On 17/01/2012 10:16, Brian Trammell wrote:
Hi, Alexey,

Thanks for the review; questions and comments thereon inline...

On Jan 14, 2012, at 9:45 PM, Alexey Melnikov wrote:

I am the assigned Gen-ART reviewer for this draft. For background on Gen-ART, please 
see the FAQ at<http://wiki.tools.ietf.org/area/gen/trac/wiki/GenArtfaq>.

Please resolve these comments along with any other Last Call comments you may 
receive.

Document: draft-ietf-mile-rfc6046-bis-05
Reviewer: Alexey Melnikov
Review Date: 2012–01–14
IETF LC End Date: 2012-01-17
IESG Telechat date: 2012-01-19

Summary: This draft is almost ready for publication as a Proposed Standard RFC.


Major issues:

In Section 3:

   The RID callback MUST contain a zero-length entity body
   and a 'RID-Callback-Token' entity header

[Minor issue] "header" -->  "header field" (header is the collection of all 
header fields).

   , itself containing a unique
   token generated by the receiving RID system.

I am missing ABNF for the new header field.
Seems a little superfluous... it's an opaque string, but I suppose we should 
point out it doesn't contain \r or \n...
Saying it is an opaque string is Ok, but you don't even specify which characters are allowed in it.
  Will add.
Thanks.
   RID systems MUST use TLS version 1.1 [RFC4346] or higher with mutual
   authentication for transport confidentiality, identification, and

Do you mean that a RID client must use X.509 certificates?
Well, each RID system (HTTP client or server) is identified by an X.509 certificate 
(hence "mutual"); how can I make this clearer?

   authentication, as in [RFC2818].

I find the whole sentence to be confusing. Note that the rules of RFC 6125 for 
certificate verification are stricter than in RFC 2818 and this sentence can be 
read as conflicting with the paragraph below which requires use of RFC 6125. 
What are you trying to say here?
The intention here is "Use current best practices as would be supported by off-the-shelf 
HTTP/1.1 and TLS 1.1 implementations to provide mutual authentication." "Current best 
practices", however, seems to be something of a moving target.

I cite 2818 as it is the current binding between HTTP/1.1 and TLS. I cite 6125 
solely for certificate verification.
How about something like this:

OLD:
  RID systems MUST use TLS version 1.1 [RFC4346] or higher with mutual
  authentication for transport confidentiality, identification, and
  authentication, as in [RFC2818].

NEW:
RID systems MUST use HTTP over TLS as specified in [RFC2818], with the exception
  of server TLS identity verification which is detailed below.
  RID systems MUST use TLS version 1.1 [RFC4346] or higher with mutual
  X.509 authentication. TLS provides for transport confidentiality,
  identification, and authentication.
   RID systems MUST provide for the verification of the identity of a
   RID system peer presenting a valid and trusted certificate, by
   verifying the fully-qualified domain name and service name from the
   DNS SRV record, if available, against that stored in the certificate,

I am confused: this is the first time DNS SRV records are mentioned
(BTW, they need a Normative Reference). Earlier text seem to suggest that DNS 
SRV are not used to locate protocol endpoints. If RID is using DNS SRV, then 
information about how it is used is missing from the document.
It doesn't. Was trying to point out here that SRV must be matched if (for 
deployment-specific reasons) it was present. This is simply a poor attempt at 
citing 6125.
SRV-ID are really only applicable to protocols which are using DNS SRV. So I would have prohibited them... But if you want to keep using them, you need to specify what is the service name you would expect in them.
   as in Section 6 of [RFC6125].

RFC 6125 allows for various options and this paragraph doesn't seem to cover 
all of them. I suggest you check Section 13.7.1.2.1 of RFC 6120 for an example 
of what should be specified (ignore XmppAddr identifier type, as it is very 
XMPP specific). For X.509 SANs which are disallowed, you should say so.
Will do. (6125 is missing something here, a guide for using it in other 
specs...)

Best regards,

Brian

_______________________________________________
Gen-art mailing list
Gen-art@ietf.org
https://www.ietf.org/mailman/listinfo/gen-art

Reply via email to