Re: [OPSEC] Call for Adoption: draft-gont-opsec-ipv6-nd-security-01

Tina TSOU <Tina.Tsou.Zouting@huawei.com> Wed, 25 September 2013 19:03 UTC

Return-Path: <Tina.Tsou.Zouting@huawei.com>
X-Original-To: opsec@ietfa.amsl.com
Delivered-To: opsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3330D21F9CC8 for <opsec@ietfa.amsl.com>; Wed, 25 Sep 2013 12:03:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.722
X-Spam-Level:
X-Spam-Status: No, score=-5.722 tagged_above=-999 required=5 tests=[AWL=-0.876, BAYES_00=-2.599, MIME_BASE64_TEXT=1.753, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MVojA0Mmc2Ym for <opsec@ietfa.amsl.com>; Wed, 25 Sep 2013 12:03:25 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) by ietfa.amsl.com (Postfix) with ESMTP id 9FFD321F9C4D for <opsec@ietf.org>; Wed, 25 Sep 2013 12:03:20 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml203-edg.china.huawei.com) ([172.18.7.190]) by lhrrg01-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id AYG03787; Wed, 25 Sep 2013 19:03:18 +0000 (GMT)
Received: from LHREML401-HUB.china.huawei.com (10.201.5.240) by lhreml203-edg.huawei.com (172.18.7.221) with Microsoft SMTP Server (TLS) id 14.3.146.0; Wed, 25 Sep 2013 20:02:24 +0100
Received: from SJCEML402-HUB.china.huawei.com (10.212.94.43) by lhreml401-hub.china.huawei.com (10.201.5.240) with Microsoft SMTP Server (TLS) id 14.3.146.0; Wed, 25 Sep 2013 20:03:17 +0100
Received: from SJCEML501-MBS.china.huawei.com ([169.254.2.42]) by sjceml402-hub.china.huawei.com ([10.212.94.43]) with mapi id 14.03.0146.000; Wed, 25 Sep 2013 12:03:10 -0700
From: Tina TSOU <Tina.Tsou.Zouting@huawei.com>
To: RJ Atkinson <rja.lists@gmail.com>
Thread-Topic: [OPSEC] Call for Adoption: draft-gont-opsec-ipv6-nd-security-01
Thread-Index: AQHOuiAW8dN60r7qrU2GF9jcQ40SyJnWz4Aw
Date: Wed, 25 Sep 2013 19:03:10 +0000
Message-ID: <7AC64741-4A9C-4EAD-993A-6BCB26E8E960@huawei.com>
References: <A51E909F-0D94-413C-B5B7-9BDEBF4E5929@kumari.net> <52420285.4050104@si6networks.com>, <1AE83396-EB5E-4EF8-9F43-F1CB05CD1ED2@gmail.com>
In-Reply-To: <1AE83396-EB5E-4EF8-9F43-F1CB05CD1ED2@gmail.com>
Accept-Language: en-US, zh-CN
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Content-Type: text/plain; charset="gb2312"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Cc: "opsec@ietf.org" <opsec@ietf.org>
Subject: Re: [OPSEC] Call for Adoption: draft-gont-opsec-ipv6-nd-security-01
X-BeenThere: opsec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: opsec wg mailing list <opsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/opsec>, <mailto:opsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/opsec>
List-Post: <mailto:opsec@ietf.org>
List-Help: <mailto:opsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsec>, <mailto:opsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 25 Sep 2013 19:03:29 -0000

Dear all,
I reviewed this version of the draft.
This document provides a thorough assessment of IPv6 Neighbor Discovery
and the corresponding implementations. 
It documents flaws that have affected popular implementations, along with workarounds to mitigate them. This is a valuable contribution to help improve the maturity of IPv6 Neighbor Discovery implementations, such that issues like RFC 6583 can be proactively addressed.

Thank you,
Tina

On Sep 25, 2013, at 11:50 AM, "RJ Atkinson" <rja.lists@gmail.com> wrote:

> Earlier, Warren Kumari wrote, in part:
>> A reminder that this adoption call is ongoing…
>> 
>> Please review the draft and comment
>> if you think that this should be
>> adopted (or not)
>> 
>> W
> 
> Yes, please.
> 
> Ran
> 
> 
> 
> _______________________________________________
> OPSEC mailing list
> OPSEC@ietf.org
> https://www.ietf.org/mailman/listinfo/opsec