IETF-SSH archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
IESG comments
Hi,
I've sent individual mails to Lisa Dusseault and Sam Weiler regarding
their comments. Since I don't have addresses for the other people who
commented, I'm covering them here.
Lars Eggert:
3.1 para 8 : This is covered in RFC4254.
3.4 para 1 : I've clarified the text to "Both sides MUST start a
connection..."
4.3 para 4 : critical isn't reported because some servers (indeed, I
believe most/all current implementations?) may choose not to store that
information. The security properties of "critical" are checked at the
time of the add.
6.2.1 para 2 : Fixed
Cullen Jennings:
In order to be able to add the public key, the user has to have started
the subsystem, which implies that the SSH connection protocol is
running, which implies that the user has authenticated themselves to the
server. This is equivalent to the various manual methods of adding keys
the server for authentication.
Dan Romascanu:
I don't believe the document describes anything which requires a
deployment strategy. There should be no interactions with other
subsystems. No effects on other applications or the network are
anticipated. Monitoring and management would probably be covered by any
monitoring and management for the SSH server itself. In other words, if
an operational considerations section were added, it would be short.
--
Jon Bright
Silicon Circus Ltd.
http://www.siliconcircus.com
Home |
Main Index |
Thread Index |
Old Index