[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

comments on draft-ietf-ipsec-oakley-02.txt



A table of contents is worthwhile for a document of this size.

Section 2.3, first paragraph, last sentence:

   The encodings and meanings for these
   choices are presented in Appendix B.

This turns out not to be the case.

Section 2.4.1, near the end, has a sequence of steps that the
initiator performs.  The last three are:

      sends the reply message, signed with the public key of ID(I),

      marks the KEYID (CKY-I|CKY-R) as authenticated,

      and composes the reply message and signature.

I suspect I don't understand the last step because it seems to me that
this would have to be done before the third last step.  Sort of like
"Ready, Fire, Aim".

Hugh Redelmeier
hugh@mimosa.com  voice: +1 416 482-8253