inline w/ [DC]

On Mon, Apr 14, 2025 at 5:00 PM Michael Richardson <mcr+i...@sandelman.ca>
wrote:

> Deb Cooley via Datatracker <nore...@ietf.org> wrote:
>     > Section 7.3, para 2:  Pick one:  either 'mutual authentication' or
> 'client
>     > authentication'.  If you pick 'mutual authentication', then in
> sentence 2, it
>     > could be 'mTLS uses....' [one should do a global search, there are a
> bunch of
>     > 'client authentication' instances throughout the draft]
>
> I don't understand your comment.
> Mutual Authentication = Server Authentication + Client Authentication.
> In section 7.3, paragraph we are explaining that the client authentication
> uses a different kind of key.
>

[DC]  I guess you could add that to the terminology section.  From what I
could see you are using mutual auth and client auth interchangeably.
Although, I'm not sure even I understand what it means for client auth to
use a 'different kind of key'.  Since it is exactly the same sort of key,
it is only the authentication that changes.  Pedantic, possibly, but the
goal is for a reader to understand what they need to do to implement the
protocol.

>
>     > Section 7.3, para 3:  Is this suggesting that the registrar only
> needs to
>     > verify the Registrar-Agent's connection if it doesn't already have
> the
>     > Registrar-Agent's EE certificate?  seems odd....and possibly
> insecure.
>
> Typically, the Registrar Agent's EE certificate is issued by the Registrar.
> I can't see what the exception for the SHOULD in this paragraph is though.
> I agree that paragraph needs rework.

[DC]  cool.


>     > Section 12.1:  Is there a resource exhaustion DOS attack on the
> Pledge?
>
> A pledge that can maintain only n-outstanding voucher-requests could
> be DoS by n+1 attackers.  Each voucher-request contains a nonce which if
> just
> randomly generated would need to be remembered somehow for a time.
> A pledge could also attempt to make the nonce stateless by
> encrypting/signing
> something it doesn't have to remember.  There are many ways to deal with
> this, which is why SC raises  it.
>
[DC] oh so the DOS attacks that are outlined are examples?

>
>     > Section 6.1 and 12.3:  Doesn't frequent rekey of the Registrar-Agent
> lead to
>     > synchronization issues with the Registrar?  How is this mitigated?
>
> The new EE key is issues by the Registrar, but maybe you are asking about
> the
> key that would be in the agent-signed-data.  Whatever the rekey interval,
> the
> Agent should not rekey while it has undischarged voucher-requests.
>

[DC]  I mean the Registrar-Agent key/certificate.  Where the source of that
key/cert pair is out of scope of this draft.  If these certs are issued by
the Registrar/CA, then maybe it isn't out of scope?  Again, I'm looking for
clarity for an implementer.

>
>
>
>
>
>
> --
> Michael Richardson <mcr+i...@sandelman.ca>   . o O ( IPv6 IøT consulting )
>            Sandelman Software Works Inc, Ottawa and Worldwide
>
>
>
>
>
_______________________________________________
Anima mailing list -- anima@ietf.org
To unsubscribe send an email to anima-le...@ietf.org

Reply via email to