Re: [Hipsec] WGLC: draft-ietf-hip-rfc4423-bis

Gonzalo Camarillo <Gonzalo.Camarillo@ericsson.com> Tue, 08 April 2014 10:25 UTC

Return-Path: <gonzalo.camarillo@ericsson.com>
X-Original-To: hipsec@ietfa.amsl.com
Delivered-To: hipsec@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EAD7F1A02CC for <hipsec@ietfa.amsl.com>; Tue, 8 Apr 2014 03:25:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.24
X-Spam-Level:
X-Spam-Status: No, score=-101.24 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_EQ_SE=0.35, HOST_MISMATCH_NET=0.311, SPF_PASS=-0.001, USER_IN_WHITELIST=-100] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ygJqioG1Kc6c for <hipsec@ietfa.amsl.com>; Tue, 8 Apr 2014 03:25:26 -0700 (PDT)
Received: from sesbmg21.mgmt.ericsson.se (sesbmg21.ericsson.net [193.180.251.49]) by ietfa.amsl.com (Postfix) with ESMTP id 71F5E1A01E9 for <hipsec@ietf.org>; Tue, 8 Apr 2014 03:25:25 -0700 (PDT)
X-AuditID: c1b4fb31-b7f688e000003e64-70-5343ce8e9a1e
Received: from ESESSHC022.ericsson.se (Unknown_Domain [153.88.253.124]) by sesbmg21.mgmt.ericsson.se (Symantec Mail Security) with SMTP id D4.51.15972.E8EC3435; Tue, 8 Apr 2014 12:25:18 +0200 (CEST)
Received: from [147.214.153.162] (153.88.183.153) by smtp.internal.ericsson.com (153.88.183.86) with Microsoft SMTP Server id 14.3.174.1; Tue, 8 Apr 2014 12:25:17 +0200
Message-ID: <5343CE8D.3020506@ericsson.com>
Date: Tue, 08 Apr 2014 13:25:17 +0300
From: Gonzalo Camarillo <Gonzalo.Camarillo@ericsson.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Thunderbird/24.4.0
MIME-Version: 1.0
To: "Henderson, Thomas R" <thomas.r.henderson@boeing.com>, HIP <hipsec@ietf.org>
References: <532AD28B.4010204@ericsson.com> <C018CAF7B620E64D87620E581C4E6BB905536DEC@XCH-BLV-104.nw.nos.boeing.com>
In-Reply-To: <C018CAF7B620E64D87620E581C4E6BB905536DEC@XCH-BLV-104.nw.nos.boeing.com>
X-Enigmail-Version: 1.6
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFprELMWRmVeSWpSXmKPExsUyM+JvjW7fOedgg2XXrS2mLprMbDHtw3kW ByaP3wffMHssWfKTKYApissmJTUnsyy1SN8ugStj2ey3rAUt2hV7Pjxhb2A8Ld/FyMEhIWAi cf9fRBcjJ5ApJnHh3nq2LkYuDiGBk4wSf6bdYoZw1jBKbN60ixGkildAW+J3+wdmkGYWARWJ 2ys4QMJsAhYSW27dZwGxRQWiJLonPWKHKBeUODnzCVhcRCBI4t/G/ewgrcICZhIXf3uChIUE SiQeN7xiAQlzCoRK7OgShbhMXKKnMQikgllAT2LK1RZGCFteYvvbOcwQndoSy5+1sExgFJyF ZNcsJC2zkLQsYGRexShZnFqclJtuZKiXm55bopdalJlcXJyfp1ecuokRGK4Ht/w23ME48Zr9 IUZpDhYlcV6G6Z1BQgLpiSWp2ampBalF8UWlOanFhxiZODilGhibz7mK/pzjtJXVSuZNaaxG +ewC8TVRi4qyi3b6cdo3Jv/lMzrO0/mj82kZ32rNGUxXBM5+8zDaNZvn/4qF0uzzzadx75hZ WnFpz7UIn2uLo77qFXbvSRW+4862LdhcTE7j3tJTOauclh9eqDzp7maJuV7RbVXO+XdDLVxO VJUocn3+MP+I2GUlluKMREMt5qLiRAC0VyE7JQIAAA==
Archived-At: http://mailarchive.ietf.org/arch/msg/hipsec/knN-31N8juWSyT17WHEIPOaIIyk
Subject: Re: [Hipsec] WGLC: draft-ietf-hip-rfc4423-bis
X-BeenThere: hipsec@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "This is the official IETF Mailing List for the HIP Working Group." <hipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hipsec>, <mailto:hipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/hipsec/>
List-Post: <mailto:hipsec@ietf.org>
List-Help: <mailto:hipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hipsec>, <mailto:hipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 08 Apr 2014 10:25:30 -0000

Hi Tom,

thanks for your comments. Authors, could you please look into this?

Thanks,

Gonzalo

On 07/04/2014 12:08 AM, Henderson, Thomas R wrote:
>> Hi,
>>
>> we WGLCed this draft some time ago, but we are WGLCing it again at this
>> point to make sure people are happy with the current version:
>>
>> https://datatracker.ietf.org/doc/draft-ietf-hip-rfc4423-bis/
>>
>> This WGLC will end on April 6th. Please, send your comments to this
>> list before then.
>>
> 
> I read the revised version again today and believe it is ready to publish once the below nits are taken care of.  I believe that they are mostly editorial but I'd be happy to discuss on the list.
> 
> - Tom
> 
> Section 1
> ---------
> 
> Old text:
> 
>  There is exactly one Host Identifier for each Host Identity.
> 
> New text:
> 
>  There is exactly one Host Identifier for each Host Identity (although there may be transient periods of time such as key replacement when more than one identifier may be active).
> 
> The reference to Section 7 should be to Section 6.
> 
> The first use of ESP should be cited (it is later cited in 6.1).
> 
> Section 2
> ---------
> 
> Old text:
> 
>                                                             Public is  |
>    |               | a relative term here, ranging from known to peers |
>    |               | only to known to the World.                       |
> 
> New text:
> 
> 
>                                                             Public is  |
>    |               | a relative term here, ranging from "known to      |
>    |               | peers only" to "known to the world."              |
> 
> Again, the reference to HIP base exchange should be Section 6, not Section 7
> 
> Section 3
> -----------
> 
> Old text:
> 
>    o  The names should have a localized abstraction so that it can be
>       used in existing protocols and APIs.
> 
> New text:
> 
>    o  The names should have a localized abstraction so that they can be
>       used in existing protocols and APIs.
> 
> Section 4
> ---------
> 
> Old text:
> 
>    a public-key-based HI can
>    authenticate the HIP packets and protect them for man-in-the-middle
>    attacks.
> 
> New text:
> 
>    a public-key-based HI can
>    authenticate the HIP packets and protect them from man-in-the-middle
>    attacks.
> 
> s/HIP BEX/HIP base exchange
> 
> Section 4.2
> -----------
> s/through out/throughout
> 
> Section 4.3
> -----------
> s/HIts/HITs
> 
> Section 4.5
> -----------
> s/types of application/types of applications
> 
> Old text:
> 
>    For instance,
>    Light-weight Directory Access Protocol (LDAP) or in a Public Key
>    Infrastructure (PKI) [I-D.ietf-hip-rfc6253-bis].
> 
> New text:
> 
>    For instance, a directory based on the
>    Lightweight Directory Access Protocol (LDAP) or a Public Key
>    Infrastructure (PKI) [I-D.ietf-hip-rfc6253-bis] may be used.
> 
> s/associate with/associated with
> 
> s/a LDAP or DHT/an LDAP-based directory or DHT
> 
> Section 5
> ---------
> 
> Old text:
> 
>    As discussed above, the IP
>    addresses can be seen to be a confounding of routing direction
>    vectors and interface names.
> 
> New text:
> 
>    As discussed above, the IP
>    addresses can be seen to be a confounding of computing platform
>    names and interface names.
> 
> (or else delete this sentence as it is somewhat redundant with other sentences below; I just felt that the "confounding" aspect relates to EIDs and locators instead of routing direction vectors)
> 
> Section 8
> ---------
> s/cannot distinguished/cannot be distinguished
> 
> Section 9
> ---------
> s/intestigating/investigating
> 
> s/Particularly, so called bloom filters/In particular, so-called Bloom filters
> 
> (also in section 12.3, 'Bloom' is not capitalized; it should be either be capitalized everywhere (typical usage that I have seen) or lower case everywhere)
> 
> s/datastructures/data structures
> 
> s/by HIP working group/by the HIP working group
> 
> Section 10
> ----------
> s/in a similar vain/similar to how
> 
> Old text:
>    The implementations should provide for a policy of
>    initiator HIT to responder HIT.
> 
> New text:
>    The implementations should provide for a policy mapping of
>    initiator HITs to responder HITs.
> 
> Section 11
> ----------
> s/With the exception High-Performance/With the exception of High-Performance
> 
> s/As majority of the/As the majority of the
> 
> s/More agile IPv6 interoperability as discussed in Section 4.4./More agile IPv6 interoperability can be achieved, as discussed in Section 4.4.
> 
> s/An addition, the underlying/Additionally, the underlying
> 
> s/halves the size of access control lists/can potentially halve the size of access control lists
> 
> the reference [scultz-intermittent] should probably be spelled [schuetz-intermittent]
> 
> Section 11.3
> ------------
> s/accomodate/accommodate
> 
> s/strictly speaking mandatory/mandatory
> 
> Section 12.2
> ------------
> s/credit-based authorization approach Host Mobility/credit-based authorization approach for host mobility
> 
> Section 12.3
> -------------
> s/There has been attempts/There have been attempts
> 
> s/the protection of malign data flows/??
> 
> s/which the the end-hosts/which the end-hosts
> 
> Section 15
> ----------
> s/RFC 4424/RFC 4423
> 
>