[Sidrops] Alexey Melnikov's No Objection on draft-ietf-sidrops-https-tal-07: (with COMMENT)
Alexey Melnikov via Datatracker <firstname.lastname@example.org> Wed, 10 April 2019 17:40 UTC
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id ECB421200EB; Wed, 10 Apr 2019 10:40:33 -0700 (PDT)
Content-Type: text/plain; charset="utf-8"
From: Alexey Melnikov via Datatracker <email@example.com>
To: "The IESG" <firstname.lastname@example.org>
Cc: email@example.com, Chris Morrow <firstname.lastname@example.org>, email@example.com, firstname.lastname@example.org, email@example.com
Reply-To: Alexey Melnikov <firstname.lastname@example.org>
Date: Wed, 10 Apr 2019 10:40:33 -0700
Subject: [Sidrops] Alexey Melnikov's No Objection on draft-ietf-sidrops-https-tal-07: (with COMMENT)
List-Id: A list for the SIDR Operations WG <sidrops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidrops>, <mailto:email@example.com?subject=unsubscribe>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidrops>, <mailto:firstname.lastname@example.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Apr 2019 17:40:34 -0000
Alexey Melnikov has entered the following ballot position for draft-ietf-sidrops-https-tal-07: No Objection When responding, please keep the subject line intact and reply to all email addresses included in the To and CC lines. (Feel free to cut this introductory paragraph, however.) Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html for more information about IESG DISCUSS and COMMENT positions. The document, along with other ballot positions, can be found here: https://datatracker.ietf.org/doc/draft-ietf-sidrops-https-tal/ ---------------------------------------------------------------------- COMMENT: ---------------------------------------------------------------------- Thank you for this well written document. I have a few relatively minor comments (and questions) which I think you should address: 1. Introduction This document obsoletes [RFC7730] by adding support for HTTPS URIs in a TAL. If this document obsoletes RFC 7730, then I think you need to have "Changes since RFC 7730" section (Is this a BIS document?). If it only updates it, then the above (and the obsolete header at the top of the draft) is not correct. 2.2. Trust Anchor Locator File Format In this document we define a Trust Anchor URI as a URI that can be used to retrieved a current Trust Anchor certificate. This URI MUST be either an rsync URI [RFC5781], or an HTTPS URI [RFC7230]. I think the first mention of URI still needs a reference to RFC 3986. The TAL is an ordered sequence of: 1. an optional comment section consisting of one or more lines each starting with the '#' character, followed by human readable informational UTF-8 text, and ending with a line break, Unless you think you want to use ASCII and Unicode Control characters in this field, I think you should recommend usage of RFC 5198 here. 2.3. TAL and Trust Anchor Certificate Considerations The trust anchor MUST contain a stable key. This key MUST NOT change How does "MUST contain a stable key" differ from "key MUST NOT change"? when the certificate is reissued due to changes in the INR extension(s), when the certificate is renewed prior to expiration, or for any reason other than a key change. This reads funny: “you must not change the key unless you decide to change the key”. Maybe talk about key compromise and key strength no longer being adequate instead? 4. HTTPS Considerations o This protocol does not require the use of SRV-IDs. o This protocol does not require the use of URI-IDs. I suspect this was copied from another RFC, but "does not require" is not right here, as it doesn't prevent it as an option. I think you should change "does not require the use" to "does not use"
- [Sidrops] Alexey Melnikov's No Objection on draft… Alexey Melnikov via Datatracker