[secdir] sec-dir review of draft-ietf-dnssd-mdns-relay-01
Derek Atkins <derek@ihtfp.com> Fri, 21 December 2018 16:56 UTC
Return-Path: <derek@ihtfp.com>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DBE1F12894E; Fri, 21 Dec 2018 08:56:40 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.79
X-Spam-Level:
X-Spam-Status: No, score=-1.79 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, T_SPF_PERMERROR=0.01, URIBL_CSS=0.1, URIBL_CSS_A=0.1] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ihtfp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2qhaaDkjn0Al; Fri, 21 Dec 2018 08:56:38 -0800 (PST)
Received: from mail2.ihtfp.org (MAIL2.IHTFP.ORG [204.107.200.7]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0BE3D130DFE; Fri, 21 Dec 2018 08:56:38 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mail2.ihtfp.org (Postfix) with ESMTP id 1F4E0E2047; Fri, 21 Dec 2018 11:56:34 -0500 (EST)
Received: from mail2.ihtfp.org ([127.0.0.1]) by localhost (mail2.ihtfp.org [127.0.0.1]) (amavisd-maia, port 10024) with ESMTP id 21636-09; Fri, 21 Dec 2018 11:56:33 -0500 (EST)
Received: from securerf.ihtfp.org (unknown [8.46.76.62]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mocana.ihtfp.org", Issuer "IHTFP Consulting Certification Authority" (not verified)) by mail2.ihtfp.org (Postfix) with ESMTPS id 703BBE2044; Fri, 21 Dec 2018 11:56:31 -0500 (EST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ihtfp.com; s=default; t=1545411393; bh=QfHInGnY3E9j90ypGdCkHmcQGT6slvqB/WihuRXeK54=; h=From:To:Cc:Subject:Date; b=metB0QUrXMEXG3NbWbpgNdKc+Wvmed8DlUphxQrptP5qFQX93OB5xZ0I3GFkvDDgP IXYocQ/BEhWztFZHrNL2YUdaSJ0m+QRTQCcicCQyqBaUgUo8Ra0aByVUl14ZihteSJ N/JWbAjMw+PcBqndCty3x2vNfGvC9AHkzl1RyEL0=
Received: (from warlord@localhost) by securerf.ihtfp.org (8.15.2/8.15.2/Submit) id wBLGuFO9006576; Fri, 21 Dec 2018 11:56:15 -0500
From: Derek Atkins <derek@ihtfp.com>
To: iesg@ietf.org, secdir@ietf.org
Cc: dnssd-chairs@ietf.org, mellon@fugue.com, cheshire@apple.com
Date: Fri, 21 Dec 2018 11:56:12 -0500
Message-ID: <sjmefaavmxf.fsf@securerf.ihtfp.org>
User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/25.3 (gnu/linux)
MIME-Version: 1.0
Content-Type: text/plain
X-Virus-Scanned: Maia Mailguard 1.0.2a
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/s1WzyDTZZIWVgYNmyGXAFwqmtiw>
Subject: [secdir] sec-dir review of draft-ietf-dnssd-mdns-relay-01
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Dec 2018 16:56:41 -0000
Hi, I have reviewed this document as part of the security directorate's ongoing effort to review all IETF documents being processed by the IESG. These comments were written with the intent of improving security requirements and considerations in IETF drafts. Comments not addressed in last call may be included in AD reviews during the IESG review. Document editors and WG chairs should treat these comments just like any other last call comments. Summary: * Ready to publish, but nits remain Details: * The specific authorization details between the Client and Relay is elided. Specifically, how does a proxy get configured for specific client connections? The spec does say it needs to get configured (section 9), and talks at length about configuring the relay for the available networks, but doesn't say much else about how to authorize clients. * Can a Relay be a client to another Relay? It's unclear what would happen if someone tried to configure it that way; the specification does not talk to that possibility (or prohibit it), as far as I can tell. -derek -- Derek Atkins 617-623-3745 derek@ihtfp.com www.ihtfp.com Computer and Internet Security Consultant