changeset 4:a88cd2ff0a89

done through section 9
author Henry S. Thompson <ht@inf.ed.ac.uk>
date Fri, 27 Oct 2023 15:31:55 +0100
parents 11c0afd7bad2
children b281db304428
files ace-key-groupcomm-review.txt
diffstat 1 files changed, 20 insertions(+), 0 deletions(-) [+]
line wrap: on
line diff
--- a/ace-key-groupcomm-review.txt	Wed Oct 25 22:36:22 2023 +0100
+++ b/ace-key-groupcomm-review.txt	Fri Oct 27 15:31:55 2023 +0100
@@ -30,6 +30,11 @@
 If the Dispatcher is untrusted, how can communication be secure?
 There is no discussion of the Dispatcher in the Security section.
 
+Section 5: I don't see how authority to institute forced deletion is
+established.  Indeed the means for forced deletion don't appear to be
+defined at all.  Section 4.8 (and 4.8.3) explicitly requires that only
+the Client can send a Delete request, and only for themselves.
+
 *Minor points*
 
 Section 1. I note that one of the two referenced examples of candidate
@@ -46,6 +51,21 @@
 Resource Server _per ACE_.  Simply adding ", per ACE," to "Resource
 Server" in para 2 of Section 1 would fix this for me.
 
+Section 6: It might be helpful to include ASCII-art diagrams of the
+different communication pathways described for accomplishing rekeying.
+
+Sections 3.1 & 7: The example scopes include Verifier and Monitor
+roles.  Although there is a parenthetical reference to the [Vv]erifier
+role in Section 3.3.1, no other mention of Monitor is given, and in
+general the role of roles is not explained anywhere. There is a
+"Request inconsistent with the current roles" error code defined in
+section 9, but no tabulation of roles allowed/required for particular
+requests, which one might expect.
+
+If all this is something defined in one of the many referenced specs,
+and so familiar to likely readers, that's OK, otherwise perhaps
+something should be added.
+
 *Nits*
 
 Section 1 / Appendix A:  The use of REQ[n] and OPT[n] in conjunction