Thanks Marco, I am fine with your provided resolutions/explanations.
After the PR is merged and a new draft version is published, this draft is “Ready” with respect to my review (transport perspective). Vidhi > On Dec 15, 2023, at 8:22 AM, Marco Tiloca > <marco.tiloca=40ri...@dmarc.ietf.org> wrote: > > Hello Vidhi, > > Thanks a lot for your review! Please find in line below our detailed replies > to your comments. > > A Github PR where we have addressed your comments is available at [PR]. > > Unless any concern is raised, we plan to soon merge this PR (and the other > ones related to other received reviews), and to submit the result as version > -18 of the document. > > Thanks, > /Marco > > [PR] https://github.com/ace-wg/ace-key-groupcomm/pull/157 > > On 2023-10-14 08:07, Vidhi Goel via Datatracker wrote: >> Reviewer: Vidhi Goel >> Review result: Ready with Nits >> >> This document has been reviewed as part of the transport area review team's >> ongoing effort to review key IETF documents. These comments were written >> primarily for the transport area directors, but are copied to the document's >> authors and WG to allow them to address any issues raised and also to the >> IETF >> discussion list for information. >> >> When done at the time of IETF Last Call, the authors should consider this >> review as part of the last-call comments they receive. Please always CC >> tsv-...@ietf.org <mailto:tsv-...@ietf.org> if you reply to or forward this >> review. >> >> As I am not very familiar with this topic, most of my comments are editorial >> except a few. My comments are only suggestions to improve the text and I'd >> happy to discuss them if needed. >> >> COMMENTS: >> Section 1.1 : “NODENAME: the invariant once established text string used in >> URIs to identify a member a group.” >> Typo at the end of the sentence. >> >> OLD: to identify a member a group. >> NEW: to identify a member of a group. > > ==>MT > > Fixed as part of the now merged PR 156, see > https://github.com/ace-wg/ace-key-groupcomm/pull/156 > > <== > >> >> Section 2: “Client (C): node that wants to join a group and take part in >> group >> communication with other group memebrs.” Typo in the last word- members. > > ==>MT > > Fixed as part of the now merged PR 156, see > https://github.com/ace-wg/ace-key-groupcomm/pull/156 > > <== > >> >> Section 2: “Examples of a Dispatcher are:” >> Does this need to include anycast addresses? > > ==>MT > > That would be another example of dispatcher, yes. However, in order to not > overload the (already too long) text, we don't think that we should be adding > it here. > > <== > >> >> Section 3.3.1:”in the groups indicated by the transferred acces token as per >> its 'scope' claim” >> Typo in the word - access. > > ==>MT > > Fixed as part of the now merged PR 156, see > https://github.com/ace-wg/ace-key-groupcomm/pull/156 > > <== > >> >> Section 4.1: >> For all the resources defined, can authors double check if “Clients may be >> authorized to access this resource even without being group members” is >> mentioned for all applicable resources. > > ==>MT > > Good point - we have now added a similar sentence to the /ace-group resource, > see > https://github.com/ace-wg/ace-key-groupcomm/commit/73c9f7e6b4aab628a185b3ff0d7acc960910a5eb > > <== > >> >> Section 4.1.2: “If the request includes unknown or non-expected fields, the >> handler MUST silently ignore them and continue processing the request.” >> >> Is this >> safe to silently ignore such requests? Please double check. > > ==>MT > > We believe this is ok as-is. > > The mentioned sentence comes after a much harder check for malformed messages > (due, e.g., to expected fields that are missing). Also, it is followed by a > sentence that allows application profiles to be stricter and react with an > error in the presence of unexpected/unknown fields. > > <== > >> >> Section 4.2.1.1. “In case the joining node only knows the group identifier of >> the group it wishes to join or about which it wishes to get update >> information >> from the KDC” >> >> Did you mean to say “.. to get updated information..”? > > ==>MT > > Yes, now fixed: > https://github.com/ace-wg/ace-key-groupcomm/commit/5278dc8d6c97533bf38baa7c6a1677d3bccc3604 > > <== > > >> >> >> Section >> 4.4.1.1. Is it possible to include an example of authentication credential >> request-response for more than 1 group members? > > ==>MT > > Sure, now changed: > https://github.com/ace-wg/ace-key-groupcomm/commit/3c8ce8059965da37e647678198e7168edd0868ef > > <== > >> >> Section 5: >> >> OLD: “…if it acts as repository of authentication credentials for group >> members.” NEW: “…if it acts as a repository of authentication credentials for >> group members.” >> >> Similar text “KDC acts as repository” is present elsewhere and can be updated >> like above. > > ==>MT > > Now fixed: > https://github.com/ace-wg/ace-key-groupcomm/commit/91fd85d4c7a0ff346ba833e52c1a22edf3187df3 > > <== > >> >> Section 6.1: “This approach consists in the KDC sending one individual >> rekeying >> message to each target group member.” The beginning of this sentence doesn’t >> seem right. Can you double check? > > ==>MT > > Now tried to reformulate, see > https://github.com/ace-wg/ace-key-groupcomm/commit/04d4de9e1dd3f65efe89124939f670ede3fdd07a > > <== > >> >> Section 6.2.1: >> OLD: “The used encryption algorithm which SHOULD be the >> same >> one used to protect communications in the group.” NEW: “The used encryption >> algorithm SHOULD be the same one used to protect communications in the >> group.” > > ==>MT > > Fixed in: > https://github.com/ace-wg/ace-key-groupcomm/commit/7bbe27aebdbfd76b8ded27141803fff44b0d27e1 > > <== > >> >> Section 6.3: Paragraph starting with “In the second case, the sender >> protects a >> message using the new group keying material, but the recipient receives that >> message before having received the new group keying material.” >> >> Another >> suggestion to deal with this case: The recipient can store a message that it >> can’t decrypt temporarily for a limited time so that if it receives new group >> keying material shortly after, it can then decrypt those stored messages. > > ==>MT > > We have kept the text as is. > > In principle, the suggested approach is possible, but we don't expect it to > be practically enforceable. Typical secure communication protocols are such > that a recipient rightly discards an incoming message, if this is not > successfully decrypted and verified. > > <== > >> >> Section 10. >> DDOS attack possibilities - I can see some possibilities for >> DDOS >> where Clients can overwhelm KDC by sending unexpected or unknown fields. >> There >> might be more - can authors provide some possible DDOS attack vectors? > > ==>MT > > The second from last paragraph of Section 10.2 (the one starting with "The > KDC needs to have a mechanism") already discusses a possible, concrete Denial > of Service vector against the KDC, and how the KDC can counteract and > mitigate its exploitation. > > More generally, the KDC is expected to be implemented by a host well-equipped > in terms of resources and capable to handle a relatively high load. > Therefore, we do not expect that Clients can realistically overwhelm the KDC > by means of unexpected or unknown fields in their requests. > > Also, a first protection for the KDC is the requirement for a node to have > first of all successfully uploaded a valid access token and established a > secure communication association. > > With this considered, we do not believe that we need any additional text. > > <== > >> >> Thanks, >> Vidhi >> >> > > -- > Marco Tiloca > Ph.D., Senior Researcher > > Phone: +46 (0)70 60 46 501 > > RISE Research Institutes of Sweden AB > Box 1263 > 164 29 Kista (Sweden) > > Division: Digital Systems > Department: Computer Science > Unit: Cybersecurity > > https://www.ri.se > <https://www.ri.se/><OpenPGP_0xEE2664B40E58DA43.asc>_______________________________________________ > Tsv-art mailing list > tsv-...@ietf.org > https://www.ietf.org/mailman/listinfo/tsv-art
_______________________________________________ Ace mailing list Ace@ietf.org https://www.ietf.org/mailman/listinfo/ace