Re: [auth48] [ISE] Re: AUTH48: RFC-to-be 9498 <draft-schanzen-gns-28> for your review

"Schanzenbach, Martin" <martin.schanzenbach@aisec.fraunhofer.de> Tue, 24 October 2023 11:22 UTC

Return-Path: <martin.schanzenbach@aisec.fraunhofer.de>
X-Original-To: auth48archive@ietfa.amsl.com
Delivered-To: auth48archive@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DA8AEC151097; Tue, 24 Oct 2023 04:22:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.005
X-Spam-Level:
X-Spam-Status: No, score=-1.005 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, URI_DOTEDU=1] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=aisec.fraunhofer.de header.b="AyFpK+Yf"; dkim=pass (1024-bit key) header.d=fraunhofer.onmicrosoft.com header.b="T19nLovl"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zin54hxSaJpk; Tue, 24 Oct 2023 04:22:39 -0700 (PDT)
Received: from mail-edgeDD24.fraunhofer.de (mail-edgedd24.fraunhofer.de [IPv6:2a03:db80:1504:d267::25:24]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A6788C151095; Tue, 24 Oct 2023 04:22:29 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=aisec.fraunhofer.de; i=@aisec.fraunhofer.de; q=dns/txt; s=emailbd1; t=1698146558; x=1729682558; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=l1yUlUFL8niTNGJCbqbqgwePn/Budhpzn0+epec8DL0=; b=AyFpK+YfkWrMWq44S948ETOqShCO9b/+uLYu8WZC/5U4S+DAv4Bgfx/3 9SubTih7FmthsQBUrORJ7fo/sz8cnmQ1h4++EpZiWIrA1UkMttWgmpQjQ SgP1rW8u0jrnRWUaVVFdvbOnm5eZXlcuqptZL+3ebxrNPzh1DHQ0MpKCM Yy0MQbDBzK05uEN6CJrei53BJaQfwsMqWJ7Hj7Xxpbb1hrc+HHqfX9tZI wiEBW8N2fIGw8b9+eRjGnp6nBCaDB7v3RSPBYs5U+Bb1kNidjAxWH4kcT IGUesKBEPo/epmeP23EoJd5v5lmduKsGFBN5aPjqdAQ85dEK9UbBU5he0 Q==;
X-CSE-ConnectionGUID: 1Lz7wie3SeyIvTOi6GvbOA==
X-CSE-MsgGUID: B4nDNTktRDWrVMQHMRGraw==
Authentication-Results: mail-edgeDD24.fraunhofer.de; dkim=pass (signature verified) header.i=@fraunhofer.onmicrosoft.com
X-IPAS-Result: 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
IronPort-PHdr: A9a23:Na5gRhVb83bgf24LbHpMzbWIsQ7V8KysVDF92vMcY89mbPH6rNzra VbE7LB2jFaTANuIo/kRkefSurDtVSsa7JKIoH0OI/kuHxNQh98fggogB8CIEwv8KvvrZDY9B 8NMSBlu+HToeVMAA8v6albOpWfoqDAIEwj5NQ17K/6wHYjXjs+t0Pu19YGWaAJN11/fKbMnA g+xqFf9v9Ub07B/IKQ8wQebh3ZTYO1ZyCZJCQC4mBDg68GsuaJy6ykCntME2ot+XL/hfqM+H 4wdKQ9jHnA+5MTtuhSGdgaJ6nYGe0k9khdDAFugjlnwXsKgixXbrct61HCqPv/6bI09Uz+95 p5razv1pTstMS4c7n/Tl8htlLJRvjuu8k8aocbeNb3MZfxaeb3ZTPkZBnJjAdYMdTJFW6btY Kc2BvUhYN5xjJvBm3Icoju6LhGhK73IkAQWonLV5bc/jc4YHCf3hj0nJIMA90n3s9boLvYXV MOJ0fX2zzrZYcFx9DDc+YHqdBd9mtqMAJRuQOHd7FAiSjzJ1Aqgmd3VJjiq2bRXvG24y9E5T sG+t1QltQdzpgSBnch9qbDno90c0ECU3jhX3Kw1F97ibk1wYt6lF84D/zHfNpFxRNslWX0to ish17ka7IayZzNZoHxG7xvWavjCfoSH7z7PDrrXLy1xmXRlf7yynVC+/Bvoxu79U5ys2U1R5 mpek9bKv2wQzRGb9MWdS/V880vgkTaC3gze8KdFdGg6j6PGLZ4mzLMq0J0VtEXIBCjtn0vqy qSRcy0Z
X-Talos-CUID: 9a23:FfUcEmqT6PVnevXvzrnxBT7mUZkBYCLCzXqLGEKpKHhVb7zLZkGa34oxxg==
X-Talos-MUID: 9a23:8/rORApwwGeMmI1yXCwezxs+MutO36eyMmwyi6sjgumhDwNqMijI2Q==
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="6.03,247,1694728800"; d="scan'208,217";a="71276809"
Received: from mail-mtaka29.fraunhofer.de ([153.96.1.29]) by mail-edgeDD24.fraunhofer.de with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 24 Oct 2023 13:22:22 +0200
IronPort-SDR: 6537a8eb_DZ8yTQitZrkJU0j54k3eAyzLDJ7YvWjndkWWArKrSeYc9f+ JZv3UnbHeC4tzemI49H2cvQv7BSmm9xxWrJEI6g==
X-IPAS-Result: A0ARAAAAqDdl/3+zYZlCGBkBAQEBAQEBAQEBAQEBAQEBAQESAQEBAQEBAQEBAQEBQAkcgRcDAQEBAQELAYE1ATAqKAc+MwJYFBdaiB4DhS2GQYIhAzgBkQCLF4EsFIERA1YPAQMBAQEBAQgBOwkEAQGFBgKHFgInNQgOAQIBAQIBAQEBAwIDAQEBAQEBAwEBBQEBAQIBAQYEgQoThWgNhkwBAQEBAQEBEggBDBkBAQcNGAQHAQQLAgEgEwILAQ0yBx4CBAEJBAUIGoJdghYNBwMOIwIBARAGpUABgUACiih4gQEzgQGCCQEBBgQEsBcYgj4JCQGBPgGDW4QuAYFOhwmBLweCBUOBFAFCgyaCBF0CAQGBFwIIBAQBEgEHHAoOBQgGARABg1WCL4FaggsSgixIggUHDi4DBDKBCgwJKlmCeQgtKYETCYF1cQJ1BIZogQBHcBsDBwOBAxArBwQtIgYJFi0lBlEELSQJExI+BIFngVEKgQY/Dw4RgkMiAgc2NhlLglsJFQY6BEl2ECoEFBdqIAgEah8VHjcREhcNAwh2HQIRIzwDBQMENAoVDQshBVcDRwZKCwMCGgUDAwSBNgUNHgIQLSkDAxlNAhAUAzsDAwYDCzEDMFdHDFkDbx8WIAkHNQsEDB8CGyMDRB1AAwsbITE9FCEGDhsFBGRZnCIKD2yBbgoCAQUBBxUXFhIHBgEBBSQTEwgLBA0HEwEHAx8BARQyCCIVCwgBBCYKDQQBBgUBAQEVAQEBAwsBGAYFBgsCBBAIjQKFLxQSCAotjneNMUiTMgmBLgMEA4IugV6KG4FmglCLP4cvF4QBTIEKixwDAYY0hAOCcogbglljmDwggi+LFodMjU4OAwEOCgENC4RmAgQCBAUCDgEBBoFQFAE6aXBxLiGCMwEzCUYDGQ+OIAcCAgEWgQoBAiOCJmqEKoJBiCRDMwIBAQE2AgcLAQEDCYZNgiEsgVBgAQE
IronPort-PHdr: A9a23:fBnwoxC4SUDMzA5MZ4qvUyQUIUIY04WdBeZowoRy0uEGe/G55J2nJ 0zWv6gz3xfCCJ/W7/tUhuaRqa3kUHwN7cXk0jgOJZJWXgIDicIYkhZmB8iACEbhK+XtYTB8F 8NHBxd+qmq2NUVeBMHkPRjcuHSv6z4VFBjlcA1zI+X+AInJiMqrkuu1/s62AU1I0RSnZrYgA ByqoFfqq8MUjIB+eIM80QDArXYNWsgE7mRuOV+Vg1PA99+9rrtC1gkVhf877M9HV/fKOoEDC JFIBzQvNW84ofbmsxXOVyKjzXsRWWZF93gACQiQvSjEf4zQtSejhulP1AinNMf9UrkNWReG8 op3Yhn4rTkZMyM97XnHgNJZg/cIxXDprUlDmt/SRIaLMMtUfeDFX4wKGEhfWp90BiNtO4qjT 9Y3JskTAdpxvYbdo3AWoDTgIlOXWsfi6QdSgyHc5KAc4r4QFjqX0ksdPM0NrW6FqdDWCLpOb +K61qf66hjETuJf+zH6tLPjck0Hv8CnUZdpfJfuxRNwJzOUvkybloO1ZTyQ9cA26nO4/tZaV /ypiWobhVp+8xuW6OJzg5PZ1qkI5Ezu9Rd6mqA2Lt64SUkuMpa0VZpKsCeCMJFqB9kvWHxsp HMiw6Yd6vZTHQAPwZUjghvDYt+uKdnO7AjqSeCRJjl1njRpdeH3ixWz9B24w/bnHomv0VlMp zZYiNSEqH0X1hLS58TGAvtw90usw3COgijd8OhZJ0Azm6fBbZknx787jJ0ItkrfWCTxnS3L
IronPort-Data: A9a23:3uH9sK+evF1TDrRYZlw3DrUDs3uTJUtcMsCJ2f8bNWPcYEJGY0x3z mNJUGuOPKmKN2qgLt9wb4+/9BtS68LSzd42QQI6qylEQiMRo6IpJzg2wmQcn8+2BpeeJK6yx 5xGMrEsFOhtEjmG4E3F3oHJ9RFUzbuPSqf3FNnKMyVwQR4MYCo6gHqPocZg6mJTqYb/W1jlV e/a+ZWFYwb9gWIsawr41orawP9RlKSq0N8nlgFmDRx7lAe2v2UYCpsZOZawIxPQKmWDNrfnL wpr5OjRElLxp3/BOPv8+lrIWhFirorpAOS7oiE+t55OIvR1jndaPq4TbJLwYKrM4tmDt4gZJ N5l7fRcReq1V0HBsLx1bvVWL81xFZxtxfycDHqBi9e0xkn/bVbU5dAxUl5jaOX0+s4vaY1P3 ecdNChLYwCIh6S42rumTOlriMk5asXmVG8dkig9lneIUrB/HsGFGv+VjTNb9G9YasRmGP/Ee 8sfLyFkbB3GcRBJMF4cCLo3nfyljT/xaTRFrlKSq6ctpWTepOB0+Oaxa4uMJIHVLSlTtk2gj E/czmP9OQkLK8OBmTza7niDgvCayEsXX6pXTtVU7MVCiUCPxjBDAQcdVVqlrNGjhEX7Vt5eN 0sOvC00osAa7kKgC9jmUjWirnXBsxIdR91KVeog52ml0KTfpguVB3QDVBZbZtdjucM3WTswk FiTkLvBDjx1saaJSHubsLiOqi+yPiYbBWUMZWkPTWMt7djziI41kxTCUpBkCqHdszHuMWitm HXb821n2ORW1JRUkbu+u1uBjSilu57JSQA4/EPbUwpJ8z9EWWJsXKTxgXDz4+xJMYCZSVeMp j4Dnc2f5/oJFpaDiGqGR+BlIV1jz63t3OT00A8zTaoyvS+g4WCido126TRzbhUheMUddDOjJ AeZtQpN7dUBdDGnfI1mUbKXUs4K9KnHEci6d/b2atEVXIN9WjXa9w5TZGmR/VvXrm4SrY8FN 62mLPmcVUQhNfw/zR6dZfss7rsw9yVvmULRXc/ayjqk45q/ZVmUa7cMAH2KX/Fk6aiBjlzf9 tZBBc602jFaaunfYzbWw6EXP1slPXg2PrGois11J8qoABtqJ3ElMNDVmYgeQo1Cm79EsNvI8 lWWeF5q+HCmiVLpcQy1O21eMpXxVpNBnFcHFC0LP2fw/UM8YIyqvZwtR7FucZYJrOVcnONJF d8bcMC9A9NKeDTN2xIZSbLf9IVCVhCatTiiDhqfQgoUXsBfHlTS29reYAHQ2jEEDXO3uesAs rSQ7F7nbqRZdTtyLvT9SayJ9Eywj0g/iegpfkrvI/tvQmvO3rVuCRTMiq4QH5lRBzTFniCXx iSHMyc+/OPtmbI4wPPNpKKDrrqqLddAI1pnLzHbwIuyZAbn/TuF4I5fUey3UyjXe0Hq9Y6DO +hE7fHOH8cWvVRNsrtDF6RZ8ocj1d3Np7NlkwNuRkfPZFX2CYFbA2Kn2PNXvfZn3Y5pugqRW 2OO9OJFOL6PBtjXLV4JKCchbcWBzfsxmASO3c8qIU7/2jB7zICHXWpWIROIri5Xd5lxD68I3 sYjv5QwxzGkqx93LOuDsD9Yx16MIlMETa8jkJMQW63vqwgzz2B9cY7uMTD37L6PeudzHBETe BHMv5X7hpNY2kbmWFgwHyKU3eNi2LI/iCoTx1oGf1m0it7Jg8Es5yJo8BM1cx90yytW2OciK 0lpMExIfZ+1xQlKv/QafW6QGFBmPia7q2jR0FoCkVPLQ3a4DlLtKHIPAsfT3UQ73V8FQB1l0 uC58lv1aRfrY8D74QUqU2FHtfHIbIJ85y/Cqu+dDuWHGJgxO2O9iYTzYWcnjRzDBPEgtX35u OBFreNCWYzmBwEtookQKYqT5ZIPQj+qeU1ARvBA+vsSPGf+ITud5xmHG3qTSOhsecPY0BafJ ZR1B8RtUx+e6n6/ngoDD/RRH44uze8b2tUSX5jKe0gEiuK7hRh0usvy8iPeujcac+92m5xgF rKLJiOwKU3Ot356gGSXkdJlPFC/atw6ZAHR+uC53eEKNpAbutFXbkAA/eqojkqRLTdY0UqYj CHba4/S6t5S+4Bmso/vM6dEXiGfC9f4UsaW+wGS7fVKS/7yMvn1igBEkWm/YjxqPoYQVeoux P7J+JTy0Vjetbk7b3HBltPTX+NV7MG1R6xMPtixMHBemjCYVdTx5wcYvVq1MoFNjMgX8/zPq 9FUsydsXYV9tw9h+UBo
IronPort-HdrOrdr: A9a23:iP4LQamDajnK4lqCxrt0I7rBfBzpDfIG3DAbv31ZSRFFG/Fw9v re+8jzuiWbtN98YhAdcLO7Sc29qBHnhP1ICOAqVN/IYOCBgguVxepZgbcKrQeMJ8XPnNQ26U 4ZSdkdNPTASXx9i8v+7E2fCNYvwN6O7aCui6PlxWxsVBwCUdAE0++uYjz1LnFL
X-Talos-CUID: 9a23:Y9knoWHTAwG2GZZnqmJW33NXQe0nTEfG637UGlGVMUBMF+OKHAo=
X-Talos-MUID: 9a23:+PtLPg++IfrSlRsTvwCWtLWQf8xQyYm0OUcJqo0XpNaaZSovJz2yiCviFw==
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="6.03,247,1694728800"; d="scan'208,217";a="64391657"
Received: from 153-97-179-127.vm.c.fraunhofer.de (HELO smtp.exch.fraunhofer.de) ([153.97.179.127]) by mail-mtaKA29.fraunhofer.de with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 24 Oct 2023 13:22:18 +0200
Received: from XCH-HYBRID-04.ads.fraunhofer.de (10.225.9.46) by XCH-HYBRID-04.ads.fraunhofer.de (10.225.9.46) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1258.27; Tue, 24 Oct 2023 13:22:18 +0200
Received: from DEU01-FR2-obe.outbound.protection.outlook.com (104.47.11.169) by XCH-HYBRID-04.ads.fraunhofer.de (10.225.9.46) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1258.27 via Frontend Transport; Tue, 24 Oct 2023 13:22:18 +0200
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=NZ8PtGM3GUE20LtDn24GF/OvaLDHc430CR6wguWQcj/f6cpfVMF0PmZYcr4mBcvZZKX5XPnBhHH9qrguKeWY3+PiCGWNbchJ+Wwu4lmXd+tFmZviGNIFRZi5zrId0Yx11Nkww5HJuw/8waddknf/ZvdShm0y9+yifuy2/jbCP3L2l0ly0aFn1RVPKEzq9fmjY7VsnCW3MgC6vWsnxrmr/cs4ahciAiylLw7Xwv2pRZbjKO8HDbvw80S80j3CgNv6RHEP3B8Xc3MI1RFLepHRrLQlayLokXwps0eA5Ejt6IKNCpyQPO+ev2RvY40Uh5+HK5by21BKBCqrqxOeiKylfA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=9QVIsIod1XkZdIUabcwaQhKLuEtBnxMvvlulupxbvAg=; b=FXSuP7+uCP4YBMjnfgYTqLcSVrY/0i2EsE18HnPHMcdmazvtuuCAjhvq3DY3ii9GFyKo5B3qUT7kT66+BV7gwVoyOlCeBsYj60BwIb24nUFeGOP9vynRQrzaEiYvhVegouYaCCUb1MluaPbjZj/3MOu9fPPuHmr7yMQjTxRjjoddtU5NxnmJZJlkMhBWAdVNudlxmxXiO2BKkMccovP3TvyLhvymt30XU9gTYoAWchVRDYwoJ6AXIkyz5PyM7KqiMhkaBb5zi8Vwa0AdWRAqFwu1OeU/naHsX64gvEC1RzIxpVaPbJg0324n5KnXtCgU2aLDgc+T1u2V0LovaT4QIA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=aisec.fraunhofer.de; dmarc=pass action=none header.from=aisec.fraunhofer.de; dkim=pass header.d=aisec.fraunhofer.de; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fraunhofer.onmicrosoft.com; s=selector2-fraunhofer-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=9QVIsIod1XkZdIUabcwaQhKLuEtBnxMvvlulupxbvAg=; b=T19nLovlYBk+pJ7x5Jvl1M9gDQawH5PAKzTTAzgHlCpeG6O2S6LeKPrm6BQeNY2YoS9f/UKwkur9mmKTu4VjgrfZOEoIyaJno4SCh5NvYCdMqe5Wd27XX9XqcWg82gmKLS1sKyTRjvnjlTF3g9KQFM7arx8CuFtBhZk2Nkckhio=
Received: from FR2P281MB2670.DEUP281.PROD.OUTLOOK.COM (2603:10a6:d10:64::9) by BEZP281MB2261.DEUP281.PROD.OUTLOOK.COM (2603:10a6:b10:52::9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6907.33; Tue, 24 Oct 2023 11:22:12 +0000
Received: from FR2P281MB2670.DEUP281.PROD.OUTLOOK.COM ([fe80::ba4c:94e4:dfe6:fa53]) by FR2P281MB2670.DEUP281.PROD.OUTLOOK.COM ([fe80::ba4c:94e4:dfe6:fa53%4]) with mapi id 15.20.6907.025; Tue, 24 Oct 2023 11:22:12 +0000
From: "Schanzenbach, Martin" <martin.schanzenbach@aisec.fraunhofer.de>
To: "Independent Submissions Editor (Eliot Lear)" <rfc-ise@rfc-editor.org>, "rfc-editor@rfc-editor.org" <rfc-editor@rfc-editor.org>, "christian.grothoff@bfh.ch" <christian.grothoff@bfh.ch>, "fix@gnunet.org" <fix@gnunet.org>
CC: "auth48archive@rfc-editor.org" <auth48archive@rfc-editor.org>
Thread-Topic: [ISE] Re: AUTH48: RFC-to-be 9498 <draft-schanzen-gns-28> for your review
Thread-Index: AQHaBjep1k72qE3NikKn5sQR6QOkcrBYzAsp
Date: Tue, 24 Oct 2023 11:22:12 +0000
Message-ID: <FR2P281MB26700CBAE2EF6955451AF1A6B3DFA@FR2P281MB2670.DEUP281.PROD.OUTLOOK.COM>
References: <20231023164059.B16691963225@rfcpa.amsl.com> <d00069aa-8a84-452b-8cd8-583a8ac29431@rfc-editor.org>
In-Reply-To: <d00069aa-8a84-452b-8cd8-583a8ac29431@rfc-editor.org>
Accept-Language: de-DE, en-US
Content-Language: de-DE
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels:
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: FR2P281MB2670:EE_|BEZP281MB2261:EE_
x-ms-office365-filtering-correlation-id: 4bc8ef03-098b-4f54-6682-08dbd483785d
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:FR2P281MB2670.DEUP281.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(13230031)(366004)(39860400002)(396003)(346002)(376002)(136003)(230922051799003)(1800799009)(451199024)(64100799003)(186009)(55016003)(7696005)(9686003)(53546011)(6506007)(71200400001)(83380400001)(478600001)(966005)(26005)(41300700001)(2906002)(66574015)(30864003)(110136005)(316002)(64756008)(52536014)(91956017)(76116006)(66556008)(66476007)(66446008)(66946007)(5660300002)(8676002)(8936002)(4326008)(21615005)(122000001)(38100700002)(166002)(82960400001)(33656002)(86362001)(38070700009)(19627405001)(66899024)(559001)(579004); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_FR2P281MB26700CBAE2EF6955451AF1A6B3DFAFR2P281MB2670DEUP_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: FR2P281MB2670.DEUP281.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: 4bc8ef03-098b-4f54-6682-08dbd483785d
X-MS-Exchange-CrossTenant-originalarrivaltime: 24 Oct 2023 11:22:12.8231 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: f930300c-c97d-4019-be03-add650a171c4
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: i1UBb7jB4CUnw5DDBJoeoAiPlz2vDaJ3Cl5B9Y+XyhuI4cg3I1PpapTFy9TPGX93tC+Ef7J58LrAh9oAp4f2qU+/sisCIiRpsikUFTtS0afp9mIOqcpJaVHek8F4L9oZ
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BEZP281MB2261
X-OriginatorOrg: aisec.fraunhofer.de
Archived-At: <https://mailarchive.ietf.org/arch/msg/auth48archive/erG86DzcvXFt4HA52Hmj6g6QbRw>
Subject: Re: [auth48] [ISE] Re: AUTH48: RFC-to-be 9498 <draft-schanzen-gns-28> for your review
X-BeenThere: auth48archive@rfc-editor.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Archiving AUTH48 exchanges between the RFC Production Center, the authors, and other related parties" <auth48archive.rfc-editor.org>
List-Unsubscribe: <https://mailman.rfc-editor.org/mailman/options/auth48archive>, <mailto:auth48archive-request@rfc-editor.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/auth48archive/>
List-Post: <mailto:auth48archive@rfc-editor.org>
List-Help: <mailto:auth48archive-request@rfc-editor.org?subject=help>
List-Subscribe: <https://mailman.rfc-editor.org/mailman/listinfo/auth48archive>, <mailto:auth48archive-request@rfc-editor.org?subject=subscribe>
X-List-Received-Date: Tue, 24 Oct 2023 11:22:45 -0000

Cheers!

Before we start: I assume we can simply make the changes to our xml and upload a new version to address the feedback?
Or by email?


Best
Martin
________________________________
Von: Independent Submissions Editor (Eliot Lear) <rfc-ise@rfc-editor.org>
Gesendet: Dienstag, 24. Oktober 2023 07:04
An: rfc-editor@rfc-editor.org <rfc-editor@rfc-editor.org>; Schanzenbach, Martin <martin.schanzenbach@aisec.fraunhofer.de>; christian.grothoff@bfh.ch <christian.grothoff@bfh.ch>; fix@gnunet.org <fix@gnunet.org>
Cc: auth48archive@rfc-editor.org <auth48archive@rfc-editor.org>
Betreff: Re: [ISE] Re: AUTH48: RFC-to-be 9498 <draft-schanzen-gns-28> for your review

Thank you, RFC Editor.  Authors: please promptly address each point made.

Eliot

On 23.10.2023 18:40, rfc-editor@rfc-editor.org wrote:
> Authors and Eliot,
>
> * Eliot, as ISE, please reply regarding #29.
>
> While reviewing this document during AUTH48, please resolve (as necessary) the following questions, which are also in the XML file.
>
> 1) <!-- [rfced] Please note that because this XML file was submitted in
> "prepped" format, we created an "unprepped" file so that we could
> edit the document properly.  This does not impact the document's
> text but resulted in many changes to the XML. -->
>
>
> 2) <!-- [rfced] Datatracker "idnits" output for the original approved
> document included the following warning.  Although an author recently
> referred to the lines indicated in this warning as "false positives",
> please let us know if any changes are needed as related to this
> warning:
>
>   == There are 6 instances of lines with non-RFC2606-compliant FQDNs in
>      the document. -->
>
>
> 3) <!-- [rfced] Abstract and subsequent:  To what does "including" refer
> in the following sentences?  If our suggestions are incorrect, please
> clarify the text in each sentence.
>
> Original:
>   It is published here to inform readers about the
>   function of GNS, guide future GNS implementations, and ensure
>   interoperability among implementations including with the pre-
>   existing GNUnet implementation.
> ...
>   When names are resolved, signatures on resource
>   records including delegations are verified by the recursive
>   resolver.
> ...
>   In the remainder of this document, the "implementer" refers to the
>   developer building a GNS implementation including the resolver, zone
>   master, and supporting configuration such as start zones (see
>   Section 7.1).
> ...
>   The encoding and decoding symbols for Base32GNS including
>   this modification are defined in Figure 30.
> ...
>   It
>   defines the context in which the signature is created so that it
>   cannot be reused in other parts of the protocol including possible
>   future extensions.
> ...
>   It
>   defines the context in which the signature is created so that it
>   cannot be reused in other parts of the protocol including possible
>   future extensions.
>
> Suggested:
>   It is published here to inform readers about the
>   function of the GNS, guide future GNS implementations, and ensure
>   interoperability among implementations (for example, pre-
>   existing GNUnet implementations).
> ...
>   When names are resolved, signatures on resource
>   records, including delegations, are verified by the recursive
>   resolver.
> ...
>   In the remainder of this document, the "implementer" refers to the
>   developer who builds a GNS implementation that includes the
>   resolver, zone master, and supporting configuration such as start
>   zones (see Section 7.1).
> ...
>   The encoding and decoding symbols for Base32GNS, including
>   this variation, are defined in Table 4 (Appendix C).
> ...
>   It
>   defines the context in which the signature is created so that it
>   cannot be reused in other parts of the protocol that might include
>   possible future extensions.
> ...
>   It
>   defines the context in which the signature is created so that it
>   cannot be reused in other parts of the protocol that might include
>   possible future extensions. -->
>
>
> 4) <!-- [rfced] Please review each artwork element in the XML file.
> Should any artwork element be tagged as sourcecode?  For example,
> should the "GET / HTTP/1.1" entries in Appendix A.3 be sourcecode
> with type="http-message", and should the test-vector entries in
> Appendix D be sourcecode with type="test-vectors"?
>
> Please see
> <https://www.rfc-editor.org/materials/sourcecode-types.txt>; if the
> current list of preferred values for "type" does not contain an
> applicable type, please let us know.  Also, it is acceptable to leave
> the "type" attribute unset. -->
>
>
> 5) <!-- [rfced] The following author comments, as found in the original
> XML file, appear to be pending.  Is any action required for the
> following?
>
>   FIXME: Is this really really necessary? Really?
>   FIXME: add non-normative reference to Tor / Tor hidden services here?
>   FIXME replace with RFC
>   Check if we want to use RFC8032 instead of paper ed25519 -->
>
>
> 6) <!-- [rfced] Section 1:  As there can only be one "first", we changed
> "A first" to "One of the first" here.  If this is incorrect, please
> provide clarifying text.
>
> Original:
>   A first academic description of the
>   cryptographic ideas behind GNS can be found in [GNS].
>
> Currently:
>   One of the first academic
>   descriptions of the cryptographic ideas behind GNS can be found in
>   [GNS]. -->
>
>
> 7) <!-- [rfced] Section 2:  To what does "in examples which is" refer?
> Should it say "in examples that are" or something else?  Please
> clarify.
>
> Original:
>   In order to avoid misinterpretation of example
>   domains with (reserved) DNS domains this draft uses the suffix
>   ".gns.alt" in examples which is also registered in the GANA ".alt
>   Subdomains" registry [GANA] (see also [I-D.ietf-dnsop-alt-tld]). -->
>
>
> 8) <!-- [rfced] Section 2:  As it appears that "which" in this text
> refers to the zTLD (per Sections 4 and 4.1), we updated this item
> accordingly.  If this is incorrect, please provide clarifying text.
>
> Original:
>   Zone Top-Level Domain  A GNS Zone Top-Level Domain (zTLD) is a
>      sequence of GNS labels at the end of a GNS name which encodes a
>      zone type and zone key of a zone (see Section 4.1).
>
> Currently:
>   Zone Top-Level Domain (zTLD):  A GNS zTLD is a sequence of GNS labels
>      at the end of a GNS name.  The zTLD encodes a zone type and zone
>      key of a zone (see Section 4.1). -->
>
>
> 9) <!-- [rfced] Section 4.1:  As it appears that "this table" refers to
> what is now Table 4 in Appendix C, we updated these two sentences
> accordingly.  If these updates are not correct, please clarify
> "this table".
>
> Original:
>   The encoding and decoding symbols for Base32GNS including
>   this modification are defined in Figure 30.  The functions for
>   encoding and decoding based on this table are called Base32GNS-Encode
>   and Base32GNS-Decode, respectively.
>
> Currently:
>   The
>   encoding and decoding symbols for Base32GNS including this
>   modification are defined in Table 4 (Appendix C).  The functions for
>   encoding and decoding based on Table 4 are called Base32GNS-Encode
>   and Base32GNS-Decode, respectively. -->
>
>
> 10) <!-- [rfced] Figures 3 through 7 and 20 through 22:  Should the use
> of vertical lines ("|") versus slashes "/") be made consistent where
> the continuation of fields is indicated?  If so, how?
>
> A few examples (double dashes removed to avoid confusion with XML
>    comments):
>
>   |       ZONE TYPE       |      ZONE KEY         /
>   +- - -+- - -+- - -+- - -+                       /
>   /                                               /
>   /                                               /
>
> ...
>
>   |       ZONE TYPE       |    ZONE KEY           |
>   +- - -+- - -+- - -+- - -+                       |
>   /                                               /
>   /                                               /
>
> ...
>
>   |                    BDATA                      /
>   /                                               /
>   /                                               |
>
> ...
>
>   |                    BDATA                      |
>   /                                               /
>   /                                               / -->
>
>
> 11) <!-- [rfced] Section 4.2:  We found "a number Z different PoWs"
> difficult to follow.  We updated the text per the definition of "Z"
> that appears a few lines later.  Please let us know any objections.
>
> Original:
>   In order to
>   reduce the variance in time it takes to calculate the PoW, a valid
>   GNS revocation requires that a number Z different PoWs must be found
>   that on average have D leading zeroes.
>
> Currently:
>   In order to
>   reduce the variance in time it takes to calculate the PoW, a valid
>   GNS revocation requires that a number of different PoWs (Z, as
>   defined below) must be found that on average have D leading zeroes. -->
>
>
> 12) <!-- [rfced] Section 4.2:  Does "time stamp and public key fields"
> mean "TIMESTAMP and PUBLIC KEY fields", even though we only see
> "PUBLIC KEY" mentioned in Sections 5.1.1 and 5.1.2?
>
> Original:
>   The signature over the public key covers a 32-bit header prefixed to
>   the time stamp and public key fields. -->
>
>
> 13) <!-- [rfced] Sections 4.2 and subsequent:  Please note that we
> updated some of the GANA registry names to match those found on
> [GANA].  Please review, and let us know any objections.
>
> Examples from original:
>   .alt subdomains (Section 10.2)
>   GNUnet Signature Purpose (Sections 4.2, 6.3, and 10)
>   GANA "Overlay Protocols" registry (Section 5.3.3)
>   GNU Name System Record Types (Section 10.1)
>   GANA Resource Record (Figure 25 in Section 10.1)
>
> Currently:
>   .alt Subdomains (also per Section 10.2, and per [GANA])
>   GNUnet Signature Purposes
>   GANA "GNUnet Overlay Protocols" registry
>   GNS Record Types
>   GANA GNS Record Types (title of what is now Table 2) -->
>
>
> 14) <!-- [rfced] Section 4.2:  As it appears that "evict then from"
> should be "evict them from", we updated accordingly.  If this is
> incorrect, please clarify "evict then from".
>
> Original (the previous sentence is included for context):
>   Verified revocations MUST be stored locally.  The implementation MAY
>   discard stale revocations and evict then from the local store at any
>   time.
>
> Currently:
>   The implementation MAY
>   discard stale revocations and evict them from the local store at any
>   time. -->
>
>
> 15) <!-- [rfced] Section 5:  Please confirm that "16-bit bit field" (and
> not "16-bit field") is correct.
>
> Original:
>   FLAGS  is a 16-bit bit field indicating special properties of the
>      resource record.
>
> Possibly:
>   FLAGS:  16 bits.  A bit field indicating special properties of the
>      resource record. -->
>
>
> 16) <!-- [rfced] Section 5:  xml2rfc v3 permits superscripting.  Would
> you like to apply superscripting to numbers where the caret ("^") is
> used (e.g., 2^16, 2^255)?  The superscripts would appear in the HTML
> and PDF output files, but the textfile would still show the caret.
> For an example, please see the last paragraph in Section 2.4.2 of
> RFC 9426 (https://www.rfc-editor.org/rfc/rfc9426.html).
>
> If yes, please also let us know if anything else might need to be
> superscripted or subscripted. -->
>
>
> 17) <!-- [rfced] Sections 5.1.1 and 5.1.2:  "using an HKDF using" reads
> oddly.  Does it mean "using an HKDF that uses", "using an HKDF and
> using" (i.e., the key material is retrieved by using an HKDF as well
> as the string "key-derivation"), or something else?  If this needs to
> be clarified, please provide updated text.
>
> Original:
>   PRK_h is key material retrieved using an HKDF using the string "key-
>   derivation" as salt and the zone key as initial keying material.
> ...
>   PRK_h is key material retrieved using an HKDF using the string "key-
>   derivation" as salt and the zone key as initial keying material.
>
> Possibly:
>   PRK_h is key material retrieved using an HKDF that uses the string
>   "key-derivation" as the salt and the zone key as the initial keying
>   material.
> ...
>   PRK_h is key material retrieved using an HKDF that uses the string
>   "key-derivation" as the salt and the zone key as the initial keying
>   material. -->
>
>
> 18) <!-- [rfced] Section 5.1.1:  For ease of the reader, we defined "IV"
> as "Initialization Vector" here, per the title of Figure 12.  Please
> let us know any concerns.
>
> Original:
>   The key K and counter IV are derived from the record label and the
>   zone key zk using an HKDF as defined in [RFC5869].
>
> Currently:
>   The key K and counter IV (Initialization Vector) are derived from the
>   record label and the zone key zk, using an HKDF as defined in
>   [RFC5869]. -->
>
>
> 19) <!-- [rfced] Section 5.1.2:  This sentence is very difficult to
> parse; it is not clear what represents the KeyGen() function.  Should
> parentheses be added, per the definition of KeyGen() provided in
> Section 5.1.1?
>
> Original:
>   KeyGen()  The generation of the private key d and the associated
>      public key zk := a*G where G is the group generator of the
>      elliptic curve and a is an integer derived from d using the
>      SHA-512 hash function as defined in Section 5.1.5 of [RFC8032]
>      represents the KeyGen() function.
>
> Definition in Section 5.1.1 (for comparison purposes):
>   KeyGen()  The generation of the private scalar d and the curve point
>      zk := d*G (where G is the group generator of the elliptic curve)
>      as defined in Section 2.2. of [RFC6979] represents the KeyGen()
>      function. -->
>
>
> 20) <!-- [rfced] Section 5.1.2:  For ease of the reader, may we clarify
> this text as suggested?
>
> Original:
>   The calculation
>   of a is defined in Section 5.1.5 of [RFC8032].
>
> Suggested:
>   As noted above for KeyGen(), a is calculated from d using the
>   SHA-512 hash function as defined in Section 5.1.5 of [RFC8032]. -->
>
>
> 21) <!-- [rfced] Section 5.1.2:
> a) Because it appears that using d' (as opposed to d' itself) is not
> compliant with [RFC8032], we updated this sentence accordingly.  If
> this is not correct, please provide clarifying text.
>
> Original:
>   Signatures for EDKEY zones use a derived private scalar d' which is
>   not compliant with [RFC8032].
>
> Currently:
>   Signatures for EDKEY zones use a derived private scalar d'; this is
>   not compliant with [RFC8032].
>
> b) We found "key to" confusing in this context.  Should "key to" be
> "key for" here?
>
> Original:
>   As the corresponding private key to
>   the derived private scalar is not known, it is not possible to
>   deterministically derive the signature part R according to [RFC8032].
>
> Perhaps:
>   As the corresponding private key for
>   the derived private scalar is not known, it is not possible to
>   deterministically derive the signature part R according to [RFC8032].
>
> Or possibly:
>   As the private key that corresponds to
>   the derived private scalar is not known, it is not possible to
>   deterministically derive the signature part R according to [RFC8032]. -->
>
>
> 22) <!-- [rfced] Section 5.1.2:  We could not find any mention of
> "Poly1305", "Poly", or "1305" in [XSalsa20].  Will this sentence be
> clear to readers?
>
> Original:
>   The S-Encrypt() and S-Decrypt() functions use XSalsa20 as defined in
>   [XSalsa20] (XSalsa20-Poly1305):
>
> Possibly:
>   The S-Encrypt() and S-Decrypt() functions use XSalsa20 as defined in
>   [XSalsa20] and use the XSalsa20-Poly1305 encryption function: -->
>
>
> 23) <!-- [rfced] Sections 5.2.1 and subsequent:  Per more common usage in
> published RFCs, we changed "0-terminated" to "zero terminated", as this
> term is not used as a modifier.  Please let us know any objections.
>
> Original:
>   The string is UTF-8 encoded and 0-terminated.
> ...
>   The value is UTF-8 encoded
>      and 0-terminated.
> ...
>   The value is UTF-8 encoded and 0-terminated.
> ...
>   A UTF-8 string (which is not 0-terminated)
>      representing the legacy hostname.
> ...
>   A UTF-8 string (which is not 0-terminated) representing the
>      preferred label of the zone.
>
> Currently:
>   The string is UTF-8 encoded and zero terminated.
> ...
>   The value is UTF-8 encoded
>      and zero terminated.
> ...
>   The value is UTF-8 encoded and zero terminated.
> ...
>   A UTF-8 string (which is not zero terminated)
>      representing the legacy hostname.
> ...
>   A UTF-8 string (which is not zero terminated) representing
>      the preferred label of the zone. -->
>
>
> 24) <!-- [rfced] Section 6:  Do "176 byte blocks" and "1024 byte blocks"
> refer to blocks that are (at least) 176 bytes or 1024 bytes in size,
> or is "byte blocks" a proper term (as in some number of byte blocks)?
>
> Original:
>   To be useful, the API MUST permit
>   storing at least 176 byte blocks to be able to support the defined
>   zone delegation record encodings, and SHOULD allow at least 1024 byte
>   blocks.
>
> Possibly:
>   To be useful, and to be able to support the defined zone delegation
>   record encodings, the API MUST permit storing blocks of size 176 bytes
>   or more and SHOULD allow blocks of size 1024 bytes or more. -->
>
>
> 25) <!-- [rfced] Section 6.3:  Does "is considered" refer to the maximum
> expiration time only (in which case "is" is correct) or the maximum
> expiration time and also the expiration times of the non-shadow
> records (in which case "is" should be "are")?
>
> Original:
>   If the RDATA includes shadow
>   records, then the maximum expiration time of all shadow records
>   with matching type and the expiration times of the non-shadow
>   records is considered. -->
>
>
> 26) <!-- [rfced] Section 7.3.2:  We had trouble following the "and"
> relationships in this sentence.  We updated as follows.  If this is
> incorrect, please clarify the text.
>
> Original:
>   When a resolver encounters one or more GNS2DNS records and the
>   remaining name is empty and the desired record type is GNS2DNS, the
>   GNS2DNS records are returned.
>
> Currently:
>   When a resolver encounters one or more GNS2DNS records, the
>   remaining name is empty, and the desired record type is GNS2DNS, the
>   GNS2DNS records are returned. -->
>
>
> 27) <!-- [rfced] Section 7.3.2:  We changed "error is SHOULD be returned"
> to "error SHOULD be returned" here.  Please let us know if the text
> should be "error is returned" instead.
>
> Original:
>   If
>   different DNS names are present the resolution fails and an
>   appropriate error is SHOULD be returned to the application.
>
> Currently:
>   If
>   different DNS names are present, the resolution fails and an
>   appropriate error SHOULD be returned to the application. -->
>
>
> 28) <!-- [rfced] Section 7.3.4:  This paragraph is difficult to parse.
> For example, the last sentence is a fragment, and it isn't clear
> under what circumstances the delegation record is returned.  If the
> suggested text is not correct, please clarify.
>
> Original:
>   If the remainder of the name to resolve is empty and a record set was
>   received containing only a single delegation record, the recursion is
>   continued with the record value as authoritative zone and the apex
>   label "@" as remaining name.  Except in the case where the desired
>   record type as specified by the application is equal to the ztype, in
>   which case the delegation record is returned.
>
> Suggested:
>   If the remainder of the name to resolve is empty and a record set was
>   received containing only a single delegation record, the recursion is
>   continued with the record value as the authoritative zone and the
>   apex label "@" as the remaining name.  The exception is the case
>   where the desired record type as specified by the application is
>   equal to the ztype, in which case the delegation record is returned. -->
>
>
> 29) <!--[rfced] Section 9: [ISE] Please confirm that it is intentional
> to title this section "Security and Privacy Considerations"
> rather than "Security Considerations" as described in RFC 3552.
>
> Past RFCs have rarely used this title; specifically:
> - RFC 9223 used it and had subsections to divide them.
> - RFC 7989 used it (and did not have subsections).
> -->
>
>
> 30) <!-- [rfced] Section 9.1:  Does "considered just like" here mean
> "treated just like", "also considered to be just like", or something
> else?  Please clarify.
>
> Original:
>   Private records are
>   considered just like regular records when resolving labels in local
>   zones, but their data is completely unavailable to non-local users. -->
>
>
> 31) <!-- [rfced] Section 9.3:  In the first sentence, [ed25519] appears
> to be one paper.  Should RFC 7748 also be cited here as the other
> paper?
>
> In the second sentence, does the hash function or the key destroy the
> linearity that the key blinding in GNS depends upon?
>
> If the suggested text is not correct, please provide clarifying text.
>
> Original:
>   However,
>   standardized ECDSA curves are problematic for a range of reasons
>   described in the Curve25519 and EdDSA papers [ed25519].  Using EdDSA
>   directly is also not possible, as a hash function is used on the
>   private key which destroys the linearity that the key blinding in GNS
>   depends upon.
>
> Suggested (guessing the hash function and including RFC 7748):
>   However,
>   standardized ECDSA curves are problematic for a range of reasons, as
>   described in the Curve25519 and EdDSA papers [RFC7748] [ed25519].
>   Using EdDSA directly is also not possible, as a hash function is
>   used on the private key and will destroy the linearity that the key
>   blinding in GNS depends upon. -->
>
>
> 32) <!-- [rfced] Section 9.5:  Because it appears that "or names" should
> be "of names" here, we updated accordingly.  Please let us know if
> this is incorrect.
>
> Original:
>   In order to ensure integrity and availability or
>   names, users must ensure that their local start zone information is
>   not compromised or outdated.
>
> Currently:
>   In order to ensure the integrity and availability of
>   names, users must ensure that their local start zone information is
>   not compromised or outdated. -->
>
>
> 33) <!-- [rfced] Section 9.5:  Does "provided" only refer to the
> processing, or does it also refer to the initial start zone (in
> which case "is" should be "are")?
>
> Original:
>   It can be expected that the processing
>   of zone revocations and an initial start zone is provided with a GNS
>   implementation ("drop shipping"). -->
>
>
> 34) <!-- [rfced] Section 9.10:  As it appears that "taking into account"
> applies to the applications and not some other method, we updated
> this sentence accordingly.  If this is incorrect, please provide
> clarifying text.
>
> Original:
>   In order to prevent disclosure of queried GNS names it is RECOMMENDED
>   that GNS-aware applications try to resolve a given name in GNS before
>   any other method taking into account potential suffix-to-zone
>   mappings and zTLDs.
>
> Currently:
>   In order to prevent disclosure of queried GNS names, it is
>   RECOMMENDED that GNS-aware applications try to resolve a given name
>   in GNS before any other method, taking into account potential suffix-
>   to-zone mappings and zTLDs. -->
>
>
> 35) <!-- [rfced] Section 9.10:  As it appears that "It" in this sentence
> refers to the NSS and not to a resolution process, we updated
> accordingly, in line with text in the third paragraph of
> Appendix A.4.  If this is incorrect, please provide clarifying text.
>
> Original (the previous sentence is included for context):
>   Mechanisms such as the Name Service Switch (NSS) of Unix-like
>   operating systems are an example of how such a resolution process can
>   be implemented and used.  It allows system administrators to
>   configure host name resolution precedence and is integrated with the
>   system resolver implementation.
>
> Currently:
>   The NSS allows system administrators to
>   configure hostname resolution precedence and is integrated with the
>   system resolver implementation. -->
>
>
> 36) <!-- [rfced] Section 10:  The title of this table seems to indicate
> that the requested assignments have not yet been made.  Should
> "Requested" be "Assigned", as suggested below?
>
> Original:
>   Figure 24: Requested Changes in the GANA GNUnet Signature Purpose
>                                    Registry.
>
> Perhaps:
>   Table 1: Assigned Changes in the GANA GNUnet Signature Purposes
>                                    Registry
>
> Or possibly:
>          Table 1: The GANA GNUnet Signature Purposes Registry -->
>
>
> 37) <!-- [rfced] Sections 10.1 and 10.2:  Which paragraph or paragraphs
> are referenced by these "by GANA:" sentences?  We ask because of the
> use of the colon (":"); it appears that one or more of the paragraphs
> after the colon should appear as a list (i.e., should be
> "bullet items").
>
> Alternatively, should the colons be periods?
>
> Original:
>   The registration policy for this registry is "First Come First
>   Served".  This policy is modeled on that described in [RFC8126], and
>   describes the actions taken by GANA:
>
>   Adding new entries is possible after review by any authorized GANA
>   contributor, using a first-come-first-served policy for unique name
>   allocation.  Reviewers are responsible to ensure that the chosen
>   "Name" is appropriate for the record type.  The registry will define
>   a unique number for the entry.
>
>   Authorized GANA contributors for review of new entries are reachable
>   at gns-registry@gnunet.org.
>
>   Any request MUST contain a unique name and a point of contact.  The
>   contact information MAY be added to the registry given the consent of
>   the requester.  The request MAY optionally also contain relevant
>   references as well as a descriptive comment as defined above.
>
>   GANA has assigned numbers for the record types defined in this
>   specification in the "GNU Name System Record Types" registry as
>   listed in Figure 25.
> ...
>   The registration policy for this registry is "First Come First
>   Served".  This policy is modeled on that described in [RFC8126], and
>   describes the actions taken by GANA:
>
>   Adding new entries is possible after review by any authorized GANA
>   contributor, using a first-come-first-served policy for unique
>   subdomain allocation.  Reviewers are responsible to ensure that the
>   chosen "Subdomain" is appropriate for the purpose.
>
>   Authorized GANA contributors for review of new entries are reachable
>   at alt-registry@gnunet.org.
>
>   Any request MUST contain a unique subdomain and a point of contact.
>   The contact information MAY be added to the registry given the
>   consent of the requester.  The request MAY optionally also contain
>   relevant references as well as a descriptive comment as defined
>   above.
>
>   GANA has assigned the subdomain defined in this specification in the
>   ".alt subdomains" registry as listed in Figure 26.
>
> Perhaps (Section 10.1; assuming that the next three paragraphs, and
>   not the "GANA has assigned" paragraph, should be in list form):
>   This policy is modeled on that described in [RFC8126] and
>   describes the actions taken by GANA:
>
>   *  Adding new entries is possible after review by any authorized
>      GANA contributor, using a first-come-first-served policy for
>      unique name allocation.  Reviewers are responsible for ensuring
>      that the chosen "Name" is appropriate for the record type.  The
>      registry will define a unique number for the entry.
>
>   *  Authorized GANA contributors for review of new entries are
>      reachable at gns-registry@gnunet.org.
>
>   *  Any request MUST contain a unique name and a point of contact.
>      The contact information MAY be added to the registry, with the
>      consent of the requester.  The request MAY optionally also
>      contain relevant references as well as a descriptive comment, as
>      defined above.
>
>   GANA has assigned numbers for the record types defined in this
>   specification in the "GNS Record Types" registry as listed in
>   Table 2. -->
>
>
> 38) <!-- [rfced] Section 10.1:  We see a discrepancy between this
> document and [GANA] for the "BOX" entry (number 65541).  It appears
> that all other entries match.  Should the listings be made
> consistent between this document and [GANA]?  If so, how?
>
> "Comment" entry for this document:  Boxed records
> "Comment" entry in the GANA "GNS Record Types" registry:  Box record
> -->
>
>
> 39) <!-- [rfced] Section 10.2:  Should "Comment" be "Description" in
> these entries and should "Subdomain" be "Label" here, per [GANA]
> (specifically https://gana.gnunet.org/dot-alt/dot_alt.html)?
>
> We also see "a first-come-first-served policy for unique subdomain
> allocation" in the text in this section, so it's not clear whether
> "Subdomain" or "Label" might be preferred for this document and
> [GANA] (if they should indeed match).
>
> Original:
>   *  Label: The label of the subdomain (in DNS LDH format as defined in
>      Section 2.3.1 of [RFC5890]).
>
>   *  Comment: Optionally, a brief English text describing the purpose
>      of the subdomain (in UTF-8)
> ...
>   Subdomain | Contact | References | Comment
> -->
>
>
> 40) <!--[rfced] Section 12: Is it intentional to keep the
> "Implementation and Deployment Status" section, or would
> you like it to be removed before publication?
>
> Regarding "Implementation Status" sections in general, RFC 7942 states:
> "We recommend that the Implementation Status section should be
> removed from Internet-Drafts before they are published as RFCs."
>
> That said, if you prefer to keep it, that's fine.
> -->
>
>
> 41) <!-- [rfced] Normative References:  Please confirm that the URL
> provided for [XSalsa20] is stable.
>
> Original:
>   [XSalsa20] Bernstein, D., "Extending the Salsa20 nonce", 2011,
>              <https://cr.yp.to/snuffle/xsalsa-20110204.pdf>. -->
>
>
> 42) <!-- [rfced] [SDSI]:  The provided URL yields a "Not Found" error.
> We see that
> <https://people.csail.mit.edu/rivest/pubs/RL96.ver-1.1.html>, dated
> October 1996, works, but is it stable?  We have been advised that
> ".edu" URLs are not always stable.
>
> Please advise regarding how to update this listing, noting that we
> try to use "https://" instead of "http://" as much as possible.
>
> Original:
>   [SDSI]     Rivest, R. and B. Lampson, "SDSI - A Simple Distributed
>              Security Infrastructure", April 1996,
>              <http://people.csail.mit.edu/rivest/Sdsi10.ps>. -->
>
>
> 43) <!-- [rfced] Informative References:  Please confirm that the URL
> provided for [Kademlia] is stable.
>
> Original:
>   [Kademlia] Maymounkov, P. and D. Mazieres, "Kademlia: A peer-to-peer
>              information system based on the xor metric.", 2002,
>              <http://css.csail.mit.edu/6.824/2014/papers/kademlia.pdf>. -->
>
>
> 44) <!-- [rfced] [GNUnetGNS]:  The title as provided in this document
> doesn't appear on the provided page.  May we change the title to
> "gnunet.git - GNUnet core repository"?
>
> Original:
>   [GNUnetGNS]
>              GNUnet e.V., "The GNUnet GNS Implementation",
>              <https://git.gnunet.org/gnunet.git/tree/src/gns>. -->
>
>
> 45) <!-- [rfced] [Ascension]:  The title as provided in this document
> doesn't appear on the provided page.  May we change the title to
> "ascension.git - DNS zones to GNS migrating using incremental zone
> transfer (AXFR/IXFR)"?
>
> Original:
>   [Ascension]
>              GNUnet e.V., "The Ascension Implementation",
>              <https://git.gnunet.org/ascension.git>. -->
>
>
> 46) <!-- [rfced] [GNUnet]:  The title as provided in this document
> doesn't appear on the provided page.  Should the title be updated?
>
> Original:
>   [GNUnet]   GNUnet e.V., "The GNUnet Project", <https://gnunet.org>.
>
> Perhaps:
>   [GNUnet]   GNUnet e.V., "The GNUnet Project (Home Page)",
>              2023, <https://gnunet.org>. -->
>
>
> 47) <!-- [rfced] Appendix A.2:  Does the colon after "configuration" mean
> that only the first paragraph that follows it applies, or do both
> subsequent paragraphs apply?  In other words, it appears that one or
> both of the subsequent paragraphs should be in list form (i.e., a
> bullet list).  Please advise.
>
> Alternatively, should the colon be a period?
>
> Original:
>   At
>   this point the user may delete or otherwise modify the
>   implementation's default configuration:
>
>   Deletion of suffix-to-zone mappings may become necessary of the zone
>   owner referenced by the mapping has lost the trust of the user.  For
>   example, this could be due to lax registration policies resulting in
>   phishing activities.  Modification and addition of new mappings are
>   means to heal the namespace perforation which would occur in the case
>   of a deletion or to simply establish a strong direct trust
>   relationship.  However, this requires the user's knowledge of the
>   respective zone keys.  This information must be retrieved out of
>   band, as illustrated in Appendix A.1: A bank may send the user a
>   letter with a QR code which contains the GNS zone of the bank.  The
>   user scans the QR code and adds a new suffix-to-name mapping using a
>   chosen local name for his bank.  Other examples include scanning zone
>   information off the device of a friend, from a storefront, or an
>   advertisement.  The level of trust in the respective zone is
>   contextual and likely varies from user to user.  Trust in a zone
>   provided through a letter from a bank which may also include a credit
>   card is certainly different from a zone found on a random
>   advertisement in the streets.  However, this trust is immediately
>   tangible to the user and can be reflected in the local naming as
>   well.
>
>   User clients should facilitate the modification of the start zone
>   configuration, for example by providing a QR code reader or other
>   import mechanisms.  Implementations are ideally implemented according
>   to best practices and addressing applicable points from Section 9.
>   Formalizing such best practices is out of scope of this
>   specification. -->
>
>
> 48) <!-- [rfced] Appendix A.2:  We changed "necessary of" to "necessary
> if" here.  If this is incorrect, please provide clarifying text.
>
> Original:
>   Deletion of suffix-to-zone mappings may become necessary of the zone
>   owner referenced by the mapping has lost the trust of the user.
>
> Currently:
>   Deletion of suffix-to-zone mappings may become necessary if the zone
>   owner referenced by the mapping has lost the trust of the user. -->
>
>
> 49) <!-- [rfced] Appendix A.3: We could not determine what a second
> query might be or whether it might be important to point it out.
> Will this text be clear to readers?  If not, please provide
> clarifying text.
>
> Original:
>   In order to determine the canonical representation of the record with
>   a zTLD, at most two queries are required: First, it must be checked
>   whether "www.example.gns.alt<http://www.example.gns.alt>" itself points to a zone delegation
>   record which would imply that the record set which was originally
>   resolved is published under the apex label. -->
>
>
> 50) <!-- [rfced] Appendix D.2:  Should the following entries be written
> consistently (i.e., with or without "delegation", with or without the
> number of (delegation) records)?
>
> Original:
>   *(1) PKEY zone with ASCII label and one delegation record*
>   *(2) PKEY zone with UTF-8 label and three records*
>   *(3) EDKEY zone with ASCII label and delegation record*
>   *(4) EDKEY zone with UTF-8 label and three records*
>
> Possibly (assuming that "delegation" also applies to UTF-8 labels):
>   *(1) PKEY zone with ASCII label and one delegation record*
>   *(2) PKEY zone with UTF-8 label and three delegation records*
>   *(3) EDKEY zone with ASCII label and one delegation record*
>   *(4) EDKEY zone with UTF-8 label and three delegation records* -->
>
>
> 51) <!-- [rfced] Please review the "Inclusive Language" portion of the
> online Style Guide at
> <https://www.rfc-editor.org/styleguide/part2/#inclusive_language>,
> and let us know if any changes are needed.
>
> For example, please consider whether the following should be updated:
>   master (zone master) (perhaps "zone administrator")
>   his (generally changed to "their")
>   man-in-the-middle (sometimes changed to "on-path attacker") -->
>
>
> 52) <!-- [rfced] Please let us know if any changes are needed for the
> following:
>
> a) The following terms were used inconsistently in this document.
> We chose to use the latter forms.  Please let us know any objections.
>
>   encode and decode symbols (Appendix C) / encoding and decoding symbols
>
>   internet services / Internet services
>
>   legacy host name / legacy hostname*
>
>     * We also changed "host name" to "hostname" where used generally,
>       per "hostname resolution" in Appendix A.4.  Please let us know
>       any objections.
>
>   zeros / zeroes
>
> b) The following terms/phrases appear to be used inconsistently in
> this document.  Please let us know which form is preferred.
>
>   for the nonce / for the NONCE
>
>   "Host"-header (noun) / "Host:" header (noun)
>     (We also see '"Host"-header field' in Appendix A.3.)
>
>   Keygen() / KeyGen()
>
>   records block / record block (e.g., "resource records block
>     (RRBLOCK)", "resource record block (RRBLOCK)")
>
>   REDIRECT DATA ("REDIRECT DATA entry") /
>     REDIRECT data ("the REDIRECT data")
>
>   redirect name / REDIRECT NAME
>
>   Redirect record (first sentence of Section 5.2) /
>     REDIRECT record (We also see "redirection record" in running text
>      and "with redirect" in Appendix B.2.)
>
>   Start Zone / start zone (e.g., "a Start Zone", "the start zone")
>
> c) We see that "zone key" is defined as "zk" but that "zkey" is also
> used.  Please confirm that this is as intended and will be clear to
> readers (e.g., are "zk" and "zkey" the same thing or two different
> things?).  We have a similar question regarding the use of
> "zone type" and "ztype"; do they both mean the same thing?
>
> d) Should "record data" be defined as "RDATA" at first use and
> "RDATA" used thereafter?  We ask because of "6.2.  Plaintext Record
> Data (RDATA)" and "Record data (RDATA) is the format ..." used a few
> lines into Section 6.2.
>
> e) Please confirm that the usage of "boxed record" versus "BOX record"
> is correct.
>
> f) Should the spacing of parameters in parentheses be made
> consistent for the following?  If so, how?
>
> For example:
>
>   ZKDF(zk, label)
>   ZKDF(zk,label)
>   S-Encrypt(zk,label,expiration,plaintext)
>   Sign(d,message)
>   Verify(zk,message,signature)
>   PUT(key,block)
>   PUT(q, RRBLOCK)
>   ZKDF(zk0, "example")
>
> g) Should the following be consistently quoted in text or unquoted?
>
> For example:
>   the GNS name "www.example.gns<http://www.example.gns>"
>   the DNS name www.example.com<http://www.example.com>
>   LEHO record (Section 5.3.1) containing "www.example.com<http://www.example.com>"
>   a single REDIRECT record containing www2.+ -->
>
>
> Thank you.
>
> RFC Editor/lb/ar
>
>
> On Oct 23, 2023, rfc-editor@rfc-editor.org wrote:
>
> *****IMPORTANT*****
>
> Updated 2023/10/23
>
> RFC Author(s):
> --------------
>
> Instructions for Completing AUTH48
>
> Your document has now entered AUTH48.  Once it has been reviewed and
> approved by you and all coauthors, it will be published as an RFC.
> If an author is no longer available, there are several remedies
> available as listed in the FAQ (https://www.rfc-editor.org/faq/).
>
> You and you coauthors are responsible for engaging other parties
> (e.g., Contributors or Working Group) as necessary before providing
> your approval.
>
> Planning your review
> ---------------------
>
> Please review the following aspects of your document:
>
> *  RFC Editor questions
>
>    Please review and resolve any questions raised by the RFC Editor
>    that have been included in the XML file as comments marked as
>    follows:
>
>    <!-- [rfced] ... -->
>
>    These questions will also be sent in a subsequent email.
>
> *  Changes submitted by coauthors
>
>    Please ensure that you review any changes submitted by your
>    coauthors.  We assume that if you do not speak up that you
>    agree to changes submitted by your coauthors.
>
> *  Content
>
>    Please review the full content of the document, as this cannot
>    change once the RFC is published.  Please pay particular attention to:
>    - IANA considerations updates (if applicable)
>    - contact information
>    - references
>
> *  Copyright notices and legends
>
>    Please review the copyright notice and legends as defined in
>    RFC 5378 and the Trust Legal Provisions
>    (TLP – https://trustee.ietf.org/license-info/).
>
> *  Semantic markup
>
>    Please review the markup in the XML file to ensure that elements of
>    content are correctly tagged.  For example, ensure that <sourcecode>
>    and <artwork> are set correctly.  See details at
>    <https://authors.ietf.org/rfcxml-vocabulary>.
>
> *  Formatted output
>
>    Please review the PDF, HTML, and TXT files to ensure that the
>    formatted output, as generated from the markup in the XML file, is
>    reasonable.  Please note that the TXT will have formatting
>    limitations compared to the PDF and HTML.
>
>
> Submitting changes
> ------------------
>
> To submit changes, please reply to this email using ‘REPLY ALL’ as all
> the parties CCed on this message need to see your changes. The parties
> include:
>
>    *  your coauthors
>
>    *  rfc-editor@rfc-editor.org (the RPC team)
>
>    *  other document participants, depending on the stream (e.g.,
>       IETF Stream participants are your working group chairs, the
>       responsible ADs, and the document shepherd).
>
>    *  auth48archive@rfc-editor.org, which is a new archival mailing list
>       to preserve AUTH48 conversations; it is not an active discussion
>       list:
>
>      *  More info:
>         https://mailarchive.ietf.org/arch/msg/ietf-announce/yb6lpIGh-4Q9l2USxIAe6P8O4Zc
>
>      *  The archive itself:
>         https://mailarchive.ietf.org/arch/browse/auth48archive/
>
>      *  Note: If only absolutely necessary, you may temporarily opt out
>         of the archiving of messages (e.g., to discuss a sensitive matter).
>         If needed, please add a note at the top of the message that you
>         have dropped the address. When the discussion is concluded,
>         auth48archive@rfc-editor.org will be re-added to the CC list and
>         its addition will be noted at the top of the message.
>
> You may submit your changes in one of two ways:
>
> An update to the provided XML file
> — OR —
> An explicit list of changes in this format
>
> Section # (or indicate Global)
>
> OLD:
> old text
>
> NEW:
> new text
>
> You do not need to reply with both an updated XML file and an explicit
> list of changes, as either form is sufficient.
>
> We will ask a stream manager to review and approve any changes that seem
> beyond editorial in nature, e.g., addition of new text, deletion of text,
> and technical changes.  Information about stream managers can be found in
> the FAQ.  Editorial changes do not require approval from a stream manager.
>
>
> Approving for publication
> --------------------------
>
> To approve your RFC for publication, please reply to this email stating
> that you approve this RFC for publication.  Please use ‘REPLY ALL’,
> as all the parties CCed on this message need to see your approval.
>
>
> Files
> -----
>
> The files are available here:
>    https://www.rfc-editor.org/authors/rfc9498.xml
>    https://www.rfc-editor.org/authors/rfc9498.html
>    https://www.rfc-editor.org/authors/rfc9498.pdf
>    https://www.rfc-editor.org/authors/rfc9498.txt
>
> Diff file of the text:
>    https://www.rfc-editor.org/authors/rfc9498-diff.html
>    https://www.rfc-editor.org/authors/rfc9498-rfcdiff.html (side by side)
>
> This alternate diff file shows the changes in the moved text:
>    https://www.rfc-editor.org/authors/rfc9498-alt-diff.html
>
> Diff of the XML:
>    https://www.rfc-editor.org/authors/rfc9498-xmldiff1.html
>
>
> Tracking progress
> -----------------
>
> The details of the AUTH48 status of your document are here:
>    https://www.rfc-editor.org/auth48/rfc9498
>
> Please let us know if you have any questions.
>
> Thank you for your cooperation,
>
> RFC Editor
>
> --------------------------------------
> RFC9498 (draft-schanzen-gns-28)
>
> Title            : The GNU Name System
> Author(s)        : M. Schanzenbach, C. Grothoff, B. Fix
>