[Netconf] Re:  WGLC for draft-ietf-netconf-tls-04.txt

badra@isima.fr Tue, 30 September 2008 17:41 UTC

Return-Path: <netconf-bounces@ietf.org>
X-Original-To: netconf-archive@lists.ietf.org
Delivered-To: ietfarch-netconf-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 030573A6A32; Tue, 30 Sep 2008 10:41:57 -0700 (PDT)
X-Original-To: netconf@core3.amsl.com
Delivered-To: netconf@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 341343A6A32 for <netconf@core3.amsl.com>; Tue, 30 Sep 2008 10:41:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.477
X-Spam-Level:
X-Spam-Status: No, score=-1.477 tagged_above=-999 required=5 tests=[AWL=0.320, BAYES_00=-2.599, HELO_EQ_FR=0.35, MIME_8BIT_HEADER=0.3, SARE_SUB_ENC_UTF8=0.152]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0wClWRwW0B88 for <netconf@core3.amsl.com>; Tue, 30 Sep 2008 10:41:54 -0700 (PDT)
Received: from sp.isima.fr (sp.isima.fr [193.55.95.1]) by core3.amsl.com (Postfix) with ESMTP id 2F7893A6A2E for <netconf@ietf.org>; Tue, 30 Sep 2008 10:41:54 -0700 (PDT)
Received: from www.isima.fr (www-data@www.isima.fr [193.55.95.79]) by sp.isima.fr (8.13.8/8.13.8) with SMTP id m8UIgH7A504018; Tue, 30 Sep 2008 19:42:17 +0100
Received: from 88.164.98.77 (SquirrelMail authenticated user badra) by www.isima.fr with HTTP; Tue, 30 Sep 2008 19:41:09 +0200 (CEST)
Message-ID: <55259.88.164.98.77.1222796469.squirrel@www.isima.fr>
In-Reply-To: <20080930173350.GA25831@elstar.local>
References: <61043.88.164.98.77.1222722436.squirrel@www.isima.fr> <001301c9230c$7ed77940$0601a8c0@allison> <54288.88.164.98.77.1222791769.squirrel@www.isima.fr> <20080930173350.GA25831@elstar.local>
Date: Tue, 30 Sep 2008 19:41:09 +0200
From: badra@isima.fr
To: j.schoenwaelder@jacobs-university.de
User-Agent: SquirrelMail/1.4.2
MIME-Version: 1.0
X-Priority: 3
Importance: Normal
X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-3.0 (sp.isima.fr [193.55.95.1]); Tue, 30 Sep 2008 19:42:17 +0100 (WEST)
Cc: � <netconf@ietf.org>
Subject: [Netconf] Re:  WGLC for draft-ietf-netconf-tls-04.txt
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://www.ietf.org/mailman/private/netconf>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: netconf-bounces@ietf.org
Errors-To: netconf-bounces@ietf.org

>> I think the "applicability" or the benefits of using pre-shared key
>> based
>> authentication have been explained in the Introduction of [RFC4279]. To
>> recall of them, would be sufficient to insert the following text at the
>> end of the first paragraph of Section 3? (The use of PSK is a MAY, not a
>> SHOULD)
>>
>> "The benefits of pre-shared symmetric-key vs. public-/private-key pair
>> based authentication for the key exchange in TLS have been explained in
>> the Introduction of [RFC4279]".
>
> If you add an explicit pointer to the benefits of PSKs by pointing to
> the Introduction of RFC 4279, then I like to request that you also add
> an explicit pointer to the applicability statement contained in
> section 1.1 of RFC 4279. The text starts as follows:
>
>    The ciphersuites defined in this document are intended for a rather
>    limited set of applications, usually involving only a very small
>    number of clients and servers.  Even in such environments, other
>    alternatives may be more appropriate.

No problem. What about:
    "The application statement and the benefits of using the pre-shared
     key based authentication have been explained in the Introduction of
     [RFC4279]".

Best regards,
Badra
_______________________________________________
Netconf mailing list
Netconf@ietf.org
https://www.ietf.org/mailman/listinfo/netconf