Hi Dieter, Thanks for your detailed comments.
>1) 4.1.1 is a special case of 4.1.2. Therefore, these two cases could be >summarized under on item "Authentication of Masters". I'd recommend to dismiss >the >term "Proventication" at all. According to your explanation it describes the >process of authentication in a hierarchical organized structure. Thus, it >should be >worded accordingly. I understand this is mostly a terminology issue. I will does some reorganizing and rephrasing of this section, but I believe mentioning the word "proventication" is called for, to allow the reader to connect this to the AutoKey context. > 2) Regarding 6.5. What is the implication of this section? Section 6 in general does not imply any *requirements*. It includes some discussion about the connection between time synchronization and security. Specifically, 6.5 discusses the connection between time synchronization and other security services requiring time synchronization. Tal. -----Original Message----- From: [email protected] [mailto:[email protected]] On Behalf Of Dieter Sibold Sent: Tuesday, July 10, 2012 7:55 PM To: [email protected] Subject: Re: [TICTOC] Updated draft-ietf-tictoc-security-requirements-02 Hello Tal and Karen. I had a look at your I-D which I regard as a valuable contribution to this subject. Here are my comments: 1) 4.1.1 is a special case of 4.1.2. Therefore, these two cases could be summarized under on item "Authentication of Masters". I'd recommend to dismiss the term "Proventication" at all. According to your explanation it describes the process of authentication in a hierarchical organized structure. Thus, it should be worded accordingly. 2) Regarding 6.5. What is the implication of this section? Best regards Dieter Am 17.06.12 09:21, schrieb Tal Mizrahi: > Hi, > > The following changes have been made in this draft compared to the > previous draft: > > 1.Following feedback from IETF 83, a threat analysis section was added. > > 2.Made various corrections to address comments received on the mailing list. > > 3.Wrote section 6, which was previously just a placeholder. > > http://www.ietf.org/id/draft-ietf-tictoc-security-requirements-02.txt > > Comments will be appreciated. > > Thanks, > > Tal. > > > > _______________________________________________ > TICTOC mailing list > [email protected] > https://www.ietf.org/mailman/listinfo/tictoc > -- Physikalisch-Technische Bundesanstalt Q.42 - Server Administration Bundesallee 100 D-38116 Braunschweig Germany Tel: +49 531 592 69 8420 Mobile: +49 152 5487 0739 E-Mail: [email protected] _______________________________________________ TICTOC mailing list [email protected] https://www.ietf.org/mailman/listinfo/tictoc
