Barry,

Thank you for the review and feedback.  I provide my responses to your feedback 
inline below.  I will post draft-ietf-regext-login-security-05 with the changes 
based on your feedback.

--

JG

[cid:image001.png@01D255E2.EB933A30]

James Gould
Distinguished Engineer
jgo...@verisign.com<applewebdata://13890C55-AAE8-4BF3-A6CE-B4BA42740803/jgo...@verisign.com>

703-948-3271
12061 Bluemont Way
Reston, VA 20190

Verisign.com<http://verisigninc.com/>

From: regext <regext-boun...@ietf.org> on behalf of Barry Leiba 
<barryle...@computer.org>
Date: Tuesday, October 29, 2019 at 12:10 AM
To: "draft-ietf-regext-login-security....@ietf.org" 
<draft-ietf-regext-login-security....@ietf.org>
Cc: "regext@ietf.org" <regext@ietf.org>
Subject: [regext] AD review for draft-ietf-regext-login-security-04

I have mostly editorial comments that I hope you’ll consider, but that will not 
block anything.  My comment below for Section 4.1 is, though, something I want 
to discuss before I start last call.


— Section 1.1 —
Please use the new BCP 14 boilerplate and references; see RFC 8174

JG – That will be fixed.


   In examples, "C:" represents lines sent by a protocol client and "S:"
   represents lines returned by a protocol server.  Indentation and
   white space in examples are provided only to illustrate element
   relationships and are not a REQUIRED feature of this protocol.

This is not a BCP 14 key word, and should be “required” in lower case.

JG – That will be changed.

— Section 2 —
For other similar regext documents, ADs have suggested that the 
compatibility/migration recommendations be left in the document for 
publication, rather than asking the RFC Editor to remove them.  Unless there’s 
a good reason not to publish this section, please remove the request to the RFC 
Editor.

JG – I will remove the note to the RFC Editor so that the section remains.

— Section 3.1 —

   There MAY be multiple
   events returned that provides information for the client to address.

“provide”


JG – This will be fixed.

   The <loginSec:event> MAY include a free form description.

There should be a hyphen in “free-form” here and elsewhere when it’s used as a 
modifier.

JG – This will be fixed.  There are two occurrences of “free form” that will be 
changed to “free-form” in section 3.1.

   The enumerated list of "type" values include:

“includes”

JG – “include:” will be changed to “includes:”.

       "password":  Identifies a password expiry event, where the
           password expires in the future or has expired based on the
           "exDate" date and time.
       "certificate":  Identifies a client certificate expiry event,
           where the client certificate will expire at the "exDate" date
           and time..

Why are these worded differently?  Is there a reason they do not both say, << 
where the [thing] has expired or will expire at the “exDate” date and time. >> ?

JG – The wording is different, since if the certificate expires, the connection 
will fail prior to getting to the login command.  If the password expires, the 
client can execute the login command and therefore the server can include the 
security event post the expiry of the password in the login response.  
Therefore the server can only warn the client of an expired certificate in the 
login response prior to its expiry, but the server can inform the client of an 
expired password in the login response prior to or after the expiry of the 
password.

   "lang":  Identifies the language of the free form description if the
       negotiated language is something other than the default value of
       "en" (English).

This seems to imply that it should never be set to “en”.  If that isn’t what’s 
meant, it might be better said as, << Identifies the language of the free-form 
description.  The default is “en” (English). >>.

JG – This language was borrowed from the various EPP RFCs include RFC 5731.  
There is no intent to disallow inclusion of the “lang” attribute if the value 
is “en”.  I’ll change it based on your proposed language to make it clearer, 
but with “negotiated language” instead of “language”, since the greeting and 
the login command negotiate the language to use.

   Example login security event for a password expiring in a week:

There’s no context for “in a week.”  How about this?: << Example login security 
event for password expiration, where the current date is 2018-03-26: >>
(And similarly for the related example in Section 4.1.)

JG – Yes, that will cover future dates, I’ll make the change.  I believe the 
correct current date is 2018-03-25 for an expiry on 2018-04-01 in a week.  I’ll 
make a similar change for the example in section 4.1.

— Section 4.1 —

   <loginSec:pw>:  OPTIONAL plain text password that is case sensitive,
       has a minimum length of 6 characters, and has a maximum length
       that is up to server policy.  All leading and trailing whitespace
       is removed, and all internal contiguous whitespace that includes
       #x9 (tab), #xA (linefeed), #xD (carriage return), and #x20
       (space) is replaced with a single #x20 (space).  This element
       MUST only be used if the [RFC5730] <pw> element is set to the
       "[LOGIN-SECURITY]" value.

Two things here:


  1.  Are there any limitations on valid characters other than the four 
mentioned?  Is there any server policy involved?

JG – There are no additional constraints for valid characters in the draft or 
in RFC 5730.  The constraints defined in the draft are based on the selection 
of the XML schema “token” type, which matches the type in RFC 5730.  The XML 
schema “token” type constraints are explicitly defined in the draft based on 
feedback from the Working Group.  Server policy will define the specific 
password constraints (e.g., characters, minimum length, maximum length, 
restricted words) for the server.  An example is the use of 
draft-gould-regext-login-security-policy to define the password rules in EPP.

2. What is the reason for collapsing those, four characters, and not allowing a 
password to actually contain, say, a tab, or three consecutive spaces?  What 
about all the other Unicode characters that represent spaces in various forms, 
or zero-length characters?

JG – One goal of the draft is remove the 16 character maximum constraint in RFC 
5730 while supporting the same XML schema type of “token”.  The trimming and 
collapsing of whitespace is a feature of the XML schema “token” type that 
exists today based on what’s defined in RFC 5730.

—
Barry


On Fri, Oct 25, 2019 at 9:44 AM James Galvin via Datatracker 
<nore...@ietf.org<mailto:nore...@ietf.org>> wrote:
James Galvin has requested publication of draft-ietf-regext-login-security-04 
as Proposed Standard on behalf of the REGEXT working group.

Please verify the document's state at 
https://datatracker.ietf.org/doc/draft-ietf-regext-login-security/
_______________________________________________
regext mailing list
regext@ietf.org
https://www.ietf.org/mailman/listinfo/regext

Reply via email to