[dhcwg] Secdir last call review of draft-ietf-dhc-mac-assign-07

Sean Turner via Datatracker <noreply@ietf.org> Tue, 09 June 2020 00:14 UTC

Return-Path: <noreply@ietf.org>
X-Original-To: dhcwg@ietf.org
Delivered-To: dhcwg@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 468B73A0801; Mon, 8 Jun 2020 17:14:07 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: Sean Turner via Datatracker <noreply@ietf.org>
To: secdir@ietf.org
Cc: dhcwg@ietf.org, last-call@ietf.org, draft-ietf-dhc-mac-assign.all@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 7.3.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <159166164723.4538.11036627051900835905@ietfa.amsl.com>
Reply-To: Sean Turner <sean@sn3rd.com>
Date: Mon, 08 Jun 2020 17:14:07 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/dhcwg/F8qd131u10OuSC_NOAEUeIcJbiU>
Subject: [dhcwg] Secdir last call review of draft-ietf-dhc-mac-assign-07
X-BeenThere: dhcwg@ietf.org
X-Mailman-Version: 2.1.29
List-Id: <dhcwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dhcwg/>
List-Post: <mailto:dhcwg@ietf.org>
List-Help: <mailto:dhcwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Jun 2020 00:14:07 -0000

Reviewer: Sean Turner
Review result: Has Nits

Hi! I reviewed this draft, the directorate reviews, and the IESG
discuss/comments (and skimmed draft-ietf-dhc-slap-quadrant).

This draft is about using DHCP to avoid collisions in certain environments
where randomized MAC addresses are used, e.g., huuuuge virtualization
deployments.

1. It is interesting to note that the actual probability of collisions is not
included in the draft. (ah I guess Ben noted this too) 2. I'd echo Barry's
comment about adding something about what the consequences of multiple devices
using the same MAC address. 3. Is it worth adding at least an informative
reference to some DoS mitigation techniques?