Re: [Pce] Secdir last call review of draft-ietf-lsr-pce-discovery-security-support-05

"Acee Lindem (acee)" <acee@cisco.com> Fri, 27 August 2021 13:27 UTC

Return-Path: <acee@cisco.com>
X-Original-To: expand-draft-ietf-lsr-pce-discovery-security-support.all@virtual.ietf.org
Delivered-To: pce@ietfa.amsl.com
Received: by ietfa.amsl.com (Postfix, from userid 65534) id 50EB63A16BB; Fri, 27 Aug 2021 06:27:20 -0700 (PDT)
X-Original-To: xfilter-draft-ietf-lsr-pce-discovery-security-support.all@ietfa.amsl.com
Delivered-To: xfilter-draft-ietf-lsr-pce-discovery-security-support.all@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B1B173A16B9 for <xfilter-draft-ietf-lsr-pce-discovery-security-support.all@ietfa.amsl.com>; Fri, 27 Aug 2021 06:27:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.596
X-Spam-Level:
X-Spam-Status: No, score=-9.596 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=IUKYGOR7; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=FWm7jNEB
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xYrKsyt4_IKC for <xfilter-draft-ietf-lsr-pce-discovery-security-support.all@ietfa.amsl.com>; Fri, 27 Aug 2021 06:27:14 -0700 (PDT)
Received: from rcdn-iport-7.cisco.com (rcdn-iport-7.cisco.com [173.37.86.78]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B88593A16AF for <draft-ietf-lsr-pce-discovery-security-support.all@ietf.org>; Fri, 27 Aug 2021 06:27:13 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=23318; q=dns/txt; s=iport; t=1630070833; x=1631280433; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=p/7j0pB9paSxwtUwe+WD+PeAkmOdcpqh5K8PlQz/jm0=; b=IUKYGOR7j2tIEjQuJxDwSM1E5hq745wFrdTk850SN0jEUJrtC5PdONJz YjhTL6SgZJ9oROKN1QTW2RX+D+grPXBKjy644JdSdSQnvQVtz3ePJJ3Wo lUVA6+z3W5P+62KGoVMTCl1QKMhGbZQndXKpHa+8WIKBowSJdmTvltpoa A=;
IronPort-PHdr: =?us-ascii?q?A9a23=3A9fg3+hOB5tE7opBNyiAl6ncTWUAX0o4cdiYU6?= =?us-ascii?q?ZthhbMdOqig/pG3OkvZ6L0tiVLSRozU5rpCjPaeqKHvX2EMoPPj+HAPeZBBT?= =?us-ascii?q?VkJ3MMRmQFzAc2ET0P6f7bmaiUgF5FEU1lot3iwLUlSHpP4YFvf6n2/5DIfA?= =?us-ascii?q?FPxLw1wc+/0AYXVyc+w0rPaxg=3D=3D?=
IronPort-HdrOrdr: =?us-ascii?q?A9a23=3AXrWNyaoVxB/eZK3E9lihU+QaV5t9LNV00z?= =?us-ascii?q?EX/kB9WHVpm5Oj9vxGzc506farslkssSkb6K+90KnpewK6yXbsibNhfotKLz?= =?us-ascii?q?OWxldAS7sSr7cKogeQWxEWk9Q86U4OSdkENDSdNykesS++2njFLz9C+qjDzE?= =?us-ascii?q?nLv5al854Fd2gDAMsMg3Ybe2Sm+w9NNXR77PECZfyhD7981kKdkAMsH72G7x?= =?us-ascii?q?c+Loz+juyOsKijTQ8NBhYh5gXLpyiv8qTGHx+R2Qpbey9TwJ85mFK11zDR1+?= =?us-ascii?q?GGibWW2xXc32jc49B9g9360OZOA8SKl4w8NijssAC1f45sMofy+wzd4dvfrm?= =?us-ascii?q?rCouO8+yvIDP4DsE85uVvF+ycF7jOQiQrGLUWSlGNwz0GT/fARDwhKevapzb?= =?us-ascii?q?gpAicxrXBQ4+2VFMlwrjOkX109N2KfoM213am7a/kh/HDE0kYKgKodiWdSXp?= =?us-ascii?q?AZb6IUpYsD/FlNGJNFBy7i7ps7edMeQP00ycwmO29yVUqp81WHAebcKEgbD1?= =?us-ascii?q?ODWAwPq8aV2z9ZkDRwyFYZ3tUWmjMF+IgmQ5dJ6uzYOuAw/Ys+APM+fOZ4Hq?= =?us-ascii?q?MMUMG3AmvCTVbFN3+TO03uEOUCN2jWo5D67b0p7KWheYAOzpE1hJPdOWko+l?= =?us-ascii?q?IaagbrE4mDzZdL+hfCTCG0Wins0NhX49xjtrj1VNPQQGa+oZAV4oOdStAkc4?= =?us-ascii?q?zmstqISeZr6s7YXCLT8NxyrnjDsrFpWA4jbPE=3D?=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0BMCQAU5yhh/5ldJa1aHQEBAQEJARI?= =?us-ascii?q?BBQUBQIFZgVNRB3daNzEChEWDSAOFOYgGA4pghRyKTYFCgREDVAsBAQENAQE?= =?us-ascii?q?qDwgEAQGEbAIXghkCJTgTAQIEAQEBEgEBBQEBAQIBBgSBEROFaA2GQgEBAQE?= =?us-ascii?q?CAQEBEBERDAEBJQQDCwEPAgEGAhUBAgICERIDAgICHwYLFAEQAQEEAQ0FIoJ?= =?us-ascii?q?PAYJVAw4hAQ6OWo80AYE6AoofeoExgQGCBwEBBgQEgToCAQ1Bgn8NC4I0Awa?= =?us-ascii?q?BECqCf4QRgRqBVIN8JxyCDYEUAScMEIJmPoIgQgEBAgEXfxIBEgEJGCYZglg?= =?us-ascii?q?2gi6FZlsGATEyBA0VDhMQIjkkGTwBAgMKBhgCDwISAQQGCAMrlRCnLzpeCo1?= =?us-ascii?q?rjjMEhWMFKINli2UDly+WF4IeiiSDOY9/LxiBXoMJAgQCBAUCDgEBBoF4JGl?= =?us-ascii?q?wcBU7KgGCPlAZD4tIglgNFYNQhRSFSnQNKwIGAQoBAQMJjxsBAQ?=
X-IronPort-AV: E=Sophos;i="5.84,356,1620691200"; d="scan'208";a="910916079"
Received: from rcdn-core-2.cisco.com ([173.37.93.153]) by rcdn-iport-7.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 27 Aug 2021 13:27:12 +0000
Received: from mail.cisco.com (xbe-aln-005.cisco.com [173.36.7.20]) by rcdn-core-2.cisco.com (8.15.2/8.15.2) with ESMTPS id 17RDRBNn018655 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Fri, 27 Aug 2021 13:27:12 GMT
Received: from xfe-rtp-001.cisco.com (64.101.210.231) by xbe-aln-005.cisco.com (173.36.7.20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.15; Fri, 27 Aug 2021 08:27:11 -0500
Received: from xfe-rtp-004.cisco.com (64.101.210.234) by xfe-rtp-001.cisco.com (64.101.210.231) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.15; Fri, 27 Aug 2021 09:27:10 -0400
Received: from NAM04-BN8-obe.outbound.protection.outlook.com (64.101.32.56) by xfe-rtp-004.cisco.com (64.101.210.234) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.15 via Frontend Transport; Fri, 27 Aug 2021 09:27:10 -0400
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=jGDFftLfXY5tUUM2QGfHiEOfIXvxa+4gfe1TWWa5FEngx+o9RKY7P28XrKJVsyegYZ4yb7xgubRe49z759NRmga7Ah2MLHO4BwA8UOQtqbDmuQHSn/+MBSp7rfuhRIXLgLU2TkTYkbMu6JVy9cfsKfP0mqQlIaing+61POfJV9cDKtckfz/hfo8WLfAVUawxXSS/GYubhmoCdttEiz4Svt+swkDFB9DREhrRuO2tdmRQWcnxkOonbLsLe/zsbYLBj/35Ue7rWcscuDDSaqv9LdOaKIXUgJ4hTHL3AHvsykfGvS54Jl2Us440nkbEAW90mMLVhykqyfy6KVJkF+RDdA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=p/7j0pB9paSxwtUwe+WD+PeAkmOdcpqh5K8PlQz/jm0=; b=CCnjGLi0yed4yEjyaKxcKZ5Nhb/Uz47/qis6JDpytXfC79m4FhuAkgZK5Efu8Io9Smc0okwlCjj0dt6jocznjHm8r1jmXkB9fxEq6SYeIaNuCcpqbxA3xyRLjaaopzUgqg3iy4J2VBgQq6WssOczfCjqsvLr2UShZj2XO7trytrf6siIHRUXcbjlvQHK3fVrdfDQu8YKOxus9hoAuXCHmJel/HWxaFi9BYZM3uVpg1x4Zdc4iLoW16o1g2JqBoyZ0KavUn5VibkT3jmY4ZoImg9EuDkYBaB1K5UNe3NHer9Zv3hEUo0CBOG2ws0kKUPf29Z9eLzaCZs++wygNGt2Kg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=p/7j0pB9paSxwtUwe+WD+PeAkmOdcpqh5K8PlQz/jm0=; b=FWm7jNEB4zNIz10dYcM6qEAMA6TxeDOP/Kz3tzwAjJOWMwlQAodkbmIOTUpuThhwuWN7b9+g6INgZEpSnRl2QsbTms2b7aLVj8H2cnyThhg/Rt+Kq/vugx3bZPW9dwEQ6OGC7unr17D23sMR5of2Qi/kUBZ3LixMpUdjRlB1kmk=
Received: from BYAPR11MB2887.namprd11.prod.outlook.com (2603:10b6:a03:89::27) by BYAPR11MB2870.namprd11.prod.outlook.com (2603:10b6:a02:cb::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4457.21; Fri, 27 Aug 2021 13:27:09 +0000
Received: from BYAPR11MB2887.namprd11.prod.outlook.com ([fe80::a19c:e0ca:19d9:19e2]) by BYAPR11MB2887.namprd11.prod.outlook.com ([fe80::a19c:e0ca:19d9:19e2%3]) with mapi id 15.20.4436.024; Fri, 27 Aug 2021 13:27:09 +0000
From: "Acee Lindem (acee)" <acee@cisco.com>
To: Tero Kivinen <kivinen@iki.fi>, Yaron Sheffer <yaronf.ietf@gmail.com>
CC: Qin Wu <bill.wu@huawei.com>, tom petch <ietfc@btconnect.com>, "draft-ietf-lsr-pce-discovery-security-support.all@ietf.org" <draft-ietf-lsr-pce-discovery-security-support.all@ietf.org>
Thread-Topic: Secdir last call review of draft-ietf-lsr-pce-discovery-security-support-05
Thread-Index: AdeS/QTAao4BcToNQmG4p4waGPgvAwAOpaiAAHKQBAAADkBnAAGCidgA///BX4A=
Date: Fri, 27 Aug 2021 13:27:09 +0000
Message-ID: <FECB31B8-47DE-4419-A98C-A8DB8B18558A@cisco.com>
References: <823a8f74b1824ff8827734446fe6f335@huawei.com> <CCF96710-139E-46C7-B615-1A7B74458862@gmail.com> <8BC3300E-2F4E-4965-8857-FC31BA7D1B40@cisco.com> <96DF4CF9-CA27-4079-8080-757C60AFEC34@gmail.com> <24872.58484.337833.575942@fireball.acr.fi>
In-Reply-To: <24872.58484.337833.575942@fireball.acr.fi>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.52.21080801
authentication-results: iki.fi; dkim=none (message not signed) header.d=none;iki.fi; dmarc=none action=none header.from=cisco.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 34684487-912a-4fe0-d0b8-08d9695e5f2b
x-ms-traffictypediagnostic: BYAPR11MB2870:
x-microsoft-antispam-prvs: <BYAPR11MB2870C18E3180910335B632CBC2C89@BYAPR11MB2870.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BYAPR11MB2887.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(366004)(38070700005)(86362001)(33656002)(2616005)(30864003)(6512007)(122000001)(38100700002)(54906003)(71200400001)(26005)(66556008)(64756008)(66476007)(66946007)(76116006)(508600001)(66446008)(966005)(8936002)(2906002)(8676002)(15650500001)(5660300002)(6506007)(53546011)(4326008)(83380400001)(36756003)(186003)(6486002)(316002)(110136005)(45980500001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?NTBKbzlhRndaazVxemVFYzc5Q05oZmtiRnAvWHJGam9BamdJWFN2NlNjVzBw?= =?utf-8?B?WVlwWFVZL3RDR0ZDSzRjeXdNRXhMS01jSk1PQ3AwTy9TVUdhK2lUSEVJSktj?= =?utf-8?B?NUdLdktuZ01ycXczRFVtaUZDWU94cEQ5MEhuNnE5RWFxTjMveHRUV1hwek5Z?= =?utf-8?B?L21TdnAwZFhPSnYrbDBYTEZNWHozcS8yelNPTS9KbE9kd3Y2cXpZaUt1YzlQ?= =?utf-8?B?UW9Wa25HWFFOSTFuN004QmVFTTF6c1J5eDkwODRGTHFueW0xZkVHN21qSm1s?= =?utf-8?B?UHpQY2lUVy9zVDE3YUM5VnpEeUpiYVhMWVRsZ2RwSWhyUlRvZlZmb3F1SWc4?= =?utf-8?B?c1FNWWd5QzJxaEluTStmY3dHZTNEbTBUb0hOby9MUEZIZG9LdzZJWGh0S0x2?= =?utf-8?B?aXM2cWZIM3dtQURROHhyTUxWSDFjanNyYkNhVUFGd3RPc0FEUVBZRE1JdTNL?= =?utf-8?B?ZzJVZGRSNHg4aEJndTNzM0FkY3o1ZEgwWDVnMU93aWt4NHJYdTF5RFdLZnA5?= =?utf-8?B?bWlGNjZpUHhNZ1FETGM0TU5qVWRwK1BjZjBPRE9TRHEyd0NDVHZGS1FkTVIv?= =?utf-8?B?cVhwVnBsMEQxYlVjek9ZeGhIdk5yQnFGL2M2cVZrY0Fya3JxVHJOYkNBd2Vm?= =?utf-8?B?S1pYOFdDeGQwODcydE5INHdSU1hSOEdnSE9yQ0syYnJiWFdkN2dqTlZsUkhF?= =?utf-8?B?STQ5ZTgzTUhPd0lpVUhoU1BjaWM3bi9rQWRBTmRVc1VFOTFpbVBydGljWEcr?= =?utf-8?B?cjZQb0dTU0pYa2VhQVQ5T2pyR2hrWU93UjJnZDAyVW1TMklLZXRuazNiVndm?= =?utf-8?B?b0M0clZ4SCtWOTRJOU45dGs0R0R4UnU4Z3FDb05Hc2xaNDh5Y3Bod1VKQkQ4?= =?utf-8?B?V256eHhKa3ZkTHRqNGQ2cUlOZzU3aGZQYTZnaDgxNkRuVnE4S1NkazFVZjdM?= =?utf-8?B?MTN3SXpWTC8wNUNRSkFXZnk1WVJGa1o2QmRoS1Nzd0VzYUlwL0hCU3FNYkhq?= =?utf-8?B?MjBlWWRmL0dGQkp5TjYzRzcwaExGVHFOb3N6ZVpBeVVCTzlVTWE5S1llaE1I?= =?utf-8?B?cGovb2pTdlQ3QTE4TVQ5UEF3NDdDTUZvb0EvTzNZRC9DWE9sTlBiSmRLS2dP?= =?utf-8?B?ekpZK0o0RE1Tek00b1pqS3N4ajZHaFlpOXdPSG9IQ0pUdlYwbk8xS3FWcmZN?= =?utf-8?B?UWh1S2Z4Mm9kVUdrVExzUndCdjcwKzVReXhMSDFBNmh2dzdtK2N6SEJiZ3di?= =?utf-8?B?VCtjcVZsSmxXVktVcHBoREF2cDBrVXZ6cjhscitQTFFrTzM4UGZManpnK0ta?= =?utf-8?B?YzAvQlR6Rk8xbWFtcGFKQUhYcjY2bmMyLzllc3p0bGJ3YURVYzR0dnNtR0d3?= =?utf-8?B?WFc3c2RMS1dvR05mUyttTUFrZGRmK2phTGxMOEkySUpSQWxIdzlYVkZSMzVP?= =?utf-8?B?UWpYWGZYSWNuQXA2NEltKzdibTBNbGpKazlGcUZCYzhMVHZuT1pndUhNYXZx?= =?utf-8?B?ZTRrajFxY0NOcFduWThaV01mTFVKVHYvb2YrK1V5Qmx4L3cyK1luUmVML0wz?= =?utf-8?B?OVRYZVdadGZDUFVmMW50UiswK1lOZVB4ektPVEZsYmJha0RpNlZwcktLWkls?= =?utf-8?B?dXRZWGNIS1dBZ1JOVVNDSCszWlNqcFRsRC9uNko2c3FYdW1oWkdRL2Z5L0Vj?= =?utf-8?B?TzgvTmZEUnZoUzM4ZjRFUU5ZU2d1UlZhN1pucjZUL2ZOTmNRc1FUZXdZQmJs?= =?utf-8?Q?ZlvFwA0fLcXQd9RukV7C6mNQSIpB546LBtSuGcO?=
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-ID: <FF028E99B96339499C7449C59A35FEF8@namprd11.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR11MB2887.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 34684487-912a-4fe0-d0b8-08d9695e5f2b
X-MS-Exchange-CrossTenant-originalarrivaltime: 27 Aug 2021 13:27:09.2915 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: FuJxDxUL1fG0yk4pOgB3V68H3uyb++DKVOoDgA1yNoEuWZQ5gRQZJHY1G9GmX9qe
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR11MB2870
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.20, xbe-aln-005.cisco.com
X-Outbound-Node: rcdn-core-2.cisco.com
Resent-From: <alias-bounces@ietf.org>
Resent-To: pce@ietf.org, dhruv.ietf@gmail.com, acee@cisco.com, martin.vigoureux@nokia.com, jgs@juniper.net, lsr@ietf.org, bill.wu@huawei.com, yingzhen.ietf@gmail.com, daniel@olddog.co.uk, maqiufang1@huawei.com, chopps@chopps.org, aretana.ietf@gmail.com, diego.r.lopez@telefonica.com
Resent-Message-Id: <20210827132720.50EB63A16BB@ietfa.amsl.com>
Resent-Date: Fri, 27 Aug 2021 06:27:20 -0700 (PDT)
Archived-At: <https://mailarchive.ietf.org/arch/msg/pce/0Po0vKF0PMBSWTwApTULP8_CxEo>
Subject: Re: [Pce] Secdir last call review of draft-ietf-lsr-pce-discovery-security-support-05
X-BeenThere: pce@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Path Computation Element <pce.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pce>, <mailto:pce-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/pce/>
List-Post: <mailto:pce@ietf.org>
List-Help: <mailto:pce-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pce>, <mailto:pce-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 27 Aug 2021 13:27:21 -0000

Hi Tero,
I see the review is now marked "Completed". This was what I wanted.
Thanks,
Acee

On 8/27/21, 9:11 AM, "Tero Kivinen" <kivinen@iki.fi> wrote:

    Yaron Sheffer writes:
    > Hi Acee,
    > 
    > I honestly don't know how to do it, and if I even can unless you
    > send a new review request. 

    We do not really update the reviews, but we do assign draft for two
    reviews, i.e., one during the last call and one before the telechat (I
    will not reassign it for telechat if there is no need to do rereview,
    i.e., original review was ready and/or nothing major changed in the
    draft since the review). 

    > Copying Tero who's an expert on this.
    > 
    > To clarify: my review of -05 still stands, but it has been addressed
    > by -07.

    As area directors will see the review email thread and if the there is
    comment there that review comments have been addressed in later drafts
    that is enough, so no need to update the review.

    Note, that even when the reviewer thinks his comments have been
    addressed, the area director might have different view on that matter,
    i.e., they might still comment on the issues found during the
    telechat. 

    > 
    > Thanks,
    > 	Yaron
    > 
    > 
    > On 8/19/21, 20:55, "Acee Lindem (acee)" <acee@cisco.com> wrote:
    > 
    >     Hi Yaron,
    > 
    >     Thanks for the review. Can you update the status of the SECDIR review? 
    > 
    >     https://datatracker.ietf.org/doc/review-ietf-lsr-pce-discovery-security-support-05-secdir-lc-sheffer-2021-08-05/
    > 
    >     Thanks,
    >     Acee
    > 
    >     On 8/17/21, 3:15 AM, "Yaron Sheffer" <yaronf.ietf@gmail.com> wrote:
    > 
    >         Looks good to me. Thank you!
    > 
    >         	Yaron
    > 
    >         On 8/17/21, 03:17, "Qin Wu" <bill.wu@huawei.com> wrote:
    > 
    >             Sorry for late followup, here is the update, the diff is
    >             https://www.ietf.org/rfcdiff?url2=draft-ietf-lsr-pce-discovery-security-support-06
    >             Yaron, let authors know if your comments are addressed in v-06.
    >             Thanks!
    > 
    >             -Qin
    >             -----邮件原件-----
    >             发件人: Acee Lindem (acee) [mailto:acee@cisco.com] 
    >             发送时间: 2021年8月17日 4:33
    >             收件人: Qin Wu <bill.wu@huawei.com>om>; tom petch <ietfc@btconnect.com>om>; Yaron Sheffer <yaronf.ietf@gmail.com>om>; secdir@ietf.org
    >             抄送: draft-ietf-lsr-pce-discovery-security-support.all@ietf.org
    >             主题: Re: Secdir last call review of draft-ietf-lsr-pce-discovery-security-support-05
    > 
    >             Hi Qin, 
    > 
    >             Can you publish a revision so that Yaron assure it satisfies his comments? 
    > 
    >             Thanks,
    >             Acee
    > 
    >             On 8/12/21, 9:21 PM, "Qin Wu" <bill.wu@huawei.com> wrote:
    > 
    >                 Thanks Acee and Tom for good suggestion, we will take them into account.
    > 
    >                 -Qin
    >                 -----邮件原件-----
    >                 发件人: Acee Lindem (acee) [mailto:acee@cisco.com] 
    >                 发送时间: 2021年8月12日 1:18
    >                 收件人: tom petch <ietfc@btconnect.com>om>; Yaron Sheffer <yaronf.ietf@gmail.com>om>; Qin Wu <bill.wu@huawei.com>om>; secdir@ietf.org
    >                 抄送: draft-ietf-lsr-pce-discovery-security-support.all@ietf.org
    >                 主题: Re: Secdir last call review of draft-ietf-lsr-pce-discovery-security-support-05
    > 
    >                 I'd also recommend changing, "key names" to "key-ids or key-chain names" since this is what is actually being advertised.
    >                 Thanks,
    >                 Acee
    > 
    >                 On 8/10/21, 11:53 AM, "tom petch" <ietfc@btconnect.com> wrote:
    > 
    >                     From: Lsr <lsr-bounces@ietf.org> on behalf of Yaron Sheffer <yaronf.ietf@gmail.com>
    >                     Sent: 10 August 2021 14:57
    > 
    >                     So let me suggest:
    > 
    >                     <tp>
    >                     An offlist suggestion for you to consider
    > 
    >                     OLD
    >                         Thus before advertisement of the PCE security parameters, it MUST be insured that the IGP protects the authentication and integrity of the PCED TLV using the mechanisms defined in
    >                         [RFC5310] and [RFC5709], if the mechanism described in this document is used.
    > 
    >                         Moreover, as stated in [RFC5088] and [RFC5089], the IGP do not provide any encryption mechanisms to protect the secrecy of the PCED TLV, and the operator must ensure that no private data is carried in the TLV, for example that key names do not reveal sensitive information about the network.
    > 
    >                     NEW
    > 
    >                      Thus before advertising the PCE security parameters, using the mechanism described in this document, the IGP MUST be known to provide authentication and integrity for the PCED TLV using the mechanisms defined in  [RFC5304],  [RFC5310] or [RFC5709],
    > 
    >                         Moreover, as stated in [RFC5088] and [RFC5089], if the IGP does not provide any encryption mechanisms to protect the secrecy of the PCED TLV, then the operator must ensure that no private data is carried in the TLV, e.g. that key names do not reveal sensitive information about the network.
    > 
    >                     Tom Petch
    >                     </tp>
    > 
    >                     Thanks,
    >                             Yaron
    > 
    >                     On 8/10/21, 15:01, "Qin Wu" <bill.wu@huawei.com> wrote:
    > 
    >                         Yaron:
    >                         Thank for clarification. I agree to keep the last sentence in the second paragraph of section 7 as is.
    >                         But I prefer to add the addition references in the previous sentence as follows:
    >                         "
    >                         Thus before advertisement of the PCE security parameters, it MUST be insured that the IGP is
    >                         protected for authentication and integrity of the PCED TLV,, with the mechanisms defined in
    >                         [RFC5310] and [RFC5709] if the mechanism described in this document is used.
    > 
    >                         As stated in [RFC5088] and [RFC5089], the IGP do not provide encryption mechanism to protect
    >                         the privacy of the PCED TLV, if this information can make the PCEP session less secure then the operator should take that into consideration.
    >                         "
    >                         If you better wording, please let me know.
    > 
    >                         -Qin
    >                         -----邮件原件-----
    >                         发件人: Yaron Sheffer [mailto:yaronf.ietf@gmail.com]
    >                         发送时间: 2021年8月10日 19:26
    >                         收件人: Qin Wu <bill.wu@huawei.com>om>; secdir@ietf.org
    >                         抄送: draft-ietf-lsr-pce-discovery-security-support.all@ietf.org; last-call@ietf.org; lsr@ietf.org
    >                         主题: Re: Secdir last call review of draft-ietf-lsr-pce-discovery-security-support-05
    > 
    >                         Hi Qin,
    > 
    >                         Sorry, but I find your latest proposed text very confusing, because we should be focusing on integrity protection and not privacy (=secrecy) of the TLV. So I would prefer to keep the text as-is, with the addition of a reference to the IS-IS and OSPF security mechanisms that were discussed on this thread.
    > 
    >                         Thanks,
    >                             Yaron
    > 
    >                         On 8/10/21, 05:00, "Qin Wu" <bill.wu@huawei.com> wrote:
    > 
    >                             Hi, Yaron
    >                             -----邮件原件-----
    >                             >发件人: Yaron Sheffer [mailto:yaronf.ietf@gmail.com]
    >                             >发送时间: 2021年8月9日 21:44
    >                             >收件人: Qin Wu <bill.wu@huawei.com>om>; secdir@ietf.org
    >                             >抄送: draft-ietf-lsr-pce-discovery-security-support.all@ietf.org; last-call@ietf.org; lsr@ietf.org
    >                             >主题: Re: Secdir last call review of draft-ietf-lsr-pce-discovery-security-support-05
    > 
    >                             >Hi Qin,
    > 
    >                             >Thank you for your response.
    > 
    >                             >* RFC 3567 (for IS-IS) is obsoleted by RFC 5304. Unfortunately RFC 5304 still uses HMAC-MD5, which would be considered insecure nowadays.
    >                             >* RFC 2154 is very old and Experimental (and only supports RSA-MD5 signatures). I'm not an OSPF expert by any means, but I'm willing to bet that there are no production implementations of this RFC. (I'm willing to be proven wrong).
    >                             >Is there another RFC that define a protection mechanism for OSPF?
    > 
    >                             >All in all, there appear to be no good options for the IGP.
    > 
    >                             [Qin Wu]Yes, we do have alternatives, see Les's response in the separate email
    >                             "
    >                             On 8/9/21, 23:36,"Les Ginsberg (ginsberg)" <ginsberg@cisco.com> wrote:
    >                             For IS-IS security please also see RFC 5310.
    >                             For OSPF security please see RFC 5709.
    >                             "
    >                             >To your last point, when I mentioned decoupling the mechanisms, I was suggesting to use the extension you define even if the IGP *cannot* be secured. If you think this is reasonable, please add such text to the Security Considerations.
    > 
    >                             [Qin Wu] Okay, how about the following change
    >                             OLD TEXT:
    >                             "
    >                             As stated in [RFC5088]
    >                             and [RFC5089], the IGP do not provide encryption mechanism to protect
    >                             the privacy of the PCED TLV, if this information can make the PCEP
    >                             session less secure then the operator should take that into consideration .
    >                             "
    >                             NEW TEXT:
    >                             "
    >                             As stated in [RFC5088]
    >                             and [RFC5089], the IGP do not provide encryption mechanism to protect
    >                             the privacy of the PCED TLV, if this information can make the PCEP
    >                             session less secure then the operator should take that into consideration
    >                             when getting the mechanism described in this document deployed.
    >                             "
    >                              >Thanks,
    >                              >      Yaron
    > 
    >                             >On 8/9/21, 16:09, "Qin Wu" <bill.wu@huawei.com> wrote:
    > 
    >                               >   Thanks Yaron for valuable comments, please see my reply inline below.
    >                                 -----邮件原件-----
    >                                 >发件人: Yaron Sheffer via Datatracker [mailto:noreply@ietf.org]
    >                                 >发送时间: 2021年8月6日 3:25
    >                                 >收件人: secdir@ietf.org
    >                                 >抄送: draft-ietf-lsr-pce-discovery-security-support.all@ietf.org; last-call@ietf.org; lsr@ietf.org
    >                                 >主题: Secdir last call review of draft-ietf-lsr-pce-discovery-security-support-05
    > 
    >                                 >Reviewer: Yaron Sheffer
    >                                 >Review result: Not Ready
    > 
    >                                 >This document defines a mechanism (a TLV) to advertise the PCE Protocol security required (use of TCP-AO and its key ID, or alternatively use of TLS) within the routing protocol being used.
    > 
    >                                 >* Sec. 3.1: I don't understand why "SHOULD advertise" and not MUST. Especially given the strict client behavior defined later.
    >                                 [Qin]: I believe "SHOULD advertise" is consistent with client behavior defined later, i.e., we apply SHOULD NOT language to the client behavior.
    >                                 I am not sure we should change it into strong language with MUST. Since if IGP advertisement doesn't include TCP-AO
    >                                  support flag bit or TLS support flag bit, NMS may fall back to configure both PCC and PCE server to support TCP-AO or TLS. That's one of reason I think why we choose to use SHOULD language.
    > 
    >                                 >* Sec. 3.1: should we also say something about the case where both methods are advertised, and whether we recommend for the client to use one of them over the other?
    > 
    >                                 [Qin]: It is up to local policy, which has bee clarified in the end of section 3.1. Hope this clarify.
    > 
    >                                 >* Sec. 4: typo (appears twice) - "to be carried in the PCED TLV of the for use".
    > 
    >                                 [Qin]:Thanks, have fixed them in the local copy.
    > 
    >                                 >* Sec. 7: this phrase appears to be essential to security of this mechanism: "it MUST be insured that the IGP is protected for authentication and integrity of the PCED TLV". I would expect more guidance: how can this property be ensured in the relevant IGPs?
    >                                 [Qin]:I think mechanism defined in [RFC3567] and [RFC2154] can be used to ensure authenticity and integrity of OSPF LSAs or ISIS LSPs and their TLVs. Here is the proposed changes:
    >                                 OLD TEXT:
    >                                 "
    >                                    Thus before advertisement of
    >                                    the PCE security parameters, it MUST be insured that the IGP is
    >                                    protected for authentication and integrity of the PCED TLV if the
    >                                    mechanism described in this document is used.
    >                                 "
    >                                 NEW TEXT:
    >                                 "
    >                                    Thus before advertisement of
    >                                    the PCE security parameters, it MUST be insured that the IGP is
    >                                    protected for authentication and integrity of the PCED TLV with mechanisms defined in [RFC3567][RFC2154] if the
    >                                    mechanism described in this document is used.
    >                                 "
    >                                 >* Also, a possibly unintended consequence of this requirement is that if the IGP cannot be protected in a particular deployment/product, this mechanism would not be used. Please consider if this is likely to happen and whether we want to forego PCEP transport >security in such cases. My gut feel (not based on experience in such networks) is that the threat models are different enough that we should decouple the security of IGP from that of PCEP.
    > 
    >                                 [Qin] I agree IGP security should be separated from PCEP security. IGP extension defined in this document is used by the PCC to select PCE server with appropriate security mechanism. On the other hand, Operator can either use IGP advertisement for PCEP security capability or rely on local policy to select PCE. If operator feels IGP advertisement is not secure, he can fall back to local policy or rely on manual configuration. Hope this clarifies.
    > 
    > 
    > 
    > 
    > 
    > 
    > 
    >                     _______________________________________________
    >                     Lsr mailing list
    >                     Lsr@ietf.org
    >                     https://www.ietf.org/mailman/listinfo/lsr
    > 
    > 
    > 
    > 
    > 
    > 

    -- 
    kivinen@iki.fi