Re: [core] Review of draft-ietf-core-groupcomm-bis-00

Marco Tiloca <marco.tiloca@ri.se> Tue, 21 July 2020 07:31 UTC

Return-Path: <marco.tiloca@ri.se>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C473E3A14B1; Tue, 21 Jul 2020 00:31:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.101
X-Spam-Level:
X-Spam-Status: No, score=-2.101 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, MSGID_FROM_MTA_HEADER=0.001, NICE_REPLY_A=-0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ri.se
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id P7aL3BIVDRQT; Tue, 21 Jul 2020 00:31:14 -0700 (PDT)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com (mail-db8eur05on2089.outbound.protection.outlook.com [40.107.20.89]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 70EC23A144A; Tue, 21 Jul 2020 00:31:10 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=fnP/ClWX359igLdcRr0FjopKeYyNvy3gEVRhmMGpwOe5ls0t4QGp3vvK8A+WtY4/et6GxdqslnoMG1wKrlBK/N4OnvRD8SnG3Dj69uAMImPZt1b09rkTbabO1SW0wfQ//vS0MjlcLSiu61/+InQKqb+OfnQP8ViEUEAD+Vwn8iT0M9SHXirZaqbYkmGVGNsCcouqnQTY3ayZAZy7fUcl8RNP/QnM8f5jhAqu/om5mtJlJLtSqATg1+FalZAUV9Ia3rgTPgTbsKwizDyGkoT4VfSJ/gbOLFFF2ijvSRQ9issnClw3Edf5DtWqhZkKSZIbUVoeo0GMvOnsFgpDDTujKw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=od8T5mSBbwYyKvfcFKhm7O2InFaqu0nKtpXYh4t+i7U=; b=da3yE2Ql3Q73T0XuBsHYuG2e8QjbRoqhKylT61JArkksoRdg9ejdiMdgpHVXwd7jny1yLV19PF/Lyu0oX2FXQQ3AXLdjg1LoK4sFVt3wuVx6RJ+s+dXyNp8UKtC6CXCiFdtfMGKqS1dC2pASSb34CzaYDnXx3FlioV+eZd1Bdho8yU45ACUdxdlMzFOSrh+q1gG4JASEhhLSiugDwZNGHP+6tuQmJTNuk87Hzw7rCh3OzOkyRYRtEoJrBz1HHgEwMCyqMM6Fo9nja0FOR5tEGYuKdH+nUc0HpDFxSWO7RhlTd1PFdvBubHYi4qJNcytRhEDcpbLfB7AGfhCE8yGMxw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ri.se; dmarc=pass action=none header.from=ri.se; dkim=pass header.d=ri.se; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ri.se; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=od8T5mSBbwYyKvfcFKhm7O2InFaqu0nKtpXYh4t+i7U=; b=ZsBkCMbMuT8BDK4wmvyV52xzrdnLGEXFWWaEGzhW9fAvHDhJeMRA0Fh5iaN6w3FLuUiZxqfxigSgSSu73gzyCfYqBI/c4dgaA/8A4Gb4nSw6/d4BWnE4FRjoUxp/h/S/filGpjodzX+0reWetUUX/8dnAY1nTOGUtmAnPn6qk2c=
Authentication-Results: ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=none action=none header.from=ri.se;
Received: from VI1P189MB0398.EURP189.PROD.OUTLOOK.COM (2603:10a6:802:35::31) by VI1P18901MB0094.EURP189.PROD.OUTLOOK.COM (2603:10a6:801:8::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3195.18; Tue, 21 Jul 2020 07:31:08 +0000
Received: from VI1P189MB0398.EURP189.PROD.OUTLOOK.COM ([fe80::2124:eed3:60cd:95a2]) by VI1P189MB0398.EURP189.PROD.OUTLOOK.COM ([fe80::2124:eed3:60cd:95a2%6]) with mapi id 15.20.3195.026; Tue, 21 Jul 2020 07:31:08 +0000
To: Jim Schaad <ietf@augustcellars.com>, draft-ietf-core-groupcomm-bis@ietf.org
Cc: core@ietf.org
References: <015a01d63aad$da737040$8f5a50c0$@augustcellars.com>
From: Marco Tiloca <marco.tiloca@ri.se>
Autocrypt: addr=marco.tiloca@ri.se; prefer-encrypt=mutual; keydata= mQENBFSNeRUBCAC44iazWzj/PE3TiAlBsaWna0JbdIAJFHB8PLrqthI0ZG7GnCLNR8ZhDz6Z aRDPC4FR3UcMhPgZpJIqa6Zi8yWYCqF7A7QhT7E1WdQR1G0+6xUEd0ZD+QBdf29pQadrVZAt 0G4CkUnq5H+Sm05aw2Cpv3JfsATVaemWmujnMTvZ3dFudCGNdsY6kPSVzMRyedX7ArLXyF+0 Kh1T4WUW6NHfEWltnzkcqRhn2NcZtADsxWrMBgZXkLE/dP67SnyFjWYpz7aNpxxA+mb5WBT+ NrSetJlljT0QOXrXMGh98GLfNnLAl6gJryE6MZazN5oxkJgkAep8SevFXzglj7CAsh4PABEB AAG0Nk1hcmNvIFRpbG9jYSAobWFyY28udGlsb2NhQHJpLnNlKSA8bWFyY28udGlsb2NhQHJp LnNlPokBNwQTAQgAIQUCWkAnkAIbAwULCQgHAgYVCAkKCwIEFgIDAQIeAQIXgAAKCRDuJmS0 DljaQwEvCACJKPJIPGH0oGnLJY4G1I2DgNiyVKt1H4kkc/eT8Bz9OSbAxgZo3Jky382e4Dba ayWrQRFen0aLSFuzbU4BX4O/YRSaIqUO3KwUNO1iTC65OHz0XirGohPUOsc0SEMtpm+4zfYG 7G8p35MK0h9gpwgGMG0j0mZX4RDjuywC88i1VxCwMWGaZRlUrPXkC3nqDDRcPtuEGpncWhAV Qt2ZqeyITv9KCUmDntmXLPe6vEXtOfI9Z3HeqeI8OkGwXpotVobgLa/mVmFj6EALDzj7HC2u tfgxECBJddmcDInrvGgTkZtXEVbyLQuiK20lJmYnmPWN8DXaVVaQ4XP/lXUrzoEzuQENBFSN eRUBCACWmp+k6LkY4/ey7eA7umYVc22iyVqAEXmywDYzEjewYwRcjTrH/Nx1EqwjIDuW+BBE oMLRZOHCgmjo6HRmWIutcYVCt9ieokultkor9BBoQVPiI+Tp51Op02ifkGcrEQNZi7q3fmOt hFZwZ6NJnUbA2bycaKZ8oClvDCQj6AjEydBPnS73UaEoDsqsGVjZwChfOMg5OyFm90QjpIw8 m0uDVcCzKKfxq3T/z7tyRgucIUe84EzBuuJBESEjK/hF0nR2LDh1ShD29FWrFZSNVVCVu1UY ZLAayf8oKKHHpM+whfjEYO4XsDpV4zQ15A+D15HRiHR6Adf4PDtPM1DCwggjABEBAAGJAR8E GAECAAkFAlSNeRUCGwwACgkQ7iZktA5Y2kPGEwf/WNjTy3z74vLmHycVsFXXoQ8W1+858mRy Ad0a8JYzY3xB7CVtqI3Hy894Qcw4H6G799A1OL9B1EeA8Yj3aOz0NbUyf5GW+iotr3h8+KIC OYZ34/BQaOLzdvDNmRoGHn+NeTzhF7eSeiPKi2jex+NVodhjOVGXw8EhYGkeZLvynHEboiLM 4TbyPbVR9HsdVqKGVTDxKSE3namo3kvtY6syRFIiUz5WzJfYAuqbt6m3TxDEb8sA9pzaLuhm fnJRc12H5NVZEZmE/EkJFTlkP4wnZyOSf/r2/Vd0iHauBwv57cpY6HFFMe7rvK4s7ME5zctO Ely5C6NCu1ZaNtdUuqDSPA==
Message-ID: <b5047e62-bd77-aafa-2d4c-d8f8aba69b90@ri.se>
Date: Tue, 21 Jul 2020 09:31:01 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.10.0
In-Reply-To: <015a01d63aad$da737040$8f5a50c0$@augustcellars.com>
Content-Type: multipart/signed; micalg="pgp-sha512"; protocol="application/pgp-signature"; boundary="5Bu1eQ60US5gM30ugZwX16OQDo8ccMovj"
X-ClientProxiedBy: AM3PR07CA0059.eurprd07.prod.outlook.com (2603:10a6:207:4::17) To VI1P189MB0398.EURP189.PROD.OUTLOOK.COM (2603:10a6:802:35::31)
MIME-Version: 1.0
X-MS-Exchange-MessageSentRepresentingType: 1
Received: from [10.8.3.8] (195.181.173.105) by AM3PR07CA0059.eurprd07.prod.outlook.com (2603:10a6:207:4::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3216.17 via Frontend Transport; Tue, 21 Jul 2020 07:31:07 +0000
X-Originating-IP: [195.181.173.105]
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 80edfca6-ca6a-4ace-4a4d-08d82d4808d3
X-MS-TrafficTypeDiagnostic: VI1P18901MB0094:
X-Microsoft-Antispam-PRVS: <VI1P18901MB0094FE480125C1F9E64954DC99780@VI1P18901MB0094.EURP189.PROD.OUTLOOK.COM>
X-MS-Oob-TLC-OOBClassifiers: OLM:9508;
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: vD3smDfjmagCVixIbeCp3OCuz8vF+LVmRz+Q8Z4k5ZrZXvtNvetqkuldm8LTNOjGs5+NMBiGwYWfNp5npDRAVROMvdlLCuLBKyxp6ClOgDBH9qXI73UKnO/eQLSWpdNXXKLfZy4v+hgGdOSi+t/gxkuP8QBs9n6yNwAgkZq1U3UzxtjGv+ffrnYh396t0DZ+vwRmpwMdIkHaiTnjSW9/tg15AewEuqiDa/2Vhx3iMoX6SQ5I9JVDJeOJWNGq2Xoyhta9vOU1U92f4y8jdUSX9X3/6J8H+grFjXLV7C1zYKkEHnrTASw1YT8z44dpQ2aBHigPMyA4gpd4jEjxkqdJIAJTBhi9dJks0xLrLsNB3kTpWNruj3wyZqZnYGQ4pkDbc94uWgY6Kcfjh0txyF3YEZ34DzHPJV1kMMwIAOVE7ATBOA8yyGWjciTo1muq5X/1aDekMSpjqZlJCYjDgtGi/w==
X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:VI1P189MB0398.EURP189.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFTY:; SFS:(4636009)(396003)(39850400004)(346002)(366004)(376002)(136003)(66946007)(44832011)(966005)(66476007)(66556008)(235185007)(4326008)(956004)(83380400001)(8676002)(478600001)(66574015)(2616005)(5660300002)(2906002)(52116002)(31686004)(186003)(16576012)(6486002)(36756003)(316002)(31696002)(26005)(21480400003)(8936002)(16526019)(6666004)(33964004)(53546011)(86362001)(43740500002); DIR:OUT; SFP:1101;
X-MS-Exchange-AntiSpam-MessageData: L+6lJeFZmaxAHuDg/s3WgWzpdB70IHyjYrk8AR7guePvHfKCFPBCMoTepCY9v+V8O0YQic6F/k9mAsyVgFnIu8AmTeQ1NlC2vY8Hlu/V9DdEFMsSwoyjx0a6TK5+8VCYU/2BDnkwTSur7XMTF/L4Dn2/4GQuxrUKft2/Lo/2IeBXqskk48VD9UJ8ype8BfGquKBaF57aik6/vL3KxV5/pmiNqoM16nd2xMM+vIxr3WT29/Tyl4IlbBU0p1ukMbGfSqEVERYxLYvydlXq6g6iWahKDaPxhHv4+dBqMXzdaNVzpYKzTL7t4LWkNN35o2tT9bd3gB4cO6xTQJjGHsq9StYB1+cxy+89YIQkWZfLWmkUbIqdf7iwt2aKRNStKjHa+tPnWqdc8X/vVDncUvPJoXPIqjdys57izDVp8TpEniVsU5JjvFZgwbCvJ5X7uN1KnThxaucv3Je0yVUzjDh8NEDlswIYWraqoYIZrE/OCEY=
X-OriginatorOrg: ri.se
X-MS-Exchange-CrossTenant-Network-Message-Id: 80edfca6-ca6a-4ace-4a4d-08d82d4808d3
X-MS-Exchange-CrossTenant-AuthSource: VI1P189MB0398.EURP189.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 21 Jul 2020 07:31:08.3934 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 5a9809cf-0bcb-413a-838a-09ecc40cc9e8
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 5stdvXLVzfw3sBqEhb6KwoLVLLGI7UBEATl37FCWeLgvKI0BPLVM5Zp68wj9c2CsBWYvP4SGL6x/Z1F1OYVNQw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1P18901MB0094
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/2JT4Zdyp-YDpymDQ_ocZoEnOi10>
Subject: Re: [core] Review of draft-ietf-core-groupcomm-bis-00
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 21 Jul 2020 07:31:24 -0000

Hi Jim,

Thanks for this review!

We have addressed most comments in the latest version -01.

Please, see our replies in line, with two points marked as "[OPEN]".

Best,
/Marco

On 2020-06-04 22:22, Jim Schaad wrote:
> I can't see that I have an outstanding review on this document so here is a
> new one.
>
> * Section 2.1 - Please make it clear of a client sending a message is part
> of an application group.  It is not part of a CoAP group but it is not clear
> for an application group.  (It might be useful to just define these things
> in terms of CoAP servers except for security groups.)

==>MT
We have added the sentence:

"A client endpoint that sends a group communication message to an
application group is not necessarily itself a member of this application
group."
<==

>
> * Section 2.1 - I believe that a client endpoint is part of a security
> group.  Please make this clear either true or false.

==>MT
We have added the sentence:

"So, a client endpoint needs to be a member of a security group in order
to send a valid secured group communication message to this group."
<==

>
> * Section 2.1 - s/do not share any resource/do not share any resources/

==>MT
Done.
<==

>
> * Section 2.1 - I still do not like the above statement.  If a resource maps
> to a URI-path, /.well-known/core could be part of multiple security groups.
> I don't know if this means it is a different application group or what. The
> fact that URI-path is not part of the tuple leads me to not know how to deal
> with this.

==>MT
We have removed the sentence.
<==

>
> * Figure 1:  I think that you have the grouping in reverse on the
> Application Group <-> CoAP group link.  I will admit that I do not use these
> a lot so I could be wrong.

==>MT
The diagram states:

"one Application group is associated to exactly one CoAP group"

which we believe to be correct. Also it states: "one CoAP group is
associated to one or more Application groups."
<==

>
> * Section 2.2.3 - I don't know that this needs to be included in the
> document because I think it might be more of a corner case, but it seems to
> me that application groups might also be discovered by doing a query to
> /.well-known/core on the multicast address.  That information might be part
> of the NoSec security group and thus if the RS knows the answer it could
> return it to the client.

==>MT
We have added the sentence:

"CoAP endpoints can also discover application groups by performing a
multicast discovery query using the /.well-known/core resource. Such a
request may be sent to a known CoAP group multicast address associated
to application group(s), or to the All CoAP Nodes multicast address."
<==

>
> * Section 2.2.4 - It looks like you are doing the start/stop of listening
> twice.

==>MT
Indeed, fixed now.
<==

>
> * Section 2.3.1 - I think we might need to have a discussion if the MAY in
> paragraph 3 ought to be upgraded to a SHOULD for traffic purposes.  I.e.
> don't send an answer if you don't have anything to say (error) unless you
> are required to do so by the application.

==>MT
We have updated the text now as follows:

“A server sends back a unicast response to the CoAP group request - but
the server MAY suppress the response for various reasons (Section 8.2 of
{{RFC7252}}). This document adds the requirement that a server SHOULD
suppress the response in case of error or in case there is nothing
useful to respond, unless the application requires such a response to be
made.”

Note that the next paragraph indicates that the No-Response Option if
supported by the server can override this behavior.
<==

> * Section 2.3.1 - In the paragraph starting "For multicast CoAP requests", I
> got confused when reading this paragraph because it starts dealing with
> multicast processing of tokens and then seems for some unknown reason starts
> talking about DTLS and TLS which seems to be extraneous.  I think that this
> extra information can just be deleted.  (By the way, I don't agree that you
> can immediately free up the token after getting a response.  You might end
> up sending a request with that token and getting the original response
> replayed to you and incorrectly associating things.  I believe that there is
> a time out before doing the re-use but I would need to check this in the
> CoAP document.  Additionally, this is not a true statement for things like
> observe.)

==>MT
We have updated the text to focus on the multicast case.
<==

> * Section 2.3.1 - " The Token values only have to be unique within the
> context of a single CoAP client"  This should really be the context of a
> single client - or depending on the implementation - a single source
> UDP/Port pair if token processing is different for each port used by a
> single client.

==>MT
[OPEN]

Could you please clarify your point?
<==

>
> * Section 2.3.3 - Bullet 1 in second list - Another difference for a CoAP
> client rather than a proxy is that the client can process responses as they
> show up and that can also be used as input to the decision of how long to
> wait for responses or if a new request needs to be made for additional
> responses.

==>MT
We have added the following final sentence to that bullet:

"For example, a CoAP client could monitor incoming responses and use
this information to decide how long to continue collecting responses -
which is something a proxy cannot do."
<==

> * Section 2.3.3 - Does it make sense to define a new HTTP header for the
> purpose of returning the address of the server?

==>MT
Yes, that can possibly be in draft-tiloca-core-groupcomm-proxy , for
both new options defined there, one of which has the purpose to return
the address of the server.
<==

>
> * Section 2.3.3 - Last bullet point - I do not believe that the multicast
> scope is something that the client gets to choose.  I think it is part of
> choosing what the multicast address is for the CoAP group.  If multiple
> addresses are assigned to a CoAP group then the client would have the
> ability to choose which address to use.  It is not clear to me how a RD
> would return this, but I have not thought about it at all.  Given that you
> cannot say FF0X::FD as the address.

==>MT
We have updated to advice for the designer/configurator of the system.
Now it reads:

"A client SHOULD be configured to use CoAP groups with the smallest
possible IP multicast scope that fulfills the application needs. As an
example, site-local scope is always preferred over global scope IP
multicast if this fulfills the application needs. Similarly, realm-local
scope is always preferred over site-local scope if this fulfills the
application needs."
<==

>
> * Section 2.3.5 - I think you need to have a paragraph dealing with
> unsubscribing to an observe relationship.  I believe that this is always
> going to be done via unicast but it would seem that this could be done in
> multicast instead.

==>MT
We have added a paragraph on cancellation, covering both
unicast/multicast and also a combination of both.
<==

>
> * Section 2.4.1 - I think you need to justify the addition of admin-local to
> the list of supported scopes as this is not part of RFC 7252.

==>MT
[OPEN]

In Section 3.3 of RFC 7390, admin-local is mentioned when discussing
resource/service discovery.

We can gather opinions if this is useful, or otherwise remove it.
<==

>
> * Section 4 - Reference to COSE needs to be updated to point to the IDs.

==>MT
Now we refer to draft-ietf-cose-rfc8152bis-struct  and 
draft-ietf-cose-rfc8152bis-algs
<==

>
> * Section 4 - Off the top of my head I don't remember an MAC operations done
> by OSCORE, it just uses encryption and signing (for group)

==>MT
Right, that was a mistake. Now it reads: “OSCORE uses COSE
[I-D.ietf-cose-rfc8152bis-struct][I-D.ietf-cose-rfc8152bis-algs] to
perform encryption operations and protect ..."
<==

>
> * Section 4 - I think this is a mistake, para 2 says that the result is
> encoded as a COSE object, but I am not sure that this should not be a CORE
> object.

==>MT
We have rephrased the paragraph as follows:

"OSCORE uses COSE
[I-D.ietf-cose-rfc8152bis-struct][I-D.ietf-cose-rfc8152bis-algs] to
perform encryption operations and protect a CoAP message in a COSE
object, by using an Authenticated Encryption with Associated Data (AEAD)
algorithm.  In particular, OSCORE takes as input an unprotected CoAP
message and transforms it into a protected CoAP message transporting the
COSE object."
<==

>
> * Section 5.2.1 - last paragraph - I think that "most recently" is better
> than "latest"

==>MT
Done.
<==

> * Section 5.2.3 - Bullet 2 - I think that you need some expansion in this
> topic.  My first reading was that the alleged sender was tied to the IP
> address and not tied to the signature key.  

==>MT
Now expanded as follows:

"the alleged sender in the OSCORE group, by verifying the
countersignature included in the request using the public key of that
sender."
<==

>
> * Section 5.4 - when used with security, I do not believe that this can do
> an amplification attack because the No-Response option is an inner option.

==>MT
Done.


Thanks a lot again!
<==

>
> Jim
>
>

-- 
Marco Tiloca
Ph.D., Senior Researcher

RISE Research Institutes of Sweden
Division ICT
Isafjordsgatan 22 / Kistagången 16
SE-164 40 Kista (Sweden)

Phone: +46 (0)70 60 46 501
https://www.ri.se