Hi Mohit,

a couple of comments for the WGLC also from my side.

 0. Abstract:

    IMO it would be nice (but it's of course not strictly needed) to
    refer to the Lightweight CMP profile already in the abstract,
    maybe this way after the first sentence:

         It details the CoAP transfer option mentioned in the Lightweight CMP 
Profile.

 1. Section 1:

    encryption of messages -> protection of messages    (because
    authenticity is the predominant requirement)

    between CAs -> between RAs                          (between CAs
    makes little sense, but there may be more than one RA involved)

 2. Section 2.6:

    the Block-Wise transfer [RFC7959 <https://tools.ietf.org/html/rfc7959>] mode
       MUST be used for the CMP Transactions over CoAP

    I do not have a strong opinion here, but I fear that strictly
    requiring block-wise transfer may needlessly exclude simple
    implementations,
    which may be sufficient in scenarios where the payloads are known to
    be rather small.
    Writing SHOULD or RECOMMENDED would state that implementors can
    deviate from the recommendation,
    but only if they are aware of the consequences and are willing to
    cope with them.
    So what you could do - if others agree - is to replace

       In order to avoid IP fragmentation of messages exchanged
       between EEs and RAs or CAs, the Block-Wise transfer [RFC7959 
<https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Ftools.ietf.org%2Fhtml%2Frfc7959&data=04%7C01%7C3fc86e35-ce5e-4719-beb0-5253a4681d60%40ad011.siemens.com%7C9d2a8b2f3d184b9897e508d90b0cf135%7C38ae3bcd95794fd4addab42e1495d55a%7C1%7C0%7C637552972467884509%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=ukHaAdsU7gvXCCVKMDqwL6JA%2FvbPcICBT7Srwc0OR1g%3D&reserved=0>]
 mode
       MUST be used for the CMP Transactions over CoAP.

    by a strengthened recommendation with a motivation/warning, e.g.,

       Block-wise transfer [RFC7959 
<https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Ftools.ietf.org%2Fhtml%2Frfc7959&data=04%7C01%7C3fc86e35-ce5e-4719-beb0-5253a4681d60%40ad011.siemens.com%7C9d2a8b2f3d184b9897e508d90b0cf135%7C38ae3bcd95794fd4addab42e1495d55a%7C1%7C0%7C637552972467884509%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=ukHaAdsU7gvXCCVKMDqwL6JA%2FvbPcICBT7Srwc0OR1g%3D&reserved=0>]
 mode
       SHOULD be used for the CMP Transactions over CoAP.
       This is strongly recommended to avoid IP fragmentation of messages
       and the block-wise option is a critical option as per RFC 7959.

 3. Section 3:

    Nice to see that you streamlined the text regarding DTLS.

 4. Section 4:

    cross protocol proxy -> cross-protocol proxy

    pre configured servers -> pre-configured servers

 5. Section 5:

     In order to protect themselves against DDoS attacks, the
       implementations SHOULD avoid sending or receiving very small packets
       containing partial CMP PKIMessage data.

    Sounds good, but the point is not distributed DoS (only) but DoS in
    general, so: DDoS -> DoS
    and there is no real protection against DoS, just reduction of risks
    they impose.
    Moreover, the recipient has little influence on the size of packets.
    I'd further suggest streamlining the sentence, arriving at, e.g.,:

    "In order to reduce the risks imposed by DoS attacks,
    implementations SHOULD minimize fragmentation of messages,
    i.e., avoid packets containing partial CMP PKIMessage data."

    And better starting a new paragraph thereafter because using a
    CoAP-to-HTTP proxy is a different topic.

Regards,

    David

_______________________________________________
Ace mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ace

Reply via email to