[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: Feedback on draft-ietf-rap-cops-tls-06.txt



I guess that it just alternates between the security advisor 
and the WG (and/or eduitors/authors)... but now we've been waiting
for close to two weeks without any response from WG.

<ad hat on>
This is not gonna work 
I hope you understand the implied message here!
</ad hat on>

Thanks,
Bert 

> -----Original Message-----
> From: Wijnen, Bert (Bert) [mailto:bwijnen@lucent.com]
> Sent: maandag 27 oktober 2003 12:06
> To: Rap-wg (E-mail)
> Cc: Uri Blumenthal (E-mail)
> Subject: Feedback on draft-ietf-rap-cops-tls-06.txt
> 
> 
> Sorry for the long delay, but finally our Security Advisor has 
> found time to review revision 6.
> 
> I hope that the authors/editors and the WG can quickly 
> respond and act, so that we can now get some pressure to
> complete this last RAP-WG document soon.
> 
> Thanks,
> Bert 
> 
> -----Original Message-----
> From: Uri Blumenthal [mailto:uri@lucent.com]
> Sent: donderdag 23 oktober 2003 23:58
> To: Wijnen, Bert
> Cc: Blumenthal, Uri
> Subject: COPS etc.3.2.1. So is at least one protocol 
> mandatory? And why
> is it valid to make them all optional?
> 
> 
> Bert,
> 
> Sorry for prolonged silence - was sick and then took me
> time to get through the e-mail piles.
> 
> Here's my review of COPS-06, please forward it to the
> appropriate AD and WG chair(s).
> 
> ==================================================
> cops-06.txt
> 
> GENERIC COMMENTS.
> 
> I'd prefer the following important issues described
> somewhere:
> 	- key provisioning (how the initial/first keys
> 	  get in);
> 	- key management/update;
> 	- key requirments. What kind of keys are accepted?
> 	  Public Key in X.509 format only? Anything else?
> 	  Any reason why neither symmetric keys nor
> 	  password-based methods (such as SRP, or what's in
> 	  SSL) are there?
> 	- policy - how it gets there, how it's processed,
> 	  what it looks like, etc. Something comparable to
> 	  VACM of SNMPv3...
> 
> I found the text on Access Control exceedingly muddy/unclear. I'm
> coming from reasonably good understanding of Access Control, but
> shallow knowledge of COPS. Request rephrasing (and maiing it
> CLEARER).
> 
> Excessive use of abbreviations (PEP, PDP) without defining them
> in this document doesn't help.
> 
> Otherwise the document is OK, notwithstanding the following.
> 
> SPECIFIC COMMENTS.
> 
> 3.2.1.  So is at least one protocol mandatory? And why is it valid
> to make them all optional?
> 
> 4.4.  I'm not sure server (in the last case) should be allowed to
> just proceed establishing insecure connection. Perhaps better if
> the client decides how to proceed?
> 
> PDP implementations MUST NOT require use of access control?!  I'm
> violently against this prohibition.
> 
> 8. Forcing to choose between insecure and X.509 PKI infrastructure
> is unfair and improper. Recommendation: support Web of trust,
> possibly other...
> 
> PDP hostname availavle via Access Control mechanism? I don't
> understand - please clarify.
> 
> 9.1. And the point of backward compatibility with old insecure
> implementations is...?
> 
> References. RFC2748 is not of January 200 (unless it's a part
> of Gospel?).
>