[Roll] [roll] #150: draft-ietf-roll-security-threats-06 - Editorial comments

"roll issue tracker" <trac+roll@trac.tools.ietf.org> Sun, 23 February 2014 18:38 UTC

Return-Path: <trac+roll@trac.tools.ietf.org>
X-Original-To: roll@ietfa.amsl.com
Delivered-To: roll@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DEAF81A06B4 for <roll@ietfa.amsl.com>; Sun, 23 Feb 2014 10:38:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 2.453
X-Spam-Level: **
X-Spam-Status: No, score=2.453 tagged_above=-999 required=5 tests=[BAYES_95=3, RP_MATCHES_RCVD=-0.547] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qgqXl1KAm7st for <roll@ietfa.amsl.com>; Sun, 23 Feb 2014 10:38:50 -0800 (PST)
Received: from grenache.tools.ietf.org (grenache.tools.ietf.org [IPv6:2a01:3f0:1:2::30]) by ietfa.amsl.com (Postfix) with ESMTP id 42CF21A06B2 for <roll@ietf.org>; Sun, 23 Feb 2014 10:38:50 -0800 (PST)
Received: from localhost ([127.0.0.1]:45151 helo=grenache.tools.ietf.org ident=www-data) by grenache.tools.ietf.org with esmtp (Exim 4.80) (envelope-from <trac+roll@trac.tools.ietf.org>) id 1WHdwg-00040X-M3; Sun, 23 Feb 2014 19:38:34 +0100
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
From: roll issue tracker <trac+roll@trac.tools.ietf.org>
X-Trac-Version: 0.12.3
Precedence: bulk
Auto-Submitted: auto-generated
X-Mailer: Trac 0.12.3, by Edgewall Software
To: draft-ietf-roll-security-threats@tools.ietf.org, mariainesrobles@gmail.com
X-Trac-Project: roll
Date: Sun, 23 Feb 2014 18:38:34 -0000
X-URL: http://tools.ietf.org/wg/roll/
X-Trac-Ticket-URL: http://trac.tools.ietf.org/wg/roll/trac/ticket/150
Message-ID: <067.3ddb78c0b47d80e1d4f03a63dc19cb3c@trac.tools.ietf.org>
X-Trac-Ticket-ID: 150
X-SA-Exim-Connect-IP: 127.0.0.1
X-SA-Exim-Rcpt-To: draft-ietf-roll-security-threats@tools.ietf.org, mariainesrobles@gmail.com, robert.cragie@gridmerge.com, roll@ietf.org
X-SA-Exim-Mail-From: trac+roll@trac.tools.ietf.org
X-SA-Exim-Scanned: No (on grenache.tools.ietf.org); SAEximRunCond expanded to false
Resent-To: angel.lozano@upf.edu, mcr+ietf@sandelman.ca, mischa.dohler@cttc.es, roger.alexander@cooperindustries.com, tzeta.tsao@cooperindustries.com, vanesa.daza@upf.edu
Archived-At: http://mailarchive.ietf.org/arch/msg/roll/kg04QmG_dUIyBA5ciW1_ctHCEAk
Cc: roll@ietf.org
Subject: [Roll] [roll] #150: draft-ietf-roll-security-threats-06 - Editorial comments
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.15
Reply-To: roll@ietf.org
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/roll>, <mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/roll/>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>, <mailto:roll-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 23 Feb 2014 18:38:52 -0000

#150: draft-ietf-roll-security-threats-06 - Editorial comments

 Reported by Robert Cragie as Doc. Shepherd. on 02/17/2014

 * Section 1:

 2nd Paragraph:<rcc>s/applicatbility/applicability</rcc>


 3rd Paragraph:<rcc>s/includes/describes</rcc>


 3rd Paragraph: <rcc>s/but/security services and</rcc>



 * Section 3:

 1st Paragraph: <rcc>s/assesment/assessment/</rcc>


 1st Paragraph: <rcc>s/security/security,/</rcc>



 * Section 3.1

 1st Paragraph: <rcc>s/components/assets</rcc>



 * Section 3.2

 1st P: <rcc>s/RPL/RPL:/</rcc>[[BR]]


 * Section 3.4

 <rcc>s/iintegrity/integrity</rcc>



 * Section 5

 3rd P: <rcc>s/these attackes/of these attackers/</rcc>

 * Section 5.1.1

 <rcc>s?/leveraged from/implied by/</rcc>

 * Section 5.1.3

 <rcc>s/potentionally/potentially/</rcc>

 * Section 5.2

 <rcc>s/threat actions/attacks</rcc>


 <rcc>Either "threat" or "attack" - a "threat action" is an attack</rcc>


 <rcc>s/This threat results/These attacks may result</rcc>


 <rcc>s/it involves/may involve</rcc>



 * Section 5.2.1

 <rcc>s/memory/available memory</rcc>

 * Section 5.2.2

 <rcc>s/attachers/attackers</rcc>


 2nd P: <rcc>s/threats or attacks/attacks</rcc>


 3rd P: <rcc>s/(other than occurring through explicit node exchanges) will
 include/will include</rcc>:


 <rcc>No real need to say "other than..." as this is the authorized
 case</rcc>


 <rcc>s/react quickly to exclude a compromised device/detect a compromised
 device and react quickly to exclude it</rcc>



 * Section 5.4.2

  Figure 2: Selective <rcc>s/Forwarding/forwarding example</rcc>


 Figure 3: Wormhole <rcc>s/Attacks/attack example</rcc>


 Figure 4: <rcc>s/Selective Forwarding, Wormhole, and Sinkhole
 Attacks/sinkhole attack example</rcc>



 * Section 6.1.1

 <rcc>s/exchaning/exchanging</rcc>

 * Section 6.1.2

 <rcc>s/well equiped/well-equipped</rcc>

 * Section 6.1.4

 ...as part of a routing <rcc>s/protocol security/protocol, security</rcc>
 of routing information…



 * Section 6.2.2

 ...introduce false routes or  <rcc>s/topology/a false topology</rcc> that
 would not <rcc>s/be generated by the network/occur</rcc> otherwise,...



 <rcc>s/overlaims/overclaims or misclaims</rcc>



 * Section 6.2.4

 Note that for there to be no <rcc>s/affect/effect</rcc> at all,...

 * Section 6.3.1

 <rcc>s/WormHole/wormhole</rcc>

 * Section 6.3.5

 <rcc>s/Wormhole/wormhole</rcc>


 <rcc>s/hystersis/hysteresis</rcc>

 * Section 7.3

 Availability of routing information is linked to system and network
 <rcc>s/availability which/availability, which</rcc> in the case of LLNs

 * Section 10

  <rcc>s?/threads/threats</rcc>

-- 
-------------------------------------+-------------------------------------
 Reporter:                           |      Owner:  draft-ietf-roll-
  mariainesrobles@gmail.com          |  security-threats@tools.ietf.org
     Type:  defect                   |     Status:  new
 Priority:  minor                    |  Milestone:
Component:  security-threats         |    Version:
 Severity:  In WG Last Call          |   Keywords:
-------------------------------------+-------------------------------------

Ticket URL: <http://trac.tools.ietf.org/wg/roll/trac/ticket/150>
roll <http://tools.ietf.org/wg/roll/>