Skip to main content

Last Call Review of draft-ietf-quic-manageability-14
review-ietf-quic-manageability-14-artart-lc-saint-andre-2022-02-14-00

Request Review of draft-ietf-quic-manageability
Requested revision No specific revision (document currently at 18)
Type Last Call Review
Team ART Area Review Team (artart)
Deadline 2022-02-07
Requested 2022-01-24
Authors Mirja Kühlewind , Brian Trammell
I-D last updated 2022-02-14
Completed reviews Artart Last Call review of -14 by Peter Saint-Andre (diff)
Opsdir Last Call review of -14 by Al Morton (diff)
Genart Last Call review of -14 by Elwyn B. Davies (diff)
Secdir Last Call review of -14 by Barry Leiba (diff)
Assignment Reviewer Peter Saint-Andre
State Completed
Request Last Call review on draft-ietf-quic-manageability by ART Area Review Team Assigned
Posted at https://mailarchive.ietf.org/arch/msg/art/jB34IuU065v-PcPjUwL4QX6Dz00
Reviewed revision 14 (document currently at 18)
Result Ready w/nits
Completed 2022-02-14
review-ietf-quic-manageability-14-artart-lc-saint-andre-2022-02-14-00
ARTART review for draft-ietf-quic-manageability
Author: Peter Saint-Andre
Date: 2022-02-14

Overall this document is in good shape (in particular, I welcome its neutral,
explanatory tone). I have only small comments.

In Section 2, the phrase "this document describes version 1 of the QUIC
protocol" could be slightly misleading, because presumably the protocol itself
is described in the QUIC specifications. I suggest changing "describes" to
"addresses".

It might be helpful to mention that QUIC-specific terminology (e.g., "spin
bit") is defined in the QUIC specifications.

Is there a difference between "long packet headers" and "long header packets"?
Both phrases are used.

The phrase "cryptographically obfuscated" (used in Section 2.1 and elsewhere)
is strange. Typically, to obfuscate something means to make it obscure,
unclear, or unintelligible; this verges on "security by obscurity". It would be
more accurate to say that constructs like the packet number and key phase are
cryptographically protected or, even better, that the QUIC protocol ensures
data confidentiality (e.g., as that term is defined in RFC 4949).

Can we provide a citation for the term 5-tuple?

In Section 2.4, I had to read this sentence several times in order to parse it:

   The content of Initial packets is encrypted using Initial Secrets,
   which are derived from a per-version constant and the client's
   destination connection ID; they are therefore observable by any on-
   path device that knows the per-version constant and considered
   visible in this illustration.

I suggest saying "and are considered" to reduce the possibility of confusion.