Hi Barry,

Thank you for the careful review. I have updated the draft in github 
(https://github.com/emu-wg/eaptls-longcert). Here is the diff for your 
convenience: 
https://tools.ietf.org/rfcdiff?url1=https://tools.ietf.org/id/draft-ietf-emu-eaptlscert.txt&url2=https://emu-wg.github.io/eaptls-longcert/draft-ietf-emu-eaptlscert.txt.
 
I will wait for all the comments to come in before submitting a new version.

Regarding your comment of informational vs. applicability statement: I 
am not opposed to the idea. I am happy to follow whatever the IESG 
recommends.

--Mohit

On 10/28/20 9:21 PM, Barry Leiba via Datatracker wrote:
> Barry Leiba has entered the following ballot position for
> draft-ietf-emu-eaptlscert-06: No Objection
>
> When responding, please keep the subject line intact and reply to all
> email addresses included in the To and CC lines. (Feel free to cut this
> introductory paragraph, however.)
>
>
> Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
> for more information about IESG DISCUSS and COMMENT positions.
>
>
> The document, along with other ballot positions, can be found here:
> https://datatracker.ietf.org/doc/draft-ietf-emu-eaptlscert/
>
>
>
> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
>
> Thanks for this; it will be useful to have this issue fixed.
>
> There’s something I’d like to discuss, but without making it a blocking 
> DISCUSS:
> While I understand the reason for putting this forward as Informational, it
> does strike me more as a Standards Track Applicability Statement.  BCP 9 says
> (in RFC 2026 Section 3.2):
>
>     An Applicability Statement specifies how, and under what
>     circumstances, one or more TSs may be applied to support a particular
>     Internet capability.
>
> Reading the rest of Section 3.2 as well, I think that it fits exactly what
> you’re doing with this document: the document is saying that there’s an
> interoperability problem with large certs and long chains, and here are things
> to do in order to make that work.  Let’s please have a brief discussion about
> whether this should instead be published at Proposed Standard as an AS.
>
> —————
>
> Below are some nits that I hope you’ll consider, but there’s no need to 
> respond
> in detail here; please do as you think best.
>
> — Section 1 —
>
>     vendor specific EAP methods.
>
> Need a hyphen in “vendor-specific”.
>
>     EAP-TLS
>     deployments typically authenticates both the EAP peer and the EAP
>
> Make it “authenticate”.
>
>     Section 3.1 of [RFC3748] states that EAP implementations can assume a
>     MTU of at least 1020 octets from lower layers.
>
> Unless you have a way of pronouncing “MTU” that I don’t, make it “an MTU”.
>
>     Such fragmentation can not only negatively
>     affect the latency, but also results in other challenges.
>
> The “can” is misplaced; make it “not only can affect”.
>
> — Section 2 —
>
>     The document additionally uses the terms trust anchor and
>     certification path defined in [RFC5280].
>
> I would put “trust anchor” and “certification path” in quotes here.
>
> — Section 3 —
>
>     Certificate sizes can however be large
>
> Commas are needed both before and after “however”.  Also, the list talks about
> a singular “certificate”, so the lead-in should match that (and you don’t need
> to say that a *size* can be large): “A certificate can, however, be large for 
> a
> number of reasons:”
>
> The list is also not parallel (the third item, in particular, is not like the
> others).  I would make the whole list be complete sentences, like this,
> referring to “a certificate” in the lead-in:
>
> NEW
>     o  It can have a long Subject Alternative Name field.
>
>     o  It can have long Public Key and Signature fields.
>
>     o  It can contain multiple object identifiers (OID) that indicate the
>        permitted uses of the certificate as noted in Section 5.3 of
>        [RFC5216].  Most implementations verify the presence of these OIDs
>        for successful authentication.
>
>     o  It can contain multiple user groups.
> END
>
> — Section 4.1 —
>
> Throughout this paragraph you refer to “size of public keys” and “size of
> digital signatures”.  It’s a really nitty nit, but I would make these all
> singular, because we’re really talking about the size of an individual public
> key or digital signature, not the size of a collection of them.
>
>     authentication which can alleviate the problem of authenticators
>
> There needs to be a comma before “which”.
>
>     ECC based cipher suites with existing code can significantly
>
> Hyphenate “ECC-based”.
>
> — Section 4.1.1 —
>
>     OIDs are used lavishly in X.509 certificates
>
> I like it: “lavishly” is not a word we often see in RFCs.  :-)
>
>        DNs
>        used in the issuer and subject fields as well as numerous
>        extensions.
>
> This is not a complete sentence; please fix that (I think you’re just missing
> “are” after “DNs”).
>
>     CN=Coolest IoT Gadget Ever
>
> Oh!  I want that!
>
>
>
> _______________________________________________
> Emu mailing list
> Emu@ietf.org
> https://www.ietf.org/mailman/listinfo/emu
_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to