with [dc] in front...

On Thu, Nov 21, 2024 at 1:28 AM Dhruv Dhody <d...@dhruvdhody.com> wrote:

> Hi Deb,
>
> On Thu, Nov 21, 2024 at 5:13 AM Deb Cooley via Datatracker <
> nore...@ietf.org> wrote:
>
>> Deb Cooley has entered the following ballot position for
>> draft-ietf-pce-stateful-pce-vendor-12: No Objection
>>
>> When responding, please keep the subject line intact and reply to all
>> email addresses included in the To and CC lines. (Feel free to cut this
>> introductory paragraph, however.)
>>
>>
>> Please refer to
>> https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/
>> for more information about how to handle DISCUSS and COMMENT positions.
>>
>>
>> The document, along with other ballot positions, can be found here:
>> https://datatracker.ietf.org/doc/draft-ietf-pce-stateful-pce-vendor/
>>
>>
>>
>> ----------------------------------------------------------------------
>> COMMENT:
>> ----------------------------------------------------------------------
>>
>> Section 7, para 2:  The last () is a bit puzzling.  Is there something
>> specific
>> that is anticipated?  It might need some explanation. RFC8253 is old
>> enough
>> that TLS1.3 wasn't published yet, but RFC 9325 obviously covers both TLS
>> 1.2
>> and 1.3.
>>
>>
> Dhruv: As clarified to John [
> https://mailarchive.ietf.org/arch/msg/pce/1iIo5KlwH6pEIEsgEwa84Jztr7Q/],
> we have been sticking to this text that had an agreement with past Sec ADs
> :)
>
> [dc] obviously that 'agreement' wasn't in place for RFC 8553...  I'd like
a pointer to that agreement.


> There are some details in Section 3.4 of RFC 8253 that might not be
> matching exactly to RFC 9325 - such as MUST for
> TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 in RFC 8253 where as RECOMMENDED in
> RFC 9325.
>

[dc] so you are tell me that changing a 'MUST' for a 'RECOMMENDED' warrants
an exception clause?   Seems odd.

>
> And what you state is also true!
>
[dc] indeed.  The reason we update security RFCs are to ensure that
security is maintained, not frozen in some past state.

>
>
>> Section 7, para 3, sentence 1:  "The use of vendor-specific information as
>> defined in [RFC7470] and in this document may provide a covert channel
>> that
>> could be misused by PCEP speaker implementations or by malign software at
>> PCEP
>> speakers."  Perhaps it should be malicious vs malign?
>>
>>
> Dhruv: Agree, “malicious” is more appropriate as it describes intentional
> and harmful actions instead of something inherently evil!
>
>
>> Section 7, para 3, Sentences 2 and 3: Depending on the signaling design
>> of the
>> covert channel, detection by an overworked operator while in use is
>> difficult.
>> Prevention of malicious software at the PCEP speaker might be easier (not
>> easy,
>> just easier).  Software that is required to be protected by integrity,
>> authentication and authorization techniques will make the installation of
>> malicious software harder.  While I'm sure this is out of scope for this
>> draft,
>> it is a valid mitigation.
>>
>>
>>
> Dhruv: Are you thinking of text like this - "Appropriate steps need to be
> taken to prevent the installation of malicious software at the PCEP speaker
> by implementing robust integrity, authentication, and authorization
> techniques, which are out of scope of this draft."?
>

[dc] or  "Appropriate steps need to be taken to prevent the installation of
malicious software at the PCEP speaker by implementing robust integrity,
authentication, and authorization techniques *for installation and updating*,
which are out of scope of this draft."


> Thanks!
> Dhruv (as document shepherd)
>
_______________________________________________
Pce mailing list -- pce@ietf.org
To unsubscribe send an email to pce-le...@ietf.org

Reply via email to