[homenet] AD review of draft-ietf-homenet-front-end-naming-delegation-16

"Eric Vyncke (evyncke)" <evyncke@cisco.com> Mon, 08 August 2022 13:30 UTC

Return-Path: <evyncke@cisco.com>
X-Original-To: homenet@ietfa.amsl.com
Delivered-To: homenet@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D674AC13D086 for <homenet@ietfa.amsl.com>; Mon, 8 Aug 2022 06:30:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.624
X-Spam-Level:
X-Spam-Status: No, score=-9.624 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=aBjy7Rdd; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=DMgXIgoN
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zPAyyIsJxhWd for <homenet@ietfa.amsl.com>; Mon, 8 Aug 2022 06:30:33 -0700 (PDT)
Received: from rcdn-iport-9.cisco.com (rcdn-iport-9.cisco.com [173.37.86.80]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 53118C13D06E for <homenet@ietf.org>; Mon, 8 Aug 2022 06:30:33 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=61317; q=dns/txt; s=iport; t=1659965433; x=1661175033; h=from:to:subject:date:message-id:mime-version; bh=R5vUArjjCbuHjzk78jdoqquCWErlhBYqxmtnYNDMkec=; b=aBjy7RddDPSgaSP67IAXWAy4em+b3OQbBQYXh7fWigfHXOc0MW8vEdfX D46lYDIEjr5PXE9UcB5rx3ZJeoWF4zDaxDXKywHcwPen5toMcluLPXzUa 7ya/uRehbwMOmWMlR0U7CNP12L8dTIzBg8oHI4dS7GZddZ+EogwUBuIU/ Q=;
IronPort-PHdr: A9a23:99rmqR0ab498kIhfsmDPr1BlVkEcU/3cMg0U788hjLRDOuSm8o/5NUPSrfNqkBfSXIrd5v4F7oies63pVWEap5rUtncEfc9AUhYfgpAQmAotSMeOFUz8KqvsaCo3VMRPXVNo5Te1K09QTc3/fFbV5Ha16G16Jw==
IronPort-Data: A9a23:I2NH8a1A8wVLdhyxV/bD5c1zkn2cJEfYwER7XKvMYLTBsI5bpz0Dn2scDWrTPPiIZGT8fYh1aIW+8xhSu57RmoI3TFZp3Hw8FHgiRegpqji6wuYcB84ZRyH6ZBoPA/42N5+RdajYcleG/k33auW48yElvU21buOU5NDsa3gZqTBMEE/NuTo78wIIqtYAbeqRWmthivuqyyHrA2JJ7hYvWo4iBw1vnzs01Bj6kGtwUlXT/pmntneG/5UeJMp3ya1csxLFrodo8u6SH44vzZmw+mffuhwqEN7gy+y9eUwRSbmUNg+L4pZUc/H92V4Z+GprieBib6Z0hUR/011lm/h81sRLvp+9YQwoJabL3u8aVnG0FgkvY/QZo++XfCnXXcu7iheun2HX6/VpCUwwMJEw++trDydJ7/NwFdynRnhvnMq/xLa9D+JrnMlmdZOtN4IEsXYmxjbcZcvKiKvrG83ijeK0Fh9p2aiixcrjWvc=
IronPort-HdrOrdr: A9a23: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
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: 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
X-IronPort-AV: E=Sophos;i="5.91,230,1647302400"; d="scan'208,217";a="961738859"
Received: from alln-core-12.cisco.com ([173.36.13.134]) by rcdn-iport-9.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 08 Aug 2022 13:30:31 +0000
Received: from mail.cisco.com (xfe-aln-002.cisco.com [173.37.135.122]) by alln-core-12.cisco.com (8.15.2/8.15.2) with ESMTPS id 278DUVJm032598 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK) for <homenet@ietf.org>; Mon, 8 Aug 2022 13:30:31 GMT
Received: from xfe-rcd-004.cisco.com (173.37.227.252) by xfe-aln-002.cisco.com (173.37.135.122) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14; Mon, 8 Aug 2022 08:30:30 -0500
Received: from NAM02-DM3-obe.outbound.protection.outlook.com (72.163.14.9) by xfe-rcd-004.cisco.com (173.37.227.252) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14 via Frontend Transport; Mon, 8 Aug 2022 08:30:30 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=kzal+XRDVG5ihThIL6PRIM6BrWOkGerUBFiJK09yt3w+mptydxz92e5NBktEgILCuAtwD1olxGzE7VHlW1BUgtF6oGNJNPVTxHIyRlVDaGTl16g6Wr6dEBkKxjIUo6nnBi2+mSWzXg/HKuX1e0/F3ZGzURL6K2wv0KKbCgBnONG1FjyTqEuyZLzPOPg+tdJKLVaiO7b1OXHRiRQT5yC/TyODJibQCA4P4GzelZw1qVEZI46ZQU+EmKL0x3QIzhjabiaKYJ4zVR6+1A069BDmrU+P2gSB+yz+hhBF/xyh4TrlMXlzbmcANyYTXVD6hF+t7ftRYi2gmckYSEbGb+AG8A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=R5vUArjjCbuHjzk78jdoqquCWErlhBYqxmtnYNDMkec=; b=X78lliwonR6v+4mSjjdewoZvb9Etg+4uf1CWD9FxTq4LyfHSrKTEhWXMUyf2QGolFgwbHobH1nHmW5GdxDh8/qQjTB5VhKF1RZD3NjNnEDC1FKLux+xdXoZnUnp0AS3E2M1PlhL+WKWS/RwzRQ6mnZww/wCm3dXwPw9Cxf1NO1U3iEJT9zj6aOUnh8FN7gWllYft3Vgan0uCh0E8dMVr6tGujhnL5NPNgfjTQMxL+cIuyE3fXZVM0I24V5UeycdFAQeFJK+uq7Rk8EJU5C+SKnleb9HxCTsBs+aMFNVtWYAlfcbfdliCbPgRXmXTJR4ehrA2rFjwsUITrAdIxncOvw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=R5vUArjjCbuHjzk78jdoqquCWErlhBYqxmtnYNDMkec=; b=DMgXIgoNZLpL1EykB/Wt/zS6HGaWqhDoXx8Cmamzr5zXdWNv53FSscQ2lE84a6lNDicbkS7pMVNomN48//jBJU9g9B4ZOWpC+w6CFOIYE8hxdpgo047/uYmZISHVSF5Ous+0ATXGEVyIT6qoT9B/ytsemwxY+TFFmQfviUj9yYE=
Received: from PH0PR11MB4966.namprd11.prod.outlook.com (2603:10b6:510:42::21) by MW3PR11MB4569.namprd11.prod.outlook.com (2603:10b6:303:54::7) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5504.15; Mon, 8 Aug 2022 13:30:29 +0000
Received: from PH0PR11MB4966.namprd11.prod.outlook.com ([fe80::d49a:9e3c:8d44:2a40]) by PH0PR11MB4966.namprd11.prod.outlook.com ([fe80::d49a:9e3c:8d44:2a40%6]) with mapi id 15.20.5504.020; Mon, 8 Aug 2022 13:30:25 +0000
From: "Eric Vyncke (evyncke)" <evyncke@cisco.com>
To: "homenet@ietf.org" <homenet@ietf.org>
Thread-Topic: AD review of draft-ietf-homenet-front-end-naming-delegation-16
Thread-Index: AQHYqwyBGOIRRDxBFUqGYsolMvWbMw==
Date: Mon, 08 Aug 2022 13:30:25 +0000
Message-ID: <6FF7BEC2-21FB-4799-938C-35976DB04EE5@cisco.com>
Accept-Language: fr-BE, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.63.22070801
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=cisco.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: f3e47459-fb25-4184-c4cc-08da794226e4
x-ms-traffictypediagnostic: MW3PR11MB4569:EE_
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: YxPoexbr7iexv1dHPyG0k1NYRv1Yd3EBvUMUqKpxAuWIw+RJWA5KrTlLT78Jj5thSQvD5Mm9OR3hWQCGVtVLpuDkanvH29mBaANsQQrsKmh/aULRImqca3Bbg9E7iF+dTp1z0INkz/HChf/UalzEi7k7jkevEZyXtCct/sSWRKCPhGXdXddv1ypmskQUR02X+qdNfrANXm9HohSq8MpBI+eIr12qZpIDKTxBD4+OKq+tlVC8WF26VaUcSrXb1bhq4sgXWsx0vExq2zvu/i6mJXQ4qNSdKuSWEvZi9IWoMPTfDyuAgjXPl42bjFniq+s89umGyFJTTDXlZemZDoDJABslIqfF0ki7Xz+w3kqo1NzOou9PoUIlelj4oLmDzK+s2DeXe9ci7+bEQ3NOBmSAF/WjOrLBvCX6t0mAOL8VXJszrXI1svvw52jt815/UEvieAPuEy+xJGSFpdcCSbKYnlEHb6rfttWSVbaHq/+xxrzBgdV2+CxZlbQfDQPYAmVC1eZ1YwWhGxJXcnuHlIPG1VrqF3l6T71wcHS4zF+zkRG8G19MXsyyuTljaWydfHmLytWM3Y2L2SXg1rAlHZcgCDR2I8CuB4r6TioCvnZ6XfrW93J2xEgPjgrbHdjU0j48VRZHDDa4mFjtqXUfL2FKTOCaYTx+CN+R9yE+Kqg7eB77XS+bQJnQ5dMPAHd/6EBV/R+WzamKRyHGxTB+WuOY9ab8nkWG0pILlts9MGndrNZ7OKFOw73Uwz344iL4k7bVvZrzse7mh6dB85VSqf0U2fkBkiE/3QMG3NOfmS7VeuvYietm8L4GlB9xLEQIBKiQ+2Vmmi94NGIWBXfROyUihLb1FeVty6KmQroOMN+6hQ424vTTLdBiomLKKVZZFpEzvZpDeiinuflq2r95P+8gjA==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:PH0PR11MB4966.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230016)(4636009)(396003)(366004)(136003)(376002)(39860400002)(346002)(316002)(2616005)(478600001)(2906002)(6916009)(76116006)(41300700001)(36756003)(66946007)(66476007)(64756008)(66446008)(66556008)(91956017)(8676002)(122000001)(33656002)(5660300002)(71200400001)(966005)(6486002)(38100700002)(6512007)(86362001)(83380400001)(38070700005)(8936002)(6506007)(186003)(66574015)(45980500001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_6FF7BEC221FB4799938C35976DB04EE5ciscocom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: PH0PR11MB4966.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: f3e47459-fb25-4184-c4cc-08da794226e4
X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Aug 2022 13:30:25.3050 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 2umWOYUtPfquQxi1zOCDp6CG+NKFi0eaBZ0z+BW5NCH0OBdf+oju+I4RXVMJZpvD5S9rgU6Uii6y5jQspwt2UQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MW3PR11MB4569
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.135.122, xfe-aln-002.cisco.com
X-Outbound-Node: alln-core-12.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/homenet/hluHNd8u90kzMqiWUVQZNi6I1bs>
Subject: [homenet] AD review of draft-ietf-homenet-front-end-naming-delegation-16
X-BeenThere: homenet@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: IETF Homenet WG mailing list <homenet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/homenet>, <mailto:homenet-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/homenet/>
List-Post: <mailto:homenet@ietf.org>
List-Help: <mailto:homenet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/homenet>, <mailto:homenet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 08 Aug 2022 13:30:37 -0000

As usual, I do my own review before requesting the IETF Last Call for all documents. The intent is to give another polishing pass on the I-D.



For this review, the MD format is used.



Hope this helps



Regards



-éric



# Éric Vyncke, INT AD, comments for draft-ietf-homenet-front-end-naming-delegation-16

CC @evyncke



Thank you for the work put into this document. Multiple nits and typos are identified in the end of this review, I would have expected a document that has been through spell and grammar checkers.



Please find below one blocking DISCUSS points (easy to address), some non-blocking COMMENT points (but replies would be appreciated even if only for my own education), and some nits.



Special thanks to Stephen Farrel for the shepherd's detailed write-up including the WG consensus, *but* it lacks the justification of the intended status.



I hope that this review helps to improve the document,



Regards,



-éric



## DISCUSS



### id-nits, references to be updated



Please have a look at https://author-tools.ietf.org/api/idnits?url=https://www.ietf.org/archive/id/draft-ietf-homenet-front-end-naming-delegation-16.txt and address the updated references.



### id-nits, downref



As noted by Stephen in his review (and I second his proposal), several normative references should probably "just" informative.



### HNA certs



From my reading of the text, it is really unclear whether HNA certs are / may be self-signed and what the subject alt name is (IP address ? FQDN ? other).



### Section 1, multiple IP addresses



In `A device may have a Global Unicast Address (GUA),`, it appears by the use of 'a' that devices can have only one. Suggest removing 'a'.



In the same vein, even in residential network, there may be global IPv4 addresses.



### Section 1.2, 1 to 3 ?



Please justify the limit to 3 in `For a very few number (one to three) of hosts`



### Section 1.2, requirements ?



Please add a reference (or rephrase) the requirement in `Such dependence does not meet the requirement for`.



### Section 2, Homenet Authoritative Servers:



For which zones `Homenet Authoritative Servers:` ?



### Section 3.2



The I-D proposes to use DoH & DoQ as transport, but did the authors check that AXFR operations can be made over DoH ?



### Section 4.5.4 SHOULD ?



Please explain when the 'SHOULD' does not apply.



### Section 5, port XX



As the XX on DM is 853, does it require the HNA to also listen on XX == 853 ?



### Section 5

```

   The use of a primary / secondary mechanism is RECOMMENDED instead of

   the use of DNS Update

```



What is 'primary/secondary mechanism' ? Missing transfer ?



'DNS update' is it the HTTP RESTful one ? Is it the same as 'DNS UPDATE [RFC2136]' used later in the section ?



### Section 11.3



Who is the end user in :

```

   ... For

   that reason end users may choose not to respond to PTR DNS queries

   and MAY instead return a NXDOMAIN response.

```



### Appendix A, why in appendix ?



Is there a reason why the reverse zone is in the appendix ? There should at least be a forward reference in the introduction to the appendix but better to move in the main body.



## COMMENTS



### Shepherd's review, intended status



Stephen, as noted above, please include some justification for the intended PS status.



### Section 1, devices or services ?



```

   Home network owners often have devices that they wish to access

   outside their home network - i.e., from the Internet using their

   names.

```



As DNS contains more than mere IP addresses and as a single device can host many services with different IP addresses, propose to use 'devices and services'.



This issue also appears in other sections (e.g., sect 1.1)



### Section 1.1, un-parsable ?



Is it parsable for a native-English speaker ?

```

   While this document does not create any normative mechanism by which

   the selection of names to publish,

```



### Section 1.1, inside ?



Please define (or add a reference) for `on the inside of the home`.



### Section 1.1, DHCP rebinding ?



The reference to RFC 6644 is a little weird to me, either use 'DHCP rebind' or use the right RFC for DHCPv6.



### Section 1.1, RFC 1918 or private



Please add a reference to ULA and use 'private IPv4 addresses' rather than 'RFC 1918 addresses' ?



### Section 1.1, TLS ?



Why is TLS mentioned here ? It should rather be in the security section.



### Section 1.1



This is probably the reverse:

```

A direct advantage of enabling local

   communication is to prevent communications even in case of Internet

   disruption.

```



### Section 1.2



`As there are some commonalities provides by individual home` possibly a typo.



### Section 3.1, which network ?



In `When the request is coming within the network`, which network ? Even if guessable, let's be clear.



### Section 3.1



Should '.local' also appear in figure 1?



### Section 3.2



What is `cloud provider's anycast addresses`?



### Section 4.6 oxymoron ?



Isn't `The DM MAY use a *self-signed CA* certificate mechanism per HNA` an oxymoron ?



### Section 4.6, ambiguous



In `The DM MAY use a self-signed CA certificate mechanism per HNA`, is this cert used to verify the connection from HNA or rather used by the DM to sign its messages ?



### Section 4.7 SHOULD



When can an implementation not follow the "SHOULD" ?



### Section 3, synchronization or transfer



Just wondering whether 'synchronization' is the best word (as it is mainly HNA updated one-way the DM), why not simply 'transfer' ?



### Section 5



A small figure would be nice.



### Section 5, CPE only



```

   The HNA acts as a Hidden Primary Server, which is a regular

   authoritative DNS Server listening on the WAN interface.

```



Does this mean that only CPE can be a HNA ? Then, what about the previous paragraphs about multiple HNA at home?



### Section 5.1



Please also add which parties are the primary and secondary.



### Section 5.1, DNS resolution



Humm is `(via DNS resolution)` normative ?



When can the last 'SHOULD' be ignored ?



### Section 7, SHOULD



Please explain when the 'SHOULD' can be ignored.



### Section 9, reverse zone



In `it is RECOMMENDED that only the newly reachable IP addresses be published`, what is the recommendation for the reverse zone(s) ?



### Section 10



Suggest moving section 10 as a sub-section of section 11.



### Section 10



No clue of to understand:

```

   For instance, an adult child checking on the

   state of a home automation system for a parent.

```



### Section 11.2



Should temporary IPv6 addresses be mentioned as well ?



### Section 11.4



Please rename this section to something else as it is not the usual 'operational considerations' section.



### Appendix A



```

   In the case of the reverse zone, the DOI authenticates the source of

   the updates by IPv6 Access Control Lists.

```

DOI or DM ?



### Appendix A.1



s/2001:db8:aeae:0001::2/2001:db8:aeae:1::2/



Does this mean 2 control channels (one for WAN and one for inside LAN) ?



Unsure whether the following is true:

```

   With IPv6, the domain space for IP addresses is so large that reverse

   zone may be confronted with scalability issues.

```



### Appendix A.2



s/RG router/CPE/



### Appendix B



Is not normative, then is it useful ?



What is 'front-end protocol' ?



### Appendix B.1



Hmm a little unclear at first sight whether this section is explaining the parameters of appendix B.



### Appendix C



Even if not normative, use cases are often described in the introduction section. Consider moving this appendix in section 1.



## NITS



### Abstract & section 1



s/needs/need/



### Section 1.1



s/home network administrator (a human), will be presented with a list/home network administrator, (a human being), will be presented with a list/ ?



### Section 1.2



s/For a very few number/For a very few numbers/ ?



### Section 4.2



`so the that DOI`? how to parse this ?



### No comma before 'and'



AFAIK, there is no comma before 'and', exception made for the Oxford comma of course.



### Section 4.2



s/were/was/ ?



### Section 4.5



s/long term session/long-term session/



### Section 4.6



Unbalanced parenthesis.



### Section 4.7



s/describe din/described in/



### Section 5



Duplicate `toward a service a service`



### Section 6



s/is outside/are outside/ ?



### Non-empty well-known



Several missing '-' in 'non-empty' and 'well-known' (when applicable).



### E.g.



"E.g." should be enclosed in ','.



### Section 9



'by by' ?



### Section 10



s/privacy MAY be provide/privacy MAY be provided/



### Section 11.1



`To ensure the multiple TLS session are are continuously authenticating ` duplicated 'are'



s/This MAY Be handle by a off-line /This MAY be handled by an off-line/



### DNS in uppercase



There are a couple of 'dns' (lowercase) instances.



## Notes



This review is in the ["IETF Comments" Markdown format][ICMF], You can use the

[`ietf-comments` tool][ICT] to automatically convert this review into

individual GitHub issues.



[ICMF]: https://github.com/mnot/ietf-comments/blob/main/format.md

[ICT]: https://github.com/mnot/ietf-comments