Re: [Hipsec] WGLC: draft-ietf-hip-rfc4423-bis

Miika Komu <mkomu@cs.hut.fi> Tue, 08 April 2014 10:27 UTC

Return-Path: <mkomu@cs.hut.fi>
X-Original-To: hipsec@ietfa.amsl.com
Delivered-To: hipsec@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 90B541A01E9 for <hipsec@ietfa.amsl.com>; Tue, 8 Apr 2014 03:27:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.21
X-Spam-Level:
X-Spam-Status: No, score=-4.21 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4zBuy2io_9mt for <hipsec@ietfa.amsl.com>; Tue, 8 Apr 2014 03:27:31 -0700 (PDT)
Received: from mail.cs.hut.fi (mail.cs.hut.fi [130.233.192.7]) by ietfa.amsl.com (Postfix) with ESMTP id 6C40F1A02E0 for <hipsec@ietf.org>; Tue, 8 Apr 2014 03:27:28 -0700 (PDT)
Received: from [127.0.0.1] (hutcs.cs.hut.fi [130.233.192.10]) by mail.cs.hut.fi (Postfix) with ESMTP id AFF563080F5 for <hipsec@ietf.org>; Tue, 8 Apr 2014 13:27:21 +0300 (EEST)
Message-ID: <5343CF09.9030205@cs.hut.fi>
Date: Tue, 08 Apr 2014 13:27:21 +0300
From: Miika Komu <mkomu@cs.hut.fi>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Thunderbird/24.4.0
MIME-Version: 1.0
To: hipsec@ietf.org
References: <532AD28B.4010204@ericsson.com> <C018CAF7B620E64D87620E581C4E6BB905536DEC@XCH-BLV-104.nw.nos.boeing.com> <5343CE8D.3020506@ericsson.com>
In-Reply-To: <5343CE8D.3020506@ericsson.com>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Archived-At: http://mailarchive.ietf.org/arch/msg/hipsec/cUdyVaTv16GBSAtXIhwubxoKE6Y
Subject: Re: [Hipsec] WGLC: draft-ietf-hip-rfc4423-bis
X-BeenThere: hipsec@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "This is the official IETF Mailing List for the HIP Working Group." <hipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hipsec>, <mailto:hipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/hipsec/>
List-Post: <mailto:hipsec@ietf.org>
List-Help: <mailto:hipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hipsec>, <mailto:hipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 08 Apr 2014 10:27:35 -0000

Hi,

sure thing, thanks Tom for comments!

On 04/08/2014 01:25 PM, Gonzalo Camarillo wrote:
> Hi Tom,
>
> thanks for your comments. Authors, could you please look into this?
>
> Thanks,
>
> Gonzalo
>
> On 07/04/2014 12:08 AM, Henderson, Thomas R wrote:
>>> Hi,
>>>
>>> we WGLCed this draft some time ago, but we are WGLCing it again at this
>>> point to make sure people are happy with the current version:
>>>
>>> https://datatracker.ietf.org/doc/draft-ietf-hip-rfc4423-bis/
>>>
>>> This WGLC will end on April 6th. Please, send your comments to this
>>> list before then.
>>>
>>
>> I read the revised version again today and believe it is ready to publish once the below nits are taken care of.  I believe that they are mostly editorial but I'd be happy to discuss on the list.
>>
>> - Tom
>>
>> Section 1
>> ---------
>>
>> Old text:
>>
>>   There is exactly one Host Identifier for each Host Identity.
>>
>> New text:
>>
>>   There is exactly one Host Identifier for each Host Identity (although there may be transient periods of time such as key replacement when more than one identifier may be active).
>>
>> The reference to Section 7 should be to Section 6.
>>
>> The first use of ESP should be cited (it is later cited in 6.1).
>>
>> Section 2
>> ---------
>>
>> Old text:
>>
>>                                                              Public is  |
>>     |               | a relative term here, ranging from known to peers |
>>     |               | only to known to the World.                       |
>>
>> New text:
>>
>>
>>                                                              Public is  |
>>     |               | a relative term here, ranging from "known to      |
>>     |               | peers only" to "known to the world."              |
>>
>> Again, the reference to HIP base exchange should be Section 6, not Section 7
>>
>> Section 3
>> -----------
>>
>> Old text:
>>
>>     o  The names should have a localized abstraction so that it can be
>>        used in existing protocols and APIs.
>>
>> New text:
>>
>>     o  The names should have a localized abstraction so that they can be
>>        used in existing protocols and APIs.
>>
>> Section 4
>> ---------
>>
>> Old text:
>>
>>     a public-key-based HI can
>>     authenticate the HIP packets and protect them for man-in-the-middle
>>     attacks.
>>
>> New text:
>>
>>     a public-key-based HI can
>>     authenticate the HIP packets and protect them from man-in-the-middle
>>     attacks.
>>
>> s/HIP BEX/HIP base exchange
>>
>> Section 4.2
>> -----------
>> s/through out/throughout
>>
>> Section 4.3
>> -----------
>> s/HIts/HITs
>>
>> Section 4.5
>> -----------
>> s/types of application/types of applications
>>
>> Old text:
>>
>>     For instance,
>>     Light-weight Directory Access Protocol (LDAP) or in a Public Key
>>     Infrastructure (PKI) [I-D.ietf-hip-rfc6253-bis].
>>
>> New text:
>>
>>     For instance, a directory based on the
>>     Lightweight Directory Access Protocol (LDAP) or a Public Key
>>     Infrastructure (PKI) [I-D.ietf-hip-rfc6253-bis] may be used.
>>
>> s/associate with/associated with
>>
>> s/a LDAP or DHT/an LDAP-based directory or DHT
>>
>> Section 5
>> ---------
>>
>> Old text:
>>
>>     As discussed above, the IP
>>     addresses can be seen to be a confounding of routing direction
>>     vectors and interface names.
>>
>> New text:
>>
>>     As discussed above, the IP
>>     addresses can be seen to be a confounding of computing platform
>>     names and interface names.
>>
>> (or else delete this sentence as it is somewhat redundant with other sentences below; I just felt that the "confounding" aspect relates to EIDs and locators instead of routing direction vectors)
>>
>> Section 8
>> ---------
>> s/cannot distinguished/cannot be distinguished
>>
>> Section 9
>> ---------
>> s/intestigating/investigating
>>
>> s/Particularly, so called bloom filters/In particular, so-called Bloom filters
>>
>> (also in section 12.3, 'Bloom' is not capitalized; it should be either be capitalized everywhere (typical usage that I have seen) or lower case everywhere)
>>
>> s/datastructures/data structures
>>
>> s/by HIP working group/by the HIP working group
>>
>> Section 10
>> ----------
>> s/in a similar vain/similar to how
>>
>> Old text:
>>     The implementations should provide for a policy of
>>     initiator HIT to responder HIT.
>>
>> New text:
>>     The implementations should provide for a policy mapping of
>>     initiator HITs to responder HITs.
>>
>> Section 11
>> ----------
>> s/With the exception High-Performance/With the exception of High-Performance
>>
>> s/As majority of the/As the majority of the
>>
>> s/More agile IPv6 interoperability as discussed in Section 4.4./More agile IPv6 interoperability can be achieved, as discussed in Section 4.4.
>>
>> s/An addition, the underlying/Additionally, the underlying
>>
>> s/halves the size of access control lists/can potentially halve the size of access control lists
>>
>> the reference [scultz-intermittent] should probably be spelled [schuetz-intermittent]
>>
>> Section 11.3
>> ------------
>> s/accomodate/accommodate
>>
>> s/strictly speaking mandatory/mandatory
>>
>> Section 12.2
>> ------------
>> s/credit-based authorization approach Host Mobility/credit-based authorization approach for host mobility
>>
>> Section 12.3
>> -------------
>> s/There has been attempts/There have been attempts
>>
>> s/the protection of malign data flows/??
>>
>> s/which the the end-hosts/which the end-hosts
>>
>> Section 15
>> ----------
>> s/RFC 4424/RFC 4423
>>
>>
>
> _______________________________________________
> Hipsec mailing list
> Hipsec@ietf.org
> https://www.ietf.org/mailman/listinfo/hipsec
>