Hello Tal and Karen.

I had a look at your I-D which I regard as a valuable contribution to this subject.

Here are my comments:

1) 4.1.1 is a special case of 4.1.2. Therefore, these two cases could be summarized under on item "Authentication of Masters". I'd recommend to dismiss the term "Proventication" at all. According to your explanation it describes the process of authentication in a hierarchical organized structure. Thus, it should be worded accordingly.


2) Regarding 6.5. What is the implication of this section?

Best regards
Dieter




Am 17.06.12 09:21, schrieb Tal Mizrahi:
Hi,

The following changes have been made in this draft compared to the
previous draft:

1.Following feedback from IETF 83, a threat analysis section was added.

2.Made various corrections to address comments received on the mailing list.

3.Wrote section 6, which was previously just a placeholder.

http://www.ietf.org/id/draft-ietf-tictoc-security-requirements-02.txt

Comments will be appreciated.

Thanks,

Tal.



_______________________________________________
TICTOC mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/tictoc


--
Physikalisch-Technische Bundesanstalt
Q.42 - Server Administration
Bundesallee 100
D-38116 Braunschweig
Germany
Tel:    +49 531 592 69 8420
Mobile: +49 152 5487 0739
E-Mail: [email protected]



Attachment: smime.p7s
Description: S/MIME Kryptografische Unterschrift

_______________________________________________
TICTOC mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/tictoc

Reply via email to