Hello Tal and Karen.I had a look at your I-D which I regard as a valuable contribution to this subject.
Here are my comments:1) 4.1.1 is a special case of 4.1.2. Therefore, these two cases could be summarized under on item "Authentication of Masters". I'd recommend to dismiss the term "Proventication" at all. According to your explanation it describes the process of authentication in a hierarchical organized structure. Thus, it should be worded accordingly.
2) Regarding 6.5. What is the implication of this section? Best regards Dieter Am 17.06.12 09:21, schrieb Tal Mizrahi:
Hi, The following changes have been made in this draft compared to the previous draft: 1.Following feedback from IETF 83, a threat analysis section was added. 2.Made various corrections to address comments received on the mailing list. 3.Wrote section 6, which was previously just a placeholder. http://www.ietf.org/id/draft-ietf-tictoc-security-requirements-02.txt Comments will be appreciated. Thanks, Tal. _______________________________________________ TICTOC mailing list [email protected] https://www.ietf.org/mailman/listinfo/tictoc
-- Physikalisch-Technische Bundesanstalt Q.42 - Server Administration Bundesallee 100 D-38116 Braunschweig Germany Tel: +49 531 592 69 8420 Mobile: +49 152 5487 0739 E-Mail: [email protected]
smime.p7s
Description: S/MIME Kryptografische Unterschrift
_______________________________________________ TICTOC mailing list [email protected] https://www.ietf.org/mailman/listinfo/tictoc
