Re: [sacm] Benjamin Kaduk's practice ballot (No Objection) on draft-ietf-sacm-nea-swima-patnc-02: (with COMMENT)

"Schmidt, Charles M." <cmschmidt@mitre.org> Tue, 06 March 2018 01:03 UTC

Return-Path: <cmschmidt@mitre.org>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B0923128959; Mon, 5 Mar 2018 17:03:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.21
X-Spam-Level:
X-Spam-Status: No, score=-4.21 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_MED=-2.3, T_RP_MATCHES_RCVD=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=mitre.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WILtB8g01gdR; Mon, 5 Mar 2018 17:03:43 -0800 (PST)
Received: from smtpvmsrv1.mitre.org (smtpvmsrv1.mitre.org [192.52.194.136]) by ietfa.amsl.com (Postfix) with ESMTP id 82A4B12E8E0; Mon, 5 Mar 2018 17:03:40 -0800 (PST)
Received: from smtpvmsrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 127606C004E; Mon, 5 Mar 2018 20:03:40 -0500 (EST)
Received: from imshyb02.MITRE.ORG (unknown [129.83.29.3]) by smtpvmsrv1.mitre.org (Postfix) with ESMTP id F1D4A6C0039; Mon, 5 Mar 2018 20:03:39 -0500 (EST)
Received: from imshyb01.MITRE.ORG (129.83.29.2) by imshyb02.MITRE.ORG (129.83.29.3) with Microsoft SMTP Server (TLS) id 15.0.1263.5; Mon, 5 Mar 2018 20:03:38 -0500
Received: from gcc01-dm2-obe.outbound.protection.outlook.com (10.140.19.249) by imshyb01.MITRE.ORG (129.83.29.2) with Microsoft SMTP Server (TLS) id 15.0.1263.5 via Frontend Transport; Mon, 5 Mar 2018 20:03:38 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mitre.onmicrosoft.com; s=selector1-mitre-org; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=Wl35O2tJksHL14ofIGZLjipUiaySDskVxzXlon7mKaA=; b=TXa87zBD+w2nE0pOWrKnKRAx83vlBcZLmfFR4zEQKCjn6FimHvkWW06VKOMr9WrnDlMkDq9Cs3bnnOY4lCc4SuYkPB0KafqzN3SQK+XMRu2EndIlD5VCOYOx7Y6bdyzZXnFijmGqNg7hxKbPYiPsAjy0fVRlU6f/UOuHHQQo0oI=
Received: from DM5PR0901MB2375.namprd09.prod.outlook.com (52.132.133.18) by DM5PR0901MB2373.namprd09.prod.outlook.com (52.132.133.16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.548.13; Tue, 6 Mar 2018 01:03:37 +0000
Received: from DM5PR0901MB2375.namprd09.prod.outlook.com ([fe80::21b9:ccf6:187e:85e1]) by DM5PR0901MB2375.namprd09.prod.outlook.com ([fe80::21b9:ccf6:187e:85e1%13]) with mapi id 15.20.0548.016; Tue, 6 Mar 2018 01:03:37 +0000
From: "Schmidt, Charles M." <cmschmidt@mitre.org>
To: Benjamin Kaduk <kaduk@mit.edu>
CC: The IESG <iesg@ietf.org>, "sacm-chairs@ietf.org" <sacm-chairs@ietf.org>, "draft-ietf-sacm-nea-swima-patnc@ietf.org" <draft-ietf-sacm-nea-swima-patnc@ietf.org>, "odonoghue@isoc.org" <odonoghue@isoc.org>, "sacm@ietf.org" <sacm@ietf.org>
Thread-Topic: Benjamin Kaduk's practice ballot (No Objection) on draft-ietf-sacm-nea-swima-patnc-02: (with COMMENT)
Thread-Index: AQHTsDa+NLvXN0x1rUG3OeCsst4A4KPCY50g
Date: Tue, 06 Mar 2018 01:03:37 +0000
Message-ID: <DM5PR0901MB2375EF1656E78C7DA3DE046FABD90@DM5PR0901MB2375.namprd09.prod.outlook.com>
References: <20180221225835.GG54688@mit.edu> <DM5PR0901MB2375263C5375E6438FA0A70BABC30@DM5PR0901MB2375.namprd09.prod.outlook.com> <20180228015121.GE50954@kduck.kaduk.org>
In-Reply-To: <20180228015121.GE50954@kduck.kaduk.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=cmschmidt@mitre.org;
x-originating-ip: [192.160.51.88]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; DM5PR0901MB2373; 7:RQJNUh3hIrZMQjstwmS13U7/wx4LMrSjdLDEuWHkqH+6hNxJFydGJjxGzbbMvIvXBEDCqUtN5yRwK/XiC2jbSeiT/lACj1jIuaO1N2r/VlS/UKjRO8S06DktcXowaYRTnTvFQehA3dtRWf+BOAsJsuts7N0Cl8kZspH60kSC8rtoXtkJ2fveSNEibB3vVzeqb6AfrstTg0jwtcrv3z3tC0TJWLBwQrMY+0g5E9NXZY5uGHFikvukiC3SfSjgjP9i
x-ms-exchange-antispam-srfa-diagnostics: SSOS;
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: 3d775678-731e-4568-4ead-08d582fe17ef
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(48565401081)(5600026)(4604075)(3008032)(4534165)(4627221)(201703031133081)(201702281549075)(2017052603328)(7153060)(7193020); SRVR:DM5PR0901MB2373;
x-ms-traffictypediagnostic: DM5PR0901MB2373:
x-microsoft-antispam-prvs: <DM5PR0901MB23739B0582D1DCA2534010F2ABD90@DM5PR0901MB2373.namprd09.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(72170088055959)(192374486261705)(240460790083961)(211171220733660);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040501)(2401047)(8121501046)(5005006)(3002001)(3231220)(944501244)(52105095)(10201501046)(93006095)(93001095)(6055026)(6041288)(20161123558120)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123560045)(20161123562045)(20161123564045)(6072148)(201708071742011); SRVR:DM5PR0901MB2373; BCL:0; PCL:0; RULEID:; SRVR:DM5PR0901MB2373;
x-forefront-prvs: 06036BD506
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(396003)(366004)(376002)(39860400002)(39380400002)(346002)(199004)(189003)(13464003)(69224002)(52314003)(966005)(14454004)(66066001)(86362001)(3280700002)(229853002)(33656002)(106356001)(2906002)(6916009)(54906003)(81166006)(81156014)(478600001)(8676002)(105586002)(8936002)(2900100001)(68736007)(99286004)(25786009)(2950100002)(4326008)(6116002)(55016002)(316002)(97736004)(3660700001)(53546011)(6506007)(3846002)(9686003)(8666007)(7736002)(6306002)(53936002)(53946003)(76176011)(6246003)(2171002)(6436002)(74316002)(7696005)(186003)(5660300001)(102836004)(59450400001)(26005)(305945005)(5250100002); DIR:OUT; SFP:1101; SCL:1; SRVR:DM5PR0901MB2373; H:DM5PR0901MB2375.namprd09.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; A:1; MX:1; LANG:en;
received-spf: None (protection.outlook.com: mitre.org does not designate permitted sender hosts)
x-microsoft-antispam-message-info: rZ1mkF2sZyc3+UVt2C28+kZyltgc3JNoKDx2kOFr+WU8yoYlanVD8Tgd16CBKJoYaTCxTMsIQyInYwfBA4Ydr1SsZshvib9TPpVOeLnK8NwPAKR0RJTKej8xXUKvX1jzeS8o4WaZSG+fck/SfDGp6EaUHItJdE2E5eVGUfxIlKJ6rR1gEYzkrKbarDgI4jhcCWfXHVziBGSUZk4YtGTI+OD9PWr7NvNRGNNShXmgdpClNPSxyvMvrIYNIU4nw7HQ/rVwZiD/9Lni3v0PwGLMLPF7AeeYYyOFX6o42tV4dqF/Ne8/I65QQBgWGRhDgwLi94uzKagPKI7Dk0FWT+p5dg==
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 3d775678-731e-4568-4ead-08d582fe17ef
X-MS-Exchange-CrossTenant-originalarrivaltime: 06 Mar 2018 01:03:37.7187 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: c620dc48-1d50-4952-8b39-df4d54d74d82
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR0901MB2373
X-OriginatorOrg: mitre.org
X-MITRE: 8GQsMWxq66rxk57w
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/2IM_zu_1rj8y5MevpMU1blaMcf8>
Subject: Re: [sacm] Benjamin Kaduk's practice ballot (No Objection) on draft-ietf-sacm-nea-swima-patnc-02: (with COMMENT)
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 06 Mar 2018 01:03:48 -0000

Hi Benjamin,

Thanks for following up. It looks like we are mostly on the same page. I have a few additional responses:

> > > Also Section 2.3
> > >
> > > Can we REQUIRE the underlying transport to provide confidentiality,
> > > or is there some historical baggage that requires us to allow the
> > > possibility of cleartext transport?  To be clear, my preference
> > > is in general for in-protocol message protection, but I recognize
> > > that there are scenarios where that doesn't always work well or is
> > > redundant.
> >
> > NEA is designed to support an extensible list of PT (transport) protocols.
> Currently, the only NEA transport protocols defined are PT-TLS and PT-EAP,
> both of which provide confidentiality. I cannot think of why, but it might be
> the case that sometime in the future someone might create a PT protocol
> that does not provide confidentiality. If someone did this, I am not sure I
> would want to automatically preclude SWIMA from using it. In short, my
> preference would be to note this issue, but not dictate a specific response.
> Please let me know if you still feel that stronger requirements for
> confidentiality are necessary.
> 
> This seems pretty speculative to me, but not quite to the point that
> I would ballot DISCUSS for it (if I could ballot, which I can't
> yet).  If such a hypothetical future transport was standards-track,
> it could (procedurally, at least) update this document to relax the
> condition, anyway, so my personal inclination is to require
> confidentiality at present and revisit later if needed.

Thinking about this a bit more, I agree. I have made two changes to the section. First, I made it clear that the section is not about "things that are not required", but about requirements that are beyond the scope of SWIMA to meet. (Hopefully that will clarify things a bit better.) I also rephrased the section:

   There are certain capabilities that users of the SWIMA specification
   might require but which are beyond the scope of SWIMA itself and need
   to be addressed by other standards.  This list is not exhaustive.

   End to End Confidentiality:  The SWIMA specification does not define
      a mechanism for confidentiality, nor is confidentiality
      automatically provided by using the PA-TNC interface.  In the NEA
      architecture, confidentiality is generally provided by the
      underlying transport protocols, such as the PT Binding to TLS
      [RFC6876] or PT-EAP Posture Transport for Tunneled EAP Methods
      [RFC7171] - see Section 7 for more information on related
      standards.  The information conveyed by SWIMA is often sensitive
      in nature for both security (Section 8) and privacy (Section 9)
      reasons.  Those who implement SWIMA need to ensure that
      appropriate NEA transport mechanisms are employed to meet
      confidentiality requirements.

Does this better address your concerns?

--

> > > I'm a little concerned that there are some broad MUST-level
> > > requirements 
<SNIP>
> >
> > Could you expand on this? 
<SNIP>
>
> Probably I should treat this as a learning experience with my
> practice ballot, having put some not-really-actionable comment in my
> review.  Looking through the document again, maybe things like:
> 
>    With regard to alterations to a record, SWIMA-PCs MUST detect any
>    alterations to the contents of a record.
> 
> could be problematic if the record format changes to add more fields
> and the SWIMA-PC doesn't know to track the new fields (pretty
> speculative, admittedly; I don't know how plausible either of those
> are)

I'm not too worried about this because change detection can be extremely coarse. (I.e., it can be based on the record's "Modification timestamp" if it is a file, or based on comparing hashes of the record.) The structure of the record should be irrelevant for that level of change detection.

> There's also the prohibition against coverage gaps, which I can
> definitely understand wanting, but seems prone to Murphy's law.

I agree this is a bigger lift, but, again, I'm not worried. It just means the SWIMA-PC needs to keep track of the records in the Evidence Collection. If it stops and restarts monitoring, it just needs to see how the Evidence Collection changes. As noted above, MODIFICATION detection can be very coarse. If it cannot figure out the delta, it just needs to change the Epoch to indicate a discontinuity and continue from there. (Noted in 3.7.1 Event Identifiers.) So, again, while this is a challenge, I think it remains reasonable.

--

> > > In Section 3.6
> > >
> > > It seems a little odd to me that we need to keep last state prior to
> > > deletion even around, but we don't need to be able to provide the
> > > full alteration history -- that makes an alteration event seem like
> > > a weaker piece of data than delete+create would be, whereas intution
> > > might think that they should have the same information content.
> >
> > I am confused by this comment. The requirement to retain deleted records
> is different from the requirement to track alterations. The former is provided
> so that SWIMA-PVs are able to get additional data about a product that has
> been deleted, in the form of the deleted software's information record.
> Alteration, creation, and deletion are for tracking changes to software state.
> This needs to provide a complete history so that old state information can be
> updated to reflect new state. In this, alteration and delete+create are, in
> fact, of equal value. Am I misunderstanding your comment?
> 
> It is more likely that the misunderstanding was mine.  In that,
> since the SWIMA-PC needs to be able to provide event history
> including alteration events, the SWIMA-PV could request all the
> relevant alteration events and track the state of that software
> through the history that's retained.  My original comment would only
> be valid if the alteration records did not contain a record of what
> actually changed.

I think I understand your concern: You were noting that, in the case of a DELETE action, the SWIMA-PV can request the historical record to see what used to be there. However, in the case of a MODIFY event, the SWIMA-PV has no way to collect the previous iteration of the record, and thus cannot compare to determine what changed. Thus, if there was a DELETE+CREATE event, one could take the old and new records (assuming one was able to line them up) and compare, but would not be able to perform such a comparison under a MODIFICATION. Is this your concern?

If so, then I do agree that there is a difference between what one can tell about the two event sequences. However, from a practical standpoint, I am not concerned about this. We do make it explicit in the specification that the old attribute cannot be collected via SWIMA, so this shouldn't be a surprise. I cannot think of any use cases where knowing the preceding state of the record is necessary - most of the uses of SWIMA I can imagine just need a way to capture the current state. If you can think of a reason that a consumer might need to know what changed in the record let me know, but I feel that simply knowing there is a revised record is sufficient for virtually all SWIMA uses.

--

Regarding the timestamp, I did some searching but I was also unable to find a standard expressed time in a more concise format. The Wilkinson draft you found didn't have a lot of detail. At this stage, I'm inclined to leave things be rather than create something unique to SWIMA (or adopt something esoteric enough that I might as well be doing so).

---

Thanks again for the clarifications. I hope that the new draft (-04) better addresses your concerns.

Thanks,
Charles




> -----Original Message-----
> From: Benjamin Kaduk [mailto:kaduk@mit.edu]
> Sent: Tuesday, February 27, 2018 7:51 PM
> To: Schmidt, Charles M. <cmschmidt@mitre.org>
> Cc: The IESG <iesg@ietf.org>; sacm-chairs@ietf.org; draft-ietf-sacm-nea-
> swima-patnc@ietf.org; odonoghue@isoc.org; sacm@ietf.org
> Subject: Re: Benjamin Kaduk's practice ballot (No Objection) on draft-ietf-
> sacm-nea-swima-patnc-02: (with COMMENT)
> 
> On Sat, Feb 24, 2018 at 06:00:12AM +0000, Schmidt, Charles M. wrote:
> > Hello,
> >
> > Thanks a bunch for the comments. I agree and have implemented most of
> the changes. I have a few questions/responses:
> >
> > > My understanding is that the
> > > primary benefit of this work is in managed environments where there
> > > is an expectation that only a central authority within a given trust
> > > domain will be installing/updating software, and so this mechanism
> > > can be used to audit for policy compliance, in terms of things like
> > > whether updates are taken in a timely fashion, and blocking
> > > certain types of "role-based" access where the presence of certain
> > > software indicates a certain role.
> >
> > I think SWIMA has a much broader use, including gathering information
> from endpoints where users control what software is added. That said, in re-
> reading the introduction I agree that it doesn't adequately convey that
> SWIMA standardizes transport but not detection. I'll update accordingly.
> 
> I guess there is some scope for its use on endpoints where users
> can affect the installed software, yes.  Thanks for taking another
> look at the actual wording.
> 
> > > Also Section 2.3
> > >
> > > Can we REQUIRE the underlying transport to provide confidentiality,
> > > or is there some historical baggage that requires us to allow the
> > > possibility of cleartext transport?  To be clear, my preference
> > > is in general for in-protocol message protection, but I recognize
> > > that there are scenarios where that doesn't always work well or is
> > > redundant.
> >
> > NEA is designed to support an extensible list of PT (transport) protocols.
> Currently, the only NEA transport protocols defined are PT-TLS and PT-EAP,
> both of which provide confidentiality. I cannot think of why, but it might be
> the case that sometime in the future someone might create a PT protocol
> that does not provide confidentiality. If someone did this, I am not sure I
> would want to automatically preclude SWIMA from using it. In short, my
> preference would be to note this issue, but not dictate a specific response.
> Please let me know if you still feel that stronger requirements for
> confidentiality are necessary.
> 
> This seems pretty speculative to me, but not quite to the point that
> I would ballot DISCUSS for it (if I could ballot, which I can't
> yet).  If such a hypothetical future transport was standards-track,
> it could (procedurally, at least) update this document to relax the
> condition, anyway, so my personal inclination is to require
> confidentiality at present and revisit later if needed.
> 
> > > I'm a little concerned that there are some broad MUST-level
> > > requirements that seem hard to know if they can actually be
> > > implemented reliably, like only using a data source in the posture
> > > collector if it is known that it can meet all the listed
> > > requirements both now and in the future, or the requirements for
> > > consistency across time about how various information is handled.
> > > This makes updating the PC software pretty risky.  Another example
> > > is saying that "Even a probable location for a software product is
> > > preferable to using a zero-length locator." so that once we pick one
> > > we can't change what is reported.  (I guess we're supposed to
> > > DELETE+CREATE in this scenario?)
> >
> > Could you expand on this? At the moment I feel the MUSTs are all
> necessary. In the case of "MUST meet all listed requirements", this is
> because a partially compliant source would not provide the consistent view
> that SWIMA needs. For example, if one source didn't allow event detection,
> that would mean that events could not reliably be used to update inventory
> information, violating a SWIMA-PV's assumptions.
> 
> Probably I should treat this as a learning experience with my
> practice ballot, having put some not-really-actionable comment in my
> review.  Looking through the document again, maybe things like:
> 
>    With regard to alterations to a record, SWIMA-PCs MUST detect any
>    alterations to the contents of a record.
> 
> could be problematic if the record format changes to add more fields
> and the SWIMA-PC doesn't know to track the new fields (pretty
> speculative, admittedly; I don't know how plausible either of those
> are)
> 
> There's also the prohibition against coverage gaps, which I can
> definitely understand wanting, but seems prone to Murphy's law.
> 
> 
> > I'm not sure what you mean with regard to your concern about preferring
> "probable locations" to a lack of location, or how that relates to
> DELETE+CREATE events. Could you clarify?
> 
> It looks like this text was removed in the -03, but the idea was
> that when first reporting an event, the SWIMA-PC would use a
> "probable locator" as indicated by the -02.  What should the
> SWIMA-PC do if it later discovers that this locator was erroneous
> and now posesses a true locator for that software?  There is a MUST
> level requirement to not change the reported locator for a given
> installation of the software (IIRC), but it's known to be wrong.
> Deleting this text seems to resolve the question in favor of "use a
> zero-length locator if you're not sure", which is consistent at
> least.  (I'm still not sure if it's worth doing a DELETE and
> CREATEing a new entry if the actual software location is later
> discovered, though.)
> 
> > > In Section 3.6
> > >
> > > It seems a little odd to me that we need to keep last state prior to
> > > deletion even around, but we don't need to be able to provide the
> > > full alteration history -- that makes an alteration event seem like
> > > a weaker piece of data than delete+create would be, whereas intution
> > > might think that they should have the same information content.
> >
> > I am confused by this comment. The requirement to retain deleted records
> is different from the requirement to track alterations. The former is provided
> so that SWIMA-PVs are able to get additional data about a product that has
> been deleted, in the form of the deleted software's information record.
> Alteration, creation, and deletion are for tracking changes to software state.
> This needs to provide a complete history so that old state information can be
> updated to reflect new state. In this, alteration and delete+create are, in
> fact, of equal value. Am I misunderstanding your comment?
> 
> It is more likely that the misunderstanding was mine.  In that,
> since the SWIMA-PC needs to be able to provide event history
> including alteration events, the SWIMA-PV could request all the
> relevant alteration events and track the state of that software
> through the history that's retained.  My original comment would only
> be valid if the alteration records did not contain a record of what
> actually changed.
> 
> > > It makes me a little sad to see an ASCII time representation used when
> more
> > > space-efficient options are available and we've already got binary
> > > integers going on the wire.  Seconds since the epoch might even be
> > > enough for this work, or for more precision 100s of nanoseconds
> > > since the epoch is also seeing some notable use.
> >
> > I would definitely be open to other formats as long as they are not too
> esoteric. RFC 3339 was just what the TNC uses in their protocols. I'm always
> for saving some bytes. Do you have a recommendation?
> 
> I'm failing to find a good (i.e., IETF) citation, but my personal
> recommendation is to have a 64-bit integer that counts time since
> the epoch in units of 100 nanoseconds.  This is used in
> http://afs3-stds.central.org/docs/draft-wilkinson-afs3-rxgk-11.html
> and I'm pretty sure also some IETF work, even if I can't find it
> right now.
> 
> > Beyond these questions, I agree with your comments and have updated
> the draft accordingly.
> >
> > Thanks again for the input.
> 
> You're welcome!  I looked through the diff between -02 and -03, and
> it looked good -- thanks for all the fixes!
> 
> -Benjamin
> 
> > Charles
> >