Re: [lisp] Roman Danyliw's Discuss on draft-ietf-lisp-pubsub-13: (with DISCUSS and COMMENT)

"Alberto Rodriguez-Natal (natal)" <natal@cisco.com> Mon, 20 February 2023 20:09 UTC

Return-Path: <natal@cisco.com>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AAAD9C14CF1E; Mon, 20 Feb 2023 12:09:39 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.597
X-Spam-Level:
X-Spam-Status: No, score=-14.597 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b="CY5WjEaA"; dkim=pass (1024-bit key) header.d=cisco.com header.b="IpQN0IMd"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Hpwpm1gxHzbn; Mon, 20 Feb 2023 12:09:35 -0800 (PST)
Received: from alln-iport-2.cisco.com (alln-iport-2.cisco.com [173.37.142.89]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1DC24C14E513; Mon, 20 Feb 2023 12:09:35 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=24523; q=dns/txt; s=iport; t=1676923775; x=1678133375; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=ArpaEHNHTijpnG66F8Q29ZJKTblKJeasgUbxObqKFf4=; b=CY5WjEaAId4WGHhYNn5j2neorGS5kAAkrHd+M5MsQS2dK/CwXknnl85B JeER7yGMZinC37pevYk6gZAdmmJbWFy0a/c+VL9kOc7aq43WZjhaf1mkk nZf/UW4ligLInhWF3pC9Thc62L1fuwuWXRRjl0gDsB2476nBRiXkP6wNx g=;
X-IPAS-Result: A0AIAAA30vNjmIkNJK1aGwEBAQEBAQEBBQEBARIBAQEDAwEBAUCBOwYBAQELAYEpMSoogQcCWTpGiB4DhFBfiCIDkQuGJIE3gzGBLBSBEQNWDwEBAQ0BATsJBAEBghKCcwKFKwIlNAkOAQIEAQEBAQMCAwEBAQEBAQMBAQUBAQECAQcEFAEBAQEBAQEBHhkFDhAnhWgNhlUBAQEBAxIuAQE3AQ8CAQgOAwMBAg0UDjIdCAIEAQ0FCBMHggRYAYIWgQwDAQ9EngoBgT8Cih94gTSBAYIIAQEGBASBOAEVQZ0QAwaBQAGJFINogX2CMycbgg2BFUOCZz6CYgEBA4EoAQsBBgEHAhoeDYNkgi6OFoc2CoE0d4EjDoFCgQkCCQIRcYEWCGiCAxsHNgNEHUADCzs6PzULCyIFBCQBNIEcJAUDCxUqRwQINgUGGzQRAggPEg8GJkMOQjc0EwZcASkLDhEDTYFHBC9EgRwCBAEoJpgNa2oEDRUNDBgUOzAEAj4IDBQBDAoBAQ8DEQUHCJJdEAEJjhiOJJJaCYEtCoN3i2KPD4YfFoN5jGKGaZEOYpdWIIIuiwSUWTMLDYR4AgQCBAUCDgEBBoFiOmtwcBWCbgEBATFSGQ9djUMZHoM7hRSPQ3U7AgcLAQEDCYgXASeCMQEB
IronPort-PHdr: A9a23:EiWmcx+JtLxiuf9uWCXoyV9kXcBvk7n3PwtA7J0hhvoOd6m45J3tM QTZ4ukll17GW4jXqpcmw+rbuqztQyoMtJCGtn1RfJlFTRRQj8IQkkQpC9KEDkuuKvnsYmQ6E c1OWUUj8Wu8NB1eGd31YBvZpXjhhQM=
IronPort-Data: A9a23:zjdbAqvBVqudWWPU0zti8LDehOfnVINeMUV32f8akzHdYApBsoF/q tZmKTqGOa3bYjb9edwgaNznoEgG78LQnIRnSVE5rioxFyIUgMeUXt7xwmUckM+xwmwvaGo9s q3yv/GZdJhcokf0/0vrav67xZVF/fngqoDUUIYoAQgsA147IMsdoUg7wbVh2NQw2YLR7z6l4 LseneWOYDdJ5BYsWo4kw/rrRMRH5amaVJsw5zTSVNgT1LPsvyB94KE3ecldG0DFrrx8RYZWc QpsIIaRpQs19z91Yj+sfy2SnkciGtY+NiDW4pZatjTLbhVq/kQPPqgH2PU0NXhOlBqug4xL1 MRito6hEw4GG/3wobFIO/VYO3kW0axu8bvDJz20ttaeihGAeHr3yPIoB0YzVWEa0r8oWicVq 7pBc3ZUNU/ra+GemNpXTsFqj9gqKOHgPZgUvTdryjSx4fMOH8ycGv2VuIEwMDEY3slfFNj+a JElbCdxfhjQSUZsAG02Mcdr9AuvriCvL2IHwL6PnoI47Hj7ww1+0airNtfJEvSORN5NtkeVu myA+H72ajkeNceHjDGF+3O2ncfOkD/1HoUIG9WQ+uRjjkHWx2EPBlgSVECj5OGkgFWjUfpeJ lAavC00osAa9UGwQfH8UgG25nmesXY0QdZcO+Y38h3LzbDbizt1HUANSjpHLdchrsJzGXoh1 0SCmJXiAjkHXKCppWy1qoiNshyVJXQvMX4tZj0VFwIqxonfmdRm5v7QdepLHKmwh9zzPDj/x TGWsSQz74n/a+ZWjM1XGnia31qRSoj1oh0dvV6PDzj1hu9tTMv0OdL0tASzAeNocd7xc7WXg JQTdyFyBsgnCZWAkkRhq81SQenxvZ5p3NAg6GOD8rEo8zCrvnWkZ40VvHd1JVxiNYAPfjqBj K7vVeF5ucY70JiCNPAfj2eN5yICl/eI+TPNDau8Uza2SsItHDJrBQk3DaJq40jjkVI3jYY0M oqBfMCnAB4yUPo4kmvvGLdGiONxm0jSIF8/o7imk3xLNpLDOhaopUstazNik8hgtvrf+VWJm zqhH5TUl32zr9ESkgGOodJMcjjm3FAwBIv9rIRMZ/WfLw99cFzN+NePqY7Nj7dNxvwP/s+Rp ynVchYBlDLX2yadQS3UMS8LVV8adcslxZ7NFXZybQ/ANrlKSdvH0ZrzgLNtI+B3qbw8ka8tJ xTHEu3Zaslypv3802x1RfHAQEZKLXxHWSrm0/KZXQUC
IronPort-HdrOrdr: A9a23:ymJ0pKuzV1D7HzZG5PHz2zgY7skCyIMji2hC6mlwRA09TyXGra 6TdaUguiMc1gx8ZJh5o6H9BEGBKUmskaKdkrNhQotKPTOW9VdASbsC0WKM+UyZJ8STzJ8+6U 4kSdkCNDSSNyk3sS+Z2njCLz9I+rDum8rE5Za8854ud3ARV0gK1XYfNu/vKDwOeOAwP+teKH Pz3LsjmxOQPVAsKuirDHgMWObO4/fRkoj9XBIADxk7rCGTkDKB8tfBYlel9yZbdwkK7aYp8G DDnQC8zL6kqeuHxhjV0HKWx4hKmeHm1sBICKW3+4Yow3TX+0eVjbZaKv6/VQMO0aOSAZER4Z zxSiIbToROArXqDyWISFXWqk7dOX0VmgHfIBej8AreSIrCNXQH4w4rv/MATvMfgHBQ5e2UmZ g7r16xpt5ZCwjNkz/64MWNXxZ2llCsqX5niuILiWdDOLFuIIO5gLZvin+9Kq1wVR7S+cQiCq 1jHcvc7PFZfReTaG3YpHBmxJipUm4oFhmLT0AesojNugIm1kxR3g8d3ogSj30A/JUyR91N4P nFKL1hkPVLQtUNZaxwCe8dSY+8C3DLQxjLLGWOSG6XX50vKjbIsdr68b817OaldNgBy4Yzgo 3IVBdCuWs7ayvVeLqzNV1wg2TwqUmGLEHQI5tllutEU5XHNcjWDRE=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos; i="5.97,313,1669075200"; d="scan'208,217"; a="64710756"
Received: from alln-core-4.cisco.com ([173.36.13.137]) by alln-iport-2.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 20 Feb 2023 20:09:33 +0000
Received: from mail.cisco.com (xfe-aln-005.cisco.com [173.37.135.125]) by alln-core-4.cisco.com (8.15.2/8.15.2) with ESMTPS id 31KK9W5i027509 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Mon, 20 Feb 2023 20:09:33 GMT
Received: from xfe-aln-002.cisco.com (173.37.135.122) by xfe-aln-005.cisco.com (173.37.135.125) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.15; Mon, 20 Feb 2023 14:09:26 -0600
Received: from NAM12-BN8-obe.outbound.protection.outlook.com (173.37.151.57) by xfe-aln-002.cisco.com (173.37.135.122) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.9 via Frontend Transport; Mon, 20 Feb 2023 14:09:26 -0600
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Th+Yeay/5i7hqv+Fssvx245yCseS6IscJXYAIAhK5zDXHcb4UL/TBuY/4fZO3hNBjy97mRtyMdlypgnD8X+NZ9IQPZOx+8WNXiewlnsViPRXrGgUnWMayJZNnsDTi83PNQiJ8jJnBXTJYjg0WmAXa3RUqQ1vR/Fqxo/HIWQxCIKQKIwlrjl+rZVhlvZE3uVo+tvF67h+CG5o9YsgcmiPM9ADKx2bkz4rzpjDdgBqn4hWbRbpDbj1hMbrKXVGIjEYgvhNVlg7OLaj2CyYYfeSqQcE7wlQOfLkfpykB208Yy3vOv8DnR7Bj3R+4YvfN6onjY8Ra4Unz8w+9aRYZ/vP/Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=9t6AQNBmHo7yww9huDwEikKwdIiuqr5NhaLLiSv4hE8=; b=bBp2Fbtvb8v6gYGA1d28lyz9QcKi9qA5UDqPa1k8YQTHQ5y6TBgUV+ICxiF/dZQumUKzWswQ/vqf7t1hAA6eZE+elgYc699BwpapuQJ5q0A8FAo27ptwIFNoTNzmdpaM/91Unrzv2jUPxRlC6dxPqGzPphBF5L3u+uTO8/uoUQJ2K+2RT5yfQPflT45U73dY1C+SgNKz0qXlLCtaJapg+PvPL7KC/ZMdF7gVWMN8Un+Bo1NWO1Y6YGAyexhstM5to8S6fhUJUkzBRCQq8gzxY9RRLfM2vwe1MPQUpHjW8v3i8uFGKWgFstYvVxOjG081hvH6pbThlIFEczRHTXz7Cw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=9t6AQNBmHo7yww9huDwEikKwdIiuqr5NhaLLiSv4hE8=; b=IpQN0IMdO1BwzxF0lPnm1QbGMotXKPefxKbvH7963JuyHAF7pAkcH0xqHR+krMxt3jIQxbq7AY/GkTiX8+PM1ByR7694FjUanFXUjGYWMz8K++c8JXW1yXtCfDoO5/mhFPlUaN2vE+XxgRU1EshKAY+bcerIX7S83MSSQTlu3uY=
Received: from BYAPR11MB3591.namprd11.prod.outlook.com (2603:10b6:a03:b4::30) by BN9PR11MB5559.namprd11.prod.outlook.com (2603:10b6:408:104::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6111.17; Mon, 20 Feb 2023 20:09:24 +0000
Received: from BYAPR11MB3591.namprd11.prod.outlook.com ([fe80::ad7a:87df:414e:3f65]) by BYAPR11MB3591.namprd11.prod.outlook.com ([fe80::ad7a:87df:414e:3f65%5]) with mapi id 15.20.6111.019; Mon, 20 Feb 2023 20:09:24 +0000
From: "Alberto Rodriguez-Natal (natal)" <natal@cisco.com>
To: Roman Danyliw <rdd@cert.org>, The IESG <iesg@ietf.org>
CC: "draft-ietf-lisp-pubsub@ietf.org" <draft-ietf-lisp-pubsub@ietf.org>, "lisp-chairs@ietf.org" <lisp-chairs@ietf.org>, "lisp@ietf.org" <lisp@ietf.org>, "ggx@gigix.net" <ggx@gigix.net>
Thread-Topic: Roman Danyliw's Discuss on draft-ietf-lisp-pubsub-13: (with DISCUSS and COMMENT)
Thread-Index: AQHZQaBZDk23TFjSkEOPyF4nPJ31Gq7RljEvgAayUsw=
Date: Mon, 20 Feb 2023 20:08:56 +0000
Message-ID: <BYAPR11MB359105225241715316D441A9B6A49@BYAPR11MB3591.namprd11.prod.outlook.com>
References: <167650848906.56280.5745687851664238675@ietfa.amsl.com> <BYAPR11MB3591E1A414382A828BD1DF01B6A09@BYAPR11MB3591.namprd11.prod.outlook.com>
In-Reply-To: <BYAPR11MB3591E1A414382A828BD1DF01B6A09@BYAPR11MB3591.namprd11.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=cisco.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: BYAPR11MB3591:EE_|BN9PR11MB5559:EE_
x-ms-office365-filtering-correlation-id: bbd0b3bb-b449-40c4-72dd-08db137e5c8f
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BYAPR11MB3591.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230025)(376002)(366004)(136003)(39860400002)(396003)(346002)(451199018)(66574015)(186003)(41300700001)(66946007)(64756008)(9686003)(91956017)(83380400001)(316002)(8936002)(8676002)(66446008)(66476007)(4326008)(5660300002)(6666004)(76116006)(52536014)(66556008)(54906003)(26005)(71200400001)(6506007)(110136005)(966005)(7696005)(53546011)(33656002)(55016003)(2906002)(86362001)(38100700002)(122000001)(478600001)(38070700005)(166002); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_BYAPR11MB359105225241715316D441A9B6A49BYAPR11MB3591namp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR11MB3591.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: bbd0b3bb-b449-40c4-72dd-08db137e5c8f
X-MS-Exchange-CrossTenant-originalarrivaltime: 20 Feb 2023 20:09:24.2300 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: Ijyip6vtWpemMFZnI/JpYw/tJEHmmOs09POkTSZSQ1p2sfBYIHYEaaiSHpqLPUpT
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN9PR11MB5559
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.135.125, xfe-aln-005.cisco.com
X-Outbound-Node: alln-core-4.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/9BK8o-lez1IkzKOSNS7bReZDoSc>
Subject: Re: [lisp] Roman Danyliw's Discuss on draft-ietf-lisp-pubsub-13: (with DISCUSS and COMMENT)
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 20 Feb 2023 20:09:39 -0000

Hi Roman,

Thanks again for your review! A revised version of the draft (-14) has just been uploaded.

To address your DISCUSS, version -14 adds a third bullet to Section 3 to mention that a security association is required between the ITR and Map-Server (via LISP-SEC or PSK). Version -14 should also address the rest of your feedback, following the conversation below. Let us know what you think.

Thanks!
Alberto

From: Alberto Rodriguez-Natal (natal) <natal@cisco.com>
Date: Thursday, February 16, 2023 at 4:12 PM
To: Roman Danyliw <rdd@cert.org>, The IESG <iesg@ietf.org>
Cc: draft-ietf-lisp-pubsub@ietf.org <draft-ietf-lisp-pubsub@ietf.org>, lisp-chairs@ietf.org <lisp-chairs@ietf.org>, lisp@ietf.org <lisp@ietf.org>, ggx@gigix.net <ggx@gigix.net>
Subject: Re: Roman Danyliw's Discuss on draft-ietf-lisp-pubsub-13: (with DISCUSS and COMMENT)
Hi Roman,

Thanks a lot for your review! Please see inline.

Thanks!
Alberto

From: Roman Danyliw via Datatracker <noreply@ietf.org>
Date: Thursday, February 16, 2023 at 1:48 AM
To: The IESG <iesg@ietf.org>
Cc: draft-ietf-lisp-pubsub@ietf.org <draft-ietf-lisp-pubsub@ietf.org>, lisp-chairs@ietf.org <lisp-chairs@ietf.org>, lisp@ietf.org <lisp@ietf.org>, ggx@gigix.net <ggx@gigix.net>, ggx@gigix.net <ggx@gigix.net>
Subject: Roman Danyliw's Discuss on draft-ietf-lisp-pubsub-13: (with DISCUSS and COMMENT)
Roman Danyliw has entered the following ballot position for
draft-ietf-lisp-pubsub-13: Discuss

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-lisp-pubsub/



----------------------------------------------------------------------
DISCUSS:
----------------------------------------------------------------------

** In following the robust discussion in the TSVART thread
(https://mailarchive.ietf.org/arch/msg/tsv-art/vcJRc6oXRRiCl5-bouLTyRVbTc8/),
it appears that design assumption of this document is to build on RFC9301 and
RFC9303.  Section 3 helpfully outlines unique deployment assumptions for PubSub
relative to RFC301.  Missing is an explicit summary of what Alberto stated in
https://mailarchive.ietf.org/arch/msg/tsv-art/80yDl25rP3Ev4H_x_rOstue_J7M/.
There appears to be a stronger requirements to use LISP-SEC or associated
pre-shared secret to secure this new mechanism which is not the same as the
baseline RFC9301 (per Section 1.1).
[AR] Yes, a PubSubKey is required for PubSub operation, this can be a PSK or can be generated via LISP-SEC, both options are described in Section 7.1. In early versions of the draft (-05 and prior), there used to be a bullet point in the deployment assumptions that mentioned that a security association was required for PubSub, but the bullet point was removed when section 7.1 was introduced in -06. We can add again a bullet point to the deployment assumptions to mention that a PubSubKey is needed (via PSK or LISP-SEC) and that details are in Section 7.1.



----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

** Thank you to Chris M. Lonvick for the SECDIR review.

** Thank you to Magnus Westerlund for the TSVART review which had a number of
security items of feedback.

** The shepherd report noted that this document was moved from experimental to
PS status based on existing deployment experiment.  As this was the basis of
the document status, is it possible read more about these “production networks”
that were running “early implementations” as described in Appendix A.  Who were
they?  Were all these implementations limited domain?  Any over the Internet?


[AR] The most predominant example (afaik) of PubSub running in production is in the Software-Defined Access (SD-Access) solution from Cisco. SD-Access is a solution that enterprises deploy for their campus networks where the overlay is established over an underlay of campus switches. Both the underlay and overlay are under the control of the enterprise.

** Section 1.  Editorial.  Is the “encap” in the phrase “map-and-encap
approach” a shortening of “encapsulate”?  Spell it out.


[AR] Ack

** Section 1.1.  Thanks for added this section based on TSVART review.
Consider if it possible to qualify which of these verification and
configurations are handled with practices outside the scope of this document
and what can be forward referenced into this document.


[AR] We’ll clarify the text.

** Section 5.
   Otherwise, the Map-Server silently
   drops the Map-Request message and logs the event to record that a
   replay attack could have occurred.

Why is the guidance to log when observing an attack weaker than the guidance in
Section 4 when handling malformed Map-Requests (“In this case, the receiver
SHOULD log a malformed Map-Request and MUST drop the message.”)
[AR] We’ll update the text so the same guidance is provided for both cases.


** Section 5.
   For example, the Map-Server may be instructed to limit the resources
   that are dedicated to unsolicited Map-Notify messages to a small
   fraction (e.g., less than 10%) of its overall processing and
   forwarding capacity.

What is an unsolicited “Map-Notify” message in the PubSub context?  Is that the
PubSub message itself?


[AR] The publication message yes.

** Section 5

   If the Map-Server
   does not keep last nonces seen, then in deployments concerned with
   replay attacks the Map-Server MUST require the xTRs to subscribe
   using the procedure described in Section 7.1 to create a new security
   association with the Map-Server.

What is a “deployment concerned with replay attacks”?  Shouldn’t that be all
deployments?  Section 7.1 has similar text.
[AR] We’ll update this text.


** Section 7.
   To prevent xTR-ID hijacking, it is RECOMMENDED to follow guidance
   from Section 9 of [RFC9301] to ensure integrity protection of Map-
   Request messages.

Can this text be more specific on what text in RFC9301 is being referenced.
[AR] The text is referring to Section 9 of RFC9301 (Security Considerations), particularly the last paragraph. We’ll update this to make it more specific.


** Section 7.1
   First, when the ITR is sending a Map-Request with the N-bit set
   following Section 5, the ITR also performs the steps described in
   Section 5.4 of [RFC9303].

RFC9303 doesn’t have a Section 5.4.  Is it Section 6.4?
[AR] That’s correct, thanks for catching this up!


** Section 7.1
   The ITR can then generate a PubSubKey by
   deriving a key from the One-Time Key (OTK) as follows: PubSubKey =
   KDF( OTK ), where KDF is the Key Derivation Function indicated by the
   OTK Wrapping ID.

Should the Map-Request nonce be used as part of the KDF input?  See Section 3.1
of RFC5869.
[AR] That’s a reasonable suggestion, we’ll update the text to reflect it.