[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
At Fri, 23 Sep 2005 10:50:02 -0400,
Derek Atkins <derek@xxxxxxxxx> wrote:
> So have we come to consensus on how to handle these issues?
> If there was a misunderstanding from the reading of the text,
> then we should add some additional text to help ensure that
> the same misunderstanding does not occur again.
The revised text in msgid:<20050913145645MH%kamada@xxxxxxxxxx> should
address this, I think.
I've also merged most of the comments from Ken.
I've put the current version and an rfcdiff.
One thing I'd like to hear from the WG (esp. Mike?):
At Wed, 7 Sep 2005 15:08:29 -0400,
Ken Raeburn <raeburn@xxxxxxx> wrote:
> Relatively minor stuff:
> - Introduction:
> Kerberos, like any internet protocol, does have
> its own security considerations. You can find them discussed in
> That's security-considerations material, not introductory
> material. In fact, I think the security considerations section
> already talks about it.
These sentences seem to have been added as a result of the
previous IESG review, for a comment from Randy Bush.
(See the first comment.)
I feel he was not focusing on security vulnerabilities (as he gave
scalability as an example).
So, I'll replace that part with the following.
Kerberos, like any internet protocol, does have drawbacks on certain
environments. You can find them discussed in [KERBEROS] and its
Do you have better sentences?
KAMADA Ken'ichi <kamada@xxxxxxxxxx>