[Last-Call] Secdir last call review of draft-ietf-lsr-isis-flood-reflection-10
Rich Salz via Datatracker <noreply@ietf.org> Mon, 03 October 2022 16:23 UTC
Return-Path: <noreply@ietf.org>
X-Original-To: last-call@ietf.org
Delivered-To: last-call@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id ACF64C1524CE; Mon, 3 Oct 2022 09:23:43 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
From: Rich Salz via Datatracker <noreply@ietf.org>
To: secdir@ietf.org
Cc: draft-ietf-lsr-isis-flood-reflection.all@ietf.org, last-call@ietf.org, lsr@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 8.17.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <166481422370.58279.1362610593377260426@ietfa.amsl.com>
Reply-To: Rich Salz <rsalz@akamai.com>
Date: Mon, 03 Oct 2022 09:23:43 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/last-call/5SOpZ6giObkS6VlkzCULZnpbh-M>
Subject: [Last-Call] Secdir last call review of draft-ietf-lsr-isis-flood-reflection-10
X-BeenThere: last-call@ietf.org
X-Mailman-Version: 2.1.39
List-Id: IETF Last Calls <last-call.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/last-call>, <mailto:last-call-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/last-call/>
List-Post: <mailto:last-call@ietf.org>
List-Help: <mailto:last-call-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/last-call>, <mailto:last-call-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Oct 2022 16:23:43 -0000
Reviewer: Rich Salz Review result: Has Nits I am a routing naïf and do not have a lot of time these days. I hope this review is still useful, anyway. The glossary was very helpful. I still don't have a clear understanding of L1 and L2. The picture is a tour de force. The description "Figure 1 is an example..." paragraph should be moved before the picture, not directly after it. Sections 6 and 7 indicate, to me, that this document is comprehensive and informed by real-world concerns. Sec 9, Security Considerations. This is where I did the most careful reading. "If an attacker should be able..." s/should be able/can/ s/could be in most extreme case/could be in THE most extreme case/ It was a bit surprising to me to see the same sentence at the end of both paragraph 1 and paragraph 2. Maybe remove them and move them to the start of paragraph 3. I think the risks are well-described, and the importance to preventing is made. Is it possible to mitigate the damage if a risk occurs? "No" is a reasonable answer.
- [Last-Call] Secdir last call review of draft-ietf… Rich Salz via Datatracker
- Re: [Last-Call] Secdir last call review of draft-… John Scudder
- Re: [Last-Call] Secdir last call review of draft-… Antoni Przygienda
- Re: [Last-Call] Secdir last call review of draft-… Salz, Rich