On 01/09/2016 11:21 PM, Brian E Carpenter wrote:
(added dnsop to the CC: for some feedback)
Thanks for the review Brian!
> Summary: Almost ready
>
>
> Comment:
>
>
> As noted in the writeup, there was some WG controversy about this choice
> of method, but since the proposed s
On Mon, 8 Apr 2019, Michael Sinatra wrote:
On 2019-04-06 02:16, Peter Yee via Datatracker wrote:
Page 9, Section 8, 2nd paragraph: append a comma after "Hoffman". "Imminent"
in this sentence is probably not the word you want in document at time of
publication, although it's fine to prod the n
On Mon, 8 Apr 2019, Alissa Cooper wrote:
Peter, thanks for your review. I entered a Yes ballot and pointed to your
review.
Indeed, thanks for the review Peter!
I've incorporated all of your suggestions, with the exception of:
Page 4, Section 1.3: In general, it would be nice if there were
On Mon, 10 Apr 2023, Ines Robles via Datatracker wrote:
The document is well written and easy to read.
Thanks :)
Nits/editorial comments:
Section 3.2: "198.51.0/24" --> "198.51.100.0/24" ?
Fixed in -11.
Question: Section 2.1, the Security Label should be at least of one octet. Is
there
On Sun, 17 Sep 2023, Salz, Rich wrote:
[ speaking as individual only ]
On the other hand, spending a week or two repeating a cycle to get an important
term in the current document seems like a better solution.
If the WG agrees that this is an important term, sure.
Well, if the IETF has co
On Wed, 29 Nov 2023, Linda Dunbar via Datatracker wrote:
Using my Author Hat only.
Nits/editorial comments:
Some of the steps described for "Confidentiality/authentication via Encryption"
are not clear to me. Hope the authors can answers the following questions:
Section 2.1: Step 3 says that t
On Feb 22, 2024, at 17:36, Paul Kyzivat wrote:
>
>
> But, if I am asked to do a telechat review of this document I will raise the
> issue so that the IESG think about it. Then it will be their call.
Note you don’t have to wait to be invited for that. During last-call, voice
what you want to v
On Mon, Apr 1, 2024 at 9:08 AM Valery Smyslov wrote:
I've added the following sentence to the Introduction:
>
>Since IKEv2 doesn't allow to use multiple
>authentication methods and doesn't provide means for peers to
>indicate to the other side which authentication methods they support
I can live with that.PaulSent using a virtual keyboard on a phoneOn Apr 2, 2024, at 03:10, Valery Smyslov wrote:Hi Paul, On Mon, Apr 1, 2024 at 9:08 AM Valery Smyslov wrote: I've added the following sentence to the Introduction: Since IKEv2 doesn't allow to use multiple authen