[secdir] Secdir last call review of draft-ietf-opsawg-9092-update-09
Tim Hollebeek via Datatracker <noreply@ietf.org> Fri, 26 January 2024 21:26 UTC
Return-Path: <noreply@ietf.org>
X-Original-To: secdir@ietf.org
Delivered-To: secdir@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 88411C17C89D; Fri, 26 Jan 2024 13:26:39 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: Tim Hollebeek via Datatracker <noreply@ietf.org>
To: secdir@ietf.org
Cc: draft-ietf-opsawg-9092-update.all@ietf.org, last-call@ietf.org, opsawg@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 12.4.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <170630439954.44192.9928224870265226250@ietfa.amsl.com>
Reply-To: Tim Hollebeek <tim.hollebeek@digicert.com>
Date: Fri, 26 Jan 2024 13:26:39 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/SsO_q2K_NaQaNwb6oBuuk6KkGhk>
Subject: [secdir] Secdir last call review of draft-ietf-opsawg-9092-update-09
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.39
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 26 Jan 2024 21:26:39 -0000
Reviewer: Tim Hollebeek Review result: Has Nits The document is extremely well written ... I didn't find too much to comment on, despite looking pretty closely at the key management and signing aspects. I just have two nits: (1) The following paragraph appears twice in the document (looks like just a copy/paste error when moving stuff around): "Identifying the private key associated with the certificate and getting the department that controls the private key (which might be stored in a Hardware Security Module (HSM)) to generate the CMS signature is left as an exercise for the implementor. On the other hand, verifying the signature has no similar complexity; the certificate, which is validated in the public RPKI, contains the needed public key." (2) Section 6, paragraph 5: is this intended to be a RFC 2119 "MAY"? If so, capitalize. If not, avoid the word.
- [secdir] Secdir last call review of draft-ietf-op… Tim Hollebeek via Datatracker
- Re: [secdir] Secdir last call review of draft-iet… Randy Bush
- Re: [secdir] Secdir last call review of draft-iet… Randy Bush
- Re: [secdir] Secdir last call review of draft-iet… Tim Hollebeek
- Re: [secdir] [Last-Call] Secdir last call review … Ben Campbell
- Re: [secdir] [Last-Call] Secdir last call review … Tim Hollebeek
- Re: [secdir] [Last-Call] Secdir last call review … Martin J. Dürst
- Re: [secdir] Secdir last call review of draft-iet… Russ Housley
- Re: [secdir] Secdir last call review of draft-iet… Tim Hollebeek