Re: [Last-Call] Iotdir telechat review of draft-ietf-suit-architecture-13

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi Mohit,

Thank you for reviewing this draft.

I’ve taken the majority of comments onboard.

> The draft uses TAs for trusted applications (TAs). But RFC 6024 referenced by
> this document uses TAs for Trust anchors. Can we avoid using TA abbreviations
> for trusted applications for ?


This draft also references the TEEP Architecture, which defines TA as Trusted Application, which causes an acronym collision. The only sane way I can see to escape this is to define any collided acronyms locally so that it’s clear what they reference. This is what we have done.

Because TA is defined in the terminology section, re-defined in the section where it is used, used only in the same paragraph as the one in which it is defined, and not used in a way that could be construed as ambiguous with Trust Anchor, I think that this is sufficiently clear and I would prefer not to change it.

Best Regards,
Brendan


> On 20 Oct 2020, at 20:00, Mohit Sethi via Datatracker <noreply@xxxxxxxx> wrote:
>
> Reviewer: Mohit Sethi
> Review result: Ready with Nits
>
> Thanks for the well written document.
>
> I wonder if you want to state the difference between software and firmware
> update. Are they the same thing for this document? The text in the draft at
> some point says "Moreover, this architecture is not limited to managing
> software updates". But most of the other text talks about "firmware updates".
>
> Abstract: "Vulnerabilities with Internet of Things (IoT) devices" ->
> "Vulnerabilities in Internet of Things (IoT) devices"
>
> How about rephrasing the text: "are expected to work automatically, i.e.
> without user involvement. Automatic updates that do not require human
> intervention are key to a scalable solution for fixing software
> vulnerabilities." to "are o a large extent expected to work automatically, i.e.
> with minimal human interaction. Automatic updates that require minimal or no
> interaction are key to a ....". The reason for requesting this change is
> simple: in many scenarios you would want user approval before the actual
> update. For example, updating lights at night during dinner is perhaps not
> ideal. The draft does discuss the importance of device operator approval in
> some circumstances so updating the text would make sense.
>
> "programming language uses and the sandbox the software is executed in."->
> "programming language used...".
>
> "Ensuring an energy efficient design of a battery-powered IoT devices because a
> firmware update -> "...of a battery-powered IoT device because..."
>
> I think most readers will be more familiar with the term Original Equipment
> Manufacture (OEM) rather than Original Design Manufacturer (ODM). I understand
> that ARM has a slightly complicated ecosystem and business model. So perhaps
> the text could say "in some cases, the OEM or the ODM act as a TPA and may
> decide to remain in full control...."
>
> "edge computing device" -> "edge computing devices"
>
> "Updating updates over the Internet" -> "Sending updates over the Internet"
> sounds a bit better
>
> "the status tracker client need to be made aware of the availability of a" ->
> "...the status tracker client needs to be informed about the availability of
> a....."
>
> "what devices qualify for a firmware update" -> "which devices qualify for a
> firmware update"
>
> "are only two approaches recovering from an invalid firmware" -> " are only two
> approaches for recovering from an invalid firmware"
>
> I am not familiar with non-relocatable code. I think this is somewhat explained
> later on as "execute in place" but perhaps adding a few sentences here
> explaining non-relocatable code wouldn't hurt.
>
> Perhaps replace "keyed message digests" with more standard "HMAC" and add a
> reference to RFC 2104
>
> stray closing parenthesis -> "protection was applied)"
>
> "Hence, then the firmware image is updated" -> "Hence, when the firmware image
> is updated"
>
> Not sure how to interpret "mutually-distrustful delivery". I guess I understand
> that the firmware author and user both want to prevent revealing some
> information to the other party. But can we not use "mutually-distrustful
> delivery"?
>
> The draft uses TAs for trusted applications (TAs). But RFC 6024 referenced by
> this document uses TAs for Trust anchors. Can we avoid using TA abbreviations
> for trusted applications for ?
>
>

IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.
-- 
last-call mailing list
last-call@xxxxxxxx
https://www.ietf.org/mailman/listinfo/last-call




[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux