Constrained RESTful Environments (CoRE) Link Format
draft-ietf-core-link-format-14
Discuss
Yes
(Peter Saint-Andre)
No Objection
(Adrian Farrel)
(Dan Romascanu)
(Gonzalo Camarillo)
(Robert Sparks)
(Ron Bonica)
(Russ Housley)
(Stewart Bryant)
(Wesley Eddy)
Note: This ballot was opened for revision 11 and is now closed.
Jari Arkko Former IESG member
Discuss
Discuss
[Treat as non-blocking comment]
(2012-03-11 for -11)
Unknown
This is a well written document, thank you for doing it. I have a small problem with the ABNF, however, see below for the details. Perhaps this video also illustrates my point: http://www.youtube.com/watch?feature=player_embedded&v=LbK-g8tKnoc
Barry Leiba Former IESG member
(was Discuss)
Yes
Yes
(2012-06-01)
Unknown
All DISCUSSes and comments have been addressed.
Peter Saint-Andre Former IESG member
Yes
Yes
(for -11)
Unknown
Adrian Farrel Former IESG member
No Objection
No Objection
(for -11)
Unknown
Dan Romascanu Former IESG member
No Objection
No Objection
(for -11)
Unknown
Gonzalo Camarillo Former IESG member
No Objection
No Objection
(for -11)
Unknown
Pete Resnick Former IESG member
No Objection
No Objection
(2012-03-09 for -11)
Unknown
Only stylistic nits. Otherwise no problems. I find the questions in section 1.1 a poor writing style and suggest they be removed. The first sentence of section 6: "This document needs the same security considerations...". Please change "needs" to "has".
Ralph Droms Former IESG member
No Objection
No Objection
(2012-03-12 for -11)
Unknown
Robert Sparks Former IESG member
No Objection
No Objection
(for -11)
Unknown
Ron Bonica Former IESG member
No Objection
No Objection
(for -11)
Unknown
Russ Housley Former IESG member
(was Discuss)
No Objection
No Objection
(for -12)
Unknown
Sean Turner Former IESG member
No Objection
No Objection
(2012-03-14 for -11)
Unknown
s3.2 Any chance for an actual size for the reasonable size limit?
Stephen Farrell Former IESG member
No Objection
No Objection
(2012-03-11 for -11)
Unknown
- Richard Barnes' secdir review suggested text for section 6 about authorization that the author seems to like, so this is just to note that until its fixed. - I'd also suggest adding the following to Richard's suggest text: "While such servers might not return all links to all requesters, not providing the link does not, by itsef, control access to the relevant resource - a bad actor could know or guess the right URIs." - I'd also suggest adding something about servers that might tell lies to feed bad data to clients, e.g. "Servers can lie about the resources available. If it is important for a client to only get information from a known source, then that source needs to be authenticated."
Stewart Bryant Former IESG member
No Objection
No Objection
(for -11)
Unknown
Wesley Eddy Former IESG member
No Objection
No Objection
(for -11)
Unknown