[Dime] Secdir last call review of draft-ietf-dime-group-signaling-13
Catherine Meadows via Datatracker <email@example.com> Tue, 26 January 2021 16:56 UTC
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id BEE753A0ADA; Tue, 26 Jan 2021 08:56:18 -0800 (PST)
Content-Type: text/plain; charset="utf-8"
From: Catherine Meadows via Datatracker <firstname.lastname@example.org>
Cc: email@example.com, firstname.lastname@example.org, email@example.com
Reply-To: Catherine Meadows <firstname.lastname@example.org>
Date: Tue, 26 Jan 2021 08:56:18 -0800
Subject: [Dime] Secdir last call review of draft-ietf-dime-group-signaling-13
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:email@example.com?subject=unsubscribe>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:firstname.lastname@example.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Jan 2021 16:56:19 -0000
Reviewer: Catherine Meadows Review result: Ready I have reviewed this document as part of the security directorate's ongoing effort to review all IETF documents being processed by the IESG. These comments were written primarily for the benefit of the security area directors. Document editors and WG chairs should treat these comments just like any other last call comments. This draft presents the commands a Diameter node could use to communicate with multiple sessions of the Diameter simultaneously. The Security Considerations section mentions two issues. One is that the use of bulk commands introduces increases the ease of implementing certain types of DoS attacks because a single command, e.g. to terminate a session, could affect multiple sessions instead of just one. The other is that current security mechanisms employed by Diameter do not enforce end-to-end security, and so make it difficult to trust information received from non-adjacent nodes. Work is ongoing on end-to-end security for Diameter, so it is premature to address end-to-end security in this document, which instead relies on available security mechanisms. I think this is a reasonable summary of the security considerations. Since end-to-end security for Diameter is a work in progress, it would be premature to attempt to address it in this document. I consider this document Ready.
- [Dime] Secdir last call review of draft-ietf-dime… Catherine Meadows via Datatracker
- Re: [Dime] Secdir last call review of draft-ietf-… Marco Liebsch