Re: [Hipsec] WGLC: draft-ietf-hip-rfc4423-bis

Miika Komu <mkomu@cs.hut.fi> Thu, 24 April 2014 19:15 UTC

Return-Path: <mkomu@cs.hut.fi>
X-Original-To: hipsec@ietfa.amsl.com
Delivered-To: hipsec@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F3D001A0381 for <hipsec@ietfa.amsl.com>; Thu, 24 Apr 2014 12:15:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.472
X-Spam-Level:
X-Spam-Status: No, score=-4.472 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.272] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hkZVAfT0RVHb for <hipsec@ietfa.amsl.com>; Thu, 24 Apr 2014 12:15:11 -0700 (PDT)
Received: from mail.cs.hut.fi (mail.cs.hut.fi [130.233.192.7]) by ietfa.amsl.com (Postfix) with ESMTP id D93591A036B for <hipsec@ietf.org>; Thu, 24 Apr 2014 12:15:10 -0700 (PDT)
Received: from [127.0.0.1] (hutcs.cs.hut.fi [130.233.192.10]) by mail.cs.hut.fi (Postfix) with ESMTP id 332EF3088FF for <hipsec@ietf.org>; Thu, 24 Apr 2014 22:15:03 +0300 (EEST)
Message-ID: <535962B7.3080409@cs.hut.fi>
Date: Thu, 24 Apr 2014 22:15:03 +0300
From: Miika Komu <mkomu@cs.hut.fi>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Thunderbird/24.4.0
MIME-Version: 1.0
To: hipsec@ietf.org
References: <532AD28B.4010204@ericsson.com> <C018CAF7B620E64D87620E581C4E6BB905536DEC@XCH-BLV-104.nw.nos.boeing.com> <5343CE8D.3020506@ericsson.com> <5343CF09.9030205@cs.hut.fi>
In-Reply-To: <5343CF09.9030205@cs.hut.fi>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Archived-At: http://mailarchive.ietf.org/arch/msg/hipsec/g-4zvIiG0nSMhg-e1p0P_JnW6B8
Subject: Re: [Hipsec] WGLC: draft-ietf-hip-rfc4423-bis
X-BeenThere: hipsec@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "This is the official IETF Mailing List for the HIP Working Group." <hipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hipsec>, <mailto:hipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/hipsec/>
List-Post: <mailto:hipsec@ietf.org>
List-Help: <mailto:hipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hipsec>, <mailto:hipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 24 Apr 2014 19:15:16 -0000

Hi,

Tom: thanks again for good catches! All comments are fixed in 08 version.

Gonzalo: I think we're good to go for the last call.

On 04/08/2014 01:27 PM, Miika Komu wrote:
> Hi,
>
> sure thing, thanks Tom for comments!
>
> On 04/08/2014 01:25 PM, Gonzalo Camarillo wrote:
>> Hi Tom,
>>
>> thanks for your comments. Authors, could you please look into this?
>>
>> Thanks,
>>
>> Gonzalo
>>
>> On 07/04/2014 12:08 AM, Henderson, Thomas R wrote:
>>>> Hi,
>>>>
>>>> we WGLCed this draft some time ago, but we are WGLCing it again at this
>>>> point to make sure people are happy with the current version:
>>>>
>>>> https://datatracker.ietf.org/doc/draft-ietf-hip-rfc4423-bis/
>>>>
>>>> This WGLC will end on April 6th. Please, send your comments to this
>>>> list before then.
>>>>
>>>
>>> I read the revised version again today and believe it is ready to
>>> publish once the below nits are taken care of.  I believe that they
>>> are mostly editorial but I'd be happy to discuss on the list.
>>>
>>> - Tom
>>>
>>> Section 1
>>> ---------
>>>
>>> Old text:
>>>
>>>   There is exactly one Host Identifier for each Host Identity.
>>>
>>> New text:
>>>
>>>   There is exactly one Host Identifier for each Host Identity
>>> (although there may be transient periods of time such as key
>>> replacement when more than one identifier may be active).
>>>
>>> The reference to Section 7 should be to Section 6.
>>>
>>> The first use of ESP should be cited (it is later cited in 6.1).
>>>
>>> Section 2
>>> ---------
>>>
>>> Old text:
>>>
>>>                                                              Public
>>> is  |
>>>     |               | a relative term here, ranging from known to
>>> peers |
>>>     |               | only to known to the
>>> World.                       |
>>>
>>> New text:
>>>
>>>
>>>                                                              Public
>>> is  |
>>>     |               | a relative term here, ranging from "known
>>> to      |
>>>     |               | peers only" to "known to the
>>> world."              |
>>>
>>> Again, the reference to HIP base exchange should be Section 6, not
>>> Section 7
>>>
>>> Section 3
>>> -----------
>>>
>>> Old text:
>>>
>>>     o  The names should have a localized abstraction so that it can be
>>>        used in existing protocols and APIs.
>>>
>>> New text:
>>>
>>>     o  The names should have a localized abstraction so that they can be
>>>        used in existing protocols and APIs.
>>>
>>> Section 4
>>> ---------
>>>
>>> Old text:
>>>
>>>     a public-key-based HI can
>>>     authenticate the HIP packets and protect them for man-in-the-middle
>>>     attacks.
>>>
>>> New text:
>>>
>>>     a public-key-based HI can
>>>     authenticate the HIP packets and protect them from man-in-the-middle
>>>     attacks.
>>>
>>> s/HIP BEX/HIP base exchange
>>>
>>> Section 4.2
>>> -----------
>>> s/through out/throughout
>>>
>>> Section 4.3
>>> -----------
>>> s/HIts/HITs
>>>
>>> Section 4.5
>>> -----------
>>> s/types of application/types of applications
>>>
>>> Old text:
>>>
>>>     For instance,
>>>     Light-weight Directory Access Protocol (LDAP) or in a Public Key
>>>     Infrastructure (PKI) [I-D.ietf-hip-rfc6253-bis].
>>>
>>> New text:
>>>
>>>     For instance, a directory based on the
>>>     Lightweight Directory Access Protocol (LDAP) or a Public Key
>>>     Infrastructure (PKI) [I-D.ietf-hip-rfc6253-bis] may be used.
>>>
>>> s/associate with/associated with
>>>
>>> s/a LDAP or DHT/an LDAP-based directory or DHT
>>>
>>> Section 5
>>> ---------
>>>
>>> Old text:
>>>
>>>     As discussed above, the IP
>>>     addresses can be seen to be a confounding of routing direction
>>>     vectors and interface names.
>>>
>>> New text:
>>>
>>>     As discussed above, the IP
>>>     addresses can be seen to be a confounding of computing platform
>>>     names and interface names.
>>>
>>> (or else delete this sentence as it is somewhat redundant with other
>>> sentences below; I just felt that the "confounding" aspect relates to
>>> EIDs and locators instead of routing direction vectors)
>>>
>>> Section 8
>>> ---------
>>> s/cannot distinguished/cannot be distinguished
>>>
>>> Section 9
>>> ---------
>>> s/intestigating/investigating
>>>
>>> s/Particularly, so called bloom filters/In particular, so-called
>>> Bloom filters
>>>
>>> (also in section 12.3, 'Bloom' is not capitalized; it should be
>>> either be capitalized everywhere (typical usage that I have seen) or
>>> lower case everywhere)
>>>
>>> s/datastructures/data structures
>>>
>>> s/by HIP working group/by the HIP working group
>>>
>>> Section 10
>>> ----------
>>> s/in a similar vain/similar to how
>>>
>>> Old text:
>>>     The implementations should provide for a policy of
>>>     initiator HIT to responder HIT.
>>>
>>> New text:
>>>     The implementations should provide for a policy mapping of
>>>     initiator HITs to responder HITs.
>>>
>>> Section 11
>>> ----------
>>> s/With the exception High-Performance/With the exception of
>>> High-Performance
>>>
>>> s/As majority of the/As the majority of the
>>>
>>> s/More agile IPv6 interoperability as discussed in Section 4.4./More
>>> agile IPv6 interoperability can be achieved, as discussed in Section
>>> 4.4.
>>>
>>> s/An addition, the underlying/Additionally, the underlying
>>>
>>> s/halves the size of access control lists/can potentially halve the
>>> size of access control lists
>>>
>>> the reference [scultz-intermittent] should probably be spelled
>>> [schuetz-intermittent]
>>>
>>> Section 11.3
>>> ------------
>>> s/accomodate/accommodate
>>>
>>> s/strictly speaking mandatory/mandatory
>>>
>>> Section 12.2
>>> ------------
>>> s/credit-based authorization approach Host Mobility/credit-based
>>> authorization approach for host mobility
>>>
>>> Section 12.3
>>> -------------
>>> s/There has been attempts/There have been attempts
>>>
>>> s/the protection of malign data flows/??
>>>
>>> s/which the the end-hosts/which the end-hosts
>>>
>>> Section 15
>>> ----------
>>> s/RFC 4424/RFC 4423
>>>
>>>
>>
>> _______________________________________________
>> Hipsec mailing list
>> Hipsec@ietf.org
>> https://www.ietf.org/mailman/listinfo/hipsec
>>
>
> _______________________________________________
> Hipsec mailing list
> Hipsec@ietf.org
> https://www.ietf.org/mailman/listinfo/hipsec
>