[secdir] Re: secdir review of draft-ietf-anima-brski-prm-15
"Fries, Steffen" <steffen.fries@siemens.com> Tue, 04 February 2025 17:47 UTC
Return-Path: <steffen.fries@siemens.com>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B990DC14F61A; Tue, 4 Feb 2025 09:47:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.105
X-Spam-Level:
X-Spam-Status: No, score=-2.105 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=siemens.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id m2_H_G5o76Uq; Tue, 4 Feb 2025 09:47:50 -0800 (PST)
Received: from DU2PR03CU002.outbound.protection.outlook.com (mail-northeuropeazon11012001.outbound.protection.outlook.com [52.101.66.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-384) server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6582AC151091; Tue, 4 Feb 2025 09:47:50 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=Fej4Au5UTG868pEH7cxpvMjz0b541L5aVeB+SzGSDMl0ngA/9qkKDI6s0oyXWGDN+VcoUqZfW6Dcpz0dKoCwfkBtvVq/VuKCLBAQ++lFCS71PrBNPzLMBaACtO01+WVTKGbBhS7LlUMtQRP2zqlIZnBUp4MFvQvthlqhpJDALewNwXBw793Aa5RzxvHZgB9QFVDekf/nMsVZqQGg8z6tpyDWYFT5b66rg4jijZbwn6BUVUtQh2nYX5DXLdrNyUScVaREvWVy3Dz2kBJyIvd3C4InXRRonte4z9JFkycRTW6OW/pC3SjsmAO+am2X3m/HYHAZGMwd5GWFOoyRB3W+QA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=j7RKKvqmxadau6ZHeS0586BdQiKxWE/BLG5q8G9Znk8=; b=FOR8FH7PoAXkflAKF+t6lYugTQtr2zUUVN5Zt6bQZ0m8oQetc+hRZPi7Lq8qp/5+gyezXpciiXIR557YsdT/JHZHnKU8JI75J9b/NZAkFLdaYphIzCdRC2sWn06axL14CrNYYPiakL1bBliM+5kJe3JMkcagrH1AOEBW67kcYBpKNvuHlI5ijnKpxVcIphE3Syydd2DrAOsc2wvAq+wZUGLfpH6obt+vACgrjMwXdGiVk0B2QkBMcKdnTAcvQPxL5RWK5ylZipksBOLs6Rx4q6D5hp77NyGT2Od77Z493S5WFvbwqgLdRI0y9Kx8itAxqZITfihXSA2lowvseb14hQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=siemens.com; dmarc=pass action=none header.from=siemens.com; dkim=pass header.d=siemens.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=siemens.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=j7RKKvqmxadau6ZHeS0586BdQiKxWE/BLG5q8G9Znk8=; b=Tb8juKyMYw3hOgTUJs+GBbqcZmCz0p06tchF7KHU/DNBqjUQ6IYWlPu5WfUm/ECV9/PcMGuzQhKEHAUoBQEugx8I28NIawZ9ho7bbRjZuK3CtwCIunvfkBRFQwFr2hWd/GeLEkXJ5dK5we9pWvnTV+txzkCwQib+RYo5g1pdPcCsBqOXExKGuOn+qhKiMtT8fzHhha3gKPIkeOjJkS+x2B5QsLSxWXKAfUBO0TSnsPc0eZ7K+WLQQVJigYSbdWq4Rw/1Yl6IxISHRCkeyUYtAq5BPsJ3RADeLJcI7xB9/sPtD87v8R/bqB0+yBCf+jXsZG1MMDWT7oyVXK2In2E6FQ==
Received: from DB9PR10MB6354.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:10:3c6::22) by PA2PR10MB8362.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:102:418::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8422.10; Tue, 4 Feb 2025 17:47:48 +0000
Received: from DB9PR10MB6354.EURPRD10.PROD.OUTLOOK.COM ([fe80::634b:e5d0:8c00:762a]) by DB9PR10MB6354.EURPRD10.PROD.OUTLOOK.COM ([fe80::634b:e5d0:8c00:762a%3]) with mapi id 15.20.8422.005; Tue, 4 Feb 2025 17:47:48 +0000
From: "Fries, Steffen" <steffen.fries@siemens.com>
To: Wes Hardaker <wjhns1@hardakers.net>, "draft-ietf-anima-brski-prm.all@ietf.org" <draft-ietf-anima-brski-prm.all@ietf.org>, "secdir@ietf.org" <secdir@ietf.org>, "last-call@ietf.org" <last-call@ietf.org>
Thread-Topic: secdir review of draft-ietf-anima-brski-prm-15
Thread-Index: AQHbdnBKm9eyO4uYak6BCkgCZ/VFmLM2+BpQgAB0eVA=
Date: Tue, 04 Feb 2025 17:47:48 +0000
Message-ID: <DB9PR10MB63545AF86D1071B45C29119FF3F42@DB9PR10MB6354.EURPRD10.PROD.OUTLOOK.COM>
References: <yblr04ej0s6.fsf@wd.hardakers.net> <DB9PR10MB63540ACDCC8FD3749B99126CF3F42@DB9PR10MB6354.EURPRD10.PROD.OUTLOOK.COM>
In-Reply-To: <DB9PR10MB63540ACDCC8FD3749B99126CF3F42@DB9PR10MB6354.EURPRD10.PROD.OUTLOOK.COM>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_9d258917-277f-42cd-a3cd-14c4e9ee58bc_ActionId=6d63db56-62f3-46d5-ae32-268fb6651979;MSIP_Label_9d258917-277f-42cd-a3cd-14c4e9ee58bc_ContentBits=0;MSIP_Label_9d258917-277f-42cd-a3cd-14c4e9ee58bc_Enabled=true;MSIP_Label_9d258917-277f-42cd-a3cd-14c4e9ee58bc_Method=Standard;MSIP_Label_9d258917-277f-42cd-a3cd-14c4e9ee58bc_Name=restricted;MSIP_Label_9d258917-277f-42cd-a3cd-14c4e9ee58bc_SetDate=2025-02-04T10:49:39Z;MSIP_Label_9d258917-277f-42cd-a3cd-14c4e9ee58bc_SiteId=38ae3bcd-9579-4fd4-adda-b42e1495d55a;
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=siemens.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: DB9PR10MB6354:EE_|PA2PR10MB8362:EE_
x-ms-office365-filtering-correlation-id: 84519a78-99c9-47ac-561a-08dd454409f8
x-ms-exchange-atpmessageproperties: SA
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;ARA:13230040|376014|366016|1800799024|38070700018;
x-microsoft-antispam-message-info: 1Am57ELCsklxS8YZW6zOFDFKpbQ6o4HqtxNGzAF94xYRCeF9j/OkQJsE14jS/kN0FOCIe08ciIsSkPnW9cAzGDdCTBgW9DHnzI4F4CwLt1Iax96XAqeRoStz75/5m5T/AkoSHK+0s6eCUAbR7SbK2+M6thhQfENPHOYfp4OLktW93eiwTgqT/VibXXvbrGWTOh+g7BGNSRruniy+SRHGD7C9TAgtIqBsD7htLdpZZbJORmh6uqnTqHK83QHxJBZVO+977dfZzFAOdM31MN4I9vNRxLYxVLZOiaN5s0CtNDALAcxcXzJyTE/ihwhuquxg5ko/nRV+mLPPKhVApeXBzSrkrEhTC8IZFphq7ssiILTPlZ9HnlSXGVzHpzfav17tDRF23qrJCpD1zMDHQUq6ZPSaHHUA6t5e1okkiLx9wjn2WCfpYkZtCJXdog905uWuflrKeyFWDOQilvEaB1IhtWwXBMeaNs/bu+e2IuZKF7op19eTOo0cuo4XeZwyBSw9zBzruXTi7+Tj4ZEWgyIBrgBuvYKu5RX8iUhufZHkMgKeEd+q0cyekdODioI1303Ef6M2J09U8ax0nL37qntAcpBESyFCGUEpZBBYl9GnJRCGXKDHXHrFatqf+dm+hhf12f/UlUlB5Ek5YHSUk377P7POhYwMMBLYJb1CbUCc6XmOEVDUksPkJwDYPQxfZM0qLoQuseL2YAIjhZ6mjVrgB3kuv2S5GmWPyvixgVmuSBdsIvb8RcBaEDpC5oPcnzZLmbx01dlh/L3vTqndCrKOk3kO3FW2vjxtPcm4ICjxjSlmakzC9ss92Bxa2gMoibstrS6abIF/yJ+joyqLg7CHlYZp1CRtSSn/kkYH0csbK/Lnv0ifASXug6cKJu4mkS5sAiBBuvbqb5lMpc5RKRLR2N3u1ZsJbRW9srRl+hELSqS6zxc6QxIffW5v9M4+HU6LbWloqCfGvbZyjl2EYvl+i7x2J13XC2vYcbwvlGKAx34AFwSJzQxuemrcOQZqn7/B7znPgdSWfCKm7fLM2YOrirJ8s32t/cwBGpUDj7w0UGkAMenFY2ADlfvGXYAcbuFSjx8FcfAyYMbQVwLl0XM73yUiD+4kP4jtCTKhDwILf8ZgxYCFXhYibxgfnqUaIpe/xoUgWoD85U1JZfUuAECXyQFx48iTxiyWtKR6PEqMDYbCTMAP31CEc1HVpHoicrxkjB86eLH24kO3lkYsHhFHk3pc6DFNNezs1T0N//sqG3NXeNg0NQaFbEWqFfOYyqfrzX+oV5U9Gu0I9mPNYZpudS3uo1BoT62lIlC/7WT4fxsdph2WHkRCbqXa2OzCfLcacd31vR5IlHAiyDp735OLclQn2b6GPXfDux6dWySH9nP/MCvI/dX1BLb2JbbHRzYm/YvdvMs4/F8MZKP5gLkIzfUebT8fI7+XoHcI4t3c2AJ/HeZpYVjm/7eQ2BbadW49
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DB9PR10MB6354.EURPRD10.PROD.OUTLOOK.COM;PTR:;CAT:NONE;SFS:(13230040)(376014)(366016)(1800799024)(38070700018);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: siemens.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DB9PR10MB6354.EURPRD10.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: 84519a78-99c9-47ac-561a-08dd454409f8
X-MS-Exchange-CrossTenant-originalarrivaltime: 04 Feb 2025 17:47:48.3283 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 38ae3bcd-9579-4fd4-adda-b42e1495d55a
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: S0fGcBexPRPmNJHsrrxy8Q8E4sou7KOwtWs18eJ/oMoxuDZCdxrm9FgDekIujGOLMMD7Hwd1GJ63R5GwS3JPaglzqsMuCwcoJH9AqTmKy8E=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PA2PR10MB8362
Message-ID-Hash: B4WZL3UCQJZTFRGX4W3QDY6DLYWO6KKI
X-Message-ID-Hash: B4WZL3UCQJZTFRGX4W3QDY6DLYWO6KKI
X-MailFrom: steffen.fries@siemens.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-secdir.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [secdir] Re: secdir review of draft-ietf-anima-brski-prm-15
List-Id: Security Area Directorate <secdir.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/soso9rLTYWwm9c3SSW0orIj-a78>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Owner: <mailto:secdir-owner@ietf.org>
List-Post: <mailto:secdir@ietf.org>
List-Subscribe: <mailto:secdir-join@ietf.org>
List-Unsubscribe: <mailto:secdir-leave@ietf.org>
Hello Wes, My email went out without my reaction on your last comment. Here it is: > 14. 8.: It would be good to include types of failures to be logged as well. The list > in section 8 seems to only list positive (successful) telemetry. [stf] Section 8 was enhanced based on review feedback from the AD in version 16, which is after the version you reviewed. This should already cater success and failure situations. Best regards Steffen > -----Original Message----- > From: Fries, Steffen <steffen.fries@siemens.com> > Sent: Tuesday, February 4, 2025 6:43 PM > To: Wes Hardaker <wjhns1@hardakers.net>; draft-ietf-anima-brski- > prm.all@ietf.org; secdir@ietf.org; last-call@ietf.org > Subject: RE: secdir review of draft-ietf-anima-brski-prm-15 > > Hello Wes, > > Thank you for your review. > > We will address the your comments in the next version of the document. I made > some inline comments to the points your raised and also provided suggestions to > be taken over in the next version to address your comments. > > > > -----Original Message----- > > From: Wes Hardaker <wjhns1@hardakers.net> > > Sent: Monday, February 3, 2025 8:17 PM > > To: draft-ietf-anima-brski-prm.all@ietf.org; secdir@ietf.org; > > last-call@ietf.org > > Subject: secdir review of draft-ietf-anima-brski-prm-15 > > > > > > Up top: So I'm in Tero's summary assignment list as being assigned to > > this document, but when I finished the review and went to look at the > > datatracker I see that Charlie Kaufman is actually assigned to it as > > well (as a re-review). So apparently you may get two reviews from the secdir > instead? I'm confused here... > > > > > > I have reviewed this document as part of the security directorate's > > ongoing effort to review all IETF documents being processed by the > > IESG. These comments were written primarily for the benefit of the > > security area directors. Document editors and WG chairs should treat these > comments just like any other last call comments. > > > > A note about my background: I'm very familiar with the DNS and how the > > registry/registar system works, but not familiar with the work of > > anima or the work of the BRSKI framework specifically. > > > > Again, apologies for the delay in this review as January turned out to > > be a very long with both hardware failures and a very nasty human > > virus (and now yesterday an all-day power-outage). > > > > The summary of the review is: ready with a few minor comments/nits > > > > Version reviewed: -15 > > > > Overall: the document is, of course, very lengthy but generally well > > organized and each of the protocol description sections are easy to > > follow. I'll note that the excellent timing diagram in the top of > > section 7 would have been highly helpful to have seen earlier in the > > document in order to help the reader come to terms with the larger > > goal of the protocol. There are wording issues in various places, it > > would be good for the authors to make one last read top-to-bottom for > > clarity purposes. [based on looking at -17 while typing this up, it > > looks like this may have already been done] > [stf] Yes, we tried to further ensure correct terminology usage and provided > further updates. Meanwhile we also addressed further comments and have an > intermediate version in the ANIMA git > > > > > More specific comments: > > > > 1. EST should be expanded on its first use (introduction) > [stf] Thanks, incorporated as suggested > > > > > 2. The terminology specifically section could use some stronger > > definitions. For example "CA: Certification Authority, issues > > certificates." is rather short and although everyone that understands > > what a CA is will already understand it, new readers will not benefit much from > such a short definition. > [stf] Included some further information like maintenance of revocation information > for the CA. In general, we expected the reader to be familiar with most of the > terms as they are already used in base or related specifications like RFC 8995. > > > > > 3. Section 4 starts with "...the following requirements..." but the > > bullets themselves aren't really written as "requirements". > [stf] Yes, true, proposal to rename to "... the following boundary conditions ..." > > > > > 4. Section 5.3: "which may result in undesirable communications > > pattern". It would be helpful to have this negative communication > > pattern better defined for the reader. > [stf] Okay, understood. The intention was to outline that there may be increased > communication during the onboarding in BRSKI depending on the number of > pledges onboarding simultaneously > OLD: > In [RFC8995], pledges instead need to continuously request enrollment from a > domain registrar, which may result in undesirable communications pattern and > possible overload of a domain registrar. > NEW: > In [RFC8995], pledges instead need to continuously interact with the domain > registrar during onboarding, through discovery, voucher exchange, and > enrollment. This may increase the load on the domain registrar, specifically, if a > larger number of pledges onboards simultaneously. > > > > > 5. Similarly, in 6.1 "it is RECOMMENDED to use short lived > > Registrar-Agent EE certificates", but no where does it discuss why. > > Without a background behind statements like this, you risk that the > > reader will ignore the recommendation if they can't see the security reasoning > behind it. > [stf] Proposal to Include > "This is to address the assumed nature of stand-alone Registrar-Agents as > nomadic devices (see section 5.2) and to avoid potential misuse as outlined in in > Section 12.3." > This provides some reasoning upfront and points to the security consideration > section handling that case. > > > > > 6. The document talks about security (potentially many) devices of > > various types as they begin operation, but no where does it enumerate > > the issues with devices that have been on the shelf for a long time > > before power-on and discuss the ramifications of trust anchors within them that > may be stale. > [stf] BRSKI-PRM (s BRSKI) build upon IDevIDs (including the trust anchors) > provided during manufacturing. The expectation on IDevID certificates is that they > typically have a validity period in the area of the lifetime of the product. They are > only used to bootstrap operational certificates (LDevID certificates) with a much > shorter lifetime. But yes, if they are taken out of operation and reapplied without > proper re-onboarding, they may fail. > I propose to provide a statement in Section 9, Operational considerations (was > introduced in version 16) to address this: > "BRSKI-PRM requires pledges to possess an IDevID to enable onboarding in new > domains. IDevID (and corresponding trust anchors) are expected to have a rather > long lifetime. This may allow for a longer period between device acquisition and > initial onboarding. Contrary, if devices that have been provided with an LDevID > (and corresponding trust anchors) and temporarily taken out of service, immediate > connectivity when bringing them back to operation may not be given, as the > LDevIDs typically have a much shorter validity period compared to IDevIDs. It is > therefore recommended to onboard them as new devices to ensure they possess > valid LDevIDs." > > > > > 7. In many places (mostly in section 7) it states that TLS is optional > > as object security properly secures the actual underlying data > > (objects) being transferred around, which makes sense. However, TLS > > is referenced as being helpful to provide privacy for the exchange > > (eg. section 7.1 (and 7.2 and ...) "TLS MAY be used..."). But that's > > not the only goal of a transport security: it can also assure you're > > talking to the end-entity you believed you were attempting to > > establish a connection with. End-point verification may be a useful feature worth > spelling out in these sentences as well. > [stf] Proposal to include this in section 7.1 OLD > Optionally, TLS MAY be used to provide privacy for this exchange > between the Registrar-Agent and the pledge (see Appendix B). > NEW > Optionally, TLS MAY be used to provide transport security, e.g., privacy > and peer authentication, for the exchange between the Registrar-Agent and the > pledge (see Appendix B). > > > > > 8. In some places (eg 7.1 again) the document states that the Accept > > field SHOULD be set to application/voucher-jws+json, but doesn't ever > > really say whether or not the receiving party MAY choose to accept a > > connection from an entity that doesn't have an Accept field and simply > > assume this. There is an error for what happens when you refuse to, > > but no flip side of can the connection receiver just make assumptions in > absence of information. > [stf] Good point! > Included: > - "If the Accept header was not provided in the PVR, the pledge assumes that the > accepted response format is application/voucher-jws+json and proceeds > processing." into section 7.1 > - "If the Accept header was not provided in the PER, the pledge assumes that the > accepted response format is `application/voucher-jws+json` and proceeds > processing. " into section 7.2 > > > > > 9. I think the clock drift situations in 7.2.2.3 a bit understate the > > problem. Clock drift without connections always has rather bad drift > > accuracy issues without a highly accurate clock source available to them. > [stf] The note was intended as a hint. Is there anything we could provide in > addition? > > > > > 10. I'd like to have a better mime-type string than starting with > > "voucher" that was ideally more specific to the voucher this > > particular system is using. Voucher is generic but this use case is > > just to this protocol/application type, and thus I'd expect/prefer > > brski-voucher-jws or something. But I recognize this is really a > > point for a different document, however, and likely already fairly well set in stone > and monopolized the more generic "voucher" term. > [stf] yes, true, we synchronized the naming with the existing BRSKI and voucher > RFCs. > > > > 11. 7.3.5 and example in figure 22: it would be good if this figure > > contained the agent-proximity string too. > [stf] Hm, it was already contained in version 15 and is still available in the last > version (17) > > > > > 12. 7.7 "The pledge MAY use the response body to signal > > success/failure details to the service technician operating the > > Registrar-Agent." -- it might be helpful to suggest that such > > information be returned as JSON or some other expected structure. As is, any > form could be returned? > [stf] Currently, we did not state it explicitly, but since the communication uses > JSON already it would be good to provide the suggestion regarding the format > directly. > Proposal to add the following: > "While BRSKI-PRM does not specify which content may be provided in the > response body, it is recommended to provided the content as JSON encoded > information as other BRSKI-PRM exchanges also utilize this encoding". > > > > > 13. 7.11.1.1: "SHOULD log the contents and alert a human." -- I'd > > argue that alerting a human is always an impossible task (or more > > specifically, there is no way a for a device to know whether it's > > alerting another system or a life form). How about "SHOULD log the contents > and emit an operational notification"? > [stf] Good suggestion. Took the suggested text directly over into the draft
- [secdir] secdir review of draft-ietf-anima-brski-… Wes Hardaker
- [secdir] Re: secdir review of draft-ietf-anima-br… Fries, Steffen
- [secdir] Re: secdir review of draft-ietf-anima-br… Fries, Steffen