Hi, Alexey,

Thanks for the review; questions and comments thereon inline...

On Jan 14, 2012, at 9:45 PM, Alexey Melnikov wrote:

> I am the assigned Gen-ART reviewer for this draft. For background on Gen-ART, 
> please see the FAQ at 
> <http://wiki.tools.ietf.org/area/gen/trac/wiki/GenArtfaq>.
> 
> Please resolve these comments along with any other Last Call comments you may 
> receive.
> 
> Document: draft-ietf-mile-rfc6046-bis-05
> Reviewer: Alexey Melnikov
> Review Date: 2012–01–14
> IETF LC End Date: 2012-01-17
> IESG Telechat date: 2012-01-19
> 
> Summary: This draft is almost ready for publication as a Proposed Standard 
> RFC.
> 
> 
> Major issues:
> 
> In Section 3:
> 
>   The RID callback MUST contain a zero-length entity body
>   and a 'RID-Callback-Token' entity header
> 
> [Minor issue] "header" --> "header field" (header is the collection of all 
> header fields).
> 
>   , itself containing a unique
>   token generated by the receiving RID system.
> 
> I am missing ABNF for the new header field.

Seems a little superfluous... it's an opaque string, but I suppose we should 
point out it doesn't contain \r or \n... Will add.

>   RID systems MUST use TLS version 1.1 [RFC4346] or higher with mutual
>   authentication for transport confidentiality, identification, and
> 
> Do you mean that a RID client must use X.509 certificates?

Well, each RID system (HTTP client or server) is identified by an X.509 
certificate (hence "mutual"); how can I make this clearer?

>   authentication, as in [RFC2818].
> 
> I find the whole sentence to be confusing. Note that the rules of RFC 6125 
> for certificate verification are stricter than in RFC 2818 and this sentence 
> can be read as conflicting with the paragraph below which requires use of RFC 
> 6125. What are you trying to say here?

The intention here is "Use current best practices as would be supported by 
off-the-shelf HTTP/1.1 and TLS 1.1 implementations to provide mutual 
authentication." "Current best practices", however, seems to be something of a 
moving target.

I cite 2818 as it is the current binding between HTTP/1.1 and TLS. I cite 6125 
solely for certificate verification. 

>   RID systems MUST provide for the verification of the identity of a
>   RID system peer presenting a valid and trusted certificate, by
>   verifying the fully-qualified domain name and service name from the
>   DNS SRV record, if available, against that stored in the certificate,
> 
> I am confused: this is the first time DNS SRV records are mentioned
> (BTW, they need a Normative Reference). Earlier text seem to suggest that DNS 
> SRV are not used to locate protocol endpoints. If RID is using DNS SRV, then 
> information about how it is used is missing from the document.

It doesn't. Was trying to point out here that SRV must be matched if (for 
deployment-specific reasons) it was present. This is simply a poor attempt at 
citing 6125.

>   as in Section 6 of [RFC6125].
> 
> RFC 6125 allows for various options and this paragraph doesn't seem to cover 
> all of them. I suggest you check Section 13.7.1.2.1 of RFC 6120 for an 
> example of what should be specified (ignore XmppAddr identifier type, as it 
> is very XMPP specific). For X.509 SANs which are disallowed, you should say 
> so.

Will do. (6125 is missing something here, a guide for using it in other 
specs...)

Best regards,

Brian
_______________________________________________
Gen-art mailing list
Gen-art@ietf.org
https://www.ietf.org/mailman/listinfo/gen-art

Reply via email to