Hi Robert,
Many thanks for your review and comments. Please see my response below:
> (1) p 2, sec 2.1.  CoAP URI Format
>Presumably the goal here is to keep the URLs reasonable short, is that
worth stating at all?
<M.S.>I left that out as it's implicit when using CoAP protocol.
> (2) p 3, sec 2.3.  CoAP Request Format
>Noting that this is using RFC 2911 language, is this requirement specific
to CMP over CoAP, or is this just restating CoAP behaviour.
<M.S.> It's to avoid any ambiguity in what server should send and what
client should expect.
>(3) p 4, sec 2.4.  CoAP Block-Wise Transfer Mode
>It wasn't entirely obvious to me as to what entity "the server" is
referring to in this paragraph.  Perhaps worth being more specific?
<M.S.> I will make it more clear that the server is referring to CA/RA in
this case.
>(4) p 4, sec 2.6.  Announcement PKIMessage
> I found this text very slightly confusing.  E.g., the first part of the
sentence is about supporting announcement messages, and the second part is
about response codes.  I presume that this is about replying to the
register messages, but perhaps this could be made a bit clearer.
<M.S.> The reference is in the previous paragraph where the path is
mentioned
""" The EE can send a GET request to the server's URI suffixed by "/ann".
"""
>(5) p 4, sec 2.6.  Announcement PKIMessage
>Would it be helpful to define or give guidance as what sort of period is
recommended here (e.g., once per day, or once per year)?
<M.S.> This is very implementation specific and how may resources server
has and server may even have unexpected restarts. Therefore I did not
provide a specific period here.
>(6) p 5, sec 3.  Proxy Support
>Perhaps: "It is out of scope of this document to specify how a reverse ..."
<M.S.> I will update the draft with your recommendation.
> (8) p 5, sec 4.  Security Considerations
>Possibly a question for the SEC ADs, but would "without compromising the
integrity of " be better than "without compromising the security" (given
CMP does not provide confidentiality, as stated below)?
<M.S.> This line has been rephrased quite a few times based on input from
different reviewers. I did not receive a reply from SEC ADs on this comment.
>(9) p 4, sec 2.6.  Announcement PKIMessage
>Suggest: "reason server" => "reason, the server"
<M.S.> I will update the draft with your recommendation.
>(10) p 5, sec 3.  Proxy Support
>Suggest: is same => is the same.  I also suggest starting a new paragraph
from "Since the".
<M.S.> I will update the draft with your recommendation.
>(11) p 6, sec 4.  Security Considerations
>Perhaps "avoid small datagrams" => "avoid sending small datagrams"?
<M.S.> I will update the draft with your recommendation.
>(12) p 6, sec 4.  Security Considerations
>Suggest "Proxy can" => "The proxy can"
<M.S.> I will update the draft with your recommendation.

Thanks
Mohit




On Mon, May 8, 2023 at 12:02 PM Robert Wilton via Datatracker <
nore...@ietf.org> wrote:

> Robert Wilton has entered the following ballot position for
> draft-ietf-ace-cmpv2-coap-transport-09: No Objection
>
> When responding, please keep the subject line intact and reply to all
> email addresses included in the To and CC lines. (Feel free to cut this
> introductory paragraph, however.)
>
>
> Please refer to
> https://urldefense.proofpoint.com/v2/url?u=https-3A__www.ietf.org_about_groups_iesg_statements_handling-2Dballot-2Dpositions_&d=DwICaQ&c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&r=J7DgfMyeL26OZuy8d3qTy_h24Ff1NatxSKMgDUj2Kxg&m=RKLav3_i3qmtpZB0CSaJvGZjZt52RTzqEQ_xXH0RqWLzn2qGHhENuIm3IT3QAExo&s=rFCJTzmdbZK4jYo6WHcc1OlY2x6krfL1zk_cpjadY7U&e=
>
> for more information about how to handle DISCUSS and COMMENT positions.
>
>
> The document, along with other ballot positions, can be found here:
>
> https://urldefense.proofpoint.com/v2/url?u=https-3A__datatracker.ietf.org_doc_draft-2Dietf-2Dace-2Dcmpv2-2Dcoap-2Dtransport_&d=DwICaQ&c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&r=J7DgfMyeL26OZuy8d3qTy_h24Ff1NatxSKMgDUj2Kxg&m=RKLav3_i3qmtpZB0CSaJvGZjZt52RTzqEQ_xXH0RqWLzn2qGHhENuIm3IT3QAExo&s=hu4pAqCVPpm8TtCb8rJNVK1_-7MCiwwx4MXt-3WOixQ&e=
>
>
>
> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
>
> Hi,
>
> Thanks for this document.
>
> I have some minor comments/suggestions that may improve this document:
>
> Minor level comments:
>
> (1) p 2, sec 2.1.  CoAP URI Format
>
>        coap://www.example.com/.well-known/cmp
>        coap://www.example.com/.well-known/cmp/<operation>
>        coap://www.example.com/.well-known/cmp/p/<name>
>        coap://www.example.com/.well-known/cmp/p/<name>/<operation>
>
> Presumably the goal here is to keep the URLs reasonable short, is that
> worth
> stating at all?
>
> (2) p 3, sec 2.3.  CoAP Request Format
>
>                                         If the CoAP request is
>    successful then the server MUST return a Success 2.xx response code
>    otherwise server MUST return an appropriate Client Error 4.xx or
>    Server Error 5.xx response code.
>
> Noting that this is using RFC 2911 language, is this requirement specific
> to
> CMP over CoAP, or is this just restating CoAP behaviour.
>
> (3) p 4, sec 2.4.  CoAP Block-Wise Transfer Mode
>
>    A CMP PKIMesssage consists of a header, body, protection, and
>    extraCerts structures which may contain many optional and potentially
>    large fields.  Thus a CMP message can be much larger than the Maximum
>    Transmission Unit (MTU) of the outgoing interface of the device.  The
>    EEs and RAs or CAs, MUST use the Block-Wise transfer mode [RFC7959]
>    to transfer such large messages instead of relying on IP
>    fragmentation.
>    If a CoAP-to-HTTP proxy is in the path between EEs and CA or EEs and
>    RA then, if the server supports, it MUST use the chunked transfer
>    encoding [RFC9112] to send data over the HTTP transport.  The proxy
>    MUST try to reduce the number of packets sent by using an optimal
>    chunk length for the HTTP transport.
>
> It wasn't entirely obvious to me as to what entity "the server" is
> referring to
> in this paragraph.  Perhaps worth being more specific?
>
> (4) p 4, sec 2.6.  Announcement PKIMessage
>
>    If the server supports CMP Announcements messages, then it MUST send
>    appropriate Success 2.xx response code, otherwise it MUST send an
>    appropriate Client Error 4.xx or Server Error 5.xx response code.
>
> I found this text very slightly confusing.  E.g., the first part of the
> sentence is about supporting announcement messages, and the second part is
> about response codes.  I presume that this is about replying to the
> register
> messages, but perhaps this could be made a bit clearer.
>
> (5) p 4, sec 2.6.  Announcement PKIMessage
>
>      A client on receiving a 2.xx success
>    response without the Observe option [RFC7641] MAY try after some time
>    to register again for announcements from the CMP server.  Since
>    server can remove the EE from the list of observers for announcement
>    messages, an EE SHOULD periodically re-register itself for
>    announcement messages.
>
> Would it be helpful to define or give guidance as what sort of period is
> recommended here (e.g., once per day, or once per year)?
>
> (6) p 5, sec 3.  Proxy Support
>
>    The CoAP-to-HTTP proxy can either be located closer to the EEs or
>    closer to the RA or CA.  The proxy MAY support service discovery and
>    resource discovery as described in section 2.2.  The CoAP-to-HTTP
>    proxy MUST function as a reverse proxy, only permitting connections
>    to a limited set of pre-configured servers.
>
> Given the RFC 2119 MUST, is there a definition or reference as to what is
> meant
> by reverse proxy?
>
> (7) p 5, sec 3.  Proxy Support
>
>      It is out of scope of
>    this document on how a reverse proxy can route CoAP client requests
>    to one of the configured servers.  Some recommended mechanisms are as
>    follows:
>
> Perhaps: "It is out of scope of this document to specify how a reverse ..."
>
> (8) p 5, sec 4.  Security Considerations
>
>    *  If PKIProtection is used, the PKIHeader and PKIBody of the CMP
>       protocol are cryptographically protected against malicious
>       modifications.  As such, UDP can be used without compromising the
>       security of the CMP protocol.  Security Considerations for CoAP
>       are defined in [RFC7252].
>
> Possibly a question for the SEC ADs, but would "without compromising the
> integrity of " be better than "without compromising the security" (given
> CMP
> does not provide confidentiality, as stated below)?
>
> Nit level comments:
>
> (9) p 4, sec 2.6.  Announcement PKIMessage
>
>      If
>    for some reason server cannot add the client to its list of observers
>    for the announcements, it can omit the Observe option [RFC7641] in
>    the response to the client.
>
> Suggest: "reason server" => "reason, the server"
>
> (10) p 5, sec 3.  Proxy Support
>
>    This section provides guidance on using a CoAP-to-HTTP proxy between
>    EEs and RAs or CAs in order to avoid changes to the existing PKI
>    implementation.  Since the CMP payload is same over CoAP and HTTP
>    transfer mechanisms, a CoAP-to-HTTP cross-protocol proxy can be
>    implemented based on section 10 of [RFC7252].
>
> Suggest: is same => is the same.  I also suggest starting a new paragraph
> from
> "Since the".
>
> (11) p 6, sec 4.  Security Considerations
>
>    *  Implementations SHOULD use the available datagram size and avoid
>       small datagrams containing partial CMP PKIMessage data in order to
>       reduce memory usage for packet buffering.
>
> Perhaps "avoid small datagrams" => "avoid sending small datagrams"?
>
> (12) p 6, sec 4.  Security Considerations
>
>    *  A CoAP-to-HTTP proxy can also protect the PKI entities by handling
>       UDP and CoAP messages.  Proxy can mitigate attacks like denial of
>       service attacks, replay attacks and resource-exhaustion attacks by
>       enforcing basic checks like validating that the ASN.1 syntax is
>       compliant to CMP messages and validating the PKIMessage protection
>       before sending them to PKI entities.
>
> Suggest "Proxy can" => "The proxy can"
>
>
>
>
_______________________________________________
Ace mailing list
Ace@ietf.org
https://www.ietf.org/mailman/listinfo/ace

Reply via email to