[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
comments on draft-ietf-ipsec-oakley-02.txt
A table of contents is worthwhile for a document of this size.
Section 2.3, first paragraph, last sentence:
The encodings and meanings for these
choices are presented in Appendix B.
This turns out not to be the case.
Section 2.4.1, near the end, has a sequence of steps that the
initiator performs. The last three are:
sends the reply message, signed with the public key of ID(I),
marks the KEYID (CKY-I|CKY-R) as authenticated,
and composes the reply message and signature.
I suspect I don't understand the last step because it seems to me that
this would have to be done before the third last step. Sort of like
"Ready, Fire, Aim".
Hugh Redelmeier
hugh@mimosa.com voice: +1 416 482-8253