[Gen-art] Gen-ART LC Review of draft-ietf-karp-ops-model-07

Ben Campbell <ben@nostrum.com> Fri, 16 August 2013 21:13 UTC

Return-Path: <ben@nostrum.com>
X-Original-To: gen-art@ietfa.amsl.com
Delivered-To: gen-art@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EC65B11E8159; Fri, 16 Aug 2013 14:13:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.6
X-Spam-Level:
X-Spam-Status: No, score=-102.6 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, SPF_PASS=-0.001, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7ZLx2AYDsc0F; Fri, 16 Aug 2013 14:13:46 -0700 (PDT)
Received: from shaman.nostrum.com (nostrum-pt.tunnel.tserv2.fmt.ipv6.he.net [IPv6:2001:470:1f03:267::2]) by ietfa.amsl.com (Postfix) with ESMTP id 1FF2311E8158; Fri, 16 Aug 2013 14:13:46 -0700 (PDT)
Received: from [172.20.10.7] (mobile-166-147-071-199.mycingular.net [166.147.71.199]) (authenticated bits=0) by shaman.nostrum.com (8.14.3/8.14.3) with ESMTP id r7GLDbB9039117 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Fri, 16 Aug 2013 16:13:38 -0500 (CDT) (envelope-from ben@nostrum.com)
From: Ben Campbell <ben@nostrum.com>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
Date: Fri, 16 Aug 2013 16:13:32 -0500
Message-Id: <F0728D4E-4DEA-47B4-BA75-CCDB9C562924@nostrum.com>
To: draft-ietf-karp-ops-model.all@tools.ietf.org
Mime-Version: 1.0 (Mac OS X Mail 6.5 \(1508\))
X-Mailer: Apple Mail (2.1508)
Received-SPF: pass (shaman.nostrum.com: 166.147.71.199 is authenticated by a trusted mechanism)
Cc: gen-art@ietf.org, IETF-Discussion list <ietf@ietf.org>
Subject: [Gen-art] Gen-ART LC Review of draft-ietf-karp-ops-model-07
X-BeenThere: gen-art@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "GEN-ART: General Area Review Team" <gen-art.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/gen-art>, <mailto:gen-art-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/gen-art>
List-Post: <mailto:gen-art@ietf.org>
List-Help: <mailto:gen-art-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/gen-art>, <mailto:gen-art-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 16 Aug 2013 21:13:47 -0000

I am the assigned Gen-ART reviewer for this draft. For background on
Gen-ART, please see the FAQ at

<http://wiki.tools.ietf.org/area/gen/trac/wiki/GenArtfaq>.

Please resolve these comments along with any other Last Call comments
you may receive.

Document:  draft-ietf-karp-ops-model-07.txt
Reviewer: Ben Campbell
Review Date: 2013-08-16
IETF LC End Date: 2013-08-18
IESG Telechat date: 

Summary: This draft is almost ready for publication as an informational RFC. I have a few clarity related comments that might be worth considering prior to publication.

Major issues:

None.


Minor issues:

-- This abstract claims that this draft is a discussion of issues. From that perspective, I don't think the use of 2119 language is appropriate. There are some specific areas (mentioned below) where 2119 language is used in imprecise ways, and may do harm to the reader's understanding. There are other uses that may be more reasonable. But I think the draft would be better off dispensing with 2119 language altogether.

-- Section 3, paragraph 4:

This seems like a place where descriptive language would be better than 2119 language. In particular, "and so on" leaves things too open ended and imprecise. Also, the use of 2119 language in an example seems a bit off.

-- section 3.1, last paragraph:

I'm not sure what guidance is intended in this paragraph. It offers an example, then refutes it. Are there better examples to offer? Is the point that one shouldn't make such checks?

-- section 3.2, paragraph 2:

What distinguishes SHOULD from "desirable" in this context? That is, why use 2119 language for one and not the other?

-- section 3.2, last paragraph: "Implementations SHOULD permit a configuration in which if no unexpired key is available, existing security associations continue using the expired key with which they were established."

This may need further guidance. For example, it seems risky to do this silently.

-- section 3.3, last paragraph: "... then there is complexity in key management protocols."

Can you elaborate? Too much complexity? Are there key management systems that are not complex?

-- section 4, 2nd to last paragraph:

Seems like other disadvantages are worth mentioning. For example, the potential impact of a compromised CA.

-- 4.1:

I understand why one might choose not to include a real-world example here, but is there something that can be referenced?

-- 4.4, 2nd paragraph: "... it will be critical to make sure that they are not required during routine operation or a cold-start of a network."

Can you elaborate on why?


Nits/editorial comments:

Abstract: Might be worth mentioning KARP and how this draft fits with others.

-- Section 1, paragraph 1: Please expand KARP on first mention.

-- Section 1, paragraph 3: Missing punctuation.

-- section 3: 
The text seems to rather abruptly start talking about key considered actions with little background. A quick summary of how these keys re used would be helpful.

-- section 3, paragraph 2: "Each OSPF link needs to use the same authentication configuration, ..."

Same configuration as what? The sentence appears to say keys must be the same among links but can be different.

-- section 3.2, first 2 paragraphs:

I'm not sure how a configuration management system and a configuration interface differ for the purposes of this discussion.

-- 4.1, paragraph 4: "Preshared keys that are used via automatic key management have not been specified for KARP."

I'm not sure what's intended here--if they are not specified why does the paragraph go on to talk about them?

-- 4.4, 1st paragraph: "... like RADIUS or directories."

Is there a word missing? 

-- 5, bullet list of management objects:

There may be management objects implied by the second and third bullets, but they are not mentioned as such. Can you explicitly state them? For example, in bullet 2 is the "peer" the object being discussed? Or is it the "name or key". In bullet 3, is "group" the managed object, rather than "routing protocol"?

-- 5, paragraphs 7 and 8:

s/what/which  (two occurrences)