Re: [dnssd] Paul Wouters' Discuss on draft-ietf-dnssd-srp-23: (with DISCUSS and COMMENT)

Ted Lemon <mellon@fugue.com> Tue, 05 March 2024 01:22 UTC

Return-Path: <mellon@fugue.com>
X-Original-To: dnssd@ietfa.amsl.com
Delivered-To: dnssd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 14840C18DBAB for <dnssd@ietfa.amsl.com>; Mon, 4 Mar 2024 17:22:49 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.905
X-Spam-Level:
X-Spam-Status: No, score=-1.905 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=fugue-com.20230601.gappssmtp.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zSTxJLO0gCnx for <dnssd@ietfa.amsl.com>; Mon, 4 Mar 2024 17:22:44 -0800 (PST)
Received: from mail-qv1-xf34.google.com (mail-qv1-xf34.google.com [IPv6:2607:f8b0:4864:20::f34]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E89B2C1D49AE for <dnssd@ietf.org>; Mon, 4 Mar 2024 17:22:39 -0800 (PST)
Received: by mail-qv1-xf34.google.com with SMTP id 6a1803df08f44-68f54a65ae2so19091546d6.0 for <dnssd@ietf.org>; Mon, 04 Mar 2024 17:22:39 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fugue-com.20230601.gappssmtp.com; s=20230601; t=1709601758; x=1710206558; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=BRmLSL6bVJHAiReM2vBCjnMm1r2eAhD8LrqDV/FOAg4=; b=NHI1KDzZcbacH4J06JYS+FSBY507zRZCdjU4ksBGq440xtwv43PD9M+NNDbjnvKNK4 2ZF7XuFL7z3dkl8qzO9czfoTpMKn1qXl1MRQraFc0ff1YS6XCozTM0klPsAfYln6/VPL vFe5n4TsiotyhZ2PTUk76vikoC2eCgD1a+IkPqT1dwWfpao+3QV3RUc+0oN5h8O9/uwN yyP0BUWwozXC85Tos7flIDhubyJl+OXiOSi8oIO/h0NyQmlEtPwIXkCNUDHcmtEwJuDi Ml5342wprFTwznMilUbNXvQXRRxwfwIDEAiGaIKCWxHv3KzEkcmSfm0N270FizVe/kYz Rh5g==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1709601758; x=1710206558; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=BRmLSL6bVJHAiReM2vBCjnMm1r2eAhD8LrqDV/FOAg4=; b=cO6k20TZBp/SYEUf/vw5DCGvZ19F90vOnXuR16udp8EmIzZSKAA3tRSsSF+uQvaK16 5f+YuGSgfNIHI5pfd/eXTCkGD8H2SlsiTEajebXa8byAtwnoGU5E4zbIG95lYL52xwjX OzDzJ5mIPrEaOmQwT3cQGZZHNN2lXHpsLA8ykSOy/KTKJ499+B/HM98CjdQtsHeR2AL2 2PeoQfemvVtOY9mSkec4YTJojTibi40JEdu0tswnGBUtpzJMKHPkuE+TW9prn5EiyGKe rTPY1T8SkSoZIuK5qWP2MPuaJc/HD4O3iWhfrP2bxjyrdm1M4Df4xopcjYEbUI4P3IrB pqcQ==
X-Forwarded-Encrypted: i=1; AJvYcCV1DIBoJkg+nk9v0gI0xyH1y2U1+QaM2oKQhhZ4YwzFzZpedsDQWDoj7AKR6Cxc4zLmhV//YyORSLye8a3aBg==
X-Gm-Message-State: AOJu0YwN+pT5pyRvyvrnylD8jX0rirLR6xuzfyw7tFkySghYZTbkhMsA 05inhSOOJ/+lvR8KBJYuz6b0ezGsB5jmEBfEg8AQOmaFIUQseHlyjBmHBAMjU93YjM/NsT/ZF2A xXpyGryacYQKfPk3bPjrxv8G6YxKRx/Ig90cu+g==
X-Google-Smtp-Source: AGHT+IEGBm7P+MSzOs1Z8u8JB+romHktLMxcYLU1cywdsZuSQad017WqUletFla2hGGch12nC0msp78o3iCseg8diwI=
X-Received: by 2002:a05:6214:1788:b0:68f:3c24:4744 with SMTP id ct8-20020a056214178800b0068f3c244744mr539728qvb.5.1709601758523; Mon, 04 Mar 2024 17:22:38 -0800 (PST)
MIME-Version: 1.0
References: <CAPt1N1=SG++mFXevGz_vxrCE1MNY7r2k5KjCk2oHtL5Mn4LruA@mail.gmail.com> <8A369E54-F88D-472A-A4F6-C3A8957C5190@aiven.io>
In-Reply-To: <8A369E54-F88D-472A-A4F6-C3A8957C5190@aiven.io>
From: Ted Lemon <mellon@fugue.com>
Date: Mon, 04 Mar 2024 20:22:02 -0500
Message-ID: <CAPt1N1mT5ZSReNQ+LsWUUU8DOcEVn7QFNKfDwFH__EPuLma+rQ@mail.gmail.com>
To: Paul Wouters <paul.wouters@aiven.io>
Cc: The IESG <iesg@ietf.org>, draft-ietf-dnssd-srp@ietf.org, dnssd-chairs@ietf.org, dnssd@ietf.org, dschinazi.ietf@gmail.com
Content-Type: multipart/alternative; boundary="0000000000008646410612dfade5"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnssd/0czykxfINnd73o4e2-nACqWTqDQ>
Subject: Re: [dnssd] Paul Wouters' Discuss on draft-ietf-dnssd-srp-23: (with DISCUSS and COMMENT)
X-BeenThere: dnssd@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Discussion of extensions to DNS-based service discovery for routed networks." <dnssd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnssd>, <mailto:dnssd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnssd/>
List-Post: <mailto:dnssd@ietf.org>
List-Help: <mailto:dnssd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnssd>, <mailto:dnssd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 05 Mar 2024 01:22:49 -0000

This is the thing that confuses me. TCP is required for servers to
implement. DNS cookies are a performance hack for public-facing DNS
authoritative and caching servers. We have to implement TCP and support it.
DNS Cookies is therefore necessarily additional effort. I see why this
makes sense for an authoritative server or a DNS cache out on the internet,
but that use case is specifically excluded here (see section 6.1). So
implementing DNS Cookies as far as I can tell adds no value at all for this
use case.

Anyway, there's probably something I'm missing here, and as you say, we
might as well discuss it in Brisbane in the hallways.

On Mon, Mar 4, 2024 at 4:06 PM Paul Wouters <paul.wouters@aiven.io> wrote:

>
> On Mar 4, 2024, at 13:16, Ted Lemon <mellon@fugue.com> wrote:
>
> 
> You're right, with server policy 2 cookies would protect against spoofing.
>
> I guess one way to think about this is that we could face a DoS attack
> where we're being forced to validate a lot of bogus signatures and the TCP
> connection wouldn't protect against that if it's a DDoS attack from real
> reachable hosts? Is that why you're interested in this? It's the only
> reason I can think of to consider doing it—otherwise it's needless
> complexity.
>
>
> No. I am interested because going from UDP to TCP is more resource heavy
> and complicated than enabling DNS COOKIES for UDP, while both offer
> equivalent anti-spoofing behaviour. Enabling DNS COOKIES when under attack
> is also cheaper than enabling TCP. Plus TCP runs additional firewalling
> risks.
>
> But I didn’t say you cannot do TCP. I just asked you change “TCP” to “TCP
> or UDP DNS  COOKIES”, except I used the term “source validated transport”
> that includes both of these and potentially also meaning DoT, DoH or DoQ if
> that would get deployed.
>
> Paul
>
>
>
> On Mon, Mar 4, 2024 at 12:47 PM Paul Wouters <paul.wouters@aiven.io>
> wrote:
>
>>
>> On Mon, Mar 4, 2024 at 11:30 AM Ted Lemon <mellon@fugue.com> wrote:
>>
>>> Paul, first of all in no way should you take this message as a request
>>> for immediate attention—I know an AD's life in the run-up to IETF is very
>>> busy. So it's perfectly fine if you don't deal with this until after IETF.
>>>
>>> I was hoping that you'd have time to respond to my previous note so that
>>> we could negotiate on changes, but since you didn't have time, I'm making
>>> my best attempt at addressing the remaining open issues prior to today's
>>> draft submission cutoff in hopes that you'll be satisfied with the changes.
>>>
>>
>> I hadn't had time to formulate my response but I had some disagreements
>> or else I would have signaled ok :)
>>
>>
>>>
>>> Regarding SRV target compression, I've made the following update:
>>>
>>>               Although <xref target="RFC2782"/> requires that the target
>>> name in the SRV record not be compressed, an SRP requestor
>>> -             SHOULD compress the target in the SRV record. The
>>> motivation for <em>not</em> compressing in <xref target="RFC2782"/>
>>> +             MAY compress the target in the SRV record. The motivation
>>> for <em>not</em> compressing in <xref target="RFC2782"/>
>>>
>>
>> +           <t>
>>>
>>> +             Note that this does not update <xref target="RFC2782"/>:
>>> DNS servers still MUST NOT compress SRV record targets. The
>>> +             requirement to accept compressed SRV records in updates
>>> only applies to SRP registrars, and SRP registrars that are
>>> +             also DNS servers still MUST NOT compress SRV record
>>> targets in DNS responses. We note also that
>>> +             <xref target="RFC6762"/> recomments that SRV records be
>>> compressed in mDNS messages, so <xref target="RFC2782"/> does
>>> +             not apply to mDNS messages.</t>
>>> +           <t>
>>> +             In addition, we note that an implementor of an SRP
>>> requestor might update existing code that creates SRV records
>>> +             or compresses DNS messages so that it compresses the
>>> target of an SRV record. Care must be taken if such code is
>>> +             used both in requestors and in DNS servers that the code
>>> only compresses in the case where a requestor is generating
>>> +             an SRP update.</t>
>>>
>>>
>> this looks great. Thanks.
>>
>>
>>> I don't think we need to say "SHOULD" for compression since it's not an
>>> interop issue; the only interop issue is that if we let the SRP requestor
>>> compress, then we have to require that SRP registrars correctly handle
>>> compressed SRV targets. I hope the extra two paragraphs address the concern
>>> that this might pollute other DNS implementations.
>>>
>>> Regarding DNSSEC validation, I wasn't satisfied with the previous edit I
>>> made to the text about recursive resolvers, so I made the following change:
>>>
>>> -         <li>Recursive resolvers at sites using 'service.arpa.'  MUST
>>> transparently support DNSSEC queries: queries for DNSSEC
>>> -            records and queries with the DNSSEC OK (DO) bit set (<xref
>>> target="RFC4035" section="3.2.1" sectionFormat="of"/>).
>>> -            While validation is not required, it is strongly
>>> encouraged: a caching recursive resolver that does not validate answers
>>> -            that can be validated may cache invalid data.  This, in
>>> turn, will prevent validating stub resolvers from successfully
>>> -            validating answers. We can't place normative requirements
>>> on DNS recursive resolvers, but we remind implementors that
>>> -            DNSSEC validation is a Best Current Practice <xref
>>> target="RFC9364"/>.</li>
>>> +         <li>For correctness, recursive resolvers at sites using
>>> 'service.arpa.' must in practice transparently support DNSSEC
>>> +            queries: queries for DNSSEC records and queries with the
>>> DNSSEC OK (DO) bit set (<xref target="RFC4035" section="3.2.1"
>>> +            sectionFormat="of"/>).  DNSSEC validation is a Best Current
>>> Practice <xref target="RFC9364"/>: although validation is
>>> +            not required, a caching recursive resolver that does not
>>> validate answers that can be validated may cache invalid data.
>>> +            This, in turn, would prevent validating stub resolvers from
>>> successfully validating answers. Hence, as a practical
>>> +            matter, recursive resolvers at sites using 'service.arpa'
>>> should do DNSSEC validation.</li>
>>>
>>> This is a change to the previous proposed change, but I think it stands
>>> by itself. The goal here is to make it clear that we really want recursive
>>> resolvers to validate, and that there's a BCP that says they should, and
>>> also motivate why regardless of SHOULDs and MUSTs, sites that use
>>> service.arpa really have to do DNSSEC correctly.
>>>
>>
>> This also looks great.
>>
>>
>>>
>>> I haven't done an update to address the question about DNS cookies
>>> because it still doesn't make sense to me. I don't think there's a problem
>>> to solve here—there's no downside to using TCP transport for SRP updates as
>>> far as I can tell, and cookies doesn't actually solve the problem of source
>>> address validation.
>>>
>>
>> I'm not sure why you don't see that TCP and DNS COOKIES offer the same
>> guarantees on source address validation?
>>
>> You can push out these changes, and perhaps at IETF we can chat about
>> COOKIES?
>>
>> Paul
>>
>>
>>
>>
>>>
>>> On Tue, Feb 27, 2024 at 5:03 PM Ted Lemon <mellon@fugue.com> wrote:
>>>
>>>> Thanks for getting back to me, Paul. I know the response was a long
>>>> time coming and it's always extra work to get back up to speed after a big
>>>> time gap.
>>>>
>>>> I'm going to respond to the points on which there remains disagreement
>>>> and leave the rest out.
>>>>
>>>> On Fri, Feb 23, 2024 at 4:15 PM Paul Wouters <paul.wouters@aiven.io>
>>>> wrote:
>>>>
>>>>>
>>>>> On Wed, Aug 9, 2023 at 7:59 PM Ted Lemon <mellon@fugue.com> wrote:
>>>>>
>>>>>> On Wed, Aug 9, 2023 at 5:49 PM Paul Wouters via Datatracker <
>>>>>> noreply@ietf.org> wrote:
>>>>>>
>>>>>>> 2) finding the domain name to use
>>>>>>>
>>>>>>
>>>>>>> In Section 3.2.2 on where to publish, hosts need to somehow know
>>>>>>> their
>>>>>>> domain name. Especially for roaming devices, this seems unlikely and
>>>>>>> the only choice to participate would be to assume the name given by
>>>>>>> DHCP for the 'search domain'. I feel that by not stating this
>>>>>>> explicitly,
>>>>>>> that is what is going to happen anyway. So why not state it? Or if
>>>>>>> this
>>>>>>> is really unwanted, add such a statement to Section 3.2.2.
>>>>>>>
>>>>>>
>>>>>> RFC 6763 actually includes information on how to figure this out, in
>>>>>> section 11. This is discussed in detail in sections 3.1.1 and 3.1.2. Maybe
>>>>>> it would be worth adding a pointer to that here?
>>>>>>
>>>>>
>>>>> Thanks. That does explain it. I'll leave it up to you to add a pointer
>>>>> or not.
>>>>>
>>>>
>>>> I've added:
>>>>
>>>>    As described above, full-featured devices are responsible for
>>>> knowing the domain in which to register their services.
>>>>    Such devices MAY optionally support configuration of a registration
>>>> domain by the operator of the device. However,
>>>>    such devices MUST support registration domain discovery as described
>>>> in <xref target="RFC6763" section="11" sectionFormat="of"/>,
>>>>    "Discovery of Browsing and Registration Domains".
>>>>
>>>>
>>>>> 5) Basically Updates: 2782 without saying so
>>>>>>>
>>>>>>> Section  3.2.5.4 Compression in SRV records basically updates RFC
>>>>>>> 2782 without
>>>>>>> stating so via an Updates: clause. As we are talking about DNS
>>>>>>> library code reuse,
>>>>>>> I think this would be unwise to update. I would drop the option of
>>>>>>> allowing the
>>>>>>> compressing of SRV target names.
>>>>>>>
>>>>>>
>>>>>> I don't agree that this updates RFC 2782. Only SRP registrars are
>>>>>> required to support this. We are not saying that DNS authoritative servers
>>>>>> need to support this (or indeed that they should do it) nor are we saying
>>>>>> that DNS caching resolvers need to support this when parsing answers to
>>>>>> queries sent to authoritative servers or that they should do it when
>>>>>> sending responses to clients. The only case where this is required is when
>>>>>> parsing SRP updates. Would it help to say that more explicitly? I thought
>>>>>> we were clear on this, but I don't mind being even clearer if you think
>>>>>> it's necessary.
>>>>>>
>>>>>
>>>>> My focus here is on DNS library code being re-used and affected. Is
>>>>> packet size really such a big issue on a LAN that you say SHOULD for
>>>>> compression? If this was a MAY I would be happier,
>>>>> as using a stock dns library would not cause breaking a SHOULD clause.
>>>>>
>>>>
>>>> The problem is that it's no use if the server isn't required to support
>>>> it. I see your point about libraries—we don't want to accidentally cause
>>>> some DNS server to start sending SRV responses to regular DNS queries where
>>>> the target is compressed. However, this feels like it's kind of our of our
>>>> control. I can add some text here reminding implementors to avoid this
>>>> mistake if you think it would help. I agree that this is problematic, but
>>>> if you think about an 802.15.4 network with a frame size of 127 bytes, the
>>>> extra bytes we're saving here really do matter at least in principal.
>>>>
>>>> 6) DNSSEC on resolvers
>>>>>>>
>>>>>>> Section 8.4 point 1 is true for all recursive resolvers and I think
>>>>>>> it is harmful
>>>>>>> to call it out here as if it is still acceptable to run resolvers
>>>>>>> without DNSSEC
>>>>>>> enabled. I would remove the entire point 1.
>>>>>>>
>>>>>>
>>>>>> Hm. The thing is, the resolvers we're talking about here are home
>>>>>> router resolvers, and I don't know of any home routers other than those
>>>>>> sold by cz.nic that actually support this.
>>>>>>
>>>>>
>>>>> dnsmasq supports DNSSEC and I believe that is the most common dns
>>>>> resolver on routers ?
>>>>>
>>>>>
>>>>>> So from my POV we are making things better with this text. If we
>>>>>> /require/ this, I think our requirement will be ignored, but maybe not. I
>>>>>> think we would have to ask the working group whether there is consensus to
>>>>>> require it. I don't want to delete it because I think we're missing an
>>>>>> opportunity if we don't at least encourage this.
>>>>>>
>>>>>
>>>>> You can change the text to instead reference RFC9364 which states
>>>>> DNSSEC is BCP.
>>>>>
>>>>
>>>>  I've updated the text as follows:
>>>>
>>>>    <li>Recursive resolvers at sites using 'service.arpa.'  MUST
>>>> transparently support DNSSEC queries: queries for DNSSEC
>>>>             records and queries with the DNSSEC OK (DO) bit set (<xref
>>>> target="RFC4035" section="3.2.1" sectionFormat="of"/>).
>>>>             While validation is not required, it is strongly
>>>> encouraged: a caching recursive resolver that does not validate answers
>>>>             that can be validated may cache invalid data.  This, in
>>>> turn, will prevent validating stub resolvers from successfully
>>>>             validating answers. We can't place normative requirements
>>>> on DNS recursive resolvers, but we remind implementors that
>>>>             DNSSEC validation is a Best Current Practice <xref
>>>> target="RFC9364"/>.</li>
>>>>
>>>> I'm not convinced that this satisfies your request, but it doesn't
>>>> really make sense to put normative language in here—we're simply
>>>> documenting the implications of this special-use domain, but it's up to
>>>> operators to decide whether or not they care. So I don't know what else we
>>>> should say here. I'm reluctant not to document the issue. I mean, granted,
>>>> I used MUST in the first sentence, but I'm feeling a bit weird about that
>>>> now that we're discussing it here.
>>>>
>>>>
>>>>>        To prevent such spoofing, TCP is required for such networks.
>>>>>>
>>>>>> It should say "source validated connections, such as TCP or UDP with
>>>>>> COOKIES"
>>>>>> (same later on in section 6.1) and normatively reference RFC 7873.
>>>>>> Constrained
>>>>>> devices could also use UDP with COOKIES.
>>>>>>
>>>>>
>>>>> We didn't consider cookies. I don't think it's particularly useful
>>>>> since it doesn't validate the first registration. That's why we recommend
>>>>> explicit source validation for the UDP case.
>>>>>
>>>>
>>>> I don't understand this answer. If you want spoofing protection, TCP is
>>>>> only one option. My rephrasing makes it more general, and implementers can
>>>>> decided which option to pick.
>>>>> You can still keep using TCP. Others could do DNS COOKIES. Currently,
>>>>> you text "requires" to use TCP, which I believe is wrong.
>>>>
>>>>
>>>> I don't see how DNS cookies help. This is a simple request/response,
>>>> and cookies only help on the second request. Am I misunderstanding? The
>>>> reason TCP works is that there's a three-way handshake before we even send
>>>> the DNS Update.
>>>>
>>>>
>>>>
>>>>>
>>>>>
>>>>>>         In other network environments, updates for names ending in
>>>>>>         "default.service.arpa" may be rewritten by the registrar to
>>>>>>         names with broader visibility.
>>>>>>
>>>>>> Can we avoid the use of "registrar" to avoid confusion with Registrar,
>>>>>> which in DNS speak usually refers to a domain registrar? How about
>>>>>> using
>>>>>> "network authority" ? Or consistently use "SRP registrar". (see also
>>>>>> the
>>>>>> use of "registrar" in section 3.3.6, 5.1, 6.1, 7)
>>>>>>
>>>>>
>>>>> Oh, good point. I think "SRP registrar" makes more sense than "network
>>>>> authority," plus I'd like to avoid confusing "authority" and "registrar"
>>>>> for the same reason you want to avoid confusing SRP registrars and domain
>>>>> registrars. :)
>>>>>
>>>>
>>>> This wasn't done in the latest version yet.
>>>>
>>>>
>>>> There are a lot of cases in the document where we say SRP registrar
>>>> once in a paragraph, and then just registrar thereafter. I can fix these,
>>>> but then we wind up with text like this:
>>>>
>>>> This means that if an attacker from outside of the administrative
>>>>  domain of the SRP registrar knows the SRP registrar's IP address, it
>>>> can in principle send updates to the SRP registrar
>>>>  that will be processed successfully.   SRP registrars SHOULD therefore
>>>> be configured to reject updates
>>>>  from source addresses outside of the administrative domain of the SRP
>>>> registrar.</t>
>>>>
>>>> This seems unnecessary. Are you concerned about these cases? I do see a
>>>> few cases where we just use registrar and not SRP registrar throughout a
>>>> paragraph, so I could fix those without fixing all the others. I don't mind
>>>> either way, but the exhaustive approach feels like it makes the document
>>>> harder to read, not easier.
>>>>
>>>>
>>>>>
>>>>>
>>>>>>         In this case, the requestor MUST either abandon the service
>>>>>>         registration attempt, or else choose a new name.
>>>>>>
>>>>>> The word "attempt" should be removed here. It is the registration
>>>>>> that is
>>>>>> aborted entirely, not just this attempt (or else try a new
>>>>>> registration with
>>>>>> a different name)
>>>>>>
>>>>>
>>>>> Hm, okay. How about "In this case, the requestor MUST choose a new
>>>>> name or give up"?
>>>>>
>>>>
>>>> I've made this change.
>>>>
>>>>
>>>>>
>>>>>>         If the key lease time
>>>>>>
>>>>>> Should be: if the KEY lease time
>>>>>>
>>>>>
>>>>> Hm, we actually only use "KEY lease" once. Everywhere else we say "Key
>>>>> lease." I don't see a strong reason to use all caps, but we could if you
>>>>> think it's important. We should definitely be consistent.
>>>>>
>>>>
>>>> Same here.
>>>>
>>>>
>>>> I went with "KEY lease". Even the capitalization of "lease" was
>>>> inconsistent. :)
>>>>
>>>>
>>>>> Sorry I took a bit long to respond. Hopefully we can have a few quick
>>>>> back and forths and move the document onwards.
>>>>
>>>>
>>>> I think the delay is my fault, so no worries. Thanks for getting back
>>>> to us on this!
>>>>
>>>>