RE: Opsdir last call review of draft-ietf-hip-rfc4423-bis-19

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



HI Miika,



> -----Original Message-----
> From: Miika Komu [mailto:miika.komu@xxxxxxxxxxxx]
> Sent: Monday, January 07, 2019 8:19 PM
> To: Liushucheng (Will Liu) <liushucheng@xxxxxxxxxx>; ops-dir@xxxxxxxx
> Cc: draft-ietf-hip-rfc4423-bis.all@xxxxxxxx; hipsec@xxxxxxxx; ietf@xxxxxxxx
> Subject: Re: Opsdir last call review of draft-ietf-hip-rfc4423-bis-19
> 
> Hi Will,
> 
> On 5/10/18 12:16, Will LIU wrote:
> > Reviewer: Will LIU
> > Review result: Ready
> >
> > Hi all,
> >
> > (Sorry , it seems to me that the notification was blocked by the
> > filter. I guess it's a little bit late.)
> 
> no it's not! It's me who is running late.
[Will] Aha, life is busy.:)


> 
> > I have reviewed draft-ietf-hip-rfc4423-bis-19 as part of the
> > Operational directorate's ongoing effort to review all IETF documents
> > being processed by the IESG.  These comments were written with the
> > intent of improving the operational aspects of the IETF drafts.
> > Comments that are not addressed in last call may be included in AD
> > reviews during the IESG review.  Document editors and WG chairs should
> > treat these comments just like any other last call comments.
> >
> > “This memo describes a new namespace, the Host Identity namespace,
> and
> >     a new protocol layer, the Host Identity Protocol, between the
> >     internetworking and transport layers.  Herein are presented the
> >     basics of the current namespaces, their strengths and weaknesses, and
> >     how a new namespace will add completeness to them.  The roles of this
> >     new namespace in the protocols are defined.
> >
> >     This document obsoletes RFC 4423 and addresses the concerns raised
> by
> >     the IESG, particularly that of crypto agility.  It incorporates
> >     lessons learned from the implementations of RFC 5201 and goes further
> >     to explain how HIP works as a secure signaling channel.”
> >
> > My overall view of the document is 'Ready' for publication.
> 
> thanks!
> 
> > Some small ones:
> >
> > 1. Especially, I am glad to see the security consideration part well
> explained.
> > I guess it's still worth writing something about the security tradeoff
> > influence for the different modes mentioned in previous sections. In
> > fact, there are some words in previous sections, maybe a summary can be
> put here.
> 
> I added one line quick summary to the abstract:
> 
> [...] The section on security considerations describe also measures against
> flooding attacks, usage of identities in access control lists, weaker types of
> identifiers and trust on first use. [...]
> 
> Does this address your concern?
[Will] Yep.

> 
> > 2. It's good to have a single subsection about " Answers to NSRG
> questions".
> > However, maybe it's better to put it in appendix?
> 
> it's already in appendix (due to other review comments).
> 
> Thanks for the feedback!

Regards, /  致礼
Will LIU   /  刘树成




[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux