Re: [auth48] [EXTERNAL] Re: AUTH48: RFC-to-be 9463 <draft-ietf-add-dnr-16> for your review
Tommy Jensen <Jensen.Thomas@microsoft.com> Thu, 14 September 2023 01:48 UTC
Return-Path: <Jensen.Thomas@microsoft.com>
X-Original-To: auth48archive@ietfa.amsl.com
Delivered-To: auth48archive@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 72C6CC152567; Wed, 13 Sep 2023 18:48:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.608
X-Spam-Level:
X-Spam-Status: No, score=-6.608 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLACK=0.5, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id alhLvyqVVsMZ; Wed, 13 Sep 2023 18:48:53 -0700 (PDT)
Received: from BN3PR00CU001.outbound.protection.outlook.com (mail-eastus2azlp170100001.outbound.protection.outlook.com [IPv6:2a01:111:f403:c110::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 81B51C1524AC; Wed, 13 Sep 2023 18:48:53 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=L77m+RlVRLPfITHYOaCGCEklLI/t4rrDsimz69kkdXKttDaD2Ve+rq2Q6NpToC9CZZdZK+LHerUyn4rMkJ4SwAX6eR48HjpnIQNE6OY876C3fgSnVWd+5cUS8n+b7bkeErDDevSY8xsQqpC+B8JMMecgo1o5IPn+MSAXlR7pOelZ2VcC4Fc+ZS5wN1ZSF8jHZUbHzDyKUSKThSpbXKo0lBNgDhasG4vi30If+mDZ0wJ/aRBrpvkkkudG8pMZhNMXECq2dK6t+y24WYMh1TqH7V4FNEFsdNQg49AHV3oIF4IbGXDMLSdzMed8P2aYaH/1voLbqQOva22t/s1xF+1Zxw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=lSHny7y5QvNTfkcmf/BJfmcgTowZb5hIkrMwA0pKV4E=; b=nRk8YQvfGYvlggwO4XYdicjytzlWMzCAszUrzAGdbs6qPrDG2klq1fRxrPSsH0NxK5FUIXL77e9jgmI8zQALyUbphsrrRDg5AxODrOGrOitnOVA6vzHTArB5sWJPzVbiqW87U/svDjKHJz1856CXmrY3/ttCTR8njMs8eCABjJfMbStvoqlzEEewNGW0Bc99/05rSieiiHQPOVqIWD0oHRAigM9hgqNvU8QNPh2PicOVoS2riZ555Em6Z9fqn9hDuwewSCXCtBIP/F9aIRsNmAizNbpOuLo13KO3kgayaPyR6AZJAuclRjRUgVgp3tj6tN2HksNYmmFTk3uzY/REaQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=microsoft.com; dmarc=pass action=none header.from=microsoft.com; dkim=pass header.d=microsoft.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=lSHny7y5QvNTfkcmf/BJfmcgTowZb5hIkrMwA0pKV4E=; b=imFl6mGS9pxVjxLhlr5ogI2BJcJelToQ7sVEYC5jLTkYUsW9cLlpDwTd+Lu5MnqEQ3tY/rlRrfnEKniZIvx7RRFOwfzMxghoYz6dC7H6MP1LUeQaVt/SD1T0tjUAVEBZYHLk8dOAyjVnQta4OeK/56nepyTZ80c48ag5KM0GQ4M=
Received: from CH2PR00MB0854.namprd00.prod.outlook.com (2603:10b6:610:ad::18) by SJ0PR00MB0989.namprd00.prod.outlook.com (2603:10b6:a03:2af::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6836.0; Thu, 14 Sep 2023 01:48:45 +0000
Received: from CH2PR00MB0854.namprd00.prod.outlook.com ([fe80::b96f:8948:75b3:13a3]) by CH2PR00MB0854.namprd00.prod.outlook.com ([fe80::b96f:8948:75b3:13a3%4]) with mapi id 15.20.6837.000; Thu, 14 Sep 2023 01:48:44 +0000
From: Tommy Jensen <Jensen.Thomas@microsoft.com>
To: Dan Wing <dan@danwing.org>, Lynne Bartholomew <lbartholomew@amsl.com>
CC: Mohamed Boucadair <mohamed.boucadair@orange.com>, "rfc-editor@rfc-editor.org" <rfc-editor@rfc-editor.org>, Tirumaleswar Reddy <kondtir@gmail.com>, "dwing-ietf@fuggles.com" <dwing-ietf@fuggles.com>, "neil.cook@noware.co.uk" <neil.cook@noware.co.uk>, "add-ads@ietf.org" <add-ads@ietf.org>, "add-chairs@ietf.org" <add-chairs@ietf.org>, "Andrew.Campling@419.Consulting" <Andrew.Campling@419.Consulting>, Eric Vyncke <evyncke@cisco.com>, "auth48archive@rfc-editor.org" <auth48archive@rfc-editor.org>
Thread-Topic: [EXTERNAL] Re: AUTH48: RFC-to-be 9463 <draft-ietf-add-dnr-16> for your review
Thread-Index: AQHZ5U6z/HBrpGWPykWY8lJEgB/dQrAY5peAgAAF9ICAAKO+YA==
Date: Thu, 14 Sep 2023 01:48:44 +0000
Message-ID: <CH2PR00MB085434AC78378A94EDF50560FAF7A@CH2PR00MB0854.namprd00.prod.outlook.com>
References: <20230909025558.6F9F9E5EA7@rfcpa.amsl.com> <DU2PR02MB101609FC5EE40E76F0869F7F288F1A@DU2PR02MB10160.eurprd02.prod.outlook.com> <FD0ABFC9-8947-439D-B3FE-0B2C5335DD68@amsl.com> <C29330E0-4271-4647-8374-B99AA842591E@danwing.org>
In-Reply-To: <C29330E0-4271-4647-8374-B99AA842591E@danwing.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=microsoft.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: CH2PR00MB0854:EE_|SJ0PR00MB0989:EE_
x-ms-office365-filtering-correlation-id: 7eae6869-2e2f-41ba-cc9e-08dbb4c4bb01
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CH2PR00MB0854.namprd00.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(396003)(39860400002)(376002)(346002)(136003)(366004)(1800799009)(451199024)(186009)(55016003)(71200400001)(83380400001)(8990500004)(66574015)(26005)(66446008)(316002)(66476007)(76116006)(64756008)(54906003)(66556008)(66946007)(110136005)(52536014)(8936002)(8676002)(4326008)(41300700001)(5660300002)(6506007)(9686003)(7696005)(2906002)(30864003)(7416002)(478600001)(966005)(10290500003)(53546011)(33656002)(86362001)(122000001)(82960400001)(82950400001)(38070700005)(38100700002)(579004)(559001)(19607625013); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CH2PR00MB0854.namprd00.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 7eae6869-2e2f-41ba-cc9e-08dbb4c4bb01
X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Sep 2023 01:48:44.7029 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: vJ1v83eM3hQGstWVhPekUJnBFc5ya+wul08kxHaYFdM5mOTr5yIOsRnWhkfNMNIfjSAZbit1h2TPUnLSw8l5Dg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR00MB0989
Archived-At: <https://mailarchive.ietf.org/arch/msg/auth48archive/zaZiWORoAz6INnih2FjYqa4xink>
Subject: Re: [auth48] [EXTERNAL] Re: AUTH48: RFC-to-be 9463 <draft-ietf-add-dnr-16> for your review
X-BeenThere: auth48archive@rfc-editor.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Archiving AUTH48 exchanges between the RFC Production Center, the authors, and other related parties" <auth48archive.rfc-editor.org>
List-Unsubscribe: <https://mailman.rfc-editor.org/mailman/options/auth48archive>, <mailto:auth48archive-request@rfc-editor.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/auth48archive/>
List-Post: <mailto:auth48archive@rfc-editor.org>
List-Help: <mailto:auth48archive-request@rfc-editor.org?subject=help>
List-Subscribe: <https://mailman.rfc-editor.org/mailman/listinfo/auth48archive>, <mailto:auth48archive-request@rfc-editor.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Sep 2023 01:48:57 -0000
Good day Lynne, All my feedback was accounted for in Med's review. I approve publication of this document. Thanks, Tommy > -----Original Message----- > From: Dan Wing <dan@danwing.org> > Sent: Wednesday, September 13, 2023 9:02 AM > To: Lynne Bartholomew <lbartholomew@amsl.com> > Cc: Mohamed Boucadair <mohamed.boucadair@orange.com>; rfc-editor@rfc- > editor.org; Tirumaleswar Reddy <kondtir@gmail.com>; dwing- > ietf@fuggles.com; neil.cook@noware.co.uk; Tommy Jensen > <Jensen.Thomas@microsoft.com>; add-ads@ietf.org; add-chairs@ietf.org; > Andrew.Campling@419.Consulting; Eric Vyncke <evyncke@cisco.com>; > auth48archive@rfc-editor.org > Subject: [EXTERNAL] Re: AUTH48: RFC-to-be 9463 <draft-ietf-add-dnr-16> for > your review > > My company name changed. > > on title page: > OLD: > D. Wing > Citrix > NEW: > D. Wing > Cloud Software Group > > on authors page: > > OLD: > Dan Wing > Citrix Systems, Inc. > United States of America > Email: dwing-ietf@fuggles.com > NEW: > Dan Wing > Cloud Software Group Holdings, Inc. > United States of America > Email: dwing-ietf@fuggles.com > > Thanks! > > > -d > > > > > On Sep 13, 2023, at 8:40 AM, Lynne Bartholomew > <lbartholomew@amsl.com> wrote: > > > > Hi, Med. > > > > Thank you very much for your prompt and informative replies! We have > updated this document per your emails below. > > > > The latest files are posted here (please refresh your browser): > > > > > https://www.rfc/ > - > editor.org%2Fauthors%2Frfc9463.txt&data=05%7C01%7CJensen.Thomas%40mi > crosoft.com%7C6cf9d2f7220b40fa551008dbb472b9aa%7C72f988bf86f141af91 > ab2d7cd011db47%7C1%7C0%7C638302177525705213%7CUnknown%7CTWF > pbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI > 6Mn0%3D%7C3000%7C%7C%7C&sdata=echVnOrVVe9lB49cgCIvjWuU4NZimCy > BwaZo%2F2EiOjI%3D&reserved=0 > > > https://www.rfc/ > - > editor.org%2Fauthors%2Frfc9463.pdf&data=05%7C01%7CJensen.Thomas%40m > icrosoft.com%7C6cf9d2f7220b40fa551008dbb472b9aa%7C72f988bf86f141af9 > 1ab2d7cd011db47%7C1%7C0%7C638302177525705213%7CUnknown%7CTW > FpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVC > I6Mn0%3D%7C3000%7C%7C%7C&sdata=mwjBZXH62GmTvNKTMM9ys2Nei6v > waJSspR7Yy0whmK8%3D&reserved=0 > > > https://www.rfc/ > - > editor.org%2Fauthors%2Frfc9463.html&data=05%7C01%7CJensen.Thomas%40 > microsoft.com%7C6cf9d2f7220b40fa551008dbb472b9aa%7C72f988bf86f141af > 91ab2d7cd011db47%7C1%7C0%7C638302177525705213%7CUnknown%7CT > WFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJX > VCI6Mn0%3D%7C3000%7C%7C%7C&sdata=rqXkN7x2qATiOfN7tgzBI5vVluIVuj > w6x%2BjvFcG2Ros%3D&reserved=0 > > > https://www.rfc/ > - > editor.org%2Fauthors%2Frfc9463.xml&data=05%7C01%7CJensen.Thomas%40m > icrosoft.com%7C6cf9d2f7220b40fa551008dbb472b9aa%7C72f988bf86f141af9 > 1ab2d7cd011db47%7C1%7C0%7C638302177525705213%7CUnknown%7CTW > FpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVC > I6Mn0%3D%7C3000%7C%7C%7C&sdata=lNjZjHfQNpUbeQA8mP%2Fuw01Mce > VrES%2BpRA1YkA3BAdo%3D&reserved=0 > > > https://www.rfc/ > -editor.org%2Fauthors%2Frfc9463- > diff.html&data=05%7C01%7CJensen.Thomas%40microsoft.com%7C6cf9d2f722 > 0b40fa551008dbb472b9aa%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C > 0%7C638302177525861460%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLj > AwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C > %7C&sdata=sn4vtJFcS8joMWk6dd%2B87wmynJdncWj26DTNYukuCOk%3D&res > erved=0 > > > https://www.rfc/ > -editor.org%2Fauthors%2Frfc9463- > rfcdiff.html&data=05%7C01%7CJensen.Thomas%40microsoft.com%7C6cf9d2f7 > 220b40fa551008dbb472b9aa%7C72f988bf86f141af91ab2d7cd011db47%7C1% > 7C0%7C638302177525861460%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4 > wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C > %7C%7C&sdata=I9V2XO3BAQKc2X0GjcVhMBKrJQfGMWhFqW2EpTKVNn8%3D > &reserved=0 > > > > https://www/. > > rfc-editor.org%2Fauthors%2Frfc9463- > auth48diff.html&data=05%7C01%7CJens > > > en.Thomas%40microsoft.com%7C6cf9d2f7220b40fa551008dbb472b9aa%7C72 > f988b > > > f86f141af91ab2d7cd011db47%7C1%7C0%7C638302177525861460%7CUnkno > wn%7CTWF > > > pbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI > 6M > > > n0%3D%7C3000%7C%7C%7C&sdata=TWcjRwEOB5xKAXumK2CgtXns2uOUfDoA > Gg2jD6xuut > > Y%3D&reserved=0 > > > > > https://www.rfc/ > -editor.org%2Fauthors%2Frfc9463-alt- > diff.html&data=05%7C01%7CJensen.Thomas%40microsoft.com%7C6cf9d2f722 > 0b40fa551008dbb472b9aa%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C > 0%7C638302177525861460%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLj > AwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C > %7C&sdata=9nHZ2U220gQCAb6BxF1evg4CiH2RGkpgFHJ6HvGxslI%3D&reserve > d=0 > > > https://www.rfc/ > -editor.org%2Fauthors%2Frfc9463- > xmldiff1.html&data=05%7C01%7CJensen.Thomas%40microsoft.com%7C6cf9d2 > f7220b40fa551008dbb472b9aa%7C72f988bf86f141af91ab2d7cd011db47%7C > 1%7C0%7C638302177525861460%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiM > C4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000% > 7C%7C%7C&sdata=GOqfEKxNcKPXVGODamsmkRC8Im4%2Fb1%2B%2FD2t9RTs > x%2Byg%3D&reserved=0 > > > https://www.rfc/ > -editor.org%2Fauthors%2Frfc9463- > xmldiff2.html&data=05%7C01%7CJensen.Thomas%40microsoft.com%7C6cf9d2 > f7220b40fa551008dbb472b9aa%7C72f988bf86f141af91ab2d7cd011db47%7C > 1%7C0%7C638302177525861460%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiM > C4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000% > 7C%7C%7C&sdata=YgKmE%2FkougrafcuWzkgmEfsuJ6Uaw9AbjFuzVq3r3zA%3D > &reserved=0 > > > > https://www/. > > rfc-editor.org%2Fauthors%2Frfc9463-alt-diff.html&data=05%7C01%7CJensen > > > .Thomas%40microsoft.com%7C6cf9d2f7220b40fa551008dbb472b9aa%7C72f9 > 88bf8 > > > 6f141af91ab2d7cd011db47%7C1%7C0%7C638302177525861460%7CUnknow > n%7CTWFpb > > > GZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6M > n0 > > > %3D%7C3000%7C%7C%7C&sdata=9nHZ2U220gQCAb6BxF1evg4CiH2RGkpgFHJ > 6HvGxslI% > > 3D&reserved=0 > > > > Please review our updates carefully, and let us know if we missed anything. > > > > Thanks again for your help! > > > > RFC Editor/lb > > > > > >> On Sep 12, 2023, at 4:12 AM, mohamed.boucadair@orange.com wrote: > >> > >> Re-, > >> > >> Please find below some comments about the edited version: > >> > >> (1) Abstract: add a missing "and" > >> > >> OLD: > >> This document specifies new DHCP and IPv6 Router Advertisement > >> options to discover encrypted DNS resolvers (e.g., DNS over HTTPS, > >> DNS over TLS, DNS over QUIC). > >> > >> NEW: > >> > >> This document specifies new DHCP and IPv6 Router Advertisement > >> options to discover encrypted DNS resolvers (e.g., DNS over HTTPS, > >> DNS over TLS, and DNS over QUIC). > >> > >> (2) Introduction: be more explicit this is about discovery of > >> resolvers > >> > >> OLD: > >> This document focuses on the discovery of encrypted DNS protocols > >> such as DNS over HTTPS (DoH) [RFC8484], DNS over TLS (DoT) [RFC7858], > >> or DNS over QUIC (DoQ) [RFC9250] in local networks. > >> > >> NEW: > >> This document focuses on the discovery of encrypted DNS resolvers > >> which are using protocols such as DNS over HTTPS (DoH) [RFC8484], > >> DNS over TLS (DoT) [RFC7858], or DNS over QUIC (DoQ) [RFC9250] in local > networks. > >> > >> (3) Section 3.1.3: simplify the ULA wording > >> > >> OLD: > >> Whether one or more IP addresses are returned in an Encrypted DNS > >> option is deployment specific. For example, a router embedding a > >> recursive server or a forwarder has to include one single IP address > >> pointing to one of its LAN-facing interfaces. Typically, this IP > >> address can be a private IPv4 address, a Link-Local address, a Unique > >> Local IPv6 unicast Address (Unique Local Address (ULA)), or a Global > >> Unicast Address (GUA). > >> > >> NEW: > >> Whether one or more IP addresses are returned in an Encrypted DNS > >> option is deployment specific. For example, a router embedding a > >> recursive server or a forwarder has to include one single IP address > >> pointing to one of its LAN-facing interfaces. Typically, this IP > >> address can be a private IPv4 address, a Link-Local address, an IPv6 > >> Unique Local Address (ULA), or a Global Unicast Address (GUA). > >> > >> (3) Section 4.1: correct an error about the field name > >> > >> OLD: > >> An example of the authentication-domain-name encoding is shown in > >> Figure 2. This example conveys the FQDN "doh1.example.com.", and > >> the resulting Option-length field is 18. > >> > >> NEW: > >> An example of the authentication-domain-name encoding is shown in > >> Figure 2. This example conveys the FQDN "doh1.example.com.", and > >> the resulting ADN Length field is 18. > >> > >> (4) Section 6.1: Revert to the initial wording for consistency with > >> other fields > >> > >> OLD: > >> Service Priority: The priority of this Encrypted DNS option instance > >> compared to other instances. This 16-bit unsigned integer is > >> interpreted following the rules specified in Section 2.4.1 of > >> [RFC9460]. > >> > >> NEW: > >> Service Priority: 16-bit unsigned integer. The priority of this Encrypted DNS > option instance > >> compared to other instances. This field is > >> interpreted following the rules specified in Section 2.4.1 of > >> [RFC9460]. > >> > >> Thank you. > >> > >> Cheers, > >> Med > > > > > >> On Sep 12, 2023, at 12:56 AM, mohamed.boucadair@orange.com wrote: > >> > >> Dear RFC Editor, > >> > >> Please see inline. > >> > >> I let my co-authors further comments as appropriate. > >> > >> Cheers, > >> Med > >> > >>> -----Message d'origine----- > >>> De : rfc-editor@rfc-editor.org <rfc-editor@rfc-editor.org> Envoyé : > >>> samedi 9 septembre 2023 04:56 À : BOUCADAIR Mohamed INNOV/NET > >>> <mohamed.boucadair@orange.com>; kondtir@gmail.com; > >>> dwing-ietf@fuggles.com; neil.cook@noware.co.uk; tojens@microsoft.com > >>> Cc : rfc-editor@rfc-editor.org; add-ads@ietf.org; add- > >>> chairs@ietf.org; Andrew.Campling@419.Consulting; evyncke@cisco.com; > >>> auth48archive@rfc-editor.org Objet : Re: AUTH48: RFC-to-be 9463 > >>> <draft-ietf-add-dnr-16> for your review > >>> > >>> Authors, > >>> > >>> While reviewing this document during AUTH48, please resolve (as > >>> necessary) the following questions, which are also in the XML file. > >>> > >>> 1) <!-- [rfced] Abbreviated (running) document title, which appears > >>> in the PDF: > >>> FYI, we updated the abbreviated title to "DNR", along the lines of > >>> the running title "DDR" in the companion document 9462 (draft- > >>> ietf-add-ddr). > >>> Please let us know if you prefer otherwise. > >>> > >>> Original: > >>> Internet-Draft Discovery of Network-designated Resolver April 2023 > >>> > >>> Current PDF: > >>> RFC 9463 DNR > >>> September 2023 > >>> --> > >>> > >> > >> [Med] OK > >> > >>> > >>> 2) <!-- [rfced] Datatracker "idnits" output for the original > >>> approved document included the following warning. Please let us > >>> know if any changes are needed as related to this warning: > >>> > >>> == There are [sic] 1 instance of lines with non-RFC2606-compliant > >>> FQDNs in the > >>> document. --> > >>> > >> > >> [Med] No change is needed. Idnits complains about "a1.a2.a3.a4" but that is > not a name. > >> > >>> > >>> 3) <!-- [rfced] Section 1: Please note that companion document > >>> 9462 (draft-ietf-add-ddr) cites both RFCs 4861 and 8106 when > >>> referring to IPv6 Router Advertisement options. We have asked the > >>> authors of that document if the same RFC should be cited in both > >>> places. > >>> > >>> Please note, however, that we do not see any mention of Router > >>> Advertisement options in RFC 4861 - only Neighbor Discovery options. > >>> > >>> Would you like to see how/if draft-ietf-add-ddr updates its > >>> comparable citation and update this document (or not) to match? > >>> > >>> Original: > >>> In particular, the document specifies how a local encrypted DNS > >>> resolver can be discovered by connected hosts by means of DHCPv4 > >>> [RFC2132], DHCPv6 [RFC8415], and IPv6 Router Advertisement (RA) > >>> [RFC4861] options. --> > >>> > >> > >> [Med] It would be good if DDR aligns with this, but we leave that to DDR > authors to decide. No change is needed to DNR. > >> > >>> > >>> 4) <!-- [rfced] Section 3: This sentence did not parse. We removed > >>> the colon (":"). If this is incorrect, please clarify "and Neighbor > >>> Discovery protocol (Section 6): Encrypted DNS options". > >>> > >>> Original: > >>> This document describes how a DNS client can discover local > >>> encrypted DNS resolvers using DHCP (Sections 4 and 5) and Neighbor > >>> Discovery protocol (Section 6): Encrypted DNS options. > >>> > >>> Currently: > >>> This document describes how a DNS client can discover local > >>> encrypted DNS resolvers using DHCP (Sections 4 and 5) and Neighbor > >>> Discovery protocol (Section 6) Encrypted DNS options. -- > >>>> > >>> > >> > >> [Med] OK. > >> > >>> > >>> 5) <!-- [rfced] Section 3.2: Should "the encrypted DNS is > >>> discovered" > >>> be "encrypted DNS resolvers are discovered"? If the suggested text > >>> is not correct, please clarify. > >>> > >>> Original: > >>> If the encrypted DNS is discovered by a host using both RA and DHCP, > >>> the rules discussed in Section 5.3.1 of [RFC8106] MUST be followed. > >>> > >>> Suggested: > >>> If encrypted DNS resolvers are discovered by a host using both RA > >>> and DHCP, the rules discussed in Section 5.3.1 of [RFC8106] MUST be > >>> followed. --> > >>> > >> > >> [Med] The suggested text is better. Thanks. > >> > >>> > >>> 6) <!-- [rfced] Section 3.3: As [I-D.ietf-dnsop-svcb-https] does > >>> not have a Section 6.1 and the title of its Section 7.1 is '"alpn" > >>> and "no-default-alpn"', we updated the cited section number > >>> accordingly. > >>> If this is incorrect, please provide the correct citation. > >>> > >>> Original: > >>> ALPN-related considerations can be found in Section 6.1 of [I- > >>> D.ietf-dnsop-svcb-https]. > >>> > >>> Currently: > >>> ALPN-related considerations > >>> can be found in Section 7.1 of [RFC9460]. > >>> > >> > >> [Med] Good catch. Thanks. > >> > >>> (see > >>> https://eu/ > >>> > r03.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252F > >>> > &data=05%7C01%7CJensen.Thomas%40microsoft.com%7C6cf9d2f7220b40fa5 > 510 > >>> > 08dbb472b9aa%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C63830 > 21775 > >>> > 25861460%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV > 2luMzI > >>> > iLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=s9u8Sfpa0p > eIJS > >>> pyXQgKq3fcu6LjvQwFwnqY6g472E4%3D&reserved=0 > >>> > http://www/ > >>> .rfc- > editor.org%2F&data=05%7C01%7CJensen.Thomas%40microsoft.com%7C6c > >>> > f9d2f7220b40fa551008dbb472b9aa%7C72f988bf86f141af91ab2d7cd011db47 > %7C > >>> > 1%7C0%7C638302177525861460%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiM > C4wLjAwM > >>> > DAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C > &sd > >>> > ata=tiTlhVVCqrLaoYYKiNrYAPUvQvNyIetcEFBNBtdv6lY%3D&reserved=0%2Fauth > >>> ors%2Frfc9460.html%23section- > >>> > 7.1&data=05%7C01%7Cmohamed.boucadair%40orange.com%7C543c6045d28f > 49 > >>> > 3499fe08dbb0e0a6ac%7C90c7a20af34b40bfbc48b9253b6f5d20%7C0%7C0%7 > C63 > >>> > 8298251434819527%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAi > LCJQI > >>> > joiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=p > Z > >>> > PbJQ35JUDdQ5%2BjFN%2FMa3yPBZV4qKOr4gGsNOSjxsk%3D&reserved=0)--> > >>> > >>> > >>> 7) <!-- [rfced] Section 3.4: This sentence does not parse. If the > >>> suggested text is not correct, please provide clarifying text. > >>> > >>> Original: > >>> Such considerations fall under the generic issue of handling > >>> multiple provisioning sources and which should not be dealt within > >>> each option separately as per the recommendation in Section 12 of > >>> [RFC7227]. > >>> > >>> Suggested: > >>> Such considerations fall under the generic issue of handling > >>> multiple provisioning sources and should not be processed in each > >>> option separately, as per the recommendation in Section 12 of > >>> [RFC7227]. --> > >>> > >> > >> [Med] OK. > >> > >>> > >>> 8) <!-- [rfced] Should any of the artwork elements (<artwork>) be > >>> tagged as sourcecode or another element? Please review > >>> <https://e/ > >>> > ur03.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252 > >>> > 52&data=05%7C01%7CJensen.Thomas%40microsoft.com%7C6cf9d2f7220b40f > a55 > >>> > 1008dbb472b9aa%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638 > 30217 > >>> > 7525861460%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjo > iV2luM > >>> > zIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=8mWwuV > 5h2AJZ > >>> tIh4rVLkfE0nxX7mHjbUWcDA6XCb6kk%3D&reserved=0 > >>> Fwww.rfc-editor.org%2Fmaterials%2Fsourcecode- > >>> > types.txt&data=05%7C01%7Cmohamed.boucadair%40orange.com%7C543c604 > 5 > >>> > d28f493499fe08dbb0e0a6ac%7C90c7a20af34b40bfbc48b9253b6f5d20%7C0% > 7C > >>> > 0%7C638298251434819527%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLj > AwMDA > >>> > iLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sd > >>> > ata=22kRc4mRl1dWX6EBtFHzoKXIIxeLW5WtAPemy4BJDPE%3D&reserved=0>; if > >>> the current list of preferred values for "type" does not contain an > >>> applicable type, please let us know. Also, it is acceptable to > >>> leave the "type" attribute not set. --> > >>> > >>> > >> > >> [Med] We don't have a suitable type for the ones in the draft. We can leave > this unset. > >> > >>> 9) <!-- [rfced] Sections 4.1 and 5.1: These definitions read oddly, > >>> as the items preceding the colon are not the field name, unlike all > >>> of the other field entries that follow each of them. > >>> May we update as suggested? > >>> > >>> Original: > >>> Option-code: OPTION_V6_DNR (TBA1, see Section 9.1) ... > >>> Code: OPTION_V4_DNR (TBA2, see Section 9.2). > >>> > >> > >> [Med] Please keep the original as this is a convention used in DHCP > documents. Thanks. > >> > >>> Perhaps: > >>> OPTION_V6_DNR: An Option Code (144; see Section 9.1). > >>> ... > >>> OPTION_V4_DNR: An Option Code (162; see Section 9.2). --> > >>> > >>> > >>> 10) <!-- [rfced] Figure 3: We changed the field name in the diagram > >>> from "ipv6-address" to "ipv6-address(es)" per usage in the rest of > >>> this document (e.g., "shown in Figure 3" in Section 6.1) and also > >>> updated the figure title accordingly. Please let us know any > >>> objections. > >>> > >>> Original: > >>> | ipv6-address | > >>> ... > >>> Figure 3: Format of the IPv6 Addresses Field > >>> > >>> Currently: > >>> | ipv6-address(es) | > >>> ... > >> > >> [Med] Please keep the original figure as it is correct. Each field includes only > one IP address, but multiple fields with each an IP address can be included if > needed. > >> > >>> Figure 3: Format of the ipv6-address(es) Field --> > >>> > >>> > >> > >> [Med] OK to update the title as suggested. > >> > >> > >>> 11) <!-- [rfced] Section 4.2: Section 18.2.5 of RFC 8415 does not > >>> explicitly mention the Option Request Option or "ORO". Please > >>> confirm that the citation for Section 18.2.5 of RFC 8415 will be > >>> clear to readers. > >>> > >>> Original: > >>> To discover an encrypted DNS resolver, the DHCPv6 client MUST > >>> include OPTION_V6_DNR in an Option Request Option (ORO), as in > >>> Sections 18.2.1, 18.2.2, 18.2.4, 18.2.5, 18.2.6, and 21.7 of > >>> [RFC8415]. --> > >>> > >> > >> [Med] The original text is OK as that section is explicitly listed in the > template in > https://datatrac/ > ker.ietf.org%2Fdoc%2Fhtml%2Frfc7227%23section- > 21&data=05%7C01%7CJensen.Thomas%40microsoft.com%7C6cf9d2f7220b40f > a551008dbb472b9aa%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C > 638302177525861460%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwM > DAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C > &sdata=rTztMNNZBmIYro%2FiUxUELd27WAwnzpVxhSvxpnEUKz4%3D&reserve > d=0 (cited as 18.1.4 of 3315 which was replaced since then by RFC8415). > >> > >>> > >>> 12) <!-- [rfced] Section 5.2: Should 'multiple DNR instance data' > >>> be 'multiple "DNR Instance Data" field entries' here? If the > >>> suggested text is not correct, please provide clarifying text. > >>> > >>> Original: > >>> The DHCPv4 client MUST be prepared to receive multiple DNR instance > >>> data in the OPTION_V4_DNR option; each instance is to be treated as > >>> a separate encrypted DNS resolver. > >>> > >>> Suggested: > >>> The DHCPv4 client MUST be prepared to receive multiple "DNR Instance > >>> Data" field entries in the OPTION_V4_DNR option; each instance is to > >>> be treated as a separate encrypted DNS resolver. - > >>> -> > >> > >> [Med] Works for me. > >>> > >>> > >>> 13) <!-- [rfced] Section 6.1: We see that Figure 7 has the > >>> "0 ... 1 ... 2 ... 3" ruler markers above the > >>> "0 1 2 3 4 5 6 7 8 9 ..." ruler lines but Figures 1 and 3 do not. > >>> (We're not sure whether or not Figures 4 and 5 would also apply > >>> here.) Would you like to place additional ruler-marker lines over > >>> Figures 1 and 3, and perhaps Figures 4 and 5? (For example, similar > >>> figures in companion document 9464 (draft-ietf-ipsecme- > >>> add-ike) all include the additional ruler-marker line.) > >>> > >>> Original (best viewed with a fixed-point font such as Courier): > >>> 0 1 2 3 > >>> 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 - > >>> -> > >>> > >> > >> [Med] OK to add those to Figures 1/3 and similar line to Figures 4/5. > >> > >>> > >>> 14) <!-- [rfced] Section 6.1: FYI, in Figure 7, rather than insert > >>> the value for TBA3 (144), we put the word "Type" to correspond to > >>> the text below the figure. Please let us know if you prefer > >>> otherwise. > >>> > >>> Original: > >>> | TBA3 | Length | Service Priority | > >>> > >>> Current: > >>> | Type | Length | Service Priority | > >>> --> > >>> > >>> > >> > >> [Med] OK. > >> > >>> 15) <!-- [rfced] Section 6.1: We changed 'Service Parameters field' > >>> to '"Service Parameters (SvcParams)" field' per the field name. > >>> Please let us know any objections. > >>> > >>> Original: > >>> SvcParams Length: 16-bit unsigned integer. This field indicates > >>> the > >>> length of the Service Parameters field in octets. > >>> > >>> Currently: > >>> SvcParams Length: 16-bit unsigned integer. This field indicates > >>> the > >>> length of the "Service Parameters (SvcParams)" field in octets. > >>> --> > >>> > >>> > >> > >> [Med] OK. > >> > >>> 16) <!-- [rfced] Section 7.1: We defined "CA" as "Certificate > >>> Authority" > >>> per companion document 9464 (draft-ietf-ipsecme-add-ike). If this > >>> is incorrect, please provide the correct definition. > >>> > >>> Original: > >>> The attacker can get a domain name with a domain- validated public > >>> certificate from a CA and host an encrypted DNS resolver. > >>> > >>> Currently: > >>> The attacker can get a domain name with a domain- validated public > >>> certificate from a Certificate Authority (CA) and host an encrypted > >>> DNS resolver. --> > >>> > >>> > >> > >> [Med] OK. > >> > >>> 17) <!-- [rfced] Section 7.1: It appears that "but cannot provide" > >>> refers to the endpoint, but does it refer to the mechanisms? > >> > >> [Med] It refers to the mechanisms. > >> > >> If > >>> the endpoint, may we update as suggested? > >>> > >>> Original: > >>> The above mechanisms would ensure that the endpoint receives the > >>> correct configuration information of the encrypted DNS resolvers > >>> selected by the DHCP server (or RA sender), but cannot provide any > >>> information about the DHCP server or the entity hosting the DHCP > >>> server (or RA sender). > >>> > >>> Suggested ("endpoint can receive ... but cannot provide"): > >>> The above mechanisms would ensure that the endpoint can receive the > >>> correct configuration information of the encrypted DNS resolvers > >>> selected by the DHCP server (or RA sender) but cannot provide any > >>> information about the DHCP server or the entity hosting the DHCP > >>> server (or RA sender). --> > >>> > >>> > >>> 18) <!-- [rfced] Section 7.4: We see that "PSK" has been defined > >>> but not "WPA". Will this abbreviation be clear to readers? If not, > >>> how should it be defined? > >>> > >>> Original: > >>> If the pre-shared key (PSK) is the same for all clients that connect > >>> to the same WLAN (e.g., WPA-PSK), the shared key will be available > >>> to all nodes, including attackers. > >>> > >>> Possibly: > >>> If the pre-shared key (PSK) is the same for all clients that connect > >>> to the same WLAN (e.g., Wi-Fi Protected Access Pre-Shared Key > >>> (WPA-PSK)), the shared key will be available to all nodes, including > >>> attackers. --> > >>> > >> > >> [Med] ACK. > >> > >>> > >>> 19) <!-- [rfced] Section 8: To what does "but does not" refer in > >>> this sentence - the mechanism, or the DHCP client or IPv6 host? > >>> > >> > >> [Med] This refers to the mechanisms. > >> > >>> Also, we see "mechanisms specified in this document" in Sections > >>> 3.1.9 and 3.4. Which mechanism is referred to here? > >>> > >> > >> [Med] We refer to all of them. Please make this change: s/mechanism > >> defined/mechanisms defined > >> > >>> Original: > >>> The > >>> mechanism defined in this document can be used to infer that a DHCP > >>> client or IPv6 host support encrypted DNS options, but does not > >>> explicitly reveal whether local DNS clients are able to consume > >>> these options or infer their encryption capabilities. --> > >>> > >>> > >>> 20) <!-- [rfced] References: We could not find a connection between > >>> the Unicode Consortium and the [Evil-Twin] Wikipedia page. > >>> If the "Possibly" text is not correct, please provide an appropriate > >>> URL for "Evil twin (wireless networks)". > >>> > >>> Original: > >>> [Evil-Twin] > >>> The Unicode Consortium, "Evil twin (wireless networks)", > >>> > >>> <https://e/ > >>> > ur03.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252 > >>> > 52&data=05%7C01%7CJensen.Thomas%40microsoft.com%7C6cf9d2f7220b40f > a55 > >>> > 1008dbb472b9aa%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638 > 30217 > >>> > 7525861460%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjo > iV2luM > >>> > zIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=8mWwuV > 5h2AJZ > >>> tIh4rVLkfE0nxX7mHjbUWcDA6XCb6kk%3D&reserved=0 > >>> > Fen.wikipedia.org%2Fwiki%2F&data=05%7C01%7Cmohamed.boucadair%40ora > >>> > nge.com%7C543c6045d28f493499fe08dbb0e0a6ac%7C90c7a20af34b40bfbc48 > b > >>> > 9253b6f5d20%7C0%7C0%7C638298251434819527%7CUnknown%7CTWFpbG > Zsb3d8e > >>> > yJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D% > >>> > 7C3000%7C%7C%7C&sdata=NObhhyKiZa0tBeo4TFNWs5H9tW7BtZJBbkucSTIOA > oQ% > >>> 3D&reserved=0 > >>> Evil_twin_(wireless_networks)>. > >>> > >>> Possibly: > >>> [Evil-Twin] > >>> Wikipedia, "Evil twin (wireless networks)", November > >>> 2022 > >>> <https://e/ > >>> > ur03.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252 > >>> > 52&data=05%7C01%7CJensen.Thomas%40microsoft.com%7C6cf9d2f7220b40f > a55 > >>> > 1008dbb472b9aa%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638 > 30217 > >>> > 7525861460%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjo > iV2luM > >>> > zIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=8mWwuV > 5h2AJZ > >>> tIh4rVLkfE0nxX7mHjbUWcDA6XCb6kk%3D&reserved=0 > >>> > Fen.wikipedia.org%2Fwiki%2F&data=05%7C01%7Cmohamed.boucadair%40ora > >>> > nge.com%7C543c6045d28f493499fe08dbb0e0a6ac%7C90c7a20af34b40bfbc48 > b > >>> > 9253b6f5d20%7C0%7C0%7C638298251434819527%7CUnknown%7CTWFpbG > Zsb3d8e > >>> > yJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D% > >>> > 7C3000%7C%7C%7C&sdata=NObhhyKiZa0tBeo4TFNWs5H9tW7BtZJBbkucSTIOA > oQ% > >>> 3D&reserved=0 > >>> Evil_twin_(wireless_networks)>. --> > >>> > >>> > >> > >> [Med] Works for me. Thanks. > >> > >>> 21) <!-- [rfced] References: We could not find a connection between > >>> the Unicode Consortium and the [Krack] paper. Should author Mathy > >>> Vanhoef be listed instead? > >>> > >> > >> [Med] Yes, please. > >> > >>> Also, please confirm that the provided URL is stable. > >> > >> [Med] We can use this more stable link: " > https://dl.acm.o/ > rg%2Fdoi%2F10.1145%2F3133956.3134027&data=05%7C01%7CJensen.Thoma > s%40microsoft.com%7C6cf9d2f7220b40fa551008dbb472b9aa%7C72f988bf86f > 141af91ab2d7cd011db47%7C1%7C0%7C638302177525861460%7CUnknown > %7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWw > iLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=K79122lXLiflxu4rTkb0kXD4eW > ILoYr7trmWaJuBatM%3D&reserved=0". Please update also the title to "Key > Reinstallation Attacks: Forcing Nonce Reuse in WPA2". > >> > >>> > >>> Original: > >>> [Krack] The Unicode Consortium, "Key Reinstallation Attacks", > >>> 2017, > >>> <https://e/ > >>> > ur03.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252 > >>> > 52&data=05%7C01%7CJensen.Thomas%40microsoft.com%7C6cf9d2f7220b40f > a55 > >>> > 1008dbb472b9aa%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638 > 30217 > >>> > 7525861460%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjo > iV2luM > >>> > zIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=8mWwuV > 5h2AJZ > >>> tIh4rVLkfE0nxX7mHjbUWcDA6XCb6kk%3D&reserved=0 > >>> > Fwww.krackattacks.com%2F&data=05%7C01%7Cmohamed.boucadair%40orang > e > >>> > .com%7C543c6045d28f493499fe08dbb0e0a6ac%7C90c7a20af34b40bfbc48b9 > 25 > >>> > 3b6f5d20%7C0%7C0%7C638298251434819527%7CUnknown%7CTWFpbGZsb3 > d8eyJW > >>> > IjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3 > >>> > 000%7C%7C%7C&sdata=MSuNjA%2BB3M5PfKmff2fVBqrp1S%2FeunV0G8C6gta > 1rdI > >>> %3D&reserved=0>. --> > >>> > >>> > >>> 22) <!-- [rfced] References: We could not find a connection between > >>> the Unicode Consortium and the [Dragonblood] paper. Also, the > >>> provided URL appears to be a personal URL. > >>> > >>> Will the currently listed URL remain stable? Is there a site > >>> related to the Unicode Consortium that also provides this paper? > >>> If not, should the authors (Mathy Vanhoef and Eyal Ronen) be > >>> credited? > >>> > >> > >> [Med] We can cite the authors + use this stable link instead > (https://ieeexpl/ > ore.ieee.org%2Fdocument%2F9152782&data=05%7C01%7CJensen.Thomas%40 > microsoft.com%7C6cf9d2f7220b40fa551008dbb472b9aa%7C72f988bf86f141af > 91ab2d7cd011db47%7C1%7C0%7C638302177526017728%7CUnknown%7CT > WFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJX > VCI6Mn0%3D%7C3000%7C%7C%7C&sdata=qbBBrF0tVn6c5ZbQs%2B9yDCEub > MXD%2B%2BuUX8DjcNQdHpE%3D&reserved=0). > >> > >>> Original: > >>> [Dragonblood] > >>> The Unicode Consortium, "Dragonblood: Analyzing the > >>> Dragonfly Handshake of WPA3 and EAP-pwd", > >>> > >>> <https://e/ > >>> > ur03.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252 > >>> > 52&data=05%7C01%7CJensen.Thomas%40microsoft.com%7C6cf9d2f7220b40f > a55 > >>> > 1008dbb472b9aa%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638 > 30217 > >>> > 7526017728%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjo > iV2luM > >>> > zIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=5e8REAdr > 7Onr > >>> D3eH5Hb17CPA9oZxsplGH1fCNoYw42U%3D&reserved=0 > >>> > Fpapers.mathyvanhoef.com%2Fdragonblood.pdf&data=05%7C01%7Cmohamed > . > >>> > boucadair%40orange.com%7C543c6045d28f493499fe08dbb0e0a6ac%7C90c7a > 2 > >>> > 0af34b40bfbc48b9253b6f5d20%7C0%7C0%7C638298251434819527%7CUnkn > own% > >>> > 7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwi > >>> > LCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=Fofu9ZA4AqH1JiT5aAJNvLU9V > Qipk > >>> qMwRVkQbZMVdYc%3D&reserved=0>. --> > >>> > >>> > >>> 23) <!-- [rfced] References: We could not find any mention of Cisco > >>> on the provided web page. We updated this listing as noted below. > >>> If this is incorrect, please provide the correct title and the > >>> matching URL. > >>> > >>> Original: > >>> [dot1x] Cisco, "Basic 802.1x Wireless User Authentication", > >>> > >>> <https://e/ > >>> > ur03.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252 > >>> > 52&data=05%7C01%7CJensen.Thomas%40microsoft.com%7C6cf9d2f7220b40f > a55 > >>> > 1008dbb472b9aa%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638 > 30217 > >>> > 7526017728%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjo > iV2luM > >>> > zIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=5e8REAdr > 7Onr > >>> D3eH5Hb17CPA9oZxsplGH1fCNoYw42U%3D&reserved=0 > >>> Fopenwrt.org%2Fdocs%2Fguide- > >>> > user%2Fnetwork%2Fwifi%2F&data=05%7C01%7Cmohamed.boucadair%40oran > ge > >>> > .com%7C543c6045d28f493499fe08dbb0e0a6ac%7C90c7a20af34b40bfbc48b9 > 25 > >>> > 3b6f5d20%7C0%7C0%7C638298251434819527%7CUnknown%7CTWFpbGZsb3 > d8eyJW > >>> > IjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3 > >>> > 000%7C%7C%7C&sdata=gL6D7KzP2AvooWUD%2BTo92r0eh6U40nJIjjXkM8Rrzo > I%3 > >>> D&reserved=0 > >>> wireless.security.8021x>. > >>> > >>> Currently: > >>> [dot1x] OpenWrt, "Introduction to 802.1X", December 2021, > >>> > >>> <https://e/ > >>> > ur03.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252 > >>> > 52&data=05%7C01%7CJensen.Thomas%40microsoft.com%7C6cf9d2f7220b40f > a55 > >>> > 1008dbb472b9aa%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638 > 30217 > >>> > 7526017728%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjo > iV2luM > >>> > zIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=5e8REAdr > 7Onr > >>> D3eH5Hb17CPA9oZxsplGH1fCNoYw42U%3D&reserved=0 > >>> Fopenwrt.org%2Fdocs%2Fguide- > >>> > user%2Fnetwork%2Fwifi%2F&data=05%7C01%7Cmohamed.boucadair%40oran > ge > >>> > .com%7C543c6045d28f493499fe08dbb0e0a6ac%7C90c7a20af34b40bfbc48b9 > 25 > >>> > 3b6f5d20%7C0%7C0%7C638298251434819527%7CUnknown%7CTWFpbGZsb3 > d8eyJW > >>> > IjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3 > >>> > 000%7C%7C%7C&sdata=gL6D7KzP2AvooWUD%2BTo92r0eh6U40nJIjjXkM8Rrzo > I%3 > >>> D&reserved=0 > >>> wireless.security.8021x>. --> > >>> > >> > >> [Med] Works for me. > >> > >>> > >>> 24) <!-- [rfced] References: We see on the provided URL, under the > >>> "Versions" tab, that quite a few versions have been added since > >>> December 2019 (Release 16.3.0). Should this listing be updated? > >>> We see that the latest version (Release 18 / version 18.3.0, dated > >>> June 2023) also mentions "protocol configuration options" and > >>> "ePCO". > >>> > >> > >> [Med] Thank you for checking. We can update the reference entry to point to > the latest rel/ver. > >> > >>> Original: > >>> [TS.24008] 3GPP, "Mobile radio interface Layer 3 specification; Core > >>> network protocols; Stage 3 (Release 16)", December 2019, > >>> > >>> <https://e/ > >>> > ur03.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252 > >>> > 52&data=05%7C01%7CJensen.Thomas%40microsoft.com%7C6cf9d2f7220b40f > a55 > >>> > 1008dbb472b9aa%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638 > 30217 > >>> > 7526017728%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjo > iV2luM > >>> > zIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=5e8REAdr > 7Onr > >>> D3eH5Hb17CPA9oZxsplGH1fCNoYw42U%3D&reserved=0 > >>> > Fwww.3gpp.org%2FDynaReport%2F24008.htm&data=05%7C01%7Cmohamed. > bouc > >>> > adair%40orange.com%7C543c6045d28f493499fe08dbb0e0a6ac%7C90c7a20af > 3 > >>> > 4b40bfbc48b9253b6f5d20%7C0%7C0%7C638298251434819527%7CUnknown > %7CTW > >>> > FpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJX > >>> > VCI6Mn0%3D%7C3000%7C%7C%7C&sdata=0nbE1Xf4OHcuFGd0NTLCXVFtuEaY > 1am9% > >>> 2BprJtryl3ew%3D&reserved=0>. --> > >>> > >>> > >>> 25) <!-- [rfced] Acknowledgments: We found this sentence confusing, > >>> as Section 7.3.1 of [RFC8310] says "... does not provide an > >>> authentication domain name for the DNS resolver" and "This document > >>> does not specify or request any DHCP extension to provide > >>> authentication domain names". The current text seems to indicate > >>> the opposite. Will this text be clear to readers, or should it be > >>> updated? > >>> > >> > >> [Med] That text is meant to ACK that RFC8310 identified DHCP as a > candidate to convey ADN (although it does not specify how). What about: > >> > >> NEW: > >> > >> The use of DHCP as a candidate protocol to retrieve an > >> authentication domain name was mentioned in Section 7.3.1 of > >> [RFC8310] and in an Internet-Draft authored by Tom Pusateri and > >> Willem Toorop [I-D.pusateri-dhc-dns-driu]. > >> > >> > >>> Original: > >>> The use of DHCP to retrieve an authentication domain name was > >>> discussed in Section 7.3.1 of [RFC8310] and in an Internet-Draft > >>> authored by Tom Pusateri and Willem Toorop [I-D.pusateri-dhc-dns- > >>> driu]. > >>> > >>> Possibly *: > >>> An issue related to using DHCP to retrieve an ADN is discussed in > >>> Section 7.3.1 of [RFC8310]. [DNS-TLS-DHCPv6-Options], authored by > >>> Tom Pusateri and Willem Toorop, discusses ways to address the issue. > >>> > >>> * Per this text from [I-D.pusateri-dhc-dns-driu]: > >>> This document was motivated in part by Section 7.3.1 of [RFC8310]. > >>> Thanks to the authors Sara Dickinson, Daniel Kahn Gillmor, and > >>> Tirumaleswar Reddy for documenting the issue. --> > >>> > >>> > >>> 26) <!-- [rfced] Acknowledgments: Please confirm that, unlike the > >>> other individuals listed here, Rich Salz did more than one review > >>> ("secdir reviews"). > >>> > >> > >> [Med] I confirm. > >> > >>> Original: > >>> Thanks to Rich Salz for the secdir reviews, Joe Clarke for the > >>> ops- dir review, Robert Sparks for the artart review, and David > >>> Blacka for the dnsdir review. --> > >>> > >>> > >>> 27) <!-- [rfced] Contributors section: Per RFC 7322 (RFC Style > >>> Guide), we changed "Contributing Authors" to "Contributors". > >>> > >> > >> [Med] OK. > >> > >>> If desired, you can add some information to the Contributors section > >>> to describe their contributions. > >> > >> [Med] No change is needed. > >> > >> If Nicolai Leymann and > >>> Zhiwei Yan should be credited as coauthors, the following could be > >>> added (e.g., see RFC 9089). > >>> Please let us know how you would like to proceed. > >>> > >>> Original: > >>> 11. Contributing Authors > >>> > >>> Nicolai Leymann > >>> ... > >>> > >>> Currently: > >>> Contributors > >>> > >>> Nicolai Leymann > >>> ... > >>> > >>> Possibly: > >>> The following people contributed to the content of this document and > >>> should be considered coauthors: > >>> > >>> Nicolai Leymann > >>> ... --> > >>> > >>> > >>> 28) <!-- [rfced] Please review the "Inclusive Language" portion of > >>> the online Style Guide at > >>> <https://e/ > >>> > ur03.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252 > >>> > 52&data=05%7C01%7CJensen.Thomas%40microsoft.com%7C6cf9d2f7220b40f > a55 > >>> > 1008dbb472b9aa%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638 > 30217 > >>> > 7526017728%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjo > iV2luM > >>> > zIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=5e8REAdr > 7Onr > >>> D3eH5Hb17CPA9oZxsplGH1fCNoYw42U%3D&reserved=0 > >>> Fwww.rfc- > >>> editor.org%2Fstyleguide%2Fpart2%2F%23inclusive_language&data=05%7C > >>> > 01%7Cmohamed.boucadair%40orange.com%7C543c6045d28f493499fe08dbb0 > e0 > >>> > a6ac%7C90c7a20af34b40bfbc48b9253b6f5d20%7C0%7C0%7C6382982514348 > 195 > >>> > 27%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiL > CJ > >>> > BTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=r%2BjtER12cPY > %2B > >>> VIbvQEusFVzZOXp0Z%2F3%2Fu3X%2F7sq85DQ%3D&reserved=0>, > >>> and let us know if any changes are needed. > >>> > >>> Note that our script did not flag any words in particular, but this > >>> should still be reviewed as a best practice. --> > >>> > >> > >> [Med] All seems OK to me. > >> > >>> > >>> 29) <!-- [rfced] The following term appears to be used > >>> inconsistently in this document. Please let us know which form is > >>> preferred. > >>> > >>> Encrypted DNS Option (1 instance - last paragraph of Section 7.1) / > >>> Encrypted DNS option (23 instances) / encrypted DNS option (1 > >>> instance - Section 8, Paragraph 1)* > >>> > >>> * As it appears that the option is of type "Encrypted DNS", we > >>> suggest "Encrypted DNS option". > >>> > >> > >> [Med] Deal! > >> > >>> Also, some field names are quoted, but some are not. Would you like > >>> to apply a consistent style (i.e., all quoted or none quoted)? > >>> Please review usage, and advise. > >>> > >>> For example: > >>> authentication-domain-name field > >>> > >>> Option-length field > >>> > >>> Type and Length fields > >>> > >>> "DNR Instance Data" field > >>> > >>> "Addr Length", "IPv4 Address(es)", and "Service Parameters > >>> (SvcParams)" fields ... --> > >>> > >> > >> [Med] I don't think a change is needed. However, we will report any when > reviewing the edited version. Thanks. > >> > >>> > >>> Thank you. > >>> > >>> RFC Editor/lb/ar > >>> > >>> > >>> On Sep 8, 2023, rfc-editor@rfc-editor.org wrote: > >>> > >> ... > >>> RFC Editor > >>> > >>> -------------------------------------- > >>> RFC9463 (draft-ietf-add-dnr-16) > >>> > >>> Title : DHCP and Router Advertisement Options for the > >>> Discovery of Network-designated Resolvers (DNR) > >>> Author(s) : M. Boucadair, Ed., T. Reddy.K, Ed., D. Wing, N. > >>> Cook, T. Jensen > >>> WG Chair(s) : David C Lawrence, Glenn Deen > >>> Area Director(s) : Erik Kline, Éric Vyncke > >> > ___________________________________________________________________ > __ > >> _______________________________________ > >> Ce message et ses pieces jointes peuvent contenir des informations > >> confidentielles ou privilegiees et ne doivent donc pas etre diffuses, > >> exploites ou copies sans autorisation. Si vous avez recu ce message > >> par erreur, veuillez le signaler a l'expediteur et le detruire ainsi que les pieces > jointes. Les messages electroniques etant susceptibles d'alteration, Orange > decline toute responsabilite si ce message a ete altere, deforme ou falsifie. > Merci. > >> > >> This message and its attachments may contain confidential or > >> privileged information that may be protected by law; they should not be > distributed, used or copied without authorisation. > >> If you have received this email in error, please notify the sender and delete > this message and its attachments. > >> As emails may be altered, Orange is not liable for messages that have been > modified, changed or falsified. > >> Thank you. > >> > >> > >> > > > >
- [auth48] AUTH48: RFC-to-be 9463 <draft-ietf-add-d… rfc-editor
- Re: [auth48] AUTH48: RFC-to-be 9463 <draft-ietf-a… rfc-editor
- Re: [auth48] AUTH48: RFC-to-be 9463 <draft-ietf-a… mohamed.boucadair
- Re: [auth48] AUTH48: RFC-to-be 9463 <draft-ietf-a… mohamed.boucadair
- Re: [auth48] AUTH48: RFC-to-be 9463 <draft-ietf-a… Lynne Bartholomew
- Re: [auth48] AUTH48: RFC-to-be 9463 <draft-ietf-a… Dan Wing
- Re: [auth48] [EXTERNAL] Re: AUTH48: RFC-to-be 946… Tommy Jensen
- Re: [auth48] AUTH48: RFC-to-be 9463 <draft-ietf-a… mohamed.boucadair
- Re: [auth48] AUTH48: RFC-to-be 9463 <draft-ietf-a… tirumal reddy
- Re: [auth48] AUTH48: RFC-to-be 9463 <draft-ietf-a… Neil Cook
- Re: [auth48] AUTH48: RFC-to-be 9463 <draft-ietf-a… Lynne Bartholomew
- Re: [auth48] AUTH48: RFC-to-be 9463 <draft-ietf-a… Dan Wing
- Re: [auth48] AUTH48: RFC-to-be 9463 <draft-ietf-a… Lynne Bartholomew