Re: [auth48] [EXTERNAL] Re: AUTH48: RFC-to-be 9463 <draft-ietf-add-dnr-16> for your review

Tommy Jensen <Jensen.Thomas@microsoft.com> Thu, 14 September 2023 01:48 UTC

Return-Path: <Jensen.Thomas@microsoft.com>
X-Original-To: auth48archive@ietfa.amsl.com
Delivered-To: auth48archive@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 72C6CC152567; Wed, 13 Sep 2023 18:48:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.608
X-Spam-Level:
X-Spam-Status: No, score=-6.608 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLACK=0.5, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id alhLvyqVVsMZ; Wed, 13 Sep 2023 18:48:53 -0700 (PDT)
Received: from BN3PR00CU001.outbound.protection.outlook.com (mail-eastus2azlp170100001.outbound.protection.outlook.com [IPv6:2a01:111:f403:c110::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 81B51C1524AC; Wed, 13 Sep 2023 18:48:53 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=L77m+RlVRLPfITHYOaCGCEklLI/t4rrDsimz69kkdXKttDaD2Ve+rq2Q6NpToC9CZZdZK+LHerUyn4rMkJ4SwAX6eR48HjpnIQNE6OY876C3fgSnVWd+5cUS8n+b7bkeErDDevSY8xsQqpC+B8JMMecgo1o5IPn+MSAXlR7pOelZ2VcC4Fc+ZS5wN1ZSF8jHZUbHzDyKUSKThSpbXKo0lBNgDhasG4vi30If+mDZ0wJ/aRBrpvkkkudG8pMZhNMXECq2dK6t+y24WYMh1TqH7V4FNEFsdNQg49AHV3oIF4IbGXDMLSdzMed8P2aYaH/1voLbqQOva22t/s1xF+1Zxw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=lSHny7y5QvNTfkcmf/BJfmcgTowZb5hIkrMwA0pKV4E=; b=nRk8YQvfGYvlggwO4XYdicjytzlWMzCAszUrzAGdbs6qPrDG2klq1fRxrPSsH0NxK5FUIXL77e9jgmI8zQALyUbphsrrRDg5AxODrOGrOitnOVA6vzHTArB5sWJPzVbiqW87U/svDjKHJz1856CXmrY3/ttCTR8njMs8eCABjJfMbStvoqlzEEewNGW0Bc99/05rSieiiHQPOVqIWD0oHRAigM9hgqNvU8QNPh2PicOVoS2riZ555Em6Z9fqn9hDuwewSCXCtBIP/F9aIRsNmAizNbpOuLo13KO3kgayaPyR6AZJAuclRjRUgVgp3tj6tN2HksNYmmFTk3uzY/REaQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=microsoft.com; dmarc=pass action=none header.from=microsoft.com; dkim=pass header.d=microsoft.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=lSHny7y5QvNTfkcmf/BJfmcgTowZb5hIkrMwA0pKV4E=; b=imFl6mGS9pxVjxLhlr5ogI2BJcJelToQ7sVEYC5jLTkYUsW9cLlpDwTd+Lu5MnqEQ3tY/rlRrfnEKniZIvx7RRFOwfzMxghoYz6dC7H6MP1LUeQaVt/SD1T0tjUAVEBZYHLk8dOAyjVnQta4OeK/56nepyTZ80c48ag5KM0GQ4M=
Received: from CH2PR00MB0854.namprd00.prod.outlook.com (2603:10b6:610:ad::18) by SJ0PR00MB0989.namprd00.prod.outlook.com (2603:10b6:a03:2af::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6836.0; Thu, 14 Sep 2023 01:48:45 +0000
Received: from CH2PR00MB0854.namprd00.prod.outlook.com ([fe80::b96f:8948:75b3:13a3]) by CH2PR00MB0854.namprd00.prod.outlook.com ([fe80::b96f:8948:75b3:13a3%4]) with mapi id 15.20.6837.000; Thu, 14 Sep 2023 01:48:44 +0000
From: Tommy Jensen <Jensen.Thomas@microsoft.com>
To: Dan Wing <dan@danwing.org>, Lynne Bartholomew <lbartholomew@amsl.com>
CC: Mohamed Boucadair <mohamed.boucadair@orange.com>, "rfc-editor@rfc-editor.org" <rfc-editor@rfc-editor.org>, Tirumaleswar Reddy <kondtir@gmail.com>, "dwing-ietf@fuggles.com" <dwing-ietf@fuggles.com>, "neil.cook@noware.co.uk" <neil.cook@noware.co.uk>, "add-ads@ietf.org" <add-ads@ietf.org>, "add-chairs@ietf.org" <add-chairs@ietf.org>, "Andrew.Campling@419.Consulting" <Andrew.Campling@419.Consulting>, Eric Vyncke <evyncke@cisco.com>, "auth48archive@rfc-editor.org" <auth48archive@rfc-editor.org>
Thread-Topic: [EXTERNAL] Re: AUTH48: RFC-to-be 9463 <draft-ietf-add-dnr-16> for your review
Thread-Index: AQHZ5U6z/HBrpGWPykWY8lJEgB/dQrAY5peAgAAF9ICAAKO+YA==
Date: Thu, 14 Sep 2023 01:48:44 +0000
Message-ID: <CH2PR00MB085434AC78378A94EDF50560FAF7A@CH2PR00MB0854.namprd00.prod.outlook.com>
References: <20230909025558.6F9F9E5EA7@rfcpa.amsl.com> <DU2PR02MB101609FC5EE40E76F0869F7F288F1A@DU2PR02MB10160.eurprd02.prod.outlook.com> <FD0ABFC9-8947-439D-B3FE-0B2C5335DD68@amsl.com> <C29330E0-4271-4647-8374-B99AA842591E@danwing.org>
In-Reply-To: <C29330E0-4271-4647-8374-B99AA842591E@danwing.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=microsoft.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: CH2PR00MB0854:EE_|SJ0PR00MB0989:EE_
x-ms-office365-filtering-correlation-id: 7eae6869-2e2f-41ba-cc9e-08dbb4c4bb01
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CH2PR00MB0854.namprd00.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(396003)(39860400002)(376002)(346002)(136003)(366004)(1800799009)(451199024)(186009)(55016003)(71200400001)(83380400001)(8990500004)(66574015)(26005)(66446008)(316002)(66476007)(76116006)(64756008)(54906003)(66556008)(66946007)(110136005)(52536014)(8936002)(8676002)(4326008)(41300700001)(5660300002)(6506007)(9686003)(7696005)(2906002)(30864003)(7416002)(478600001)(966005)(10290500003)(53546011)(33656002)(86362001)(122000001)(82960400001)(82950400001)(38070700005)(38100700002)(579004)(559001)(19607625013); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CH2PR00MB0854.namprd00.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 7eae6869-2e2f-41ba-cc9e-08dbb4c4bb01
X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Sep 2023 01:48:44.7029 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: vJ1v83eM3hQGstWVhPekUJnBFc5ya+wul08kxHaYFdM5mOTr5yIOsRnWhkfNMNIfjSAZbit1h2TPUnLSw8l5Dg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR00MB0989
Archived-At: <https://mailarchive.ietf.org/arch/msg/auth48archive/zaZiWORoAz6INnih2FjYqa4xink>
Subject: Re: [auth48] [EXTERNAL] Re: AUTH48: RFC-to-be 9463 <draft-ietf-add-dnr-16> for your review
X-BeenThere: auth48archive@rfc-editor.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Archiving AUTH48 exchanges between the RFC Production Center, the authors, and other related parties" <auth48archive.rfc-editor.org>
List-Unsubscribe: <https://mailman.rfc-editor.org/mailman/options/auth48archive>, <mailto:auth48archive-request@rfc-editor.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/auth48archive/>
List-Post: <mailto:auth48archive@rfc-editor.org>
List-Help: <mailto:auth48archive-request@rfc-editor.org?subject=help>
List-Subscribe: <https://mailman.rfc-editor.org/mailman/listinfo/auth48archive>, <mailto:auth48archive-request@rfc-editor.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Sep 2023 01:48:57 -0000

Good day Lynne,

All my feedback was accounted for in Med's review. I approve publication of this document.

Thanks,
Tommy

> -----Original Message-----
> From: Dan Wing <dan@danwing.org>
> Sent: Wednesday, September 13, 2023 9:02 AM
> To: Lynne Bartholomew <lbartholomew@amsl.com>
> Cc: Mohamed Boucadair <mohamed.boucadair@orange.com>; rfc-editor@rfc-
> editor.org; Tirumaleswar Reddy <kondtir@gmail.com>; dwing-
> ietf@fuggles.com; neil.cook@noware.co.uk; Tommy Jensen
> <Jensen.Thomas@microsoft.com>; add-ads@ietf.org; add-chairs@ietf.org;
> Andrew.Campling@419.Consulting; Eric Vyncke <evyncke@cisco.com>;
> auth48archive@rfc-editor.org
> Subject: [EXTERNAL] Re: AUTH48: RFC-to-be 9463 <draft-ietf-add-dnr-16> for
> your review
>
> My company name changed.
>
> on title page:
> OLD:
>                                                                  D. Wing
>                                                                   Citrix
> NEW:
>                                                                  D. Wing
>                                                     Cloud Software Group
>
> on authors page:
>
> OLD:
>    Dan Wing
>    Citrix Systems, Inc.
>    United States of America
>    Email: dwing-ietf@fuggles.com
> NEW:
>    Dan Wing
>    Cloud Software Group Holdings, Inc.
>    United States of America
>    Email: dwing-ietf@fuggles.com
>
> Thanks!
>
>
> -d
>
>
>
> > On Sep 13, 2023, at 8:40 AM, Lynne Bartholomew
> <lbartholomew@amsl.com> wrote:
> >
> > Hi, Med.
> >
> > Thank you very much for your prompt and informative replies!  We have
> updated this document per your emails below.
> >
> > The latest files are posted here (please refresh your browser):
> >
> >
> https://www.rfc/
> -
> editor.org%2Fauthors%2Frfc9463.txt&data=05%7C01%7CJensen.Thomas%40mi
> crosoft.com%7C6cf9d2f7220b40fa551008dbb472b9aa%7C72f988bf86f141af91
> ab2d7cd011db47%7C1%7C0%7C638302177525705213%7CUnknown%7CTWF
> pbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI
> 6Mn0%3D%7C3000%7C%7C%7C&sdata=echVnOrVVe9lB49cgCIvjWuU4NZimCy
> BwaZo%2F2EiOjI%3D&reserved=0
> >
> https://www.rfc/
> -
> editor.org%2Fauthors%2Frfc9463.pdf&data=05%7C01%7CJensen.Thomas%40m
> icrosoft.com%7C6cf9d2f7220b40fa551008dbb472b9aa%7C72f988bf86f141af9
> 1ab2d7cd011db47%7C1%7C0%7C638302177525705213%7CUnknown%7CTW
> FpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVC
> I6Mn0%3D%7C3000%7C%7C%7C&sdata=mwjBZXH62GmTvNKTMM9ys2Nei6v
> waJSspR7Yy0whmK8%3D&reserved=0
> >
> https://www.rfc/
> -
> editor.org%2Fauthors%2Frfc9463.html&data=05%7C01%7CJensen.Thomas%40
> microsoft.com%7C6cf9d2f7220b40fa551008dbb472b9aa%7C72f988bf86f141af
> 91ab2d7cd011db47%7C1%7C0%7C638302177525705213%7CUnknown%7CT
> WFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJX
> VCI6Mn0%3D%7C3000%7C%7C%7C&sdata=rqXkN7x2qATiOfN7tgzBI5vVluIVuj
> w6x%2BjvFcG2Ros%3D&reserved=0
> >
> https://www.rfc/
> -
> editor.org%2Fauthors%2Frfc9463.xml&data=05%7C01%7CJensen.Thomas%40m
> icrosoft.com%7C6cf9d2f7220b40fa551008dbb472b9aa%7C72f988bf86f141af9
> 1ab2d7cd011db47%7C1%7C0%7C638302177525705213%7CUnknown%7CTW
> FpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVC
> I6Mn0%3D%7C3000%7C%7C%7C&sdata=lNjZjHfQNpUbeQA8mP%2Fuw01Mce
> VrES%2BpRA1YkA3BAdo%3D&reserved=0
> >
> https://www.rfc/
> -editor.org%2Fauthors%2Frfc9463-
> diff.html&data=05%7C01%7CJensen.Thomas%40microsoft.com%7C6cf9d2f722
> 0b40fa551008dbb472b9aa%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C
> 0%7C638302177525861460%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLj
> AwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C
> %7C&sdata=sn4vtJFcS8joMWk6dd%2B87wmynJdncWj26DTNYukuCOk%3D&res
> erved=0
> >
> https://www.rfc/
> -editor.org%2Fauthors%2Frfc9463-
> rfcdiff.html&data=05%7C01%7CJensen.Thomas%40microsoft.com%7C6cf9d2f7
> 220b40fa551008dbb472b9aa%7C72f988bf86f141af91ab2d7cd011db47%7C1%
> 7C0%7C638302177525861460%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4
> wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C
> %7C%7C&sdata=I9V2XO3BAQKc2X0GjcVhMBKrJQfGMWhFqW2EpTKVNn8%3D
> &reserved=0
> >
> > https://www/.
> > rfc-editor.org%2Fauthors%2Frfc9463-
> auth48diff.html&data=05%7C01%7CJens
> >
> en.Thomas%40microsoft.com%7C6cf9d2f7220b40fa551008dbb472b9aa%7C72
> f988b
> >
> f86f141af91ab2d7cd011db47%7C1%7C0%7C638302177525861460%7CUnkno
> wn%7CTWF
> >
> pbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI
> 6M
> >
> n0%3D%7C3000%7C%7C%7C&sdata=TWcjRwEOB5xKAXumK2CgtXns2uOUfDoA
> Gg2jD6xuut
> > Y%3D&reserved=0
> >
> >
> https://www.rfc/
> -editor.org%2Fauthors%2Frfc9463-alt-
> diff.html&data=05%7C01%7CJensen.Thomas%40microsoft.com%7C6cf9d2f722
> 0b40fa551008dbb472b9aa%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C
> 0%7C638302177525861460%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLj
> AwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C
> %7C&sdata=9nHZ2U220gQCAb6BxF1evg4CiH2RGkpgFHJ6HvGxslI%3D&reserve
> d=0
> >
> https://www.rfc/
> -editor.org%2Fauthors%2Frfc9463-
> xmldiff1.html&data=05%7C01%7CJensen.Thomas%40microsoft.com%7C6cf9d2
> f7220b40fa551008dbb472b9aa%7C72f988bf86f141af91ab2d7cd011db47%7C
> 1%7C0%7C638302177525861460%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiM
> C4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%
> 7C%7C%7C&sdata=GOqfEKxNcKPXVGODamsmkRC8Im4%2Fb1%2B%2FD2t9RTs
> x%2Byg%3D&reserved=0
> >
> https://www.rfc/
> -editor.org%2Fauthors%2Frfc9463-
> xmldiff2.html&data=05%7C01%7CJensen.Thomas%40microsoft.com%7C6cf9d2
> f7220b40fa551008dbb472b9aa%7C72f988bf86f141af91ab2d7cd011db47%7C
> 1%7C0%7C638302177525861460%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiM
> C4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%
> 7C%7C%7C&sdata=YgKmE%2FkougrafcuWzkgmEfsuJ6Uaw9AbjFuzVq3r3zA%3D
> &reserved=0
> >
> > https://www/.
> > rfc-editor.org%2Fauthors%2Frfc9463-alt-diff.html&data=05%7C01%7CJensen
> >
> .Thomas%40microsoft.com%7C6cf9d2f7220b40fa551008dbb472b9aa%7C72f9
> 88bf8
> >
> 6f141af91ab2d7cd011db47%7C1%7C0%7C638302177525861460%7CUnknow
> n%7CTWFpb
> >
> GZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6M
> n0
> >
> %3D%7C3000%7C%7C%7C&sdata=9nHZ2U220gQCAb6BxF1evg4CiH2RGkpgFHJ
> 6HvGxslI%
> > 3D&reserved=0
> >
> > Please review our updates carefully, and let us know if we missed anything.
> >
> > Thanks again for your help!
> >
> > RFC Editor/lb
> >
> >
> >> On Sep 12, 2023, at 4:12 AM, mohamed.boucadair@orange.com wrote:
> >>
> >> Re-,
> >>
> >> Please find below some comments about the edited version:
> >>
> >> (1) Abstract: add a missing "and"
> >>
> >> OLD:
> >>  This document specifies new DHCP and IPv6 Router Advertisement
> >> options to discover encrypted DNS resolvers (e.g., DNS over HTTPS,
> >> DNS over TLS, DNS over QUIC).
> >>
> >> NEW:
> >>
> >>  This document specifies new DHCP and IPv6 Router Advertisement
> >> options to discover encrypted DNS resolvers (e.g., DNS over HTTPS,
> >> DNS over TLS, and DNS over QUIC).
> >>
> >> (2) Introduction: be more explicit this is about discovery of
> >> resolvers
> >>
> >> OLD:
> >>  This document focuses on the discovery of encrypted DNS protocols
> >> such as DNS over HTTPS (DoH) [RFC8484], DNS over TLS (DoT) [RFC7858],
> >> or DNS over QUIC (DoQ) [RFC9250] in local networks.
> >>
> >> NEW:
> >>  This document focuses on the discovery of encrypted DNS resolvers
> >> which are using protocols  such as DNS over HTTPS (DoH) [RFC8484],
> >> DNS over TLS (DoT) [RFC7858],  or DNS over QUIC (DoQ) [RFC9250] in local
> networks.
> >>
> >> (3) Section 3.1.3: simplify the ULA wording
> >>
> >> OLD:
> >>  Whether one or more IP addresses are returned in an Encrypted DNS
> >> option is deployment specific.  For example, a router embedding a
> >> recursive server or a forwarder has to include one single IP address
> >> pointing to one of its LAN-facing interfaces.  Typically, this IP
> >> address can be a private IPv4 address, a Link-Local address, a Unique
> >> Local IPv6 unicast Address (Unique Local Address (ULA)), or a Global
> >> Unicast Address (GUA).
> >>
> >> NEW:
> >>  Whether one or more IP addresses are returned in an Encrypted DNS
> >> option is deployment specific.  For example, a router embedding a
> >> recursive server or a forwarder has to include one single IP address
> >> pointing to one of its LAN-facing interfaces.  Typically, this IP
> >> address can be a private IPv4 address, a Link-Local address, an IPv6
> >> Unique Local Address (ULA), or a Global Unicast Address (GUA).
> >>
> >> (3) Section 4.1: correct an error about the field name
> >>
> >> OLD:
> >>     An example of the authentication-domain-name encoding is shown in
> >>     Figure 2.  This example conveys the FQDN "doh1.example.com.", and
> >>     the resulting Option-length field is 18.
> >>
> >> NEW:
> >>     An example of the authentication-domain-name encoding is shown in
> >>     Figure 2.  This example conveys the FQDN "doh1.example.com.", and
> >>     the resulting ADN Length field is 18.
> >>
> >> (4) Section 6.1: Revert to the initial wording for consistency with
> >> other fields
> >>
> >> OLD:
> >>  Service Priority:  The priority of this Encrypted DNS option instance
> >>     compared to other instances.  This 16-bit unsigned integer is
> >>     interpreted following the rules specified in Section 2.4.1 of
> >>     [RFC9460].
> >>
> >> NEW:
> >>  Service Priority:  16-bit unsigned integer.  The priority of this Encrypted DNS
> option instance
> >>     compared to other instances.  This field is
> >>     interpreted following the rules specified in Section 2.4.1 of
> >>     [RFC9460].
> >>
> >> Thank you.
> >>
> >> Cheers,
> >> Med
> >
> >
> >> On Sep 12, 2023, at 12:56 AM, mohamed.boucadair@orange.com wrote:
> >>
> >> Dear RFC Editor,
> >>
> >> Please see inline.
> >>
> >> I let my co-authors further comments as appropriate.
> >>
> >> Cheers,
> >> Med
> >>
> >>> -----Message d'origine-----
> >>> De : rfc-editor@rfc-editor.org <rfc-editor@rfc-editor.org> Envoyé :
> >>> samedi 9 septembre 2023 04:56 À : BOUCADAIR Mohamed INNOV/NET
> >>> <mohamed.boucadair@orange.com>; kondtir@gmail.com;
> >>> dwing-ietf@fuggles.com; neil.cook@noware.co.uk; tojens@microsoft.com
> >>> Cc : rfc-editor@rfc-editor.org; add-ads@ietf.org; add-
> >>> chairs@ietf.org; Andrew.Campling@419.Consulting; evyncke@cisco.com;
> >>> auth48archive@rfc-editor.org Objet : Re: AUTH48: RFC-to-be 9463
> >>> <draft-ietf-add-dnr-16> for your review
> >>>
> >>> Authors,
> >>>
> >>> While reviewing this document during AUTH48, please resolve (as
> >>> necessary) the following questions, which are also in the XML file.
> >>>
> >>> 1) <!-- [rfced] Abbreviated (running) document title, which appears
> >>> in the PDF:
> >>> FYI, we updated the abbreviated title to "DNR", along the lines of
> >>> the running title "DDR" in the companion document 9462 (draft-
> >>> ietf-add-ddr).
> >>> Please let us know if you prefer otherwise.
> >>>
> >>> Original:
> >>> Internet-Draft  Discovery of Network-designated Resolver April 2023
> >>>
> >>> Current PDF:
> >>> RFC 9463                          DNR
> >>> September 2023
> >>> -->
> >>>
> >>
> >> [Med] OK
> >>
> >>>
> >>> 2) <!-- [rfced] Datatracker "idnits" output for the original
> >>> approved document included the following warning.  Please let us
> >>> know if any changes are needed as related to this warning:
> >>>
> >>> == There are [sic] 1 instance of lines with non-RFC2606-compliant
> >>> FQDNs in the
> >>>   document. -->
> >>>
> >>
> >> [Med] No change is needed. Idnits complains about "a1.a2.a3.a4" but that is
> not a name.
> >>
> >>>
> >>> 3) <!-- [rfced] Section 1:  Please note that companion document
> >>> 9462 (draft-ietf-add-ddr) cites both RFCs 4861 and 8106 when
> >>> referring to IPv6 Router Advertisement options.  We have asked the
> >>> authors of that document if the same RFC should be cited in both
> >>> places.
> >>>
> >>> Please note, however, that we do not see any mention of Router
> >>> Advertisement options in RFC 4861 - only Neighbor Discovery options.
> >>>
> >>> Would you like to see how/if draft-ietf-add-ddr updates its
> >>> comparable citation and update this document (or not) to match?
> >>>
> >>> Original:
> >>> In particular, the document specifies how a local encrypted DNS
> >>> resolver can be discovered by connected hosts by means of DHCPv4
> >>> [RFC2132], DHCPv6 [RFC8415], and IPv6 Router Advertisement (RA)
> >>> [RFC4861] options. -->
> >>>
> >>
> >> [Med] It would be good if DDR aligns with this, but we leave that to DDR
> authors to decide. No change is needed to DNR.
> >>
> >>>
> >>> 4) <!-- [rfced] Section 3:  This sentence did not parse.  We removed
> >>> the colon (":").  If this is incorrect, please clarify "and Neighbor
> >>> Discovery protocol (Section 6): Encrypted DNS options".
> >>>
> >>> Original:
> >>> This document describes how a DNS client can discover local
> >>> encrypted  DNS resolvers using DHCP (Sections 4 and 5) and Neighbor
> >>> Discovery  protocol (Section 6): Encrypted DNS options.
> >>>
> >>> Currently:
> >>> This document describes how a DNS client can discover local
> >>> encrypted  DNS resolvers using DHCP (Sections 4 and 5) and Neighbor
> >>> Discovery protocol (Section 6) Encrypted DNS options. --
> >>>>
> >>>
> >>
> >> [Med] OK.
> >>
> >>>
> >>> 5) <!-- [rfced] Section 3.2:  Should "the encrypted DNS is
> >>> discovered"
> >>> be "encrypted DNS resolvers are discovered"?  If the suggested text
> >>> is not correct, please clarify.
> >>>
> >>> Original:
> >>> If the encrypted DNS is discovered by a host using both RA and DHCP,
> >>> the rules discussed in Section 5.3.1 of [RFC8106] MUST be followed.
> >>>
> >>> Suggested:
> >>> If encrypted DNS resolvers are discovered by a host using both RA
> >>> and DHCP, the rules discussed in Section 5.3.1 of [RFC8106] MUST be
> >>> followed. -->
> >>>
> >>
> >> [Med] The suggested text is better. Thanks.
> >>
> >>>
> >>> 6) <!-- [rfced] Section 3.3:  As [I-D.ietf-dnsop-svcb-https] does
> >>> not have a Section 6.1 and the title of its Section 7.1 is '"alpn"
> >>> and "no-default-alpn"', we updated the cited section number
> >>> accordingly.
> >>> If this is incorrect, please provide the correct citation.
> >>>
> >>> Original:
> >>> ALPN-related considerations can be found in Section 6.1 of  [I-
> >>> D.ietf-dnsop-svcb-https].
> >>>
> >>> Currently:
> >>> ALPN-related considerations
> >>> can be found in Section 7.1 of [RFC9460].
> >>>
> >>
> >> [Med] Good catch. Thanks.
> >>
> >>> (see
> >>> https://eu/
> >>>
> r03.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252F
> >>>
> &data=05%7C01%7CJensen.Thomas%40microsoft.com%7C6cf9d2f7220b40fa5
> 510
> >>>
> 08dbb472b9aa%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C63830
> 21775
> >>>
> 25861460%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV
> 2luMzI
> >>>
> iLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=s9u8Sfpa0p
> eIJS
> >>> pyXQgKq3fcu6LjvQwFwnqY6g472E4%3D&reserved=0
> >>>
> http://www/
> >>> .rfc-
> editor.org%2F&data=05%7C01%7CJensen.Thomas%40microsoft.com%7C6c
> >>>
> f9d2f7220b40fa551008dbb472b9aa%7C72f988bf86f141af91ab2d7cd011db47
> %7C
> >>>
> 1%7C0%7C638302177525861460%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiM
> C4wLjAwM
> >>>
> DAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C
> &sd
> >>>
> ata=tiTlhVVCqrLaoYYKiNrYAPUvQvNyIetcEFBNBtdv6lY%3D&reserved=0%2Fauth
> >>> ors%2Frfc9460.html%23section-
> >>>
> 7.1&data=05%7C01%7Cmohamed.boucadair%40orange.com%7C543c6045d28f
> 49
> >>>
> 3499fe08dbb0e0a6ac%7C90c7a20af34b40bfbc48b9253b6f5d20%7C0%7C0%7
> C63
> >>>
> 8298251434819527%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAi
> LCJQI
> >>>
> joiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=p
> Z
> >>>
> PbJQ35JUDdQ5%2BjFN%2FMa3yPBZV4qKOr4gGsNOSjxsk%3D&reserved=0)-->
> >>>
> >>>
> >>> 7) <!-- [rfced] Section 3.4:  This sentence does not parse.  If the
> >>> suggested text is not correct, please provide clarifying text.
> >>>
> >>> Original:
> >>> Such considerations fall under the generic issue of handling
> >>> multiple  provisioning sources and which should not be dealt within
> >>> each option  separately as per the recommendation in Section 12 of
> >>> [RFC7227].
> >>>
> >>> Suggested:
> >>> Such considerations fall under the generic issue of handling
> >>> multiple  provisioning sources and should not be processed in each
> >>> option  separately, as per the recommendation in Section 12 of
> >>> [RFC7227]. -->
> >>>
> >>
> >> [Med] OK.
> >>
> >>>
> >>> 8) <!-- [rfced] Should any of the artwork elements (<artwork>) be
> >>> tagged as sourcecode or another element?  Please review
> >>> <https://e/
> >>>
> ur03.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252
> >>>
> 52&data=05%7C01%7CJensen.Thomas%40microsoft.com%7C6cf9d2f7220b40f
> a55
> >>>
> 1008dbb472b9aa%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638
> 30217
> >>>
> 7525861460%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjo
> iV2luM
> >>>
> zIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=8mWwuV
> 5h2AJZ
> >>> tIh4rVLkfE0nxX7mHjbUWcDA6XCb6kk%3D&reserved=0
> >>> Fwww.rfc-editor.org%2Fmaterials%2Fsourcecode-
> >>>
> types.txt&data=05%7C01%7Cmohamed.boucadair%40orange.com%7C543c604
> 5
> >>>
> d28f493499fe08dbb0e0a6ac%7C90c7a20af34b40bfbc48b9253b6f5d20%7C0%
> 7C
> >>>
> 0%7C638298251434819527%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLj
> AwMDA
> >>>
> iLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sd
> >>>
> ata=22kRc4mRl1dWX6EBtFHzoKXIIxeLW5WtAPemy4BJDPE%3D&reserved=0>; if
> >>> the current list of preferred values for "type" does not contain an
> >>> applicable type, please let us know.  Also, it is acceptable to
> >>> leave the "type" attribute not set. -->
> >>>
> >>>
> >>
> >> [Med] We don't have a suitable type for the ones in the draft. We can leave
> this unset.
> >>
> >>> 9) <!-- [rfced] Sections 4.1 and 5.1:  These definitions read oddly,
> >>> as the items preceding the colon are not the field name, unlike all
> >>> of the other field entries that follow each of them.
> >>> May we update as suggested?
> >>>
> >>> Original:
> >>> Option-code:  OPTION_V6_DNR (TBA1, see Section 9.1) ...
> >>> Code:  OPTION_V4_DNR (TBA2, see Section 9.2).
> >>>
> >>
> >> [Med] Please keep the original as this is a convention used in DHCP
> documents. Thanks.
> >>
> >>> Perhaps:
> >>> OPTION_V6_DNR:  An Option Code (144; see Section 9.1).
> >>> ...
> >>> OPTION_V4_DNR:  An Option Code (162; see Section 9.2). -->
> >>>
> >>>
> >>> 10) <!-- [rfced] Figure 3:  We changed the field name in the diagram
> >>> from "ipv6-address" to "ipv6-address(es)" per usage in the rest of
> >>> this document (e.g., "shown in Figure 3" in Section 6.1) and also
> >>> updated the figure title accordingly.  Please let us know any
> >>> objections.
> >>>
> >>> Original:
> >>> |                         ipv6-address                          |
> >>> ...
> >>> Figure 3: Format of the IPv6 Addresses Field
> >>>
> >>> Currently:
> >>> |                       ipv6-address(es)                        |
> >>> ...
> >>
> >> [Med] Please keep the original figure as it is correct. Each field includes only
> one IP address, but multiple fields with each an IP address can be included if
> needed.
> >>
> >>> Figure 3: Format of the ipv6-address(es) Field -->
> >>>
> >>>
> >>
> >> [Med] OK to update the title as suggested.
> >>
> >>
> >>> 11) <!-- [rfced] Section 4.2:  Section 18.2.5 of RFC 8415 does not
> >>> explicitly mention the Option Request Option or "ORO".  Please
> >>> confirm that the citation for Section 18.2.5 of RFC 8415 will be
> >>> clear to readers.
> >>>
> >>> Original:
> >>> To discover an encrypted DNS resolver, the DHCPv6 client MUST
> >>> include  OPTION_V6_DNR in an Option Request Option (ORO), as in
> >>> Sections  18.2.1, 18.2.2, 18.2.4, 18.2.5, 18.2.6, and 21.7 of
> >>> [RFC8415]. -->
> >>>
> >>
> >> [Med] The original text is OK as that section is explicitly listed in the
> template in
> https://datatrac/
> ker.ietf.org%2Fdoc%2Fhtml%2Frfc7227%23section-
> 21&data=05%7C01%7CJensen.Thomas%40microsoft.com%7C6cf9d2f7220b40f
> a551008dbb472b9aa%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C
> 638302177525861460%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwM
> DAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C
> &sdata=rTztMNNZBmIYro%2FiUxUELd27WAwnzpVxhSvxpnEUKz4%3D&reserve
> d=0 (cited as 18.1.4 of 3315 which was replaced since then by RFC8415).
> >>
> >>>
> >>> 12) <!-- [rfced] Section 5.2:  Should 'multiple DNR instance data'
> >>> be 'multiple "DNR Instance Data" field entries' here?  If the
> >>> suggested text is not correct, please provide clarifying text.
> >>>
> >>> Original:
> >>> The DHCPv4 client MUST be prepared to receive multiple DNR instance
> >>> data in the OPTION_V4_DNR option; each instance is to be treated as
> >>> a  separate encrypted DNS resolver.
> >>>
> >>> Suggested:
> >>> The DHCPv4 client MUST be prepared to receive multiple "DNR Instance
> >>> Data" field entries in the OPTION_V4_DNR option; each instance is to
> >>> be treated as a separate encrypted DNS resolver. -
> >>> ->
> >>
> >> [Med] Works for me.
> >>>
> >>>
> >>> 13) <!-- [rfced] Section 6.1:  We see that Figure 7 has the
> >>> "0 ... 1 ... 2 ... 3" ruler markers above the
> >>> "0 1 2 3 4 5 6 7 8 9 ..." ruler lines but Figures 1 and 3 do not.
> >>> (We're not sure whether or not Figures 4 and 5 would also apply
> >>> here.)  Would you like to place additional ruler-marker lines over
> >>> Figures 1 and 3, and perhaps Figures 4 and 5?  (For example, similar
> >>> figures in companion document 9464 (draft-ietf-ipsecme-
> >>> add-ike) all include the additional ruler-marker line.)
> >>>
> >>> Original (best viewed with a fixed-point font such as Courier):
> >>> 0                   1                   2                   3
> >>> 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 -
> >>> ->
> >>>
> >>
> >> [Med] OK to add those to Figures 1/3 and similar line to Figures 4/5.
> >>
> >>>
> >>> 14) <!-- [rfced] Section 6.1: FYI, in Figure 7, rather than insert
> >>> the value for TBA3 (144), we put the word "Type" to correspond to
> >>> the text below the figure. Please let us know if you prefer
> >>> otherwise.
> >>>
> >>> Original:
> >>> |     TBA3      |     Length    |        Service Priority       |
> >>>
> >>> Current:
> >>> |     Type      |     Length    |        Service Priority       |
> >>> -->
> >>>
> >>>
> >>
> >> [Med] OK.
> >>
> >>> 15) <!-- [rfced] Section 6.1:  We changed 'Service Parameters field'
> >>> to '"Service Parameters (SvcParams)" field' per the field name.
> >>> Please let us know any objections.
> >>>
> >>> Original:
> >>> SvcParams Length:  16-bit unsigned integer.  This field indicates
> >>> the
> >>>   length of the Service Parameters field in octets.
> >>>
> >>> Currently:
> >>> SvcParams Length:  16-bit unsigned integer.  This field indicates
> >>> the
> >>>   length of the "Service Parameters (SvcParams)" field in octets.
> >>> -->
> >>>
> >>>
> >>
> >> [Med] OK.
> >>
> >>> 16) <!-- [rfced] Section 7.1:  We defined "CA" as "Certificate
> >>> Authority"
> >>> per companion document 9464 (draft-ietf-ipsecme-add-ike).  If this
> >>> is incorrect, please provide the correct definition.
> >>>
> >>> Original:
> >>> The attacker can get a domain name with a domain-  validated public
> >>> certificate from a CA and host an encrypted DNS  resolver.
> >>>
> >>> Currently:
> >>> The attacker can get a domain name with a domain-  validated public
> >>> certificate from a Certificate Authority (CA) and  host an encrypted
> >>> DNS resolver. -->
> >>>
> >>>
> >>
> >> [Med] OK.
> >>
> >>> 17) <!-- [rfced] Section 7.1:  It appears that "but cannot provide"
> >>> refers to the endpoint, but does it refer to the mechanisms?
> >>
> >> [Med] It refers to the mechanisms.
> >>
> >> If
> >>> the endpoint, may we update as suggested?
> >>>
> >>> Original:
> >>> The above mechanisms would ensure that the endpoint receives the
> >>> correct configuration information of the encrypted DNS resolvers
> >>> selected by the DHCP server (or RA sender), but cannot provide any
> >>> information about the DHCP server or the entity hosting the DHCP
> >>> server (or RA sender).
> >>>
> >>> Suggested ("endpoint can receive ... but cannot provide"):
> >>> The above mechanisms would ensure that the endpoint can receive the
> >>> correct configuration information of the encrypted DNS resolvers
> >>> selected by the DHCP server (or RA sender) but cannot provide any
> >>> information about the DHCP server or the entity hosting the DHCP
> >>> server (or RA sender). -->
> >>>
> >>>
> >>> 18) <!-- [rfced] Section 7.4:  We see that "PSK" has been defined
> >>> but not "WPA".  Will this abbreviation be clear to readers?  If not,
> >>> how should it be defined?
> >>>
> >>> Original:
> >>> If the pre-shared key (PSK) is the same for all clients that connect
> >>> to the same WLAN (e.g., WPA-PSK), the shared key will be available
> >>> to  all nodes, including attackers.
> >>>
> >>> Possibly:
> >>> If the pre-shared key (PSK) is the same for all clients that connect
> >>> to the same WLAN (e.g., Wi-Fi Protected Access Pre-Shared Key
> >>> (WPA-PSK)), the shared key will be available to all nodes, including
> >>> attackers. -->
> >>>
> >>
> >> [Med] ACK.
> >>
> >>>
> >>> 19) <!-- [rfced] Section 8:  To what does "but does not" refer in
> >>> this sentence - the mechanism, or the DHCP client or IPv6 host?
> >>>
> >>
> >> [Med] This refers to the mechanisms.
> >>
> >>> Also, we see "mechanisms specified in this document" in Sections
> >>> 3.1.9 and 3.4.  Which mechanism is referred to here?
> >>>
> >>
> >> [Med] We refer to all of them. Please make this change: s/mechanism
> >> defined/mechanisms defined
> >>
> >>> Original:
> >>> The
> >>> mechanism defined in this document can be used to infer that a DHCP
> >>> client or IPv6 host support encrypted DNS options, but does not
> >>> explicitly reveal whether local DNS clients are able to consume
> >>> these  options or infer their encryption capabilities. -->
> >>>
> >>>
> >>> 20) <!-- [rfced] References:  We could not find a connection between
> >>> the Unicode Consortium and the [Evil-Twin] Wikipedia page.
> >>> If the "Possibly" text is not correct, please provide an appropriate
> >>> URL for "Evil twin (wireless networks)".
> >>>
> >>> Original:
> >>> [Evil-Twin]
> >>>           The Unicode Consortium, "Evil twin (wireless networks)",
> >>>
> >>> <https://e/
> >>>
> ur03.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252
> >>>
> 52&data=05%7C01%7CJensen.Thomas%40microsoft.com%7C6cf9d2f7220b40f
> a55
> >>>
> 1008dbb472b9aa%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638
> 30217
> >>>
> 7525861460%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjo
> iV2luM
> >>>
> zIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=8mWwuV
> 5h2AJZ
> >>> tIh4rVLkfE0nxX7mHjbUWcDA6XCb6kk%3D&reserved=0
> >>>
> Fen.wikipedia.org%2Fwiki%2F&data=05%7C01%7Cmohamed.boucadair%40ora
> >>>
> nge.com%7C543c6045d28f493499fe08dbb0e0a6ac%7C90c7a20af34b40bfbc48
> b
> >>>
> 9253b6f5d20%7C0%7C0%7C638298251434819527%7CUnknown%7CTWFpbG
> Zsb3d8e
> >>>
> yJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%
> >>>
> 7C3000%7C%7C%7C&sdata=NObhhyKiZa0tBeo4TFNWs5H9tW7BtZJBbkucSTIOA
> oQ%
> >>> 3D&reserved=0
> >>>           Evil_twin_(wireless_networks)>.
> >>>
> >>> Possibly:
> >>> [Evil-Twin]
> >>>           Wikipedia, "Evil twin (wireless networks)", November
> >>>           2022
> >>> <https://e/
> >>>
> ur03.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252
> >>>
> 52&data=05%7C01%7CJensen.Thomas%40microsoft.com%7C6cf9d2f7220b40f
> a55
> >>>
> 1008dbb472b9aa%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638
> 30217
> >>>
> 7525861460%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjo
> iV2luM
> >>>
> zIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=8mWwuV
> 5h2AJZ
> >>> tIh4rVLkfE0nxX7mHjbUWcDA6XCb6kk%3D&reserved=0
> >>>
> Fen.wikipedia.org%2Fwiki%2F&data=05%7C01%7Cmohamed.boucadair%40ora
> >>>
> nge.com%7C543c6045d28f493499fe08dbb0e0a6ac%7C90c7a20af34b40bfbc48
> b
> >>>
> 9253b6f5d20%7C0%7C0%7C638298251434819527%7CUnknown%7CTWFpbG
> Zsb3d8e
> >>>
> yJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%
> >>>
> 7C3000%7C%7C%7C&sdata=NObhhyKiZa0tBeo4TFNWs5H9tW7BtZJBbkucSTIOA
> oQ%
> >>> 3D&reserved=0
> >>>           Evil_twin_(wireless_networks)>. -->
> >>>
> >>>
> >>
> >> [Med] Works for me. Thanks.
> >>
> >>> 21) <!-- [rfced] References:  We could not find a connection between
> >>> the Unicode Consortium and the [Krack] paper.  Should author Mathy
> >>> Vanhoef be listed instead?
> >>>
> >>
> >> [Med] Yes, please.
> >>
> >>> Also, please confirm that the provided URL is stable.
> >>
> >> [Med] We can use this more stable link: "
> https://dl.acm.o/
> rg%2Fdoi%2F10.1145%2F3133956.3134027&data=05%7C01%7CJensen.Thoma
> s%40microsoft.com%7C6cf9d2f7220b40fa551008dbb472b9aa%7C72f988bf86f
> 141af91ab2d7cd011db47%7C1%7C0%7C638302177525861460%7CUnknown
> %7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWw
> iLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=K79122lXLiflxu4rTkb0kXD4eW
> ILoYr7trmWaJuBatM%3D&reserved=0". Please update also the title to "Key
> Reinstallation Attacks: Forcing Nonce Reuse in WPA2".
> >>
> >>>
> >>> Original:
> >>> [Krack]    The Unicode Consortium, "Key Reinstallation Attacks",
> >>>           2017,
> >>> <https://e/
> >>>
> ur03.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252
> >>>
> 52&data=05%7C01%7CJensen.Thomas%40microsoft.com%7C6cf9d2f7220b40f
> a55
> >>>
> 1008dbb472b9aa%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638
> 30217
> >>>
> 7525861460%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjo
> iV2luM
> >>>
> zIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=8mWwuV
> 5h2AJZ
> >>> tIh4rVLkfE0nxX7mHjbUWcDA6XCb6kk%3D&reserved=0
> >>>
> Fwww.krackattacks.com%2F&data=05%7C01%7Cmohamed.boucadair%40orang
> e
> >>>
> .com%7C543c6045d28f493499fe08dbb0e0a6ac%7C90c7a20af34b40bfbc48b9
> 25
> >>>
> 3b6f5d20%7C0%7C0%7C638298251434819527%7CUnknown%7CTWFpbGZsb3
> d8eyJW
> >>>
> IjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3
> >>>
> 000%7C%7C%7C&sdata=MSuNjA%2BB3M5PfKmff2fVBqrp1S%2FeunV0G8C6gta
> 1rdI
> >>> %3D&reserved=0>. -->
> >>>
> >>>
> >>> 22) <!-- [rfced] References:  We could not find a connection between
> >>> the Unicode Consortium and the [Dragonblood] paper.  Also, the
> >>> provided URL appears to be a personal URL.
> >>>
> >>> Will the currently listed URL remain stable?  Is there a site
> >>> related to the Unicode Consortium that also provides this paper?
> >>> If not, should the authors (Mathy Vanhoef and Eyal Ronen) be
> >>> credited?
> >>>
> >>
> >> [Med] We can cite the authors + use this stable link instead
> (https://ieeexpl/
> ore.ieee.org%2Fdocument%2F9152782&data=05%7C01%7CJensen.Thomas%40
> microsoft.com%7C6cf9d2f7220b40fa551008dbb472b9aa%7C72f988bf86f141af
> 91ab2d7cd011db47%7C1%7C0%7C638302177526017728%7CUnknown%7CT
> WFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJX
> VCI6Mn0%3D%7C3000%7C%7C%7C&sdata=qbBBrF0tVn6c5ZbQs%2B9yDCEub
> MXD%2B%2BuUX8DjcNQdHpE%3D&reserved=0).
> >>
> >>> Original:
> >>> [Dragonblood]
> >>>           The Unicode Consortium, "Dragonblood: Analyzing the
> >>>           Dragonfly Handshake of WPA3 and EAP-pwd",
> >>>
> >>> <https://e/
> >>>
> ur03.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252
> >>>
> 52&data=05%7C01%7CJensen.Thomas%40microsoft.com%7C6cf9d2f7220b40f
> a55
> >>>
> 1008dbb472b9aa%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638
> 30217
> >>>
> 7526017728%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjo
> iV2luM
> >>>
> zIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=5e8REAdr
> 7Onr
> >>> D3eH5Hb17CPA9oZxsplGH1fCNoYw42U%3D&reserved=0
> >>>
> Fpapers.mathyvanhoef.com%2Fdragonblood.pdf&data=05%7C01%7Cmohamed
> .
> >>>
> boucadair%40orange.com%7C543c6045d28f493499fe08dbb0e0a6ac%7C90c7a
> 2
> >>>
> 0af34b40bfbc48b9253b6f5d20%7C0%7C0%7C638298251434819527%7CUnkn
> own%
> >>>
> 7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwi
> >>>
> LCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=Fofu9ZA4AqH1JiT5aAJNvLU9V
> Qipk
> >>> qMwRVkQbZMVdYc%3D&reserved=0>. -->
> >>>
> >>>
> >>> 23) <!-- [rfced] References:  We could not find any mention of Cisco
> >>> on the provided web page.  We updated this listing as noted below.
> >>> If this is incorrect, please provide the correct title and the
> >>> matching URL.
> >>>
> >>> Original:
> >>> [dot1x]    Cisco, "Basic 802.1x Wireless User Authentication",
> >>>
> >>> <https://e/
> >>>
> ur03.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252
> >>>
> 52&data=05%7C01%7CJensen.Thomas%40microsoft.com%7C6cf9d2f7220b40f
> a55
> >>>
> 1008dbb472b9aa%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638
> 30217
> >>>
> 7526017728%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjo
> iV2luM
> >>>
> zIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=5e8REAdr
> 7Onr
> >>> D3eH5Hb17CPA9oZxsplGH1fCNoYw42U%3D&reserved=0
> >>> Fopenwrt.org%2Fdocs%2Fguide-
> >>>
> user%2Fnetwork%2Fwifi%2F&data=05%7C01%7Cmohamed.boucadair%40oran
> ge
> >>>
> .com%7C543c6045d28f493499fe08dbb0e0a6ac%7C90c7a20af34b40bfbc48b9
> 25
> >>>
> 3b6f5d20%7C0%7C0%7C638298251434819527%7CUnknown%7CTWFpbGZsb3
> d8eyJW
> >>>
> IjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3
> >>>
> 000%7C%7C%7C&sdata=gL6D7KzP2AvooWUD%2BTo92r0eh6U40nJIjjXkM8Rrzo
> I%3
> >>> D&reserved=0
> >>>           wireless.security.8021x>.
> >>>
> >>> Currently:
> >>> [dot1x]    OpenWrt, "Introduction to 802.1X", December 2021,
> >>>
> >>> <https://e/
> >>>
> ur03.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252
> >>>
> 52&data=05%7C01%7CJensen.Thomas%40microsoft.com%7C6cf9d2f7220b40f
> a55
> >>>
> 1008dbb472b9aa%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638
> 30217
> >>>
> 7526017728%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjo
> iV2luM
> >>>
> zIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=5e8REAdr
> 7Onr
> >>> D3eH5Hb17CPA9oZxsplGH1fCNoYw42U%3D&reserved=0
> >>> Fopenwrt.org%2Fdocs%2Fguide-
> >>>
> user%2Fnetwork%2Fwifi%2F&data=05%7C01%7Cmohamed.boucadair%40oran
> ge
> >>>
> .com%7C543c6045d28f493499fe08dbb0e0a6ac%7C90c7a20af34b40bfbc48b9
> 25
> >>>
> 3b6f5d20%7C0%7C0%7C638298251434819527%7CUnknown%7CTWFpbGZsb3
> d8eyJW
> >>>
> IjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3
> >>>
> 000%7C%7C%7C&sdata=gL6D7KzP2AvooWUD%2BTo92r0eh6U40nJIjjXkM8Rrzo
> I%3
> >>> D&reserved=0
> >>>           wireless.security.8021x>. -->
> >>>
> >>
> >> [Med] Works for me.
> >>
> >>>
> >>> 24) <!-- [rfced] References:  We see on the provided URL, under the
> >>> "Versions" tab, that quite a few versions have been added since
> >>> December 2019 (Release 16.3.0).  Should this listing be updated?
> >>> We see that the latest version (Release 18 / version 18.3.0, dated
> >>> June 2023) also mentions "protocol configuration options" and
> >>> "ePCO".
> >>>
> >>
> >> [Med] Thank you for checking. We can update the reference entry to point to
> the latest rel/ver.
> >>
> >>> Original:
> >>> [TS.24008] 3GPP, "Mobile radio interface Layer 3 specification; Core
> >>>           network protocols; Stage 3 (Release 16)", December 2019,
> >>>
> >>> <https://e/
> >>>
> ur03.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252
> >>>
> 52&data=05%7C01%7CJensen.Thomas%40microsoft.com%7C6cf9d2f7220b40f
> a55
> >>>
> 1008dbb472b9aa%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638
> 30217
> >>>
> 7526017728%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjo
> iV2luM
> >>>
> zIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=5e8REAdr
> 7Onr
> >>> D3eH5Hb17CPA9oZxsplGH1fCNoYw42U%3D&reserved=0
> >>>
> Fwww.3gpp.org%2FDynaReport%2F24008.htm&data=05%7C01%7Cmohamed.
> bouc
> >>>
> adair%40orange.com%7C543c6045d28f493499fe08dbb0e0a6ac%7C90c7a20af
> 3
> >>>
> 4b40bfbc48b9253b6f5d20%7C0%7C0%7C638298251434819527%7CUnknown
> %7CTW
> >>>
> FpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJX
> >>>
> VCI6Mn0%3D%7C3000%7C%7C%7C&sdata=0nbE1Xf4OHcuFGd0NTLCXVFtuEaY
> 1am9%
> >>> 2BprJtryl3ew%3D&reserved=0>. -->
> >>>
> >>>
> >>> 25) <!-- [rfced] Acknowledgments:  We found this sentence confusing,
> >>> as Section 7.3.1 of [RFC8310] says "... does not provide an
> >>> authentication domain name for the DNS resolver" and "This document
> >>> does not specify or request any DHCP extension to provide
> >>> authentication domain names".  The current text seems to indicate
> >>> the opposite.  Will this text be clear to readers, or should it be
> >>> updated?
> >>>
> >>
> >> [Med] That text is meant to ACK that RFC8310 identified DHCP as a
> candidate to convey ADN (although it does not specify how). What about:
> >>
> >> NEW:
> >>
> >>  The use of DHCP as a candidate protocol to retrieve an
> >> authentication domain name was  mentioned in Section 7.3.1 of
> >> [RFC8310] and in an Internet-Draft  authored by Tom Pusateri and
> >> Willem Toorop  [I-D.pusateri-dhc-dns-driu].
> >>
> >>
> >>> Original:
> >>> The use of DHCP to retrieve an authentication domain name was
> >>> discussed in Section 7.3.1 of [RFC8310] and in an Internet-Draft
> >>> authored by Tom Pusateri and Willem Toorop  [I-D.pusateri-dhc-dns-
> >>> driu].
> >>>
> >>> Possibly *:
> >>> An issue related to using DHCP to retrieve an ADN is discussed in
> >>> Section 7.3.1 of [RFC8310].  [DNS-TLS-DHCPv6-Options], authored by
> >>> Tom Pusateri and Willem Toorop, discusses ways to address the issue.
> >>>
> >>> * Per this text from [I-D.pusateri-dhc-dns-driu]:
> >>> This document was motivated in part by Section 7.3.1 of [RFC8310].
> >>> Thanks to the authors Sara Dickinson, Daniel Kahn Gillmor, and
> >>> Tirumaleswar Reddy for documenting the issue. -->
> >>>
> >>>
> >>> 26) <!-- [rfced] Acknowledgments:  Please confirm that, unlike the
> >>> other individuals listed here, Rich Salz did more than one review
> >>> ("secdir reviews").
> >>>
> >>
> >> [Med] I confirm.
> >>
> >>> Original:
> >>> Thanks to Rich Salz for the secdir reviews, Joe Clarke for the
> >>> ops-  dir review, Robert Sparks for the artart review, and David
> >>> Blacka for  the dnsdir review. -->
> >>>
> >>>
> >>> 27) <!-- [rfced] Contributors section:  Per RFC 7322 (RFC Style
> >>> Guide), we changed "Contributing Authors" to "Contributors".
> >>>
> >>
> >> [Med] OK.
> >>
> >>> If desired, you can add some information to the Contributors section
> >>> to describe their contributions.
> >>
> >> [Med] No change is needed.
> >>
> >> If Nicolai Leymann and
> >>> Zhiwei Yan should be credited as coauthors, the following could be
> >>> added (e.g., see RFC 9089).
> >>> Please let us know how you would like to proceed.
> >>>
> >>> Original:
> >>> 11.  Contributing Authors
> >>>
> >>>   Nicolai Leymann
> >>> ...
> >>>
> >>> Currently:
> >>> Contributors
> >>>
> >>>   Nicolai Leymann
> >>> ...
> >>>
> >>> Possibly:
> >>> The following people contributed to the content of this document and
> >>> should be considered coauthors:
> >>>
> >>>   Nicolai Leymann
> >>> ... -->
> >>>
> >>>
> >>> 28) <!-- [rfced] Please review the "Inclusive Language" portion of
> >>> the online Style Guide at
> >>> <https://e/
> >>>
> ur03.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252
> >>>
> 52&data=05%7C01%7CJensen.Thomas%40microsoft.com%7C6cf9d2f7220b40f
> a55
> >>>
> 1008dbb472b9aa%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638
> 30217
> >>>
> 7526017728%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjo
> iV2luM
> >>>
> zIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=5e8REAdr
> 7Onr
> >>> D3eH5Hb17CPA9oZxsplGH1fCNoYw42U%3D&reserved=0
> >>> Fwww.rfc-
> >>> editor.org%2Fstyleguide%2Fpart2%2F%23inclusive_language&data=05%7C
> >>>
> 01%7Cmohamed.boucadair%40orange.com%7C543c6045d28f493499fe08dbb0
> e0
> >>>
> a6ac%7C90c7a20af34b40bfbc48b9253b6f5d20%7C0%7C0%7C6382982514348
> 195
> >>>
> 27%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiL
> CJ
> >>>
> BTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=r%2BjtER12cPY
> %2B
> >>> VIbvQEusFVzZOXp0Z%2F3%2Fu3X%2F7sq85DQ%3D&reserved=0>,
> >>> and let us know if any changes are needed.
> >>>
> >>> Note that our script did not flag any words in particular, but this
> >>> should still be reviewed as a best practice. -->
> >>>
> >>
> >> [Med] All seems OK to me.
> >>
> >>>
> >>> 29) <!-- [rfced] The following term appears to be used
> >>> inconsistently in this document.  Please let us know which form is
> >>> preferred.
> >>>
> >>> Encrypted DNS Option (1 instance - last paragraph of Section 7.1) /
> >>> Encrypted DNS option (23 instances) /  encrypted DNS option (1
> >>> instance - Section 8, Paragraph 1)*
> >>>
> >>> * As it appears that the option is of type "Encrypted DNS", we
> >>> suggest "Encrypted DNS option".
> >>>
> >>
> >> [Med] Deal!
> >>
> >>> Also, some field names are quoted, but some are not.  Would you like
> >>> to apply a consistent style (i.e., all quoted or none quoted)?
> >>> Please review usage, and advise.
> >>>
> >>> For example:
> >>> authentication-domain-name field
> >>>
> >>> Option-length field
> >>>
> >>> Type and Length fields
> >>>
> >>> "DNR Instance Data" field
> >>>
> >>> "Addr Length", "IPv4 Address(es)", and "Service Parameters
> >>> (SvcParams)" fields ... -->
> >>>
> >>
> >> [Med] I don't think a change is needed. However, we will report any when
> reviewing the edited version. Thanks.
> >>
> >>>
> >>> Thank you.
> >>>
> >>> RFC Editor/lb/ar
> >>>
> >>>
> >>> On Sep 8, 2023, rfc-editor@rfc-editor.org wrote:
> >>>
> >> ...
> >>> RFC Editor
> >>>
> >>> --------------------------------------
> >>> RFC9463 (draft-ietf-add-dnr-16)
> >>>
> >>> Title            : DHCP and Router Advertisement Options for the
> >>> Discovery of Network-designated Resolvers (DNR)
> >>> Author(s)        : M. Boucadair, Ed., T. Reddy.K, Ed., D. Wing, N.
> >>> Cook, T. Jensen
> >>> WG Chair(s)      : David C Lawrence, Glenn Deen
> >>> Area Director(s) : Erik Kline, Éric Vyncke
> >>
> ___________________________________________________________________
> __
> >> _______________________________________
> >> Ce message et ses pieces jointes peuvent contenir des informations
> >> confidentielles ou privilegiees et ne doivent donc pas etre diffuses,
> >> exploites ou copies sans autorisation. Si vous avez recu ce message
> >> par erreur, veuillez le signaler a l'expediteur et le detruire ainsi que les pieces
> jointes. Les messages electroniques etant susceptibles d'alteration, Orange
> decline toute responsabilite si ce message a ete altere, deforme ou falsifie.
> Merci.
> >>
> >> This message and its attachments may contain confidential or
> >> privileged information that may be protected by law; they should not be
> distributed, used or copied without authorisation.
> >> If you have received this email in error, please notify the sender and delete
> this message and its attachments.
> >> As emails may be altered, Orange is not liable for messages that have been
> modified, changed or falsified.
> >> Thank you.
> >>
> >>
> >>
> >
> >