Re: [auth48] AUTH48: RFC-to-be 9463 <draft-ietf-add-dnr-16> for your review

mohamed.boucadair@orange.com Thu, 14 September 2023 06:40 UTC

Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: auth48archive@ietfa.amsl.com
Delivered-To: auth48archive@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 20477C15107E; Wed, 13 Sep 2023 23:40:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.104
X-Spam-Level:
X-Spam-Status: No, score=-2.104 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H5=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=orange.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EqmU-dNVdc91; Wed, 13 Sep 2023 23:40:06 -0700 (PDT)
Received: from smtp-out.orange.com (smtp-out.orange.com [80.12.210.124]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4E213C14F74A; Wed, 13 Sep 2023 23:40:05 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=orange.com; i=@orange.com; q=dns/txt; s=orange002; t=1694673605; x=1726209605; h=to:cc:subject:date:message-id:references:in-reply-to: mime-version:content-transfer-encoding:from; bh=FUGL2TegfXLUhCejKkPvv5JGTbML40Rk52lNT5COuds=; b=kH/HE7ndEkCmEPliJevE3dl20M5r/W60MdO3hyjRcLObwdnrW3aoSafS WvVOrQeKuJLMeeE5dXjBSjR5Hrx2/6OWkrZ2c824SqsfCx5eKthBVajic W6R3tQe5vADxoEmDDuKoDbqcTMAHolr8dlMafpwvEtPti8Gc4uXWgPkXz FVCDhDq9owMPNgTgDXEkaM2dBI2AKdp92Xk+gw5ZI98ASLeff1KFgohVt +RDcUR4br3X0D9pTXrx8ZK2bBaQpF2nt3zJLCYxGkFNkTwL6K7V0wVVLe csdKAlYXf7PA7Mk9Yeark5anbhLDflXLR6en5L111Wf8ZBKNt1DFpi6Ya A==;
Received: from unknown (HELO opfedv1rlp0e.nor.fr.ftgroup) ([x.x.x.x]) by smtp-out.orange.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 14 Sep 2023 08:40:03 +0200
Received: from unknown (HELO opzinddimail5.si.fr.intraorange) ([x.x.x.x]) by opfedv1rlp0e.nor.fr.ftgroup with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 14 Sep 2023 08:40:03 +0200
Received: from opzinddimail5.si.fr.intraorange (unknown [127.0.0.1]) by DDEI (Postfix) with SMTP id DA70B1062FDD; Thu, 14 Sep 2023 08:40:02 +0200 (CEST)
Received: from opzinddimail5.si.fr.intraorange (unknown [127.0.0.1]) by DDEI (Postfix) with ESMTP id 3E9381062FCD; Thu, 14 Sep 2023 08:39:53 +0200 (CEST)
Received: from smtp-out365.orange.com (unknown [x.x.x.x]) by opzinddimail5.si.fr.intraorange (Postfix) with ESMTPS; Thu, 14 Sep 2023 08:39:53 +0200 (CEST)
Received: from mail-db3eur04lp2052.outbound.protection.outlook.com (HELO EUR04-DB3-obe.outbound.protection.outlook.com) ([104.47.12.52]) by smtp-out365.orange.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 14 Sep 2023 08:39:52 +0200
Received: from DU2PR02MB10160.eurprd02.prod.outlook.com (2603:10a6:10:49b::6) by VI1PR02MB6464.eurprd02.prod.outlook.com (2603:10a6:800:19d::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6792.20; Thu, 14 Sep 2023 06:39:49 +0000
Received: from DU2PR02MB10160.eurprd02.prod.outlook.com ([fe80::9505:b6c8:4570:dad]) by DU2PR02MB10160.eurprd02.prod.outlook.com ([fe80::9505:b6c8:4570:dad%4]) with mapi id 15.20.6792.020; Thu, 14 Sep 2023 06:39:48 +0000
From: mohamed.boucadair@orange.com
X-TM-AS-ERS: 10.106.160.162-127.5.254.253
X-TM-AS-SMTP: 1.0 c210cC1vdXQzNjUub3JhbmdlLmNvbQ== bW9oYW1lZC5ib3VjYWRhaXJAb 3JhbmdlLmNvbQ==
X-DDEI-TLS-USAGE: Used
Authentication-Results: smtp-out365.orange.com; dkim=none (message not signed) header.i=none; spf=Fail smtp.mailfrom=mohamed.boucadair@orange.com; spf=Pass smtp.helo=postmaster@EUR04-DB3-obe.outbound.protection.outlook.com
Received-SPF: Fail (smtp-in365b.orange.com: domain of mohamed.boucadair@orange.com does not designate 104.47.12.52 as permitted sender) identity=mailfrom; client-ip=104.47.12.52; receiver=smtp-in365b.orange.com; envelope-from="mohamed.boucadair@orange.com"; x-sender="mohamed.boucadair@orange.com"; x-conformance=spf_only; x-record-type="v=spf1"; x-record-text="v=spf1 ip4:80.12.66.32/28 ip4:80.12.210.96/28 ip4:80.12.70.34/31 ip4:80.12.70.36 include:spfa.orange.com include:spfb.orange.com include:spfc.orange.com include:spfd.orange.com include:spfe.orange.com include:spff.orange.com include:spf6a.orange.com include:spffed-ip.orange.com include:spffed-mm.orange.com -all"
Received-SPF: Pass (smtp-in365b.orange.com: domain of postmaster@EUR04-DB3-obe.outbound.protection.outlook.com designates 104.47.12.52 as permitted sender) identity=helo; client-ip=104.47.12.52; receiver=smtp-in365b.orange.com; envelope-from="mohamed.boucadair@orange.com"; x-sender="postmaster@EUR04-DB3-obe.outbound.protection.outlook.com"; x-conformance=spf_only; x-record-type="v=spf1"; x-record-text="v=spf1 ip4:40.92.0.0/15 ip4:40.107.0.0/16 ip4:52.100.0.0/14 ip4:104.47.0.0/17 ip6:2a01:111:f400::/48 ip6:2a01:111:f403::/49 ip6:2a01:111:f403:8000::/50 ip6:2a01:111:f403:c000::/51 ip6:2a01:111:f403:f000::/52 -all"
IronPort-Data: A9a23:41aTJazAul9yh/iPYlR6t+dcwCrEfRIJ4+MujC+fZmUNrF6WrkVSn GQXX2iDOPnbNGanL9Ekboy0oUtVuJaBm9BgS1Nk+y00HyNBpPSeCIXCJC8cHc8zwu4v7q5Dx 59DAjUVBJlsFhcwnj/0bv676yAUOZigHtLUEPTDNj16WThqQSIgjQMLs+Mii+aEu/Dha++2k Y20+5e31GONgWYuaTpFsv7b8nuDgdyp0N8mlg1nDRx0lA+G/5UlJMp3Db28KXL+Xr5VEoaSL woU5Ojklo9x105F5uKNyt4XQGVTKlLhFVHmZk5tZkSXqkMqShreckoMHKF0hU9/011llj3qo TlHncTYpQwBZsUglAmBOvVVO3kWAEFIxFPICV69jPyJyGrHSWf9n/RgVF8abdED+98iVAmi9 dRAQNwMRj2+vbrqhZ6REaxrjMllK9T3NoQCvH0m1SveEfstXZHERePN+MNc2zAzwMtJGJ4yZ eJAMWYpMEuGOkcJZw1/5JEWxI9EglH6dD1RrV+Z46Aw/mPawAVwypDqKtPTddHMTsJQ9qqdj jOeoj2nW0ly2Nq3yQqnr2r8iOH1kwjEcaETOqW4+PpBuQjGroAUIEZPDgDj+KPRZlSFc9ZVI lYI+i0qqq0/62SiS8L5GRa/pRaspBAXHtdcEvE98imXxKGR7gqYGm8eCDlbZ7QOt8gwSSArz HeGmtroAXpkt7j9YX6C97Gb6DK/JSY9I3INaisJVk0O5NyLiIc+jxaJRdFkE4azicL8Azy2y DfMsStWr6kUj8MNzI2+/FvdhCmrqISPRQkwji3eUm7g5w9iTI+oe4Lu7kLUhd5JIIrcRVmIv WIfs8mT8O5ICouC/ASkRukXEa7vzP+AKDndh1FHQ8BwsT+q/WW+eZxR5j4WDEp3I8APejLBa 07IsgQX75hWVFOjcLN3P9K4Ec8qzLbtPc7rXbXZYttSZYI3cxWIlByCfmaV1mHp1UQmyqwiI 8/Hdd72VStAT6N60DCxWuERl6cxwTwzzn/SQpa9yAm71b2ZZzieTrJt3Eaygv4RyqG5kB/S1 NdlK9rWyhsHTsGuPjLWyNtGRbwVFkQTCZfzos1RU+eMJAt6BW0sY8M9J5twI+SJeIwFx4/1E mGBtlxwlQGk3iKXQemeQjU9Mu6+Bf6TuFphZUQR0UCUN28LQKvHAE03W4Y9ebghnACI5dIsF ZHpl+2kD/VJUSjK4VwggXTVqYVjcFGnj1mDIjD9PDwnJcY9HUrO58PueRbp+G8WFC2ruMAio rqmkATGXZ4EQAckB8HTAB5O879TlShC8A6RdxKXSjW2RKkK2NY2Q8AWpqFsS/zg0T2ZmlOnO /++WH/0X9XlrY4v68XujquZtYqvGOYWNhMETjWFt+fmbnOGrjPLLWp8vACgLGm1uITcqf3KW Amp56uhWBH6tAoV69QkT+o0pU7Az4Gz/u4LkWyI40knn3zwU+g7eiDctSW+nqhMzaVeogy4R gqG6MRANN201DDNQTYsyP4eRr3bj5k8w2GMhdxseRmSzHEtoNKvDx4JVzHS03M1EVeAGNh5q QvXkJVLs1DXZ9tDGorusx24AEzddSJfC/t+6chy7U2ColND92yuqKf0UkfeiKxjof0VWqX2C ld4RZYuhoiwAmLvTkBrST3h97EYgp4D/hdX0FUFOlKF3MLfgeM61wFQ9jJxSRlJyhJA0KR4P W0D24hdO/CV5zkx7CRcdznEJu2DLEXxFo/NJ58hk3fQSUalEGfKKQXR/M6TqVsB/Ts0kidzo Nml9Yo9bQvXQQ==
IronPort-HdrOrdr: A9a23:wrugqK/bALYBbiC6F2luk+CxI+orL9Y04lQ7vn2ZKCY6TiX2ra 2TdZggviMc+Qx6ZJhIo7npBEDqex/hHPBOjrUsAQ==
X-Talos-CUID: 9a23:HP8cN2C7YwQ6wIL6Ew9lyX4OHeckSGHMkHbee1GUWTpySYTAHA==
X-Talos-MUID: 9a23:EAC2qgxt/r5YC0NjTACMAPwzSfiaqKSeKh0VwZsIgcevCgVTOhmFjDqzabZyfw==
X-IronPort-AV: E=Sophos;i="6.02,145,1688421600"; d="scan'208";a="9051610"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=fLoOrFbAXIyCDbAyl6qfdKslpqrGO9RHXFq7NJWQKkAZvLppBa5RHBs2Qr3GvsLW3d2yfjMfC6LWAIqXjtM1UU1aS13uChcURKClXhIgOFUi5sF3FQa2uO8Iri3M7iwpgPMf/umJQNJAM94IW8fb+7tVOIMtZ+fuZuyIsKuuASH3nqkXIOolZLgI7JJRBjSiKWecZywmXp3q8YPvd+FvoR4q9XEYEIS+YEikCEg4yFeUIfgF3CNhoKKpxZKR1Ul3lZOqtlRnYmwyuNokbZaDGGJU919HFNTc/SPa/0sk1SQrXXYyqJxWpXUPJU/7GKlYK9opKC0pV4xmtAVQtlTp5Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=XVdUh2vetKgLMPYsWLV/q+VtFeL7a8UeZnomnJo6AXY=; b=K57lfe1qGhgpIVoE6eJLVvRDXdLbivn0yN4JXtUBMeoTFTKa9ALh10nDe/BGEm/13HEuanZ7bZ0DF83ACj25B1AEeYXpoFs714LK9bLR6v9vIlLpPDyhSs5a+daG7hAbVEJDKdOu418uwuwyVnarNBpdWbwYF7Vk35D4F9DXPKp/msASphgcuV5KOOiYYFejv1dPaoK4gS5007mQUT1loO+mkdiw6+5CIHSuaWdopkYGk00G/MwXOn1U5904Kif6XpaloJArfHwKXLZiU/nOlhS1N5gaVJ0zQbDs+UCDQACM9Mm6EdGZi0HK3N78GDDm0V2ASB7yUR8npPt4KTYZjw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=orange.com; dmarc=pass action=none header.from=orange.com; dkim=pass header.d=orange.com; arc=none
To: Lynne Bartholomew <lbartholomew@amsl.com>
CC: "rfc-editor@rfc-editor.org" <rfc-editor@rfc-editor.org>, "kondtir@gmail.com" <kondtir@gmail.com>, "dwing-ietf@fuggles.com" <dwing-ietf@fuggles.com>, "neil.cook@noware.co.uk" <neil.cook@noware.co.uk>, "tojens@microsoft.com" <tojens@microsoft.com>, "add-ads@ietf.org" <add-ads@ietf.org>, "add-chairs@ietf.org" <add-chairs@ietf.org>, "Andrew.Campling@419.Consulting" <Andrew.Campling@419.Consulting>, "evyncke@cisco.com" <evyncke@cisco.com>, "auth48archive@rfc-editor.org" <auth48archive@rfc-editor.org>
Thread-Topic: AUTH48: RFC-to-be 9463 <draft-ietf-add-dnr-16> for your review
Thread-Index: AQHZ5lkNqhBmIMuZxEu4BzjwLGty1bAZ3nRw
Content-Class:
Date: Thu, 14 Sep 2023 06:39:48 +0000
Message-ID: <DU2PR02MB10160F6DE1694DFCD86459DD088F7A@DU2PR02MB10160.eurprd02.prod.outlook.com>
References: <20230909025558.6F9F9E5EA7@rfcpa.amsl.com> <DU2PR02MB101609FC5EE40E76F0869F7F288F1A@DU2PR02MB10160.eurprd02.prod.outlook.com> <FD0ABFC9-8947-439D-B3FE-0B2C5335DD68@amsl.com>
In-Reply-To: <FD0ABFC9-8947-439D-B3FE-0B2C5335DD68@amsl.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Enabled=true; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SetDate=2023-09-14T06:35:01Z; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Method=Privileged; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Name=unrestricted_parent.2; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SiteId=90c7a20a-f34b-40bf-bc48-b9253b6f5d20; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_ActionId=0c984722-976c-4188-ae06-0f532396f165; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_ContentBits=0
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: DU2PR02MB10160:EE_|VI1PR02MB6464:EE_
x-ms-office365-filtering-correlation-id: 7b08df8a-2a87-419e-223f-08dbb4ed647d
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DU2PR02MB10160.eurprd02.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(39860400002)(396003)(346002)(136003)(366004)(376002)(186009)(1800799009)(451199024)(86362001)(55016003)(33656002)(5660300002)(4326008)(8676002)(8936002)(52536014)(2906002)(30864003)(7416002)(478600001)(122000001)(45080400002)(7696005)(53546011)(71200400001)(6506007)(9686003)(38100700002)(38070700005)(966005)(26005)(66574015)(83380400001)(66946007)(54906003)(66556008)(316002)(66476007)(66446008)(64756008)(6916009)(76116006)(41300700001)(559001)(579004)(19607625013); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="iso-8859-1"
MIME-Version: 1.0
X-OriginatorOrg: orange.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DU2PR02MB10160.eurprd02.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 7b08df8a-2a87-419e-223f-08dbb4ed647d
X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Sep 2023 06:39:48.9028 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 90c7a20a-f34b-40bf-bc48-b9253b6f5d20
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 15emJ1+rtQI9Lto5mGCIzvfNrVVwZDRkr+8MuSsBg4c1D0/qPyFWe20ikz2CkwigBqhlMIG2fVKCz416zv1yk+6/W3GxdTBlwibK85SyJgY=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR02MB6464
X-TM-AS-ERS: 10.106.160.162-127.5.254.253
X-TM-AS-SMTP: 1.0 c210cC1vdXQzNjUub3JhbmdlLmNvbQ== bW9oYW1lZC5ib3VjYWRhaXJAb 3JhbmdlLmNvbQ==
X-TMASE-Version: DDEI-5.1-9.0.1002-27874.005
X-TMASE-Result: 10--58.338400-10.000000
X-TMASE-MatchedRID: iKTMlETJ4pt+uXouWP+0EYkYvhtXX+Z1fXOujraqF0Kc4qcCnuCXtYAj sy+r+wvnW1RFmDf+CHYugPi2f29Yko6Mkm3zzfQHSSQ7jOqms04Zca7SN08UZBwum9qeXFea5yE cDTjPPfN93jG4UaVNPbYzLEm68XGBYEVi84IeX8bGscAnodZT+/knCf5Y5jPY3AJrtcannraNnA dfrf4ZXkS3N7Ud/ZNyrMIvCqZLF1HL1RjiRMCcSNgwSqFJytAFhW53Sih8slf4qCLIu0mtICrXJ XjG9cgiQyYnp0aZIjJYYfnBUCWGoSF6S8LsH2kOExzvxkft9nmaVoAi2I40/aTzJo0CZl8hyIKH zIGoT60W4JS8PW5LNnlI7JakaI5mY7V+phOVvxBrbaF/Ly5ScTllFsU0CXSPVnqLKqyXsW/U0g3 VcfJ47p62LmVTodVcFG2sQJ2k+dd/jGfVD62ccNp4kSDJzCBY5JzEkxvZR/hK0YCCYqpa5cpQAY kQUlntYDKG9WxzZmM6Ei55HXJC+UHBJCBpcunAXOFTT+immjbIJ4SICnnphmmQExgOfwV41YzbH oRn9L2JYAn/qv4rBYSbWwTw5+ybCNoW1C9LBmo23LDAh/mSxWgws6g0ewz2M9EkAUzyluG8B7vl 7G5M0XqdSC2WTKzn9J+FSEmvySRj9oOsXOQMU4Ncr1N4zfKn71Wx2uUbPLfmIS3lN97vhseQfu6 iwSfs03cD0WOiAZlcJHmzlZ5yHolq+OcgWT8iC8OYzF1BQS7su44QBj0GpOQ/RHqHh1Gc31GU/N 5W5BDtw//Wnh7/qMJ+qN8Y3hxNjteCMGl3k6SvvxILmKK/HMBX4Iey09T4Vb3rZjw/bpwUyRS/O CD9xeQD/sqqL0mZErIHQfb5KDdWdFebWIc3VsRB0bsfrpPIqxB32o9eGcn/ita+mP1RyAP90fJP 9eHt
X-TMASE-SNAP-Result: 1.821001.0001-0-1-22:0,33:0,34:0-0
X-TMASE-INERTIA: 0-0;;;;
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/auth48archive/uu7Mq20m3PFy0FhzOmo0e1olCTw>
Subject: Re: [auth48] AUTH48: RFC-to-be 9463 <draft-ietf-add-dnr-16> for your review
X-BeenThere: auth48archive@rfc-editor.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Archiving AUTH48 exchanges between the RFC Production Center, the authors, and other related parties" <auth48archive.rfc-editor.org>
List-Unsubscribe: <https://mailman.rfc-editor.org/mailman/options/auth48archive>, <mailto:auth48archive-request@rfc-editor.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/auth48archive/>
List-Post: <mailto:auth48archive@rfc-editor.org>
List-Help: <mailto:auth48archive-request@rfc-editor.org?subject=help>
List-Subscribe: <https://mailman.rfc-editor.org/mailman/listinfo/auth48archive>, <mailto:auth48archive-request@rfc-editor.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Sep 2023 06:40:11 -0000

Hi Lynne, all,

This changes look good to me. I approve the publication of this version.

Many thanks for all your effort.

Cheers,
Med

> -----Message d'origine-----
> De : Lynne Bartholomew <lbartholomew@amsl.com>
> Envoyé : mercredi 13 septembre 2023 17:40
> À : BOUCADAIR Mohamed INNOV/NET <mohamed.boucadair@orange.com>
> Cc : rfc-editor@rfc-editor.org; kondtir@gmail.com; dwing-
> ietf@fuggles.com; neil.cook@noware.co.uk; tojens@microsoft.com; add-
> ads@ietf.org; add-chairs@ietf.org; Andrew.Campling@419.Consulting;
> evyncke@cisco.com; auth48archive@rfc-editor.org
> Objet : Re: AUTH48: RFC-to-be 9463 <draft-ietf-add-dnr-16> for your
> review
>
> Hi, Med.
>
> Thank you very much for your prompt and informative replies!  We have
> updated this document per your emails below.
>
> The latest files are posted here (please refresh your browser):
>
>
> https://www/.
> rfc-
> editor.org%2Fauthors%2Frfc9463.txt&data=05%7C01%7Cmohamed.boucadair%40
> orange.com%7Cbe492b66eb5b429dd5b608dbb4701221%7C90c7a20af34b40bfbc48b9
> 253b6f5d20%7C0%7C0%7C638302166134366339%7CUnknown%7CTWFpbGZsb3d8eyJWIj
> oiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C
> %7C%7C&sdata=xgW9WvXaksz%2BZcYl%2BnsNmHs3tHDa6fYx60set2WX2lA%3D&reserv
> ed=0
>
> https://www/.
> rfc-
> editor.org%2Fauthors%2Frfc9463.pdf&data=05%7C01%7Cmohamed.boucadair%40
> orange.com%7Cbe492b66eb5b429dd5b608dbb4701221%7C90c7a20af34b40bfbc48b9
> 253b6f5d20%7C0%7C0%7C638302166134366339%7CUnknown%7CTWFpbGZsb3d8eyJWIj
> oiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C
> %7C%7C&sdata=LYQrsGrAXgzMGIc98V1PKbZH%2Fe9Kzzcx47HSj1Woyjg%3D&reserved
> =0
>
> https://www/.
> rfc-
> editor.org%2Fauthors%2Frfc9463.html&data=05%7C01%7Cmohamed.boucadair%4
> 0orange.com%7Cbe492b66eb5b429dd5b608dbb4701221%7C90c7a20af34b40bfbc48b
> 9253b6f5d20%7C0%7C0%7C638302166134522558%7CUnknown%7CTWFpbGZsb3d8eyJWI
> joiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7
> C%7C%7C&sdata=52G9BM3vFUuwMXAbxx9G%2BdXSC%2BwxNLmQBPHnFyUb1Ws%3D&reser
> ved=0
>
> https://www/.
> rfc-
> editor.org%2Fauthors%2Frfc9463.xml&data=05%7C01%7Cmohamed.boucadair%40
> orange.com%7Cbe492b66eb5b429dd5b608dbb4701221%7C90c7a20af34b40bfbc48b9
> 253b6f5d20%7C0%7C0%7C638302166134522558%7CUnknown%7CTWFpbGZsb3d8eyJWIj
> oiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C
> %7C%7C&sdata=49T3ezktfTO9ZHbv4DaJ%2FiHyQRF0DCJSFTHT57u6JDc%3D&reserved
> =0
>
> https://www/.
> rfc-editor.org%2Fauthors%2Frfc9463-
> diff.html&data=05%7C01%7Cmohamed.boucadair%40orange.com%7Cbe492b66eb5b
> 429dd5b608dbb4701221%7C90c7a20af34b40bfbc48b9253b6f5d20%7C0%7C0%7C6383
> 02166134522558%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2l
> uMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=PIMXQNRnKQB3
> 0O2EwTzY868KBNVmWpOXp3TxI5oq6IM%3D&reserved=0
>
> https://www/.
> rfc-editor.org%2Fauthors%2Frfc9463-
> rfcdiff.html&data=05%7C01%7Cmohamed.boucadair%40orange.com%7Cbe492b66e
> b5b429dd5b608dbb4701221%7C90c7a20af34b40bfbc48b9253b6f5d20%7C0%7C0%7C6
> 38302166134522558%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoi
> V2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=MJb6ePu2r
> wXWGfPsOS%2BpkFOv%2BELvIad1tXL10AcyXlE%3D&reserved=0
>
> https://www/.
> rfc-editor.org%2Fauthors%2Frfc9463-
> auth48diff.html&data=05%7C01%7Cmohamed.boucadair%40orange.com%7Cbe492b
> 66eb5b429dd5b608dbb4701221%7C90c7a20af34b40bfbc48b9253b6f5d20%7C0%7C0%
> 7C638302166134522558%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQI
> joiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=v5YxYL
> DhnS5rCaTsg5L2UDEAQQzyNhzncQngCuc25tE%3D&reserved=0
>
>
> https://www/.
> rfc-editor.org%2Fauthors%2Frfc9463-alt-
> diff.html&data=05%7C01%7Cmohamed.boucadair%40orange.com%7Cbe492b66eb5b
> 429dd5b608dbb4701221%7C90c7a20af34b40bfbc48b9253b6f5d20%7C0%7C0%7C6383
> 02166134522558%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2l
> uMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=0GHnj8%2FgVp
> qAbIHCsTa%2BCnvZvv94IFXCYo%2BTehrwHNs%3D&reserved=0
>
> https://www/.
> rfc-editor.org%2Fauthors%2Frfc9463-
> xmldiff1.html&data=05%7C01%7Cmohamed.boucadair%40orange.com%7Cbe492b66
> eb5b429dd5b608dbb4701221%7C90c7a20af34b40bfbc48b9253b6f5d20%7C0%7C0%7C
> 638302166134522558%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjo
> iV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=Cs35OVuK
> DV6YEoTXHIiwqWaKmt63rE5X%2BM%2B41Cfk0Sw%3D&reserved=0
>
> https://www/.
> rfc-editor.org%2Fauthors%2Frfc9463-
> xmldiff2.html&data=05%7C01%7Cmohamed.boucadair%40orange.com%7Cbe492b66
> eb5b429dd5b608dbb4701221%7C90c7a20af34b40bfbc48b9253b6f5d20%7C0%7C0%7C
> 638302166134522558%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjo
> iV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=qcma2S3J
> ZmHCKs6zeJvj3FVYVi4NdQ%2BOmIPwy6KEzwc%3D&reserved=0
>
> https://www/.
> rfc-editor.org%2Fauthors%2Frfc9463-alt-
> diff.html&data=05%7C01%7Cmohamed.boucadair%40orange.com%7Cbe492b66eb5b
> 429dd5b608dbb4701221%7C90c7a20af34b40bfbc48b9253b6f5d20%7C0%7C0%7C6383
> 02166134522558%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2l
> uMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=0GHnj8%2FgVp
> qAbIHCsTa%2BCnvZvv94IFXCYo%2BTehrwHNs%3D&reserved=0
>
> Please review our updates carefully, and let us know if we missed
> anything.
>
> Thanks again for your help!
>
> RFC Editor/lb
>
>
> > On Sep 12, 2023, at 4:12 AM, mohamed.boucadair@orange.com wrote:
> >
> > Re-,
> >
> > Please find below some comments about the edited version:
> >
> > (1) Abstract: add a missing "and"
> >
> > OLD:
> >   This document specifies new DHCP and IPv6 Router Advertisement
> >   options to discover encrypted DNS resolvers (e.g., DNS over HTTPS,
> >   DNS over TLS, DNS over QUIC).
> >
> > NEW:
> >
> >   This document specifies new DHCP and IPv6 Router Advertisement
> >   options to discover encrypted DNS resolvers (e.g., DNS over HTTPS,
> >   DNS over TLS, and DNS over QUIC).
> >
> > (2) Introduction: be more explicit this is about discovery of
> > resolvers
> >
> > OLD:
> >   This document focuses on the discovery of encrypted DNS protocols
> >   such as DNS over HTTPS (DoH) [RFC8484], DNS over TLS (DoT)
> [RFC7858],
> >   or DNS over QUIC (DoQ) [RFC9250] in local networks.
> >
> > NEW:
> >   This document focuses on the discovery of encrypted DNS resolvers
> which are using protocols
> >   such as DNS over HTTPS (DoH) [RFC8484], DNS over TLS (DoT)
> [RFC7858],
> >   or DNS over QUIC (DoQ) [RFC9250] in local networks.
> >
> > (3) Section 3.1.3: simplify the ULA wording
> >
> > OLD:
> >   Whether one or more IP addresses are returned in an Encrypted DNS
> >   option is deployment specific.  For example, a router embedding a
> >   recursive server or a forwarder has to include one single IP
> address
> >   pointing to one of its LAN-facing interfaces.  Typically, this IP
> >   address can be a private IPv4 address, a Link-Local address, a
> Unique
> >   Local IPv6 unicast Address (Unique Local Address (ULA)), or a
> Global
> >   Unicast Address (GUA).
> >
> > NEW:
> >   Whether one or more IP addresses are returned in an Encrypted DNS
> >   option is deployment specific.  For example, a router embedding a
> >   recursive server or a forwarder has to include one single IP
> address
> >   pointing to one of its LAN-facing interfaces.  Typically, this IP
> >   address can be a private IPv4 address, a Link-Local address, an
> IPv6
> >   Unique Local Address (ULA), or a Global Unicast Address (GUA).
> >
> > (3) Section 4.1: correct an error about the field name
> >
> > OLD:
> >      An example of the authentication-domain-name encoding is shown
> in
> >      Figure 2.  This example conveys the FQDN "doh1.example.com.",
> and
> >      the resulting Option-length field is 18.
> >
> > NEW:
> >      An example of the authentication-domain-name encoding is shown
> in
> >      Figure 2.  This example conveys the FQDN "doh1.example.com.",
> and
> >      the resulting ADN Length field is 18.
> >
> > (4) Section 6.1: Revert to the initial wording for consistency with
> > other fields
> >
> > OLD:
> >   Service Priority:  The priority of this Encrypted DNS option
> instance
> >      compared to other instances.  This 16-bit unsigned integer is
> >      interpreted following the rules specified in Section 2.4.1 of
> >      [RFC9460].
> >
> > NEW:
> >   Service Priority:  16-bit unsigned integer.  The priority of this
> Encrypted DNS option instance
> >      compared to other instances.  This field is
> >      interpreted following the rules specified in Section 2.4.1 of
> >      [RFC9460].
> >
> > Thank you.
> >
> > Cheers,
> > Med
>
>
> > On Sep 12, 2023, at 12:56 AM, mohamed.boucadair@orange.com wrote:
> >
> > Dear RFC Editor,
> >
> > Please see inline.
> >
> > I let my co-authors further comments as appropriate.
> >
> > Cheers,
> > Med
> >
> >> -----Message d'origine-----
> >> De : rfc-editor@rfc-editor.org <rfc-editor@rfc-editor.org> Envoyé :
> >> samedi 9 septembre 2023 04:56 À : BOUCADAIR Mohamed INNOV/NET
> >> <mohamed.boucadair@orange.com>; kondtir@gmail.com;
> >> dwing-ietf@fuggles.com; neil.cook@noware.co.uk;
> tojens@microsoft.com
> >> Cc : rfc-editor@rfc-editor.org; add-ads@ietf.org; add-
> >> chairs@ietf.org; Andrew.Campling@419.Consulting; evyncke@cisco.com;
> >> auth48archive@rfc-editor.org Objet : Re: AUTH48: RFC-to-be 9463
> >> <draft-ietf-add-dnr-16> for your review
> >>
> >> Authors,
> >>
> >> While reviewing this document during AUTH48, please resolve (as
> >> necessary) the following questions, which are also in the XML file.
> >>
> >> 1) <!-- [rfced] Abbreviated (running) document title, which appears
> >> in the PDF:
> >> FYI, we updated the abbreviated title to "DNR", along the lines of
> >> the running title "DDR" in the companion document 9462 (draft-
> >> ietf-add-ddr).
> >> Please let us know if you prefer otherwise.
> >>
> >> Original:
> >> Internet-Draft  Discovery of Network-designated Resolver April 2023
> >>
> >> Current PDF:
> >> RFC 9463                          DNR
> >> September 2023
> >> -->
> >>
> >
> > [Med] OK
> >
> >>
> >> 2) <!-- [rfced] Datatracker "idnits" output for the original
> approved
> >> document included the following warning.  Please let us know if any
> >> changes are needed as related to this warning:
> >>
> >> == There are [sic] 1 instance of lines with non-RFC2606-compliant
> >> FQDNs in the
> >>    document. -->
> >>
> >
> > [Med] No change is needed. Idnits complains about "a1.a2.a3.a4" but
> that is not a name.
> >
> >>
> >> 3) <!-- [rfced] Section 1:  Please note that companion document
> >> 9462 (draft-ietf-add-ddr) cites both RFCs 4861 and 8106 when
> >> referring to IPv6 Router Advertisement options.  We have asked the
> >> authors of that document if the same RFC should be cited in both
> >> places.
> >>
> >> Please note, however, that we do not see any mention of Router
> >> Advertisement options in RFC 4861 - only Neighbor Discovery
> options.
> >>
> >> Would you like to see how/if draft-ietf-add-ddr updates its
> >> comparable citation and update this document (or not) to match?
> >>
> >> Original:
> >> In particular, the document specifies how a local encrypted DNS
> >> resolver can be discovered by connected hosts by means of DHCPv4
> >> [RFC2132], DHCPv6 [RFC8415], and IPv6 Router Advertisement (RA)
> >> [RFC4861] options. -->
> >>
> >
> > [Med] It would be good if DDR aligns with this, but we leave that to
> DDR authors to decide. No change is needed to DNR.
> >
> >>
> >> 4) <!-- [rfced] Section 3:  This sentence did not parse.  We
> removed
> >> the colon (":").  If this is incorrect, please clarify "and
> Neighbor
> >> Discovery protocol (Section 6): Encrypted DNS options".
> >>
> >> Original:
> >> This document describes how a DNS client can discover local
> encrypted
> >> DNS resolvers using DHCP (Sections 4 and 5) and Neighbor Discovery
> >> protocol (Section 6): Encrypted DNS options.
> >>
> >> Currently:
> >> This document describes how a DNS client can discover local
> encrypted
> >> DNS resolvers using DHCP (Sections 4 and 5) and Neighbor  Discovery
> >> protocol (Section 6) Encrypted DNS options. --
> >>>
> >>
> >
> > [Med] OK.
> >
> >>
> >> 5) <!-- [rfced] Section 3.2:  Should "the encrypted DNS is
> >> discovered"
> >> be "encrypted DNS resolvers are discovered"?  If the suggested text
> >> is not correct, please clarify.
> >>
> >> Original:
> >> If the encrypted DNS is discovered by a host using both RA and
> DHCP,
> >> the rules discussed in Section 5.3.1 of [RFC8106] MUST be followed.
> >>
> >> Suggested:
> >> If encrypted DNS resolvers are discovered by a host using both RA
> and
> >> DHCP, the rules discussed in Section 5.3.1 of [RFC8106] MUST be
> >> followed. -->
> >>
> >
> > [Med] The suggested text is better. Thanks.
> >
> >>
> >> 6) <!-- [rfced] Section 3.3:  As [I-D.ietf-dnsop-svcb-https] does
> not
> >> have a Section 6.1 and the title of its Section 7.1 is '"alpn"
> >> and "no-default-alpn"', we updated the cited section number
> >> accordingly.
> >> If this is incorrect, please provide the correct citation.
> >>
> >> Original:
> >> ALPN-related considerations can be found in Section 6.1 of  [I-
> >> D.ietf-dnsop-svcb-https].
> >>
> >> Currently:
> >> ALPN-related considerations
> >> can be found in Section 7.1 of [RFC9460].
> >>
> >
> > [Med] Good catch. Thanks.
> >
> >> (see
> >> https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2F
> >>
> http://www/.
> >> rfc-
> editor.org%2F&data=05%7C01%7Cmohamed.boucadair%40orange.com%7Cbe4
> >>
> 92b66eb5b429dd5b608dbb4701221%7C90c7a20af34b40bfbc48b9253b6f5d20%7C0%
> >>
> 7C0%7C638302166134522558%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAi
> >>
> LCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=
> >>
> cQUFlS6RkTTbMPnqcXKx1bKlBnAc5C4OQ%2FYr6drT2no%3D&reserved=0%2Fauthors
> >> %2Frfc9460.html%23section-
> >> 7.1&data=05%7C01%7Cmohamed.boucadair%40orange.com%7C543c6045d28f49
> >> 3499fe08dbb0e0a6ac%7C90c7a20af34b40bfbc48b9253b6f5d20%7C0%7C0%7C63
> >> 8298251434819527%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQI
> >> joiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=pZ
> >> PbJQ35JUDdQ5%2BjFN%2FMa3yPBZV4qKOr4gGsNOSjxsk%3D&reserved=0)-->
> >>
> >>
> >> 7) <!-- [rfced] Section 3.4:  This sentence does not parse.  If the
> >> suggested text is not correct, please provide clarifying text.
> >>
> >> Original:
> >> Such considerations fall under the generic issue of handling
> multiple
> >> provisioning sources and which should not be dealt within each
> option
> >> separately as per the recommendation in Section 12 of [RFC7227].
> >>
> >> Suggested:
> >> Such considerations fall under the generic issue of handling
> multiple
> >> provisioning sources and should not be processed in each option
> >> separately, as per the recommendation in Section 12 of [RFC7227]. -
> ->
> >>
> >
> > [Med] OK.
> >
> >>
> >> 8) <!-- [rfced] Should any of the artwork elements (<artwork>) be
> >> tagged as sourcecode or another element?  Please review
> >> <https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%252
> >> Fwww.rfc-editor.org%2Fmaterials%2Fsourcecode-
> >> types.txt&data=05%7C01%7Cmohamed.boucadair%40orange.com%7C543c6045
> >> d28f493499fe08dbb0e0a6ac%7C90c7a20af34b40bfbc48b9253b6f5d20%7C0%7C
> >> 0%7C638298251434819527%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDA
> >> iLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sd
> >> ata=22kRc4mRl1dWX6EBtFHzoKXIIxeLW5WtAPemy4BJDPE%3D&reserved=0>; if
> >> the current list of preferred values for "type" does not contain an
> >> applicable type, please let us know.  Also, it is acceptable to
> leave
> >> the "type" attribute not set. -->
> >>
> >>
> >
> > [Med] We don't have a suitable type for the ones in the draft. We
> can leave this unset.
> >
> >> 9) <!-- [rfced] Sections 4.1 and 5.1:  These definitions read
> oddly,
> >> as the items preceding the colon are not the field name, unlike all
> >> of the other field entries that follow each of them.
> >> May we update as suggested?
> >>
> >> Original:
> >> Option-code:  OPTION_V6_DNR (TBA1, see Section 9.1) ...
> >> Code:  OPTION_V4_DNR (TBA2, see Section 9.2).
> >>
> >
> > [Med] Please keep the original as this is a convention used in DHCP
> documents. Thanks.
> >
> >> Perhaps:
> >> OPTION_V6_DNR:  An Option Code (144; see Section 9.1).
> >> ...
> >> OPTION_V4_DNR:  An Option Code (162; see Section 9.2). -->
> >>
> >>
> >> 10) <!-- [rfced] Figure 3:  We changed the field name in the
> diagram
> >> from "ipv6-address" to "ipv6-address(es)" per usage in the rest of
> >> this document (e.g., "shown in Figure 3" in Section 6.1) and also
> >> updated the figure title accordingly.  Please let us know any
> >> objections.
> >>
> >> Original:
> >> |                         ipv6-address                          |
> >> ...
> >> Figure 3: Format of the IPv6 Addresses Field
> >>
> >> Currently:
> >> |                       ipv6-address(es)                        |
> >> ...
> >
> > [Med] Please keep the original figure as it is correct. Each field
> includes only one IP address, but multiple fields with each an IP
> address can be included if needed.
> >
> >> Figure 3: Format of the ipv6-address(es) Field -->
> >>
> >>
> >
> > [Med] OK to update the title as suggested.
> >
> >
> >> 11) <!-- [rfced] Section 4.2:  Section 18.2.5 of RFC 8415 does not
> >> explicitly mention the Option Request Option or "ORO".  Please
> >> confirm that the citation for Section 18.2.5 of RFC 8415 will be
> >> clear to readers.
> >>
> >> Original:
> >> To discover an encrypted DNS resolver, the DHCPv6 client MUST
> include
> >> OPTION_V6_DNR in an Option Request Option (ORO), as in Sections
> >> 18.2.1, 18.2.2, 18.2.4, 18.2.5, 18.2.6, and 21.7 of [RFC8415]. -->
> >>
> >
> > [Med] The original text is OK as that section is explicitly listed
> in the template in
> https://data/
> tracker.ietf.org%2Fdoc%2Fhtml%2Frfc7227%23section-
> 21&data=05%7C01%7Cmohamed.boucadair%40orange.com%7Cbe492b66eb5b429dd5b
> 608dbb4701221%7C90c7a20af34b40bfbc48b9253b6f5d20%7C0%7C0%7C63830216613
> 4522558%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLC
> JBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=7X%2BDdRCfAcAYGf3M0
> O%2FMsQG9Gb%2FIDBCeLxJh%2FJO22%2FQ%3D&reserved=0 (cited as 18.1.4 of
> 3315 which was replaced since then by RFC8415).
> >
> >>
> >> 12) <!-- [rfced] Section 5.2:  Should 'multiple DNR instance data'
> >> be 'multiple "DNR Instance Data" field entries' here?  If the
> >> suggested text is not correct, please provide clarifying text.
> >>
> >> Original:
> >> The DHCPv4 client MUST be prepared to receive multiple DNR instance
> >> data in the OPTION_V4_DNR option; each instance is to be treated as
> a
> >> separate encrypted DNS resolver.
> >>
> >> Suggested:
> >> The DHCPv4 client MUST be prepared to receive multiple "DNR
> Instance
> >> Data" field entries in the OPTION_V4_DNR option; each instance is
> to
> >> be treated as a separate encrypted DNS resolver. -
> >> ->
> >
> > [Med] Works for me.
> >>
> >>
> >> 13) <!-- [rfced] Section 6.1:  We see that Figure 7 has the
> >> "0 ... 1 ... 2 ... 3" ruler markers above the
> >> "0 1 2 3 4 5 6 7 8 9 ..." ruler lines but Figures 1 and 3 do not.
> >> (We're not sure whether or not Figures 4 and 5 would also apply
> >> here.)  Would you like to place additional ruler-marker lines over
> >> Figures 1 and 3, and perhaps Figures 4 and 5?  (For example,
> similar
> >> figures in companion document 9464 (draft-ietf-ipsecme-
> >> add-ike) all include the additional ruler-marker line.)
> >>
> >> Original (best viewed with a fixed-point font such as Courier):
> >> 0                   1                   2                   3
> >> 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 -
> >> ->
> >>
> >
> > [Med] OK to add those to Figures 1/3 and similar line to Figures
> 4/5.
> >
> >>
> >> 14) <!-- [rfced] Section 6.1: FYI, in Figure 7, rather than insert
> >> the value for TBA3 (144), we put the word "Type" to correspond to
> the
> >> text below the figure. Please let us know if you prefer otherwise.
> >>
> >> Original:
> >> |     TBA3      |     Length    |        Service Priority       |
> >>
> >> Current:
> >> |     Type      |     Length    |        Service Priority       |
> >> -->
> >>
> >>
> >
> > [Med] OK.
> >
> >> 15) <!-- [rfced] Section 6.1:  We changed 'Service Parameters
> field'
> >> to '"Service Parameters (SvcParams)" field' per the field name.
> >> Please let us know any objections.
> >>
> >> Original:
> >> SvcParams Length:  16-bit unsigned integer.  This field indicates
> the
> >>    length of the Service Parameters field in octets.
> >>
> >> Currently:
> >> SvcParams Length:  16-bit unsigned integer.  This field indicates
> the
> >>    length of the "Service Parameters (SvcParams)" field in octets.
> >> -->
> >>
> >>
> >
> > [Med] OK.
> >
> >> 16) <!-- [rfced] Section 7.1:  We defined "CA" as "Certificate
> >> Authority"
> >> per companion document 9464 (draft-ietf-ipsecme-add-ike).  If this
> is
> >> incorrect, please provide the correct definition.
> >>
> >> Original:
> >> The attacker can get a domain name with a domain-  validated public
> >> certificate from a CA and host an encrypted DNS  resolver.
> >>
> >> Currently:
> >> The attacker can get a domain name with a domain-  validated public
> >> certificate from a Certificate Authority (CA) and  host an
> encrypted
> >> DNS resolver. -->
> >>
> >>
> >
> > [Med] OK.
> >
> >> 17) <!-- [rfced] Section 7.1:  It appears that "but cannot provide"
> >> refers to the endpoint, but does it refer to the mechanisms?
> >
> > [Med] It refers to the mechanisms.
> >
> >  If
> >> the endpoint, may we update as suggested?
> >>
> >> Original:
> >> The above mechanisms would ensure that the endpoint receives the
> >> correct configuration information of the encrypted DNS resolvers
> >> selected by the DHCP server (or RA sender), but cannot provide any
> >> information about the DHCP server or the entity hosting the DHCP
> >> server (or RA sender).
> >>
> >> Suggested ("endpoint can receive ... but cannot provide"):
> >> The above mechanisms would ensure that the endpoint can receive the
> >> correct configuration information of the encrypted DNS resolvers
> >> selected by the DHCP server (or RA sender) but cannot provide any
> >> information about the DHCP server or the entity hosting the DHCP
> >> server (or RA sender). -->
> >>
> >>
> >> 18) <!-- [rfced] Section 7.4:  We see that "PSK" has been defined
> but
> >> not "WPA".  Will this abbreviation be clear to readers?  If not,
> how
> >> should it be defined?
> >>
> >> Original:
> >> If the pre-shared key (PSK) is the same for all clients that
> connect
> >> to the same WLAN (e.g., WPA-PSK), the shared key will be available
> to
> >> all nodes, including attackers.
> >>
> >> Possibly:
> >> If the pre-shared key (PSK) is the same for all clients that
> connect
> >> to the same WLAN (e.g., Wi-Fi Protected Access Pre-Shared Key
> >> (WPA-PSK)), the shared key will be available to all nodes,
> including
> >> attackers. -->
> >>
> >
> > [Med] ACK.
> >
> >>
> >> 19) <!-- [rfced] Section 8:  To what does "but does not" refer in
> >> this sentence - the mechanism, or the DHCP client or IPv6 host?
> >>
> >
> > [Med] This refers to the mechanisms.
> >
> >> Also, we see "mechanisms specified in this document" in Sections
> >> 3.1.9 and 3.4.  Which mechanism is referred to here?
> >>
> >
> > [Med] We refer to all of them. Please make this change: s/mechanism
> > defined/mechanisms defined
> >
> >> Original:
> >> The
> >> mechanism defined in this document can be used to infer that a DHCP
> >> client or IPv6 host support encrypted DNS options, but does not
> >> explicitly reveal whether local DNS clients are able to consume
> these
> >> options or infer their encryption capabilities. -->
> >>
> >>
> >> 20) <!-- [rfced] References:  We could not find a connection
> between
> >> the Unicode Consortium and the [Evil-Twin] Wikipedia page.
> >> If the "Possibly" text is not correct, please provide an
> appropriate
> >> URL for "Evil twin (wireless networks)".
> >>
> >> Original:
> >> [Evil-Twin]
> >>            The Unicode Consortium, "Evil twin (wireless networks)",
> >>
> >> <https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%252
> >> Fen.wikipedia.org%2Fwiki%2F&data=05%7C01%7Cmohamed.boucadair%40ora
> >> nge.com%7C543c6045d28f493499fe08dbb0e0a6ac%7C90c7a20af34b40bfbc48b
> >> 9253b6f5d20%7C0%7C0%7C638298251434819527%7CUnknown%7CTWFpbGZsb3d8e
> >> yJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%
> >> 7C3000%7C%7C%7C&sdata=NObhhyKiZa0tBeo4TFNWs5H9tW7BtZJBbkucSTIOAoQ%
> >> 3D&reserved=0
> >>            Evil_twin_(wireless_networks)>.
> >>
> >> Possibly:
> >> [Evil-Twin]
> >>            Wikipedia, "Evil twin (wireless networks)", November
> >>            2022
> >> <https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%252
> >> Fen.wikipedia.org%2Fwiki%2F&data=05%7C01%7Cmohamed.boucadair%40ora
> >> nge.com%7C543c6045d28f493499fe08dbb0e0a6ac%7C90c7a20af34b40bfbc48b
> >> 9253b6f5d20%7C0%7C0%7C638298251434819527%7CUnknown%7CTWFpbGZsb3d8e
> >> yJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%
> >> 7C3000%7C%7C%7C&sdata=NObhhyKiZa0tBeo4TFNWs5H9tW7BtZJBbkucSTIOAoQ%
> >> 3D&reserved=0
> >>            Evil_twin_(wireless_networks)>. -->
> >>
> >>
> >
> > [Med] Works for me. Thanks.
> >
> >> 21) <!-- [rfced] References:  We could not find a connection
> between
> >> the Unicode Consortium and the [Krack] paper.  Should author Mathy
> >> Vanhoef be listed instead?
> >>
> >
> > [Med] Yes, please.
> >
> >> Also, please confirm that the provided URL is stable.
> >
> > [Med] We can use this more stable link: "
> https://dl.a/
> cm.org%2Fdoi%2F10.1145%2F3133956.3134027&data=05%7C01%7Cmohamed.boucad
> air%40orange.com%7Cbe492b66eb5b429dd5b608dbb4701221%7C90c7a20af34b40bf
> bc48b9253b6f5d20%7C0%7C0%7C638302166134522558%7CUnknown%7CTWFpbGZsb3d8
> eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3
> 000%7C%7C%7C&sdata=wz7jd9XFinjFzQ8xR4v%2BJ%2FAW1nWNVmkUfmEDHGk6yeM%3D&
> reserved=0". Please update also the title to "Key Reinstallation
> Attacks: Forcing Nonce Reuse in WPA2".
> >
> >>
> >> Original:
> >> [Krack]    The Unicode Consortium, "Key Reinstallation Attacks",
> >>            2017,
> >> <https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%252
> >> Fwww.krackattacks.com%2F&data=05%7C01%7Cmohamed.boucadair%40orange
> >> .com%7C543c6045d28f493499fe08dbb0e0a6ac%7C90c7a20af34b40bfbc48b925
> >> 3b6f5d20%7C0%7C0%7C638298251434819527%7CUnknown%7CTWFpbGZsb3d8eyJW
> >> IjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3
> >> 000%7C%7C%7C&sdata=MSuNjA%2BB3M5PfKmff2fVBqrp1S%2FeunV0G8C6gta1rdI
> >> %3D&reserved=0>. -->
> >>
> >>
> >> 22) <!-- [rfced] References:  We could not find a connection
> between
> >> the Unicode Consortium and the [Dragonblood] paper.  Also, the
> >> provided URL appears to be a personal URL.
> >>
> >> Will the currently listed URL remain stable?  Is there a site
> related
> >> to the Unicode Consortium that also provides this paper?
> >> If not, should the authors (Mathy Vanhoef and Eyal Ronen) be
> >> credited?
> >>
> >
> > [Med] We can cite the authors + use this stable link instead
> (https://iee/
> explore.ieee.org%2Fdocument%2F9152782&data=05%7C01%7Cmohamed.boucadair
> %40orange.com%7Cbe492b66eb5b429dd5b608dbb4701221%7C90c7a20af34b40bfbc4
> 8b9253b6f5d20%7C0%7C0%7C638302166134522558%7CUnknown%7CTWFpbGZsb3d8eyJ
> WIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000
> %7C%7C%7C&sdata=ovlmksDWI%2BdbBMh6K6pMCHIg2SWDq4ZaybQdUATRxhk%3D&reser
> ved=0).
> >
> >> Original:
> >> [Dragonblood]
> >>            The Unicode Consortium, "Dragonblood: Analyzing the
> >>            Dragonfly Handshake of WPA3 and EAP-pwd",
> >>
> >> <https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%252
> >> Fpapers.mathyvanhoef.com%2Fdragonblood.pdf&data=05%7C01%7Cmohamed.
> >> boucadair%40orange.com%7C543c6045d28f493499fe08dbb0e0a6ac%7C90c7a2
> >> 0af34b40bfbc48b9253b6f5d20%7C0%7C0%7C638298251434819527%7CUnknown%
> >> 7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwi
> >> LCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=Fofu9ZA4AqH1JiT5aAJNvLU9VQipk
> >> qMwRVkQbZMVdYc%3D&reserved=0>. -->
> >>
> >>
> >> 23) <!-- [rfced] References:  We could not find any mention of
> Cisco
> >> on the provided web page.  We updated this listing as noted below.
> >> If this is incorrect, please provide the correct title and the
> >> matching URL.
> >>
> >> Original:
> >> [dot1x]    Cisco, "Basic 802.1x Wireless User Authentication",
> >>
> >> <https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%252
> >> Fopenwrt.org%2Fdocs%2Fguide-
> >> user%2Fnetwork%2Fwifi%2F&data=05%7C01%7Cmohamed.boucadair%40orange
> >> .com%7C543c6045d28f493499fe08dbb0e0a6ac%7C90c7a20af34b40bfbc48b925
> >> 3b6f5d20%7C0%7C0%7C638298251434819527%7CUnknown%7CTWFpbGZsb3d8eyJW
> >> IjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3
> >> 000%7C%7C%7C&sdata=gL6D7KzP2AvooWUD%2BTo92r0eh6U40nJIjjXkM8RrzoI%3
> >> D&reserved=0
> >>            wireless.security.8021x>.
> >>
> >> Currently:
> >> [dot1x]    OpenWrt, "Introduction to 802.1X", December 2021,
> >>
> >> <https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%252
> >> Fopenwrt.org%2Fdocs%2Fguide-
> >> user%2Fnetwork%2Fwifi%2F&data=05%7C01%7Cmohamed.boucadair%40orange
> >> .com%7C543c6045d28f493499fe08dbb0e0a6ac%7C90c7a20af34b40bfbc48b925
> >> 3b6f5d20%7C0%7C0%7C638298251434819527%7CUnknown%7CTWFpbGZsb3d8eyJW
> >> IjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3
> >> 000%7C%7C%7C&sdata=gL6D7KzP2AvooWUD%2BTo92r0eh6U40nJIjjXkM8RrzoI%3
> >> D&reserved=0
> >>            wireless.security.8021x>. -->
> >>
> >
> > [Med] Works for me.
> >
> >>
> >> 24) <!-- [rfced] References:  We see on the provided URL, under the
> >> "Versions" tab, that quite a few versions have been added since
> >> December 2019 (Release 16.3.0).  Should this listing be updated?
> >> We see that the latest version (Release 18 / version 18.3.0, dated
> >> June 2023) also mentions "protocol configuration options" and
> "ePCO".
> >>
> >
> > [Med] Thank you for checking. We can update the reference entry to
> point to the latest rel/ver.
> >
> >> Original:
> >> [TS.24008] 3GPP, "Mobile radio interface Layer 3 specification;
> >> Core
> >>            network protocols; Stage 3 (Release 16)", December
> >> 2019,
> >>
> >> <https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%252
> >> Fwww.3gpp.org%2FDynaReport%2F24008.htm&data=05%7C01%7Cmohamed.bouc
> >> adair%40orange.com%7C543c6045d28f493499fe08dbb0e0a6ac%7C90c7a20af3
> >> 4b40bfbc48b9253b6f5d20%7C0%7C0%7C638298251434819527%7CUnknown%7CTW
> >> FpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJX
> >> VCI6Mn0%3D%7C3000%7C%7C%7C&sdata=0nbE1Xf4OHcuFGd0NTLCXVFtuEaY1am9%
> >> 2BprJtryl3ew%3D&reserved=0>. -->
> >>
> >>
> >> 25) <!-- [rfced] Acknowledgments:  We found this sentence
> >> confusing, as Section 7.3.1 of [RFC8310] says "... does not
> >> provide an authentication domain name for the DNS resolver" and
> >> "This document does not specify or request any DHCP extension to
> >> provide authentication domain names".  The current text seems to
> >> indicate the opposite.  Will this text be clear to readers, or
> >> should it be updated?
> >>
> >
> > [Med] That text is meant to ACK that RFC8310 identified DHCP as a
> candidate to convey ADN (although it does not specify how). What
> about:
> >
> > NEW:
> >
> >   The use of DHCP as a candidate protocol to retrieve an
> authentication domain name was
> >   mentioned in Section 7.3.1 of [RFC8310] and in an Internet-Draft
> >   authored by Tom Pusateri and Willem Toorop
> >   [I-D.pusateri-dhc-dns-driu].
> >
> >
> >> Original:
> >> The use of DHCP to retrieve an authentication domain name was
> >> discussed in Section 7.3.1 of [RFC8310] and in an Internet-Draft
> >> authored by Tom Pusateri and Willem Toorop  [I-D.pusateri-dhc-dns-
> >> driu].
> >>
> >> Possibly *:
> >> An issue related to using DHCP to retrieve an ADN is discussed in
> >> Section 7.3.1 of [RFC8310].  [DNS-TLS-DHCPv6-Options], authored by
> >> Tom Pusateri and Willem Toorop, discusses ways to address the
> >> issue.
> >>
> >> * Per this text from [I-D.pusateri-dhc-dns-driu]:
> >>  This document was motivated in part by Section 7.3.1 of
> >> [RFC8310].
> >>  Thanks to the authors Sara Dickinson, Daniel Kahn Gillmor, and
> >>  Tirumaleswar Reddy for documenting the issue. -->
> >>
> >>
> >> 26) <!-- [rfced] Acknowledgments:  Please confirm that, unlike the
> >> other individuals listed here, Rich Salz did more than one review
> >> ("secdir reviews").
> >>
> >
> > [Med] I confirm.
> >
> >> Original:
> >> Thanks to Rich Salz for the secdir reviews, Joe Clarke for the
> >> ops-  dir review, Robert Sparks for the artart review, and David
> >> Blacka for  the dnsdir review. -->
> >>
> >>
> >> 27) <!-- [rfced] Contributors section:  Per RFC 7322 (RFC Style
> >> Guide), we changed "Contributing Authors" to "Contributors".
> >>
> >
> > [Med] OK.
> >
> >> If desired, you can add some information to the Contributors
> >> section to describe their contributions.
> >
> > [Med] No change is needed.
> >
> >  If Nicolai Leymann and
> >> Zhiwei Yan should be credited as coauthors, the following could be
> >> added (e.g., see RFC 9089).
> >> Please let us know how you would like to proceed.
> >>
> >> Original:
> >> 11.  Contributing Authors
> >>
> >>    Nicolai Leymann
> >> ...
> >>
> >> Currently:
> >> Contributors
> >>
> >>    Nicolai Leymann
> >> ...
> >>
> >> Possibly:
> >> The following people contributed to the content of this document
> >> and  should be considered coauthors:
> >>
> >>    Nicolai Leymann
> >> ... -->
> >>
> >>
> >> 28) <!-- [rfced] Please review the "Inclusive Language" portion of
> >> the online Style Guide at
> >> <https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%252
> >> Fwww.rfc-
> >> editor.org%2Fstyleguide%2Fpart2%2F%23inclusive_language&data=05%7C
> >> 01%7Cmohamed.boucadair%40orange.com%7C543c6045d28f493499fe08dbb0e0
> >> a6ac%7C90c7a20af34b40bfbc48b9253b6f5d20%7C0%7C0%7C6382982514348195
> >> 27%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJ
> >> BTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=r%2BjtER12cPY%2B
> >> VIbvQEusFVzZOXp0Z%2F3%2Fu3X%2F7sq85DQ%3D&reserved=0>,
> >> and let us know if any changes are needed.
> >>
> >> Note that our script did not flag any words in particular, but
> >> this should still be reviewed as a best practice. -->
> >>
> >
> > [Med] All seems OK to me.
> >
> >>
> >> 29) <!-- [rfced] The following term appears to be used
> >> inconsistently in this document.  Please let us know which form is
> >> preferred.
> >>
> >> Encrypted DNS Option (1 instance - last paragraph of Section 7.1)
> >> /
> >>   Encrypted DNS option (23 instances) /
> >>   encrypted DNS option (1 instance - Section 8, Paragraph 1)*
> >>
> >> * As it appears that the option is of type "Encrypted DNS", we
> >>   suggest "Encrypted DNS option".
> >>
> >
> > [Med] Deal!
> >
> >> Also, some field names are quoted, but some are not.  Would you
> >> like to apply a consistent style (i.e., all quoted or none
> >> quoted)?
> >> Please review usage, and advise.
> >>
> >> For example:
> >> authentication-domain-name field
> >>
> >> Option-length field
> >>
> >> Type and Length fields
> >>
> >> "DNR Instance Data" field
> >>
> >> "Addr Length", "IPv4 Address(es)", and "Service Parameters
> >> (SvcParams)" fields ... -->
> >>
> >
> > [Med] I don't think a change is needed. However, we will report any
> when reviewing the edited version. Thanks.
> >
> >>
> >> Thank you.
> >>
> >> RFC Editor/lb/ar
> >>
> >>
> >> On Sep 8, 2023, rfc-editor@rfc-editor.org wrote:
> >>
> > ...
> >> RFC Editor
> >>
> >> --------------------------------------
> >> RFC9463 (draft-ietf-add-dnr-16)
> >>
> >> Title            : DHCP and Router Advertisement Options for the
> >> Discovery of Network-designated Resolvers (DNR)
> >> Author(s)        : M. Boucadair, Ed., T. Reddy.K, Ed., D. Wing, N.
> >> Cook, T. Jensen
> >> WG Chair(s)      : David C Lawrence, Glenn Deen
> >> Area Director(s) : Erik Kline, Éric Vyncke

____________________________________________________________________________________________________________
Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.

This message and its attachments may contain confidential or privileged information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
Thank you.