[secdir] Secdir last call review of draft-ietf-acme-dtnnodeid-07

Valery Smyslov via Datatracker <noreply@ietf.org> Mon, 29 November 2021 14:35 UTC

Return-Path: <noreply@ietf.org>
X-Original-To: secdir@ietf.org
Delivered-To: secdir@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id B12083A0A3A; Mon, 29 Nov 2021 06:35:05 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: Valery Smyslov via Datatracker <noreply@ietf.org>
To: secdir@ietf.org
Cc: acme@ietf.org, draft-ietf-acme-dtnnodeid.all@ietf.org, last-call@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 7.40.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <163819650566.3161.13064510086098914819@ietfa.amsl.com>
Reply-To: Valery Smyslov <valery@smyslov.net>
Date: Mon, 29 Nov 2021 06:35:05 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/_3mih2mI1Td1L0eN_Q2a_Dtplnc>
Subject: [secdir] Secdir last call review of draft-ietf-acme-dtnnodeid-07
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.29
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 29 Nov 2021 14:35:06 -0000

Reviewer: Valery Smyslov
Review result: Has Issues

I have reviewed this document as part of the security directorate's ongoing
effort to review all IETF documents being processed by the IESG.  These
comments were written primarily for the benefit of the security area directors.
Document editors and WG chairs should treat these comments just like any other
last call comments.

The draft specifies an extension to the Automated Certificate Management
Environment (ACME) protocol that allows to automatically issue and manage
certificates for nodes in the Delay-Tolerant Networking (DTN) networks.

Issues.

I was hesitating whether it is a real issue or just the lack of my
understanding of the protocol, but finally decided to mark it as an issue.
Section 5.1 states that CSR MAY contain a mixed set of SAN claims, including
combinations of "ip", "dns", and "bundleEID" claims. However, this document
only defines how ACME server can validate "bundleEID" claim. I think that the
document should at least mention how "dns" and "ip" claims should be validated
(pointing to the appropriate specs).

Nits.

The document uses both MUST and SHALL keywords. Not a problem, but I think
readability of the document would increase if only one of these forms were used.

Section 7.6.
I think that it should be mentioned more explicitly that these channels must
provide mutual authentication of ACME client/server and corresponding BP
agents, and that the channels must protect integrity and authenticity of the
messages, and in some situations (when client account key thumbprint is
transmitted) also their confidentiality. These are standard security services
and I think it's better to use these terms.