Re: [mile] Artart last call review of draft-ietf-mile-rolie-10

"Banghart, Stephen A. (Fed)" <stephen.banghart@nist.gov> Thu, 19 October 2017 17:39 UTC

Return-Path: <stephen.banghart@nist.gov>
X-Original-To: mile@ietfa.amsl.com
Delivered-To: mile@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 257D01329B5; Thu, 19 Oct 2017 10:39:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nistgov.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BfNvac_nhd9f; Thu, 19 Oct 2017 10:39:43 -0700 (PDT)
Received: from gcc01-dm2-obe.outbound.protection.outlook.com (mail-dm2gcc01on0132.outbound.protection.outlook.com [23.103.201.132]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 36A39132031; Thu, 19 Oct 2017 10:39:42 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nistgov.onmicrosoft.com; s=selector1-nist-gov; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=8W3Jztahbb5AaIsVmobbRZ8KWWdHPL1FdU6KcrFPNOs=; b=udbv6zq5uQESaMS3ge32TVMVT51EVwkdrfkDt0HlCJM9YZ1qjSV29eIZpdnn2WcZNWYtf9HzUOTxRqdna9XAr5bIBQlCXoMXfbjt22X+p6xUFP/GsWfajZqhiKVunBaRQU+mQ0J2cpB16QAs09hfdJhuMh64Ep7ubK/nmfEK4xs=
Received: from DM5PR09MB1307.namprd09.prod.outlook.com (10.172.34.141) by DM5PR09MB1308.namprd09.prod.outlook.com (10.172.35.135) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.77.7; Thu, 19 Oct 2017 17:39:41 +0000
Received: from DM5PR09MB1307.namprd09.prod.outlook.com ([10.172.34.141]) by DM5PR09MB1307.namprd09.prod.outlook.com ([10.172.34.141]) with mapi id 15.20.0077.023; Thu, 19 Oct 2017 17:39:41 +0000
From: "Banghart, Stephen A. (Fed)" <stephen.banghart@nist.gov>
To: Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com>
CC: "mile@ietf.org" <mile@ietf.org>, "draft-ietf-mile-rolie.all@ietf.org" <draft-ietf-mile-rolie.all@ietf.org>
Thread-Topic: [mile] Artart last call review of draft-ietf-mile-rolie-10
Thread-Index: AQHTQLy5EiZhxIKVNkSNg/Bn547ThKLrUSVQgAAplICAAAQPsA==
Date: Thu, 19 Oct 2017 17:39:41 +0000
Message-ID: <DM5PR09MB130725DB7415E73FF1868369F0420@DM5PR09MB1307.namprd09.prod.outlook.com>
References: <150752570618.18384.5615358468704377459@ietfa.amsl.com> <DM5PR09MB13070FC0B54EB6DB8C707EE7F0420@DM5PR09MB1307.namprd09.prod.outlook.com> <CAHbuEH5PMrNLTbpxru=ks-JwcpzG3hABb39itZAWK+WQtr48eA@mail.gmail.com>
In-Reply-To: <CAHbuEH5PMrNLTbpxru=ks-JwcpzG3hABb39itZAWK+WQtr48eA@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=stephen.banghart@nist.gov;
x-originating-ip: [129.6.219.21]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; DM5PR09MB1308; 6:Jtouz6s8NWzRvCBH0rjAxUDHZRo22Jt2jyKO0WFJKPdViJvDAQi6s5WyO3OL+6kSKsetKukhDRIbGcEen994iZN5ZCc3uRDluyh7qKYmn4GROJB7WzUhpuARVZov9mc8HtpR3WrZLxvLLwisPQstZu7bQLegzeTj1c5k1cJ4FhtLFV8TItdneUbGis++Espawv+1Dd8TEGZEgHERCwAIS9FX4alxHeUYi9OtfyLHeQUaZiJc//GVJFHNb56rWTgcJy98aASa8VjuI5lhsv2iiUvuLKEASVZtUcOa8kIOfwkqtW7posz1fsKkT68n779OcE6qaXVRUk8WJpfMvyY7GA==; 5:+ns9M86txL4AMA22ffK6e2BWbWwUocRGgAKWOauRUV299t70LdIEB70lyp4SRk5zdTjyLuLX4MZKS4OCIES2fT+gB8enZsHtY9RvRkwY78eYmRbMhzvA/8E8iqQpIAkn7F4WD0qKQJIR8NEblnYXgg==; 24:Jedqnt51CiVg9rRqG3TeUam32J+VRCwb1KI/otQE4d8snrNtTAVWYmrYn0BW4j0uU6c9Nq53x+sxIOhTB4X90aW/BM8ID2+DDbotJxOniys=; 7:dBhPuB7AIFd5JxB273KJMoeFw9riw9dg13GFQLEnKAEfJSuIHzCsQd9myVnXX2jH2mVH7/528jl6gc4q50cOOH1b+OJojdumLK0hFVSIMFCgd9neqaY9ivDNVqkZQK4gR3HuNj3VWttTV7VjZwbIIjM9+GeAVJ5YOdZpYKj5xjUWko3gfQgS/c1XwuD2neKH/62iXk/1BxvG/gN5p1vE1CuMuczbFH4OnerUGrgLNiA=
x-ms-exchange-antispam-srfa-diagnostics: SSOS;
x-ms-office365-filtering-correlation-id: 48ee1762-c0fb-44c5-f2d7-08d5171860b6
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(22001)(2017030254172)(4534020)(4602075)(4627075)(201703031133081)(201702281549075)(48565401081)(2017052603199)(201703131423095); SRVR:DM5PR09MB1308;
x-ms-traffictypediagnostic: DM5PR09MB1308:
x-exchange-antispam-report-test: UriScan:(158342451672863)(65766998875637)(150554046322364);
x-microsoft-antispam-prvs: <DM5PR09MB130843397E768E018468CC80F0420@DM5PR09MB1308.namprd09.prod.outlook.com>
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(2401047)(5005006)(8121501046)(100000703101)(100105400095)(3002001)(93006095)(93001095)(10201501046)(6055026)(6041248)(20161123562025)(20161123558100)(20161123564025)(20161123555025)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123560025)(6072148)(201708071742011)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:DM5PR09MB1308; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:DM5PR09MB1308;
x-forefront-prvs: 0465429B7F
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(6009001)(39860400002)(376002)(346002)(43784003)(24454002)(199003)(51444003)(189002)(13464003)(50986999)(3846002)(2900100001)(54356999)(76176999)(6116002)(102836003)(305945005)(106356001)(105586002)(7736002)(230783001)(74316002)(189998001)(101416001)(14454004)(81166006)(8676002)(7696004)(81156014)(2950100002)(68736007)(3280700002)(6506006)(6436002)(6916009)(229853002)(77096006)(3660700001)(97736004)(33656002)(2906002)(53546010)(66066001)(8936002)(54906003)(9686003)(6246003)(39060400002)(316002)(86362001)(4326008)(55016002)(99286003)(25786009)(5660300001)(478600001)(53936002); DIR:OUT; SFP:1102; SCL:1; SRVR:DM5PR09MB1308; H:DM5PR09MB1307.namprd09.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; A:1; MX:1; LANG:en;
received-spf: None (protection.outlook.com: nist.gov does not designate permitted sender hosts)
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: nist.gov
X-MS-Exchange-CrossTenant-originalarrivaltime: 19 Oct 2017 17:39:41.0330 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 2ab5d82f-d8fa-4797-a93e-054655c61dec
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR09MB1308
Archived-At: <https://mailarchive.ietf.org/arch/msg/mile/PAU2065Vqa2EFmHsHVO0P27os9I>
Subject: Re: [mile] Artart last call review of draft-ietf-mile-rolie-10
X-BeenThere: mile@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Managed Incident Lightweight Exchange, IODEF extensions and RID exchanges" <mile.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mile>, <mailto:mile-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mile/>
List-Post: <mailto:mile@ietf.org>
List-Help: <mailto:mile-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mile>, <mailto:mile-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Oct 2017 17:39:46 -0000

Kathleen,

Just to clarify, there were no normative changes to the use of TLS 1.3 or TLS 1.2 in this -11 update. The latter three paragraphs were truncated as it was duplicated text out of RFC 7525 and RFC 7589.

The normative requirements for TLS remain as follows:

A "MUST" for implementing TLS 1.2 with a "SHOULD" for following the BCPs as described in RFC 7525
A "RECOMMENDED" for implementing the most recent version of TLS (At the moment, TLS 1.3) also being supported.

The non-normative recommendation that 0-RTT be disabled remains unchanged. When you mention that "waiting may be worth having the normative language" are you referring to this recommendation or another requirement?

Thanks,
Stephen

> -----Original Message-----
> From: Kathleen Moriarty [mailto:kathleen.moriarty.ietf@gmail.com]
> Sent: Thursday, October 19, 2017 1:17 PM
> To: Banghart, Stephen A. (Fed) <stephen.banghart@nist.gov>
> Cc: Martin Thomson <martin.thomson@gmail.com>; mile@ietf.org; draft-
> ietf-mile-rolie.all@ietf.org
> Subject: Re: [mile] Artart last call review of draft-ietf-mile-rolie-10
> 
> Hi Stephen,
> 
> On Thu, Oct 19, 2017 at 12:24 PM, Banghart, Stephen A. (Fed)
> <stephen.banghart@nist.gov> wrote:
> > Martin,
> >
> > I've put the rest of my comments inline, and uploaded a -11 version of
> ROLIE to the Github with the changes. Providing there are no additional
> major comments I'll post this version to datatracker today.
> >
> > Thanks again for the great review,
> > Stephen
> >
> >> -----Original Message-----
> >> From: mile [mailto:mile-bounces@ietf.org] On Behalf Of Martin Thomson
> >> Sent: Monday, October 09, 2017 1:08 AM
> >> To: art@ietf.org
> >> Cc: mile@ietf.org; ietf@ietf.org; draft-ietf-mile-rolie.all@ietf.org
> >> Subject: [mile] Artart last call review of draft-ietf-mile-rolie-10
> >>
> >> Reviewer: Martin Thomson
> >> Review result: Almost Ready
> >>
> >> I have reviewed this document, and - despite what appears to be a
> >> lengthy list of issues - I think that it is in pretty good shape.
> >> It's clear, readable, and addresses the requirements well.  Most of
> >> my comments should be trivial to resolve.
> >>
> >> Major:
> >>
> >> The decision to define a .well-known URI without a discovery story is
> >> - in my opinion - inadvisable.  Such a registration is usually
> >> appropriate if you design a protocol that depends on discovery by
> >> hostname and port.  As such, this does not use that at all.  A
> >> configuration system can (and should) accept a complete URI for the
> >> service endpoint.  It would be better to defer creation of yet
> >> another .well-known URI registration until the working group is certain
> that discovery requires it.
> >
> > Discussed in a separate thread.
> >
> >> The same comment applies to the .well-known resource for the category
> >> document.
> >>  Given that this sort of document is readily discoverable via the
> >> service document, I would say that the need for a .well-known
> >> resource is less well- justified than the service document.
> >
> > We agree, removed the registration for the category document location.
> >
> >> The requirements in Section 5.3 on TLS use are unnecessarily strict.
> >> It's great to recommend the use of TLS 1.2, but given that the
> >> document has no real requirement on any particular version of TLS,
> >> the use of "MUST" here is not needed.  Similarly, the prohibition on
> >> the use of 0-RTT is groundless.  The lengthy list of requirements
> >> around certificate validation only risk creating a conflict with
> >> advice in other RFCs.  Many, if not all, of these requirements are
> >> transitively included by way of referencing HTTPS documents.  I would
> prefer to see this entire section reduced to a simple RFC 7525 reference.
> >
> > The majority of the section has been reduced to a RFC 7525 reference. We
> believe that the benefits provided by 0-RTT don't outweigh the loss of
> forward secrecy. The text currently places this as a suggestion from the
> authors, and not a normative requirement.
> 
> This is a substantial change as a result of just one reviewer.  The only thing
> the MUST does is hold up final publication until an RFC # is assigned for TLS
> 1.3.  TLS 1.3 shouldn't be too far off, so waiting may be worth having the
> normative language.  I think this is one the WG needs to weigh in on to
> change and tradeoffs of waiting for final publication.  It's not just the editors
> that recommend this, I do as am sure others do as well.
> 
> Best regards,
> Kathleen
> >
> >> User authentication is under-specified.
> >
> > As any repository using user authentication is already inherently pre-
> communicating with its consumers, we felt that underspecifying
> authentication mechanisms allowed for each sharing consortium to control
> their own repositories. Whatever system they are using already for
> internal/external sharing authentication can be used here as long as it meets
> the ROLIE requirements.
> >
> >> * Section 5.3 mandates the use of TLS cipher suites that support
> >> client authentication using certificates, but offers no further
> >> advice.  Aside from being an unnecessary requirement - cipher suites
> >> that support certificate- based authentication of servers all allow
> >> for client authentication - this sort of requirement is rarely
> >> sufficient for interoperation.  For instance, you need to specify how
> >> a server will request a certificate such that clients can select the
> >> correct certificate.  If a client and server have agreed to share
> >> information on terms that rely on authentication of clients, it is better for
> those peers to arrange the terms on which they will authenticate.
> >
> > Removed cipher suite text as these recommendations are provided by RFC
> 7525.
> >
> >> * Section 5.4 uses "SHOULD" regarding client authentication using
> >> federation, but offers no hints about what this entails.  It also
> >> uses "SHOULD" regarding authorization checks, which isn't an
> >> interoperability requirement.  It's more of a "don't be silly" type
> >> of requirement, which doesn't need to be written down in an RFC.
> >
> > While its true that this is a "don't do anything stupid" requirement, I think
> that its valuable as a reminder that the authorization checks need to support
> full granularity through the entire resource tree.
> >
> >> Section 5.5 prohibits the use of GET on "/".  This prohibits use of
> >> the resource for other purposes.  It seems reasonable to accept POST
> >> messages as defined in RFC 6546, but this requirement is overly
> >> strict (and further entrenches the violation of RFC 7320).  If, for
> >> instance, the server operator wishes to provide HTML in response to a
> >> GET request to "/", this would prohibit that.  The requirement to
> >> return 404 if RFC 6546 is not supported is worse; not supporting RFC
> >> 6546 might be a choice that a deployment makes to avoid the need to
> reserve "/" for that protocol.
> >
> > Cleaned up the text describing this requirement to be more clear that they
> only trigger when an implementation has decided to support RFC 6546.
> Removed the 404 requirement when not supporting RFC6546, as I agree that
> it was overly restrictive.
> >
> >> In Section 6.2.3, what is the advantage of "rolie:format" over having
> >> a well- defined media type?  Media types can take advantage of
> >> content negotiation, existing support in link relations, and other
> >> existing tools
> 
> 
> 
> --
> 
> Best regards,
> Kathleen