Re: [OPSAWG] AD review of draft-ietf-opsawg-mud-iot-dns-considerations-08

"Rob Wilton (rwilton)" <rwilton@cisco.com> Mon, 12 February 2024 14:58 UTC

Return-Path: <rwilton@cisco.com>
X-Original-To: opsawg@ietfa.amsl.com
Delivered-To: opsawg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A96FFC18DB82; Mon, 12 Feb 2024 06:58:14 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.604
X-Spam-Level:
X-Spam-Status: No, score=-9.604 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Qc9vnSaSIU6v; Mon, 12 Feb 2024 06:58:09 -0800 (PST)
Received: from rcdn-iport-8.cisco.com (rcdn-iport-8.cisco.com [173.37.86.79]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8755DC18DB80; Mon, 12 Feb 2024 06:58:09 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; i=@cisco.com; l=120814; q=dns/txt; s=iport; t=1707749890; x=1708959490; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=NRkY9ryeY4mCg+B6qfsW/SggCXPuKCQR240d245Hzw8=; b=JUs8jI0HqIWbi0Z/7RvYx7S6CXn945CqHjMwlQ5+NRD5meZwX3Hlb5Jr XEWfwQy741LAzBN7T02zdrbEPR2c2Ya+Av3FQmPvN6RlDMzLwdJC55y5o GHuGKw+S1kwZK3yzEUbWK90hHSw00/jt39UX38pJDBpnB9Ge7J+TVQg2u 8=;
X-CSE-ConnectionGUID: SxDWDhkFTBiKV/aW7BAcfw==
X-CSE-MsgGUID: /2vjQL0HQXmqdbyw+DUhBA==
X-IPAS-Result: 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
IronPort-PHdr: A9a23:O8x/BRRBmnIGYCwBp5cr2LxDzNpso3TLVj580XJvo7tKdqLm+IztI wmDo/5sl1TOG47c7qEMh+nXtvX4UHcbqdaasX8EeYBRTRJNl8gMngIhDcLEQU32JfLndWo7S exJVURu+DewNk0GUN3maQjqq2appSUXBg25MAN0IurvHYuHldu20/y1/bXYYh5Dg3y2ZrYhZ BmzpB/a49EfmpAqar5k0BbLr3BUM+hX3jZuIlSe3l7ws8yx55VktS9Xvpoc
IronPort-Data: A9a23:aKgIuq81T3zBjbSOHuC4DrUDuX6TJUtcMsCJ2f8bNWPcYEJGY0x3n 2YYWmmEM/7fYWXzf9lxaY/jo0IH6JGBn9ZjGlY5rypEQiMRo6IpJzg2wmQcns+2BpeeJK6yx 5xGMrEsFOhtEzmE4E/ra+C9xZVF/fngbqLmD+LZMTxGSwZhSSMw4TpugOdRbrRA2bBVOCvT/ 4usyyHjEAX9gWIsaDtOs/zrRC5H5ZwehhtJ5jTSWtgT1LPuvyF9JI4SI6i3M0z5TuF8dgJtb 7+epF0R1jqxEyYFUrtJoJ6iGqE5auK60Ty1t5Zjc/PKbi6uCcAF+v1T2PI0MS+7gtgS9jx74 I0lWZeYEW/FMkBQ8QgQe0EwLs1wAUFJ0ITXDUeTsc+982fHUEWrysoxJmg9M5JNr46bAUkWn RAZACoGYhbGjOWszffiE69nh98oK4/gO4Z3VnNIlG6CS615B8GYBfyWure03x9o7ixKNezBZ s4FbjxHZxXbaBoJMVASYH47tL743iakK2UA9jp5o4JwuXbR9Sgp8IHdNcPZcM2VBulonmyx8 zeuE2PRWUxCa4fFllJp6EmEivXGkz++WY8OGvi/7uVjn1LWw3EfTRwRSR63p+L8gUm4QNNTJ lYd5ispq7Ma9UG3QJ/6RRLQiHmcpRcDVPJRHvE0rgaXxcLpDx2xHGMISHtKb8Yr8ZZvAzcrz VSO2djuAFSDrYF5V1qm5purgTOxFxQ/LEw8IiY7EiEs6Nf89dRbYg30cv5vF6u8j9vQED72w iyXoCVWu1n1pZNXv0lc1Q2X6w9AtqT0ohgJChI7t19JAytjb4KjIoev81WetK8GJ4eCRV7Ht 38B8yR/0AzsJc7V/MBuaLxRdF1M2xpjGGaE6bKIN8J+nwlBA1b5IehtDMtCDEloKN0YXjTif VXevwhcjLcKYyP1M/ApOdPhVJV3pUQFKTgDfq2IBjapSsUgHDJrAAkxDaJt9zm0zxhyy/1X1 WmzL5fxZZrlNUiX5GHrH7hGi+BDKtEWzmLITpez1AW8zbebfzaUT7xDWGZinchnhJ5oVD79q o4FX+PTkk03eLSnPkH/r9VJRXhUdidTOHwDg5ENHsaZPBFcEX0sY9eIh+tJl3pNxfoFz48lP xiVBydl9bYIrSSZdFrUMiozOO+HsFQWhStTABHA9G2AghALSY2u96wYMZAweNEaGCZLlpaYk 9Ftlx28P8ly
IronPort-HdrOrdr: A9a23:/9m7/KqwKXtloDk5s1mUMYoaV5tiLNV00zEX/kB9WHVpm5Oj5q OTdaUgtSMc1gxxZJh5o6H/BEDhex/hHZ4c2/h2AV7QZniWhILIFvAv0WKM+UybJ8STzJ846U 4kSdkANDSSNyk0sS+Z2njELz9I+rDum87Y55a6854ud3AXV0gK1XYBNu/vKDwMeOAwP+tAKH Pz3LshmxOQPV4sQoCQAH4DU+Lfp9vNuq7HTHc9bSIP2U2ltx/tzKT1PSS5834lPg+nx41MzU H11yjCoomzufCyzRHRk0XJ6Y5NpdfnwtxfQOSRl8k8MFzX+0eVTbUkf4fHkCE+oemp5lpvus LLuQ0cM8N67G6UVn2poCHqxxLr3F8Vmj/fIB6j8DjeSP7CNXcH4vl69MZkm9zimg0dVeRHoe B2NqSixtxq5F377X3ADpPzJmFXfwKP0AkfeKgo/jJiuU90Us4LkWTZl3klSKsoDWb07psqH/ JpC9yZ7PFKcUmCZ3ScpWV3xsewN05DVStub3Jy8/B96QIm1ExR3g8d3ogSj30A/JUyR91N4P nFKL1hkPVLQtUNZaxwCe8dSY/vY1a9DC7kISaXOxDqBasHM3XCp9r+56g0/vijfNgNwIEpkJ rMXVtEvSo5el7oC8eJwJpXmyq9ClmVTHDo0IVT9pJ5srrzSP7iNjCCUkknl4+6r/AWEqTgKo CO0VJtcojexEfVaPJ0NlfFKutvwFElIbgohuo=
X-Talos-CUID: 9a23:LQIVA28c+48RM0/SAmaVv3UENv8Jcn7z8F3RAHH/AFk2YpSeR0DFrQ==
X-Talos-MUID: 9a23:FEgUgQg9G/6JlBN0NDij68Mpc5124Z2KUGA0oZAft8OVKm9cBje3pWHi
X-IronPort-Anti-Spam-Filtered: true
Received: from rcdn-core-11.cisco.com ([173.37.93.147]) by rcdn-iport-8.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 12 Feb 2024 14:58:08 +0000
Received: from alln-opgw-4.cisco.com (alln-opgw-4.cisco.com [173.37.147.252]) by rcdn-core-11.cisco.com (8.15.2/8.15.2) with ESMTPS id 41CEw7FW012630 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 12 Feb 2024 14:58:07 GMT
X-CSE-ConnectionGUID: jOUlbkZZQTy9YwHVRwFqCg==
X-CSE-MsgGUID: yQ6fgL+LSq62ediFl3P61w==
Authentication-Results: alln-opgw-4.cisco.com; dkim=pass (signature verified) header.i=@cisco.com; spf=Pass smtp.mailfrom=rwilton@cisco.com; dmarc=pass (p=reject dis=none) d=cisco.com
X-IronPort-AV: E=Sophos;i="6.06,264,1705363200"; d="scan'208,217";a="23629421"
Received: from mail-dm6nam12lp2168.outbound.protection.outlook.com (HELO NAM12-DM6-obe.outbound.protection.outlook.com) ([104.47.59.168]) by alln-opgw-4.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 12 Feb 2024 14:58:06 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=HhblFdUvz7cSDf2+jhLN+eEAaIZ8t9DmtDEqPnXzxCw5JsmMEoAf3iewVCyujLDJdUHo8TnLhW9y4tubmUrKBUC6g9GRrlDB5B8sOh2HmgP/KrYJZfQLYwuoAjThJ9KnLESdJZVLfLKfxz2/hjJVtWNrBG2VTiNcA86u/1s3+hq7nlKo+vr1Lcenf4pOC4gsS+4dzFR6IsC6Dq0V7vRrKPiAGiJug9jTFU4Br/T3AyUrdsxIVwwlbgliog9Sv51ZdpsYoJIolvhi9BovyiZ70gkHazIFK4kxvm1kkBl9256/NGPB/qjWEq6HpwEn8VHdhyFn8qloqWDV1XEeiU6iBw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=NRkY9ryeY4mCg+B6qfsW/SggCXPuKCQR240d245Hzw8=; b=H7Qj7v4x/KIYib0zHLe7GV5QSJi0/806ZpFK3S3M3dANZ1wix2XZiDdXAObcui8c3Zt2bXpXO3RGJbJY8AYmguoH/Jq9nn76zZEStJza7heMl9fMpM1/MO7aDz49+2MQvQwCqd5C8aRkdLBnJsSa0f23hCewA8LvwTR6nOabnoZzkCx/xKQZApC2OPuuXOx+Fm/MMFhOSXcOTBFy4eJeGPvGolT3o3RuJIGhu/JOaP5JsrRBur7xt9nvFRR9nlE4JVj7Pf92MrsVR4RWXygQ1yWY1V8QGl3dA4LkmqleyTjoYE0S/kZpVEjfZuZt0oWDpq+wp0inkmtK8U+zsdG00g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
Received: from LV8PR11MB8536.namprd11.prod.outlook.com (2603:10b6:408:1ec::19) by CO1PR11MB5059.namprd11.prod.outlook.com (2603:10b6:303:9a::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7270.37; Mon, 12 Feb 2024 14:58:04 +0000
Received: from LV8PR11MB8536.namprd11.prod.outlook.com ([fe80::f662:b8bc:6176:256d]) by LV8PR11MB8536.namprd11.prod.outlook.com ([fe80::f662:b8bc:6176:256d%2]) with mapi id 15.20.7270.033; Mon, 12 Feb 2024 14:58:03 +0000
From: "Rob Wilton (rwilton)" <rwilton@cisco.com>
To: Michael Richardson <mcr+ietf@sandelman.ca>, "opsawg@ietf.org" <opsawg@ietf.org>
CC: "draft-ietf-opsawg-mud-iot-dns-considerations@ietf.org" <draft-ietf-opsawg-mud-iot-dns-considerations@ietf.org>, Eliot Lear <lear@lear.ch>, Toerless Eckert <tte@cs.fau.de>, Mahesh Jethanandani <mjethanandani@gmail.com>
Thread-Topic: [OPSAWG] AD review of draft-ietf-opsawg-mud-iot-dns-considerations-08
Thread-Index: Adn9uohvN+3E1lC3TL27lly1AEZWBQEHmbYAAF7pIlAAnDtFgAAAS9kAAHM/2oAAH7H7gAAAiFgAABBpiAAAAR3OABPxphCsAKm7/YAAvi4oHA==
Date: Mon, 12 Feb 2024 14:58:02 +0000
Message-ID: <LV8PR11MB853601C8D653A094587468DAB5482@LV8PR11MB8536.namprd11.prod.outlook.com>
References: <BY5PR11MB419663E50375EFC179E7CE65B5D2A@BY5PR11MB4196.namprd11.prod.outlook.com> <12876.1697643420@localhost> <BY5PR11MB4196CE6084B4DC26BD0EC11EB5DBA@BY5PR11MB4196.namprd11.prod.outlook.com> <25964.1698074879@localhost> <a730368b-886c-402a-9fcb-717622c0cce4@lear.ch> <ZTmYaTXQDphVbR5n@faui48e.informatik.uni-erlangen.de> <3097919.1698327837@dyas> <ZTpwsJsn0aBcJkai@faui48e.informatik.uni-erlangen.de> <17967.1698356948@localhost> <ZTrmUnxmtdu6phZa@faui48e.informatik.uni-erlangen.de> <LV8PR11MB853690BAFD9A35FFBA745C9BB5472@LV8PR11MB8536.namprd11.prod.outlook.com> <10878.1707421905@obiwan.sandelman.ca>
In-Reply-To: <10878.1707421905@obiwan.sandelman.ca>
Accept-Language: en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: LV8PR11MB8536:EE_|CO1PR11MB5059:EE_
x-ms-office365-filtering-correlation-id: 6948ad2f-a336-4dc5-f591-08dc2bdb0322
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:LV8PR11MB8536.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(376002)(39860400002)(366004)(136003)(396003)(346002)(230273577357003)(230922051799003)(451199024)(64100799003)(186009)(1800799012)(83380400001)(86362001)(41300700001)(316002)(110136005)(54906003)(45080400002)(2906002)(53546011)(6506007)(7696005)(9686003)(33656002)(71200400001)(38070700009)(478600001)(30864003)(9326002)(5660300002)(8676002)(76116006)(64756008)(66446008)(66556008)(66476007)(66946007)(8936002)(4326008)(66574015)(52536014)(38100700002)(122000001)(55016003)(66899024)(579004)(559001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_LV8PR11MB853601C8D653A094587468DAB5482LV8PR11MB8536namp_"
MIME-Version: 1.0
X-OriginatorOrg: cisco.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: LV8PR11MB8536.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 6948ad2f-a336-4dc5-f591-08dc2bdb0322
X-MS-Exchange-CrossTenant-originalarrivaltime: 12 Feb 2024 14:58:02.9867 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: JKIOznjuek7pgdbpxxyLgi5a3TLg+EPi6ANiOwcroJqnQtYWfqV9w7SfWlPf13xju8Heuseua2dvi7CFvWoZHA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CO1PR11MB5059
X-Outbound-SMTP-Client: 173.37.147.252, alln-opgw-4.cisco.com
X-Outbound-Node: rcdn-core-11.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/opsawg/J0QHpYGwcyf-PddI17JmFxP_ZDI>
Subject: Re: [OPSAWG] AD review of draft-ietf-opsawg-mud-iot-dns-considerations-08
X-BeenThere: opsawg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: OPSA Working Group Mail List <opsawg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/opsawg>, <mailto:opsawg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/opsawg/>
List-Post: <mailto:opsawg@ietf.org>
List-Help: <mailto:opsawg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsawg>, <mailto:opsawg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 12 Feb 2024 14:58:14 -0000

Hi Michael,

The TD;LR is I think that your latest changes are good and I’ll send -12 to IETF LC.

When checking the changes, diff, 3 minor nits:

  1.  “a IP address literal in the URL” to “an IP …


  1.  I still think “inprotocol” should be something else, perhaps “within the protocol”.


  1.  The final part of the sentence, from list all of … doesn’t scan very well to me.
} In some cases, a complete set of geographically distributed servers
} is known at ahead of time, and the firmware vendor can list all of
} those addresses DNS for the the name that it lists in the MUD file.

I think that you have already addressed some comments from Mahesh, but at this stage, please treat and of Mahesh’s remaining comments as you would for any others received during IETF LC.

I’ve also put a few comments inline (but highlighted the actions above), to close out the review.


On 08/02/2024, 19:56, "Michael Richardson" <mcr+ietf@sandelman.ca> wrote:

{noting that you reviewed -08, and we are up to -10 since, so some of
your comments/text are no longer applicable}

Rob Wilton (rwilton) <rwilton@cisco.com<mailto:rwilton@cisco.com>> wrote:
    > I’ve just re-reviewed -10.I still think that the English to be cleaned
    > up further.  I know that the RFC editor would likely find and fix most

okay.

    > Minor level comments:



    > (1) p 2, sec 1.  Introduction
    >    [RFC8520] provides a standardized way to describe how a specific
    >    purpose device makes use of Internet resources.  Access Control
    > Lists
    >    (ACLs) can be defined in an RFC8520 Manufacturer Usage Description
    >    (MUD) file that permit a device to access Internet resources by DNS
    >    name.

    > "specific purpose device" sounds like slight strange phrasing to me.

As previously discussed for acceptable-urls, this comes from RFC8520,
although that document does not use those exact words.  I'd sure like a
comment from Eliot about whether this is the way to explain MUD.

It is fine to leave it as is.  This isn’t a hill that I’m willing to die on ;-)

    > (2) p 2, sec 1.  Introduction
    >    Use of a DNS name rather than IP address in the ACL has many
    >    advantages: not only does the layer of indirection permit the
    > mapping
    >    of name to IP address to be changed over time, it also generalizes
    >    automatically to IPv4 and IPv6 addresses, as well as permitting
    >    loading balancing of traffic by many different common ways,
    > including
    >    multi-CDN deployments wherein load balancing can account for
    >    geography and load.


    > "many different common ways" sounds like strange phrasing to me.  How
    > can something be both different and common, which do you mean?

rewritten to:

} generalizes automatically to IPv4 and IPv6 addresses, as well as
} permitting a variety of load balancing strategies, including multi-CDN
} deployments wherein load balancing can account for geography and
} load.

Thanks.

    > (3) p 2, sec 1.  Introduction
    >    At the MUD policy enforcement point -- the firewall -- there is a
    >    problem.  The firewall has only access to the layer-3 headers of the
    >    packet.  This includes the source and destination IP address, and if
    >    not encrypted by IPsec, the destination UDP or TCP port number
    >    present in the transport header.  The DNS name is not present!

    > "önly access" -> "äccess only"

fixed.


    > (4) p 2, sec 1.  Introduction
    >    It has been suggested that one answer to this problem is to provide
    > a
    >    forced intermediate for the TLS connections.  This could in theory
    > be
    >    done for TLS 1.2 connections.  The MUD policy enforcement point
    > could
    >    observe the Server Name Identifier (SNI) [RFC6066].  Some
    > Enterprises
    >    do this already.  But, as this involves active termination of the
    > TCP
    >    connection (a forced circuit proxy) in order to see enough of the
    >    traffic, it requires significant effort.


    > "This could in theory be done" => "In theory, this could be done", or
    > "This could, in theory, be done".

fixed.


    > (5) p 3, sec 1.  Introduction
    >    The second section of this document details how common manufacturer
    >    anti-patterns get in the way of this mapping.
    >    The third section of this document details how current trends in DNS
    >    resolution such as public DNS servers, DNS over TLS (DoT), DNS over
    >    QUIC (DoQ), and DNS over HTTPS (DoH) cause problems for the
    >    strategies employed.  Poor interactions with content-distribution
    >    networks is a frequent pathology that can result.

> Do you really mean pathology here?

"the scientific study of disease" or "a disease or medical condition:"

I certainly do not mean the first, but I do mean it results in a disease.
I'm going to just remove the sentence.

Okay.

    > (6) p 3, sec 1.  Introduction
    >    The fourth section of this document makes a series of
    > recommendations
    >    ("best current practices") for manufacturers on how to use DNS and
    > IP
    >    addresses with specific purpose IoT devices.

    > Perhaps just "with MUD supporting IoT devices".  Otherwise what is the
    > difference between a general purpose IoT device and a specific purpose
    > IoT device?

okay.


    > (7) p 3, sec 3.  Strategies to map names
    >    The most naive method is to try to map IP addresses to names using
    >    the in-addr.arpa (IPv4), and ipv6.arpa (IPv6) mappings.

    > For readability, it might be helpful to indicate when this mapping
    > would occur.

...ipv6.arpa (IPv6) mappings at the time the packet is seen.

Thanks.


    > (8) p 4, sec 3.1.1.  Too slow
    >    While subsequent connections to the same site (and subsequent
    > packets
    >    in the same flow) will not be affected if the results are cached,
    > the
    >    effects will be felt.  The ACL results can be cached for a period of
    >    time given by the TTL of the DNS results, but the lookup must be
    >    performed again in a number of hours to days.


    > Please consider whether it would read better as: "but the DNS lookup
    > must be repeated, e.g., in a few hours or days, when the cached IP
    > address to name binding expires."

okay.

now:
} The ACL results can be cached for a period of time given by the TTL
} of the DNS results, but the DNS lookup must be repeated, e.g, in a few
} hours or days,when the cached IP address to name binding expires.

Okay.

    > (9) p 4, sec 3.1.2.  Reveals patterns of usage
    >    By doing the DNS lookups when the traffic occurs, then a passive
    >    attacker can see when the device is active, and may be able to
    > derive
    >    usage patterns.  They could determine when a home was occupied or
    >    not.  This does not require access to all on-path data, just to the
    >    DNS requests to the bottom level of the DNS tree.

    > Is it worth mentioning that there are now mechanisms available (like
    > DoH, or Ohttp that can be used to mitigate this)?

I'm not convinced that ohttp will be ubiquitously available enough to
be useful to *MUD controllers*.  What is the business case for running
ohttp independently of a browser, or OS vertical?

I’ve assumed that ohttp may be used to increase privacy more generally, to stop attackers from inferring what devices an individual owns based on the DNS lookups that are being made.

Anyway, this section is about things that don't work.
Making them work slightly less bad seems not worth explaining.

Sure.



    > (10) p 6, sec 3.2.  A successful strategy
    >    In order to compensate for this, the MUD controller SHOULD regularly
    >    perform DNS lookups in order to never have stale data.  These
    > lookups
    >    must be rate limited to avoid excessive load on the DNS servers, and
    >    it may be necessary to avoid local recursive resolvers.  The MUD
    >    controller SHOULD incorporate its own recursive caching DNS server.
    >    Properly designed recursive servers should cache data for many
    >    minutes to days, while the underlying DNS data can change at a
    > higher
    >    frequency, providing different answers to different queries!
    > I suggest changing "for many minutes to days" to "for at least some
    > number of minutes, up to some number of days".


okay.


    > (11) p 8, sec 4.1.  Use of IP address literals in-protocol
    >    The second reason to avoid a DNS in the URL is when an inhouse
    >    content-distribution system is involved that involves on-demand
    >    instances being added (or removed) from a cloud computing
    >    architecture.

    > Should it be "avoid in IP address literal in the URL"?  Also, inhouse
    > => in-house.

Hmm.  I guess so.
The point is that when instances/come go really fast, it can seem to be hard
to refer to them quickly using names rather than IP addresses.
Maybe this can be more clearly explained by a CDN person.

Okay.

    > (12) p 9, sec 4.1.  Use of IP address literals in-protocol
    >    Finally, third-party content-distribution networks (CDN) tend to use
    >    DNS names in order to isolate the content-owner from changes to the
    >    distribution network.
    >    A non-deterministic name or address that is returned within the
    >    update protocol, the MUD controller is unable to know what the name
    >    is.  It is therefore unable to make sure that the communication to
    >    retrieve the new firmware is permitted by the MUD enforcement point.

    > The first sentence above doesn't make sense to me, please can it be
    > rephrased.

I have rewritten this to:
} Finally, it is common in some content-distribution networks (CDN) to
} use multiple layers of DNS CNAMEs in order to isolate the
} content-owner's naming system from changes in how the distribution
} network is organized.

Okay.

As an example of what I'm talking about, I recently came across:

dyas-[~](2.6.6) mcr 10001 %host login.my.gov.nl.ca
login.my.gov.nl.ca is an alias for gnlprod.azurefd.net.
gnlprod.azurefd.net is an alias for azurefd-t-prod.trafficmanager.net.
azurefd-t-prod.trafficmanager.net is an alias for shed.dual-low.part-0008.t-0009.t-msedge.net.
shed.dual-low.part-0008.t-0009.t-msedge.net is an alias for part-0008.t-0009.t-msedge.net.

and you just can't do this kind of thing with an IP address :-)

That is probably a good thing, but there is always SRv6 ;-)



    > (13) p 10, sec 4.2.  Use of non-deterministic DNS names in-protocol
    >    The firmware vendor is therefore likely to be asked to point a CNAME
    >    to the CDN network, to a name that might look like "g7.a.example",
    >    with the expectation that the CDN vendors DNS will do all the
    >    appropriate work to geolocate the transfer.  This can be fine for a
    >    MUD file, as the MUD controller, if located in the same geography as
    >    the IoT device, can follow the CNAME, and can collect the set of
    >    resulting IP addresses, along with the TTL for each.  The MUD
    >    controller can then take charge of refreshing that mapping at
    >    intervals driven by the TTL.

    >    In some cases, a complete set of geographically distributed servers
    >    is known at ahead of time, and the firmware vendor can list all of
    >    those addresses in the name that it lists in the MUD file.  As long
    >    as the active set of addresses used by the CDN is a strict subset of
    >    that list, then the geolocated name can be used for the firmware
    >    download itself.  This use of two addresses is ripe for confusion
    >    however.


    > Where are the addresses being listed?  In the DNS or with the CDN?

the addresses are listed in the DNS reply.

While strongly geofenced zones will return a single reply:
  dyas-[lwork/opsawg/iot-mud-dns-considerations](2.6.6) mcr 10032 %host google.com
  google.com has address 172.217.13.110
  google.com has IPv6 address 2607:f8b0:4020:804::200e

others will return a long list of all possible addresses, and often
the order will be rotated in the hope the client will use the first
one, creating some amount of round-robin load balancing.
dyas-[lwork/opsawg/iot-mud-dns-considerations](2.6.6) mcr 10036 %host microsoft.com
microsoft.com has address 20.112.250.133
microsoft.com has address 20.231.239.246
microsoft.com has address 20.76.201.171
microsoft.com has address 20.70.246.20
microsoft.com has address 20.236.44.162
microsoft.com has IPv6 address 2603:1030:b:3::152
microsoft.com has IPv6 address 2603:1030:20e:3::23c
microsoft.com has IPv6 address 2603:1030:c02:8::14
microsoft.com has IPv6 address 2603:1020:201:10::10f
microsoft.com has IPv6 address 2603:1010:3:3::5b
microsoft.com mail is handled by 10 microsoft-com.mail.protection.outlook.com.

(there are longer answers I've seen which even push the answer to TCP,
but I suspect that this results in poorer results and operators back
off from that)

I've rewritten:

} In some cases, a complete set of geographically distributed servers
} is known at ahead of time, and the firmware vendor can list all of
} those addresses DNS for the the name that it lists in the MUD file.

The end of your sentence still looks a bit mangled to me.

    > (14) p 10, sec 4.3.  Use of a too generic DNS name
    >    Some CDNs make all customer content at a single URL (such as
    >    s3.amazonaws.com).  This seems to be ideal from a MUD point of view:
    >    a completely predictable URL.

    > "Make all customer content at" => "Make all customer content available
    > at"

fixed.

    > (15) p 11, sec 6.  Recommendations to IoT device manufacturer on MUD
    > and DNS usage

    >    The difficult part is determining what to put into the MUD file
    >    itself.  There are currently tools that help with the definition and
    >    analysis of MUD files, see [mudmaker].  The remaining difficulty is
    >    now the semantic contents of what is in the MUD file.  An IoT
    >    manufacturer must now spend some time reviewing the network
    >    communications by their device.

    > Could "The remaining difficulty is now the semantic contents of what is
    > in the MUD file." is a bit vague, could it be more precisely explained
    > please?


now:
} The remaining difficulty is now the actual list of expected connections to put in the MUD file.

Thanks.


    > (16) p 12, sec 6.5.  Prefer DNS servers learnt from DHCP/Route
    > Advertisements
    >    The ADD WG has written [I-D.ietf-add-dnr] and [I-D.ietf-add-ddr] to
    >    provided.

    > This sentence doesn't scan.

} The ADD WG has written {{?I-D.ietf-add-dnr}} and
} {{?I-D.ietf-add-ddr}} to provide information to end devices on how to
} find locally provisioned secure/private DNS servers.

Thanks.

    > (17) p 12, sec 7.  Privacy Considerations
    >    The use of DoT and DoH eliminates the threat from passive
    >    eavesdropping, but still exposes the list to the operator of the DoT
    >    or DoH server.  There are additional methods, such as described by
    >    [RFC9230].

    > Perhaps "There are additional methods to help preserve privacy, such as
    > ..."

fixed.



    > (18) p 13, sec 7.  Privacy Considerations
    >    The use of DoT and DoH eliminates the threat from passive
    >    eavesdropping, but still exposes the list to the operator of the DoT
    >    or DoH server.  There are additional methods, such as described by
    >    [RFC9230].
    >    The use of unencrypted (Do53) requests to a local DNS server exposes
    >    the list to any internal passive eavesdroppers, and for some
    >    situations that may be significant, particularly if unencrypted WiFi
    >    is used.  Use of Encrypted DNS connection to a local DNS recursive
    >    resolver is a preferred choice.

    > Use of an Encrypted ...  is the preferred choice.

fixed.


    > Nit level comments:


    > (19) p 4, sec 3.1.3.  Mappings are often incomplete
    >    In some cases there are multiple layers of CNAME between the
    > original
    >    name and the target service name.  This is often due to a layer of
    >    load balancing in DNS, followed by a layer of load balancer at the
    >    HTTP level.

    > "Load balancing layer in the DNS" and "Load balancing layer at the HTTP
    > level" would probably read better.

fixed.


    > (20) p 7, sec 3.2.  A successful strategy
    >    3.  if any addresses have been omitted in a round-robin DNS process,
    >        the cache will have the set of addresses that were returned.

    > Possibly, "the same set of addresses"?


fixed.


    > (21) p 10, sec 4.2.  Use of non-deterministic DNS names in-protocol
    >    The firmware vendor is therefore likely to be asked to point a CNAME
    >    to the CDN network, to a name that might look like "g7.a.example",
    >    with the expectation that the CDN vendors DNS will do all the
    >    appropriate work to geolocate the transfer.  This can be fine for a
    >    MUD file, as the MUD controller, if located in the same geography as
    >    the IoT device, can follow the CNAME, and can collect the set of
    >    resulting IP addresses, along with the TTL for each.  The MUD
    >    controller can then take charge of refreshing that mapping at
    >    intervals driven by the TTL.
    >    In some cases, a complete set of geographically distributed servers
    >    is known at ahead of time, and the firmware vendor can list all of
    >    those addresses in the name that it lists in the MUD file.  As long
    >    as the active set of addresses used by the CDN is a strict subset of
    >    that list, then the geolocated name can be used for the firmware
    >    download itself.  This use of two addresses is ripe for confusion
    >    however.

    > at ahead of time => ahead of time.  all of those => all those

fixed.


    > (22) p 13, sec 7.  Privacy Considerations
    >    The use of a publically specified firmware update protocol would
    > also
    >    enhance privacy of IoT devices.  In such a system the IoT device
    >    would never contact the manufacturer for version information or for
    >    firmware itself.  Instead, details of how to query and where to get
    >    the firmware would be provided as a MUD extension, and an
    > Enterprise-
    >    wide mechanism would retrieve firmware, and then distribute it
    >    internally.  Aside from the bandwidth savings of downloading the
    >    firmware only once, this also makes the number of devices active
    >    confidential, and provides some evidence about which devices have
    >    been upgraded and which ones might still be vulnerable.  (The
    >    unpatched devices might be lurking, powered off, lost in a closet)

    > publically => publicly

fixed.
(Is that a US/English thing?  Or just me being educated to spell in
french first)

No idea, but the Mac OS dictionary states: “Note that the spelling is publicly, not -ally”

    > (23) p 13, sec 7.  Privacy Considerations
    >    The use of a publically specified firmware update protocol would
    > also
    >    enhance privacy of IoT devices.  In such a system the IoT device
    >    would never contact the manufacturer for version information or for
    >    firmware itself.  Instead, details of how to query and where to get
    >    the firmware would be provided as a MUD extension, and an
    > Enterprise-
    >    wide mechanism would retrieve firmware, and then distribute it
    >    internally.  Aside from the bandwidth savings of downloading the
    >    firmware only once, this also makes the number of devices active
    >    confidential, and provides some evidence about which devices have
    >    been upgraded and which ones might still be vulnerable.  (The
    >    unpatched devices might be lurking, powered off, lost in a closet)

    > In such a system the => In such a system, the

fixed.

    > Spellings: inhouse, inprotocol, middleboxes

is "in-protocol" wrong?

I’m pretty sure that “inprotocol” is wrong, but I’m not sure that “in-protocol” is right either.  Maybe “… within the protocol”

Thanks,
Rob


    > Grammar Warnings:

    > Section: 3.1.3, draft text: To limit churn of DNS PTR records, and
    > reduce failures of the MUD ACLs, operators would want to add all
    > possible names for each reverse name, whether or not the DNS load
    > balancing in the forward DNS space lists that end-point at that moment.
    > Warning: Consider shortening this phrase to just 'whether', unless you
    > mean 'regardless of whether'.  Suggested change: "whether"

I think I stick with what I have.

    > Section: 3.1.4, draft text: For instance, github.io, which is used for
    > hosted content, including the Editors' copy of internet drafts stored
    > on github, does not actually publish any names.  Warning: The official
    > name of this software platform is spelled with a capital "H".
    > Suggested change: "GitHub"

DNS name.

    > Section: 3.1.4, draft text: Instead a wildcard exists to answer all
    > potential names: requests are routed appropriate once they are
    > received.  Warning: A comma may be missing after the
    > conjunctive/linking adverb 'Instead'.  Suggested change: "Instead,"

okay.

    > Section: 3.2, draft text: The MUD controller and the device get a
    > matching set, and the ACLs that are setup cover all possibilities.
    > Warning: The verb 'set up' is spelled as two words. The noun 'setup' is
    > spelled as one.  Suggested change: "set up"

okay.

    > Section: 3.2, draft text: The simplest is when the round robin does not
    > return all addresses.  Warning: This word is normally spelled with a
    > hyphen.  Suggested change: "round-robin"

okay.

    > Section: 4.1, draft text: A common pattern for a number of devices is
    > to look for firmware updates in a two step process.  Warning: This word
    > is normally spelled with a hyphen.  Suggested change: "two-step"

okay.

    > Section: 4.1, draft text: An initial query is made (often over HTTPS,
    > sometimes with a POST, but the method is immaterial) to a vendor system
    > that knows whether or not an update is required.  Warning: Consider
    > shortening this phrase to just 'whether', unless you mean 'regardless
    > of whether'.  Suggested change: "whether"

okay.

    > Section: 4.1, draft text: The current firmware model of the device is
    > sometimes provided and then the authoritative server provides a
    > determination if a new version is required, and if so, what version.
    > Warning: Use a comma before "and" if it connects two independent
    > clauses (unless they are closely connected and short).  Suggested
    > change: ", and"

okay.

    > Section: 4.2, draft text: Even if the content provider chosen names are
    > deterministic they may change at a rate much faster then MUD files can
    > be updated.  Warning: Did you mean faster than?  Suggested change:
    > "faster than"

fixed.

    > Section: 4.2, draft text: This use of two addresses is ripe for
    > confusion however.  Warning: Consider inserting a comma before
    > 'however'.  Suggested change: ", however"

fixed.

    > Section: 4.3, draft text: Exactly what the risk is depends upon what
    > the other customers are doing: it could be limited to simply causing a
    > distributed denial of service attack resulting in high costs to those
    > customers, or such an attack could potentially include writing content.
    > Warning: It appears that hyphens are missing.  Suggested change:
    > "denial-of-service"

okay.

    > Section: 6, draft text: It can even be done without code changes via
    > the use of a QR code affixed to the packaging (see [RFC9238].  Warning:
    > Unpaired symbol: ')' seems to be missing

closing added...

    > Section: 6.2, draft text: While it used to be costly to have a large
    > number of aliases in a web server certificate, this is no longer the
    > case.  Warning: Specify a number, remove phrase, or simply use many or
    > numerous Suggested change: "many"

I think i'm fine.


    > Section: 6.5, draft text: The ADD WG has written [I-D.ietf-add-dnr] and
    > [I-D.ietf-add-ddr] to provided.  Warning: The verb after "to" should be
    > in the base form.  Suggested change: "provide"

fixed.

    > Section: 7, draft text: The use of unencrypted (Do53) requests to a
    > local DNS server exposes the list to any internal passive
    > eavesdroppers, and for some situations that may be significant,
    > particularly if unencrypted WiFi is used.  Warning: Did you mean Wi-Fi?
    > (This is the officially approved term by the Wi-Fi Alliance.)
    > Suggested change: "Wi-Fi"

okay.

Posting new version in two minutes.


--
Michael Richardson <mcr+IETF@sandelman.ca<mailto:mcr+IETF@sandelman.ca>>   . o O ( IPv6 IøT consulting )
           Sandelman Software Works Inc, Ottawa and Worldwide