[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

draft-ietf-ipdvb-sec-req-09 passed for publication as an RFC - corrections.



The security requirements document has been passed by IESG for publication as an RFC.

The authors received comments during the Gen-ART review and also from
the IESG, relating to the interoperability of the different mechanisms
and specifically asking for guidance for implementors. The proposed
changes below are in response to these comments. These changes also address IESG comments on the use of security databases in the Appendix.

If accepted, these will be included in the published RFC. Please let the list (or me) know if you have any comments on these amendments. If I do not receive feedback by the 6th February, these will be passed to the RFC Editor.

Best wishes,

Gorry Faihurst
(ipdvb Chair)

---


In Abstract:

OLD:
    The MPEG-2 standard defined by ISO 13818-1 supports a range of
    transmission methods for a range of services.
                               ^^^^^
NEW:
    The MPEG-2 standard defined by ISO 13818-1 supports a range of
    transmission methods for a variety of services.
                               ^^^^^^^

In Section 5, para 2, please update text by adding new text at the
end of the paragraph:

OLD:
    Security services may be grouped into profiles based on security
    requirements, e.g. a base profile (with payload encryption and
    identity protection), and a second profile that extends this to
    also provide source authentication and protection against replay
    attacks.
            ^

NEW:
    Security services may be grouped into profiles based on security
    requirements, e.g. a base profile (with payload encryption and
    identity protection), and a second profile that extends this to
    also provide source authentication and protection against replay
    attacks. Although the use of specific security techniques is
    optional, it is RECOMMENDED that receiver devices should
    implement all the techniques in Reqs 2-5 of section 4,
    to ensure interoperability of all profiles.

In appendix A1.2. Please replace paragraph:

OLD:
    The design of these two databases may be based on IPsec
    databases as defined in RFC4301 [RFC4301].

NEW:
     While traditionally link layer security has operated using
     simple policy mechanisms, it is envisaged that ULE security
     should provide flexibility comparable to IPsec. the above
     design is based on the two databases defined for IPsec [RFC4301].
     These databases could be used to implement either simple
     policies (as in traditional link security services) or more
     complex policies (as in IPsec).

--