[Emu] Murray Kucherawy's No Objection on draft-ietf-emu-aka-pfs-12: (with COMMENT)

Murray Kucherawy via Datatracker <noreply@ietf.org> Mon, 15 April 2024 02:09 UTC

Return-Path: <noreply@ietf.org>
X-Original-To: emu@ietf.org
Delivered-To: emu@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 55366C14F5F6; Sun, 14 Apr 2024 19:09:04 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: Murray Kucherawy via Datatracker <noreply@ietf.org>
To: The IESG <iesg@ietf.org>
Cc: draft-ietf-emu-aka-pfs@ietf.org, emu-chairs@ietf.org, emu@ietf.org, peter@akayla.com
X-Test-IDTracker: no
X-IETF-IDTracker: 12.10.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: Murray Kucherawy <superuser@gmail.com>
Message-ID: <171314694433.45277.8278681970038025593@ietfa.amsl.com>
Date: Sun, 14 Apr 2024 19:09:04 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/emu/WVYg305jKuLkDZwkrNCy_6v-8Sg>
Subject: [Emu] Murray Kucherawy's No Objection on draft-ietf-emu-aka-pfs-12: (with COMMENT)
X-BeenThere: emu@ietf.org
X-Mailman-Version: 2.1.39
List-Id: "EAP Methods Update \(EMU\)" <emu.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/emu>, <mailto:emu-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/emu/>
List-Post: <mailto:emu@ietf.org>
List-Help: <mailto:emu-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/emu>, <mailto:emu-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 15 Apr 2024 02:09:04 -0000

Murray Kucherawy has entered the following ballot position for
draft-ietf-emu-aka-pfs-12: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ 
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-emu-aka-pfs/



----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

Thanks for this work.  Thanks also to Sean Turner for the ARTART review.

And thanks for resolving the DISCUSS question around the document's status. 
The rest of my original comment is left here for reference.

===

Section 7:

The use of "RECOMMENDED" in Section 7 is peculiar.  As prescriptive
interoperability or security advice, to whom does it apply?

Section 8:

BCP 26 strongly urges that a Specification Required registry has advice for the
Designated Experts, but this document contains none.  Is there nothing to say
here?

Francesca's point also needs attention.

===

Additional comments from incoming ART AD, Orie Steele:

6.5.2

> The peer identifier SHALL comply
   with the privacy-friendly requirements of [RFC9190].

ought to be a MUST?

Section 7

   > As discussed earlier (see Section 1 and Section 4.3, forward secrecy
   is an important countermeasure against well-resourced adversaries
   that who may get access to the long-term keys, see Section 1.  Many
   of the attacks against these keys can be best dealt [mitigated] with improved
   processes, e.g., [restricting] limiting the access to the key material
   within the [a] factory or personnel, etc.  But not all attacks can be
   entirely ruled out for well-resourced adversaries, irrespective of what the
   technical algorithms and protection measures are.  And the likelihood of
   practically feasible attacks has increased.  To assume that a breach is
   inevitable or has likely already occurred [NSA-ZT], and to minimize impact
   when breaches occur [NIST-ZT] are essential zero trust principles.  One type
   of breach is key compromise or key exfiltration.

I'd recommend rewording much of this section.

7.1

Perhaps there is a better word than "forget", consider "destroy", possibly with
a call out defense against forensic analysis.