Roman Danyliw has entered the following ballot position for
draft-ietf-anima-brski-prm-20: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to 
https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ 
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-anima-brski-prm/



----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

(updated ballot for -20)
Thank you to Paul Kyzivat for the GENART review.

Thank you for addressing my DISCUSS feedback.

(Comments on -18)

** Section 4.

   *  The use of authenticated self-contained objects addresses both,
      the TLS challenges and the technology stack challenge.

What are “technology stack challenges”?

** Section 6.1
   Alternatively, the registrar EE
   certificate MAY be provided via configuration or a repository

What is a “repository” and how is that difference than “configuration”?

** Section 6.1
   Further, the Registrar-Agent SHOULD have synchronized time.

What is the impact of not having synchronized time?

** Section 6.1.2
   Note that this goes against the naming recommendation of [RFC6763].
   The _brski-pledge._tcp service, however, targets machine-to-machine
   discovery.

What in RFC6763 suggests a scope that would exclude “machine-to-machine
discovery” to provide justification for not following its recommendation?

** Section 6.1.2
   For Ethernet,
   it is provided by simply connecting the network cable.

Isn’t this an oversimplification?  What if it there is local policy which
manages the behavior of the interface?  What about provisioning that might need
to occur on a switch?

** Section 6.1.2
   How to gain network
   connectivity is out of scope of this document.

If this is the case, why is there discussion of WiFi, Ethernet, references to
[I-D.richardson-emu-eap-onboarding], and 6LoWPAN.

** Section 6.3
   Overall, this may have
   operational implications when the registrar is part of a scalable
   framework as described in Section 1.3.1 of
   [I-D.richardson-anima-registrar-considerations].

If these operational implications are important, why are they an informative
reference in an unadopted I-D?

** Section 6.3.1
   This may be supported by a specific naming in the SAN (subject
   alternative name) component of the Registrar-Agent EE certificate,
   which allows the domain registrar to explicitly detect already in the
   TLS session establishment that the connecting client is a Registrar-
   Agent.

What is the standardized approach for this naming scheme to enable
interoperability?  Is this out of scope?

** Section 7.1.1.1.1
  The serial-number member SHALL contain the product-serial-number of
   the pledge with which the Registrar-Agent assumes to communicate as
   string.

Is this the same serial number as emitted in in mDNS in Section 6.1.2?

** Section 7.1.1.1.2.  are there any MTI “alg”s to support to ensure
interoperability?

** Section 7.3
   The registrar SHOULD verify the TLS client authentication of the
   Registrar-Agent, in particular if the TLS session is used to obtain
   the Registrar-Agent EE certificate (see Section 6.3).

Why wouldn’t the client authentication be verified?  When is this acceptable to
do?

** Section 9
   Besides the above, also consider the existing documents on
   operational modes for
   *  BRSKI registrars in
      [I-D.richardson-anima-registrar-considerations]

   *  BRSKI MASA in [I-D.richardson-anima-masa-considerations]

What does it mean to “consider” these documents?  Are they relevant operational
considerations?



_______________________________________________
Anima mailing list -- anima@ietf.org
To unsubscribe send an email to anima-le...@ietf.org

Reply via email to