[Unbearable] Mirja Kühlewind's No Objection on draft-ietf-tokbind-protocol-17: (with COMMENT)
Mirja Kühlewind <ietf@kuehlewind.net> Thu, 26 April 2018 18:02 UTC
Return-Path: <ietf@kuehlewind.net>
X-Original-To: unbearable@ietf.org
Delivered-To: unbearable@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 8E732127909; Thu, 26 Apr 2018 11:02:05 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
From: Mirja Kühlewind <ietf@kuehlewind.net>
To: The IESG <iesg@ietf.org>
Cc: draft-ietf-tokbind-protocol@ietf.org, John Bradley <ve7jtb@ve7jtb.com>, tokbind-chairs@ietf.org, ve7jtb@ve7jtb.com, unbearable@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.79.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <152476572557.22940.3607200722925408317.idtracker@ietfa.amsl.com>
Date: Thu, 26 Apr 2018 11:02:05 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/unbearable/pp9E641a94LqvRJzb6zaIUTPvxQ>
Subject: [Unbearable] Mirja Kühlewind's No Objection on draft-ietf-tokbind-protocol-17: (with COMMENT)
X-BeenThere: unbearable@ietf.org
X-Mailman-Version: 2.1.22
List-Id: "\"This list is for discussion of proposals for doing better than bearer tokens \(e.g. HTTP cookies, OAuth tokens etc.\) for web applications. The specific goal is chartering a WG focused on preventing security token export and replay attacks.\"" <unbearable.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/unbearable>, <mailto:unbearable-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/unbearable/>
List-Post: <mailto:unbearable@ietf.org>
List-Help: <mailto:unbearable-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/unbearable>, <mailto:unbearable-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 26 Apr 2018 18:02:06 -0000
Mirja Kühlewind has entered the following ballot position for draft-ietf-tokbind-protocol-17: No Objection When responding, please keep the subject line intact and reply to all email addresses included in the To and CC lines. (Feel free to cut this introductory paragraph, however.) Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html for more information about IESG DISCUSS and COMMENT positions. The document, along with other ballot positions, can be found here: https://datatracker.ietf.org/doc/draft-ietf-tokbind-protocol/ ---------------------------------------------------------------------- COMMENT: ---------------------------------------------------------------------- Sorry for spamming but one more update (after reading draft-ietf-tokbind-https): In sec 3: "This message MUST be sent in the client's first application protocol message." Why is that a generic requirement for all uses of token binding and not just for HTTPS? Update (after reading draft-ietf-tokbind-negotiation): Given different negotiation mechanisms could be used, maybe it would make sense to say slightly more about version handling in this doc as well, e.g. at least explaining/requiring that version negotiation is done by the negotiation protocol... Maybe I'm just missing something but given the TokenBindingType and the TB_ExtensionType share the same number space, how do I know if there is another TokenBinding or and an TB_Extension following after the signature? Nit: Please spell out TPM (in sec 1).
- [Unbearable] Mirja Kühlewind's No Objection on dr… Mirja Kühlewind