Re: [auth48] AUTH48: RFC-to-be 9463 <draft-ietf-add-dnr-16> for your review

mohamed.boucadair@orange.com Tue, 12 September 2023 07:56 UTC

Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: auth48archive@ietfa.amsl.com
Delivered-To: auth48archive@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E29C5C1782B1; Tue, 12 Sep 2023 00:56:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.004
X-Spam-Level:
X-Spam-Status: No, score=-2.004 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTTP_ESCAPED_HOST=0.1, RCVD_IN_MSPIKE_H5=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=orange.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id y-ytwtsys_nR; Tue, 12 Sep 2023 00:56:44 -0700 (PDT)
Received: from smtp-out.orange.com (smtp-out.orange.com [80.12.210.122]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4C4EAC13AE28; Tue, 12 Sep 2023 00:56:43 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=orange.com; i=@orange.com; q=dns/txt; s=orange002; t=1694505403; x=1726041403; h=to:cc:subject:date:message-id:references:in-reply-to: mime-version:content-transfer-encoding:from; bh=zyRcwGzi6s+xkODwnHnm/wNk1G7Bf+t/bqNw6Z9kv9A=; b=R+97ufc+hpVzynIC3Mulx2rB2+xaVbqiF/9HY/CExvWtBxBZQBB6gx0I 6BH5FX5SNpMiubZ9XAWmjIwzNwMpoQ60W/rfk0pwsX96MSIBJ9sRHkFnu Y1KI5XMO275Uctc6Z+Rc91uB60rKHBpmFWZiXTICh6UJeL5Q4/gy1wmCW vgJHGim2U4H530Y3DjOUzDv8RDA5WrbezFJlGS1oRjVahPz4s/e92Ldpm MhRZwJTihvKeR9AOvLDnovN/Mmv05wzMmnLaExWVI7ezg1LVN1putPCVP v+Xly9PBRtMn8gxUqt4M6iVHS05tjGZblb3kkrfI/Lmngx5A0EgxyVAVJ w==;
Received: from unknown (HELO opfedv3rlp0d.nor.fr.ftgroup) ([x.x.x.x]) by smtp-out.orange.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 12 Sep 2023 09:56:41 +0200
Received: from unknown (HELO opzinddimail4.si.francetelecom.fr) ([x.x.x.x]) by opfedv3rlp0d.nor.fr.ftgroup with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 12 Sep 2023 09:56:41 +0200
Received: from opzinddimail4.si.francetelecom.fr (unknown [127.0.0.1]) by DDEI (Postfix) with SMTP id 12FBCBC15906; Tue, 12 Sep 2023 09:56:41 +0200 (CEST)
Received: from opzinddimail4.si.francetelecom.fr (unknown [127.0.0.1]) by DDEI (Postfix) with ESMTP id 55E62BC05346; Tue, 12 Sep 2023 09:56:25 +0200 (CEST)
Received: from smtp-out365.orange.com (unknown [x.x.x.x]) by opzinddimail4.si.francetelecom.fr (Postfix) with ESMTPS; Tue, 12 Sep 2023 09:56:25 +0200 (CEST)
Received: from mail-db3eur04lp2059.outbound.protection.outlook.com (HELO EUR04-DB3-obe.outbound.protection.outlook.com) ([104.47.12.59]) by smtp-out365.orange.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 12 Sep 2023 09:56:24 +0200
Received: from DU2PR02MB10160.eurprd02.prod.outlook.com (2603:10a6:10:49b::6) by GVXPR02MB8350.eurprd02.prod.outlook.com (2603:10a6:150:68::6) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6768.30; Tue, 12 Sep 2023 07:56:19 +0000
Received: from DU2PR02MB10160.eurprd02.prod.outlook.com ([fe80::9505:b6c8:4570:dad]) by DU2PR02MB10160.eurprd02.prod.outlook.com ([fe80::9505:b6c8:4570:dad%4]) with mapi id 15.20.6768.029; Tue, 12 Sep 2023 07:56:19 +0000
From: mohamed.boucadair@orange.com
X-TM-AS-ERS: 10.106.160.160-127.5.254.253
X-TM-AS-SMTP: 1.0 c210cC1vdXQzNjUub3JhbmdlLmNvbQ== bW9oYW1lZC5ib3VjYWRhaXJAb 3JhbmdlLmNvbQ==
X-DDEI-TLS-USAGE: Used
Authentication-Results: smtp-out365.orange.com; dkim=none (message not signed) header.i=none; spf=Fail smtp.mailfrom=mohamed.boucadair@orange.com; spf=Pass smtp.helo=postmaster@EUR04-DB3-obe.outbound.protection.outlook.com
Received-SPF: Fail (smtp-in365b.orange.com: domain of mohamed.boucadair@orange.com does not designate 104.47.12.59 as permitted sender) identity=mailfrom; client-ip=104.47.12.59; receiver=smtp-in365b.orange.com; envelope-from="mohamed.boucadair@orange.com"; x-sender="mohamed.boucadair@orange.com"; x-conformance=spf_only; x-record-type="v=spf1"; x-record-text="v=spf1 ip4:80.12.66.32/28 ip4:80.12.210.96/28 ip4:80.12.70.34/31 ip4:80.12.70.36 include:spfa.orange.com include:spfb.orange.com include:spfc.orange.com include:spfd.orange.com include:spfe.orange.com include:spff.orange.com include:spf6a.orange.com include:spffed-ip.orange.com include:spffed-mm.orange.com -all"
Received-SPF: Pass (smtp-in365b.orange.com: domain of postmaster@EUR04-DB3-obe.outbound.protection.outlook.com designates 104.47.12.59 as permitted sender) identity=helo; client-ip=104.47.12.59; receiver=smtp-in365b.orange.com; envelope-from="mohamed.boucadair@orange.com"; x-sender="postmaster@EUR04-DB3-obe.outbound.protection.outlook.com"; x-conformance=spf_only; x-record-type="v=spf1"; x-record-text="v=spf1 ip4:40.92.0.0/15 ip4:40.107.0.0/16 ip4:52.100.0.0/14 ip4:104.47.0.0/17 ip6:2a01:111:f400::/48 ip6:2a01:111:f403::/49 ip6:2a01:111:f403:8000::/50 ip6:2a01:111:f403:c000::/51 ip6:2a01:111:f403:f000::/52 -all"
IronPort-Data: A9a23:3+GMGqkt2BuMkH4B17T/cRPo5gzTIERdPkR7XQ2eYbSJt1+Wr1Gzt xIaWGmHOancZWPyeYp/PI/k8xwGvZ7Uzd5iTlBlpHwzEy4T+ZvOCOrCIxarNUt+DCFioGGLT Sk6QoOdRCzhZiaE/n9BCpC48T8mk/jgqoPUUIbsIjp2SRJvVBAvgBdin/9RqoNziLBVOSvV0 T/Ji5OZYAXNNwJcaDpOsPrS8Uk35ZwehRtD1rAATaES1LPhvylNZH4vDfnZB2f1RIBSAtm7S 47rpF1u1jqEl/uFIorNfofTKiXmcJaLVeS9oiM+t5yZv/R3jndaPpDXlBYrQRw/Zz2hx7idw TjW3HC6YV9B0qbkwIzxX/TEes1zFfUuxVPJHZSwmeXP43Lka3zi+fpzI1FnG7II/uImRlgbo JT0KBhVBvyCr8+L+urnD8VG3YEkJsStO54DsHZ9yz2fFewhXZ3IX6TN45lfwSs0gcdNW/3ZY qL1axI2NEiGP0IJYw1RVcNWcOSA3hETdxVdr1KcoKc7pWLU0Qd43LHsKvLSYNWMSsgTlUGdz o7D1zSpWkpFboH3JTyt3E2i38DogXvCSYMATKboscYxuQS02TlGYPERfQDi+qLh0xTWt8hkA 1Ya8W8joaku81aDVNf2GhC0oWKDpFgbQdU4O+497g2Ry7D87AOQB2xCRTlEAPQqq84wSnkr2 0OHt930CjNrvabTQnWYnp+SoDK2fyMSKmwqYygbRBEIpdLk5pww5jrTSdRuFrWdi9z+Azbrx D6W6iM5gt07hMIHkqy35njGji6i4J/TQWYd7wnbG2ml5wJjf6akapCmr1/B4p5oBYCVVFSe+ lMNntCa7eYBJc3UxWqGR+MWAbW15vCKWBXRn09pFJos3z+s4HWkO4tX5VlWLVp1MppUcCXiY E7NtCtL6pQWMXercahtJYWrBKwXIbPIEN3kUrXYZIFDf4IpKAufpnkzNAiXwnznl1UqnecnI 5CHfM2wDHEcT6N60D6xQORb2rgurswj+Y/Nbbmn4yuFyb2QXnGIZqdUFmSeauRoq5rR9W057 O1jH8eNzhxeVsj3bS/W7ZMfIDg2wZ4TVMieRyt/Jr/rH+Z2JI0yI6KKmuh+K+SJi4wQyL2Vr ynVtlpwkgKXuJHRFemdQlFOAF8Fdbpip3Y6O0TA1n6EgyJLjWqHyKoecYArcKNPyQCO5ft9T v1Ad8/bD+lVEmjD425FMMi7q5F+fhO2gw7IJzCifDU0Y59nQUrO58PgeQzssiIJC0JbVPfSQ ZXwiWs3orJaGGyO6fo6jtrxkztdWlBDw4pPs7PgeIU7RakV2NECx9bNpvE2OdoQDh7I2yGX0 Q2baT9B+7iR/9JqqIKS3P/cx2tMLweYNhsDd4U8xefuXRQ2AkL5nOesrc7UImiDDD+op81Om 80PlKmjbadvcKl2X3pUSO8wlvpnvbMDVpdfzw9+G27MYUjjA6F9OHTu4CW8nvwl+1OtgiPvA hjn0oACZ92hYZq5eHZPflZNRrrYj5k8xGKNhcnZ1W2huUebCpLcDR4NV/RN4QQBRIZI3HQNm Lhw5Z5LtF3u4vfoW/7f5h1pG623BiRoe80aWlsyWecHViJDJpB+jZ3g5uvezay1M4kJHmNxZ zieiezFmqhWwVfEfzwrD3/R0OFBhJMI/hdX0FsFIFfPkd3A7hPy9AME6iw5F2y50T0eu9+f+ EAzX6G2GUlK1zByjc5MUianHAQp6Nix5Bnq01VQ/IHGZxXAa1Eh9FEABNs=
IronPort-HdrOrdr: A9a23:1xVxg6oe7AslzRfnR11aiDQaV5uTL9V00zEX/kB9WHVpm5Oj+v xGzc5w6farsl0ssSkb6Ku90KnpexPhHdUf2/h0AV7QZnidhILOFvAp0WKC+UyqJ8SQzJ876U 4NScZD4ZjLfCBHZKXBkUSF+rQbsb+6GcmT7I+zoEuFDzsaEp2IhD0JaTpzZ3cGITWucqBJdq Z0iPAnmxOQPVAsKuirDHgMWObO4/fRkoj9XBIADxk7rCGTkDKB8tfBYlel9yZbdwkK7aYp8G DDnQC8zL6kqeuHxhjV0HKWx4hKmeHm1sBICKW3+4Yow3TX+0eVjbZaKv6/VQMO0aOSAZER4Z zxSiIbToROArXqDyWISFXWqk7dOX0VmgLfIBej8AfeSIrCNX4H4oN69Pxkmhe10TtegPhslK 1MxG6XrJxREFfJmzn8/cHBU1VwmlOzumdKq59ks5Vza/prVFZql/1pwGpFVJMbWC7q4oEuF+ djSMna+fZNaFufK3TUpHNmztCgVmk6Wk7ueDlLhuWFlzxN2HxpxUoRw8IS2n8G6ZImUpFBo+ DJKL5hmr1CRtIfKah9GOACS82qDXGle2OEDEuCZVD8UK0XMXPErJD6pL0z+eGxYZQNiIA/nZ zQOWkowFLau3iee/Fm8Kc7gSwlGl/NLAgF4vsul6REhg==
X-Talos-CUID: 9a23:NxjbgWxckOQJjIJXxMmsBgU9RuwaUGXawk3fPmCoWEBWWLmRGBiprfY=
X-Talos-MUID: 9a23:OcreLAUB3JHHTQLq/BHTimhNE9sw2rWvGhgWwdI+4PDdEjMlbg==
X-IronPort-AV: E=Sophos;i="6.02,245,1688421600"; d="scan'208";a="8803725"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=P4Vlu6hksU5XUDG2EXeu7zQ4TKC1z7IKOmwu0Zm5vjSLkWACqwQNXwKLmooGVqGRe+0Jr13EZHzQkRkSkXWN7DOlenmO0dVJjCiO0OKCipJfRwG+vEAjOcEzyd4mOBk8OADwjVg6t8vg0Mj89Q7GEOTAwEQabjDHcZ8xvkrblp5H2VGZdgfA7mRHN/mpc0bHtLzEm7INK7G+DqAr7daxbRu/5v8y9OeMbdI3q+Ry8u/ZQ1FfvRAFeZWYwQ743NQ3P3QgdkgZuiR5kbwboiQFZ8cpQBNm1YHLFOh37Vek/4WOPe1pPxDpHis/wKUuEWgbzQ0VT+mreqVSOpjx9t1dKA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=VvWocJOVa4uJj31pJ8K2ELfs7d6E/9RJqLBnm61oVI0=; b=CWw2WGeZ5UG4cRm/KOxOP10+f6kmsnCLRyhn7TUGx4AdIL4rCXz16ixT+R6bg8uaWxuzBZVA4AtKT1X0grW8LbVfnrEqVSoO1vfYhjNLv13gl0uh8cVxiESWbreMxHUWcueOHVZ63IBkjDP2Mrc1yNON6T1CG9cYxlqjq611LlPet7HsDEsPkLmmaD2H1qnD+Zo2c18KpFqnGTor2vfkN19TyTz24+tJ5LqEkd3b9HLlsaDwC06IhjppfXIPuUxvVRDjf22REw3C1IMDk5Y9vYI4DVt3fSsPTewhvkLIYnGOtgZDmqUjSc7I6DkUCO+a9bxRfFF0rMaqnXY9/QvCvg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=orange.com; dmarc=pass action=none header.from=orange.com; dkim=pass header.d=orange.com; arc=none
To: "rfc-editor@rfc-editor.org" <rfc-editor@rfc-editor.org>, "kondtir@gmail.com" <kondtir@gmail.com>, "dwing-ietf@fuggles.com" <dwing-ietf@fuggles.com>, "neil.cook@noware.co.uk" <neil.cook@noware.co.uk>, "tojens@microsoft.com" <tojens@microsoft.com>
CC: "add-ads@ietf.org" <add-ads@ietf.org>, "add-chairs@ietf.org" <add-chairs@ietf.org>, "Andrew.Campling@419.Consulting" <Andrew.Campling@419.Consulting>, "evyncke@cisco.com" <evyncke@cisco.com>, "auth48archive@rfc-editor.org" <auth48archive@rfc-editor.org>
Thread-Topic: AUTH48: RFC-to-be 9463 <draft-ietf-add-dnr-16> for your review
Thread-Index: AQHZ4smXntlSghkCx0OoRvaRz8G2DLAWrLiw
Content-Class:
Date: Tue, 12 Sep 2023 07:56:19 +0000
Message-ID: <DU2PR02MB101609FC5EE40E76F0869F7F288F1A@DU2PR02MB10160.eurprd02.prod.outlook.com>
References: <20230909025558.6F9F9E5EA7@rfcpa.amsl.com>
In-Reply-To: <20230909025558.6F9F9E5EA7@rfcpa.amsl.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Enabled=true; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SetDate=2023-09-12T05:22:46Z; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Method=Privileged; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Name=unrestricted_parent.2; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SiteId=90c7a20a-f34b-40bf-bc48-b9253b6f5d20; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_ActionId=a1023102-e689-4b2b-b51f-a070eadacd7a; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_ContentBits=0
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: DU2PR02MB10160:EE_|GVXPR02MB8350:EE_
x-ms-office365-filtering-correlation-id: b4d009bd-8757-4997-b0d3-08dbb365bfac
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DU2PR02MB10160.eurprd02.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(366004)(39860400002)(136003)(376002)(396003)(346002)(1800799009)(186009)(451199024)(2906002)(71200400001)(7696005)(6506007)(478600001)(83380400001)(66476007)(76116006)(26005)(45080400002)(66574015)(9686003)(41300700001)(64756008)(7416002)(66556008)(52536014)(54906003)(110136005)(316002)(8936002)(4326008)(66446008)(8676002)(66946007)(966005)(86362001)(38070700005)(38100700002)(33656002)(55016003)(15974865002)(5660300002)(122000001)(579004)(19607625013); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="iso-8859-1"
MIME-Version: 1.0
X-OriginatorOrg: orange.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DU2PR02MB10160.eurprd02.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: b4d009bd-8757-4997-b0d3-08dbb365bfac
X-MS-Exchange-CrossTenant-originalarrivaltime: 12 Sep 2023 07:56:19.1382 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 90c7a20a-f34b-40bf-bc48-b9253b6f5d20
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: vUBi7l6rHkw+L9OsP5bFh4APbFdfftiwhpXujeToNX9BFd6PmwPpwQ8l+q1JKgGW9gh7EnV3jg5Pm71bf7yy98G3vq6KaKSJeMZCmdxO0b8=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: GVXPR02MB8350
X-TM-AS-ERS: 10.106.160.160-127.5.254.253
X-TM-AS-SMTP: 1.0 c210cC1vdXQzNjUub3JhbmdlLmNvbQ== bW9oYW1lZC5ib3VjYWRhaXJAb 3JhbmdlLmNvbQ==
X-TMASE-Version: DDEI-5.1-9.0.1002-27870.006
X-TMASE-Result: 10--51.998200-10.000000
X-TMASE-MatchedRID: Ayxnw/ZptILR0U9g/ia7lLSb8hE6DmzllNCAVMeCSFlvptFKDiunOzY8 5u6LykAGxFWH4mhUcumKrQ/NsmwHOY6Mkm3zzfQHWGOSvAA+wtHx5KZMlKYS/cJWkMZBXP7D8yq x/L9HXKNejrnye/MpYq2jBDzYM4+XV34B73+oJzKEV1UiHUMU+Yh/ebSxR/HnYi1nZ7WB6LFR6S MusLeVMB2p9rZAQSUaNscteyNb+fjsfSeXDi02qFpgkh9rbl/7CKFDk1kJexKGiafRvCBWad9my yJM0cqs3q6udcqmT9zPqV/opaVeqpIqgcEsEuHkdvvbftTsJSfHYNKoSYWoHhHlzzcojFNOsGbs pEp+vvwqJET9IQ/snqhXc8M1GpA5C732IkYUSfSvnR5n5ZcuUY61Z+HJnvsOmZiw53dqSN88cwB uO6HB3+/m0bmpDCNAOhl54zrR5/L1C2tjXbqTqoNcr1N4zfKnKwi7MItzaY287ZHqp4thL8eQfu 6iwSfsDBsHp9ZCSqznVUT6aGtR64lq+OcgWT8iC8OYzF1BQS7su44QBj0GpOQ/RHqHh1Gc31GU/ N5W5BDtw//Wnh7/qCRyjeX93F/8NfHEFga3Rw31mbTo9LSWAPZOZ2c2VQUguWZ1ir0NjKSAQ0YM zgwQFIjIbsSYGxVdDj8YRDafOjb/nKxoeWR4La8FCKdxpBvse015woyPLfYEx2nnXvzNI4/Cesw e7z7xLeRZZdBKwSmKk7CRJFe7O+0HAXWQqaaa80agMA16DhVLVtf5IDutyZQ7eT0DII9NppiSoo S1QHjmNU3FqN4LUkCmiYiLt41igpeAIOSOb4KXBXaJoB9JZ8BX4Iey09T4Vb3rZjw/bpwUyRS/O CD9xeQD/sqqL0mZ+72mhzz+C0sLbigRnpKlKSBuGJWwgxAra7leoU/OMhPyMXSQdzxi9A==
X-TMASE-SNAP-Result: 1.821001.0001-0-1-22:0,33:0,34:0-0
X-TMASE-INERTIA: 0-0;;;;
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/auth48archive/Q4xHc9IfXVz-QWCW2h_z8NMH9xo>
Subject: Re: [auth48] AUTH48: RFC-to-be 9463 <draft-ietf-add-dnr-16> for your review
X-BeenThere: auth48archive@rfc-editor.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Archiving AUTH48 exchanges between the RFC Production Center, the authors, and other related parties" <auth48archive.rfc-editor.org>
List-Unsubscribe: <https://mailman.rfc-editor.org/mailman/options/auth48archive>, <mailto:auth48archive-request@rfc-editor.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/auth48archive/>
List-Post: <mailto:auth48archive@rfc-editor.org>
List-Help: <mailto:auth48archive-request@rfc-editor.org?subject=help>
List-Subscribe: <https://mailman.rfc-editor.org/mailman/listinfo/auth48archive>, <mailto:auth48archive-request@rfc-editor.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Sep 2023 07:56:49 -0000

Dear RFC Editor, 

Please see inline. 

I let my co-authors further comments as appropriate. 

Cheers,
Med

> -----Message d'origine-----
> De : rfc-editor@rfc-editor.org <rfc-editor@rfc-editor.org>
> Envoyé : samedi 9 septembre 2023 04:56
> À : BOUCADAIR Mohamed INNOV/NET <mohamed.boucadair@orange.com>;
> kondtir@gmail.com; dwing-ietf@fuggles.com; neil.cook@noware.co.uk;
> tojens@microsoft.com
> Cc : rfc-editor@rfc-editor.org; add-ads@ietf.org; add-
> chairs@ietf.org; Andrew.Campling@419.Consulting;
> evyncke@cisco.com; auth48archive@rfc-editor.org
> Objet : Re: AUTH48: RFC-to-be 9463 <draft-ietf-add-dnr-16> for
> your review
> 
> Authors,
> 
> While reviewing this document during AUTH48, please resolve (as
> necessary) the following questions, which are also in the XML
> file.
> 
> 1) <!-- [rfced] Abbreviated (running) document title, which
> appears in the PDF:
> FYI, we updated the abbreviated title to "DNR", along the lines of
> the running title "DDR" in the companion document 9462 (draft-
> ietf-add-ddr).
> Please let us know if you prefer otherwise.
> 
> Original:
> Internet-Draft  Discovery of Network-designated Resolver
> April 2023
> 
> Current PDF:
> RFC 9463                          DNR
> September 2023
> -->
> 

[Med] OK

> 
> 2) <!-- [rfced] Datatracker "idnits" output for the original
> approved document included the following warning.  Please let us
> know if any changes are needed as related to this warning:
> 
>  == There are [sic] 1 instance of lines with non-RFC2606-compliant
> FQDNs in the
>     document. -->
> 

[Med] No change is needed. Idnits complains about "a1.a2.a3.a4" but that is not a name.

> 
> 3) <!-- [rfced] Section 1:  Please note that companion document
> 9462 (draft-ietf-add-ddr) cites both RFCs 4861 and 8106 when
> referring to IPv6 Router Advertisement options.  We have asked the
> authors of that document if the same RFC should be cited in both
> places.
> 
> Please note, however, that we do not see any mention of Router
> Advertisement options in RFC 4861 - only Neighbor Discovery
> options.
> 
> Would you like to see how/if draft-ietf-add-ddr updates its
> comparable citation and update this document (or not) to match?
> 
> Original:
>  In particular, the document specifies how a local encrypted DNS
> resolver can be discovered by connected hosts by means of DHCPv4
> [RFC2132], DHCPv6 [RFC8415], and IPv6 Router Advertisement (RA)
> [RFC4861] options. -->
> 

[Med] It would be good if DDR aligns with this, but we leave that to DDR authors to decide. No change is needed to DNR.

> 
> 4) <!-- [rfced] Section 3:  This sentence did not parse.  We
> removed the colon (":").  If this is incorrect, please clarify
> "and Neighbor Discovery protocol (Section 6): Encrypted DNS
> options".
> 
> Original:
>  This document describes how a DNS client can discover local
> encrypted  DNS resolvers using DHCP (Sections 4 and 5) and
> Neighbor Discovery  protocol (Section 6): Encrypted DNS options.
> 
> Currently:
>  This document describes how a DNS client can discover local
> encrypted  DNS resolvers using DHCP (Sections 4 and 5) and
> Neighbor  Discovery protocol (Section 6) Encrypted DNS options. --
> >
> 

[Med] OK.

> 
> 5) <!-- [rfced] Section 3.2:  Should "the encrypted DNS is
> discovered"
> be "encrypted DNS resolvers are discovered"?  If the suggested
> text is not correct, please clarify.
> 
> Original:
>  If the encrypted DNS is discovered by a host using both RA and
> DHCP,  the rules discussed in Section 5.3.1 of [RFC8106] MUST be
> followed.
> 
> Suggested:
>  If encrypted DNS resolvers are discovered by a host using both RA
> and DHCP, the rules discussed in Section 5.3.1 of [RFC8106] MUST
> be  followed. -->
> 

[Med] The suggested text is better. Thanks.

> 
> 6) <!-- [rfced] Section 3.3:  As [I-D.ietf-dnsop-svcb-https] does
> not have a Section 6.1 and the title of its Section 7.1 is '"alpn"
> and "no-default-alpn"', we updated the cited section number
> accordingly.
> If this is incorrect, please provide the correct citation.
> 
> Original:
>  ALPN-related considerations can be found in Section 6.1 of  [I-
> D.ietf-dnsop-svcb-https].
> 
> Currently:
>  ALPN-related considerations
>  can be found in Section 7.1 of [RFC9460].
> 

[Med] Good catch. Thanks. 

> (see
> https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2F
> www.rfc-editor.org%2Fauthors%2Frfc9460.html%23section-
> 7.1&data=05%7C01%7Cmohamed.boucadair%40orange.com%7C543c6045d28f49
> 3499fe08dbb0e0a6ac%7C90c7a20af34b40bfbc48b9253b6f5d20%7C0%7C0%7C63
> 8298251434819527%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQI
> joiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=pZ
> PbJQ35JUDdQ5%2BjFN%2FMa3yPBZV4qKOr4gGsNOSjxsk%3D&reserved=0)-->
> 
> 
> 7) <!-- [rfced] Section 3.4:  This sentence does not parse.  If
> the suggested text is not correct, please provide clarifying text.
> 
> Original:
>  Such considerations fall under the generic issue of handling
> multiple  provisioning sources and which should not be dealt
> within each option  separately as per the recommendation in
> Section 12 of [RFC7227].
> 
> Suggested:
>  Such considerations fall under the generic issue of handling
> multiple  provisioning sources and should not be processed in each
> option  separately, as per the recommendation in Section 12 of
> [RFC7227]. -->
> 

[Med] OK. 

> 
> 8) <!-- [rfced] Should any of the artwork elements (<artwork>) be
> tagged as sourcecode or another element?  Please review
> <https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2
> Fwww.rfc-editor.org%2Fmaterials%2Fsourcecode-
> types.txt&data=05%7C01%7Cmohamed.boucadair%40orange.com%7C543c6045
> d28f493499fe08dbb0e0a6ac%7C90c7a20af34b40bfbc48b9253b6f5d20%7C0%7C
> 0%7C638298251434819527%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDA
> iLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sd
> ata=22kRc4mRl1dWX6EBtFHzoKXIIxeLW5WtAPemy4BJDPE%3D&reserved=0>; if
> the current list of preferred values for "type" does not contain
> an applicable type, please let us know.  Also, it is acceptable to
> leave the "type" attribute not set. -->
> 
> 

[Med] We don't have a suitable type for the ones in the draft. We can leave this unset. 

> 9) <!-- [rfced] Sections 4.1 and 5.1:  These definitions read
> oddly, as the items preceding the colon are not the field name,
> unlike all of the other field entries that follow each of them.
> May we update as suggested?
> 
> Original:
>  Option-code:  OPTION_V6_DNR (TBA1, see Section 9.1) ...
>  Code:  OPTION_V4_DNR (TBA2, see Section 9.2).
> 

[Med] Please keep the original as this is a convention used in DHCP documents. Thanks. 

> Perhaps:
>  OPTION_V6_DNR:  An Option Code (144; see Section 9.1).
> ...
>  OPTION_V4_DNR:  An Option Code (162; see Section 9.2). -->
> 
> 
> 10) <!-- [rfced] Figure 3:  We changed the field name in the
> diagram from "ipv6-address" to "ipv6-address(es)" per usage in the
> rest of this document (e.g., "shown in Figure 3" in Section 6.1)
> and also updated the figure title accordingly.  Please let us know
> any objections.
> 
> Original:
>  |                         ipv6-address                          |
> ...
>  Figure 3: Format of the IPv6 Addresses Field
> 
> Currently:
>  |                       ipv6-address(es)                        |
> ...

[Med] Please keep the original figure as it is correct. Each field includes only one IP address, but multiple fields with each an IP address can be included if needed.

>  Figure 3: Format of the ipv6-address(es) Field -->
> 
> 

[Med] OK to update the title as suggested. 


> 11) <!-- [rfced] Section 4.2:  Section 18.2.5 of RFC 8415 does not
> explicitly mention the Option Request Option or "ORO".  Please
> confirm that the citation for Section 18.2.5 of RFC 8415 will be
> clear to readers.
> 
> Original:
>  To discover an encrypted DNS resolver, the DHCPv6 client MUST
> include  OPTION_V6_DNR in an Option Request Option (ORO), as in
> Sections  18.2.1, 18.2.2, 18.2.4, 18.2.5, 18.2.6, and 21.7 of
> [RFC8415]. -->
> 

[Med] The original text is OK as that section is explicitly listed in the template in https://datatracker.ietf.org/doc/html/rfc7227#section-21 (cited as 18.1.4 of 3315 which was replaced since then by RFC8415).

> 
> 12) <!-- [rfced] Section 5.2:  Should 'multiple DNR instance data'
> be 'multiple "DNR Instance Data" field entries' here?  If the
> suggested text is not correct, please provide clarifying text.
> 
> Original:
>  The DHCPv4 client MUST be prepared to receive multiple DNR
> instance  data in the OPTION_V4_DNR option; each instance is to be
> treated as a  separate encrypted DNS resolver.
> 
> Suggested:
>  The DHCPv4 client MUST be prepared to receive multiple "DNR
> Instance  Data" field entries in the OPTION_V4_DNR option; each
> instance is to  be treated as a separate encrypted DNS resolver. -
> ->

[Med] Works for me. 
> 
> 
> 13) <!-- [rfced] Section 6.1:  We see that Figure 7 has the
> "0 ... 1 ... 2 ... 3" ruler markers above the
> "0 1 2 3 4 5 6 7 8 9 ..." ruler lines but Figures 1 and 3 do not.
> (We're not sure whether or not Figures 4 and 5 would also apply
> here.)  Would you like to place additional ruler-marker lines over
> Figures 1 and 3, and perhaps Figures 4 and 5?  (For example,
> similar figures in companion document 9464 (draft-ietf-ipsecme-
> add-ike) all include the additional ruler-marker line.)
> 
> Original (best viewed with a fixed-point font such as Courier):
>  0                   1                   2                   3
>  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 -
> ->
> 

[Med] OK to add those to Figures 1/3 and similar line to Figures 4/5.

> 
> 14) <!-- [rfced] Section 6.1: FYI, in Figure 7, rather than insert
> the value for TBA3 (144), we put the word "Type" to correspond to
> the text below the figure. Please let us know if you prefer
> otherwise.
> 
> Original:
>  |     TBA3      |     Length    |        Service Priority       |
> 
> Current:
>  |     Type      |     Length    |        Service Priority       |
> -->
> 
> 

[Med] OK.

> 15) <!-- [rfced] Section 6.1:  We changed 'Service Parameters
> field' to '"Service Parameters (SvcParams)" field' per the field
> name.  Please let us know any objections.
> 
> Original:
>  SvcParams Length:  16-bit unsigned integer.  This field indicates
> the
>     length of the Service Parameters field in octets.
> 
> Currently:
>  SvcParams Length:  16-bit unsigned integer.  This field indicates
> the
>     length of the "Service Parameters (SvcParams)" field in
> octets. -->
> 
> 

[Med] OK.

> 16) <!-- [rfced] Section 7.1:  We defined "CA" as "Certificate
> Authority"
> per companion document 9464 (draft-ietf-ipsecme-add-ike).  If this
> is incorrect, please provide the correct definition.
> 
> Original:
>  The attacker can get a domain name with a domain-  validated
> public certificate from a CA and host an encrypted DNS  resolver.
> 
> Currently:
>  The attacker can get a domain name with a domain-  validated
> public certificate from a Certificate Authority (CA) and  host an
> encrypted DNS resolver. -->
> 
> 

[Med] OK.

> 17) <!-- [rfced] Section 7.1:  It appears that "but cannot
> provide"
> refers to the endpoint, but does it refer to the mechanisms?

[Med] It refers to the mechanisms.

  If
> the endpoint, may we update as suggested?
> 
> Original:
>  The above mechanisms would ensure that the endpoint receives the
> correct configuration information of the encrypted DNS resolvers
> selected by the DHCP server (or RA sender), but cannot provide any
> information about the DHCP server or the entity hosting the DHCP
> server (or RA sender).
> 
> Suggested ("endpoint can receive ... but cannot provide"):
>  The above mechanisms would ensure that the endpoint can receive
> the  correct configuration information of the encrypted DNS
> resolvers  selected by the DHCP server (or RA sender) but cannot
> provide any  information about the DHCP server or the entity
> hosting the DHCP  server (or RA sender). -->
> 
> 
> 18) <!-- [rfced] Section 7.4:  We see that "PSK" has been defined
> but not "WPA".  Will this abbreviation be clear to readers?  If
> not, how should it be defined?
> 
> Original:
>  If the pre-shared key (PSK) is the same for all clients that
> connect  to the same WLAN (e.g., WPA-PSK), the shared key will be
> available to  all nodes, including attackers.
> 
> Possibly:
>  If the pre-shared key (PSK) is the same for all clients that
> connect  to the same WLAN (e.g., Wi-Fi Protected Access Pre-Shared
> Key  (WPA-PSK)), the shared key will be available to all nodes,
> including attackers. -->
> 

[Med] ACK.

> 
> 19) <!-- [rfced] Section 8:  To what does "but does not" refer in
> this sentence - the mechanism, or the DHCP client or IPv6 host?
> 

[Med] This refers to the mechanisms.

> Also, we see "mechanisms specified in this document" in Sections
> 3.1.9 and 3.4.  Which mechanism is referred to here?
> 

[Med] We refer to all of them. Please make this change: s/mechanism defined/mechanisms defined

> Original:
>  The
>  mechanism defined in this document can be used to infer that a
> DHCP  client or IPv6 host support encrypted DNS options, but does
> not  explicitly reveal whether local DNS clients are able to
> consume these  options or infer their encryption capabilities. -->
> 
> 
> 20) <!-- [rfced] References:  We could not find a connection
> between the Unicode Consortium and the [Evil-Twin] Wikipedia page.
> If the "Possibly" text is not correct, please provide an
> appropriate URL for "Evil twin (wireless networks)".
> 
> Original:
>  [Evil-Twin]
>             The Unicode Consortium, "Evil twin (wireless
> networks)",
> 
> <https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2
> Fen.wikipedia.org%2Fwiki%2F&data=05%7C01%7Cmohamed.boucadair%40ora
> nge.com%7C543c6045d28f493499fe08dbb0e0a6ac%7C90c7a20af34b40bfbc48b
> 9253b6f5d20%7C0%7C0%7C638298251434819527%7CUnknown%7CTWFpbGZsb3d8e
> yJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%
> 7C3000%7C%7C%7C&sdata=NObhhyKiZa0tBeo4TFNWs5H9tW7BtZJBbkucSTIOAoQ%
> 3D&reserved=0
>             Evil_twin_(wireless_networks)>.
> 
> Possibly:
>  [Evil-Twin]
>             Wikipedia, "Evil twin (wireless networks)", November
>             2022
> <https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2
> Fen.wikipedia.org%2Fwiki%2F&data=05%7C01%7Cmohamed.boucadair%40ora
> nge.com%7C543c6045d28f493499fe08dbb0e0a6ac%7C90c7a20af34b40bfbc48b
> 9253b6f5d20%7C0%7C0%7C638298251434819527%7CUnknown%7CTWFpbGZsb3d8e
> yJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%
> 7C3000%7C%7C%7C&sdata=NObhhyKiZa0tBeo4TFNWs5H9tW7BtZJBbkucSTIOAoQ%
> 3D&reserved=0
>             Evil_twin_(wireless_networks)>. -->
> 
> 

[Med] Works for me. Thanks.

> 21) <!-- [rfced] References:  We could not find a connection
> between the Unicode Consortium and the [Krack] paper.  Should
> author Mathy Vanhoef be listed instead?
> 

[Med] Yes, please.

> Also, please confirm that the provided URL is stable.

[Med] We can use this more stable link: " https://dl.acm.org/doi/10.1145/3133956.3134027". Please update also the title to "Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2".

> 
> Original:
>  [Krack]    The Unicode Consortium, "Key Reinstallation Attacks",
>             2017,
> <https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2
> Fwww.krackattacks.com%2F&data=05%7C01%7Cmohamed.boucadair%40orange
> .com%7C543c6045d28f493499fe08dbb0e0a6ac%7C90c7a20af34b40bfbc48b925
> 3b6f5d20%7C0%7C0%7C638298251434819527%7CUnknown%7CTWFpbGZsb3d8eyJW
> IjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3
> 000%7C%7C%7C&sdata=MSuNjA%2BB3M5PfKmff2fVBqrp1S%2FeunV0G8C6gta1rdI
> %3D&reserved=0>. -->
> 
> 
> 22) <!-- [rfced] References:  We could not find a connection
> between the Unicode Consortium and the [Dragonblood] paper.  Also,
> the provided URL appears to be a personal URL.
> 
> Will the currently listed URL remain stable?  Is there a site
> related to the Unicode Consortium that also provides this paper?
> If not, should the authors (Mathy Vanhoef and Eyal Ronen) be
> credited?
> 

[Med] We can cite the authors + use this stable link instead (https://ieeexplore.ieee.org/document/9152782).

> Original:
>  [Dragonblood]
>             The Unicode Consortium, "Dragonblood: Analyzing the
>             Dragonfly Handshake of WPA3 and EAP-pwd",
> 
> <https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2
> Fpapers.mathyvanhoef.com%2Fdragonblood.pdf&data=05%7C01%7Cmohamed.
> boucadair%40orange.com%7C543c6045d28f493499fe08dbb0e0a6ac%7C90c7a2
> 0af34b40bfbc48b9253b6f5d20%7C0%7C0%7C638298251434819527%7CUnknown%
> 7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwi
> LCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=Fofu9ZA4AqH1JiT5aAJNvLU9VQipk
> qMwRVkQbZMVdYc%3D&reserved=0>. -->
> 
> 
> 23) <!-- [rfced] References:  We could not find any mention of
> Cisco on the provided web page.  We updated this listing as noted
> below.  If this is incorrect, please provide the correct title and
> the matching URL.
> 
> Original:
>  [dot1x]    Cisco, "Basic 802.1x Wireless User Authentication",
> 
> <https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2
> Fopenwrt.org%2Fdocs%2Fguide-
> user%2Fnetwork%2Fwifi%2F&data=05%7C01%7Cmohamed.boucadair%40orange
> .com%7C543c6045d28f493499fe08dbb0e0a6ac%7C90c7a20af34b40bfbc48b925
> 3b6f5d20%7C0%7C0%7C638298251434819527%7CUnknown%7CTWFpbGZsb3d8eyJW
> IjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3
> 000%7C%7C%7C&sdata=gL6D7KzP2AvooWUD%2BTo92r0eh6U40nJIjjXkM8RrzoI%3
> D&reserved=0
>             wireless.security.8021x>.
> 
> Currently:
>  [dot1x]    OpenWrt, "Introduction to 802.1X", December 2021,
> 
> <https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2
> Fopenwrt.org%2Fdocs%2Fguide-
> user%2Fnetwork%2Fwifi%2F&data=05%7C01%7Cmohamed.boucadair%40orange
> .com%7C543c6045d28f493499fe08dbb0e0a6ac%7C90c7a20af34b40bfbc48b925
> 3b6f5d20%7C0%7C0%7C638298251434819527%7CUnknown%7CTWFpbGZsb3d8eyJW
> IjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3
> 000%7C%7C%7C&sdata=gL6D7KzP2AvooWUD%2BTo92r0eh6U40nJIjjXkM8RrzoI%3
> D&reserved=0
>             wireless.security.8021x>. -->
> 

[Med] Works for me.

> 
> 24) <!-- [rfced] References:  We see on the provided URL, under
> the "Versions" tab, that quite a few versions have been added
> since December 2019 (Release 16.3.0).  Should this listing be
> updated?
> We see that the latest version (Release 18 / version 18.3.0, dated
> June 2023) also mentions "protocol configuration options" and
> "ePCO".
> 

[Med] Thank you for checking. We can update the reference entry to point to the latest rel/ver.

> Original:
>  [TS.24008] 3GPP, "Mobile radio interface Layer 3 specification;
> Core
>             network protocols; Stage 3 (Release 16)", December
> 2019,
> 
> <https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2
> Fwww.3gpp.org%2FDynaReport%2F24008.htm&data=05%7C01%7Cmohamed.bouc
> adair%40orange.com%7C543c6045d28f493499fe08dbb0e0a6ac%7C90c7a20af3
> 4b40bfbc48b9253b6f5d20%7C0%7C0%7C638298251434819527%7CUnknown%7CTW
> FpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJX
> VCI6Mn0%3D%7C3000%7C%7C%7C&sdata=0nbE1Xf4OHcuFGd0NTLCXVFtuEaY1am9%
> 2BprJtryl3ew%3D&reserved=0>. -->
> 
> 
> 25) <!-- [rfced] Acknowledgments:  We found this sentence
> confusing, as Section 7.3.1 of [RFC8310] says "... does not
> provide an authentication domain name for the DNS resolver" and
> "This document does not specify or request any DHCP extension to
> provide authentication domain names".  The current text seems to
> indicate the opposite.  Will this text be clear to readers, or
> should it be updated?
> 

[Med] That text is meant to ACK that RFC8310 identified DHCP as a candidate to convey ADN (although it does not specify how). What about:

NEW:

   The use of DHCP as a candidate protocol to retrieve an authentication domain name was
   mentioned in Section 7.3.1 of [RFC8310] and in an Internet-Draft
   authored by Tom Pusateri and Willem Toorop
   [I-D.pusateri-dhc-dns-driu].


> Original:
>  The use of DHCP to retrieve an authentication domain name was
> discussed in Section 7.3.1 of [RFC8310] and in an Internet-Draft
> authored by Tom Pusateri and Willem Toorop  [I-D.pusateri-dhc-dns-
> driu].
> 
> Possibly *:
>  An issue related to using DHCP to retrieve an ADN is discussed in
> Section 7.3.1 of [RFC8310].  [DNS-TLS-DHCPv6-Options], authored by
> Tom Pusateri and Willem Toorop, discusses ways to address the
> issue.
> 
> * Per this text from [I-D.pusateri-dhc-dns-driu]:
>   This document was motivated in part by Section 7.3.1 of
> [RFC8310].
>   Thanks to the authors Sara Dickinson, Daniel Kahn Gillmor, and
>   Tirumaleswar Reddy for documenting the issue. -->
> 
> 
> 26) <!-- [rfced] Acknowledgments:  Please confirm that, unlike the
> other individuals listed here, Rich Salz did more than one review
> ("secdir reviews").
> 

[Med] I confirm.

> Original:
>  Thanks to Rich Salz for the secdir reviews, Joe Clarke for the
> ops-  dir review, Robert Sparks for the artart review, and David
> Blacka for  the dnsdir review. -->
> 
> 
> 27) <!-- [rfced] Contributors section:  Per RFC 7322 (RFC Style
> Guide), we changed "Contributing Authors" to "Contributors".
> 

[Med] OK.

> If desired, you can add some information to the Contributors
> section to describe their contributions.

[Med] No change is needed.

  If Nicolai Leymann and
> Zhiwei Yan should be credited as coauthors, the following could be
> added (e.g., see RFC 9089).
> Please let us know how you would like to proceed.
> 
> Original:
>  11.  Contributing Authors
> 
>     Nicolai Leymann
> ...
> 
> Currently:
>  Contributors
> 
>     Nicolai Leymann
> ...
> 
> Possibly:
>  The following people contributed to the content of this document
> and  should be considered coauthors:
> 
>     Nicolai Leymann
> ... -->
> 
> 
> 28) <!-- [rfced] Please review the "Inclusive Language" portion of
> the online Style Guide at
> <https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2
> Fwww.rfc-
> editor.org%2Fstyleguide%2Fpart2%2F%23inclusive_language&data=05%7C
> 01%7Cmohamed.boucadair%40orange.com%7C543c6045d28f493499fe08dbb0e0
> a6ac%7C90c7a20af34b40bfbc48b9253b6f5d20%7C0%7C0%7C6382982514348195
> 27%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJ
> BTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=r%2BjtER12cPY%2B
> VIbvQEusFVzZOXp0Z%2F3%2Fu3X%2F7sq85DQ%3D&reserved=0>,
> and let us know if any changes are needed.
> 
> Note that our script did not flag any words in particular, but
> this should still be reviewed as a best practice. -->
> 

[Med] All seems OK to me.

> 
> 29) <!-- [rfced] The following term appears to be used
> inconsistently in this document.  Please let us know which form is
> preferred.
> 
>  Encrypted DNS Option (1 instance - last paragraph of Section 7.1)
> /
>    Encrypted DNS option (23 instances) /
>    encrypted DNS option (1 instance - Section 8, Paragraph 1)*
> 
>  * As it appears that the option is of type "Encrypted DNS", we
>    suggest "Encrypted DNS option".
> 

[Med] Deal!

> Also, some field names are quoted, but some are not.  Would you
> like to apply a consistent style (i.e., all quoted or none
> quoted)?
> Please review usage, and advise.
> 
> For example:
>  authentication-domain-name field
> 
>  Option-length field
> 
>  Type and Length fields
> 
>  "DNR Instance Data" field
> 
>  "Addr Length", "IPv4 Address(es)", and "Service Parameters
> (SvcParams)" fields ... -->
> 

[Med] I don't think a change is needed. However, we will report any when reviewing the edited version. Thanks. 

> 
> Thank you.
> 
> RFC Editor/lb/ar
> 
> 
> On Sep 8, 2023, rfc-editor@rfc-editor.org wrote:
> 
...
> RFC Editor
> 
> --------------------------------------
> RFC9463 (draft-ietf-add-dnr-16)
> 
> Title            : DHCP and Router Advertisement Options for the
> Discovery of Network-designated Resolvers (DNR)
> Author(s)        : M. Boucadair, Ed., T. Reddy.K, Ed., D. Wing, N.
> Cook, T. Jensen
> WG Chair(s)      : David C Lawrence, Glenn Deen
> Area Director(s) : Erik Kline, Éric Vyncke
____________________________________________________________________________________________________________
Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.

This message and its attachments may contain confidential or privileged information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
Thank you.