[netconf] Murray Kucherawy's No Objection on draft-ietf-netconf-crypto-types-29: (with COMMENT)
Murray Kucherawy via Datatracker <noreply@ietf.org> Thu, 01 February 2024 07:46 UTC
Return-Path: <noreply@ietf.org>
X-Original-To: netconf@ietf.org
Delivered-To: netconf@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 50A5DC14F602; Wed, 31 Jan 2024 23:46:09 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: Murray Kucherawy via Datatracker <noreply@ietf.org>
To: The IESG <iesg@ietf.org>
Cc: draft-ietf-netconf-crypto-types@ietf.org, netconf-chairs@ietf.org, netconf@ietf.org, mjethanandani@gmail.com
X-Test-IDTracker: no
X-IETF-IDTracker: 12.4.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: Murray Kucherawy <superuser@gmail.com>
Message-ID: <170677356931.29683.8595814820878108343@ietfa.amsl.com>
Date: Wed, 31 Jan 2024 23:46:09 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/v0a8f973IQSpOOJQNbz4_BWroyQ>
Subject: [netconf] Murray Kucherawy's No Objection on draft-ietf-netconf-crypto-types-29: (with COMMENT)
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.39
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 01 Feb 2024 07:46:09 -0000
Murray Kucherawy has entered the following ballot position for draft-ietf-netconf-crypto-types-29: No Objection When responding, please keep the subject line intact and reply to all email addresses included in the To and CC lines. (Feel free to cut this introductory paragraph, however.) Please refer to https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ for more information about how to handle DISCUSS and COMMENT positions. The document, along with other ballot positions, can be found here: https://datatracker.ietf.org/doc/draft-ietf-netconf-crypto-types/ ---------------------------------------------------------------------- COMMENT: ---------------------------------------------------------------------- Similar to what Paul's DISCUSS says: Section 3.5: That said, expert Security opinion suggests that already it is infeasible to break a 128-bit symmetric key using a classical computer, and thus the concern for conveying higher-strength keys begins to lose its allure. Can we make a reference to said opinion? Without that, this looks like argument from authority (and an anonymous one at that). === Additional comments from incoming ART AD, Orie Steele: Section 1.4 Prefer to see the exact base64 format cited (not base64url, with or without padding , etc...) ... I assume normative terminology in the model itself, does not contradict the RFCs from which it is derived? > "A private key and, optionally, its associated public key. > Implementations SHOULD ensure that the two keys, when both > are specified, are a matching pair."; Why not MUST? > "A private/public key pair and an associated certificate. > Implementations SHOULD assert that the certificate contains > the matching public key."; Why not MUST? > "A private/public key pair and a list of associated > certificates. Implementations SHOULD assert that > certificates contain the matching public key."; Why not MUST? > 3.3. Unconstrained Public Key Usage This seems not great. later... > whereby associated certificates may constrain the usage of the public key according to local policy. ... > whereby configured certificates (e.g., identity certificates) may constrain the use of the public key according to local policy. Why is this not a SHOULD / MUST ? > 3.5. Strength of Keys Conveyed it might be better to convert this to a recommendation, with MUST NOT / SHOULD NOT, etc... > Implementations SHOULD only use secure transport protocols meeting local policy. Why not MUST ? > This module defines storage for cleartext key values that SHOULD be zeroized when deleted, so as to prevent the remnants of their persisted storage locations from being analyzed in any meaningful way. Nice to see this recommendation.
- [netconf] Murray Kucherawy's No Objection on draf… Murray Kucherawy via Datatracker
- Re: [netconf] Murray Kucherawy's No Objection on … Kent Watsen