Re: [Gen-art] Gen-ART review for draft-ietf-sipcore-rfc4244bis-09.txt

2012-09-13 Thread Mary Barnes
Hi Dan,

Thanks for your careful review.  We will fix the nits in the next version.
 I have some comments and new proposed for the minor issue below.

Mary

On Thu, Sep 13, 2012 at 7:46 AM, Romascanu, Dan (Dan) droma...@avaya.comwrote:


 I am the assigned Gen-ART reviewer for this draft. For background on
 Gen-ART, please see the FAQ at 
 http://wiki.tools.ietf.org/area/gen/trac/wiki/GenArtfaq.

 Please wait for direction from your document shepherd or AD before
 posting a new version of the draft.

 Document: draft-ietf-sipcore-rfc4244bis-09.txt
 Reviewer: Dan Romascanu
 Review Date: 9/13/2012
 IETF LC End Date: 9/20/2012
 IESG Telechat date:

 Summary:

 The document is ready for publication. There is one minor issue that
 could benefit from clarifications and a few nits worth cleaning up.

 Major issues:

 Minor issues:

 1. Last paragraph in 16.1:

In cases where an entity that is compliant to this document, receives
a request that contains hi-entries compliant only to RFC4244 (i.e,
the hi-entries do not contain any of the new header field
parameters), the entity should not make any changes to the hi-entries
- i.e., the entries should be cached and forwarded as any other
entries are.  As with RFC4244 compliant entities, applications must
be able to function in cases of missing information.  The same
applies to this document as specified in Section 11.

 I am a little confused by the language used here. It's OK if it is not
 capitalized if the functionality is described someplace else. However,
 why ' should not make any changes to the hi-entries' and ' the entries
 should be cached and forwarded '? Are there any exception cases that
 prevent writing just 'does not make any changes' and 'the entries are
 cached and forwarded'?

[MB]   The intent was to state that the entity MUST NOT add any of the new
header parameter values to the hi-entry to make it look like a 4244bis
hi-entry. But, rather the hi-entry is processed in the exact same manner as
4244bis compliant entries.  I think we do need normative behavior as I
don't think we have specified the behavior for this scenario
elsewhere. [/MB]


 Also - I did not understand to what the last sentence refers (the same
 applies to this document...)

[MB] It was trying to refer to section 11 which specifies that applications
must
   be able to function in cases of missing information.  Really, we could
probably just delete that sentence and add the section 11 reference to the
previous sentence. [/MB]

[MB] Based on my comments above, I would propose the following rewording
for that text:
   In cases where an entity that is compliant to this document, receives
   a request that contains hi-entries compliant only to RFC4244 (i.e,
   the hi-entries do not contain any of the new header field
   parameters), the entity MUST NOT add
   any of the new header field parameters to the hi-entries.
   The hi-entries MUST be cached and forwarded as any other
   entries are as specified in section 9.1.
   As with RFC4244 compliant entities, applications must
   be able to function in cases of missing information, as specified in
Section 11.
[/MB]


 Nits/editorial comments:

 1. In the IANA Considerations section - add a note to the RFC Editor
 that requires that  in [RFC xxx] be replaced with the RFC number
 allocated for this document.

 2. [RFC3969] is unused.

 3. In Section 2, 3rd paragraph s/are used consistent/ are used
 consistently/

 4. In section 4:

This specification also defines three new SIP header field
parameters, rc, mp and np, for the History-Info and Contact
header fields, to tag the method by which the target of a request is
determined.  Further detail on the use of these header field
parameters is provided in Section 10.4.

 Actually the parameters rc, mp and np are defined in section 5.

 5. The readability of the document could be improved by adding a short
 terminology and abbreviations section or by expanding terms and acronyms
 at first occurrence (e.g. UAC, SWS, B2BUA)

___
Gen-art mailing list
Gen-art@ietf.org
https://www.ietf.org/mailman/listinfo/gen-art


[Gen-art] A *new* batch of IETF LC reviews - 2012-09-13

2012-09-13 Thread A. Jean Mahoney

Hi all,

The following reviewers have assignments:

Reviewer  LC endDraft

Elwyn Davies  2012-09-24draft-ietf-dime-erp-12

Francis Dupont2012-09-25draft-ietf-v6ops-ivi-icmp-address-06

Joel Halpern  2012-09-26draft-ietf-krb-wg-camellia-cts-01

Kathleen Moriarty 2012-09-26draft-ietf-nea-asokan-01

Mary Barnes   2012-09-26draft-ietf-krb-wg-kerberos-referral-14



I haven't made the assignments in the review tool yet since the tool is 
having difficulty fetching new drafts. I will send out an update when 
the assignments are available.


The assignments are captured in the spreadsheets:
http://wiki.tools.ietf.org/dav/genart/gen-art.html
http://wiki.tools.ietf.org/dav/genart/gen-art-by-reviewer.html


The standard template is included below.

Thanks,

Jean

---

I am the assigned Gen-ART reviewer for this draft. For background on
Gen-ART, please see the FAQ at

http://wiki.tools.ietf.org/area/gen/trac/wiki/GenArtfaq .

Please resolve these comments along with any other Last Call comments
you may receive.

Document:
Reviewer:
Review Date:
IETF LC End Date:
IESG Telechat date: (if known)

Summary:

Major issues:

Minor issues:

Nits/editorial comments:
___
Gen-art mailing list
Gen-art@ietf.org
https://www.ietf.org/mailman/listinfo/gen-art


[Gen-art] Review: draft-ietf-krb-wg-camellia-cts-01

2012-09-13 Thread Joel M. Halpern

I am the assigned Gen-ART reviewer for this draft. For background on
Gen-ART, please see the FAQ at

http://wiki.tools.ietf.org/area/gen/trac/wiki/GenArtfaq .

Please resolve these comments along with any other Last Call comments
you may receive.

Document: draft-ietf-krb-wg-camellia-cts-01
Camellia Encryption for Kerberos 5
Reviewer: Joel M. Halpern
Review Date:13-Sept-2012
IETF LC End Date: 26-Sept-2012
IESG Telechat date: N/A

Summary: This document is ready for publication as an Informational RFC.

Major issues:

Minor issues:
	The document seems to use random2key (in section 3) and 
random-to-key (in section 4) to represent the same thing, apparently 
meaning the random-to-key identity function of section 6.
	Section 6 defines Ki in a different way than section 4.  Section 4 
apparently uses K0 and Ki to mean K(0) and K(i) for the iteration.  (And 
then in the next line uses K1, K2, ... Kn for these, without parens.) 
But section 6 Ki is for a specific value in the encrypt/decrypt 
functions.  The simple solution would seem to be to consistently use 
parenthesis in section 4.


Nits/editorial comments:
___
Gen-art mailing list
Gen-art@ietf.org
https://www.ietf.org/mailman/listinfo/gen-art