Hi,

Thanks again !


> On 20 Aug 2018, at 15:52, Spencer Dawkins at IETF 
> <spencerdawkins.i...@gmail.com> wrote:
> 
> Hi, Michael,
> 
> On Mon, Aug 20, 2018 at 3:57 AM Michael Welzl <mich...@ifi.uio.no> wrote:
> Hi Spencer!
> 
> Thank you so much for your detailed work and all these comments!
> I'm commenting in line below, and marking my comments with "MW:".
> I'm terminating my responses with a "--".
> 
> I'm attaching an update which incorporates the changes described in this 
> email, but I'm delaying its submission until it's clear that this 
> conversation has converged.
> 
> We're pretty darned converged. I have a couple of follow-ups below, but I 
> deleted everything that we're already good on (and thank you for those, in 
> advance).
> 
> My only significant question is on Section 7. 

Great - it seems this is also the only one that calls for a change of the 
version that I now have. So, I'm removing the rest and just keeping this:


> --
> 
> This text in 7.  Security Considerations
> 
>    Authentication, confidentiality protection, and integrity protection
>    are identified as transport features by [RFC8095].  As currently
>    deployed in the Internet, these features are generally provided by a
>    protocol or layer on top of the transport protocol; no current full-
>    featured standards-track transport protocol provides all of these
>    transport features on its own.  Therefore, these transport features
>    are not considered in this document, with the exception of native
>    authentication capabilities of TCP and SCTP for which the security
>    considerations in [RFC5925] and [RFC4895] apply.  The minimum
>    security requirements for a transport system are discussed in a
>    separate document [I-D.ietf-taps-transport-security].
> 
> confuses me, because I think at least two things are in play. First, I think 
> the point you're probably making is that the underlying transport protocols 
> remain unmodified, so the security considerations for each of those protocols 
> apply unchanged, and this document isn't doing anything to create new 
> security considerations. So, modulo SECDIR and SEC AD comments, I think 
> that's all you need to say. 
> 
> Second, you guys are the experts, but I think a reference to 
> [I-D.ietf-taps-transport-security] isn't actually needed for this document, 
> because that document surveys security protocols, rather than specifying 
> minimum security requirements. That document might someday discuss the 
> minimum security requirements, in the way this document discusses the minimum 
> set of transport services, but at least in  
> https://tools.ietf.org/html/draft-ietf-taps-transport-security-02 that 
> document is much more comparable to RFCs 8095 and 8304 than to this document. 
> 
> MW: I would agree about [I-D.ietf-taps-transport-security] if it didn't have 
> section 5.
> I believe section 5 in this document is an effort to do the same as minset 
> does, here;
> are you maybe asking for this section of [I-D.ietf-taps-transport-security] 
> to use a
> more authoritative tone?  Either way, as things stand now, the existence of
> [I-D.ietf-taps-transport-security] is used as a justification to not include 
> the
> security related features of TCP and SCTP in the minimum set, and I think this
> citation is necessary.
> 
> So, for what it's worth, I wouldn't have ever noticed that Section 5 of  
> [I-D.ietf-taps-transport-security] provided the equivalent of this document, 
> based on the Abstract and Introduction, which both talk about surveys a lot 
> more than minimum sets, but that's not your problem to solve (and I'm not 
> providing AD comments on documents that the working group is still working 
> on, because you guys are more likely to get stuff right than I am, so no 
> action required from anyone else). 
> 
> But what is for you ... 
> 
> At a minimum, I'd suggest qualifying the reference to  
> [I-D.ietf-taps-transport-security]  as "Section 5 of  
> [I-D.ietf-taps-transport-security] ", because I don't suppose that any other 
> reviewer is more likely to figure this out than I am, but ... 
> 
> Quoting from the Introduction in -02 of  I-D.ietf-taps-transport-security, 
> what that draft is covering is 
> 
>    This document provides a survey of commonly used or notable network
>    security protocols, with a focus on how they interact and integrate
>    with applications and transport protocols.  Its goal is to supplement
>    efforts to define and catalog transport services [RFC8095] by
>    describing the interfaces required to add security protocols.  It
>    examines Transport Layer Security (TLS), Datagram Transport Layer
>    Security (DTLS), Quick UDP Internet Connections with TLS (QUIC +
>    TLS), MinimalT, CurveCP, tcpcrypt, Internet Key Exchange with
>    Encapsulating Security Protocol (IKEv2 + ESP), SRTP (with DTLS), and
>    WireGuard.  
> 
> I may be confused about this, but I'm not seeing an obvious pattern match 
> between those protocols and "security related features of TCP and SCTP in the 
> minimum set". Is that document talking about what you hope it's talking 
> about? 
> 
> Assuming so ... I'm probably struggling with the idea that there is no 
> minimal set of transport services that doesn't involve one of the protocols 
> listed in I-D.ietf-taps-transport-security or a near equivalent. That may 
> really be the right thing for the working group to say, but I wanted to make 
> sure that's the point that's being made, because that's what I think you're 
> saying, by including the reference to I-D.ietf-taps-transport-security in 
> your security considerations. 
> 
> If the last sentence read 
> 
>   The minimum {delete "security"}
>    requirements for a {insert "secure"} secure transport system are discussed 
> in a
>    separate document [I-D.ietf-taps-transport-security].
> 
> I'd agree with that statement, without anyone having to explain anything to 
> me!

Can I just make this sentence replacement and be done with it?  I mean, it IS a 
very nice and clean solution, IMO...

Cheers,
Michael

_______________________________________________
Taps mailing list
Taps@ietf.org
https://www.ietf.org/mailman/listinfo/taps

Reply via email to