Thanks Valery, for your comments. Please allow me some time to revert back
to you.

Regards
Mohit

On Tue, Oct 18, 2022 at 4:54 AM Valery Smyslov via Datatracker <
nore...@ietf.org> wrote:

> Reviewer: Valery Smyslov
> Review result: Has Nits
>
> I have reviewed this document as part of the security directorate's ongoing
> effort to review all IETF documents being processed by the IESG.  These
> comments were written primarily for the benefit of the security area
> directors.
> Document editors and WG chairs should treat these comments just like any
> other
> last call comments.
>
> This document defines the use of Constrained Application Protocol
> (CoAP) as a transport for the Certificate Management Protocol (CMP).
>
> Nits:
> 1. I believe that the security considerations from RFC 6712 should be
> either
> echoed in this document (where applicable), or at least be referenced.
>
> 2. I think that Section 3 (Using CoAP over DTLS) should be moved to the
> Security Considerations section, or be referenced from there.
>
> 3. Section 5. I think that the sentence
>
>    The CoAP is vulnerable due to the connectionless characteristics of UDP
>    itself.
>
> should either be expanded of what particular vulnerabilities are meant
> (because
> not all CoAP vulnerabilities are concerned with using UDP) or deleted.
>
>
>
> _______________________________________________
> Ace mailing list
> Ace@ietf.org
> https://www.ietf.org/mailman/listinfo/ace
>
_______________________________________________
Ace mailing list
Ace@ietf.org
https://www.ietf.org/mailman/listinfo/ace

Reply via email to