[HOKEY] 答复: PROTO write-up for draft-ietf-hokey-rfc5296bis-06

zhou.sujing@zte.com.cn Fri, 02 December 2011 09:14 UTC

Return-Path: <zhou.sujing@zte.com.cn>
X-Original-To: hokey@ietfa.amsl.com
Delivered-To: hokey@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9728B21F9937; Fri, 2 Dec 2011 01:14:08 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -93.841
X-Spam-Level:
X-Spam-Status: No, score=-93.841 tagged_above=-999 required=5 tests=[AWL=-1.051, BAYES_00=-2.599, CHARSET_FARAWAY_HEADER=3.2, HTML_MESSAGE=0.001, MIME_8BIT_HEADER=0.3, MIME_BASE64_TEXT=1.753, MIME_CHARSET_FARAWAY=2.45, RCVD_DOUBLE_IP_LOOSE=0.76, SARE_SUB_ENC_GB2312=1.345, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZF8ey+fDXzJo; Fri, 2 Dec 2011 01:14:07 -0800 (PST)
Received: from mx5.zte.com.cn (mx5.zte.com.cn [63.217.80.70]) by ietfa.amsl.com (Postfix) with ESMTP id 298C521F993A; Fri, 2 Dec 2011 01:14:05 -0800 (PST)
Received: from [10.30.17.99] by mx5.zte.com.cn with surfront esmtp id 41713354241222; Fri, 2 Dec 2011 17:07:40 +0800 (CST)
Received: from [10.30.3.21] by [192.168.168.15] with StormMail ESMTP id 12571.3297117251; Fri, 2 Dec 2011 17:12:30 +0800 (CST)
Received: from notes_smtp.zte.com.cn ([10.30.1.239]) by mse02.zte.com.cn with ESMTP id pB29CItc020796; Fri, 2 Dec 2011 17:12:18 +0800 (GMT-8) (envelope-from zhou.sujing@zte.com.cn)
In-Reply-To: <C0E0A32284495243BDE0AC8A066631A80C1FA5E0@szxeml526-mbs.china.huawei.com>
To: Tina TSOU <Tina.Tsou.Zouting@huawei.com>
MIME-Version: 1.0
X-Mailer: Lotus Notes Release 6.5.6 March 06, 2007
Message-ID: <OF6656DD21.7AA25D23-ON4825795A.00323D21-4825795A.00329297@zte.com.cn>
From: zhou.sujing@zte.com.cn
Date: Fri, 2 Dec 2011 17:12:04 +0800
X-MIMETrack: Serialize by Router on notes_smtp/zte_ltd(Release 8.5.1FP4|July 25, 2010) at 2011-12-02 17:12:21, Serialize complete at 2011-12-02 17:12:21
Content-Type: multipart/alternative; boundary="=_alternative 003292974825795A_="
X-MAIL: mse02.zte.com.cn pB29CItc020796
Cc: hokey-bounces@ietf.org, "hokey@ietf.org" <hokey@ietf.org>
Subject: [HOKEY] =?gb2312?b?tPC4tDogIFBST1RPIHdyaXRlLXVwIGZvciBkcmFmdC1p?= =?gb2312?b?ZXRmLWhva2V5LXJmYzUyOTZiaXMtMDY=?=
X-BeenThere: hokey@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: HOKEY WG Mailing List <hokey.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hokey>, <mailto:hokey-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/hokey>
List-Post: <mailto:hokey@ietf.org>
List-Help: <mailto:hokey-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hokey>, <mailto:hokey-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 02 Dec 2011 09:14:08 -0000

Hi, 

I know this document is not solicting comment at this stage and I am not a 
key WG member of HOKEY either,

but I'd like to put forward a little suggestion or a question:
Could the definition of "ERP bootstrapping" be explictly included in it? 
It will make the reading more clearer. 


Regards~~~

-Sujing Zhou

hokey-bounces@ietf.org 写于 2011-11-24 12:51:09:

> Hi Stephen,
> Here is the PROTO write-up for draft-ietf-hokey-rfc5296bis-06.
> 
>   (1.a) Who is the Document Shepherd for this document?
> 
>         Tina Tsou <Tina.Tsou.Zouting@huawei.com>
> 
>         Has the Document Shepherd personally reviewed this version of
>         the document and, in particular, does he or she believe this
>         version is ready for forwarding to the IESG for publication?
> 
>         Yes and yes.
> 
>   (1.b) Has the document had adequate review both from key WG members
>         and from key non-WG members? Does the Document Shepherd have
>         any concerns about the depth or breadth of the reviews that
>         have been performed?
> 
>         Yes and no; as the filename indicates this is just a revision
>         of RFC 5296, mostly clearing the existing errata, cleaning up
>         the language a bit, etc.  No major technical changes were made.
> 
>   (1.c) Does the Document Shepherd have concerns that the document
>         needs more review from a particular or broader perspective,
>         e.g., security, operational complexity, someone familiar with
>         AAA, internationalization or XML?
> 
>         No.
> 
>   (1.d) Does the Document Shepherd have any specific concerns or
>         issues with this document that the Responsible Area Director
>         and/or the IESG should be aware of?
> 
>         No.
> 
>         Has an IPR disclosure related to this document
>         been filed?
> 
>         No.
> 
>   (1.e) How solid is the WG consensus behind this document? Does it
>         represent the strong concurrence of a few individuals, with
>         others being silent, or does the WG as a whole understand and
>         agree with it?
> 
>         Consensus is as strong as for any hokey document.
> 
>   (1.f) Has anyone threatened an appeal or otherwise indicated extreme
>         discontent?
> 
>         No.
> 
>   (1.g) Has the Document Shepherd personally verified that the
>         document satisfies all ID nits?
> 
>         Yes; idnits generates several spurious warnings caused by
>         interpreting elements of a figure as references and one
>         down-reference error (see below).
> 
>         Has the document met all formal review criteria it needs to,
>         such as the MIB Doctor, media type and URI type reviews?
> 
>         Yes.
> 
>   (1.h) Has the document split its references into normative and
>         informative?
> 
>    No.
> 
>         Are there normative references to documents that
>         are not ready for advancement or are otherwise in an unclear
>         state?
> 
>    No.
> 
>    Are there normative references
>         that are downward references, as described in [RFC3967]?
> 
>    Yes.
> 
>    If so, list these downward references to support the Area
>         Director in the Last Call procedure for them [RFC3967].
> 
>    Split as required. No down-references.
> 
> 
>   (1.i) Has the Document Shepherd verified that the document IANA
>         consideration section exists and is consistent with the body
>         of the document? If the document specifies protocol
>         extensions, are reservations requested in appropriate IANA
>         registries? Are the IANA registries clearly identified? If
>         the document creates a new registry, does it define the
>         proposed initial contents of the registry and an allocation
>         procedure for future registrations? Does it suggest a
>         reasonable name for the new registry? See [RFC5226]. If the
>         document describes an Expert Review process has Shepherd
>         conferred with the Responsible Area Director so that the IESG
>         can appoint the needed Expert during the IESG Evaluation?
> 
>    The IANA considerations section exists; the registry is identified 
and 
>    there are no other new registries.
> 
>   (1.j) Has the Document Shepherd verified that sections of the
>         document that are written in a formal language, such as XML
>         code, BNF rules, MIB definitions, etc., validate correctly in
>         an automated checker?
> 
>    Not applicable.
> 
>   (1.k) The IESG approval announcement includes a Document
>         Announcement Write-Up. Please provide such a Document
>         Announcement Write-Up? Recent examples can be found in the
>         "Action" announcements for approved documents. The approval
>         announcement contains the following sections:
>      Technical Summary
>         Relevant content can frequently be found in the abstract
>         and/or introduction of the document. If not, this may be
>         an indication that there are deficiencies in the abstract
>         or introduction.
> 
>    The Extensible Authentication Protocol (EAP) is a generic framework
>       supporting multiple types of authentication methods.  In systems
>       where EAP is used for authentication, it is desirable to avoid
>       repeating the entire EAP exchange with another authenticator. This
>       document specifies extensions to EAP and the EAP keying hierarchy 
to
>       support an EAP method-independent protocol for efficient re-
>       authentication between the peer and an EAP re-authentication 
server
>       through any authenticator.  The re-authentication server may be in
>       the home network or in the local network to which the peer is
>       connecting.
> 
>    This memo obsoletes RFC 5296.
> 
>      Working Group Summary
>         Was there anything in WG process that is worth noting? For
>         example, was there controversy about particular points or
>         were there decisions where the consensus was particularly
>         rough?
> 
>    The document is a product of the Hokey working group. The document 
has 
>         working group consensus.
> 
> 
>      Document Quality
>         Are there existing implementations of the protocol? Have a
>         significant number of vendors indicated their plan to
>         implement the specification? Are there any reviewers that
>         merit special mention as having done a thorough review,
>         e.g., one that resulted in important changes or a
>         conclusion that the document had no substantive issues? If
>         there was a MIB Doctor, Media Type or other expert review,
>         what was its course (briefly)? In the case of a Media Type
>         review, on what date was the request posted?
> 
>    The document simplifies the usage scenarios identified and 
> optimizes the procedure, protocol for the specific usage scenario. 
> This document has gotten sufficient review from people with both OPS
> and Security background. The quality of the document is good.
> 
> 
> 
> 
> Best Regards,
> Tina TSOU
> http://tinatsou.weebly.com/contact.html
> 
> 
> 
> _______________________________________________
> HOKEY mailing list
> HOKEY@ietf.org
> https://www.ietf.org/mailman/listinfo/hokey
> 



--------------------------------------------------------
ZTE Information Security Notice: The information contained in this mail is solely property of the sender's organization. This mail communication is confidential. Recipients named above are obligated to maintain secrecy and are not permitted to disclose the contents of this communication to others.
This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error please notify the originator of the message. Any views expressed in this message are those of the individual sender.
This message has been scanned for viruses and Spam by ZTE Anti-Spam system.