Theresa, thanks for your review. Authors, thanks for your responses. I entered 
a No Objection ballot pointing out the remaining issues with the security 
considerations.

Alissa


> On Mar 9, 2020, at 11:26 PM, Theresa Enghardt <i...@tenghardt.net> wrote:
> 
> Hi Laurent,
> 
> Thanks for the new revision, which greatly improves the document.
> 
> However, I have a few comments on your new text:
> 
> In the text at the beginning of Section 3, you added text to give more 
> context, which is a great idea.
> However, I'm not sure about the first sentence: 
> "SCHC with CoAP will be used exactly the same way as it is applied in any 
> protocol as IP or UDP with the difference that the fields description needs 
> to be defined based on both headers and target values of the request and the 
> responses."
> To me the last part of this sentence sounds like for CoAP you have to define 
> a rule to match both a request and a reply packet, so you would have to match 
> two packets (in a single rule?). Is this really the case? I thought a single 
> rule always matches one packet, but maybe I misunderstood. In any case, could 
> you rephrase this to make it more clear, please?
> 
> Also, I saw some typos and grammar errors in Section 3:
> s/optmize/optimize/
> s/To performs/To perform/
> s/TV might be use/TV might be used/
> s/Resulting in a smaller compression residue./This results in a smaller 
> compression residue./
> 
> Some more nits in Section 7.3:
> s/TheSCHC/The SCHC/
> s/alreadypresent/already present/
> s/in section Section 4/in Section 4/
> 
> Regarding the Security Considerations, thanks for discussing this in your 
> interim meeting and for adding text.
> 
> I'll leave the judgment of whether any security aspects are still missing 
> etc. to the Secdir reviewer and/or ADs.
> 
> Regarding the text you added:
> On 05.03.20 23:50, Laurent Toutain wrote:
>> For the security section after discussion in the intermin meeting, we 
>> propose to add this:
>> 
>> This document does not have any more Security consideration than the ones 
>> already raised on {{rfc8724}}. Variable length residues may be used to 
>> compress URI elements. They cannot produce a packet expansion either on the 
>> LPWAN network or in the Internet network after decompression. The length 
>> send is not used to indicate the information that should be reconstructed at 
>> the other end, but on the contrary the information sent as a Residue. 
>> Therefore, if a length is set to a high value, but the number of bits on the 
>> SCHC packet is smaller, the packet must be dropped by the decompressor.
>> 
> Overall, I find this paragraph difficult to follow.
> What is the relationship between the first sentence and the rest of the 
> paragraph?
> First you say there are not more Security Considerations, then you say that 
> there are?
> 
> Please add a sentence that provides a context for your statements. Is this a 
> consideration that implementations need to be aware of in case variable 
> residues are used? Or is this a suggestion to use variable length residues to 
> make something more/less secure?
> 
> What is a packet expansion? I haven't seen this term in the rest of the 
> document. Is it a problem if they (the variable length residues or the URI 
> elements?) cannot produce a packet expanision?
> This sentence is hard to parse and seems gramatically broken: "The length 
> send is not used to indicate the information that should be reconstructed at 
> the other end, but on the contrary the information sent as a Residue."
> 
> 
>> OSCORE compression is also based on the same compression method described in 
>> {{rfc8427}}. The size of the Initialisation Vector residue size must be 
>> considered carefully. A too large value has a impact on the compression 
>> efficiency and a too small value will force the device to renew its key more 
>> often. This operation may be long and energy consuming.
>> 
> "This operation may be long and energy consuming." - Which operation? The 
> previous sentence talks about the size of an initialization vector, not about 
> an operation.
> 
> 
> Thanks,
> Theresa
> _______________________________________________
> Gen-art mailing list
> Gen-art@ietf.org
> https://www.ietf.org/mailman/listinfo/gen-art

_______________________________________________
Gen-art mailing list
Gen-art@ietf.org
https://www.ietf.org/mailman/listinfo/gen-art

Reply via email to