[Pce] Alvaro Retana's No Objection on draft-ietf-pce-lsp-control-request-09: (with COMMENT)

Alvaro Retana via Datatracker <noreply@ietf.org> Fri, 27 September 2019 10:08 UTC

Return-Path: <noreply@ietf.org>
X-Original-To: pce@ietf.org
Delivered-To: pce@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 44597120113; Fri, 27 Sep 2019 03:08:36 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
From: Alvaro Retana via Datatracker <noreply@ietf.org>
To: "The IESG" <iesg@ietf.org>
Cc: draft-ietf-pce-lsp-control-request@ietf.org, Hariharan Ananthakrishnan <hari@netflix.com>, pce-chairs@ietf.org, pce@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.103.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: Alvaro Retana <aretana.ietf@gmail.com>
Message-ID: <156957891627.12410.17887218088455702680.idtracker@ietfa.amsl.com>
Date: Fri, 27 Sep 2019 03:08:36 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/pce/VCaz5dScPhTe3fGdoNKGfaqNUmM>
Subject: [Pce] Alvaro Retana's No Objection on draft-ietf-pce-lsp-control-request-09: (with COMMENT)
X-BeenThere: pce@ietf.org
X-Mailman-Version: 2.1.29
List-Id: Path Computation Element <pce.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pce>, <mailto:pce-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/pce/>
List-Post: <mailto:pce@ietf.org>
List-Help: <mailto:pce-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pce>, <mailto:pce-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 27 Sep 2019 10:08:37 -0000

Alvaro Retana has entered the following ballot position for
draft-ietf-pce-lsp-control-request-09: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-pce-lsp-control-request/



----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

I have a substantive comment and then some nits/editorial notes.

(1) It seems to me that any PCE can request control of an LSP.  Even if the
sessions are authenticated and encrypted, how does the PCC determine if it's ok
for the requesting PCE to ask for control?  §8.1 says that an "implementation
SHOULD allow the operator to configure the policy based on which it honors the
request to control the LSPs".  If the implementation doesn't allow the
configuration of policy, then it is possible for a rogue PCE to ask for control
of an LSP, and for the PCC to grant it.  Why is the ability to configure this
policy not REQUIRED?  I believe this case should be explicitly called out as a
vulnerability.

(2) Abstract: s/A Path Computation Client (PCC) has set up LSPs/A Path
Computation Client (PCC) that has set up LSPs

(3) §1: s/which PCE to delegate the orphaned LSP/which PCE to delegate the
orphaned LSP to

(4) §1: s/a simple extension, by using this a PCE can/a simple extension, by
using it a PCE can

(5) In §3 the new C Flag is called the "LSP-Control Request Flag", but §7.1
only uses "LSP-Control".  Please be consistent; the more descriptive name is
probably better.