A few comments on the draft below.
--aaron
----
Introduction (sec 1):
* I think it’s missing a statement describing why you chose this set
of protocols. You point out why you don’t include auth-only protocols
but why (only) these? Are you including all of the IETF transport
security protocols? If not, why not? For the non-IETF protocols, why
these? The intro to Sec 3 says they are “security protocols that are
currently used to protect data”.
Terminology (sec 2):
* Is ‘network security layer’ a well-defined term? Does it mean
something like “a security service provided by the network layer to
the transport layer”? Maybe worth including a definition.
* Can security features exist above the transport layer?
gQUIC (sec 3.4)
* RFCs take a long time to publish and live forever. Given that, does
documenting gQUIC make sense in that context? Do you expect it to be
around for a long time? Are there functional differences from QUIC w/
TLS that distinguish it?
MinimalT (sec 3.5)
* I confess I’ve never heard of it. The draft doesn’t include a
citation. Is there no RFC? Seems odd to me that it is “built on top
of a widespread directory service” but the directory service isn’t
identified._______________________________________________
Taps mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/taps