Hi John,

Thanks for your comment, we have updated the draft according to your comments, 
please check.
Link: 
https://author-tools.ietf.org/iddiff?url2=draft-ietf-pce-stateful-pce-optional-11

Thanks,
Cheng


From: Dhruv Dhody <d...@dhruvdhody.com>
Sent: Tuesday, November 19, 2024 5:29 AM
To: John Scudder <j...@juniper.net>
Cc: The IESG <i...@ietf.org>; draft-ietf-pce-stateful-pce-optio...@ietf.org; 
pce-cha...@ietf.org; pce@ietf.org
Subject: Re: John Scudder's No Objection on 
draft-ietf-pce-stateful-pce-optional-10: (with COMMENT)

Hi John,

On Tue, Nov 19, 2024 at 2:59 AM John Scudder via Datatracker 
<nore...@ietf.org<mailto:nore...@ietf.org>> wrote:
John Scudder has entered the following ballot position for
draft-ietf-pce-stateful-pce-optional-10: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to 
https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-pce-stateful-pce-optional/



----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

Thanks for this document. I have two questions:

### Section 2, why not MUST?

```
When the P flag is set in the PCRpt message received on a PCEP session on which
the R bit was set by both peers, the object SHOULD be taken into account by the
PCE.

```

Under what circumstances is it OK for the PCE to ignore an object whose P flag
is set? In other words, why isn't this a MUST?

Dhruv: Good point! Authors/WG - any objection to making it a MUST?
[Cheng]Yes, MUST is correct. Also ‘was’=>‘is’

### Section 4, explicitly set aside

```
As per [RFC8231], it is RECOMMENDED that these PCEP extensions can only be
activated on authenticated and encrypted sessions across PCEs and PCCs
belonging to the same administrative authority, using Transport Layer Security
(TLS) [RFC8253] as per the recommendations and best current practices in
[RFC9325] (unless explicitly set aside in [RFC8253]).

```

I'm curious about the parenthetical comment. Can you provide an example of a
recommendation or best current practice that was explicitly set aside in RFC
8253? I did go look at the Security Considerations of RFC 8253 and didn't see
anything like that.

Dhruv: We have been sticking to this text that had an agreement with past Sec 
ADs.

There are some details in Section 3.4 of RFC 8253 that might not be matching 
exactly to RFC 9325 - such as MUST for TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 
in RFC 8253 where as RECOMMENDED in RFC 9325.

Thanks!
Dhruv (as document shepherd)
[Cheng]We can delete this. Please see the diff.



_______________________________________________
Pce mailing list -- pce@ietf.org
To unsubscribe send an email to pce-le...@ietf.org

Reply via email to