Jim Schaad
2017-07-10 20:21:06 UTC
I have some comments on the draft based on a first read.
* Section 2.1 - Why is this a 64-bit value? In the case of end-to-end
security, this could be a single byte assuming that only 256 requests would
be outstanding for that security context.
* Section 2.1 - The fact that you need to distinguish between the name of
the option and the bit flags indicates that the name should probably be
changed.
I need to sit down and work out the flows for the Request-Tag and ETag
options. I think that there may be a missing security consideration on
ETag, but I need to figure out exactly how things work first.
jim
* Section 2.1 - Why is this a 64-bit value? In the case of end-to-end
security, this could be a single byte assuming that only 256 requests would
be outstanding for that security context.
* Section 2.1 - The fact that you need to distinguish between the name of
the option and the bit flags indicates that the name should probably be
changed.
I need to sit down and work out the flows for the Request-Tag and ETag
options. I think that there may be a missing security consideration on
ETag, but I need to figure out exactly how things work first.
jim