Hi Ben,

And thanks for your feedback.

> First bullet point: "or other new concerns." makes this very open ended. Is
> this planned to be a standing working group? If not, can we put some
> constraints around "other new concerns”?

Understood.

Note that the sentence starts with “Update the security considerations…”
so the goal of these updates is about discovering new vulnerabilities and
the like; not any random other concerns. That being said, the text already
covers new vulnerabilities, so may be this is merely unnecessary text.

How about the following text:

OLD:
    Update the security
    considerations relating to EAP TLS, to document the implications
    of using new vs. old TLS version, any recently gained new
    knowledge on vulnerabilities, and the possible implications of
    pervasive survellaince or other new concerns.

NEW:

    Update the security
    considerations relating to EAP TLS, to document the implications
    of using new vs. old TLS version, any recently gained new
    knowledge on vulnerabilities, and the possible implications of
    pervasive surveillance.

(Also updates a typo.)

> The prohibition against obsoleting RFCs seems harsh. It's possible to require
> backwards compatibility without this restriction. I think it should be up to
> the working group to decide whether work can be better organized using updates
> or bis-drafts.

There was a detailed discussion among the participants about this aspect and
a reasonable, strong opinion that the current EAP-TLS RFC remain as
the primary, and that the new RFC would be an update to it when it comes
to TLS 1.3.

That being said, hmm… even my own draft for EAP-AKA’ bis currently says
“Obseletes RFC 5448 (if approved”)… so… how about this:

OLD:

The current RFCs shall not be obsoleted but
rather updated with either new information or instructions on
what is needed, for instance, to employ a new TLS version.

NEW:

The current EAP-TLS RFCs shall not be obsoleted but
rather updated with either new information or instructions on
what is needed, for instance, to employ a new TLS version.

> -3rd paragraph: "And the
> understanding of security threats in today's Internet evolves as
> well,..."
> 
> I suggest dropping “And"

Yes.

For Kathleen’s benefit, listing this in OLD/NEW style:

OLD:

And the
understanding of security threats in today's Internet evolves as
well, which has driven some of the evolution in these underlying
technologies.

NEW:

The
understanding of security threats in today's Internet evolves as
well, which has driven some of the evolution in these underlying
technologies.

> -- 2nd bullet: This is a bit hard to parse. I suggest:
> 
> OLD:
>    Update the EAP-AKA' specification (RFC 5448) to ensure that its
>     capability to provide a cryptographic binding to network context
>     stays in sync with what updates may come to the referenced 3GPP
>     specifications through the use of EAP in 5G.
> NEW:
>     Update the EAP-AKA' specification (RFC 5448) to ensure that its
>     capability to provide a cryptographic binding to network context
>     stays in sync with any 5G related updates to the referenced 3GPP
>     specifications.

Seems good. Thanks.

> Same bullet point: The second paragraph seems out of place; was it intended to
> be its own bullet point?

I don’t have a strong opinion, but the two somewhat separate issues
were listed under the same bullet item since both of them should
go into the same draft (rfc5448bis). The EAP TLS bullet item
does the same thing, i.e., update tech + describe new knowledge
of vulnerabilities.

> 4th bullet point: The second sentence seems like a non-sequiter. I suggest a
> top-level bullet point for "Analyzing opportunities to improve privacy..."

I’d be fine with that. Suggested text:

OLD:

  - Develop an extension to EAP-AKA' such that Perfect Forward Secrecy
    can be provided. There may also be privacy improvements that
    have become feasible with the introduction of recent identity
    privacy improvements in 3GPP networks.

NEW:

  - Analysing opportunities to improve privacy in EAP-AKA’. 

    Develop an extension to EAP-AKA' such that Perfect Forward Secrecy
    can be provided.

    There may also be other privacy improvements that
    have become feasible with the introduction of recent identity
    privacy improvements in 3GPP networks.

Jari

_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to