Hi Dieter,

Thanks for your detailed comments.

>1) 4.1.1 is a special case of 4.1.2. Therefore, these two cases could be 
>summarized under on item "Authentication of Masters". I'd recommend to dismiss 
>the
>term "Proventication" at all. According to your explanation it describes the 
>process of authentication in a hierarchical organized structure. Thus, it 
>should be
>worded accordingly.

I understand this is mostly a terminology issue. I will does some reorganizing 
and rephrasing of this section, but I believe mentioning the word 
"proventication" is called for, to allow the reader to connect this to the 
AutoKey context.


> 2) Regarding 6.5. What is the implication of this section?

Section 6 in general does not imply any *requirements*.
It includes some discussion about the connection between time synchronization 
and security. Specifically, 6.5 discusses the connection between time 
synchronization and other security services requiring time synchronization.

Tal.

-----Original Message-----
From: [email protected] [mailto:[email protected]] On Behalf Of 
Dieter Sibold
Sent: Tuesday, July 10, 2012 7:55 PM
To: [email protected]
Subject: Re: [TICTOC] Updated draft-ietf-tictoc-security-requirements-02

Hello Tal and Karen.

I had a look at your I-D which I regard as a valuable contribution to this 
subject.

Here are my comments:

1) 4.1.1 is a special case of 4.1.2. Therefore, these two cases could be 
summarized under on item "Authentication of Masters". I'd recommend to dismiss 
the term "Proventication" at all. According to your explanation it describes 
the process of authentication in a hierarchical organized structure. Thus, it 
should be worded accordingly.


2) Regarding 6.5. What is the implication of this section?

Best regards
Dieter




Am 17.06.12 09:21, schrieb Tal Mizrahi:
> Hi,
>
> The following changes have been made in this draft compared to the 
> previous draft:
>
> 1.Following feedback from IETF 83, a threat analysis section was added.
>
> 2.Made various corrections to address comments received on the mailing list.
>
> 3.Wrote section 6, which was previously just a placeholder.
>
> http://www.ietf.org/id/draft-ietf-tictoc-security-requirements-02.txt
>
> Comments will be appreciated.
>
> Thanks,
>
> Tal.
>
>
>
> _______________________________________________
> TICTOC mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/tictoc
>

--
Physikalisch-Technische Bundesanstalt
Q.42 - Server Administration
Bundesallee 100
D-38116 Braunschweig
Germany
Tel:    +49 531 592 69 8420
Mobile: +49 152 5487 0739
E-Mail: [email protected]



_______________________________________________
TICTOC mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/tictoc

Reply via email to