Re: [auth48] [AD] AUTH48: RFC-to-be 9277 <draft-ietf-cbor-file-magic-12> for your review
Carsten Bormann <cabo@tzi.org> Fri, 05 August 2022 16:30 UTC
Return-Path: <cabo@tzi.org>
X-Original-To: auth48archive@ietfa.amsl.com
Delivered-To: auth48archive@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F0AEAC157B5B; Fri, 5 Aug 2022 09:30:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.607
X-Spam-Level:
X-Spam-Status: No, score=-2.607 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xXZufLEUxMRn; Fri, 5 Aug 2022 09:30:55 -0700 (PDT)
Received: from gabriel-smtp.zfn.uni-bremen.de (gabriel-smtp.zfn.uni-bremen.de [IPv6:2001:638:708:32::15]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0FB28C14F736; Fri, 5 Aug 2022 09:30:54 -0700 (PDT)
Received: from [192.168.217.149] (p5089abf5.dip0.t-ipconnect.de [80.137.171.245]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by gabriel-smtp.zfn.uni-bremen.de (Postfix) with ESMTPSA id 4LzrgZ0SMDzDCcs; Fri, 5 Aug 2022 18:30:50 +0200 (CEST)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.120.23.2.7\))
From: Carsten Bormann <cabo@tzi.org>
In-Reply-To: <4A805B5F-87D1-4B64-BD95-A9BE76803EEE@amsl.com>
Date: Fri, 05 Aug 2022 18:30:49 +0200
Cc: RFC Editor <rfc-editor@rfc-editor.org>, Michael Richardson <mcr+ietf@sandelman.ca>, cbor-ads@ietf.org, cbor-chairs@ietf.org, Christian Amsüss <christian@amsuess.com>, auth48archive@rfc-editor.org
X-Mao-Original-Outgoing-Id: 681409849.626054-f73018f658dc041667837b2b1717240d
Content-Transfer-Encoding: quoted-printable
Message-Id: <4B486C33-842C-4E0D-88CA-D4B9D9007D2D@tzi.org>
References: <20220803210827.2D4B455D45@rfcpa.amsl.com> <A72D6D20-35C9-4D83-95BF-B1FA5DC92821@tzi.org> <15BA74A8-D16D-456E-9C7C-DB00D4786605@amsl.com> <805A67C7-6E3E-4B0C-925F-CD8F99A5970F@tzi.org> <4A805B5F-87D1-4B64-BD95-A9BE76803EEE@amsl.com>
To: Sandy Ginoza <sginoza@amsl.com>
X-Mailer: Apple Mail (2.3608.120.23.2.7)
Archived-At: <https://mailarchive.ietf.org/arch/msg/auth48archive/P555sMJFIp2QplUsPhjrAckdEbY>
Subject: Re: [auth48] [AD] AUTH48: RFC-to-be 9277 <draft-ietf-cbor-file-magic-12> for your review
X-BeenThere: auth48archive@rfc-editor.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Archiving AUTH48 exchanges between the RFC Production Center, the authors, and other related parties" <auth48archive.rfc-editor.org>
List-Unsubscribe: <https://mailman.rfc-editor.org/mailman/options/auth48archive>, <mailto:auth48archive-request@rfc-editor.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/auth48archive/>
List-Post: <mailto:auth48archive@rfc-editor.org>
List-Help: <mailto:auth48archive-request@rfc-editor.org?subject=help>
List-Subscribe: <https://mailman.rfc-editor.org/mailman/listinfo/auth48archive>, <mailto:auth48archive-request@rfc-editor.org?subject=subscribe>
X-List-Received-Date: Fri, 05 Aug 2022 16:30:59 -0000
Hi Sandy, thank you for the very quick turnaround before I vanish into a vacation! I believe RFC 9277-to-be is now ready for publishing. Grüße, Carsten > On 2022-08-05, at 18:11, Sandy Ginoza <sginoza@amsl.com> wrote: > > Hi Carsten, > > Thanks for your thorough review. The document has been updated as described below. Please review and let us know if any additional updates are needed. > > The files have been posted here: > https://www.rfc-editor.org/authors/rfc9277.txt > https://www.rfc-editor.org/authors/rfc9277.pdf > https://www.rfc-editor.org/authors/rfc9277.html > https://www.rfc-editor.org/authors/rfc9277.xml > > These diffs highlight the only the recent updates: > https://www.rfc-editor.org/authors/rfc9277-lastdiff.html > https://www.rfc-editor.org/authors/rfc9277-lastrfcdiff.html (side by side) > > AUTH48 diff: > https://www.rfc-editor.org/authors/rfc9277-auth48diff.html > > Comprehensive diffs: > https://www.rfc-editor.org/authors/rfc9277-diff.html > https://www.rfc-editor.org/authors/rfc9277-rfcdiff.html (side by side) > > Thanks, > Sandy > > > >> On Aug 5, 2022, at 5:47 AM, Carsten Bormann <cabo@tzi.org> wrote: >> >> Hi Sandy, >> >>> On 5. Aug 2022, at 04:38, Sandy Ginoza <sginoza@amsl.com> wrote: >>> >>> We have updated the document as described below, with a few minor updates (e.g., added commas or abbreviation expansion). >> >> Thank you. >> >> Here are my comments from a full reread: >> >> (1) >> Abstract: >> OLD: >> This document defines a stored ("file") format for Consice Binary >> NEW: >> This document defines a stored ("file") format for Concise Binary >> >> (2) >> 1. Introduction: >> OLD: >> certain ASN.1-based systems where most files are Privacy- >> Enhanced Mail (PEM) encoded; >> NEW: >> certain ASN.1-based systems where most files are Privacy-Enhanced Mail (PEM) encoded; >> >> (No space after Privacy-.) >> >> (3) >> 1. Introduction: >> OLD: >> determine it by other means. For instance, in classical macOS, a >> NEW: >> determine it by other means. For instance, in classical Mac OS, a >> >> (Classical Mac OS was styled this way, as opposed to modern macOS, which was named Mac OS X or variants thereof in between.) >> >> (4) >> 1. Introduction: >> OLD: >> A common way to identify the type of a file from its contents is to >> place a "magic number" at the start of the file contents [MAGIC]. In >> the media type registration template [RFC6838], it is noted that a >> magic number is asked for, if available, as is a file extension. >> NEW: >> A common way to identify the type of a file from its contents is to >> place a "magic number" at the start of the file contents [MAGIC]. In >> the media type registration template [RFC6838], a >> magic number is asked for, if available, as is a file extension. >> >> (The note is not in 6838, but here — but it is not necessary to phrase this as a note in the introduction. A “for instance” or some such might be added.) >> >> (5) >> 1. Introduction: >> OLD: >> A third method is also proposed by which this CBOR format tag is >> NEW: >> A third method is also proposed by which a CBOR format tag is >> >> (There is no referent for “this” here, and it is not needed either.) >> >> (6) >> 2.3.1. Example: >> OLD >> as assigned for application/missing-blocks+cbor-seq of the "CAP >> NEW: >> as assigned for application/missing-blocks+cbor-seq of the "CoAP >> >> (7) >> 3. Security Considerations: >> OLD: >> of a check versus a use issue.) For example, end-point assessment >> NEW: >> of a check versus use issue.) For example, end-point assessment >> >> >> (8) >>> - Global s/1668547090/1668574090 (see mail from Carsten dated 19 July 2022) >> >> I’m a bit confused here, as the mail dated 2022-07-19 was about the fix s/0x63470101/0x63740101/g in the TN formulae, which has been successfully executed. >> >> The value 1668574090 is an incorrect replacement for 1668547090. >> This change (5 places) needs to be reverted. >> Similar for 1668574250, which needs to revert to 1668547250 (2 places). >> >> (9) >> 4. IANA Considerations >> It is slightly weird that the introduction of 4 introduces Sections 4.1 and 4.3, but not Section 4.2. Maybe add in between: >> >> NEW: >> Section 4.2 documents the allocation for a CBOR tag to be used in the CBOR-Labeled Non-CBOR Data Enveloping Method (Appendix D, which also shows examples). >> >> (Cross reference the links for Section 4.2 and Appendix D, obviously.) >> >> (10) >> A.2. Can many items be trivially concatenated?: >> OLD: >> The program involved may throw errors or warnings on the Labeled CBOR >> Sequence if they have not yet been updated, but this may not be a >> NEW: >> The programs involved may throw errors or warnings on the Labeled CBOR >> Sequence if they have not yet been updated, but this may not be a >> >> (Or: A program… if it has not yet…) >> >> (11) >> Appendix B. CBOR Tags for CoAP Content Formats: >> >> OLD: >> together with a content encoding. >> NEW: >> together with a content coding (see Section 8.4.1 of [RFC9110]). >> >> (And add RFC 9110, which has since been published, to the informative references.) >> >> (12) >> OLD: >> Tags 55800 (Section 2.3) or 55801 (Appendix D): the byte string >> "BOR", signifying that the representation of the given content- >> NEW: >> Tags 55800 (Section 2.3) or 55801 (Appendix D): the byte string >> 'BOR', signifying that the representation of the given content- >> >> (‘BOR’ is diagnostic notation for a byte string; “BOR” swaps this out confusingly for that of a text string, which is not what this is.) >> >> A few more of these: >> >> (13) >> Appendix D. Using CBOR Labels for Non-CBOR data >> OLD: >> 3. The tag content is a 3-byte CBOR byte string containing >> 0x42_4F_52 ("BOR" in diagnostic notation). >> NEW: >> 3. The tag content is a 3-byte CBOR byte string containing >> 0x42_4F_52 ('BOR' in diagnostic notation). >> >> (14) >> OLD: >> encoded data item for the 3-byte string 0x42_4f_52 ("BOR" in >> diagnostic notation). >> NEW: >> encoded data item for the 3-byte string 0x42_4f_52 ('BOR' in >> diagnostic notation). >> >> >> Grüße, Carsten >> >
- [auth48] AUTH48: RFC-to-be 9277 <draft-ietf-cbor-… rfc-editor
- Re: [auth48] AUTH48: RFC-to-be 9277 <draft-ietf-c… rfc-editor
- Re: [auth48] AUTH48: RFC-to-be 9277 <draft-ietf-c… Michael Richardson
- Re: [auth48] AUTH48: RFC-to-be 9277 <draft-ietf-c… Carsten Bormann
- Re: [auth48] AUTH48: RFC-to-be 9277 <draft-ietf-c… Michael Richardson
- Re: [auth48] AUTH48: RFC-to-be 9277 <draft-ietf-c… Michael Richardson
- [auth48] [AD] Re: AUTH48: RFC-to-be 9277 <draft-i… Sandy Ginoza
- Re: [auth48] [AD] AUTH48: RFC-to-be 9277 <draft-i… Carsten Bormann
- Re: [auth48] [AD] AUTH48: RFC-to-be 9277 <draft-i… Sandy Ginoza
- Re: [auth48] [AD] AUTH48: RFC-to-be 9277 <draft-i… Carsten Bormann
- Re: [auth48] [AD] AUTH48: RFC-to-be 9277 <draft-i… Sandy Ginoza
- Re: [auth48] [AD] AUTH48: RFC-to-be 9277 <draft-i… Michael Richardson
- [auth48] [AD] AUTH48: RFC-to-be 9277 <draft-ietf-… Sandy Ginoza
- [auth48] [AD - Murray] AUTH48: RFC-to-be 9277 <dr… Sandy Ginoza
- Re: [auth48] [AD] AUTH48: RFC-to-be 9277 <draft-i… Sandy Ginoza
- [auth48] [IANA #1237702] Re: [AD] AUTH48: RFC-to-… Amanda Baber via RT
- Re: [auth48] [AD - Murray] AUTH48: RFC-to-be 9277… Murray S. Kucherawy
- Re: [auth48] [AD - Murray] AUTH48: RFC-to-be 9277… Michael Richardson
- Re: [auth48] [AD - Murray] AUTH48: RFC-to-be 9277… Carsten Bormann
- Re: [auth48] [AD - Murray] AUTH48: RFC-to-be 9277… Michael Richardson
- Re: [auth48] [AD - Murray] AUTH48: RFC-to-be 9277… Murray S. Kucherawy
- Re: [auth48] [AD - Murray] AUTH48: RFC-to-be 9277… Carsten Bormann
- Re: [auth48] [AD - Murray] AUTH48: RFC-to-be 9277… Michael Richardson
- Re: [auth48] [AD - Murray] AUTH48: RFC-to-be 9277… Carsten Bormann
- Re: [auth48] [AD - Murray] AUTH48: RFC-to-be 9277… Sandy Ginoza
- [auth48] Final question - AUTH48: RFC-to-be 9277 … Sandy Ginoza
- Re: [auth48] Final question - AUTH48: RFC-to-be 9… Carsten Bormann
- Re: [auth48] Final question - AUTH48: RFC-to-be 9… Michael Richardson
- Re: [auth48] Final question - AUTH48: RFC-to-be 9… John R. Levine
- Re: [auth48] Final question - AUTH48: RFC-to-be 9… Sandy Ginoza