Skip to main content

Last Call Review of draft-ietf-cdni-https-delegation-subcerts-08
review-ietf-cdni-https-delegation-subcerts-08-genart-lc-knodel-2024-06-26-00

Request Review of draft-ietf-cdni-https-delegation-subcerts
Requested revision No specific revision (document currently at 12)
Type Last Call Review
Team General Area Review Team (Gen-ART) (genart)
Deadline 2024-06-25
Requested 2024-06-11
Authors Frédéric Fieau , Emile Stephan , Guillaume Bichot , Christoph Neumann
I-D last updated 2024-06-26
Completed reviews Genart Last Call review of -08 by Mallory Knodel (diff)
Secdir Early review of -06 by Mike Ounsworth (diff)
Opsdir Last Call review of -09 by Jouni Korhonen (diff)
Assignment Reviewer Mallory Knodel
State Completed
Request Last Call review on draft-ietf-cdni-https-delegation-subcerts by General Area Review Team (Gen-ART) Assigned
Posted at https://mailarchive.ietf.org/arch/msg/gen-art/8NHQpGNZaOCztcGxIAMFXUa4Uic
Reviewed revision 08 (document currently at 12)
Result Ready
Completed 2024-06-26
review-ietf-cdni-https-delegation-subcerts-08-genart-lc-knodel-2024-06-26-00
I am the assigned Gen-ART reviewer for this draft. The General Area
Review Team (Gen-ART) reviews all IETF documents being processed
by the IESG for the IETF Chair.  Please treat these comments just
like any other last call comments.

For more information, please see the FAQ at

<https://wiki.ietf.org/en/group/gen/GenArtFAQ>.

Document: draft-ietf-cdni-https-delegation-subcerts-??
Reviewer: Mallory Knodel
Review Date: 2024-06-25
IETF LC End Date: 2024-06-25
IESG Telechat date: Not scheduled for a telechat

Summary: I found no major issues with the draft as it's written. Its
specifications are concise and clear. I have only suggested adding one sentence
to the privacy considerations section as a minor issue.

Major issues: None

Minor issues: The privacy considerations section might include the following
sentence, to parallel the security considerations section and present a
reasonable risk to implementers of this specification, "A single or systematic
retrieval of delegated credentials and associated private keys would allow the
attacker to decrypt any data sent by the end user intended for the end service,
which may include PII."

Nits/editorial comments: None.