Benjamin Kaduk has entered the following ballot position for
draft-ietf-regext-rfc7483bis-04: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-regext-rfc7483bis/



----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

Should the errata against RFC 7483 in state "reported" be verified or
otherwise processed before this document gets approved?

My understanding (based on the draft name and shepherd writeup) is that
this document is intended to Obsolete: RFC 7483.  If so, that should be
indicated in the header, abstract, and introduction, as (in my
understanding) the Gen-ART reviewer pointed out.

Thank you for keeping the diff from RFC 7483 minimal -- that made things
very easy to read!  (FWIW, I do consider converting all the links to
the "https" scheme worth the churn; thank you for that as well.)

Some of the examples have gone stale, though (or were inaccurate from
the start), particularly with respect to the cryptographic digests and
algorithms used for DNSSEC.  I do not think that we can in good
conscience publish, in 2021, an Internet Standard that shows RSA/MD5
signatures as an example!  (Specifics in the editorial
section-by-section remarks.)

Also, for Section 1.1, RFC 8174 has an updated BCP 14 boilerplate text to
use.

It's probably worth making a pass through the examples to check for
cases where the handle "XXXX" is being used for distinct entities within
a single example (as that's not really self-consistent).

It may be worth noting in the security considerations that, while these
RDAP responses allow for retrieval of DNSSEC (key) related information,
(AFAICT) the RRSIG DS from the parent zone is not conveyed alongisde it.
This means that the DNSSEC keys retrieved by RDAP are disconnected from
their containing PKI, and as such are not generally expected to be
trusted without additional information.  In particular, just the HTTPS
channel protecting the RDAP connection is not expected to be authorized
to certify the validity of the DNSSEC keys.

The rest of my remarks are basically editorial or nit level, and I don't
expect specific responses to them.

Section 3

   Contact information is defined using jCards as described in
   [RFC7095].  The "fn" member is required and MUST NOT be null
   according to [RFC6350], where an empty "fn" member MAY be used when
   the contact name does not exist or is redacted.

(editorial) The way the last sentence is written suggests that [use of
empty "fn" when the name does not exist or is redacted] is a behavior
specified in RFC 6350, but based on text searches in RFC 6350 I suspect
that this statement is actually a clarification new to this document
about how the jCard format is being used.

Section 4.1

Going from 7483 to this document we now say that "rdapConformance" MUST
appear in the topmost JSON object of a response (vs "appears only" in
it).  Is the intent to forbid "rdapConformance" from appearing anywhere
else in addition to the topmost JSON object?  If so, the current text
seems insufficient to me.

Section 4.2

   The following is an example of the link structure:

       {
         "value" : "https://example.com/context_uri";,
         "rel" : "self",
         "href" : "https://example.com/target_uri";,

I am prone to confusing myself about RFC 8288 links, but it surprised me
that "href" differed from "value" for a relation of type "self".

   The JSON name/values of "rel", "href", "hreflang", "title", "media",
   and "type" correspond to values found in Section 3 of [RFC8288].  The
   "value" JSON value is the context URI as described by [RFC8288].  The
   "value", "rel" and "href" JSON values MUST be specified.  [...]

Looking just at the diff from RFC 7483 makes it seem that we gain a
MUST-level requirement for the "rel" value to be specified, which would
not normally be allowed in a transition to Internet Standard.  However,
it seems that RFC 8288 itself requires the presence of "rel", so this is
not in practice a new requirement, and thus safe.

Section 4.5

I think it's vCard that has a LANGUAGE property; in jCard that would be
the "language" key.

Section 5.1

[I did not attempt to validate that the jCards contained in any of the
examples conform to RFC 7095.]

   and names of organizations and individuals.  Many of the types of
   information that can be represented with jCard have no use in RDAP,
   such as birthdays, anniversaries, and gender.

(nit) I suggest s/no use/little or no use/, just on my instinct of
avoiding absolutes when not needed.  ("Only a Sith deals in absolutes",
right?)

   The following is an elided example of an entity with embedded
   entities.

(nit) I'd suggest "abbreviated" or "condensed" instead of "elided",
which as written would seem to imply that the entire example is omitted.
This applies to more than one instance, but I will only mention it once.

Section 5.3

      -  idnTable -- the name of the Internationalized Domain Name (IDN)
         table of codepoints, such as one listed with the IANA (see IDN
         tables [IANA_IDNTABLES]).

(nit) the definite article "the" in "the [IDN] table of codepoints"
implies that the context should indicate which one we are referring to
(perhaps the one used in the variant names?), but I am failing to tell
from context which table is being indicated.

           "keyTag": 12345,
           "algorithm": 3,
           "digestType": 1,
           "digest": "49FD46E6C4B45C55D4AC"

Could we maybe use SHA-256 for the example instead of the
no-longer-safe-for-general-use SHA-1 (so, digest type 2 instead of 1,
and corresponding digest length)?  [Hmm, the existing SHA-1 example is
20 hex digits, which is only 80 bits, not the full 160-bit SHA-1
output...]
Likewise for the signature algorithm (algorithm 3 is DSA/SHA-1, and
there are lots of stronger alternatives listed at
https://www.iana.org/assignments/dns-sec-alg-numbers/dns-sec-alg-numbers.xhtml)

            "flags": 257,
            "protocol": 3,
            "algorithm": 1,
            "publicKey": "AQPJ////4Q==",

Similarly, the key data here indicates the algorithm 1, or RSA/MD5 which
is deprecated.  (The public key is also a laughably small 40-bit
modulus when decoded.  A nice strong Ed25519 key, algorithm 15, would
not expand the example unreasonably in my opinion.)

         "eventAction" : "expiration",
         "eventDate" : "2016-12-31T23:59:59Z",
         "eventActor" : "[email protected]"

(side note) Perhaps an expiration in the future is more useful as an
example, though it is clearly not wrong to list the expiration event
even when it is in the past.

Section 5.5

   The following is an example of a JSON object representing an autnum.

   {
     "objectClassName" : "autnum",
     "handle" : "XXXX-RIR",
     "startAutnum" : 10,
     "endAutnum" : 15,

IIUC AS numbers 10 through 15 are assigned by ARIN, including AS 11 that
is assigned to Harvard University (last updated 2019-08-12) and appears
to be in current use.  Perhaps the reserved ASN 0 would make for a safer
example?

     [...]
     "links" :
     [
       {
         "value" : "https://example.net/autnum/xxxx";,
         "rel" : "self",
         "href" : "https://example.net/autnum/xxxx";,
         "type" : "application/rdap+json"

Hmm, my reading of 7482bis suggests that the bit after /autnum/ should
be an actual AS number, not a handle.  But it doesn't seem to give much
guidance on how to represent a block of AS numbers as opposed to a
single one within a block...

   *  type -- a string containing an RIR-specific classification of the
      autnum

(nit) is this the RIR's classification of the number itself, or the
allocation/registration?

Section 10

I think that sometimes we see "-bis" documents that just say "IANA has
updated the registrations made by RFCXXXX to refer to this document",
but I don't particularly mind repeating the registration information in
the now-primary reference document.

Section 10.1

      Published specification: RFC 7483

Presumably we want this updated to the rfc-to-be?

Section 10.2.4

      Description: The entity object instance represents a third party
      through which the registration was conducted (i.e. not the
      registry or registrar).

(nit/side-note) I am pretty sure the RFC Editor is going to add the
comma back after "i.e." (but expect that leaving it for them to do will
cause the right thing to happen).  Perhaps we should ask IANA and the
RFC Editor to get on the same page...

Section 13.1

   The default text encoding for JSON responses in RDAP is UTF-8
   [RFC3629], and all servers and clients MUST support UTF-8.

(I note that UTF-8 preference is one of the things that changed from RFC
7159 to RFC 8259, so this may be redundant now.  I didn't think about it
very hard and don't expect anyone else to, as there's no harm in leaving
it alone.)

Section A.1

   The following is an elided example of a registrant with information
   changed to reflect that of a third party.

   {
     ...
     "entities" :
     [
       {
         "objectClassName" : "entity",
         "handle" : "XXXX",
         ...
         "roles" : [ "registrant", "administrative" ],
         "status" : [ "proxy", "private", "obscured" ]

(editorial) it might be nice to show a little more, so that we can
contrast "Joe User" with "Anonymizing Proxy Service" (or whatever).

Section A.1

             ["email",
               { "type":"work" },
               "text", "[email protected]"

I wonder if the 'example' TLD might be more apropos for this case (e.g.,
[email protected]).  (The link might be altered
similarly as well.)

Section D

   DNSSEC provides data integrity for DNS through the digital signing of
   resource records.  [...]

It also provides source authenticity, which is equally important.



_______________________________________________
regext mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/regext

Reply via email to