Der RFC Editor:

> 1) <!-- [rfced] Please insert any keywords (beyond those that appear in
> the title) for use on https://www.rfc-editor.org/search. -->

Please add:
* content-encryption key
* content-authenticated-encryption key

> 2) <!-- [rfced] Note that we changed "input key material" to "input keying 
> material" here because OKM is introduced as "output keying material (OKM)" 
> and IKM is defined as "input keying material" under Inputs.  Please let us 
> know if this is incorrect. 
> 
> Original:
>   The mitigation uses the HMAC-based Extract-and-Expand Key Derivation
>   Function (HKDF) [RFC5869] to derive output keying material (OKM) from
>   input key material (IKM).
> -->

RFC 5869 uses:
*  IKM = input keying material
*  OKM = output keying material

So, I think the changes you made are correct.

> 3) <!-- [rfced] Section 2: We converted this <artwork> into a <dl> that is 
> followed by <artwork>.  Please review and let us know if this is incorrect.  
> 
> Original XML:
>      <artwork><![CDATA[                                                       
>             
> Inputs:
>   IKM      input keying material
>   info     DER-encoded AlgoritmIdentifier
> 
> Output: 
>   OKM      output keying material (same size as IKM)
> 
> The output OKM is calculated as follows:
> 
>   OKM_SIZE = len(IKM)  /* length in octets */
>   IF OKM_SIZE > 8160 THEN raise error
> 
>   salt = "The Cryptographic Message Syntax"
>   PRK = HKDF-Extract(salt, IKM)
> 
>   OKM = HKDF-Expand(PRK, info, OKM_SIZE)
> 
> ]]></artwork>
> -->

It looks fine to me.


> 4) <!-- [rfced] Note that we lowercased the following throughout. Please 
> let us know if corrections are needed. 
> 
> Enveloped-data -> enveloped-data (matches RFC 5652)
> Authenticated-Enveloped-Data -> authenticated-enveloped-data (matches RFC 
> 5083)
> -->

This works for me.


> 5) <!-- [rfced] Because the text is quoted from RFC 5652, we marked it as a 
> blockquote and updated it to match RFC 5652 exactly. Note that the HTML and 
> PDF are linked to Section 6.3 of RFC 5652.  However, the TXT only says "see 
> Section 6.3".  Please let us know if this causes any concern. 
> 
> Original (first sentence included for context): 
>   The fourth step of constructing an Enveloped-data is repeated below
>   from Section 6 of [RFC5652]:
> 
>   4.  The content is encrypted with the content-encryption key.
>       Content encryption may require that the content be padded to a
>       multiple of some block size; see Section 6.3 of [RFC5652].
> 
> Current:
>   |  4.  The content is encrypted with the content-encryption key.
>   |  Content encryption may require that the content be padded to a
>   |  multiple of some block size; see Section 6.3.
> 
> -->

This works for me.


> 6) <!-- [rfced] Similar to above, we have changed the following to a 
> blockquote and updated "Section 6.3 of [RFC5652]" to "Section 6.3 of 
> [CMS]".  "6.3" currently links to Section 6.3 of RFC 3852 to accurately 
> reflect the intent of RFC 5083.  In order to link to RFC 3852, we had to 
> add an informative reference to RFC 3852 and an in-text citation.  Therefore, 
> we included a note to highlight that RFC 3852 
> has been obsoleted.  Please review and let us know if you have concerns or 
> have an alternate suggestion. 
> 
> Original (the first sentence is included for context):
>   The fifth step of constructing an Authenticated-Enveloped-Data is
>   repeated below from Section 2 of [RFC5083]:
> 
>   5.  The attributes collected in step 4 are authenticated and the CMS
>       content is authenticated and encrypted with the content-
>       authenticated-encryption key.  If the authenticated encryption
>       algorithm requires either the additional authenticated data (AAD)
>       or the content to be padded to a multiple of some block size,
>       then the padding is added as described in Section 6.3 of
>       [RFC5652].
> 
> Perhaps: 
>   |  5.  The attributes collected in step 4 are authenticated and the
>   |      CMS content is authenticated and encrypted with the content-
>   |      authenticated-encryption key.  If the authenticated encryption
>   |      algorithm requires either the additional authenticated data
>   |      (AAD) or the content to be padded to a multiple of some block
>   |      size, then the padding is added as described in Section 6.3 of
>   |      [CMS].
> 
>   Note that [CMS] refers to RFC 3852, which has been obsoleted by RFC 
>   5652, but the text in Section 6.3 was unchanged in RFC 5652.
> -->

This works for me.


> 7) <!-- [rfced] "message content plaintext" reads awkwardly to us.  Would 
> "plaintext message content" also work?  It appears twice in the following 
> text. 
> 
> Original:
>   Mitigation strategies for unwanted message traffic involve analysis
>   of message content plaintext.  When recipients accept unsolicited
>   encrypted messages, they become even more vulnerable to unwanted
>   traffic since many mitigation strategies will be unable to access the
>   message content plaintext.
> -->

Yes, I am fine with "plaintext message content".


> 8) <!-- [rfced] We replaced TBD0 with value 80 in the ASN.1, but we note a 
> disrepancy in the year:
> 
> Original:
>   id-mod-CMS-CEK-HKDF-SHA256-2024(TBD0)
> 
> The description in the IANA Considerations section uses 2023: 
>   id-mod-CMS-CEK-HKDF-SHA256-2023
> 
> Please review and let us know if 2023 or 2024 is correct.

Please use "2023" to be consistent with the IANA Considerations.


> In addition, are these slight variations in the ASN.1 correct? 
> 
> pkcs9(9) vs pkcs-9(9)
> id-smime(16) vs smime(16)
> 
> Section 3:
>      id-alg-cek-hkdf-sha256 OBJECT IDENTIFIER ::= { iso(1)
>         member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs-9(9)
>         smime(16) alg(3) 31 }
> 
> Appendix A: 
>   CMS-CEK-HKDF-SHA256-Module-2024
>     { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs9(9)
>       id-smime(16) id-mod(0) id-mod-CMS-CEK-HKDF-SHA256-2024(TBD0) }
> 
>   ... 
> 
>   id-alg-cek-hkdf-sha256 OBJECT IDENTIFIER ::= { iso(1) member-body(2)
>       us(840) rsadsi(113549) pkcs(1) pkcs-9(9) smime(16) alg(3) 31 }
> -->

Good catch.  Please use these in both places:
*  pkcs-9(9)
*  id-smime(16)


> 9) <!-- [rfced] The ANS.1 refers to RFC 5911, but it does not mention RFC 
> 5912.  Should RFC 5912 be mentioned? 
> 
> Original:
>   This ASN.1 module builds upon the conventions established in [RFC5911] 
>   and [RFC5912].
> 
>   ... 
> 
>   FROM AlgorithmInformation-2009 - in [RFC5911]
> 
> (note: double hyphen reduced to a single above so this can be included in a 
> comment.)
> -->

It would be fine to drop the reference to RFC 5912.  The reference to RFC  5911 
is good enough.


> 10) <!-- [rfced] In B.1 and B.2, we have changed <artwork> to <sourcecode 
> type="test-vectors"> because "test-vectors" are a defined sourcecode type 
> (see https://www.rfc-editor.org/rpc/wiki/doku.php?id=sourcecode-types).  
> Please review. 
> -->

This works for me.


> 11) <!-- [rfced] Please review the "Inclusive Language" portion of the 
> online Style Guide 
> <https://www.rfc-editor.org/styleguide/part2/#inclusive_language>
> and let us know if any changes are needed.  Updates of this nature 
> typically result in more precise language, which is helpful for readers.
> 
> Note that our script did not flag any words in particular, but this should 
> still be reviewed as a best practice.
> -->

I do not see any language that needs to be changed.

Russ

Attachment: signature.asc
Description: Message signed with OpenPGP

-- 
auth48archive mailing list -- auth48archive@rfc-editor.org
To unsubscribe send an email to auth48archive-le...@rfc-editor.org

Reply via email to