Post: <mailto:auth48archive@rfc-editor.org>
List-Help: <mailto:auth48archive-request@rfc-editor.org?subject=help>
List-Subscribe: <https://mailman.rfc-editor.org/mailman/listinfo/auth48archive>, <mailto:auth48archive-request@rfc-editor.org?subject=subscribe>
X-List-Received-Date: Tue, 19 Sep 2023 05:42:37 -0000

Hi Sarah,

I think I’ve caught one more small issue, but this is with the IANA registry.  Could you please check with them on the following:

In 7.2, I think the name field is supposed to be ietf-mud-transparency and not ietf-mud.

After this matter is resolved, I can approve publication.

Thanks,

Eliot


> On 18 Sep 2023, at 20:37, Sarah Tarrant <starrant@amsl.com> wrote:
> 
> Hello Eliot and Rob*,
> 
> Elliot, thank you for your reply. We have updated the document accordingly.
> 
> *Rob, as AD, please review and approve the changes to the sourcecode in Sections 5.1 and 5.3. These changes are best viewed in this diff file: https://www.rfc-editor.org/authors/rfc9472-auth48diff.html.
> 
> We will await approvals from each of the parties listed above prior to moving this document forward in the publication process.
> 
> Updated XML file:
> http://www.rfc-editor.org/authors/rfc9472.xml
> 
> Updated output files:
> https://www.rfc-editor.org/authors/rfc9472.html
> https://www.rfc-editor.org/authors/rfc9472.txt
> https://www.rfc-editor.org/authors/rfc9472.pdf
> 
> Diff file showing all changes made during AUTH48:
> https://www.rfc-editor.org/authors/rfc9472-auth48diff.html
> 
> Diff files showing all changes:
> https://www.rfc-editor.org/authors/rfc9472-diff.html
> https://www.rfc-editor.org/authors/rfc9472-rfcdiff.html (side-by-side diff)
> 
> Note that it may be necessary for you to refresh your browser to view the most recent version.
> 
> For the AUTH48 status of this document, please see:
> https://www.rfc-editor.org/auth48/rfc9472
> 
> Thank you,
> 
> RFC Editor/st
> 
>> On Sep 16, 2023, at 9:04 AM, Eliot Lear <lear@cisco.com> wrote:
>> 
>> Sarah,
>> 
>> I believe that I have found several errors in the examples.  There are two problems:
>> 
>> 1.  sbom-url should appear as part of an array of objects, and is not.
>> 2.  There is one case where mudtx wasn’t used where it should have been.
>> @Rob, please check me on this.  This should correspond to "list sboms”  in the model.
>> 
>> In Section 5.1, first example, the change is adding the sboms array:
>> 
>> OLD:
>> {
>> "ietf-mud:mud": {
>> "mud-version": 1,
>> "extensions": [
>> "transparency"
>> ],
>> "mudtx:transparency": {
>> "sbom-url": "https://iot.example.com/info/modelX/sbom.json",
>> "vuln-url" : [
>> "https://iotd.example.com/info/modelX/csaf.json"
>> ]
>> },
>> "mud-url": "https://iot.example.com/modelX.json",
>> "mud-signature": "https://iot.example.com/modelX.p7s",
>> "last-update": "2022-01-05T13:29:12+00:00",
>> "cache-validity": 48,
>> "is-supported": true,
>> "systeminfo": "retrieving vuln and SBOM info via a cloud service",
>> "mfg-name": "Example, Inc.",
>> "documentation": "https://iot.example.com/doc/modelX",
>> "model-name": "modelX"
>> }
>> }
>> NEW:
>> {
>> "ietf-mud:mud": {
>> "mud-version": 1,
>> "extensions": [
>> "transparency"
>> ],
>> "mudtx:transparency": {
>> sboms: [ {
>> "version-info": "1.2",
>> "sbom-url": "https://iot.example.com/info/modelX/sbom.json"
>> } ],
>> "vuln-url" : [
>> "https://iotd.example.com/info/modelX/csaf.json"
>> ]
>> },
>> "mud-url": "https://iot.example.com/modelX.json",
>> "mud-signature": "https://iot.example.com/modelX.p7s",
>> "last-update": "2022-01-05T13:29:12+00:00",
>> "cache-validity": 48,
>> "is-supported": true,
>> "systeminfo": "retrieving vuln and SBOM info via a cloud service",
>> "mfg-name": "Example, Inc.",
>> "documentation": "https://iot.example.com/doc/modelX",
>> "model-name": "modelX"
>> }
>> }
>> 
>> Section 5.1, 2nd Example, same change:
>> 
>> 
>> OLD:
>> 
>> {
>> "ietf-mud:mud": {
>> "mud-version": 1,
>> "extensions": [
>> "transparency"
>> ],
>> "mudtx:transparency": {
>> "sbom-url": "https://iot.example.com/info/modelX/sbom.json"
>> },
>> "mud-url": "https://iot.example.com/modelX.json",
>> "mud-signature": "https://iot.example.com/modelX.p7s",
>> "last-update": "2022-01-05T13:29:12+00:00",
>> "cache-validity": 48,
>> "is-supported": true,
>> "systeminfo": "retrieving only SBOM info via a cloud service",
>> "mfg-name": "Example, Inc.",
>> "documentation": "https://iot.example.com/doc/modelX",
>> "model-name": "modelX"
>> }
>> }
>> NEW:
>> {
>> "ietf-mud:mud": {
>> "mud-version": 1,
>> "extensions": [
>> "transparency"
>> ],
>> "mudtx:transparency": {
>> sboms: [ {
>> "version-info": "1.2",
>> "sbom-url": "https://iot.example.com/info/modelX/sbom.json"
>> } ],
>> },
>> "mud-url": "https://iot.example.com/modelX.json",
>> "mud-signature": "https://iot.example.com/modelX.p7s",
>> "last-update": "2022-01-05T13:29:12+00:00",
>> "cache-validity": 48,
>> "is-supported": true,
>> "systeminfo": "retrieving vuln and SBOM info via a cloud service",
>> "mfg-name": "Example, Inc.",
>> "documentation": "https://iot.example.com/doc/modelX",
>> "model-name": "modelX"
>> }
>> }
>> 
>> Section 5.3:
>> 
>> OLD:
>> {
>> "ietf-mud:mud": {
>> "mud-version": 1,
>> "extensions": [
>> "transparency"
>> ],
>> "ietf-mud-transparency:transparency": {
>> "contact-info": "https://iot-device.example.com/contact-info.html",
>> "vuln-url" : [
>> "https://iotd.example.com/info/modelX/csaf.json"
>> ]
>> },
>> "mud-url": "https://iot-device.example.com/modelX.json",
>> "mud-signature": "https://iot-device.example.com/modelX.p7s",
>> "last-update": "2021-07-09T06:16:42+00:00",
>> "cache-validity": 48,
>> "is-supported": true,
>> "systeminfo": "retrieving vuln and SBOM info via a cloud service",
>> "mfg-name": "Example, Inc.",
>> "documentation": "https://iot-device.example.com/doc/modelX",
>> "model-name": "modelX"
>> }
>> }
>> NEW:
>> {
>> "ietf-mud:mud": {
>> "mud-version": 1,
>> "extensions": [
>> "transparency"
>> ],
>> "mudtx:transparency": {
>> "contact-info": "https://iot-device.example.com/contact-info.html",
>> "vuln-url" : [
>> "https://iotd.example.com/info/modelX/csaf.json"
>> ]
>> },
>> "mud-url": "https://iot-device.example.com/modelX.json",
>> "mud-signature": "https://iot-device.example.com/modelX.p7s",
>> "last-update": "2021-07-09T06:16:42+00:00",
>> "cache-validity": 48,
>> "is-supported": true,
>> "systeminfo": "retrieving vuln and SBOM info via a cloud service",
>> "mfg-name": "Example, Inc.",
>> "documentation": "https://iot-device.example.com/doc/modelX",
>> "model-name": "modelX"
>> }
>> }
>> Eliot
>>> On 13 Sep 2023, at 22:34, Sarah Tarrant <starrant@amsl.com> wrote:
>>> 
>>> Hello Eliot and Scott,
>>> 
>>> Thank you for your replies. We have updated the document accordingly, and all of our questions for the authors have been addressed.
>>> 
>>> Please review the document carefully to ensure satisfaction as we do not make changes once it has been published as an RFC. Contact us with any further updates or with your approval of the document in its current form. We will await approvals from each author prior to moving forward in the publication process. We also need Rob’s AD approval of the change in Section 1.3 and review of question #10 prior to moving forward.
>>> 
>>> Updated XML file:
>>> http://www.rfc-editor.org/authors/rfc9472.xml
>>> 
>>> Updated output files:
>>> https://www.rfc-editor.org/authors/rfc9472.html
>>> https://www.rfc-editor.org/authors/rfc9472.txt
>>> https://www.rfc-editor.org/authors/rfc9472.pdf
>>> 
>>> Diff file showing all changes made during AUTH48:
>>> https://www.rfc-editor.org/authors/rfc9472-auth48diff.html
>>> 
>>> Diff files showing all changes:
>>> https://www.rfc-editor.org/authors/rfc9472-diff.html
>>> https://www.rfc-editor.org/authors/rfc9472-rfcdiff.html (side-by-side diff)
>>> 
>>> Note that it may be necessary for you to refresh your browser to view the most recent version.
>>> 
>>> For the AUTH48 status of this document, please see:
>>> https://www.rfc-editor.org/auth48/rfc9472
>>> 
>>> Thank you,
>>> 
>>> RFC Editor/st
>>> 
>>>> On Sep 13, 2023, at 8:14 AM, Rose, Scott W. (Fed) <scott.rose@nist.gov> wrote:
>>>> 
>>>> Sarah,
>>>> I am generally fine with the changes, specific replies below:
>>>> 
>>>> Thanks,
>>>> Scott
>>>> 
>>>> On 13 Sep 2023, at 3:15, Eliot Lear wrote:
>>>> 
>>>>> Hi Sarah and thanks!  Please see below.
>>>>> 
>>>>>> On 12 Sep 2023, at 20:50, Sarah Tarrant <starrant@amsl.com> wrote:
>>>>>> 
>>>>>> Hello Eliot, Scott, and Rob*,
>>>>>> 
>>>>>> *Rob, as AD, please review the change in the last paragraph of Section 1.3 and let us know if you approve. The change is best viewed in this diff file: https://www.rfc-editor.org/authors/rfc9472-auth48diff.html. Also, please let us know your thoughts on this question (note that RFCs 6242, 8341, and 8446 are included in the template at https://trac.ietf.org/trac/ops/wiki/yang-security-guidelines):
>>>>>> 
>>>>>>> 10) <!-- [rfced] *[AD] Section 6: The Security Considerations section does not
>>>>>>> follow the requirements listed on
>>>>>>> https://trac.ietf.org/trac/ops/wiki/yang-security-guidelines, which says
>>>>>>> "This section MUST be patterned after the latest approved template."
>>>>>>> Please confirm if the current text is acceptable per the context of the
>>>>>>> document or if any further updates are needed in order to follow the
>>>>>>> template.
>>>>>>> 
>>>>>>> Also, please confirm if it is acceptable that RFCs 6242, 8341, and
>>>>>>> 8446 are not listed in the Normative References section or if they
>>>>>>> should be added.
>>>>>>> —>
>>>>>> 
>>>>>> 
>>>>>> Eliot and Scott, thank you for your replies; we have updated the document accordingly. We have a few followup questions:
>>>>>> 
>>>>>> 1) We added the sentence in ii) per your reply to this question. We also added RFC 7231 as a normative reference. Please confirm that this is correct. Or should it be informative instead?
>>>>> 
>>>>> That’s correct.
>>>>> 
>>>>>> 
>>>>>>>> e) We note that RFCs 6991 and 7231 are only referenced in the YANG
>>>>>>>> module and not in the running text. In order to have a 1:1 matchup
>>>>>>>> between the references section and the text, may we add an introductory
>>>>>>>> sentence before the YANG module that includes these citations (option i)?
>>>>>>>> Alternatively, you may reference all of the RFCs that are mentioned
>>>>>>>> (option ii). Please let us know your preference.
>>>>>>>> 
>>>>>>>> Perhaps:
>>>>>>>> i)  This YANG module references [RFC6991] and [RFC7231].
>>>>>>>> or
>>>>>>>> ii) This YANG module references [RFC6991], [RFC7231], [RFC7252],
>>>>>>>> [RFC8520], and [RFC9110].
>>>>>>> 
>>>>>>> 
>>>>>>> ii seems complete.
>>>>>> 
>>>>>> 
>>>>>> 2) Regarding this question:
>>>>>> 
>>>>>>>> 11) <!--[rfced] Is this sentence intended to be an ordered list (option A)
>>>>>>>> or are "any change in a URL" and "any change to the authority
>>>>>>>> section" the 2 risks that are being referred to (option B)?
>>>>>>>> 
>>>>>>>> Original:
>>>>>>>> To address either risk, any change in a URL, and in particular to the
>>>>>>>> authority section, two approaches may be used:
>>>>>>>> 
>>>>>>>> Perhaps:
>>>>>>>> A) To address either risk, any change in a URL, and particularly any change
>>>>>>>> to the authority section, two approaches may be used:
>>>>>>>> 
>>>>>>>> or
>>>>>>>> 
>>>>>>>> B) To address either risk, i.e., any change in a URL and, in particular, to
>>>>>>>> the authority section, two approaches may be used:
>>>>>>>> -->
>>>>>>> 
>>>>>>> How about:
>>>>>>> 
>>>>>>>> (C)  To address either risk, any change in a URL, and in particular to the
>>>>>>>> authority section; two approaches may be used:
>>>>>>> 
>>>>>>> ?
>>>>>> 
>>>>>> We are still having trouble understanding this sentence. (Note that the text before the semicolon in (C) is not a complete sentence.) Would something like the following work?
>>>>>> 
>>>>>> Perhaps:
>>>>>> Two approaches may be used to address these risks and any change in a URL (particularly in the
>>>>>> authority section):
>>>>>> 
>>>>> 
>>>>> Ok, having re-read the context, the authority section phrase is redundant, so we can say:
>>>>> 
>>>>>> To address either of these risks or any tampering of a URL:
>>>>> 
>>>> 
>>>> This seems fine.
>>>> 
>>>>> 
>>>>> 
>>>>>> 
>>>>>> 3) Regarding this question:
>>>>>> 
>>>>>>>> 15) <!-- [rfced] The following lines exceed the 72-character limit for
>>>>>>>> sourcecode. Please let us know how these lines can be modified.
>>>>>>>> 
>>>>>>>> Section 5.1 (1 character over):
>>>>>>>> "systeminfo": "retrieving vuln and SBOM info via a cloud service",
>>>>>>>> 
>>>>>>>> Section 5.2 (1 character over):
>>>>>>>> "systeminfo": "mixed example: SBOM on device, vuln info in cloud",
>>>>>>>> 
>>>>>>>> Section 5.3 (2 characters over):
>>>>>>>> "contact-info": "https://iot-device.example.com/contact-info.html",
>>>>>>>> 
>>>>>>>> Section 5.3 (1 character over):
>>>>>>>> "systeminfo": "retrieving vuln and SBOM info via a cloud service",
>>>>>>>> -->
>>>>>>>> 
>>>>>>> 
>>>>>>> Would you mind out-denting these lines?
>>>>>> 
>>>>>> Please confirm that we updated these correctly. We moved the lines in each example mentioned above one or two spaces (as appropriate) to the left to meet the character limit, though we couldn’t not move the “{“ at the beginning and end of each example as these were already at the left margin.
>>>>> 
>>>>> 
>>>>> That’s okay.
>>>>> 
>>>>> Aside: this 72 character limit was VERY important when printers could only print 80 columns, but that was on its way out even when *I* was a student in the 80s (I never saw an actual line printer after college).
>>>>> 
>>>>> Regards,
>>>>> 
>>>>> Eliot
>>>>> 
>>>>>> 
>>>>>> ______________
>>>>>> 
>>>>>> Updated XML file:
>>>>>> http://www.rfc-editor.org/authors/rfc9472.xml
>>>>>> 
>>>>>> Updated output files:
>>>>>> https://www.rfc-editor.org/authors/rfc9472.html
>>>>>> https://www.rfc-editor.org/authors/rfc9472.txt
>>>>>> https://www.rfc-editor.org/authors/rfc9472.pdf
>>>>>> 
>>>>>> Diff file showing all changes made during AUTH48:
>>>>>> https://www.rfc-editor.org/authors/rfc9472-auth48diff.html
>>>>>> 
>>>>>> Diff files showing all changes:
>>>>>> https://www.rfc-editor.org/authors/rfc9472-diff.html
>>>>>> https://www.rfc-editor.org/authors/rfc9472-rfcdiff.html (side-by-side diff)
>>>>>> 
>>>>>> Note that it may be necessary for you to refresh your browser to view the most recent version.
>>>>>> 
>>>>>> For the AUTH48 status of this document, please see:
>>>>>> https://www.rfc-editor.org/auth48/rfc9472
>>>>>> 
>>>>>> Thank you,
>>>>>> 
>>>>>> RFC Editor/st
>>>>>> 
>>>>>>> On Sep 11, 2023, at 12:23 PM, Rose, Scott W. (Fed) <scott.rose=40nist.gov@dmarc.ietf.org> wrote:
>>>>>>> 
>>>>>>> On 8 Sep 2023, at 19:26, rfc-editor@rfc-editor.org wrote:
>>>>>>> 
>>>>>>>> Authors and *AD,
>>>>>>>> 
>>>>>>>> While reviewing this document during AUTH48, please resolve (as necessary) the following questions, which are also in the XML file.
>>>>>>>> 
>>>>>>> 
>>>>>>>> 
>>>>>>>> 17) <!-- [rfced] FYI: We have added expansions for the following abbreviations
>>>>>>>> per Section 3.6 of RFC 7322 ("RFC Style Guide"). Please review each
>>>>>>>> expansion in the document carefully to ensure correctness.
>>>>>>>> 
>>>>>>>> Access Control Lists (ACLs)
>>>>>>>> Constrained Application Protocol (CoAP)
>>>>>>>> Internet of Things (IoT)
>>>>>>>> -->
>>>>>>>> 
>>>>>>>> 
>>>>>>>> 18) <!-- [rfced] Please review the "Inclusive Language" portion of the online
>>>>>>>> Style Guide <https://www.rfc-editor.org/styleguide/part2/#inclusive_language>
>>>>>>>> and let us know if any changes are needed.
>>>>>>>> 
>>>>>>>> Note that our script did not flag any words in particular, but this should
>>>>>>>> still be reviewed as a best practice.
>>>>>>>> -->
>>>>>>>> 
>>>>>>> 
>>>>>>> FWIW, I did a pass through to match against the NIST inclusive language guidance and did not find anything that needed to be addressed.  Future changes may change that (not likely, but maybe).
>>>>>>> 
>>>>>>> Thanks
>>>>>>> Scott
>>>>>>> 
>>>>>>> 
>>>>>>> 
>>>>>>> 
>>>>>>> ==================================
>>>>>>> Scott Rose NIST/CTL
>>>>>>> scott.rose@nist.gov
>>>>>>> ph: +1-301-975-8439 (w)
>>>>>>> +1-571-249-3761 (GoogleVoice)
>>>>>>> ==================================
>>>>>> 
>>>> 
>>>> 
>>>> ==================================
>>>> Scott Rose NIST/CTL
>>>> scott.rose@nist.gov
>>>> ph: +1-301-975-8439 (w)
>>>>  +1-571-249-3761 (GoogleVoice)
>>>> ==================================
>>> 
>>> 
>> 
>