Re: [CDNi] Request for feedback on the 3 SVTA drafts presented at IETF116
Kevin Ma <kevin.j.ma.ietf@gmail.com> Tue, 05 September 2023 02:27 UTC
Return-Path: <kevin.j.ma.ietf@gmail.com>
X-Original-To: cdni@ietfa.amsl.com
Delivered-To: cdni@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BF9EDC14CE22 for <cdni@ietfa.amsl.com>; Mon, 4 Sep 2023 19:27:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.104
X-Spam-Level:
X-Spam-Status: No, score=-2.104 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Equm0Nxv7pN1 for <cdni@ietfa.amsl.com>; Mon, 4 Sep 2023 19:27:27 -0700 (PDT)
Received: from mail-lf1-x132.google.com (mail-lf1-x132.google.com [IPv6:2a00:1450:4864:20::132]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2CB12C14CF17 for <cdni@ietf.org>; Mon, 4 Sep 2023 19:27:27 -0700 (PDT)
Received: by mail-lf1-x132.google.com with SMTP id 2adb3069b0e04-4ff09632194so3417695e87.2 for <cdni@ietf.org>; Mon, 04 Sep 2023 19:27:27 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20221208; t=1693880845; x=1694485645; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=irOldvKP1sOhSqILoYOxprcJwyTmKigNDAmbbyLDtyM=; b=WeFFVjh/HTLVpz6e/em8mZWk9uuRQvW7G9DwCo1KP2rlK7dR/GUWmMCNa5LW0POOw1 8P4hLQU7flQaMbT0xoARrs2VoOEHCui0ATsAVvb/E+rEizkneFpY/MgiIgpRJejIlBxf EKzg3nAQC4zk6nf44hkh6vyW3u2wrEIqzpiVoFCmQ7LU8kiUtfP+vHkU8kB07nwHslhi bonvld+jdjcy5Nn7Injb6HEX5+LYGQI4qUaGCTvNLmKBSwidCnKHVsO4vMOKZsm36wSc 5TntkOaOr46l7hsHKvhmK8wrS9K608Q72wQkHN8pLtb6bxSp5yHUDSw9losV7TGRxanR rrRA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1693880845; x=1694485645; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=irOldvKP1sOhSqILoYOxprcJwyTmKigNDAmbbyLDtyM=; b=VO8LgcNcJFZpaG9h6/QlmEyyPn5+hi6MXE/P7TdBtCWXUG/qBIHNTRoyoeNPLt89FC 2GiGxsiF+2wShGah5eRgCYl2webuJPVnganQPfuZ8DFJSxwJcMBsJ40gmpcv8r+2Nfmb zM17AP/2j50/XCgzqL/5l+OdQTJ8iwPjQSe18jthekdFjU8ub5IRRy4UTTR0WpfJmphZ aEkabcvZ5MWpvQdFcSpWIU76WkZL1SlSsHh6bBdITBPqJEofvZght9H/ztlJpsgT+uGh Xhe2BFpKgWmKvexzPKwLGh1RVdF0Y1r1WDxzLmX7t+frxWEF+hV6/AsJulr6TRqdgwfu 4Vkg==
X-Gm-Message-State: AOJu0YxW0lOt0O8Tz5swhxMy7lr0EY8dQcg7z/XXGs+ofqTIE17wY4cP jmFu3Cm270gjD/LCRhgukMecnXeN6uflLhafRohHENTzOTQ=
X-Google-Smtp-Source: AGHT+IEfTDUTu7S5wIkXK48fI24+7u4a2LAlR7F1y1z8wj5yxwUtdWihaLmANSJPKChT1hCNhSFYiQBZKd53taE/o+o=
X-Received: by 2002:a19:5005:0:b0:500:d8d6:fbe4 with SMTP id e5-20020a195005000000b00500d8d6fbe4mr7000541lfb.49.1693880844972; Mon, 04 Sep 2023 19:27:24 -0700 (PDT)
MIME-Version: 1.0
References: <MN2PR02MB70867C5B19194F6DA6C3CD3AEF6A9@MN2PR02MB7086.namprd02.prod.outlook.com>
In-Reply-To: <MN2PR02MB70867C5B19194F6DA6C3CD3AEF6A9@MN2PR02MB7086.namprd02.prod.outlook.com>
From: Kevin Ma <kevin.j.ma.ietf@gmail.com>
Date: Mon, 04 Sep 2023 22:27:13 -0400
Message-ID: <CAMrHYE1gUUfx7ga23eaCuVfX=nP7jo-gK1+QoQNgx-5PFqhhdg@mail.gmail.com>
To: "Goldstein, Glenn" <Glenn.Goldstein=40lumen.com@dmarc.ietf.org>
Cc: "cdni@ietf.org" <cdni@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000000e76cb0604935e07"
Archived-At: <https://mailarchive.ietf.org/arch/msg/cdni/lLgCraM5c0oHLU-aMSq77enM2i4>
Subject: Re: [CDNi] Request for feedback on the 3 SVTA drafts presented at IETF116
X-BeenThere: cdni@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "This list is to discuss issues associated with the Interconnection of Content Delivery Networks \(CDNs\)" <cdni.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/cdni>, <mailto:cdni-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/cdni/>
List-Post: <mailto:cdni@ietf.org>
List-Help: <mailto:cdni-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/cdni>, <mailto:cdni-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 05 Sep 2023 02:27:28 -0000
Hi All, (as an individual) I read through the protected secrets draft and have included some comments below. thanx! -- Kevin J. Ma - abstract: "for ... that may be embedded" -> "to embed ..." - section 1: "in both the FCI and MI" -> "in both the CDNI FCI and MI" - section 1: "(support defined in this draft is specifically for HashiCorp Vault), which are accessed via a specified path and a key ID. Refer to HashiCorp Vault documentation for details." -> "(e.g., HashCorp Vault [reference])." -- i'm not sure if we should really make a reference to a specific implementation here; could we describe it more generically as "and external key management system"? counter argument: if we're going to create a registry and register HashCorp Vault, then it's probably fine. - section 1: remove duplicate "uCDN issues a GET to receive an advertisement with FCI.SecretStore and FCI.SecretCertificate. As the uCDN has not yet provided a certificate, any embedded secret values in the advertisement are omitted." - section 1: "uCDN issues a GET to receive an advertisement" -> "The uCDN receives an advertisement" - CDNI FCI (currently) is a push interface via ALTO. - section 1: "any embedded secret values in the advertisement are omitted" - i think this could use a little bit more explicit explanation, e.g., the dCDN is not yet able to encrypt the secrets, so no secrets are provided. - section 1: "uCDN issues a PUT to publish a configuration" -> "The uCDN publishes a configuration" - CDNI MI (currently) is a pull interface; alternately, this could be an invalidation/prepositioning trigger? - section 1: remove " The configuration also contains MI.SecretStore and MI.SecretCertificate." ? - section 1: "uCDN issues a GET to receive" -> "The uCDN receives" - section 1: "the advertisement SHOULD now contain populated MI.SecretValue objects where necessary" - again, i think some addition context would help here, bothas to why secrets "SHOULD" now be populated, and why the qualifier "where necessary" is necessary - section 1: a sequence diagram might help here. - section 1: is "MI.LoggingTransportS3API" in a separate, yet to be adopted draft? we may want to remove this to remove the forward reference. - section 3.1, "secret-store-type" type: should probably quote "MI.SecretStoreTypeEmbedded" and "MI.SecretStoreTypeVault" - section 3.1: should there be a registry for secret-store-types? - section 3.1: why is "secret-certificate-id" in the MI.SecretStore object and not in the MI.SecretStoreTypeEmbedded object if it is MI.SecretStoreTypeEmbedded-specific? - section 3.1: the example is duplicated in 3.2; can probably remove this one - section 3.2: should there be a registry for formats? - section 3.2: there is probably going to need to be must stronger wording around the usage (or prohibition thereof) of "cleartext" - section 3.3: is "MI.SecretStoreTypeVault" HashiCorp Vault specific? is there a way to make it generic to support AWS KMS, GCP KMS, and/or Azure Key Vault? alternately, should the object name be made HashiCorp-specific? - section 3.3: is there a reference for the definition of "namespace" and "version"? - section 3.4, "secret-store-id" description: "The linked" -> "The ID of the" - section 3.4: should we have separate objects for embedded secrets and HashiCorp Vault? it seems odd to mix "secret-value" and "secret-path" in the same object. - section 3.4, does one of either "secret-value" or "secret-path" have to be specified? the MtSs both say no, but it doesn't make sense to let them both be blank? - section 3.4, "timeout" description: "the specified duration" -> "this timeout" - section 3.4, "timeout" description: "should be discarded" -> "MUST be discarded" or "SHOULD be discarded" ? - section 3.5: "(CA)and" -> "(CA) and" - section 4: I don't think we need to register separate types for FCI. If the "FCI.*" object is identical to the corresponding "MI.*" object, this is just registry bloat? there's nothing that says a "capability-type" must start with "FCI."; you can just use the MI payload types, as long as it is clear how to deserialize it. - section 5: the SVTA2038 reference gives a 404. again, i'm wondering if there is a way to make the proposed metadata objects extensible to other methods/services. - section 5: remove duplicate "When the recipient of a secret provides an updated configuration that no longer contains an MI.SecretCertificate with an ID referenced in MI.SecretStore used by MI.SecretValue objects, those MI.SecretValue objects SHOULD be reduced to an object with no contained secret-value property as they would be in the initial state before any certificate had been provided." - section 5: "in MI.SecretStore" -> "in an MI.SecretStore" - section 5: a sequence diagram might help - section 5.1: remove duplicate "The uCDN advertises FCI.SecretStore with a store-type of MI.SecretStoreTypeEmbedded; other FCI objects may contain MI.SecretValue objects that reference the store-id. MI.SecretValue objects that do not presently contain a secret-value property." - section 5.1: "MI.SecretValue objects that do not presently contain a secret-value property" - this is an incomplete sentence? - section 5.1: a sequence diagram might help - section 5.2: remove duplicate "The uCDN advertises an FCI.SecretCertificate." - section 5.2: a sequence diagram might help - section 5.3: remove duplicate "An MI.SecretStoreTypeEmbedded has a defined format of "cleartext"." - section 5.3: a sequence diagram might help - section 5.4: the uCDN should use MI to provide config to a dCDN? - section 5.4: the dCDN should use FCI to advertise to a uCDN? - section 7.1: this obviously needs to be filled out. On Thu, Apr 27, 2023 at 1:16 PM Goldstein, Glenn <Glenn.Goldstein= 40lumen.com@dmarc.ietf.org> wrote: > We received a good chunk of comments from Kevin on the Cache Control > Metadata draft ( > https://datatracker.ietf.org/doc/draft-power-cdni-cache-control-metadata/), > and have addressed all the issues for the update that we will submit prior > to IETF117. > > > > It would be very helpful if we could also get some feedback from the CDNI > WG on the other 2 drafts: > > > https://datatracker.ietf.org/doc/draft-rosenblum-cdni-protected-secrets-metadata/ > > https://datatracker.ietf.org/doc/draft-siloniz-cdni-edge-control-metadata/ > > > > thanks, > > Glenn > > > This communication is the property of Lumen Technologies and may contain > confidential or privileged information. Unauthorized use of this > communication is strictly prohibited and may be unlawful. If you have > received this communication in error, please immediately notify the sender > by reply e-mail and destroy all copies of the communication and any > attachments. > _______________________________________________ > CDNi mailing list > CDNi@ietf.org > https://www.ietf.org/mailman/listinfo/cdni >
- [CDNi] Request for feedback on the 3 SVTA drafts … Goldstein, Glenn
- Re: [CDNi] Request for feedback on the 3 SVTA dra… Yoav Gressel
- Re: [CDNi] Request for feedback on the 3 SVTA dra… Goldstein, Glenn
- Re: [CDNi] Request for feedback on the 3 SVTA dra… ALFONSO SILONIZ SANDINO
- Re: [CDNi] Request for feedback on the 3 SVTA dra… Kevin Ma
- Re: [CDNi] Request for feedback on the 3 SVTA dra… Kevin Ma
- Re: [CDNi] Request for feedback on the 3 SVTA dra… Kevin Ma
- Re: [CDNi] Request for feedback on the 3 SVTA dra… Goldstein, Glenn