(My email client sometimes does unexpected things with message encryption. 
Sending again with plaintext assured...)

> -----Original Message-----
> From: Benjamin Kaduk <ka...@mit.edu>
> Sent: Friday, July 27, 2018 1:52 PM
> To: The IESG <i...@ietf.org>
> Cc: draft-ietf-regext-rdap-object-...@ietf.org; Gould, James
> <jgo...@verisign.com>; regext-cha...@ietf.org; Gould, James
> <jgo...@verisign.com>; regext@ietf.org
> Subject: [EXTERNAL] Benjamin Kaduk's No Objection on draft-ietf-regext-
> rdap-object-tag-04: (with COMMENT)
>
> Benjamin Kaduk has entered the following ballot position for
> draft-ietf-regext-rdap-object-tag-04: No Objection
>
> When responding, please keep the subject line intact and reply to all
> email addresses included in the To and CC lines. (Feel free to cut this
> introductory paragraph, however.)
>
>
> Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
> for more information about IESG DISCUSS and COMMENT positions.
>
>
> The document, along with other ballot positions, can be found here:
> https://datatracker.ietf.org/doc/draft-ietf-regext-rdap-object-tag/
>
>
>
> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
>
> I was a little surprised to see that this document targets BCP status, not
> Proposed Standard.  Was there much discussion of this question in the WG?
>
> Section 2
>
>    Service provider tags are concatenated to the end of RDAP query
>    object identifiers to unambiguously identify the authoritative server
>
> It seems like it is the combination of concatenation of the service
> provider tag, and the use of the rdap_objectTag_level_0 rdapConformance
> attribute that provides the unambiguous property; I would like to see this
> caveat made more clear here.

Thanks for the review, Benjamin. The rdapConformance attribute doesn't do 
anything to identify the authoritative server. It's a clue to the client that 
the server has implemented this particular practice.

> Also, per https://www.iab.org/2016/11/07/iab-statement-on-ipv6/, please
> consider using IPv6 addresses in the examples.

The example copied into this document comes directly from Section 5.3 of RFC 
7483. I'd prefer to keep it as-is to maintain consistency with that cited 
reference.

> Section 5.1
>
> Are all provided URLs supposed to be functionally different?  If not, how
> do we tell which ones do what?

Practice thus far in the RDAP bootstrap registries has been to register http 
and https URLs. The scheme of the URL identifies the functional difference.

> Section 7
>
> Perhaps note that it is using IANA as a well-known central trusted
> authority in order to provide the property of allowing users to get RDAP
> data from an authoritative source?

Sure, OK.

>    [...] The method has the same security
>    properties as the RDAP protocols themselves.  The transport used to
>    access the IANA registries can be more secure by using TLS [RFC5246],
>    which IANA supports.
>
> Well, I don't know that "the same as" is quite right, especially given the
> following sentence.  The composed chain of "talk to iana, talk to referred
> RDAP server" depends both on the security of the connection to the RDAP
> server and that of the connection to IANA; it seems prudent to note that
> if TLS is used for the RDAP connection, TLS should also be used when
> talking to IANA, or even that TLS should always be used when talking to
> IANA.

OK, how about this text?

OLD:
This practice helps to ensure that end users will get RDAP data from an 
authoritative source using a bootstrap method to find authoritative RDAP 
servers, reducing the risk of sending queries to non-authoritative sources. 
The method has the same security properties as the RDAP protocols themselves. 
The transport used to access the IANA registries can be more secure by using 
TLS [RFC5246], which IANA supports.

NEW:
This practice uses IANA as a well-known, central trusted authority to provide 
the property of allowing users to get RDAP data from an authoritative source, 
reducing the risk of sending queries to non-authoritative sources and 
divulging query information to unintended parties.  Additional privacy 
protection can be gained by using TLS [RFC5246] to provide data 
confidentiality when retrieving registry information from IANA.

Scott
_______________________________________________
regext mailing list
regext@ietf.org
https://www.ietf.org/mailman/listinfo/regext

Reply via email to