Return-Path: <alexey.melnikov@isode.com>
X-Original-To: gen-art@ietfa.amsl.com
Delivered-To: gen-art@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix)
 with ESMTP id 50B7021F87F2; Wed, 18 Jan 2012 06:38:32 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.203
X-Spam-Level: 
X-Spam-Status: No, score=-101.203 tagged_above=-999 required=5
 tests=[BAYES_00=-2.599, MIME_QP_LONG_LINE=1.396, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com
 [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LMANZaZy3Bdm;
 Wed, 18 Jan 2012 06:38:31 -0800 (PST)
Received: from rufus.isode.com (cl-125.lon-03.gb.sixxs.net
 [IPv6:2a00:14f0:e000:7c::2]) by ietfa.amsl.com (Postfix) with ESMTP id
 4E4D221F87EE; Wed, 18 Jan 2012 06:38:31 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; t=1326897510; d=isode.com;
 s=selector; i=@isode.com; bh=rIG6T89VaXV1t2YcuZroQwK8wFlIJAgF+JKEvLUC1tQ=;
 h=From:Sender:Reply-To:Subject:Date:Message-ID:To:Cc:MIME-Version: In-Reply-To:References:Content-Type:Content-Transfer-Encoding:
 Content-ID:Content-Description;
 b=iBAXGW0DPpSmX2+gNvhusoMy3F9D7qn1LBkrtB5Ly+7uhSvYha3bGdohVUIXxbSHEV9Nf+
 mUr9+bxmuXY9RBOZr75BQH4UR1pgKvvcEYbLXsycuQO8HIPaC5NolWetHZJtP9oY3WuCAu
 4kvK/HFDC02ygb3B0Tg2sBuYIq3MGcA=; 
Received: from [188.28.43.206] (188.28.43.206.threembb.co.uk [188.28.43.206])
 by rufus.isode.com (submission channel) via TCP with ESMTPSA id
 <TxbZYgAV52tI@rufus.isode.com>; Wed, 18 Jan 2012 14:38:29 +0000
Message-ID: <4F16D95A.3000006@isode.com>
Date: Wed, 18 Jan 2012 14:38:18 +0000
From: Alexey Melnikov <alexey.melnikov@isode.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:8.0) Gecko/20111105 Thunderbird/8.0
To: Brian Trammell <trammell@tik.ee.ethz.ch>
References: <4F11E975.9070307@isode.com>
 <10722E0B-059E-4800-84C0-B330F397B63A@tik.ee.ethz.ch>
In-Reply-To: <10722E0B-059E-4800-84C0-B330F397B63A@tik.ee.ethz.ch>
MIME-Version: 1.0
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-transfer-encoding: quoted-printable
Cc: Kathleen Moriarty <kathleen.moriarty@emc.com>, gen-art@ietf.org,
 The IESG <iesg@ietf.org>
Subject: Re: [Gen-art] Gen-ART last call review of
 draft-ietf-mile-rfc6046-bis-05
X-BeenThere: gen-art@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "GEN-ART: General Area Review Team" <gen-art.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/gen-art>,
 <mailto:gen-art-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/gen-art>
List-Post: <mailto:gen-art@ietf.org>
List-Help: <mailto:gen-art-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/gen-art>,
 <mailto:gen-art-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 18 Jan 2012 14:38:32 -0000

On 17/01/2012 10:16, Brian Trammell wrote:
> Hi, Alexey,
>
> Thanks for the review; questions and comments thereon inline...
>
> On Jan 14, 2012, at 9:45 PM, Alexey Melnikov wrote:
>
>> I am the assigned Gen-ART reviewer for this draft. For background on Gen-=
ART, please see the FAQ at<http://wiki.tools.ietf.org/area/gen/trac/wiki/Gen=
Artfaq>.
>>
>> Please resolve these comments along with any other Last Call comments you=
 may receive.
>>
>> Document: draft-ietf-mile-rfc6046-bis-05
>> Reviewer: Alexey Melnikov
>> Review Date: 2012=9601=9614
>> IETF LC End Date: 2012-01-17
>> IESG Telechat date: 2012-01-19
>>
>> Summary: This draft is almost ready for publication as a Proposed Standar=
d RFC.
>>
>>
>> Major issues:
>>
>> In Section 3:
>>
>>    The RID callback MUST contain a zero-length entity body
>>    and a 'RID-Callback-Token' entity header
>>
>> [Minor issue] "header" -->  "header field" (header is the collection of a=
ll header fields).
>>
>>    , itself containing a unique
>>    token generated by the receiving RID system.
>>
>> I am missing ABNF for the new header field.
> Seems a little superfluous... it's an opaque string, but I suppose we shou=
ld point out it doesn't contain \r or \n...
Saying it is an opaque string is Ok, but you don't even specify which=20
characters are allowed in it.
>   Will add.
Thanks.
>>    RID systems MUST use TLS version 1.1 [RFC4346] or higher with mutual
>>    authentication for transport confidentiality, identification, and
>>
>> Do you mean that a RID client must use X.509 certificates?
> Well, each RID system (HTTP client or server) is identified by an X.509 ce=
rtificate (hence "mutual"); how can I make this clearer?
>
>>    authentication, as in [RFC2818].
>>
>> I find the whole sentence to be confusing. Note that the rules of RFC 612=
5 for certificate verification are stricter than in RFC 2818 and this senten=
ce can be read as conflicting with the paragraph below which requires use of=
 RFC 6125. What are you trying to say here?
> The intention here is "Use current best practices as would be supported by=
 off-the-shelf HTTP/1.1 and TLS 1.1 implementations to provide mutual authen=
tication." "Current best practices", however, seems to be something of a mov=
ing target.
>
> I cite 2818 as it is the current binding between HTTP/1.1 and TLS. I cite =
6125 solely for certificate verification.
How about something like this:

OLD:
   RID systems MUST use TLS version 1.1 [RFC4346] or higher with mutual
   authentication for transport confidentiality, identification, and
   authentication, as in [RFC2818].

NEW:
   RID systems MUST use HTTP over TLS as specified in [RFC2818], with=20
the exception
   of server TLS identity verification which is detailed below.
   RID systems MUST use TLS version 1.1 [RFC4346] or higher with mutual
   X.509 authentication. TLS provides for transport confidentiality,
   identification, and authentication.
>>    RID systems MUST provide for the verification of the identity of a
>>    RID system peer presenting a valid and trusted certificate, by
>>    verifying the fully-qualified domain name and service name from the
>>    DNS SRV record, if available, against that stored in the certificate,
>>
>> I am confused: this is the first time DNS SRV records are mentioned
>> (BTW, they need a Normative Reference). Earlier text seem to suggest that=
 DNS SRV are not used to locate protocol endpoints. If RID is using DNS SRV,=
 then information about how it is used is missing from the document.
> It doesn't. Was trying to point out here that SRV must be matched if (for =
deployment-specific reasons) it was present. This is simply a poor attempt a=
t citing 6125.
SRV-ID are really only applicable to protocols which are using DNS SRV.=20
So I would have prohibited them... But if you want to keep using them,=20
you need to specify what is the service name you would expect in them.
>>    as in Section 6 of [RFC6125].
>>
>> RFC 6125 allows for various options and this paragraph doesn't seem to co=
ver all of them. I suggest you check Section 13.7.1.2.1 of RFC 6120 for an e=
xample of what should be specified (ignore XmppAddr identifier type, as it i=
s very XMPP specific). For X.509 SANs which are disallowed, you should say s=
o.
> Will do. (6125 is missing something here, a guide for using it in other sp=
ecs...)
>
> Best regards,
>
> Brian

