[Drip] AD review of draft-ietf-drip-rid

"Eric Vyncke (evyncke)" <evyncke@cisco.com> Mon, 11 April 2022 10:58 UTC

Return-Path: <evyncke@cisco.com>
X-Original-To: tm-rid@ietfa.amsl.com
Delivered-To: tm-rid@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E225E3A1737; Mon, 11 Apr 2022 03:58:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.604
X-Spam-Level:
X-Spam-Status: No, score=-9.604 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=h9yS9e0v; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=reWaiwCE
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JVA1vubH7jIl; Mon, 11 Apr 2022 03:57:48 -0700 (PDT)
Received: from rcdn-iport-4.cisco.com (rcdn-iport-4.cisco.com [173.37.86.75]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C51CD3A1730; Mon, 11 Apr 2022 03:57:47 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=40343; q=dns/txt; s=iport; t=1649674667; x=1650884267; h=from:to:cc:subject:date:message-id:mime-version; bh=fq6DSpM4mvC70zv0fXJ3/G6igBhdxbsVtczNpKYh/Ko=; b=h9yS9e0v2/HxzyKKxwUo/cIdLGUW2kXy7NuqAlFDYYiQnZCqcjtK9ZAY LUnLZLTxHuZeaeBOqosi65PaAn+6jnF1rhSBDZgJrDOXHD6HiCkCjvKE7 fEp6/s3FnSi36atecu7BFOK6e6ftRc56us3xoWfBRsIsIh69jJhx6abM7 U=;
IronPort-PHdr: =?us-ascii?q?A9a23=3AM+NebxcVFdagcvU0G/UQ4BWYlGM/tYqcDmcuA?= =?us-ascii?q?tIPh7FPd/Gl+JLvdAza6O52hVDEFYPc97pfiuXQvqyhPA5I4ZuIvH0YNpAZU?= =?us-ascii?q?RgDhJYamgU6C5uDDkv2ZPfhcy09GpFEU1lot3G2OERYAoDwfVrX93az9jUVX?= =?us-ascii?q?B74MFkdGw=3D=3D?=
IronPort-Data: =?us-ascii?q?A9a23=3Ab6XwPqt5FG3699Fck997FjPvKefnVGZcMUV32?= =?us-ascii?q?f8akzHdYApBsoF/qtZmKWCCM/2MYzenfo8jaIiz9hhQ68DWn4JnTVE/q39hH?= =?us-ascii?q?y8QgMeUXt7xwmUckM+xwmwvdK/shiknQoGowPscEzmN/n9BDpC79SMmjf3RH?= =?us-ascii?q?+KlYAL5EnkZqTFMGX9JZS1Lw4bVsqYw6TSIK1vlVeHa+qUzC3f9s9JACV/43?= =?us-ascii?q?orYwP9ZUFsejxtD1rA2TagjUFYzDBD5BrpHTU26ByOQroW5goeHq+j/ILGRp?= =?us-ascii?q?gs1/j83Ad+j1738aEBPHvjZPBOFjTxdXK3Kbhpq/3NplP1kcqtHLx4K1l1ln?= =?us-ascii?q?PgpoDlJnZGuWAEiPaDkk+UGWB4eGCZ7VUFD0O6WeiXu75LPlSUqdFOpmZ2CF?= =?us-ascii?q?noeMZcR9PoyAGxS+7kUMjEVKwqCi8q3za61DO52iawLMMyuJoITknBt0T+fC?= =?us-ascii?q?uwpKa0v6Y2iCcRwxjw8gIVFGuzTIpZfYjt0ZxOGaBpKUmr7wakWxI+A7kQTu?= =?us-ascii?q?RUBwL5NmZcK3g=3D=3D?=
IronPort-HdrOrdr: =?us-ascii?q?A9a23=3AAQAFEqEevrAtXLpHpLqFoZLXdLJyesId70?= =?us-ascii?q?hD6qkvc3Jom52j+PxGws526fatskdqZJkh8erwXJVoMkmsiKKdgLNhcYtKOT?= =?us-ascii?q?OGhILGFvAb0WKP+UyDJ8SczJ8T6U4DSdkENDSYNzET5qyWgHjaLz9K+qjhzE?= =?us-ascii?q?ncv5am854bd3ANV0gP1XYdNi+rVmlNACVWD5swE5SRouBdoSC7RHgRZsOnQl?= =?us-ascii?q?EYQunqvbTw5dzbSC9DIyRixBiFjDuu5rK/OQOfxA0iXzRGxqpn2XTZkjb++r?= =?us-ascii?q?6ov5iAu17hPi7ontRrcenau5l+7f+3+40ow/LX+0KVjbFaKv6/VfYO0aaSAR?= =?us-ascii?q?gR4Z/xSlwbTrhOAjvqDx6ISF3WqlDdOPJE0Q649bde6kGT+fARDQhKevaoz+?= =?us-ascii?q?hiA2Xkwltls9dm3K1R2WWF85JREBPbhSz4o8PFThdwiyOP0DIfeMMo/gpiuL?= =?us-ascii?q?ElGfZsRE0kjTZoOYZFGDi/5JEsEeFoAs2Z7PFKcUmCZ3ScumV02tSjUnk6Ax?= =?us-ascii?q?/DGyE5y4ao+ikTmGo8w1oTxcQZkHtF/JUhS4Nc7+CBNqhzjrlBQsIfcKo4XI?= =?us-ascii?q?46MIaKI32IRQiJPHOZIFzhGq1CM3XRq4Tv6LFw4O2xYpQHwJY7hZyEWlJFsm?= =?us-ascii?q?w5fV7oFKS1rdZ22wGIRH/4USXmy8lY6ZQ8srrgRKDzOSnGU1wqm9vImYRpPi?= =?us-ascii?q?QaYYfGBHt7OY6REYK1I/c44+TXYeghFUUj?=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0CiBgC2CFRi/5tdJa1UBh4BPAwCC4F?= =?us-ascii?q?vgSExVgd3WjdEhFWDSgOFOYURgwKQSYp3gS4UgREDUQMLAQEBDQEBLxQEAQG?= =?us-ascii?q?FBxmEWwIlNAkOAQIEAQEBEgEBBQEBAQIBBwSBCROFaAEMhkUWCwYdAQE3ARE?= =?us-ascii?q?BQAEJAgQwJwQOJ4JiAYIOVwMxAaIUAYE+AoEOiRF6gTGBAYIIAQEGBASCU4I?= =?us-ascii?q?4GII4CYE8gxGEJwEBgwCCFgpcgR8nHIFJRIEVJxyHUApOgxg3gi6ZfxJrBRk?= =?us-ascii?q?INBAEGDIBCgJMNRQGLg0RAREFEQwIBZJog0yJaqB3CoNJixeUaAUug3SBT4p?= =?us-ascii?q?qA4ZakUeWXiCCKZ5mOw2EcQIEAgQFAg4BAQaBYTwrgS5wFRpLAYI+CUgZD44?= =?us-ascii?q?rARaCAIFQil51OAIGAQoBAQMJj0QBAQ?=
X-IronPort-AV: E=Sophos;i="5.90,251,1643673600"; d="scan'208,217";a="993596642"
Received: from rcdn-core-4.cisco.com ([173.37.93.155]) by rcdn-iport-4.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 11 Apr 2022 10:57:46 +0000
Received: from mail.cisco.com (xfe-rcd-003.cisco.com [173.37.227.251]) by rcdn-core-4.cisco.com (8.15.2/8.15.2) with ESMTPS id 23BAvkPN014032 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Mon, 11 Apr 2022 10:57:46 GMT
Received: from xfe-aln-001.cisco.com (173.37.135.121) by xfe-rcd-003.cisco.com (173.37.227.251) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14; Mon, 11 Apr 2022 05:57:45 -0500
Received: from NAM10-MW2-obe.outbound.protection.outlook.com (173.37.151.57) by xfe-aln-001.cisco.com (173.37.135.121) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14 via Frontend Transport; Mon, 11 Apr 2022 05:57:45 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=P2CNCUyAt/hnUX15dE3Y6QaqwotFDvz5qebcNmnCh19OUZbx9lPm4adtAh5I6d142RWdtumEyu3eC2YL8BKBGgpXIGEOyzBt3U6k/CoQ4H0C5BpkeM765KxctXUmD4aLn8MH1iNzntuqAJBEQ5z/BQulkeC4jotaz+tYqQjrHNb2frw8bhLXhwK2DttMyEG14QkGW8E+JQZEGjHqGlki6L5EC4BV+mXCC6hbprKtV+L7l/j3KIuqqj3Jr1loBP5Exw2zZ6KHBoz9nF6Q8fzwjR6vd6pUBCBbv/OWiiD1nfZDFF/h/o66A3Zv5Y8eFf9ljiIY2F+miypQ2V1RipgA5g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=fq6DSpM4mvC70zv0fXJ3/G6igBhdxbsVtczNpKYh/Ko=; b=GLuY+uFXjSHoXoWs8Cwo4bot1wsuLKIqU/EqsrX41xNssFtyqKS6jE5vToQ48mZfvuxNti7cG9C0pRHGppfWZidzP4OQha9GDz6YU9vOM53opU64jEtkxKno3Lcmv/2Ls64AEu0y+bA5mawfsG68V/Zb/XX7gsZUVo313xFXJGdylnHpowTS1yDeTO4ei0XKY/x5UwKv3rx/ySXQpTnLaV57Qe5aeSv0qAfJmK4a25SDNmApIdLRTNXgBpUKhT4tN15ugT26HoumxdEUKxCkdqFJJuJt5nsMiJx0X6vRiMPX65AXF7xZZ05Wx94EFFUGsQyCnGxiXWAK7fFrY18Vvg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=fq6DSpM4mvC70zv0fXJ3/G6igBhdxbsVtczNpKYh/Ko=; b=reWaiwCE+a1TSDb7dU7FjGbobAuXWoplN2RRnFlrfgnMUG36tS+6EepFbK8XoTaEJ1ZOPlAmZXAyyZnIlJBRHyhCVuwGxINrw1l/apFMPmYjE0S2fmK1TO5FfNkthBA/wQM3O+lfa5QhS7l0Aq70bo8Nv7/3eNi+9ZVZQqs25kk=
Received: from PH0PR11MB4966.namprd11.prod.outlook.com (2603:10b6:510:42::21) by BL1PR11MB5956.namprd11.prod.outlook.com (2603:10b6:208:387::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5144.29; Mon, 11 Apr 2022 10:57:43 +0000
Received: from PH0PR11MB4966.namprd11.prod.outlook.com ([fe80::145e:1c80:538f:43d5]) by PH0PR11MB4966.namprd11.prod.outlook.com ([fe80::145e:1c80:538f:43d5%3]) with mapi id 15.20.5144.029; Mon, 11 Apr 2022 10:57:43 +0000
From: "Eric Vyncke (evyncke)" <evyncke@cisco.com>
To: "tm-rid@ietf.org" <tm-rid@ietf.org>
CC: "draft-ietf-drip-rid@ietf.org" <draft-ietf-drip-rid@ietf.org>
Thread-Topic: AD review of draft-ietf-drip-rid
Thread-Index: AQHYTZL4CINt5+ahlUCPu2KpVHxNFQ==
Date: Mon, 11 Apr 2022 10:57:43 +0000
Message-ID: <A8A9DD48-F67A-46FD-8A35-7C4EA1C94F88@cisco.com>
Accept-Language: fr-BE, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.59.22031300
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=cisco.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 5b04e42c-314a-4637-22a7-08da1baa1ab9
x-ms-traffictypediagnostic: BL1PR11MB5956:EE_
x-microsoft-antispam-prvs: <BL1PR11MB59561C96E30AB56285231BC5A9EA9@BL1PR11MB5956.namprd11.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:PH0PR11MB4966.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(366004)(8936002)(33656002)(83380400001)(6486002)(38070700005)(5660300002)(66574015)(186003)(2906002)(36756003)(316002)(76116006)(2616005)(4326008)(450100002)(508600001)(91956017)(6916009)(86362001)(64756008)(66946007)(8676002)(66556008)(66476007)(66446008)(6506007)(6512007)(71200400001)(4743002)(122000001)(38100700002)(11771555001)(45980500001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 2
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?MUJTWjl1Qm41MElvalczbGpYRVV0V1Y1TDdwb0oyTjhYOGFGd1k0MXhkbTE4?= =?utf-8?B?ZUtMd0ZTZlM2UVM3QzFGVWxJZ3M3M3U1VUlWWmx5cDFlTWMveFUzSFA1ZFR2?= =?utf-8?B?S0lVQ3dLV1V3Y0t6dWFtYUkwUWJOWU1KN0hmcGhzdmhtMzNSSkVBWjYzSHc5?= =?utf-8?B?VHdPUVEzNlFsb080M3k3bGIwQlVweUl6bnZRSjBHeDQ1Qm52RmE4RytneVE2?= =?utf-8?B?aXJKSld6NzJjOFdVM2laSS8xdG9XYnEzMFBZNHdKWGJuKzdnODc1VTNUd1Iw?= =?utf-8?B?Zzc5UVBtOVJqaUZPQ01uTXRCUnBxZkZkd3Zva0dCS2RZZHd4d1M3ZW51cHcv?= =?utf-8?B?Qm5UbURZbWpIS1Q4SXpHdFE5Y0tsd0kyZ2ptcE1IbGhqQm5aeWp0MmFFaTJG?= =?utf-8?B?WGRmMEV6VEIzd3htdmpuWnFEUFhwS3lTZVRST1ZMNFIwejBDWjRLSkhrcTZO?= =?utf-8?B?VnlIR3dIeFF3Z0thcEdlMmt2N0dqZUxhVGxERXE2Nk1pTzhOa0lGeWNrVUtl?= =?utf-8?B?RVB0YWR4Z3RmOGdPdGxMU0h2U09EdTB5TGEvODdYazBzaGZIZHRiU3VRcldt?= =?utf-8?B?ejlCYk1CQU4vZGNTekR3ZW43NEkyamJHOVcyR1ZhVGJhaDVIVmRKZDhwK1ZM?= =?utf-8?B?bVUzanY4aERycXNEZkFnSHZva1pHVHdHczcya3RPTm52MHl6UmlJNVhydXBj?= =?utf-8?B?VE5mTFlGVHd0YXAxcXlCU3k1TXFkWTVqanlCdkZuekpjTyt5eWNLcE8vaDBm?= =?utf-8?B?Ly9paXFrSmRvTjBhZThwY1JhUndDempQVU1GWkZmclNzNE1OU2dNd05ySmRa?= =?utf-8?B?ZktUYXB0ZzRnY2tCSE5Ia2o5VDIyamxuZjk3ek9MajJCMlpZMkxod1hpejNu?= =?utf-8?B?NEEzUng1RmVMN29oVHV2RWJKL3V5Yy8zTHVoSG9kaVB2UnJrd1o0YjkyZ2Z4?= =?utf-8?B?UkhNR1dXd3ZJT0sxS3FCVEV2alJPdkV3cDZyVERQZnVTSXhqTzdHZDZQQ25F?= =?utf-8?B?VUR3VHRkOHdmVXJVNEtuU2lMUmdqMHlKVmJHRzlvMk5YSEpTbGNhL2J5OGRL?= =?utf-8?B?Vk90TU44cTJUbWZFRnJiZGNiaXFnMDJaVFlCY2JLZkpVdzhEMWdJbE1OTC8y?= =?utf-8?B?ZHEyNHllcGtUVUNPbDJSczRkbHRnQXNLVG8rOE93YzY4bk56aHE3MWdWdHQw?= =?utf-8?B?MG1OTTNXQitWa0s2TWNDZWYxd3JkdUh1eVFrV2p0L1JpNTN0a1lkVGxBb1Fq?= =?utf-8?B?UU9qWTdjcGlKWnluekcwc3l2Ny96dDhXZlAxTnlSaUdRejBmVmZXVEsyRHVV?= =?utf-8?B?ZDRXcUZ6bmhxcUoxSjd5SEZkUjJLaVQzZVdiSXZjN2ZRUEtZbEJqV1lxeFlK?= =?utf-8?B?eDZNcEVOaEc2bzRsL2ZoWnJuRHRtUlo3MVcyTHBYeXBaUjR1VDBrQzdYeG5N?= =?utf-8?B?YjQ1OFZUemxJUDRBM0dLejZmamhrUmF3N0pWd1ZXOXZXaGt2Wjk1WFhKSndJ?= =?utf-8?B?eHA3ZzA3SjkybDdnZGtzZmt2bnVocS95KzQybFdNMGltMFJvTUNzK2ZCMUFZ?= =?utf-8?B?TmJibDRmMW1WNzhsMlZBcktyK2JrS3phQzBGS0M5eHRzM1RzcnFnb2hLdGFR?= =?utf-8?B?YVo2NFllOEtjR01Md212OUdwNTVsT2xBekZEaGtxQVA0UlhQOERGakRzZjE1?= =?utf-8?B?Y1l1a2RQekhPVnVrVUh5OW1vUFh5bEM3U3Rqb0RGWE4rSmhGT1B6NkVsUXhH?= =?utf-8?B?MEExZFpKWDE0RWloV2lid0s2dUVCMCsvK205SGNLZnRwajZzOUpKckpUYnJ2?= =?utf-8?B?Q0MrWk5rSDVnc1ZScmVOeW4yR2ZpRGhjeWpsa0JWQkV6a3NDNksyTGhielNX?= =?utf-8?B?Ky9IMkdmVTYwWEVmc2tNbWVCb2JqTmRqdmthamJydlMyS3oxd045TlpLS0Zu?= =?utf-8?B?akdTRjJCODBXZ3BsUlZXQzZFYWkrdGh5SDZ2dkFGNWNKcllUMGFCSDhMbnh5?= =?utf-8?B?bjdTQjlHMGRaZmVadXJyWkdNZnEyaU8zQ0VoSVQ5MVFJN2J1Y0ptVjlDZE0r?= =?utf-8?B?Zm5wdVhUNG85R2FKZDJ5TUZkNHgxVGwyWkNrTXluOGRqaTVPcHFuVURXUzR3?= =?utf-8?B?eHBCU00xOWJBSll6MkhGRXNjUzFxL1pjUmsyaFFtanpuYW5yVzZ3NFBqS3gy?= =?utf-8?B?dVJ2M0xvSmxYUjRDeEFoTFlHUnhSb0lneFppYlhlWStqSS9QYUxhSWNtTUM2?= =?utf-8?B?L3g3VkxmWjZ6UDVVWnJvSituNUJDNHJrOTcydjhzeEpCaHpXcnFZb3U2SThy?= =?utf-8?B?aUpCTDBVZHBLVHlRemdPOEN4M0NibGNpd0tKZC9Qd2swNkhaM0VSWEtPWXV2?= =?utf-8?Q?QmwVFLX6TrtEpu5kRb+ixbRfPirVLPD2aTUWpm6uKUgpx?=
x-ms-exchange-antispam-messagedata-1: CuVDrE1jwpWahjhXBrrTY3rFXFn77FLRpj0=
Content-Type: multipart/alternative; boundary="_000_A8A9DD48F67A46FD8A357C4EA1C94F88ciscocom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: PH0PR11MB4966.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 5b04e42c-314a-4637-22a7-08da1baa1ab9
X-MS-Exchange-CrossTenant-originalarrivaltime: 11 Apr 2022 10:57:43.2452 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 6wRldWEx8OBfVru5eNlQfd9WD38IKu28mVPyFa9znYimwWGe66ehxqDVufnwj37sjEQxEsCH5YW4vH498BNllQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL1PR11MB5956
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.227.251, xfe-rcd-003.cisco.com
X-Outbound-Node: rcdn-core-4.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/tm-rid/ppyo2VILTgYG9J91TwsIh9XEEpY>
Subject: [Drip] AD review of draft-ietf-drip-rid
X-BeenThere: tm-rid@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Drone Remote Identification Protocol <tm-rid.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tm-rid>, <mailto:tm-rid-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tm-rid/>
List-Post: <mailto:tm-rid@ietf.org>
List-Help: <mailto:tm-rid-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tm-rid>, <mailto:tm-rid-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 11 Apr 2022 10:58:03 -0000

Hi,



Thanks to the authors, shepherd, and the DRIP WG for producing this 3rd I-D. And, I appreciate that the comments from iotdir, secdir, cfrg, .. were taken into accounts :-)



As usual, here is my AD review before going to the IETF Last Call and continuing the publication process. Except noted by a "***", all the comments can be ignored but I would appreciate a reply telling "we have read your comment but prefer to ignore" (or a variation of this text).



I hope this helps improving the document and ease the publication process.



Regards



-éric



---- review below



# Generic

Just curious, should the drip-arch document be mentioned somewhere ? E.g., in section 1



The text is really not consistent of using "HHIT" vs. "Hierarchical HIT" or "DET" vs "USA Remote ID DET" ... This does not help reading and understanding.



# Abstract

s/ (e.g., DNS, EPP)/ (via, e.g., DNS, EPP)/ ?



# Sect 1:

"Unmanned Aircraft System Remote Identification and tracking (UAS ID)" but RFC 9153 says " UAS ID UAS identifier.". Suggest being consistent and/or explain what the difference is.



Moreover, RFC 9153 has text about "DRIP identifier" and not about "UAD ID".



Please expand HIT and HIP at first use.



The discussion about PKI and X.509 certificate appears from nowhere, suggest having sub-section somewhere with justification of HHIT



# Sect 2.3:

s/ HDA (Hierarchical HIT Domain Authority)/ HDA (HHIT Domain Authority)/ ?



When defining HIP please add a reference to RFC.



# Sect 3

In figure 1, some early explanations about "orchid hash" would be welcome.



The text mention "context ID" but should it be "Orchid context ID" since IANA registry is about "CGA Type Tags" ? At least, a link to ORCHID should be given.



*** "A script for generating HHITs based on an early version of this specification is available at [hhit-gen].", it makes little sense to have an implementation of an outdated specification. Moreover, the link is 404 on github.



# Sec 3.1

Sometimes it is "HIP" and here it is "HIPv2", let's be consistent.



# Sec 3.2.1

Should the column heading be "HHIT Suite" rather than "HIT Suite" ?



"HDA Assigned" is rather unusual, why not using "experimental" or "private use" as it is often the case in other IANA registries ?



# Sec 3.3.1

As RAA has a length of 14 bit, I wonder what is the meaning of " RAA should be allocated in blocks with consideration on the likely size of a particular usage"



*** It is also unclear who allocates the RAA ? If IANA, then this should be in the IANA section. Else, please describe how colliding RAA are resolved/detected. I understand the registry I-D is coming but it is really puzzling for the reader. Did the author consider moving parts of the registry I-D in this section ? After all, it is more about the HHIT structure than registries interactions.



Which is " This DNS zone" ?



Should "100" rather be "decimal 100" ?



Should this be a "SHOULD" or even a "MUST" in "The PTR record could be constructed" ?



*** Even the registry I-D does not mention this PTR record and does not specify which party will own the "hhit.arpa" zone.



# Sec 3.3.2

It is useless to expand RVS as it has been done before.



s/RVS servers/RVSs/ ?



# Sec 3.4

Should "-Curve" be also in the section title ?



"HI" was already expanded before.



# Sec 3.5

The last sentence is about "addendum", are we sure that this I-D does not need to formally update ORCHID ?



# Sec 3.5.1

" This addendum will be constructed as follows": this is rather obscure.... What about something like "This document specifies another way to compute ORCHID".



Suggest using the same wording (e.g., for "Prefix") as in ORCHID.



Be clear that " p + n + o + m = 128 bits" is a MUST.



# Sec 3.5.2

Again "addendum" which is rather vague in an I-D.



" The cSHAKE function call for this addendum is" or should it be " The cSHAKE parameters for this addendum is"



# Sec 3.5.2.1 and 3.5.3 and 3.5.4

*** What is the intent of these sections ? It smells like it is really an argument to formally update ORCHID.



# Sec 4

Should the section title be " Hierarchical HITs as DRIP Entity Tags" ?



What is the purpose of the first paragraph ? It has already been said before.



" This hierarchy, cryptographically embedded within the HHIT, provides the information for finding the UA's HHIT registry", is it really "cryptographically embedded" ?



Is the ASTM part useful in this document ? I cannot see the link with DET.



# Sec 4.2

*** Please provide a normative reference to base32.



The discussion about not using base34 may be skipped IMHO.



*** " A mapping service (e.g., DNS) MUST provide a trusted" is really hand waving and I am unsure how DNS could be use there. How useful is this spec if there is no mapping ? Should this be a IANA registry ?



# Sec 4.5

The 2nd paragraph is nice but should perhaps be moved in the RAA section ?



# Sec 4.6

*** What is " ASTM Authentication Message" (at least provide some references).



# Sec 5

" The following are examples of how this may be done".... and this I-D is assumed to be standard track. I.e., it should either use normative language or be removed IMHO (as it is probably better in the registries I-D).



Should 100 and 50 be prefixed by "decimal" ?



s/ following: Assume/ following: assume/



" A secure connection (e.g., DNS-over-TLS [RFC7858]) to the authoritative zone may be a viable alternative to DNSSEC." But I wonder whether the authoritative servers (and not zone BTW) will be happy with the load...



The "ipv6.arpa" example is missing the value for the PTR RR.



# Sec 6 and 7

Unsure whether these 2 small sections belong to this document. Suggest to remove them.



# Sec 8

At the authors' discretion, this section could become part of the security considerations (and it could also be renamed in 'Privacy Considerations')



" through address randomization", which address ? MAC ?



Please explain what "PHY" and "C2" are ;-)



In " Simply changing the UAS RID" should this rather be DET ?



# Sect 9.5:



Should it be before section 9.1 as if request the allocation of /28 to be used in section 9.1 ?



" DRIP Device Entity Tags" ? or " DRIP Entity Tags" ?



# Sec 10

*** Please provide a reference to "a Python script"



About the " *single* bitcoin mining ASIC", it is about the sha256 performance but I would assume that creating a key pair is more computing intensive than a sha256, if confirmed (I am not a crypto guy), then how relevant is this number ?



What is " receiver of the DET" ? (I understand of course but rather use correct wording)



" As such, use of DNSSEC and DNS-over-TLS by the DET registries is recommended" some justifications would be welcome as DNSSEC & DoT are vastly different beasts with different objectives.



" Another mitigation of HHIT hijacking is if the HI owner (UA) supplies an object" is it part of this specification? Else, please add something "out of scope"



This section would benefit from having a little more structure with more sub-sections (e.g., collision)



What about having a few paragraphs about revocation ?



# Sec 10.1

*** Should the title include ASTM ? Because, it seems that it is only about ASTM



# Sec 11.2

*** F3411 & drip-registries & CTA2063A & RFC 8032 should probably be normative.



App A

While interesting read, what is the link with DET ? Will DET comply with the EU rule?



App B

Humm DET could also be used by other industries, e.g., rail transportation or sea shipping.