[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: [iesg-secretary #6592] Evaluation: draft-ietf-sigtran-security - Security Considerat ions for SIGTRAN Protocols to Proposed Standard



I don't think the authors will have a problem with the fix you propose
below, Bert. Certainly they didn't intend to pick on SNMP or to suggest that
this was a problem unique to SNMP.

- J

> -----Original Message-----
> From: Wijnen, Bert (Bert) [mailto:bwijnen@lucent.com]
> Sent: Thursday, April 17, 2003 8:19 AM
> To: Steven M. Bellovin; Wijnen, Bert (Bert)
> Cc: IESG Secretary; Internet Engineering Steering Group
> Subject: RE:[iesg-secretary #6592] Evaluation:
> draft-ietf-sigtran-security - Security Considerat ions for SIGTRAN
> Protocols to Proposed Standard 
> 
[snip]
> Guess it would then be better to change:
> 
>                                                     This implies, for
>   example, that a root CA trusted for use with a SIGTRAN protocol must
>   also be trusted to protect SNMP.
> 
> Into something aka:
> 
>                                                     This implies that a
>   root CA trusted for use with a SIGTRAN protocol must also be trusted
>   to protect other protocols (for example SNMP or xxx).
>