Re: [Gen-art] Gen-Art Early Review of draft-ietf-radext-dtls-07

2013-11-19 Thread Jouni Korhonen

Thanks Ben for the review!

- JOuni

On Nov 19, 2013, at 1:38 AM, Ben Campbell b...@nostrum.com wrote:

 
 I am the assigned Gen-ART reviewer for this draft. For background on
 Gen-ART, please see the FAQ at
 
 http://wiki.tools.ietf.org/area/gen/trac/wiki/GenArtfaq.
 
 This is an early review at WGLC last call.
 
 Document:   draft-ietf-radext-dtls-07
 Reviewer: Ben Campbell
 Review Date: 2013-11-18
 
 Summary: This draft is on the right track, but there are significant open 
 issues that should be resolved before it progresses.
 
 [Note: This review is different from the usual Gen-ART review due to the fact 
 that it's an early (as in prior to pubreq) review, and that the draft is 
 intended to become an experimental RFC. The gen-ART review process is tuned 
 for drafts at IETF last call or later. It's a little hard to figure out what 
 criteria should be used for drafts at an earlier point in the life-cycle. 
 That being said, I reviewed this as if it were near-final, and apologize if 
 that turns out to be too strict for an early review.
 
 I used similar review criteria as I would for a standards-track draft, since 
 this draft still specifies protocol with the hope of interoperable 
 implementations. The only difference comes from a few comments explicitly 
 about the experimental status of the draft.]
 
 
 *** Major issues:
 
 -- General:
 
 The draft needs an overhaul of it's use of normative language. There appears 
 to be redundant (and possibly contradictory) language for the same 
 requirements sprinkled throughout. There are also cases of normative language 
 being used for internal implementation guidance, which is not appropriate as 
 described by RFC 2119. (See the minor issues section for details--most of the 
 instances would not qualify as major issues by themselves, but I think they 
 constitute a major issue in the aggregate.)
 
 -- section 3, 2nd paragraph:  ... long-term use of RADIUS/UDP is NOT 
 RECOMMENDED. 
 
 While I agree with the sentiment, that's not an appropriate assertion for an 
 experimental RFC. It would either need to go into an standards-track update 
 to the RADIUS spec, or a BCP.
 
 (Also applies to the reiteration in 10.1)
 
 
 *** Minor issues:
 
 -- General:  It might be worth some text on why this is experimental rather 
 than informational. Is there any plan to evaluate the implementation results? 
 Is there an expectation that a future RADIUS/DTLS spec could become 
 standards-track? Is there any plan to evaluate the outcome of this document?
 
 -- Section 1, 2nd paragraph:
 
 Isn't this true for almost any use of IPSec? Is there some specific reason 
 this is worse for RADIUS than for other protocols?
 
 -- Section 1, 4th paragraph:
 
 The second sentence mentions that firewall rules do not need to be changed. 
 The following sentence recommends a change to firewall rules.
 
 The firewall rule recommendations in the 3rd sentence seems odd, since it 
 seems like any protocol over DTLS would pass. Also, does this imply a 
 recommendation that firewalls with DPI be used in the first place, since the 
 absence of such a firewall has the same effect as having one that doesn't 
 enforce the protocol? (Is there a reason a protocol spec should recommend 
 firewall rules in the first place, other than to mention places where certain 
 firewall rules might prevent interfere with operation?)
 
 -- section 2.1, 5th paragraph (3rd paragraph after bullet list) :  
 Implementations MUST support encapsulated RADIUS packets of 4096 in 
 length...
 
 Please be more precise than MUST support. Specifically, does MUST support 
 indicate you must support both sending and receiving of that size? (since 
 4096 would generally exceed PMTU even for RADIUS/UDP)
 
 -- 2.2 and children:
 
 I find this section confusing as to where to find the authoritative text. 
 Some, but not all, of the material from 6614 is repeated as normative text in 
 later sections.  The description of this draft as applying 'semantic 
 patches' to 6614 seems to imply you mean the 6114 text, with these patches 
 applied, to be normative, which creates some potential conflicts. If, on the 
 other hand, 2.2 (.x) is intended more as a informative description of the 
 differences, please say so.
 
 -- 3, 1st paragraph:
 
 Can you elaborate on the resulting timeouts, lost traffic, and network 
 instabilities?
 
 -- 3.1: 
 
 The section describes UDP/2083 as the default port. But later sections 
 describe port related behavior in a way that makes it it look like the 
 impementations must always use 2083, which makes it more than just a default. 
 Is the administrator allowed to choose some other port for any reason? If so, 
 it might make more sense to refer to the port by role rather than number when 
 discussing port related behavior. (I note that 6614 only mentions the port 
 number in the initial assignment, the IANA considerations, and the appendix.)
 
 
 -- 3.2, last paragraph:
 
 Can you elaborate on the bid 

Re: [Gen-art] Gen-ART Telechat review of draft-sin-sdnrg-sdn-approach-05.txt

2013-11-19 Thread christian.jacquenet
Hello Suresh,

Thanks for your review. We will update the draft in light of your comments, but 
please see inline a few responses.

[snip]

* Section 2.1

- Not sure if the word encoded is appropriate here.

s/hardware-encoded/usually implemented in hardware/
[CJ] OK.

- These two sentences are hard to read and it is not clear what point
they are trying to make. Please consider rewording.

   As such, the current state-of-the-art tends to confirm the said
   separation, which rather falls under a tautology.
[CJ] What is meant by this sentence is that data and control planes have always 
been separated from an implementation standpoint, hence the tautology: 
commercial routers use a (S/W-based) routing engine for route computation 
purposes, while packet forwarding functions are usually H/W encoded.

   But a somewhat centralized, controller-embedded, control plane for
   the sake of optimized route computation before FIB population is
   certainly another story.
[CJ] One of the main arguments of SDN proponents is that (1) the control plane 
is separated from the data plane but, more importantly, (2) this separation 
assumes a (logically) centralized control plane, which allows the use of 
commodity H/W. From an implementation standpoint, this is different from 
current router technologies, although there has been some vendors in the past 
who tried to promote this kind of design (I remember Newbridge's Vivid 
technology at the end of the '90s, for example). I'm not too sure about how we 
can possibly re-word this, admittedly.

* Section 3.1

Not sure what this sentence is trying to convey. Can you clarify?

   Some of these features have also been standardized (e.g., DNS-based
   routing [RFC1383] that can be seen as an illustration of separated
   control and forwarding planes or ForCES ([RFC5810][RFC5812])).
[CJ] What is meant here is that so-called SDN features have been there for 
quite some time and some of them have been standardized, hence the couple of 
examples above.

* Section 3.4

This direct access to some engines using a vendor-specific could be beneficial 
to performance but may increase configuration complexity (in opposition to the 
final goal in Section 4.1 of accommodating heterogeneous network technologies). 
It may be worthwhile to add some text to the following paragraph in this regard.
[CJ] Fine by me, we'll add an extra sentence.

   Maintaining hard-coded performance optimization techniques is
   encouraged.  So is the use of interfaces that allow the direct
   control of some engines (e.g., routing, forwarding) without requiring
   any in-between adaptation layer (generic objects to vendor-specific
   CLI commands for instance).

* Section 3.5

This sentence is ambiguous

OpenFlow is clearly not the next big thing

Does this mean

a) OpenFlow is certainly not the next best thing (or)
b) It is not clear if OpenFlow will be the next best thing

Can you please clarify?
[CJ] option a is the right one. We'll reword accordingly.

* Section 3.6

This sentence about non-goals is unclear. What are the respective software 
limitations?

   o  Fully flexible software implementations, because the claimed
  flexibility will be limited by respective software and hardware
  limitations, anyway.
CJ: The sentence means that there are S/W and H/W limitations respectively that 
will always restrict the scope of claimed flexibility - another tautology, if 
you will.

* Section 4.5

This sentence is long and complex, and the exact point it is trying to make is 
not clear. Can you simplify/reword?

   For example: while the deployment of a network solely composed of
   OpenFlow switches within a data center environment is unlikely to
   raise FIB scalability issues given the current state-of-the-art, data
   center networking that relies upon complex, possibly IP-based, QoS-
   inferred, interconnect design schemes meant to dynamically manage the
   mobility of Virtual Machines between sites is certainly of another
   scale.

CJ: Fair enough. We'll simplify the wording, e.g., DC networks that may rely 
upon OpenFlow switches are unlikely to raise FIB scalability issues. 
Conversely, DC interconnect designs that aim at dynamically managing VM 
mobility possibly based upon the enforcement of specific QoS policies may raise 
scalability issues.

* Section 4.6

Can you clarify what risk is being assessed here?

   o  Assessing whether SDN-labeled solutions are likely to obsolete
  existing technologies because of hardware limitations.

CJ: the risk is both technical and economical. From a technical standpoint, the 
ability to dynamically provision resources as a function of the services to be 
delivered may be incompatible with legacy routing systems because of H/W 
limitations. From an economical standpoint, this is about assessing the impact 
of deploying SND solutions for the sake of flexibility and automation on CapEx 
and OpEx budgets.

Editorial
=

* Section 3.3


[Gen-art] Gen-ART review for draft-ietf-soc-load-control-event-package-10.txt

2013-11-19 Thread Romascanu, Dan (Dan)

I am the assigned Gen-ART reviewer for this draft. For background on Gen-ART, 
please see the FAQ at

http://wiki.tools.ietf.org/area/gen/trac/wiki/GenArtfaq.

Please resolve these comments along with any other Last Call comments you may 
receive.

Document: draft-ietf-soc-load-control-event-package-10.txt
Reviewer: Dan Romascanu
Review Date: 11/19/13
IETF LC End Date: 11/19/13
IESG Telechat date: (if known)

Summary: The document is ready, there are a few minor issues which are worth 
being clarified. 

Major issues: None.

Minor issues:

1. I had some issues with the examples in the introduction. 

  There are three common examples of legitimate short-term increases in
   call volumes.  Viewer-voting TV shows or ticket giveaways may
   generate millions of calls within a few minutes.  Call volume may
   also spike during special holidays such as New Year's Day and
   Mother's Day. Finally, callers may want to reach friends and family
   in natural disaster areas such as those affected by hurricanes.  When
   possible, only calls traversing overloaded servers should be
   throttled under those conditions.

I am not sure what the term 'legitimate' means here. I would rather say that 
the paragraph rather deals with increases in call volumes that happen at 
predictable moments in time (assuming here that the time a hurricane hits a 
certain geographic zone is predicted by weather forecasters). There would be 
one more example to add here - the end-of-season (of month, of year) peaks in 
phone orders. 

There is another category of unpredicted/unpredictable events which is 
mentioned a few paragraphs later, and which puts a slightly different set of 
requirements. The list already includes earthquakes or terrorist attacks, it 
may add the increase in traffic on call centers that provide troubleshooting 
services when a mass service fails. 

A slight re-organization of this text would improve clarity. 

2. In Section 4 - Design Requirements: 

  o  The solution should draw upon experiences from related PSTN
  mechanisms where applicable.

I have no clue what this section means in the absence of a reference and/or a 
list of what PSTN mechanisms are to be considered. 

Also, in the same list of requirements I miss an explicit requirement on 
persistency. 

3. In Section 5.4 in the compliance list - I believe that compliance to the SIP 
Event Notification Framework [RFC 6665] should be added. 

Nits/editorial comments:




___
Gen-art mailing list
Gen-art@ietf.org
https://www.ietf.org/mailman/listinfo/gen-art


Re: [Gen-art] #520, was: Fwd: Gen-Art review of draft-ietf-httpbis-p2-semantics-24 with security considerations

2013-11-19 Thread Moriarty, Kathleen
Hi Mark  Julian,

I understand your concerns, but I think a *couple of sentences* could go a long 
way in terms of awareness of these issues for developers and implementers.  
This type of advice is on par with the current security sections added for 
privacy concerns where you get close to the topic already.  If you read through 
Section 9.3 and consider predicable information (ID numbers or other 
distinguishing information whether or not it is PII), it is easy enough to plug 
in other values into a URI and possibly expose information that should not have 
been accessible (with a bad configuration - and they do exist).  It would be 
good to make it clear that this is not a good thing and can be one type of 
injection attack.

You are also already covering full path disclosure in 9.1, which is a type of 
injection attack.

Julian had requested some text, here are a couple of proposed sentences.
In the last sentence of the first paragraph, add in 'predicable' to the list  
of items at the end of the sentence.  The I suggest adding text along the 
following lines:

Injection attacks, such as SQL and full path disclosure should be prevented in 
URIs to avoid unintended access.  The broader set of injection attacks is 
out-of-scope for this document, however awareness is important for web 
developers.  

OWASP lists injection attacks as the highest risk and defines the more broad 
set  of injection attacks as follows: 
Injection flaws, such as SQL, OS, and LDAP injection occur when untrusted data 
is sent to an interpreter as part of a command or query.  The attacker's 
hostile data can trick the interpreter into executing unintended commands or 
accessing data without proper authorization. (Link to OWASP top 10, it is also 
provided as a PDF if that reference is better: 
https://www.owasp.org/index.php/Top_10_2013-Top_10)


This suggestion is meant to raises awareness and tie into the existing 
descriptions that get close to this topic.

Thank you,
Kathleen

-Original Message-
From: Mark Nottingham [mailto:m...@mnot.net] 
Sent: Monday, November 18, 2013 9:12 PM
To: Julian Reschke
Cc: HTTP Working Group; Moriarty, Kathleen
Subject: Re: #520, was: Fwd: Gen-Art review of 
draft-ietf-httpbis-p2-semantics-24 with security considerations


On 19/11/2013, at 4:46 AM, Julian Reschke julian.resc...@gmx.de wrote:

 Section 9.3:  You may want to include information that informs 
 developers and users of SQL injection attacks.  Fields are still 
 included in some URIs that link you to pages directly that contain 
 personal information using consistent identifiers.  It would be 
 helpful as this is still one of the biggest attack vectors.  A quick 
 search on SQL injection URL will provide additional information for 
 inclusion in the write up.  You mention GET-based forms in section 
 9.3, but it doesn't mention SQL injection attacks and information in 
 the URIs. Since this is so prevalent still, I think it is important to call 
 out explicitly.
 
 Not convinced. From an HTTP point of view, URIs are just opaque identifiers. 
 Also, there are many kinds of injection attacks. Should we list them all 
 (XML, javascript...)?

+1 - SQL doesn't have anything to do with HTTP, and even though it is used 
often in conjunction with the protocol, it's an implementation-specific choice. 

For example, I don't use any SQL on my Web site, and am very happy about that :)

Cheers,


--
Mark Nottingham   http://www.mnot.net/




___
Gen-art mailing list
Gen-art@ietf.org
https://www.ietf.org/mailman/listinfo/gen-art


Re: [Gen-art] Gen-art review of draft-ietf-httpbis-method-registrations-14

2013-11-19 Thread Barry Leiba
   -- The document seems to lack a disclaimer for pre-RFC5378 work, but may
  have content which was first submitted before 10 November 2008.  If you
  have contacted all the original authors and they are all willing to 
 grant
  the BCP78 rights to the IETF Trust, then this is fine, and you can 
 ignore
  this comment.  If not, you may need to add the pre-RFC5378 disclaimer.
  (See the Legal Provisions document at
  http://trustee.ietf.org/license-info for more information.)

 No, it doesn't (why does idnits think so?)

Oh, geez, you really want to know?

Look at the history of the document:
- Up through version -02, it was marked as updates httpbis part 2.
- httpbis part 2 version -00 was posted before RFC 5378.
- The current version of httpbis part 2 does not include all the
authors that were included in the -00 version.

Through some combination of that history, it's possible that this
document has text from httpbis part 2 version -00, and that not all
the original authors have signed off on that.

So idnits is just raising a flag.  As it says, if this isn't a
problem, then it isn't a problem.  Kathleen was just pointing out that
idnits raised the flag, and asked you to check.

You checked.  All is well.  (We all have to remember that idnits is
only a tool)

   ** Obsolete normative reference: RFC 2068 (Obsoleted by RFC 2616)

 RFC 2068 currently is the only document that defines LINK/UNLINK. The only
 thing we can do here is to declare all references in the registrations to be
 informative, but I really really don't see why it would matter here.

Again, only a tool.  This is not an issue.  We have references to
obsolete documents periodically, and that's fine.  This is fine.  On
the other hand, we have many occasions where documents become obsolete
after they're put in as references, so it's good to check.

Again, you checked, and all is well.  No need to wrap ourselves around
that further.

Barry
___
Gen-art mailing list
Gen-art@ietf.org
https://www.ietf.org/mailman/listinfo/gen-art


[Gen-art] Gen-ART review of draft-ietf-6man-ug-05

2013-11-19 Thread Martin Thomson
I am the assigned Gen-ART reviewer for this draft. For background on
Gen-ART, please see the FAQ at

http://wiki.tools.ietf.org/area/gen/trac/wiki/GenArtfaq.

Please resolve these comments along with any other Last Call comments
you may receive.

Document: draft-ietf-6man-ug-05
Reviewer: Martin Thomson
Review Date: 2013-11-19
IETF LC End Date: 2013-11-28
IESG Telechat date: Not yet available

Summary: The document is ready for publication as Proposed Standard.

This document describes the problems arising from the pseudo-semantics
assigned to the 'u' and 'g' bits of EUI-64-derived interface
identifiers and declares these semantics void.  I found the
thoroughness of the justification a little excessive, but I can
appreciate why it needs to be that way :)
___
Gen-art mailing list
Gen-art@ietf.org
https://www.ietf.org/mailman/listinfo/gen-art


[Gen-art] Gen-ART Telechat Review of draft-ietf-karp-ops-model-09

2013-11-19 Thread Ben Campbell

I am the assigned Gen-ART reviewer for this draft. For background on
Gen-ART, please see the FAQ at
 http://wiki.tools.ietf.org/area/gen/trac/wiki/GenArtfaq.

Please wait for direction from your document shepherd
or AD before posting a new version of the draft.

Document: draft-ietf-karp-ops-model-09
Reviewer: Ben Campbell
Review Date: 2013-11-19
IESG Telechat date: 2013-11-21

Summary: This draft is ready for publication as an informational RFC. All the 
issues from my last call review, have been addressed, save 1 below.

Major issues:

None

Minor issues:

-- My last call review included a concern about a possible need for additional 
guidance  around the idea of continuing to operate with an expired key. The 
author mentioned that the draft reflect working group consensus, and I'm okay 
with that. But I still think there might be value in documenting the tradeoffs 
that the working group considered reaching that consensus. I'm not sure that 
our correspondence on that matter reached a conclusion. I'm pasting the 
relevant discussion below:

 
   genart -- section 3.2, last paragraph: Implementations SHOULD
   genart permit a configuration i n which if no unexpired key is
   genart available, existing security associations continu e using
   genart the expired key with which they were established.
 
   genart This may need further guidance. For example, it seems risky
   genart to do this silently.
 
 I think this was explicitly discussed in the WG and is where we got in
 our discussions.
 There's discussion of alerts for security events elsewhere.
 However I think the current text represents a fairly informed WG
 consensus.
 
 You are correct that there is separate text on notification of security 
 events (section 6.2), and that even mentions certificate expiration. But it 
 doesn't explicitly mention continuing to use an expired key. I think that's 
 important enough that it should be explicitly considered.
 
 If it was explicitly discussed in the working group, it would be helpful to 
 document the trade-offs that were discussed.


Nits/editorial comments:

-- idnits reports some outdated references, please check.

-- section 1, paragraph 4, 2nd sentence:

s/routers/Routers
___
Gen-art mailing list
Gen-art@ietf.org
https://www.ietf.org/mailman/listinfo/gen-art


[Gen-art] Gen-ART Telechat Review of draft-ietf-ipfix-data-link-layer-monitoring-07

2013-11-19 Thread Ben Campbell
I am the assigned Gen-ART reviewer for this draft. For background on
Gen-ART, please see the FAQ at
 http://wiki.tools.ietf.org/area/gen/trac/wiki/GenArtfaq.

Please wait for direction from your document shepherd
or AD before posting a new version of the draft.

Document: draft-ietf-ipfix-data-link-layer-monitoring-07
Reviewer: Ben Campbell
Review Date: 2013-11-19
IESG Telechat date: 2013-11-21

Summary: This draft is essentially ready for publication as a standards track 
RFC. However, there is one issue that I unfortunately missed in my last call 
review of version 06 that should be considered prior to publication.

Major issues:

None

Minor issues:

There's a normative downref to RFC 2804, which is informational. That seems a 
really odd draft for a normative reference. There may be precedent, as I note 
that RFC 5477, referenced here for security considerations, does the same 
thing.  I apologize for bringing this up this late in the process--I missed it 
in my earlier review at last call.

As I understand it the context is that certain data elements can include 
payload octets. This is subject to the security considerations in 5477, which 
basically say don't include too much, because of guidance from 2804. But my 
reading of 2804 does not give specific guidance things like how much payload 
one can capture before it becomes too much.

I think the simplest solution would be to keep the reference to the 5477 
security considerations, and reiterate that this model is not intended for 
gross capture of payloads, perhaps with an _informative_ reference to 2804.

Nits/editorial comments:

None
___
Gen-art mailing list
Gen-art@ietf.org
https://www.ietf.org/mailman/listinfo/gen-art


[Gen-art] Gen-art telechat review of draft-ietf-mmusic-rfc2326bis-38.txt

2013-11-19 Thread Elwyn Davies
I have been selected as an additional General Area Review Team (Gen-ART)
reviewer for this draft (for background on Gen-ART, please see
http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html).

Please wait for direction from your document shepherd or AD before
posting a new version of the draft.

Document: draft-ietf-mmusic-rfc2326bis-38.txt
Reviewer: Elwyn Davies
Review Date: 2013/11/19
IESG Telechat date: 2013/11/21

Summary: This draft is ready for publication as a Standards Track
RFC.  My extensive last call comments on the main body of the draft have
been thoroughly dealt with - thanks, Magnus and others. I didn't have
time previously to review the appendices in detail.  Below are quite a
few nits relating to the appendices that can be dealt with during RFC
Editor processing.  (A couple of them are areas where a little extra
clarification or explanation is needed rather than purely language
issues). 

Major Issues:
(none)

Minor Issues:
(none)

Nits:
General: agree on consistent use of either 'lower layer' or
'lower-layer'.

s App A: s/how functions/how the functions/, s/syntex illegal line
breaks/line breaks that are not allowed by the formal syntax but are
needed/

ssA.1-A.4, paras just before message flow: In each case the example
mentions 'movie' for the firsttime whereas the earlier txt just refers
to 'media'  It might be better just to stick to 'media'.

sA.1: s/For purposes/For the purposes/, s/like the host/such as the host
domain name/, s/equal value with date/to a value equal to the current
date and time/

sA.3, para 1: s/crypto contexts to get a secured/cryptographic contexts
to request and facilitate secured/, s/fetch this/fetch the media/, s/In
the this session/In this session/, s/This is pipeline/These are
pipelined/  

sA.4, para 1: s/a bit more tweaks/a few more tweaks/

sA.7, para 1: s/clients request/client's request/

s App. B, para 1: s/response will returned/will be returned/

s App. B, para 2: s/If two or more is/If rwo or more streams are/

s App. B, para 3? s/The below state machine/The state machine below/

sB.4, para 1: s/one or more requisite/one or more prerequisites/

sB.4, para 2: s/requisite/prerequisite/ (2 places), s/restrictions to
when/restrictions as to when/, s/As it in the general case can't be
determined if it was an unrecoverable error or not/As it is not
possible, in the general case, to determine whether an error was
unrecoverable or not/

sB.4, para below Table 15: s/depending/dependent/ (2 places)

sC.1.1, para 3: s/with use of/with the use of/

sC.1.2, para 1: s/over lower transport layer UDP/over a UDP lower
transport layer/

sC.1.2, 3rd bullet: s/unless in case/except for the case when/

sC.1.2, 5th and 6th bullets are exact duplicates - remove one!

sC.1.4, last para: s/as default/as the default/

sC.1.4.1: s/crypto/cryptographic/

sC.1.4.1, item 3: Does the cert validation process need a reference?

sC.1.4.1, item 4: Does the encooding of the cert in the MIKEY message
need a reference to say how it is done?

sC.1.4.1, item 8 bullets: Expand 'spec' in various places. In last
bullet s/to enable client/to enable the client/

sC.1.4.1, last para: s/where the client's identity is not necessary to
authenticate/where it is not necessary to authenticate the client's
identity/

sC.1.6.3, para 1: s/on short to medium/in the short to medium/, s/the
used bit-rate/the bit-rate used/ ['used thingy' implies second-hand or
recycled as opposed to 'thingy used' implies 'thingy (currently) in
use'].

sC.1.6.4, para 3 et seq (including sC.2.2, para 3): Consistent use of
'rtcp-mux' vs 'RTCP-mux'.

sC.1.6.4, para 3: Is the first 'recommended' a 'RECOMMENDED'.. I am not
sure.

sC.1.6.4, para 4: Maybe be a pointer to IANA registration in s22.1.3
would be useful?

sC.1.6.4, para 5: s/are here provided/are procided here/ [original form
is right, but archaic]

sC.2.1, para 2: s/go through/going through/ (probably) but I don't
properly understand what the point of this 'note well' is supposed to
be.  What are the (evil/unexpected) consequences of the media streams
going through the proxy - and why would they not do this otherwise?

s2.2, para 1: s/over lower transport layer TCP/over a TCP lower
transport layer/

sC.3, para 1: s/The below text/The text below/

sC.3, paea 2: I can't parse the first sentence.  What is (not) affected
by 'without being affected by jumps...'.

sC.3, para 2 (and paras 3, 4 and 5): 'montotonically increasing' does
not imply what I think is required, i.e., that the next sequence number
is the one in the last packet of the previous range + 1 ['monotonically
increasing' just means it isn't less than the one in the last packet and
could be several more.] Maybe 'next in sequence'.

sC.3, para 3: s/it arrives timely and still/it arrives in a timely
fashion and still carries/, s/media has frame/media has a frame/,
s/burden to render/burden of rendering/

sC.3, para 4: s/that anyway caches/that expect to cache/

sC.3, para 5: s/provided stream/generated stream/ 

Re: [Gen-art] #520, was: Fwd: Gen-Art review of draft-ietf-httpbis-p2-semantics-24 with security considerations

2013-11-19 Thread Mark Nottingham
Hi Kathleen,

Personally - I'm not convinced, because the people who would benefit from that 
warning are almost certainly not going to be reading this document. 

We're already getting a lot of pushback on the size of our document set; we've 
often resisted adding advice like this to keep it manageable for implementers N 
avoid it becoming a kitchen sink spec. 

With my chair hat on - what do others think?

Sent from my iPhone

 On 20 Nov 2013, at 3:57 am, Moriarty, Kathleen kathleen.moria...@emc.com 
 wrote:
 
 Hi Mark  Julian,
 
 I understand your concerns, but I think a *couple of sentences* could go a 
 long way in terms of awareness of these issues for developers and 
 implementers.  This type of advice is on par with the current security 
 sections added for privacy concerns where you get close to the topic already. 
  If you read through Section 9.3 and consider predicable information (ID 
 numbers or other distinguishing information whether or not it is PII), it is 
 easy enough to plug in other values into a URI and possibly expose 
 information that should not have been accessible (with a bad configuration - 
 and they do exist).  It would be good to make it clear that this is not a 
 good thing and can be one type of injection attack.
 
 You are also already covering full path disclosure in 9.1, which is a type of 
 injection attack.
 
 Julian had requested some text, here are a couple of proposed sentences.
 In the last sentence of the first paragraph, add in 'predicable' to the list  
 of items at the end of the sentence.  The I suggest adding text along the 
 following lines:
 
 Injection attacks, such as SQL and full path disclosure should be prevented 
 in URIs to avoid unintended access.  The broader set of injection attacks is 
 out-of-scope for this document, however awareness is important for web 
 developers.  
 
 OWASP lists injection attacks as the highest risk and defines the more broad 
 set  of injection attacks as follows: 
 Injection flaws, such as SQL, OS, and LDAP injection occur when untrusted 
 data is sent to an interpreter as part of a command or query.  The attacker's 
 hostile data can trick the interpreter into executing unintended commands or 
 accessing data without proper authorization. (Link to OWASP top 10, it is 
 also provided as a PDF if that reference is better: 
 https://www.owasp.org/index.php/Top_10_2013-Top_10)
 
 
 This suggestion is meant to raises awareness and tie into the existing 
 descriptions that get close to this topic.
 
 Thank you,
 Kathleen
 
 -Original Message-
 From: Mark Nottingham [mailto:m...@mnot.net] 
 Sent: Monday, November 18, 2013 9:12 PM
 To: Julian Reschke
 Cc: HTTP Working Group; Moriarty, Kathleen
 Subject: Re: #520, was: Fwd: Gen-Art review of 
 draft-ietf-httpbis-p2-semantics-24 with security considerations
 
 
 On 19/11/2013, at 4:46 AM, Julian Reschke julian.resc...@gmx.de wrote:
 
 Section 9.3:  You may want to include information that informs 
 developers and users of SQL injection attacks.  Fields are still 
 included in some URIs that link you to pages directly that contain 
 personal information using consistent identifiers.  It would be 
 helpful as this is still one of the biggest attack vectors.  A quick 
 search on SQL injection URL will provide additional information for 
 inclusion in the write up.  You mention GET-based forms in section 
 9.3, but it doesn't mention SQL injection attacks and information in 
 the URIs. Since this is so prevalent still, I think it is important to call 
 out explicitly.
 
 Not convinced. From an HTTP point of view, URIs are just opaque identifiers. 
 Also, there are many kinds of injection attacks. Should we list them all 
 (XML, javascript...)?
 
 +1 - SQL doesn't have anything to do with HTTP, and even though it is used 
 often in conjunction with the protocol, it's an implementation-specific 
 choice. 
 
 For example, I don't use any SQL on my Web site, and am very happy about that 
 :)
 
 Cheers,
 
 
 --
 Mark Nottingham   http://www.mnot.net/
 
 
 
 
___
Gen-art mailing list
Gen-art@ietf.org
https://www.ietf.org/mailman/listinfo/gen-art


Re: [Gen-art] Gen-ART review of draft-ietf-cdni-requirements-12

2013-11-19 Thread Kent Leung (kleung)
OK. Thanks for the clarification. Appreciate your feedback. :)

Kent

From: Christer Holmberg [mailto:christer.holmb...@ericsson.com]
Sent: Monday, November 18, 2013 11:58 PM
To: Kent Leung (kleung); gen-art@ietf.org
Cc: draft-ietf-cdni-requirements@tools.ietf.org
Subject: RE: Gen-ART review of draft-ietf-cdni-requirements-12

Hi Kent,

 Hi Christer. Thank you for the review. It's a good point that the language 
 used to describe the requirement is consistent with the
 priority level so becomes a bit redundant. The marking of HIGH/MED/LOW makes 
 the priority of the requirement explicitly clear.
 It's easier to identify and browse the requirements without having to get 
 into the description of the requirement. Other authors can
 chime in. But I feel that there's value to maintaining the marking instead of 
 using the text to specify the priority level.

I agree, and that is what I tried to say - eventhough my comment may have been 
a little unclear :)

Regards,

Christer


From: Christer Holmberg [mailto:christer.holmb...@ericsson.com]
Sent: Monday, November 18, 2013 5:54 AM
To: gen-art@ietf.orgmailto:gen-art@ietf.org
Cc: 
draft-ietf-cdni-requirements@tools.ietf.orgmailto:draft-ietf-cdni-requirements@tools.ietf.org
Subject: Gen-ART review of draft-ietf-cdni-requirements-12


I am the assigned Gen-ART reviewer for this draft. For background on Gen-ART, 
please see the FAQ at http://wiki.tools.ietf.org/area/gen/trac/wiki/GenArtfaq



Document: draft-ietf-cdni-requirements-12



Reviewer:   Christer Holmberg



Review Date: 18 November 2013



IETF LC End Date: 26 November 2013



IETF Telechat Date: 12 December 2013



Summary:  The document is well written, with one minor issue that the authors 
might want to address.



Major Issues: None



Minor Issues:



Q_GEN:



The document defines priority of each requirement as either [HIGH], [MED] or 
[LOW], which is fine. But, in addition to that, depending on the priority, the 
requirement text uses either shall, should or may.



Wouldn't it be more clean to use consistent terminology (e.g. shall) in the 
actual requirement text, as the priority is anyway indicated separately?





Editorial nits: None

___
Gen-art mailing list
Gen-art@ietf.org
https://www.ietf.org/mailman/listinfo/gen-art