[Roll] [roll] #125: draft-ietf-roll-security-threats-01.txt --- Delete section/terms

"roll issue tracker" <trac+roll@trac.tools.ietf.org> Wed, 08 May 2013 21:02 UTC

Return-Path: <trac+roll@trac.tools.ietf.org>
X-Original-To: roll@ietfa.amsl.com
Delivered-To: roll@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A6B2221F8FF5 for <roll@ietfa.amsl.com>; Wed, 8 May 2013 14:02:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level:
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bvq-fhXmoyVu for <roll@ietfa.amsl.com>; Wed, 8 May 2013 14:02:04 -0700 (PDT)
Received: from grenache.tools.ietf.org (grenache.tools.ietf.org [IPv6:2a01:3f0:1:2::30]) by ietfa.amsl.com (Postfix) with ESMTP id BBA6A21F8FDC for <roll@ietf.org>; Wed, 8 May 2013 14:02:03 -0700 (PDT)
Received: from localhost ([127.0.0.1]:41206 helo=grenache.tools.ietf.org ident=www-data) by grenache.tools.ietf.org with esmtp (Exim 4.80) (envelope-from <trac+roll@trac.tools.ietf.org>) id 1UaBUu-0001AG-SR; Wed, 08 May 2013 23:02:00 +0200
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
From: roll issue tracker <trac+roll@trac.tools.ietf.org>
X-Trac-Version: 0.12.3
Precedence: bulk
Auto-Submitted: auto-generated
X-Mailer: Trac 0.12.3, by Edgewall Software
To: tzeta.tsao@cooperindustries.com, mariainesrobles@gmail.com
X-Trac-Project: roll
Date: Wed, 08 May 2013 21:02:00 -0000
X-URL: http://tools.ietf.org/wg/roll/
X-Trac-Ticket-URL: http://trac.tools.ietf.org/wg/roll/trac/ticket/125
Message-ID: <067.b8a42ee3aa07b56a25c0575de68ce20e@trac.tools.ietf.org>
X-Trac-Ticket-ID: 125
X-SA-Exim-Connect-IP: 127.0.0.1
X-SA-Exim-Rcpt-To: tzeta.tsao@cooperindustries.com, mariainesrobles@gmail.com, roll@ietf.org
X-SA-Exim-Mail-From: trac+roll@trac.tools.ietf.org
X-SA-Exim-Scanned: No (on grenache.tools.ietf.org); SAEximRunCond expanded to false
Cc: roll@ietf.org
Subject: [Roll] [roll] #125: draft-ietf-roll-security-threats-01.txt --- Delete section/terms
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.12
Reply-To: roll@ietf.org
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/roll>, <mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/roll>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>, <mailto:roll-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 08 May 2013 21:02:04 -0000

#125: draft-ietf-roll-security-threats-01.txt --- Delete section/terms

 Comments done by Stephen Kent (SK),source:[http://www.ietf.org/mail-
 archive/web/secdir/current/msg03712.html] and [http://www.ietf.org/mail-
 archive/web/secdir/current/msg03848.html][[BR]]
 Comments done by Sean Turner (ST),source:
 [https://datatracker.ietf.org/doc/draft-ietf-roll-security-
 threats/ballot/]

 === Section 3.4[[BR]]
 * s3.4: misappropriated seems like the wrong word based on later sections.
 Masquerade seems like what you're trying to protect against, but that's
 covered by the peer authentication process. -- by ST

 === Section 5.1.2[[BR]]
 * 5.1.2 - Passive wiretapping (“sniffing” to the authors) does not include
 device compromise. -- by SK[[BR]]
 * 5.1.2 -  The discussion of what constitutes a suitable key length is not
 a good topic for this document. First, the authors fail to note, at the
 beginning of the relevant paragraph, that the key length comments are
 applicable to symmetric cryptographic algorithms. Second, absent a mention
 of the granularity of key distribution, this discussion is premature, at
 best. -- BY SK

 === Section 5.1.4[[BR]]
 * 5.1.4 – Discussions of anti-tamper are rarely appropriate for IETF
 documents. There is no reason to believe that these authors are especially
 knowledgeable about such technology. I suggest this section be deleted.--
 by SK

 === Section 5.3.3[[BR]]
 * 5.3.3 – “Selective forwarding” is not a routing attack.-- by SK

-- 
-------------------------------------+-------------------------------------
 Reporter:                           |      Owner:
  mariainesrobles@gmail.com          |  tzeta.tsao@cooperindustries.com
     Type:  defect                   |     Status:  new
 Priority:  major                    |  Milestone:
Component:  security-threats         |    Version:
 Severity:  Active WG Document       |   Keywords:
-------------------------------------+-------------------------------------

Ticket URL: <http://trac.tools.ietf.org/wg/roll/trac/ticket/125>
roll <http://tools.ietf.org/wg/roll/>