Deb Cooley has entered the following ballot position for
draft-ietf-opsawg-mud-tls-15: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to 
https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ 
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-opsawg-mud-tls/



----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

Thank you to Linda Dunbar for the secdir review of this draft.

General comment:  Personally, I think this draft needs a rewrite to tighten and
clarify the language used.  I was 'this close' to filing a discuss.

Specific comments:

Abstract:  I thought originally that this was a profile of (D)TLS, but it is
not.  At best, I'd call this a framework to allow a manufacturer to create a
profile.  Replacing 'incorporate' with 'allow manufacturers to define' might
make it more clear.

Section 1, para 2:  I share Roman's concern about the age of the reference, and
the claims made by that reference a full 8 years later.

Section 1, para 2, bullet 3:  I'm not sure what 'self-signed certificates
compared with typical legitimate software' means.  As written it seems like an
'apples to oranges' comparison?  Maybe the authors mean that they see more
self-signed certificates compared with CA certificates that the IOT device
trusts'?

Section 1, para 3:  Replace the first phrase of the first sentence with:  'If
(D)TLS profile parameters are selected, the following...'?  It needs to be
clear that this RFC is establishing a way for a profile to be defined for both
DTLS and TLS.

Section 1, para 3, bullet 1:  Please define ACL.  And if it is 'access control
list', please explain what that means in this context.  [later in the draft it
is use in a way that I'm not used to - i.e. not as a way to control access....]

Section 3:  In general, a malware developer just needs a key and certificate
signed by any of the IOT device's trusted certificate authorities (CAs).  How
hard that is depends on how many CAs the IOT device trusts.

Section 4:  If these fields of the handshake are in the clear, then it is
possible that the malware developer can see them just as easily as the
middlebox.  It is always good practice for a server to reject connection
attempts that don't follow the installed configuration.  I'm not sure what the
value is of a middlebox that is not a (D)TLS proxy in this case.

Section 5:  The YANG modules establish the framework for a manufacturer to
design and deploy a (D)TLS profile.  The YANG module itself makes no
selections.  It is just a laundry list of options that can be chosen.

Section 8, para 2:  These are statements made by the authors, is there a
reference or evidence to back up that claim?

Section 8.1-8.3:  As I've commented in the past, these statements are not
actually security considerations.  Given that it has apparently been agreed
that the statements are sufficient, no change is required.



_______________________________________________
OPSAWG mailing list -- opsawg@ietf.org
To unsubscribe send an email to opsawg-le...@ietf.org

Reply via email to