Re: [auth48] AUTH48: RFC-to-be 9538 <draft-ietf-cdni-delegation-acme-04> for your review

Alice Russo <arusso@amsl.com> Wed, 07 February 2024 18:29 UTC

Return-Path: <arusso@amsl.com>
X-Original-To: auth48archive@ietfa.amsl.com
Delivered-To: auth48archive@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8222CC14CE39; Wed, 7 Feb 2024 10:29:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.908
X-Spam-Level:
X-Spam-Status: No, score=-6.908 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MJFTW5lpCVRg; Wed, 7 Feb 2024 10:29:29 -0800 (PST)
Received: from c8a.amsl.com (c8a.amsl.com [4.31.198.40]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 03B3EC14CE51; Wed, 7 Feb 2024 10:29:29 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by c8a.amsl.com (Postfix) with ESMTP id E2A4F424CD3F; Wed, 7 Feb 2024 10:29:28 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
Received: from c8a.amsl.com ([127.0.0.1]) by localhost (c8a.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yZM6l2mez6Ws; Wed, 7 Feb 2024 10:29:28 -0800 (PST)
Received: from smtpclient.apple (c-76-146-133-47.hsd1.wa.comcast.net [76.146.133.47]) by c8a.amsl.com (Postfix) with ESMTPSA id 786BB424B427; Wed, 7 Feb 2024 10:29:28 -0800 (PST)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3696.120.41.1.1\))
From: Alice Russo <arusso@amsl.com>
In-Reply-To: <CA+EbDtAnf19sMORx4L7mip4Qq-uPT4Vn4gFV37dbhRss-AJfQA@mail.gmail.com>
Date: Wed, 07 Feb 2024 10:29:27 -0800
Cc: frederic.fieau@orange.com, emile.stephan@orange.com, francesca.palombini@ericsson.com, cdni-ads@ietf.org, cdni-chairs@ietf.org, kevin.j.ma.ietf@gmail.com, rfc-editor@rfc-editor.org, auth48archive <auth48archive@rfc-editor.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <66619CC6-A66B-443F-B798-D5D04E4E0A01@amsl.com>
References: <20240123065751.D786E199610A@rfcpa.amsl.com> <7566767A-2661-462A-AE1B-2E225ACAA0D7@amsl.com> <CA+EbDtCSsAe6M=jW5NfXwpWkBPO2CLBuVmxFwM2ZB5sF+jXSGg@mail.gmail.com> <3DD85FCC-090F-4401-A6CF-640E966C749F@amsl.com> <CA+EbDtAnf19sMORx4L7mip4Qq-uPT4Vn4gFV37dbhRss-AJfQA@mail.gmail.com>
To: "Mishra, Sanjay" <sanjay.mishra=40verizon.com@dmarc.ietf.org>
X-Mailer: Apple Mail (2.3696.120.41.1.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/auth48archive/VJTUimaTfbkgcRC7c-gBZZA6Qag>
Subject: Re: [auth48] AUTH48: RFC-to-be 9538 <draft-ietf-cdni-delegation-acme-04> for your review
X-BeenThere: auth48archive@rfc-editor.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Archiving AUTH48 exchanges between the RFC Production Center, the authors, and other related parties" <auth48archive.rfc-editor.org>
List-Unsubscribe: <https://mailman.rfc-editor.org/mailman/options/auth48archive>, <mailto:auth48archive-request@rfc-editor.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/auth48archive/>
List-Post: <mailto:auth48archive@rfc-editor.org>
List-Help: <mailto:auth48archive-request@rfc-editor.org?subject=help>
List-Subscribe: <https://mailman.rfc-editor.org/mailman/listinfo/auth48archive>, <mailto:auth48archive-request@rfc-editor.org?subject=subscribe>
X-List-Received-Date: Wed, 07 Feb 2024 18:29:34 -0000

Sanjay,
Thank you for your reply; we have updated the document accordingly. 

FYI, in addition to the update in #4, we have changed "the criticality around the protection of" to "that it is critical to protect the"; this text is shown below and in the files. Please review.

Section 5 (Security Considerations)
ORIGINAL:
   The reader is expected to understand the ACME delegation trust model
   (Section 7.1 of [RFC9115]) and security goal (Section 7.2 of
   [RFC9115]), in particular the criticality around the protection of
   the user account associated with the delegation, which authorizes all
   the security relevant operations between dCDN and uCDN over the ACME
   channel. 

CURRENT:
   The reader is expected to understand the ACME delegation trust model
   (Section 7.1 of [RFC9115]) and security goal (Section 7.2 of
   [RFC9115]).  In particular, the reader is expected to understand that 
   it is critical to protect the user account associated with the
   delegation; this account authorizes all the security-relevant
   operations between a dCDN and a uCDN over the ACME channel. 

The revised files are here (please refresh):
  https://www.rfc-editor.org/authors/rfc9538.html
  https://www.rfc-editor.org/authors/rfc9538.txt
  https://www.rfc-editor.org/authors/rfc9538.pdf
  https://www.rfc-editor.org/authors/rfc9538.xml

This diff file shows all changes from the approved I-D:
  https://www.rfc-editor.org/authors/rfc9538-diff.html
  https://www.rfc-editor.org/authors/rfc9538-rfcdiff.html (side by side)

This diff file shows the changes made during AUTH48 thus far:
  https://www.rfc-editor.org/authors/rfc9538-auth48diff.html

We will wait to hear from you again and from E. Stephan
before continuing the publication process. This page shows 
the AUTH48 status of your document:
  https://www.rfc-editor.org/auth48/rfc9538

Thank you.
RFC Editor/ar

> On Feb 7, 2024, at 9:31 AM, Mishra, Sanjay <sanjay.mishra=40verizon.com@dmarc.ietf.org> wrote:
> 
> Hi Alice - Thank you and please see response below for the 4 questions:
> 
> 1) <!--[rfced] May this be rephrased as follows for readability?
> 
> Original:
>    RFC9115 allows delegating entities to remain in
>    full control of the delegation and be able to revoke it any time and
>    this avoids the need to share private cryptographic key material
>    between the involved entities.
> 
> Perhaps:
>    Per RFC 9115, delegating entities can remain in
>    full control of the delegation and can revoke it at any time.
>    This avoids the need to share private cryptographic key material
>    between the involved entities.
> -->
> Yes, I approve the new wording as suggested above
>  
> 
> 
> 2) <!--[rfced] FYI, in Section 1.1, we added mention of "STAR" so that it
> is expanded upon first use. Please let us know if you prefer otherwise.
> (In the original, the first use was in Section 3 - "ACME STAR delegation"
> was followed by explanation but was without a direct expansion.)
> 
> Original:
>    It also uses
>    terminology from Section 1.2 of [RFC8739] and Section 1.1 of
>    [RFC9115].
> 
> Current:
>    It also uses
>    terminology from Section 1.2 of [RFC8739] and Section 1.1 of
>    [RFC9115], including Short-Term, Automatically Renewed (STAR),
>    as applied to X.509 certificates.
> -->
> 
> Yes, I approve of the new wording as above. 
> 
> 3) <!--[rfced] How may this sentence be rephrased for clarity? In particular,
> "allows to specify" is not clear. Also, Section 2.3.1.3 of RFC 9115
> indicates that the CNAME mapping is optional; should this sentence be
> updated to reflect that?
> 
> Original:
>       |   Note: The delegation object defined in Section 2.3.1.3 of
>       |  [RFC9115] only allows to specify DNS mappings using CNAME RRs.
> 
> Perhaps:
>       |   Note: The delegation object defined in Section 2.3.1.3 of
>       |  [RFC9115] only allows DNS mappings to be specified using CNAME RRs.
> 
> Yes, I approve the above wording as suggested
>  
> Or:
>       |   Note: The delegation object defined in Section 2.3.1.3 of
>       |  [RFC9115] allows DNS mappings to be specified using only CNAME RRs.
> -->
> 
> 
> 4) <!--[rfced] FYI, for readability and precision, we have made the following
> updates: split this into two sentences, changed "criticality around"
> to "criticality of", and changed "which" to "this account".
> Please review and let us know if you prefer otherwise.
> 
> Original:
>    The reader is expected to understand the ACME delegation trust model
>    (Section 7.1 of [RFC9115]) and security goal (Section 7.2 of
>    [RFC9115]), in particular the criticality around the protection of
>    the user account associated with the delegation, which authorizes all
>    the security relevant operations between dCDN and uCDN over the ACME
>    channel.
> 
> Current:
>    The reader is expected to understand the ACME delegation trust model
>    (Section 7.1 of [RFC9115]) and security goal (Section 7.2 of
>    [RFC9115]).  In particular, the reader is expected to understand the
>    criticality of the protection of the user account associated with the
>    delegation; this account authorizes all the security-relevant
>    operations between a dCDN and a uCDN over the ACME channel.
> 
> Yes, I approve of the suggested text.
> 
> Thank you very much
> Best
> Sanjay
> 
> On Wed, Feb 7, 2024 at 12:17 PM Alice Russo <arusso@amsl.com> wrote:
> Authors,
> 
> Sanjay, thank you for your reply and for letting us know about Frederic's reply to the CDNI mailing list.
> 
> Please reply to the 4 questions below regarding changes to the text.
> 
> The edited document is here:
>   https://www.rfc-editor.org/authors/rfc9538.html
>   https://www.rfc-editor.org/authors/rfc9538.pdf
>   https://www.rfc-editor.org/authors/rfc9538.txt
>   https://www.rfc-editor.org/authors/rfc9538.xml (source)
> 
> Diff files of all changes from the approved Internet-Draft:
>   https://www.rfc-editor.org/authors/rfc9538-diff.html 
>   https://www.rfc-editor.org/authors/rfc9538-rfcdiff.html (side by side)
> 
> This page shows the AUTH48 status of your document:
>   https://www.rfc-editor.org/auth48/rfc9538
> 
> In addition to the authors' responses to the questions, we hope to hear from Emile Stephan, as an approval is needed from each author listed in the first-page header of the RFC.
> 
> Thank you.
> RFC Editor/ar
> 
>> On Feb 7, 2024, at 7:21 AM, Mishra, Sanjay <sanjay.mishra=40verizon.com@dmarc.ietf.org> wrote:
>> 
>> Hi Alice - My co-author Frederic Fieau responded approving this drafts, however, it is a different email thread addressed to cdni@ietf.org so I as confirmation, I'm responding to this thread, I as a co-author along with Emile Stephan and Frederic Fieau have reviewed all changes and approve publication of this document as RFC 9538.
>> 
>> We are thankful to co-chair Kevin Ma for his guidance and the AD, Francesca Palombini and everyone that contributed and commented to this draft and of course a big thanks to the editorial team.
>> 
>> Regards
>> Sanjay Mishra
>> 
>> snippet of email from Fred is below:
>> frederic.fieau@orange.com
>> 9:41 AM (37 minutes ago)
>> to cdni@ietf.org, me, STEPHAN
>> 
>> Dear all,
>>  
>> I have reviewed all changes in draft-ietf-cdni-delegation-acme and concur with them. On behalf of the authors, I approve the document for publication as RFC9538.
>> 
>> I would like to thank the CDNI WG and all individuals who participated for their valuable contributions throughout the process which has now reached its conclusion for this draft.
>> 
>> Regards,
>> Frederic
>> 
>> On Tue, Feb 6, 2024 at 6:12 PM Alice Russo <arusso@amsl.com> wrote:
>> Authors,
>> 
>> This is a reminder that we await word from you regarding the questions below and this document's readiness for publication as an RFC. The files are here:
>> 
>>   https://urldefense.proofpoint.com/v2/url?u=https-3A__www.rfc-2Deditor.org_authors_rfc9538.html&d=DwIFaQ&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=XniVbishGiO2Ao9hKqSc-hTVIWCi3T-x6GdHR4ZTgoM&m=_uLNEDcaPBsFXYMA8j5oRepqfLBtLE6RKluO5xkPC-kqNuhB9LwWEVarzV9IR2tN&s=5TzFzGWGUvYktrbM8hNWTP8hhGH7e5HbSUIxNf_TLA0&e= 
>>   https://urldefense.proofpoint.com/v2/url?u=https-3A__www.rfc-2Deditor.org_authors_rfc9538.pdf&d=DwIFaQ&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=XniVbishGiO2Ao9hKqSc-hTVIWCi3T-x6GdHR4ZTgoM&m=_uLNEDcaPBsFXYMA8j5oRepqfLBtLE6RKluO5xkPC-kqNuhB9LwWEVarzV9IR2tN&s=-ES9wp1LnU6Q7BFV8U-fcv_gUpKgEg8ECmuutDUGb9w&e= 
>>   https://urldefense.proofpoint.com/v2/url?u=https-3A__www.rfc-2Deditor.org_authors_rfc9538.txt&d=DwIFaQ&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=XniVbishGiO2Ao9hKqSc-hTVIWCi3T-x6GdHR4ZTgoM&m=_uLNEDcaPBsFXYMA8j5oRepqfLBtLE6RKluO5xkPC-kqNuhB9LwWEVarzV9IR2tN&s=6vBNFP8MiPXcTbSU4PnBrPvuXbyaL7ysXKxiedlaDGc&e= 
>>   https://urldefense.proofpoint.com/v2/url?u=https-3A__www.rfc-2Deditor.org_authors_rfc9538.xml&d=DwIFaQ&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=XniVbishGiO2Ao9hKqSc-hTVIWCi3T-x6GdHR4ZTgoM&m=_uLNEDcaPBsFXYMA8j5oRepqfLBtLE6RKluO5xkPC-kqNuhB9LwWEVarzV9IR2tN&s=QyfJ3JEyXCJaYC3zyThHRZBmzKiYNACxoJ4MArXCUK8&e=  (source)
>> 
>> Diff files of all changes from the approved Internet-Draft:
>>   https://urldefense.proofpoint.com/v2/url?u=https-3A__www.rfc-2Deditor.org_authors_rfc9538-2Ddiff.html&d=DwIFaQ&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=XniVbishGiO2Ao9hKqSc-hTVIWCi3T-x6GdHR4ZTgoM&m=_uLNEDcaPBsFXYMA8j5oRepqfLBtLE6RKluO5xkPC-kqNuhB9LwWEVarzV9IR2tN&s=lHSovOjBUHrLUveLLyMBUoqm_IlAWXB37E8HMdIUZ68&e=  
>>   https://urldefense.proofpoint.com/v2/url?u=https-3A__www.rfc-2Deditor.org_authors_rfc9538-2Drfcdiff.html&d=DwIFaQ&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=XniVbishGiO2Ao9hKqSc-hTVIWCi3T-x6GdHR4ZTgoM&m=_uLNEDcaPBsFXYMA8j5oRepqfLBtLE6RKluO5xkPC-kqNuhB9LwWEVarzV9IR2tN&s=MjAFFfiY9fQr9Bv5FYsBigSAzexwRe3sL6KOEbvy7PM&e=  (side by side)
>> 
>> This page shows the AUTH48 status of your document:
>>   https://urldefense.proofpoint.com/v2/url?u=https-3A__www.rfc-2Deditor.org_auth48_rfc9538&d=DwIFaQ&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=XniVbishGiO2Ao9hKqSc-hTVIWCi3T-x6GdHR4ZTgoM&m=_uLNEDcaPBsFXYMA8j5oRepqfLBtLE6RKluO5xkPC-kqNuhB9LwWEVarzV9IR2tN&s=-577wxpatCuL4syt5zliTCPSry6dSb98RzaRlHqLg10&e= 
>> 
>> Thank you.
>> RFC Editor/ar
>> 
>> > On Jan 22, 2024, at 10:57 PM, rfc-editor@rfc-editor.org wrote:
>> > 
>> > Authors,
>> > 
>> > While reviewing this document during AUTH48, please resolve (as necessary) the
>> > following questions, which are also in the XML file.
>> > 
>> > 1) <!--[rfced] May this be rephrased as follows for readability?
>> > 
>> > Original:
>> >   RFC9115 allows delegating entities to remain in
>> >   full control of the delegation and be able to revoke it any time and
>> >   this avoids the need to share private cryptographic key material
>> >   between the involved entities.
>> > 
>> > Perhaps:
>> >   Per RFC 9115, delegating entities can remain in
>> >   full control of the delegation and can revoke it at any time.
>> >   This avoids the need to share private cryptographic key material
>> >   between the involved entities.
>> > -->
>> > 
>> > 
>> > 2) <!--[rfced] FYI, in Section 1.1, we added mention of "STAR" so that it
>> > is expanded upon first use. Please let us know if you prefer otherwise.
>> > (In the original, the first use was in Section 3 - "ACME STAR delegation"
>> > was followed by explanation but was without a direct expansion.)
>> > 
>> > Original:
>> >   It also uses
>> >   terminology from Section 1.2 of [RFC8739] and Section 1.1 of
>> >   [RFC9115].
>> > 
>> > Current:
>> >   It also uses
>> >   terminology from Section 1.2 of [RFC8739] and Section 1.1 of
>> >   [RFC9115], including Short-Term, Automatically Renewed (STAR),
>> >   as applied to X.509 certificates.
>> > -->
>> > 
>> > 
>> > 3) <!--[rfced] How may this sentence be rephrased for clarity? In particular,
>> > "allows to specify" is not clear. Also, Section 2.3.1.3 of RFC 9115
>> > indicates that the CNAME mapping is optional; should this sentence be
>> > updated to reflect that?
>> > 
>> > Original:
>> >      |   Note: The delegation object defined in Section 2.3.1.3 of
>> >      |  [RFC9115] only allows to specify DNS mappings using CNAME RRs.
>> > 
>> > Perhaps:
>> >      |   Note: The delegation object defined in Section 2.3.1.3 of
>> >      |  [RFC9115] only allows DNS mappings to be specified using CNAME RRs.
>> > 
>> > Or:
>> >      |   Note: The delegation object defined in Section 2.3.1.3 of
>> >      |  [RFC9115] allows DNS mappings to be specified using only CNAME RRs.
>> > -->
>> > 
>> > 
>> > 4) <!--[rfced] FYI, for readability and precision, we have made the following
>> > updates: split this into two sentences, changed "criticality around"
>> > to "criticality of", and changed "which" to "this account".
>> > Please review and let us know if you prefer otherwise.
>> > 
>> > Original:
>> >   The reader is expected to understand the ACME delegation trust model
>> >   (Section 7.1 of [RFC9115]) and security goal (Section 7.2 of
>> >   [RFC9115]), in particular the criticality around the protection of
>> >   the user account associated with the delegation, which authorizes all
>> >   the security relevant operations between dCDN and uCDN over the ACME
>> >   channel.
>> > 
>> > Current:
>> >   The reader is expected to understand the ACME delegation trust model
>> >   (Section 7.1 of [RFC9115]) and security goal (Section 7.2 of
>> >   [RFC9115]).  In particular, the reader is expected to understand the
>> >   criticality of the protection of the user account associated with the
>> >   delegation; this account authorizes all the security-relevant
>> >   operations between a dCDN and a uCDN over the ACME channel.
>> > -->
>> > 
>> > 
>> > Thank you.
>> > 
>> > RFC Editor/ar
>> >