Hi Rich,
many thanks for the useful suggestions.
Below my reactions.
Most of your suggestions have been taken over.
Greetings,
Peter
Rich Salz via Datatracker schreef op 2022-05-18 19:44:
Reviewer: Rich Salz
Review result: Ready with Nits
A block diagram that show the participants and the protocols (like DTLS
or
RFC4944, etc) would be very helpful to someone new to this field. Like
me.
==>pvds
A forward pointer to figure 1 has been added to the introduction.
==>
Sec 1.
"Once a Pledge is enrolled, it can act as constrained Join Proxy
between other
Pledges and the enrolling Registrar." Is that a special function of
JP-based
enrollment, or could anyone in the mesh be a JP?
==>pvds
NEW
An enrolled Pledge can act as constrained Join Proxy between other
Pledges and the enrolling Registrar.
==>
The 1,2 item list has a
spurious "that" in the second entry.
==>pvds
removed
==>
The "Similar to..." part in the last
paragraph is a sentence fragment.
==>pvds
NEW
Similar to the difference between storing and non_storing Modes of
Operations (MOP) in RPL [RFC6550], the stateful and stateless modes
differ in the way that they store the state required to forward the
return packet to the pledge.
==>
Sec 4.
Oh, you have a diagram here. Spread out the distance between R and J
so that
"multi-hop" fits on one line maybe. Consider adding to it and moving it
to Sec
1. Or at least in Sec 1 have a forward pointer.
==>pvds
This is the diagram proposed by my co-author
++++ multi-hop mesh
|R |---- +---+ +--+ +--+
| | \ |6 |----|J |........|P |
++++ \--+ LR| | | | |
+---+ +--+ +--+
Registrar Join Proxy Pledge
==>
Repeating "(P)" and "(J)"
after the first instance is distracting.
==>pvds
removed
==>
Type "untill" in last paragraph.
==>pvds
don't understand
==>
Why is "legal" in quotes?
==>pvds
legal is removed
==>
"An enrolled device can..." same question as above: ANY
enrolled device could?
==>pvds
Yes, any enrolled devices was a pledge beforehand
==>
Sec 5.1
Maybe "such as by" instead of "for example" The parenthetical about
"Discovery
can also" and the sentence about DNS-SD probably belong in section 6.
==>pvds
sentence about DNS-SD is removed
==>
==>pvds
NEW
The Join Proxy has been enrolled via the
Registrar and learns the IP address and port of the Registrar, by
using a discovery mechanism such as described in Section 6.
==>
In
Figure 2, I was briefly confused by the label "Src_IP" and the content
having
"IP_p" etc.
==>pvds
NEW
The columns "SRc_IP:port" and
"Dst_IP:port" show the IP address and port values for the source and
destination of the message.
==>
Sec 5.2
The phrase "but may also reduce" maybe "and may also reduce"?
==>pvds
followed your suggestion
==>
Is are paragraphs
2 and 3 redundant? Why use JPY and not, say, SJP?
==>pvds
JPY is inherited from earlier draft; and we authors are all used to it.
==>
"The registrar should not
assume..." KEY POINT.
==>pvds
Don't understand
==>
Sec 5.3
Why does the text say "ifindex" but the Figure 4 CDDL says "index"?
==>pvds
ifindex it is. thanks
==>
Since there
can be more than five elements, what is the meaning of extra elements?
Ignore
them? Maybe MUST send only five? "Completely opaque to the receiver"
really
means the receiving Registrar, right?
==>pvds
completely opaque for the values.
The CBOR array is visible.
==>
Sec 6
I was confused about "near" and "remote" Maybe "near and far" or
"local and
remote" ? The rest of Sec 6, describing the different discovery methods
seems
reasonable. (I am not well-qualified to say more than that)
==>pvds
near and far, it is now
==>
Sec 7
This could be moved into 5 as a new subsection. If not, sec 5 should
have a
forward pointer to the comparison.
==>pvds
Forward pointer added
==>
Sec 8
I like the list of possibilities for evil, and why they're not new. The
"enroll
itself" item should have the last two sentence fragments merged "With
..., the
chance ..." Next item "Also this is assumed" maybe "This, too, is
assumed"
==>pvds
"This, too," is now used.
==>
I
think you could bundle all of the items which require having the
private key,
for example, and point out that you depend on the security of DTLS to
prevent
these things, rather than say "unlikely"
==>pvds
I personally like the unlikely. It is always possible with a given
probability to decrypt DTLS encryption
==>
_______________________________________________
Anima mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/anima