Re: [mile] Working group last call for ROLIE

"Banghart, Stephen A. (Fed)" <stephen.banghart@nist.gov> Thu, 13 April 2017 15:07 UTC

Return-Path: <stephen.banghart@nist.gov>
X-Original-To: mile@ietfa.amsl.com
Delivered-To: mile@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 48AA11294A6 for <mile@ietfa.amsl.com>; Thu, 13 Apr 2017 08:07:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.775
X-Spam-Level:
X-Spam-Status: No, score=-0.775 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, HTTP_ESCAPED_HOST=1.125, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nistgov.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dKFElflvpMy1 for <mile@ietfa.amsl.com>; Thu, 13 Apr 2017 08:07:33 -0700 (PDT)
Received: from gcc01-CY1-obe.outbound.protection.outlook.com (mail-cy1gcc01on0099.outbound.protection.outlook.com [23.103.200.99]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CFFB5129474 for <mile@ietf.org>; Thu, 13 Apr 2017 08:07:32 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nistgov.onmicrosoft.com; s=selector1-nist-gov; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=LZYiwgbCbhGSq9JXpWoZVPxb9RtQ1cCNRPTY6enVLdo=; b=SIaNIi/jYrGu5fI3dN+KT+uW3GkeDKSqj1d0Sm1jphv7tNJEbbjcpi5rEtzCnOfeWdMPAVg8liRCo0stxymSUwH266aOLu/fY6YK5UQXQ9hOZuq1aGe7gXkJczOJSWHRYNSguIy8H1ghFmh27lqLLxHEW+T3ih/C7Cc6VW6S2uA=
Received: from DM5PR09MB1307.namprd09.prod.outlook.com (10.172.34.141) by DM5PR09MB1308.namprd09.prod.outlook.com (10.172.35.135) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1034.10; Thu, 13 Apr 2017 15:07:31 +0000
Received: from DM5PR09MB1307.namprd09.prod.outlook.com ([10.172.34.141]) by DM5PR09MB1307.namprd09.prod.outlook.com ([10.172.34.141]) with mapi id 15.01.1034.012; Thu, 13 Apr 2017 15:07:31 +0000
From: "Banghart, Stephen A. (Fed)" <stephen.banghart@nist.gov>
To: "Panos Kampanakis (pkampana)" <pkampana@cisco.com>, "mile@ietf.org" <mile@ietf.org>
Thread-Topic: Working group last call for ROLIE
Thread-Index: AQHSqBrX3wNPiZjeRUuG2OC1scqiSqGtfp7QgBMRnxA=
Date: Thu, 13 Apr 2017 15:07:31 +0000
Message-ID: <DM5PR09MB130778DCCC02A0EEE7012514F0020@DM5PR09MB1307.namprd09.prod.outlook.com>
References: <CC7AB8C2-66EC-4B75-9CFA-F9A1D7A9C46D@cisco.com> <59aeb29289274c4889f6e6ea9adaaa1a@XCH-ALN-010.cisco.com>
In-Reply-To: <59aeb29289274c4889f6e6ea9adaaa1a@XCH-ALN-010.cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: cisco.com; dkim=none (message not signed) header.d=none;cisco.com; dmarc=none action=none header.from=nist.gov;
x-originating-ip: [129.6.227.79]
x-microsoft-exchange-diagnostics: 1; DM5PR09MB1308; 7:AxPpfLaA/jwh0TP2WSXIxE7hbb1Oxto1Ix4hEyTtwT4AqkCqEAwXiqixLsBZg6sRp/O5mbXvQdKaeltqKR5dEN9d3oFIFok9e9zCIS6ai19JpmqyJ7akmKxBOSGq4hD7K4Hxr0s3/KR+8loeieo9zDLLowv+TGq3FQVVCER/YKb24thwoy9En2d/3GZFeIbLqdLPzxEUGlqFApGqqEpltb/2ue5ygTDt3YRgQXw2vxNiR6h/OIXH7UndLdUqC8PpVttyklVkgzBtjZxrEftYW34yHq2/Ug97JzPKf+9KMZ0oHomcFo/dCb4m5FUEEiK5OIJW9IjJxX4ssDl1l2lwvA==
x-ms-office365-filtering-correlation-id: 999a5ded-1736-4c0e-48b3-08d4827ecede
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(22001)(2017030254075)(48565401081)(201703131423075)(201703031133081); SRVR:DM5PR09MB1308;
x-microsoft-antispam-prvs: <DM5PR09MB1308D318A496E94565FBDFDDF0020@DM5PR09MB1308.namprd09.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(158342451672863)(166708455590820)(192374486261705)(131327999870524)(95692535739014)(21748063052155);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040450)(601004)(2401047)(5005006)(8121501046)(93006095)(93001095)(3002001)(10201501046)(6055026)(6041248)(20161123564025)(201703131423075)(201702281528075)(201703061421075)(20161123560025)(20161123555025)(20161123562025)(6072148); SRVR:DM5PR09MB1308; BCL:0; PCL:0; RULEID:; SRVR:DM5PR09MB1308;
x-forefront-prvs: 02760F0D1C
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(979002)(39450400003)(39840400002)(39400400002)(39410400002)(39850400002)(377454003)(51914003)(2950100002)(102836003)(3846002)(38730400002)(790700001)(54356999)(50986999)(66066001)(6116002)(54896002)(86362001)(53546009)(25786009)(2900100001)(33656002)(7696004)(76176999)(6306002)(55016002)(229853002)(606005)(99286003)(53936002)(6436002)(5660300001)(6246003)(8936002)(2501003)(122556002)(7736002)(8676002)(77096006)(3660700001)(81166006)(81156014)(7906003)(2906002)(74316002)(6506006)(3280700002)(9686003)(189998001)(236005)(969003)(989001)(999001)(1009001)(1019001); DIR:OUT; SFP:1102; SCL:1; SRVR:DM5PR09MB1308; H:DM5PR09MB1307.namprd09.prod.outlook.com; FPR:; SPF:None; MLV:ovrnspm; PTR:InfoNoRecords; LANG:en;
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_DM5PR09MB130778DCCC02A0EEE7012514F0020DM5PR09MB1307namp_"
MIME-Version: 1.0
X-OriginatorOrg: nist.gov
X-MS-Exchange-CrossTenant-originalarrivaltime: 13 Apr 2017 15:07:31.2371 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 2ab5d82f-d8fa-4797-a93e-054655c61dec
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR09MB1308
Archived-At: <https://mailarchive.ietf.org/arch/msg/mile/qShYXIggI5or-mM1ATT1x4_nI2w>
Subject: Re: [mile] Working group last call for ROLIE
X-BeenThere: mile@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Managed Incident Lightweight Exchange, IODEF extensions and RID exchanges" <mile.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mile>, <mailto:mile-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mile/>
List-Post: <mailto:mile@ietf.org>
List-Help: <mailto:mile-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mile>, <mailto:mile-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 13 Apr 2017 15:07:36 -0000

Panos,

Thanks for the review! Comments inline.

Your suggestions and other small fixes are being added in our Github repo for the document, if you or anyone else would like to follow along or provide feedback here is the URL: https://github.com/CISecurity/ROLIE

Thanks,
Stephen Banghart

From: mile [mailto:mile-bounces@ietf.org] On Behalf Of Panos Kampanakis (pkampana)
Sent: Wednesday, April 05, 2017 10:31 AM
To: Nancy Cam-Winget (ncamwing) <ncamwing@cisco.com>; mile@ietf.org
Subject: Re: [mile] Working group last call for ROLIE

Hello,

I did a final pass. The doc looks good. I think it is almost ready for publication.

I had some last minor suggestions, nits below:

·         s/MUST publish an Category Document that/MUST publish a Category Document that
Changed.


·         s/URL of the appropriate RID endpoint /URL of the appropriate ROLIE endpoint
I believe that this line is actually referring to a RID endpoint correctly. If a client sends a request to “/” they may be redirected to a RID endpoint.


·         Section 7.4 mentions “In order to provide a global reference for these properties, this document establishes an IANA registry in Section 7.4<https://tools.ietf.org/html/draft-ietf-mile-rolie-06#section-7.4>”. So you are referring to the section in the section itself.
Fixed.

·         We should have caught this earlier, but there is something that came up in the ACE group multiple times: When using fixed URIs we should put them under the .well-known directory according to https://tools.ietf.org/html/rfc5785. So for every https://{host:port}/rollie/<https://%7bhost:port%7d/rollie/>... it should be https://{host:port}/.well-known/rolie/<https://%7bhost:port%7d/.well-known/rolie/>...
Agreed, we’ve made this change and updated the examples to reflect it. We’ll also add an IANA registration for the .well-known location.

·         “for use in a ROLIE Any element not specified here inherits its definition and requirements” does not read well. I think it should be two sentences.
Fixed.

·         “An atom:feed may include additional atom:category elements using a” should be a “MAY” instead of  “may” right?]
Fixed

·         In 6.2.3, the paragraph “or example, the nominal element <rolie:format ns="urn:ietf:params:xml:ns:iodef-2.0"…” should be moved one paragraph above with the paragraph that talks about schema-location
I changed the example to better fit at the end of the section, does that resolve your concern?

·         About “The server MUST support certificate-based client authentication.” and the last paragraph n section 5.3, I can see usecases where the client does not need to be authenticated when the security information to be shared is public and does not contain any confidential info. Would it be worth to state “In usecases where client authentication is required to access the shared information use TLS client certs”? Also, mandating client cert auth is slightly aggressive. There might be usecases where HTTP Basic or Digest authentication/authorization (described in Section 5.4) would be sufficient. Would it be worth to make TLS client certs a SHOULD.
The intention of the requirement is that implementations MUST support the authentication, but that any given repo may use it as they see fit. Publicly shared repos wouldn’t require this, but the implementation they use MUST have support for it if that repo desired authentication. To help avoid confusion, we’ve added a section in the front matter that clarifies that all requirements in the document pertain to implementations, not usage.

·         In section 5.3, RFC5280 is referenced. Section 6.3 explains how CRL revocation checks are performed. Even though the draft deals with CRLs it explains that the revocation status can be checked with other methodologies. I am suggesting to spell out in section 5.3 that CRL or OCSP/OCSP stapling are both acceptable for verification of revocation status.
Changed the wording to make it clear that any functionally equivalent method is acceptable.

·         In section 5.4, “Implementations MUST support user authentication.  User authentication MAY be enabled for specific Feeds.” Is slightly confusing. User auth is mandatory and the it is a MAY for Feeds? It is worth to rephrase it more clearly.

·         Make sure to remove the paragraph with “[TO BE REMOVED:” in section 8.3.
The “TO BE REMOVED” is an IANA action that should be processed during publication without our interference (hopefully).

·         In section 9, “public education may choose to rely upon HTTP Authentication or similar”, I would suggest to reconsider, as I mention above, if authentication is necessary for public information that can be shared openly.
To help avoid confusion, we’ve added a section in the front matter that clarifies that all requirements in the document pertain to implementations, not usage.

Rgs,
Panos