Deb Cooley has entered the following ballot position for
draft-ietf-emu-rfc7170bis-17: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to 
https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ 
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-emu-rfc7170bis/



----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

These are all pretty picky comments.  I won't be upset if you choose to ignore
some/all of them.

Section 3.11, para 2:  Part of the authentication process is to show that the
server presenting the certificate holds the private key.  Presentation of a
certificate is insufficient, it is the certificate validate (in TLS language)
that matters.  I'm not asking you to change anything here, just pointing out a
pet peeve.

Section 3.11, para 4: (because of my PKI background): "This ensures that the
authenticated TEAP peer is in possession of the private key used to sign the
certification request."  This is stated backwards, maybe "This ensures that the
signed certificate request is being presented by an authenticated TEAP peer
which is in possession of the private key."  But, this is very pedantic on my
part.

Section 3.11.2, para 2: "Alternatively, the supplied information could contain
private data which should not be sent over a TLS 1.2 connection where that data
would be exposed."  Since you have specified that TLS cipher suites that do not
provide confidentiality MUST NOT be used (Section 3.2), this seems like a weird
statement.  If you remove it, you can combine this paragraph with the next one.

Section 3.11.2, para 4:  It is not uncommon for a (private) CA to ignore some
fields in the CSR and instead populate the certificate fields based on local
policy.  I would add 'or modify' in addition to 'can refuse'.

Section 3.11.2, para 2-4:  Personally, I'd make this one paragraph.  It would
tighten up the section a bunch and possibly make it easier to understand.

Section 3.11.2, para 5 and beyond:  Well it could be used for other purposes,
except that you have specified in Section 3.3 that private CA SHOULD be used. 
Personally, I'd remove the rest of this section, unless you are attempting a
tutorial (and then I'd have other comments).

Section 4.2.12, para 2:  There is a lower case 'should' in first sentence, is
that correct?  Second sentence, if a Result TLV w/ failure is sent, is it
possible to ignore the deprecated TLV?  These two options appear to be at odds.

Section 7.1, last sentence:  This would be clearer if you said 'both server and
peer authentication' instead of 'mutual authentication'.  The normal assumption
for 'mutual auth' is that the peer has to authenticate.  In this case, we need
the server AND the peer to authenticate.

Section 7.5.1:  General comment:  Requiring (with a SHOULD) a private CA makes
it harder for an 'on-path attacker' to impersonate a server - a good thing.

Appendix C: I like this section.  But there is some terminology that isn't
explained.  '()' appears to be the contents of whatever message is being sent. 
'[]' I have no idea, in TLS 1.3 it would signify encrypted messages, but
clearly that can't be the case here (TLS server_key_exchange can't be
encrypted). I like the ASCII art in Section C.1-C.10, not so much in C.11 on
because it is harder to see which way the arrows point (less white space).

Deb



_______________________________________________
Emu mailing list -- emu@ietf.org
To unsubscribe send an email to emu-le...@ietf.org

Reply via email to