Re: [Last-Call] Opsdir last call review of draft-ietf-lsr-pce-discovery-security-support-10

Qin Wu <bill.wu@huawei.com> Thu, 22 September 2022 01:29 UTC

Return-Path: <bill.wu@huawei.com>
X-Original-To: last-call@ietfa.amsl.com
Delivered-To: last-call@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CD3D0C14F725; Wed, 21 Sep 2022 18:29:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.907
X-Spam-Level:
X-Spam-Status: No, score=-6.907 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yuJp1pp5DGNi; Wed, 21 Sep 2022 18:29:43 -0700 (PDT)
Received: from frasgout.his.huawei.com (frasgout.his.huawei.com [185.176.79.56]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8AD04C1524BC; Wed, 21 Sep 2022 18:24:15 -0700 (PDT)
Received: from fraeml704-chm.china.huawei.com (unknown [172.18.147.226]) by frasgout.his.huawei.com (SkyGuard) with ESMTP id 4MXyFG4DRfz67XGR; Thu, 22 Sep 2022 09:22:26 +0800 (CST)
Received: from dggpemm100004.china.huawei.com (7.185.36.189) by fraeml704-chm.china.huawei.com (10.206.15.53) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.2375.31; Thu, 22 Sep 2022 03:24:11 +0200
Received: from canpemm500005.china.huawei.com (7.192.104.229) by dggpemm100004.china.huawei.com (7.185.36.189) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.31; Thu, 22 Sep 2022 09:24:10 +0800
Received: from canpemm500005.china.huawei.com ([7.192.104.229]) by canpemm500005.china.huawei.com ([7.192.104.229]) with mapi id 15.01.2375.031; Thu, 22 Sep 2022 09:24:09 +0800
From: Qin Wu <bill.wu@huawei.com>
To: "Liushucheng (Will LIU, Strategy & Industry Development)" <liushucheng@huawei.com>, "ops-dir@ietf.org" <ops-dir@ietf.org>
CC: "draft-ietf-lsr-pce-discovery-security-support.all@ietf.org" <draft-ietf-lsr-pce-discovery-security-support.all@ietf.org>, "last-call@ietf.org" <last-call@ietf.org>, "lsr@ietf.org" <lsr@ietf.org>
Thread-Topic: Opsdir last call review of draft-ietf-lsr-pce-discovery-security-support-10
Thread-Index: AdjOIeNfNnyScE2QRXGGKlZNfjdi5Q==
Date: Thu, 22 Sep 2022 01:24:09 +0000
Message-ID: <a803f3561cfe46ab8247ae890c8c79b6@huawei.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.136.100.16]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/last-call/5Dns4nM-EBqe72TGs3sEnDKMSuI>
Subject: Re: [Last-Call] Opsdir last call review of draft-ietf-lsr-pce-discovery-security-support-10
X-BeenThere: last-call@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: IETF Last Calls <last-call.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/last-call>, <mailto:last-call-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/last-call/>
List-Post: <mailto:last-call@ietf.org>
List-Help: <mailto:last-call-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/last-call>, <mailto:last-call-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 22 Sep 2022 01:29:46 -0000

Thanks Will, good catch for the nits. Have fixed in v-11
https://www.ietf.org/rfcdiff?url2=draft-ietf-lsr-pce-discovery-security-support-11

-Qin
-----邮件原件-----
发件人: Will LIU via Datatracker [mailto:noreply@ietf.org] 
发送时间: 2022年9月16日 14:56
收件人: ops-dir@ietf.org
抄送: draft-ietf-lsr-pce-discovery-security-support.all@ietf.org; last-call@ietf.org; lsr@ietf.org
主题: Opsdir last call review of draft-ietf-lsr-pce-discovery-security-support-10

Reviewer: Will LIU
Review result: Has Nits

Hi all,

I have reviewed draft-ietf-lsr-pce-discovery-security-support-10 as part of the Operational directorate's ongoing effort to review all IETF documents being processed by the IESG.  These comments were written with the intent of improving the operational aspects of the IETF drafts. Comments that are not addressed in last call may be included in AD reviews during the IESG review. 
Document editors and WG chairs should treat these comments just like any other last call comments.

“When a Path Computation Element (PCE) is a Label Switching Router
   (LSR) participating in the Interior Gateway Protocol (IGP), or even a
   server participating in the IGP, its presence and path computation
   capabilities can be advertised using IGP flooding.  The IGP
   extensions for PCE discovery (RFC 5088 and RFC 5089) define a method
   to advertise path computation capabilities using IGP flooding for
   OSPF and IS-IS respectively.  However these specifications lack a
   method to advertise PCE Communication Protocol (PCEP) security (e.g.,
   Transport Layer Security (TLS), TCP Authentication Option (TCP-AO))
   support capability.”

My overall view of the document is almost 'Ready' for publication, except some editorials below.

** Technical **

No.

** Editorial **

        • Section 1. Introduction
                ○ The fifth paragraph: s/This documents update [RFC5088]/This
                document updates [RFC5088]/
        • Section 3.1 Use of PCEP security capability support for PCE discovery
                ○ The last paragraph: s/If a client is configured to require
                that its PCE server support TCP-AO/If a client is configured to
                require that its PCE server supports TCP-AO; ○ s/If a client is
                configured to require that its PCE server support TLS/If a
                client is configured to require that its PCE server supports TLS
        • Section 5 Backward Compatibility Considerations
                ○ The second paragraph: How to understand "KEYNAME" here?
                s/KEYNAME/KEY-ID and KEY-CHAIN-NAME/?
        • The title of Section 8.1: s/PCE Capability Flag/PCE Capability Flags/
        • Section 9 Acknowledges
                ○ s/speical/special/

Regards,
Will (Shucheng LIU)