Thanks for addressing these issues, Tiru.  To confirm that this document
now reflects IETF consensus, I think it would be logical to send it to the
TLS WG (noting those changes) and confirm that it now has consensus there.

On Mon, Jan 9, 2023 at 1:07 AM tirumal reddy <kond...@gmail.com> wrote:

> Hi Ben,
>
> I re-looked into the discussion in the TLS WG mailing list and we have
> addressed all the comments raised by the WG members.
>
> The issues raised by the TLS WG and addressed in the draft are:
>
> (a) We added Section 6 to explain the rules to processing the MUD (D)TLS
> rules to handle ossification and updated Section 10 to enable faster update
> to the YANG module.
> (b) Updates to the draft that the YANG module must not include GREASE
> values (see Section 5).
> (c) Privacy issues related to not revealing the MUD URL to an attacker is
> discussed in Section 9.
>
> Please let us know if you see any other pending issues.
>
> Cheers,
> -Tiru
>
> On Fri, 6 Jan 2023 at 21:43, Ben Schwartz <bem...@google.com> wrote:
>
>> Since this happened to cross my inbox, I want to reiterate that, in my
>> view, this document has not been properly reviewed by the TLS WG.  As the
>> shepherd's writeup notes, previous reviews in the TLS group raised some
>> significant concerns about whether this draft's approach is advisable.
>>
>> I would encourage the responsible AD(s) to make sure that this document
>> has strong consensus support from the TLS WG before proceeding.
>>
>> On Fri, Nov 18, 2022 at 12:29 PM Linda Dunbar via Datatracker <
>> nore...@ietf.org> wrote:
>>
>>> Reviewer: Linda Dunbar
>>> Review result: Has Nits
>>>
>>> I have reviewed this document as part of the security directorate's
>>> ongoing
>>> effort to review all IETF documents being processed by the IESG.  These
>>> comments were written primarily for the benefit of the security area
>>> directors.
>>> Document editors and WG chairs should treat these comments just like any
>>> other
>>> last-call comments.
>>>
>>> This document extends the Manufacturer Usage Description specification to
>>> incorporate the (D)TLS profile parameters for a network security service
>>> to
>>> identify unexpected (D)TLS usage. The document has very good description
>>> of
>>> common malware behavior that is informative.
>>>
>>> Questions
>>> - Are the profile on the remote IoT device or on the network device? If
>>> the
>>> profile is on remote IoT devices, are those attributes in the profiles
>>> attached
>>> as metadata when requesting TLS connections? Are those attributes
>>> encrypted? -
>>> If the Malware on IoT doesn't participate in TLS, can those MUD be used
>>> to
>>> detect the Malware on the remote IoT devices?
>>>
>>> - Page 6, first paragraph says:
>>>  "malware developers will have to develop malicious agents per IoT
>>> device type,
>>>  manufacturer and model, infect the device with the tailored malware
>>> agent and
>>>  will have keep up with updates to the device's (D)TLS profile
>>> parameters over
>>>  time."
>>>
>>> Does it mean that if all the IoT devices deployed in the network
>>> register their
>>> DeviceType/ManufacturerName/Model with the network services, then the
>>> network
>>> services can validate the TLS requests from the IoT?
>>>
>>> -  Section 3 last paragraph says that "compromised IoT devices are
>>> typically
>>> used for launching DDoS attacks". Can today's TLS re-negotiation
>>> validate the
>>> TLS requests by evaluating if the server certificates are signed by the
>>> same
>>> certifying authorities trusted by the IoT device"?
>>>
>>> Thank you very much,
>>>
>>> Linda Dunbar
>>>
>>>
>>> _______________________________________________
>>> secdir mailing list
>>> sec...@ietf.org
>>> https://www.ietf.org/mailman/listinfo/secdir
>>> wiki: https://trac.ietf.org/trac/sec/wiki/SecDirReview
>>>
>>

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

_______________________________________________
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg

Reply via email to