Re: [Drip] Roman Danyliw's Discuss on draft-ietf-drip-reqs-16: (with DISCUSS and COMMENT)

"Eric Vyncke (evyncke)" <evyncke@cisco.com> Wed, 28 July 2021 15:11 UTC

Return-Path: <evyncke@cisco.com>
X-Original-To: tm-rid@ietfa.amsl.com
Delivered-To: tm-rid@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4A57B3A147C for <tm-rid@ietfa.amsl.com>; Wed, 28 Jul 2021 08:11:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.594
X-Spam-Level:
X-Spam-Status: No, score=-9.594 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=i+wnd1Dm; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=zJFrJ7+l
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UTXEG6sxO31U for <tm-rid@ietfa.amsl.com>; Wed, 28 Jul 2021 08:10:56 -0700 (PDT)
Received: from alln-iport-5.cisco.com (alln-iport-5.cisco.com [173.37.142.92]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 671BA3A1471 for <tm-rid@ietf.org>; Wed, 28 Jul 2021 08:10:56 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=68583; q=dns/txt; s=iport; t=1627485056; x=1628694656; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=int4h1r1+EpF4XOXUhiNUaRKyG22M0LAJVD46j29ako=; b=i+wnd1DmT1BS4G9ulxDXMiQ6kQ1/c6SY8zgu3IHsIf3ZucDB56BCevS5 hWomJcweJYEBYDNZ0bV73CIFfUHqfSVr1c4o4o3w+4YnY48U5G28vpify Dl7yDDA6/hUwqY5zzjbBBHqY5gE67R3DMxO/uyDFFAShJDH/hg18JAO1c Q=;
X-IPAS-Result: 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
IronPort-PHdr: A9a23:ZcIHSx1Jn8Pr7gJJsmDPQ1BlVkEcU/3cNx4Y7IYqkapUc7auuZ/lO R+X6fZsiQrPWoPWo7JBhvHNuq/tEWoH/d6asX8EfZANMn1NicgfkwE6RsLQD0r9Ia3jfyE8A MlYTEVk7Xz9Ok9QS47yYlTIqSi06jgfUhz0KQtyILHzHYjfx8S63uy/4dvdeQJN0TG8erh1a h6xqFa5iw==
IronPort-HdrOrdr: A9a23:7bPib6FncQJ0IZ8cpLqFsZLXdLJyesId70hD6qkvc31om52j+f xGws516fatskdvZJkh8erwX5VoMkmsi6KdgLNhfYtKOTOHhILGFvAY0WKP+UyEJ8S6zJ8g6U 4CSdk8NDSTNykBsS+S2mDReLxMrKjlgcKVbKXlvgpQpGpRGsddBnJCe36m+zpNNXB77PQCZf 6hz/sCgwDlVWUcb8y9CHVAdfPEvcf3mJXvZgNDLwI76SGV5AnYqoLSIly95FMzQjlPybAt/S zuiAri/JiutPm911v1y3LT1ZJLg9Hso+EzQfBky/JlbgkEuDzYIriJaIfy5QzdZ9vfsGrCpe O85CvI+f4DsE85MFvF+ycFkDOQoQrGo0WSuWNwx0GT/PAQgFkBepV8bUUzSGqE16NohqAP7E oAtVjpxKZ/HFfOmj/w6MPPUAwvnk2ooWA6mepWlHBHV5ACAYUh4bD30XklWqvoJhiKpbzP0d Meev309bJTaxeXfnrZtm5gzJilWWkyBA6PRgwHttaO2zZbkXhlxw9ArfZv0Eso5dY4Ud1J9u 7EOqNnmPVHSdIXd7t0AKMETdGsAmLATBrQOCaZIEjhFqsAJ3XRwqSHr4kd9aWvYtgF3ZEykJ POXBdRsnMzYVvnDYmU0JhC4nn2MS6AtPTWu4ljDr1Cy/zBrZbQQFm+oWEV4oKdSq8kc7jmst 6ISeVrP8M=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.84,276,1620691200"; d="scan'208,217";a="750657295"
Received: from rcdn-core-11.cisco.com ([173.37.93.147]) by alln-iport-5.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 28 Jul 2021 15:10:54 +0000
Received: from mail.cisco.com (xbe-rcd-001.cisco.com [173.37.102.16]) by rcdn-core-11.cisco.com (8.15.2/8.15.2) with ESMTPS id 16SFAskR028887 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Wed, 28 Jul 2021 15:10:54 GMT
Received: from xfe-rtp-003.cisco.com (64.101.210.233) by xbe-rcd-001.cisco.com (173.37.102.16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.15; Wed, 28 Jul 2021 10:10:54 -0500
Received: from xfe-rtp-001.cisco.com (64.101.210.231) by xfe-rtp-003.cisco.com (64.101.210.233) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.15; Wed, 28 Jul 2021 11:10:53 -0400
Received: from NAM10-DM6-obe.outbound.protection.outlook.com (64.101.32.56) by xfe-rtp-001.cisco.com (64.101.210.231) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.15 via Frontend Transport; Wed, 28 Jul 2021 11:10:52 -0400
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=caM4zLjDmKeRLRkbKQP3hGKcqtpGOWzW4XIgAP1BZ+7YE9NgITMvE8xXJH3Y725eLrcv3G1wU6lc1kiuP5NKPZtHOKddCDu0YlTwmACSes98ky0KJkHSmVYu96I+5Fv4b/LeMkXfoCsWnlLmE3VQap448mqx9JmZ5y7avWxqt0rmz/4fJaVfzy1NZUa0NgaLH30IDoTn+wXniYSWsbtyg5ANbMoVOlF01AZF5VUpn6SfC0sssXYEm7HMOHWvMs5okGQ9BsDUkIPhhyywuhREitTrNwWsMDwKFmdOZEv3IOZOp8jfFr5xK8RqQKf41lakt1HghgovUq+f5L3OAo/h8g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=int4h1r1+EpF4XOXUhiNUaRKyG22M0LAJVD46j29ako=; b=X4XMVPqaR5DuhzXFJD4YnsLe8deMq6wQ5t+nlKw4QWV9tgV+ZbzWnzeil6g0Amwcce2MT3cs39pqtC4QEVLVIDiit7z/gfHvSAZB0Tnt8RLgxpq2dLBhz+qQIDUGcX0a1QqO+k/H+YS7gQ3POaCuw6uSFEEpp2x2dOE4E8KQnHYn+Hl4eAcDLC45J4NFc+IEozV9L54ghjc6R6/Xq8VwWl1PJQmThlB3XVy02TCghUO9605xeEs193A+5qqzkpUo23RstKCn4zoAwOpm8Vygi1DUW0faf6vRDXxuWwp0STsNnlwJPJJoo73DLBfW4l9TivWTYlZ1497cPfsTyjgBvw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=int4h1r1+EpF4XOXUhiNUaRKyG22M0LAJVD46j29ako=; b=zJFrJ7+l7j77+Z4MuVmPxL/i/wdf2acVuB8ddRJg5lQHk8dwl4/rOeWYa7DWkdlgwSI8sFLhKvVWQlDhOMghsCeqcl/WtSwo3NRYu27+f10i07J3JbnoEdRycv5OTrLEa5zGIcImYvT2qumYd07NfMzLweJD4NDAR3FSHRSXibw=
Received: from PH0PR11MB4966.namprd11.prod.outlook.com (2603:10b6:510:42::21) by PH0PR11MB5078.namprd11.prod.outlook.com (2603:10b6:510:3e::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4352.26; Wed, 28 Jul 2021 15:10:51 +0000
Received: from PH0PR11MB4966.namprd11.prod.outlook.com ([fe80::6d61:c160:def1:bc64]) by PH0PR11MB4966.namprd11.prod.outlook.com ([fe80::6d61:c160:def1:bc64%3]) with mapi id 15.20.4352.031; Wed, 28 Jul 2021 15:10:51 +0000
From: "Eric Vyncke (evyncke)" <evyncke@cisco.com>
To: "Card, Stu" <stu.card@axenterprize.com>, Roman Danyliw <rdd@cert.org>
CC: "tm-rid@ietf.org" <tm-rid@ietf.org>, "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>
Thread-Topic: [Drip] Roman Danyliw's Discuss on draft-ietf-drip-reqs-16: (with DISCUSS and COMMENT)
Thread-Index: AQHXgj7lf3/hbytqrEqO05e6x6K/l6tYUjmAgAAIIgCAAEguAA==
Date: Wed, 28 Jul 2021 15:10:51 +0000
Message-ID: <41C0C7E8-FB22-4CA5-A88A-551F8EA640EE@cisco.com>
References: <162500226350.20277.3425760103313654357@ietfa.amsl.com> <bd8d0024-3a9b-2784-8d12-9644edf875af@axenterprize.com> <BN3P110MB05294CF9EE3C611990543C90DCE59@BN3P110MB0529.NAMP110.PROD.OUTLOOK.COM> <CAKM0pYOdUTfuG2b7Ro1Ce7iUYDypTQ1i_g+CtZNJDFBFDV_9dw@mail.gmail.com> <CAKM0pYPv0+ekffDDastk2N_XZ3UcQmd+nWT6B9WQYepGuM95MQ@mail.gmail.com> <DM3P110MB05389ED98D1061591F8099B5DCEA9@DM3P110MB0538.NAMP110.PROD.OUTLOOK.COM> <CAKM0pYP6pv9=r_X7D0Wu+gX7DPgoAw0_yp95-Gu7fgUycZ9dMw@mail.gmail.com>
In-Reply-To: <CAKM0pYP6pv9=r_X7D0Wu+gX7DPgoAw0_yp95-Gu7fgUycZ9dMw@mail.gmail.com>
Accept-Language: fr-BE, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.51.21071101
authentication-results: axenterprize.com; dkim=none (message not signed) header.d=none; axenterprize.com; dmarc=none action=none header.from=cisco.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: af2852af-27e4-4122-3090-08d951d9e392
x-ms-traffictypediagnostic: PH0PR11MB5078:
x-microsoft-antispam-prvs: <PH0PR11MB5078460649DDE0E1C941A8C3A9EA9@PH0PR11MB5078.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:8273;
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:PH0PR11MB4966.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(396003)(346002)(39860400002)(366004)(376002)(136003)(2906002)(33656002)(4326008)(6512007)(71200400001)(86362001)(5660300002)(166002)(54906003)(110136005)(316002)(8676002)(36756003)(8936002)(6486002)(30864003)(66574015)(83380400001)(478600001)(122000001)(186003)(66946007)(966005)(38100700002)(91956017)(76116006)(2616005)(53546011)(64756008)(66446008)(6506007)(38070700005)(66476007)(66556008)(45980500001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_41C0C7E8FB224CA5A88A551F8EA640EEciscocom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: PH0PR11MB4966.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: af2852af-27e4-4122-3090-08d951d9e392
X-MS-Exchange-CrossTenant-originalarrivaltime: 28 Jul 2021 15:10:51.5605 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: vu/8csYnFYePMrp/Ub7v/5ChGZd+kmSJlO/0jyEhYSrDEIC/cqM2w/La0lEeNPSzijFCRbDmNG/QhPdUTCgIIg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH0PR11MB5078
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.16, xbe-rcd-001.cisco.com
X-Outbound-Node: rcdn-core-11.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/tm-rid/76pdtBezExChd2NlZHR9AiYmZK4>
Subject: Re: [Drip] Roman Danyliw's Discuss on draft-ietf-drip-reqs-16: (with DISCUSS and COMMENT)
X-BeenThere: tm-rid@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Drone Remote Identification Protocol <tm-rid.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tm-rid>, <mailto:tm-rid-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tm-rid/>
List-Post: <mailto:tm-rid@ietf.org>
List-Help: <mailto:tm-rid-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tm-rid>, <mailto:tm-rid-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 Jul 2021 15:11:03 -0000

Romand and Stu

As I am obviously participating to the DRIP WG meeting and have a ‘private’ channel with Roman, then I will ping Roman when drip-reqs is discussed and if Roman is available, then I am sure that he will join :-)

Thank you all for being SO cooperative: the IETF spirit !

-éric

From: Tm-rid <tm-rid-bounces@ietf.org> on behalf of "Card, Stu" <stu.card@axenterprize.com>
Date: Wednesday, 28 July 2021 at 14:53
To: Roman Danyliw <rdd@cert.org>
Cc: "tm-rid@ietf.org" <tm-rid@ietf.org>, "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, Eric Vyncke <evyncke@cisco.com>
Subject: Re: [Drip] Roman Danyliw's Discuss on draft-ietf-drip-reqs-16: (with DISCUSS and COMMENT)

Roman --

I must defer to our WG chairs on agenda, but considering the importance of getting our requirements published (to guide our solution efforts & give ASTM, ICAO et al a doc to cite), I would think we would accomodate your joining us whenever you can take a few minutes to express your critical concerns with the draft. Thanks.

-- Stu

On Wed, Jul 28, 2021, 07:23 Roman Danyliw <rdd@cert.org<mailto:rdd@cert.org>> wrote:
Hi Stu!

Sure.  I’m double booked during the DRIP meeting session today, but can step out and join the WG if there is a more precise time window.  When would be a good time (inside the Session II time window?

Roman

From: Card, Stu <stu.card@axenterprize.com<mailto:stu.card@axenterprize.com>>
Sent: Monday, July 26, 2021 12:54 PM
To: Roman Danyliw <rdd@cert.org<mailto:rdd@cert.org>>
Cc: tm-rid@ietf.org<mailto:tm-rid@ietf.org>; mohamed.boucadair@orange.com<mailto:mohamed.boucadair@orange.com>; Eric Vyncke (evyncke) <evyncke@cisco.com<mailto:evyncke@cisco.com>>
Subject: Re: Roman Danyliw's Discuss on draft-ietf-drip-reqs-16: (with DISCUSS and COMMENT)

Roman --

If you are available to join our DRIP session this Wednesday, you would be most welcome, as your DISCUSS is one of three pressing issues we currently have, and I do not wish to misrepresent your position. Thanks!

-- Stu

On Fri, Jul 23, 2021 at 5:49 PM Card, Stu <stu.card@axenterprize.com<mailto:stu.card@axenterprize.com>> wrote:
Roman et al --

What we mean is:

1) In any connectivity scenario where it is possible to satisfy the MUST requirements, they are indeed MUST requirements on the DRIP protocols themselves.

2) Scenarios will often arise where lower layer connectivity does not support the DRIP protocols fully accomplishing our goals. TCP does not provide reliable in-order stream delivery in cases where the only link goes down before the connection can be started, or goes down and stays down after connection establishment; TCP MUST requirements are not relaxed to SHOULD just because of this. DRIP is no different.

We merely highlight that UAS connectivity is highly variable, so DRIP protocols should (lower case) be designed with this in mind: to meet the requirements at all times & in all places where it would be possible for any protocol in those layers on those nodes to do so; and to be robust to the vagaries intrinsic to the environment.

I am very comfortable revising Section 6.

I am very uncomfortable weakening the numbered requirements, as that would let implementors off the hook for things that really are MUST for the DRIP protocols (when underlying connectivity permits). Also changing numbered requirements is not something I as editor really should do without concurrence of the DRIP WG, whose prior consensus was that these were MUST.

I am very open to text changes that clarify the intent without absolving implementors of meeting it.

Thanks for your consideration of all this.

On Fri, Jul 23, 2021, 16:39 Roman Danyliw <rdd@cert.org<mailto:rdd@cert.org>> wrote:
Hi Stu!

Focusing on the DISCUSS only, please see inline ...

> -----Original Message-----
> From: Stuart W. Card <stu.card@axenterprize.com<mailto:stu.card@axenterprize.com>>
> Sent: Thursday, July 1, 2021 3:44 AM
> To: Roman Danyliw <rdd@cert.org<mailto:rdd@cert.org>>; The IESG <iesg@ietf.org<mailto:iesg@ietf.org>>
> Cc: draft-ietf-drip-reqs@ietf.org<mailto:draft-ietf-drip-reqs@ietf.org>; drip-chairs@ietf.org<mailto:drip-chairs@ietf.org>; tm-rid@ietf.org<mailto:tm-rid@ietf.org>;
> mohamed.boucadair@orange.com<mailto:mohamed.boucadair@orange.com>
> Subject: Re: Roman Danyliw's Discuss on draft-ietf-drip-reqs-16: (with DISCUSS
> and COMMENT)
>
> On 6/29/2021 5:31 PM, Roman Danyliw via Datatracker wrote:
> > Roman Danyliw has entered the following ballot position for
> > draft-ietf-drip-reqs-16: Discuss
> > ...
> > The document, along with other ballot positions, can be found here:
> > https://datatracker.ietf.org/doc/draft-ietf-drip-reqs/
> > ...
> Roman et al --
>
> Thanks again for the careful review. Rather than intersperse my responses in an
> email client direct quote of your message, for clarity, I exported it, trimmed it
> down, inserted my words, attributed your and my words explicitly to their
> respective authors, and then pasted it back in below.
>
>
> ----------------------------------------------------------------------
> DISCUSS:
> ----------------------------------------------------------------------
>
>
> ** Section 6.
>
> <rd>
> Thanks for enumerating these highly desirable security properties as part of
> DRIP.  A bit more clarifying language is needed to explain which
> communication paths in the DRIP architecture (Figure 3 and 4) have these
> properties and under what circumstances.  Section 4.1 and 4.2 seem specific to
> properties between particular parties or messages. Likewise, subsequent text in
> this section such as “… there may be caveats on the extent to which
> requirements can be satisfied…” seems to suggest these are not universal
> across the architecture.
> </rd>
>
> <swc>
> Right. I await the Document Shepherd's approval to upload my proposed
> revision 17, in which I have revised some of the text in Section 1.1 explaining
> Figure 1 (and correspondingly some text in Section 3.1 explaining Figure 3) as
> follows --
>
>   Note the absence of any links to/from the UA in the figure; this is
>   because UAS RID and other connectivity involving the UA varies.
>   Some connectivity paths do or do not exist depending upon the
>   scenario. Command and Control (C2) from the GCS to the UA via the
>   Internet (e.g., using LTE cellular) is expected to become much more
>   common as Beyond Visual Line Of Sight (BVLOS) operations increase;
>   in such a case, there is typically not also a direct wireless link
>   between the GCS and UA. Conversely, if C2 is running over a direct
>   wireless link, then typically the GCS has but the UA lacks Internet
>   connectivity. Further, paths that nominally exist, such as between
>   an Observer device and the Internet, may be severely intermittent.
>   These connectivity constraints are likely to have an impact, e.g.,
>   on how reliably DRIP requirements can be satisfied.
>
> With this caveat, our intention is to provide the desired properties, as specified
> by the numbered requirements in Section 4, wherever and whenever possible.
> With respect especially but not exclusively to Figure 4, GEN-1 and GEN-3 both
> explicitly demand "even on an Observer device lacking Internet connectivity at
> the time of observation."
> </swc>

Thanks for the revised -17 and the additional specificity it provides.  I'm still having difficulty reconciling what in fact is mandatory and which security properties DRIP is mandating.

(a) Section 4.1 and 4.2 makes normative (MUST-level ) requirements about security properties.  No concerns with these firm requirements.

(b) Section 6 appears to summarize these requirements into general principles.  Certainly more precise could be applied, but that's not my primary concern.

Despite these stated requirements, there is text that appears to caveat the mandatory nature of the "MUST"/"must" used in Sections 4.1, 4.2 and 6.   For example:

(c) Section 1.1. "These connectivity constraints are likely to have an impact, e.g., on how reliably DRIP requirements can be satisfied."

(d) Section 6. "Thus there may be caveats on the extent to which requirements can be satisfied in such cases, yet strenuous effort should be made to satisfy them, as such cases, e.g., firefighting in
   a national forest, are important."

The flexibility of (c) and (d) makes sense.  However, as a matter of consistency, if (c) and (d) are true, then the "MUSTs" in (a) and (b) are in fact "SHOULDs" because there are anticipated cases where these requirements are will not or cannot be satisfied (and that's intentional).

Put into narrative form:

-- In Section 6:

OLD:
It may be inferred from the general requirements (Section 4.1) for
   provable ownership, provable binding, and provable registration,
   together with the identifier requirements (Section 4.2), that DRIP
   must provide:

<list of properties>

NEW

It may be inferred from the general requirements (Section 4.1) for
   provable ownership, provable binding, and provable registration,
   together with the identifier requirements (Section 4.2), that DRIP
   aspires to provide:

<list of properties>

Particular use cases, operational conditions or deployment architecture patterns may prevent these security properties from being present.

-- Certain requirements of Section 4.* are ) s/MUST/SHOULD/

Regards,
Roman


>
> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
>
>
> ** Abstract. "Complementing external technical standards as regulator-
> accepted means of compliance with UAS RID regulations..."
>
> <rd>
> I had trouble parsing this sentence.  Is it saying that DRIP is a complementing
> way to comply with UAS RID regulations?  Have “regulators”
> confirmed that compliance with DRIP satisfies “UAS RID regulations”?
> </rd>
>
> <swc>
> Regulators such as the FAA won't confirm anything about DRIP until we have
> published RFCs. However, FAA is collaborating with ASTM, and has expressed
> interest in DRIP solutions to some problems not being addressed by ASTM,
> especially how to issue single use Session IDs such that the FAA (only) can look
> up other information from them. I would prefer to keep the abstract very
> concise. Could this be addressed elsewhere in the document, if it needs to be
> addressed therein at all, rather than just in this email reply?
> </swc>
>
>
> ** Section 1.1.
>
> <rd> Is there a reference for IEEE 802.11 Beacon modes? </rd>
>
> <swc>
> IEEE 802.11 Beacon is a last minute addition to this draft, based on current
> ASTM work revising F3411 (which formerly required WiFi NAN) and recent EU
> standards actions. I stuck it in, without figuring out where, in the thousands of
> pages of IEEE 802.11 docs, I should cite something.
> Maybe someone more familiar with those could suggest a reference?
> </swc>
>
>
> ** Section 1.1.  Editorial.
>
> <rd>
> s/to authorities; enable authorities/to authorities; and enable authorities/
> </rd>
>
> <swc>
> Thanks for catching this! The grammar checking software didn't. Arghh!
> Usually my grammar is pretty good. I will fix it.
> </swc>
>
>
> ** Section 4.1.1.  GEN-2 and GEN-3.
>
> <rd>
> Since the name of the requirement is
> “provable binding” and “provable registration”, should the corresponding text
> convey the equivalently strong language.  For example:
>
> GEN-2
> s/MUST enable binding all/MUST enable the cryptographic binding of all/
>
> GEN-3
> s/MUST enable verification/MUST enable cryptographically-secure verification/
> </rd>
>
> <swc>
> I agree! I would be glad so to change the text of these two numbered
> requirements, if no one objects to my doing so?
> </swc>
>
>
> ** Section 4.1.1.
>
> <rd>
> Per Gen-6, it would be helpful to more clearly state the pair wise
> communications that will be secured.
> </rd>
>
> <swc>
> GEN-6 enumerates the endpoints _to which_ communications must be able to
> be established, but fails to specify any endpoints _from which_ they must be
> able to be initiated. This was intentional, as any party that obtains the UAS ID
> should be able to _request_ such establishment, yet only authorized parties
> ("with AAA") should be able to actually get it.
> So it is neither all nor only direct Observers. I would be glad to clarify this in
> 4.1.2 Rationale?
> </swc>
>
>
> ** Section 4.2.2.
>
> <rd>
> Per “In Network RID, it would be used by the application running over HTTPS
> (and possibly other protocols)”, to be clear, is HTTPS a requirement?
> </rd>
>
> <swc>
> ASTM F3411 specifies various HTTP methods for the interfaces among Network
> RID Service Providers (SP), Display Providers (DP) and the Discovery and
> Synchronization Service (DSS). It also specifies industry standard authentication
> and 128 bit or stronger encryption, but does not explicitly specify HTTPS, TLS or
> SSL. It implies but does not specify likewise for the DP to client interface. All
> implementations tested in FAA's UTM Pilot Project 2 used HTTPS. All this said
> as UAS RID context, HTTPS is not specifically a DRIP requirement. How much of
> this should be added to 4.2.2 Rationale?
> </swc>
>
>
> ** Section 4.3.1.
>
> <rd>
> Is there a clear definition somewhere of
> (a) private information; and
> (b) safety critical information?
> </rd>
>
> <swc>
> (a) Regulatory definitions vary by jurisdiction. In PRIV-1, DRIP defines private
> information very broadly as: "any and all information designated by neither
> cognizant authority nor the information owner as public". In the US, the FAA
> has specified that all the UAS RID information elements they require be
> broadcast for rule compliance are public and must be transmitted in cleartext.
> However, ASTM F3411 specifies the broadcast of additional information
> elements, not required by the FAA rule, which thus could be considered private
> (and eligible for encryption), if the UAS operator does not choose to disclose
> them publicly. Definition of private information is not really up to the DRIP WG,
> so however it may be defined in a given context, PRIV-4 states "DRIP SHOULD
> facilitate designation, by cognizant authorities and information owners, of
> which information is public and which is private". Also, we hope that a DRIP
> demonstration of effective means of maintaining operator privacy while
> ensuring that duly authorized parties can recover plaintext might encourage
> FAA and other regulators to allow selective encryption.
>
> (b) Safety critical information in UAS RID is not defined explicitly anywhere to
> the best of the authors' knowledge. It is implied by the FAA rule that the
> pilot/GCS location is safety critical: but this likely is due to neither the FAA rule
> nor the ASTM F3411 standard making provision for an Observer to contact the
> pilot in any manner other than physically going to the pilot's location; whereas
> DRIP GEN-6 Contact requires this.
> EU regulations seem to imply that even the operator's identity is safety critical,
> but if a policeman could read from an auto license plate the name of the
> registered owner of the car, it is not apparent how that could help him prevent
> an auto accident. Again, it is hoped that a DRIP demonstration of how privacy,
> safety and accountability can all be accomodated may lead to relaxation of
> privacy unfriendly regulations.
>
> How much of the above discussion merely needs to be archived as part of our
> IETF process, and how much needs to be added to 4.3.1 Rationale?
> </swc>
>
>
> ** Section 4.3.1.  PRIV-2.
>
> <rd>
> How would DRIP “know” that the local Observers are unlikely to be to be able
> to decrypt the information?
> </rd>
>
> <swc>
> If the UAS is not participating in UTM, an Observer would have no means of
> obtaining a decryption key or decryption services from a cognizant USS. If the
> UAS is participating in UTM, but has lost connectivity with its USS, then an
> Observer within visual LOS of the UA is also unlikely to be able to communicate
> with that USS (whether due to the USS being offline or the UAS and Observer
> being in an area with poor Internet connectivity). Either of these conditions
> (UTM non-participation or USS
> unreachability) would be known to the UAS. The possibility always exists that
> the Observer has lost Internet access despite being near a UAS with such
> access, but the possibility of a policeman being unable to get a forced entry
> warrant quickly due to a flat tire on the way to see a judge does not justify
> prohibiting locks on house doors. ;-) Would providing these examples, in 4.3.2
> Rationale, of how the UAS could reasonably assess that local Observers would
> be unlikely to be able to recover plaintext, suffice?
> </swc>
>
>
> ** Section 4.4.1.
>
> <rd>
> REG-2 makes a point of enforcing AAA but REG-1 explicitly states “MUST NOT
> restrict access to this information based on identity or role of the party
> submitting the query”.  Would this normative MUST per REG-1 rule out denial
> of service mitigation (e.g., rate limited high volume queries from an IP address)
> or attempts to scrape the entire database?
> </rd>
>
> <swc>
> The intent was to ensure that no member of the public would be hindered from
> accessing public information, while only duly authorized parties would be
> enabled to access private information. Mitigation of DoS and refusal to allow
> database scraping would be based on those behaviors, not on identity or role of
> the party submitting the query _per se_.
> These might be part of the information gathered on the misbehavior.
> Would adding this explanatory text to 4.4.2 Rationale suffice?
> </swc>
>
>
> ** Section 4.4.1.  REG-3.
>
> <rd> What is “Internet direct contact information”? </rd>
>
> <swc>
> A locator (e.g., IP address), or identifier (e.g., FQDN) that can be resolved to a
> locator, which would enable initiation of an end-to-end communication session
> using a well known protocol (e.g., SIP). Would adding this explanatory text to
> 4.4.2 Rationale suffice?
> </swc>
>
>
> --
> -----------------------------------------
> Stuart W. Card, PhD, Principal Engineer
> AX Enterprize, LLC  www.axenterprize.com<http://www.axenterprize.com>
> 4947 Commercial Drive, Yorkville NY 13495