Re: [Iot-directorate] Iotdir last call review of draft-ietf-drip-arch-22

Thomas Fossati <Thomas.Fossati@arm.com> Thu, 12 May 2022 11:18 UTC

Return-Path: <Thomas.Fossati@arm.com>
X-Original-To: iot-directorate@ietfa.amsl.com
Delivered-To: iot-directorate@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CFDF3C14F74B; Thu, 12 May 2022 04:18:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.799
X-Spam-Level:
X-Spam-Status: No, score=-6.799 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, HTTP_ESCAPED_HOST=0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=1Ln5BF1+; dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=1Ln5BF1+
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QVqWXB5NiaWS; Thu, 12 May 2022 04:18:00 -0700 (PDT)
Received: from EUR05-AM6-obe.outbound.protection.outlook.com (mail-am6eur05on2060f.outbound.protection.outlook.com [IPv6:2a01:111:f400:7e1b::60f]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CE176C14F73B; Thu, 12 May 2022 04:17:58 -0700 (PDT)
ARC-Seal: i=2; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=pass; b=nZtGLBagNwMXwb+edY9srzjuQq9QjK1+/Gg36LZyvOThFCxXJQ507zC+iE9PbVDylSjSlg+DntZxUgquFL+8xLOqK1qw7l57jo7fIgOzhHv0WbgCEXwnfjgJGQT8DRWjuffGTACPEaCfZq7eOCAwV9v8OE2LOo3dQ6zvK3pHTsRkzrHIk/oTi9kigx1Jg964FoUn+njYTOH5/0A77ehgvNWGR6g1FiCgqcwgYgNQLBwYe3u6BxpU7AXO8ZXWqNoqnvjQ0I3YmwdSC1O5q5w+dDeBfd4P6B/2+ua/MdwOxrK/BMHHArbhFl4AYGY2mTkKf2Mbt7bqlKu5kNQa8jWpPg==
ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=EtDteoLNhUJ/2b1pL+9gcLVbhksvpnJGdqa7QXD9x6k=; b=K7hj1BiA0oV42aX5KptY9qioTvbhowzgZZzryJ0SgmXYDcadlE8hKTRWP04q6SzTbuQUZKoBq2OM3ZpkrU1T8lMJuxjqUeBiguDcTnzujCmbYZN0hlOjx2MlT7FXWRBPFZ1rG5oTo3ojo2jSJ+h0lwb0nRDyoXDFtBswyAWkUmYl1gKktluIVvk8NUyNEhcvUOJC6q2wd2GnDdg/pXa91Arrng4E7kTbk0ATD7FaKOJvMKXfqMp58XNEymrwRu54Zof85eA0iKVtghSx5AmtrGE/KT0kITAFGu3D+3QRsdUs+1be8Y5V/SljdJRyawDcVVakSA6rqhRF1ijsEQ+g1A==
ARC-Authentication-Results: i=2; mx.microsoft.com 1; spf=pass (sender ip is 63.35.35.123) smtp.rcpttodomain=ietf.org smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com; arc=pass (0 oda=1 ltdi=1 spf=[1,1,smtp.mailfrom=arm.com] dkim=[1,1,header.d=arm.com] dmarc=[1,1,header.from=arm.com])
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=EtDteoLNhUJ/2b1pL+9gcLVbhksvpnJGdqa7QXD9x6k=; b=1Ln5BF1+gIP1Os4ok0iPqpHMklGYYj/rEfsiwM8TEFy4sv0Gbv8s+gpqlrcpzDNOq2N6dBihgRKfkZQcUGzKlEG+3IOaEITuuJy+VaMDryVrdsCNikrjsfFvnEeK9CwIG3F6wHOw1wwB9tVuqh1uDQxQzSivRufG/QNHm7DYqRE=
Received: from AS9PR0301CA0034.eurprd03.prod.outlook.com (2603:10a6:20b:469::23) by VE1PR08MB5712.eurprd08.prod.outlook.com (2603:10a6:800:1a8::5) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5250.13; Thu, 12 May 2022 11:17:51 +0000
Received: from VE1EUR03FT040.eop-EUR03.prod.protection.outlook.com (2603:10a6:20b:469:cafe::e4) by AS9PR0301CA0034.outlook.office365.com (2603:10a6:20b:469::23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5250.14 via Frontend Transport; Thu, 12 May 2022 11:17:51 +0000
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by VE1EUR03FT040.mail.protection.outlook.com (10.152.18.210) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5250.13 via Frontend Transport; Thu, 12 May 2022 11:17:50 +0000
Received: ("Tessian outbound 07c1c99345b0:v119"); Thu, 12 May 2022 11:17:50 +0000
X-CheckRecipientChecked: true
X-CR-MTA-CID: e2a59ad7a4ab9d3b
X-CR-MTA-TID: 64aa7808
Received: from 19af8d46a5e1.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id CC4D929B-26D8-486C-91D0-04191CE36BA0.1; Thu, 12 May 2022 11:17:43 +0000
Received: from EUR05-VI1-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 19af8d46a5e1.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Thu, 12 May 2022 11:17:43 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=T75X0bpvXPpsumC9UDhUflViFqC08upcgJBpHwghqtWgH9QI3Ejaqpcs3JihgsLmZIIuAXbPnvlx6nPo1lVYfoWBWTtcGyD/lJxZNISnWhi8bLQYpB2NS/mIiLu0/bY2NqoKOMyxY+Pe4g+HmBPpYEKYw7wMvqvyefus0moID7JUMc3nEyDebjgtqiS6KKIxAq3yRO9aICtUCnvcMbP+VOJ4cnZvqE0oAGIuHYkG932xSyVckd5WHev3rS8LgyBvSkhAOrxh5KDOvO7g2uKMq9gMyV+PWnAg89ovXQFF2vFk7VlRPE7LZz8DS4aMTDGLPv0sVNscwjed04z9b3R8Pw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=EtDteoLNhUJ/2b1pL+9gcLVbhksvpnJGdqa7QXD9x6k=; b=m/SNNxLO1U7pizKl6ty/I7KaG0RwQLQXLskxLnhq/6EeU7PVsPDvpeW9kmspGzgoKKhk/o03lU9Qebj3U7JCk5oBkAIzjudgq6s/MkRen7QB5nqCanorDqBUT8UySJ58qNGOfTyHy0DR16pialUw8hWbwLipjl7WUBqSSi9Ow4UF3toCKI6c5IQRmeNqp5Gds4jEuh9c1wFk0TRRdzfgy175cKAtmQ4VmD5NpRMxX3cMDgGmkUPbuh3uzpR4zRjN7rQj0gQ32fcaspCifQygO4uX1XU0Zr106yCNlTHYXB4+ub/X56YL6o2XRQOKWYYVE/1Vwj5wgxQX45QG4G/jVA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=EtDteoLNhUJ/2b1pL+9gcLVbhksvpnJGdqa7QXD9x6k=; b=1Ln5BF1+gIP1Os4ok0iPqpHMklGYYj/rEfsiwM8TEFy4sv0Gbv8s+gpqlrcpzDNOq2N6dBihgRKfkZQcUGzKlEG+3IOaEITuuJy+VaMDryVrdsCNikrjsfFvnEeK9CwIG3F6wHOw1wwB9tVuqh1uDQxQzSivRufG/QNHm7DYqRE=
Received: from DB9PR08MB6524.eurprd08.prod.outlook.com (2603:10a6:10:251::8) by PA4PR08MB5888.eurprd08.prod.outlook.com (2603:10a6:102:e8::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5250.14; Thu, 12 May 2022 11:17:40 +0000
Received: from DB9PR08MB6524.eurprd08.prod.outlook.com ([fe80::adc5:f2d3:1920:7e3c]) by DB9PR08MB6524.eurprd08.prod.outlook.com ([fe80::adc5:f2d3:1920:7e3c%7]) with mapi id 15.20.5250.014; Thu, 12 May 2022 11:17:40 +0000
From: Thomas Fossati <Thomas.Fossati@arm.com>
To: shuai zhao <shuai.zhao@ieee.org>, "Stuart W. Card" <stu.card@axenterprize.com>, Robert Moskowitz <rgm@htt-consult.com>, "adam.wiethuechter@axenterprize.com" <Adam.Wiethuechter@axenterprize.com>
CC: "draft-ietf-drip-arch.all@ietf.org" <draft-ietf-drip-arch.all@ietf.org>, "last-call@ietf.org" <last-call@ietf.org>, "tm-rid@ietf.org" <tm-rid@ietf.org>, "iot-directorate@ietf.org" <iot-directorate@ietf.org>
Thread-Topic: Iotdir last call review of draft-ietf-drip-arch-22
Thread-Index: AQHYZZMBHdB9fqNJbkencFmJ3z2gqq0bCnTp
Date: Thu, 12 May 2022 11:17:39 +0000
Message-ID: <DB9PR08MB652445096C1A959C58BE7BE09CCB9@DB9PR08MB6524.eurprd08.prod.outlook.com>
References: <164840309027.4996.16025423500440919013@ietfa.amsl.com> <PH0PR17MB57286B4B892B06893ACDCFC6F4C89@PH0PR17MB5728.namprd17.prod.outlook.com>
In-Reply-To: <PH0PR17MB57286B4B892B06893ACDCFC6F4C89@PH0PR17MB5728.namprd17.prod.outlook.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Authentication-Results-Original: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: eba799db-8f63-4b8e-d835-08da34090d50
x-ms-traffictypediagnostic: PA4PR08MB5888:EE_|VE1EUR03FT040:EE_|VE1PR08MB5712:EE_
X-Microsoft-Antispam-PRVS: <VE1PR08MB57126DC3E07BE1A7060F7D779CCB9@VE1PR08MB5712.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original: ijkP8pxwH4km6Mred9SFVvgfUjYp4QxgO5K8CWw3ycX8oL9ilEJPcgxalR3QWIaCHalM7BO38nuvqrEOeBqPxLv2+idS8PnGiNknT0DpGBELJgUgXJ/op8315nHmsht8uepbMOBdPBdRPtFJUgEHgVtQ/9Bd9Cc/omVX3m4gthjX3VXdIjGTdHtzq909+5vcr88ssvsCk3+wmLogWeFWCR662wReIWPGaXmFvr94lKfiKaCrEOvC0rSH1BOnLuUd172WiUD5DjX0azf5osCdGTzM8Irxy9mrUw62cLYNSLBlTdjZWEaTbH+081cg0jVlQf/9eqe9cQJlByuycuLxYe0Adc1Cv9OWfYe0bqCVKMQesdZxG2U8r7wNfr8kNBcOU2efTsCeqqNFWBj3W8eF34H6laZY7ISkX9S16e2QNKPeQNUSDcfVagEwwJAyqiUblTEXMpVkXv2KB1zwo/YYo73QwH/sI93YtWq1BgwtP4fyD8ICqhtK0cUj2d1K2R5KIv44zJgQb4k2LRjqZj4s6UsHyGdWtwLZqpFNhqrMMFZkpFmztMXCMrc9gcmqF5heRA7WramXyFunty6sU426H+WqE9K6yhLyHc2websEu8RuyifoQ45WXyFwmSGkQQcxUMAcdHybGflP5GsWn6pUxH0nonTFEsBlk2+9Xe38HXcbFaN8aFUXDSeBwGmOgBe9H/I88gTqwXydIRYcYrebdC+ahUzu3hohaQQp2cyb2z4YDvx8NMTV1HVBpKdryt7Ky0LpqAQJ0y8UGN7oJBeQYTfNLtXKY2H2oC6pzFpZVKUSqdSUpMVwDcmwZAoN/tBqxKGwF7n0d7T2/6SVjeBHkg==
X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DB9PR08MB6524.eurprd08.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(4636009)(366004)(52536014)(2906002)(33656002)(76116006)(5660300002)(91956017)(9326002)(8936002)(83380400001)(110136005)(54906003)(86362001)(316002)(508600001)(71200400001)(966005)(66946007)(7696005)(122000001)(9686003)(166002)(38100700002)(38070700005)(186003)(8676002)(4326008)(66556008)(66476007)(64756008)(66446008)(26005)(6506007)(53546011)(55016003); DIR:OUT; SFP:1101;
Content-Type: multipart/alternative; boundary="_000_DB9PR08MB652445096C1A959C58BE7BE09CCB9DB9PR08MB6524eurp_"
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PA4PR08MB5888
Original-Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped: VE1EUR03FT040.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs: 5658f815-e9f9-4738-e964-08da340906c4
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com; PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; CAT:NONE; SFS:(13230001)(4636009)(40470700004)(36840700001)(46966006)(966005)(54906003)(9326002)(52536014)(86362001)(316002)(8936002)(70206006)(70586007)(336012)(110136005)(2906002)(450100002)(8676002)(186003)(4326008)(83380400001)(33656002)(47076005)(508600001)(6506007)(81166007)(7696005)(53546011)(55016003)(166002)(82310400005)(36860700001)(9686003)(30864003)(5660300002)(26005)(356005)(40460700003); DIR:OUT; SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 12 May 2022 11:17:50.6442 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: eba799db-8f63-4b8e-d835-08da34090d50
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource: VE1EUR03FT040.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VE1PR08MB5712
Archived-At: <https://mailarchive.ietf.org/arch/msg/iot-directorate/VltPKMWnL-T4APJmNF8Aj4Dfg20>
Subject: Re: [Iot-directorate] Iotdir last call review of draft-ietf-drip-arch-22
X-BeenThere: iot-directorate@ietf.org
X-Mailman-Version: 2.1.34
Precedence: list
List-Id: Mailing list for the IoT Directorate Members <iot-directorate.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/iot-directorate>, <mailto:iot-directorate-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/iot-directorate/>
List-Post: <mailto:iot-directorate@ietf.org>
List-Help: <mailto:iot-directorate-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/iot-directorate>, <mailto:iot-directorate-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 12 May 2022 11:18:04 -0000

Hi Shuai,

Thanks for the github pointer [1].  To avoid duplication I’ll post my comments there.

Cheers!

[1] https://github.com/ietf-wg-drip/draft-ietf-drip-arch/issues



From: shuai zhao <shuai.zhao@ieee.org>
Date: Thursday, 12 May 2022 at 00:58
To: Thomas Fossati <Thomas.Fossati@arm.com>, Stuart W. Card <stu.card@axenterprize.com>, Robert Moskowitz <rgm@htt-consult.com>, adam.wiethuechter@axenterprize.com <Adam.Wiethuechter@axenterprize.com>
Cc: draft-ietf-drip-arch.all@ietf.org <draft-ietf-drip-arch.all@ietf.org>, last-call@ietf.org <last-call@ietf.org>, tm-rid@ietf.org <tm-rid@ietf.org>, iot-directorate@ietf.org <iot-directorate@ietf.org>
Subject: Re: Iotdir last call review of draft-ietf-drip-arch-22
Hi Thomas,

We had a Github issue tracker<Github%20issue%20tracker> for your comment, It seems like co-authors are reaching some agreement. Please see reply inline below.

Best,
Shuai
From: Thomas Fossati via Datatracker <noreply@ietf.org>
Date: Sunday, March 27, 2022 at 10:44 AM
To: iot-directorate@ietf.org <iot-directorate@ietf.org>
Cc: draft-ietf-drip-arch.all@ietf.org <draft-ietf-drip-arch.all@ietf.org>, last-call@ietf.org <last-call@ietf.org>, tm-rid@ietf.org <tm-rid@ietf.org>
Subject: Iotdir last call review of draft-ietf-drip-arch-22
Reviewer: Thomas Fossati
Review result: Ready with Issues

This is a great document and fun to read.  Thank you authors!  I have
tried to highlight a few small things that could be articulated a bit
more from an IoT perspective but overall I have no major concerns with
it, except a tangential thing around the document intended status (see
"Issues" below.)

# Issues

* The charter says: "the WG will propose a standard document that
  describes the architecture […]" but the status is informational.  I am
  pretty sure informational should be appropriate, but highlighting a
  potential disconnect.


Shuai/ Please see Med’s reply thread on March 27th.

# Comments

* In some IETF circles (e.g., RATS & TEEP) "attestation" has a precise
  meaning, which is quite distinct from the DRIP definition "[…]
  normally used when an entity asserts a relationship with another
  entity".  Specifically, unless the signing key is derived from the
  measured boot state (a la DICE), or the claims are of a certain kind,
  the process that this doc names "attestation" is not what is meant
  usually.
   => Maybe add a few words to Section 2.2 to clarify the distinction
      between DRIP attestation and RATS's, e.g., by adding a disclaimer
      similar to that already associated with DRIP certs.

* Apropos "remote attestation", I am wondering whether, given the type
  of endpoints considered in the architecture - and in particular
  provided their increased exposure to physical compromise, and the
  potentially large impact on the overall system and beyond - the
  architecture should provide explicit channels for securely conveying
  the verification of the installed and booted firmware (as well as any
  other relevant trust metrics)?

* I haven't read the rest of the DRIP docs, so I am not sure why is
  EdDSA specifically mentioned in Section 3.2.?  Is this a requirement
  or just an example?  I guess the latter, but checking just in case.
  And apropos that, in light of fault attacks on deterministic ECDSA and
  EdDSA [0] that are potentially easier to carry out against UAs (BTW,
  how cool is a fault attack w/ private key exfiltration carried out by
  a chasing drone?) maybe it's worth adding to the security
  considerations some words around physical attacks and their impact
  on the choice of signature algorithms?
Bob/ WRT to use of EdDSA: Only EdDSA provides 32 byte public keys. This is essential in the Authentication Messages defined in draft-ietf-drip-auth. With ECDSA, you have to use public key compression to get 32 byte keys which then poises the issue with patents.
Thus EdDSA is the 1st defined PK algorithm. There may be more down the road of deployment. Experience will drive this.
Also at some future point a PQC solution may be developed that will work within this environment and will then be added.

* It'd seem that, given the very low bandwidth, DoS (as well as Denial
  of View) attacks on communication involving the UA should be quite
  easy to mount?  Maybe worth spending some words on the argument
  to describe what the threats are and which mitigations are available.
Bob/ The USA FAA and other CAAs have mandated Broadcast RID over Bluetooth and WiFi. Any DOS attacks against these RF are basically out of scope. It will happen and the ground observer will not get the messages.
So we have left DOS over RF as nothing worth saying about it.
I will say that this is sometimes brought up as an argument FOR autonomous operations. You don't want to be forced to land your UA just because of a RF DOS attack; you have a delivery to make.

* This is a question more than anything else: given the constrained
  nature of UAs, I was wondering whether it is envisaged that the
  end-to-end network path will be realised with the use of more capable
  (trusted) proxy nodes?  If so, there may be a few security and privacy
  considerations to be added.
Bob/ This only comes into play with Network Remote ID and Command and Control. The first draft for this is still a little drafty (draft-moskowitz-secure-nrid-c2) so the architecture doc is thin on this discussion. Much of it will be what wireless tech will be used.
Proxying NRID is only applicable for UA in LOS operation. BLOS will require the a WAN wireless. If LoRaWAN works (might be too much traffic for it, TBD), then there will naturally be a LoRaWAN proxy.
But we are only started down the NRID path for a non-proprietary solution.


# Nits

* AAA is usually intended as "Authentication, Authorization, and
  Accounting" (see also [1]), whereas here it's got four new A's:
  Attestation, Access Control , Attribution, Audit :-)
    => Maybe change it to 7A, A7, AAA+ or similar?


Shuai/ Co-authors and Chairs prefer to keep it as “AAA” to be consistent with DRIP requirement RFC9153.

* In Section 2.1, the following terms are already in the most recent
  "RFC Editor Abbreviations List" [1] and can be removed:
    * EdDSA
    * HIP
    * HIT
    * HI
Shuai/ I would suggest we don't remove that. I recall that were discussions to add those terms in section 2.1 during WGLC

* Some typographic inconsistency around Bluetooth: Is it 4 or 4.x?
  5 or 5.x?
    => Stick to one format. (Also maybe add an explicit reference to the
       Bluetooth specs.)
Shuai/ Bob prefers “only 4.x and 5.x in first use.  Then only 4 and 5.

[0] https://eprint.iacr.org/2020/803
[1] https://www.rfc-editor.org/materials/abbrev.expansion.txt

Shuai/ I assume we agree not to add above references and just refer to ASTM document.
IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.