[OPSAWG] Christian's review of draft-mm-wg-effect-encrypt-13

2017-12-04 Thread Christian Huitema
services, which do not appear to be based on any IETF standard. I think the document would be stronger if some of the content of section 7 was moved to the appropriate part of section 2, and if the speculative statements were published as a separate document. 8.  Response to Increased Encryption and Looking Forward Looks reasonable. -- Christian Huitema ___ OPSAWG mailing list OPSAWG@ietf.org https://www.ietf.org/mailman/listinfo/opsawg

Re: [OPSAWG] Secdir early review of draft-ietf-opsawg-sbom-access-09

2022-09-16 Thread Christian Huitema
enough, and I also don't know whether the manufacturer should be the sole source of this information. But it is certainly better than not publishing the information. -- Christian Huitema On 9/15/2022 10:45 PM, Eliot Lear wrote: Hi Christian, Thanks for your review.  To summariz

Re: [OPSAWG] Secdir early review of draft-ietf-opsawg-sbom-access-09

2022-09-29 Thread Christian Huitema
mize the potential threat: "some data nodes" (how many? just a few?), "may be considered sensitive" (but perhaps the authors doubt it?), "in some network environments" (which ones? just a few?). I would really like to read something more direct. -- Christian Huit

Re: [OPSAWG] Last Call Review of draft-ietf-opsawg-mud-acceptable-urls-10

2024-02-28 Thread Christian Huitema
triggers some intrusion detection system. This is really no different than a rogue device generating a random MUD URL.  Similarly, I would prefer not to restate the security considerations of RFC 8520, but simply reference them. Yes. As I said, it is a mild attack, and yes it

Re: [OPSAWG] Last Call Review of draft-ietf-opsawg-mud-acceptable-urls-10

2024-02-28 Thread Christian Huitema
On 2/28/2024 2:15 AM, Eliot Lear wrote: Hi Christian, Just on this point: On 28.02.2024 10:05, Christian Huitema wrote: How do you know that a specific URL is a rollback? It looks easy when the example say "revision1" and "revision2", but I am sure there are cases w

Re: [OPSAWG] Last Call Review of draft-ietf-opsawg-mud-acceptable-urls-10

2024-02-29 Thread Christian Huitema
hat this scales as the number of device types, not the number of devices, times the number of valid URL revisions per type, not the number of attack URL. So, you are right, this should be manageable. I did approve your PR on GitHub. -- Christian Huitema

Re: [OPSAWG] Last Call Review of draft-ietf-opsawg-mud-acceptable-urls-10

2024-02-29 Thread Christian Huitema
hear from you soonish if you are happy or unhappy with these changes, and I'll post a new version on Friday March 1. I did approve those changes in GitHub. The draft looks better now... Once you have a version N+1, I will update my review. But I am not sure I can do this befo

Re: [OPSAWG] [Last-Call] Secdir telechat review of draft-ietf-opsawg-mud-acceptable-urls-11

2024-04-02 Thread Christian Huitema
. On 4/2/2024 11:56 AM, Christian Huitema via Datatracker wrote: Reviewer: Christian Huitema Review result: Ready acceptable-urls-10-secdir-lc-huitema-2024-02-19/), I made a number of recommendations. One of the first recommendation was to clarify whether the distinction between "small ch

Re: [OPSAWG] Christian's review of draft-mm-wg-effect-encrypt-13

2018-01-19 Thread Christian Huitema
s this does not appear as an endorsement of the various atrocities described in the draft... -- Christian Huitema ___ OPSAWG mailing list OPSAWG@ietf.org https://www.ietf.org/mailman/listinfo/opsawg

Re: [OPSAWG] Christian's review of draft-mm-wg-effect-encrypt-13

2018-01-31 Thread Christian Huitema
;ll respond on list when we get to this set of comments. >> >> Best regards, >> Kathleen >> >> On Mon, Dec 4, 2017 at 11:23 AM, Christian Huitema >> wrote: >>> The high level summary is that draft-mm-wg-effect-encrypt version 13 is >>> significantly

[OPSAWG] Christian's review of draft-mm-wg-effect-encrypt-22

2018-02-24 Thread Christian Huitema
ould go on with more detailed feedback, but I want to keep this review short, and maybe I am suffering a bit from review fatigue. My final point is that there are quite a few typos in the draft. Please run a spell checker and fix them. -- Ch

Re: [OPSAWG] [Last-Call] Secdir last call review of draft-ietf-opsawg-model-automation-framework-06

2020-10-05 Thread Christian Huitema
On 10/5/2020 1:02 AM, mohamed.boucad...@orange.com wrote: > Hi Christian, > > Thank you for the review. > > Please see inline. > > Cheers, > Med > >> -----Message d'origine- >> De : Christian Huitema via Datatracker [mailto:nore...@ietf.org] &g

[OPSAWG] Secdir early review of draft-ietf-opsawg-sbom-access-09

2022-09-15 Thread Christian Huitema via Datatracker
Reviewer: Christian Huitema Review result: Has Issues This is an early review of this document by the Security Directorate, as requested by the WG. The document is well written, but in my opinion the security section needs a bit of work. The document proposes to have devices publish a software

[OPSAWG] Secdir last call review of draft-ietf-opsawg-service-assurance-architecture-11

2022-11-20 Thread Christian Huitema via Datatracker
Reviewer: Christian Huitema Review result: Has Nits I have reviewed this document as part of the security directorate's ongoing effort to review all IETF documents being processed by the IESG. These comments were written primarily for the benefit of the security area directors. Document ed

[OPSAWG] Secdir telechat review of draft-ietf-opsawg-service-assurance-architecture-12

2022-12-20 Thread Christian Huitema via Datatracker
Reviewer: Christian Huitema Review result: Ready My review of version 11 of this draft was making a number of suggestions. These suggestions have largely been addressed in the version 12 of the draft: * The risk caused by compromised agents are addressed by setting permissions according to [I

[OPSAWG] Secdir last call review of draft-ietf-opsawg-sbom-access-14

2023-03-08 Thread Christian Huitema via Datatracker
Reviewer: Christian Huitema Review result: Ready I have reviewed the changes between draft-09, which I reviewed in September 2022, and draft-14, the most recent version. The main concern expressed in my review was that "defense at scale" might also enable "attack at scale".

[OPSAWG] Secdir last call review of draft-ietf-opsawg-mud-acceptable-urls-10

2024-02-19 Thread Christian Huitema via Datatracker
Reviewer: Christian Huitema Review result: Has Issues Mud URL I reviewed this document as part of the Security Directorate's ongoing effort to review all IETF documents being processed by the IESG. These comments were written primarily for the benefit of the Security Area Directors. Doc

[OPSAWG] Secdir telechat review of draft-ietf-opsawg-mud-acceptable-urls-11

2024-04-02 Thread Christian Huitema via Datatracker
Reviewer: Christian Huitema Review result: Ready acceptable-urls-10-secdir-lc-huitema-2024-02-19/), I made a number of recommendations. One of the first recommendation was to clarify whether the distinction between "small changes" and "big changes" was really necessary, an

[OPSAWG] Secdir last call review of draft-ietf-opsawg-model-automation-framework-06

2020-10-03 Thread Christian Huitema via Datatracker
Reviewer: Christian Huitema Review result: Has Issues The document proposes an architecture for describing and provisioning services such as L3VPN or L2VPN. This is an ambitious architecture, aiming at providing end-to-end services over concatenations of network services provided by independent

[OPSAWG] Secdir telechat review of draft-ietf-opsawg-model-automation-framework-10

2020-10-26 Thread Christian Huitema via Datatracker
Reviewer: Christian Huitema Review result: Ready I have reviewed the differences between the recent draft-10 and draft-06 that I reviewed previously. Draft-10 includes the changes suggested during the discussion of my previous review with authors. The document is ready