Re: [HOKEY] WGLC on draft-ietf-hokey-erp-aak

Glen Zorn <gwz@net-zen.net> Sun, 15 May 2011 06:28 UTC

Return-Path: <gwz@net-zen.net>
X-Original-To: hokey@ietfa.amsl.com
Delivered-To: hokey@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 76A11E06C3 for <hokey@ietfa.amsl.com>; Sat, 14 May 2011 23:28:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level:
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id m557DNKYLFQz for <hokey@ietfa.amsl.com>; Sat, 14 May 2011 23:28:23 -0700 (PDT)
Received: from p3plsmtpa01-10.prod.phx3.secureserver.net (p3plsmtpa01-10.prod.phx3.secureserver.net [72.167.82.90]) by ietfa.amsl.com (Postfix) with SMTP id A3F8CE066C for <hokey@ietf.org>; Sat, 14 May 2011 23:28:23 -0700 (PDT)
Received: (qmail 4941 invoked from network); 15 May 2011 06:28:22 -0000
Received: from unknown (124.122.83.151) by p3plsmtpa01-10.prod.phx3.secureserver.net (72.167.82.90) with ESMTP; 15 May 2011 06:28:21 -0000
Message-ID: <4DCF727E.7050700@net-zen.net>
Date: Sun, 15 May 2011 13:28:14 +0700
From: Glen Zorn <gwz@net-zen.net>
Organization: Network Zen
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.17) Gecko/20110414 Thunderbird/3.1.10
MIME-Version: 1.0
To: Qin Wu <sunseawq@huawei.com>
References: <4DC13C44.7070106@net-zen.net> <038001cc0ec3$5298d0e0$46298a0a@china.huawei.com>
In-Reply-To: <038001cc0ec3$5298d0e0$46298a0a@china.huawei.com>
X-Enigmail-Version: 1.1.1
Content-Type: multipart/mixed; boundary="------------070508050300000908070307"
Cc: hokey-chairs@ietf.org, hokey@ietf.org, draft-ietf-hokey-erp-aak@tools.ietf.org
Subject: Re: [HOKEY] WGLC on draft-ietf-hokey-erp-aak
X-BeenThere: hokey@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: HOKEY WG Mailing List <hokey.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hokey>, <mailto:hokey-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/hokey>
List-Post: <mailto:hokey@ietf.org>
List-Help: <mailto:hokey-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hokey>, <mailto:hokey-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 15 May 2011 06:28:24 -0000

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 5/10/2011 10:35 AM, Qin Wu wrote:

> Hi,
> I read and support this work forward. 
> Here is my comments belows:
> 1. Abstract
> [Qin]: The abstract is too long. I suggest to change from
> "
>    The Extensible Authentication Protocol (EAP) is a generic framework
>    supporting multiple of authentication methods.
> 
>    The EAP Re-authentication Protocol (ERP) specifies extensions to EAP
>    and the EAP keying hierarchy to support an EAP method-independent
>    protocol for efficient re-authentication between the peer and an EAP
>    re-authentication server through any authenticator.
> 
>    Authenticated Anticipatory Keying (AAK) is a method by which
>    cryptographic keying material may be established prior to handover
>    upon one or more candidate attachment points (CAPs).  AAK uses the
>    AAA infrastructure for key transport.
> 
>    This document specifies the extensions necessary to enable AAK
>    support in ERP.
> "
> to
> "
>    Authenticated Anticipatory Keying (AAK) is a method by which
>    cryptographic keying material may be established prior to handover
>    upon one or more candidate attachment points (CAPs).  AAK uses the
>    AAA infrastructure for key transport.
> 
>    This document specifies the extensions necessary to enable AAK
>    support in ERP.
> "

Actually, I don't think that the Abstract is too long at all.

> Section 4 First Paragraph
> "
>    As an optimization of ERP, ERP/AAK uses key hierarchy similar to that
>   of ERP.  
> "
>  [Qin]: Suggest to change "optimization" as "extension".

Agree, & also change "uses key" to "uses a key"

> 
> Section 4 Fist paragraph:
> "
> The hierarchy relationship is illustrated in Figure 2, below.
> "
> [Qin]: suggestion to change as:
> "
> The hierarchy relationship is illustrated in Figure 2 shown below.

Why?

...

> 
> Section 7 last setence:
>    [Qin]: Remove the last sentence since we can resue the extisting AAA message.

What message did you have in mind?  I can't think of any that do what is
necessary.

...
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.14 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQEcBAEBAgAGBQJNz3J+AAoJEG4XtfZZU7RfheYIAIFhMJ6tP0cf+WZLzMeZML2b
AO9yhaqbouCCxpCdXUGHLwrTOtyKEyXrXA62ZUHfh2LtKbR1B/K7SCp/nW3e2hEk
ewItOuyfGEgQN4KoPQhL9FakfVPQFezEKse3TdwV4x7v9/foASV8U5CW0wFXI5sj
UZColU5PtvKEGRK7/yUcxDie9kA0xwCPsrLzxdRfdnQjMBGuOmexwK4fpe9i4K7d
ZVyVs9ey7DEgujFmOJ7OnBIiTC6OnarXkWelN3cvliGtjNekc/VM55J7tqUWqcRl
6R0RvRe/ok20X8DseuWl2aLFKA8A7QvES0LzecblHSnw8auN/OGUIpFqRhJ2EvA=
=N0xC
-----END PGP SIGNATURE-----