Re: [secdir] Secdir last call review of draft-ietf-mpls-lsp-ping-ospfv3-codepoint-04

"Nagendra Kumar Nainar (naikumar)" <naikumar@cisco.com> Tue, 31 August 2021 20:22 UTC

Return-Path: <naikumar@cisco.com>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8F9B73A09CD; Tue, 31 Aug 2021 13:22:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.098
X-Spam-Level:
X-Spam-Status: No, score=-9.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, GB_ABOUTYOU=0.5, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=Ivm3CvBZ; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=oXf3uF35
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ilw5JGWHM8_3; Tue, 31 Aug 2021 13:22:12 -0700 (PDT)
Received: from rcdn-iport-1.cisco.com (rcdn-iport-1.cisco.com [173.37.86.72]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1C7B93A09C6; Tue, 31 Aug 2021 13:22:12 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=23905; q=dns/txt; s=iport; t=1630441332; x=1631650932; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=UTZlgdgxgwdyEtUIENEJijxljEHcwUidnYiC2BEp9Ts=; b=Ivm3CvBZbg0yik05dytbRw8+e6YUWHXG/sUOSmQosj4WbR4Pj2sCQlkh ugT/cMMQo4Gt3Rq3ec7RalZ+DpZhLji32Kpg9Abj4d7932jQDXwIZ0iI0 GzKe6LLf8pm66X1bygc80rTfVKn11XmG1OBB7ns1y6zoHV89uvODXBFZz s=;
IronPort-PHdr: =?us-ascii?q?A9a23=3AtyvWORA/fMoudCRNfA3DUyQVeBdPi9zP1kY96?= =?us-ascii?q?5kmzbxPIeyv/JXnaUrY4/glzFrERp7S5P8Mje3K+7vhVmoN7dfk0jgCfZVAW?= =?us-ascii?q?gVDhZAQmAotU8+GCAv1La2iYykzBs8XUlhj8jmyOlRUH8CrYVrUrzWy4DceF?= =?us-ascii?q?w+5OxByI7H+G5XZiIK80OXhk6A=3D?=
IronPort-HdrOrdr: =?us-ascii?q?A9a23=3AcFBCFa8kVunf2FOkEZxuk+F6db1zdoMgy1?= =?us-ascii?q?knxilNoENuE/BwxvrBoB1E73DJYW4qKQ4dcdDpAtjmfZquz+8K3WBxB8biYO?= =?us-ascii?q?CCgguVxe5ZnPDfKlHbakjDH6tmpNtdmstFeZ3N5DpB/LzHCWCDer5KqrTqgc?= =?us-ascii?q?PY59s2jU0dMD2CAJsQiTuRfzzranGeMzM2fKbReqDsgvZvln6FQzA6f867Dn?= =?us-ascii?q?4KU6zovNvQjq/rZhYAGloO9BSOpSnA0s+4LzGomjMlFx9fy7Yr9mbI1ybj4L?= =?us-ascii?q?+4jv29whjAk0fO8pVtnsf7wNcrPr3PtiFVEESotu+bXvUnZ1SwhkFynAhp0i?= =?us-ascii?q?dyrDD4mWZlAy200QKIQoj6m2q35+Cq6kde15ar8y7pvZKkm72ieNr/YPAx2b?= =?us-ascii?q?6wtXDimhcdVZhHodF29nPcuJxNARzamiPho9DOShFxj0Kx5WEviOgJkhVkIM?= =?us-ascii?q?YjgZJq3MciFXluYd099ePBmfcaOfgrCNuZ6OddcFucYXyctm5zwMa0VnB2Gh?= =?us-ascii?q?udWEANtsGczjATxRlCvgQl7d1amm1F+IM2SpFC6eiBOqN0lKtWRstTaa5mHu?= =?us-ascii?q?8OTca+F2SISxPRN2CZJ0jhCcg8Sj7wgo+y5K9w6PCheZQOwpd3kJPdUElAvW?= =?us-ascii?q?p3YE7qAd3m5uwCzvkMehT1Yd3J8LAR23FUgMyIeFPbC1z0dLl1qbrTnxw2OL?= =?us-ascii?q?yuZ8qO?=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0DKDABvji5h/5xdJa1aHgEBCxIMQIF?= =?us-ascii?q?OC4FTIy4Hd1o3MYYOggEDhTmiU4JTA1QLAQEBDQEBNQwEAQGEbgKCLwIlNwY?= =?us-ascii?q?OAQIEAQEBEgEBBQEBAQIBBgSBEROFaA2GQwIBAxIuAQE3AQ8CAQhGMiUCBAE?= =?us-ascii?q?NBQgaglCBflcDLwEOnVgBgToCih94gTOBAYIIAQEGBASBSkEGgnkYgjQDBoE?= =?us-ascii?q?6gn+ED4ZsJxyCDYEVQ4JmPoJiAQECAYFfg0uCLoZ4aIJmGZ40hC2JGJIfCoM?= =?us-ascii?q?rikCOO4V/EoNli2aQfoY4lhiMQ5hoAgQCBAUCDgEBBoF3JYFZcBWDJFAZD44?= =?us-ascii?q?gg3KFFIVKdDgCBgsBAQMJkgsBAQ?=
X-IronPort-AV: E=Sophos;i="5.84,367,1620691200"; d="scan'208,217";a="918958796"
Received: from rcdn-core-5.cisco.com ([173.37.93.156]) by rcdn-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 31 Aug 2021 20:22:11 +0000
Received: from mail.cisco.com (xbe-rcd-007.cisco.com [173.37.102.22]) by rcdn-core-5.cisco.com (8.15.2/8.15.2) with ESMTPS id 17VKMA3r011601 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Tue, 31 Aug 2021 20:22:10 GMT
Received: from xfe-rtp-005.cisco.com (64.101.210.235) by xbe-rcd-007.cisco.com (173.37.102.22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.15; Tue, 31 Aug 2021 15:22:10 -0500
Received: from xfe-aln-002.cisco.com (173.37.135.122) by xfe-rtp-005.cisco.com (64.101.210.235) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.15; Tue, 31 Aug 2021 16:22:09 -0400
Received: from NAM12-BN8-obe.outbound.protection.outlook.com (173.37.151.57) by xfe-aln-002.cisco.com (173.37.135.122) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.15 via Frontend Transport; Tue, 31 Aug 2021 15:22:09 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=fhZKrQZtbaJ7NUe3EYCGKsa9rn56Ukly+tez7Vcp6l9ZkBZ3KSovtsgIvnjvwmETAKwjysCrif7+ikw4qLvWFms9xfVTDxGhlFKcbmZ0t1vrVuKWv6epPNvD1I6RQcXBu/7jA2q3nt1lV+SQMHv0mhkLuDNrarUQdQh5Os64ak/HqYrnW9nhauB32NixXTcjvcMacY5aXCEPoxldI4He1Mf4yYhyC0h+KIAavD0L+PWPfTpgsVlmGnEXlYPu6tuGNzzHQKgcFP0deYwZSCSrovZh68ErphgHvYUKvz/CfwhJpaDJQ2KVF+C2xW+PCObPJqDdca2bTPs1I6T3No49Vw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=ZB7LofRCKCnOUAV4810sunD5eF6ywzOd8MElWzAqaaU=; b=F06Sn01xjCYFXqoRKb0hWfl8IkeeFXVMYUSSkbz79JA/CErgKYfDGqrIxZga5LyAWYSIuBmoiSYrR+d0RuDhbkX91/VxG8W2/L3Ygr5PED6fSSjdOSPz36Ppc7uvYPgj4HQIytIzwG+p59G9Z/PH/lzsrPMs0h2XgkR4rwT3+9lz9jAfid9izQwEz1ggp9VO4t6CEz5ft5RulEYRVngT68C2FNSg0j3DY7kKGGeElKU0eMhCxKR+jYi/VFPwnE2tIFfaH5TsBq1C6BojZ1611BYq9BVz/6WGZ/yETEf8zYyAH2XHhkSC+Qg86FjOz696Bz6V97I57Zmbao1LeLvLzw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=ZB7LofRCKCnOUAV4810sunD5eF6ywzOd8MElWzAqaaU=; b=oXf3uF35GPya3OnK7l2HqyeScJIQLXaDSAhA8CcL6KU+X0LRCVSZFlHIBrAJYr3/uSDOyY6wm6Ry7G56QJ6uGB64RREh+FbetGAtoKjG+Iya7xvFm+/vcMc4qOXpvQDX4l4xTHaV8MvkZ5FKEyfeqmXfkPz4VMfUvZWa0hjqESM=
Received: from BL3PR11MB5732.namprd11.prod.outlook.com (2603:10b6:208:353::14) by MN2PR11MB4629.namprd11.prod.outlook.com (2603:10b6:208:264::9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4457.20; Tue, 31 Aug 2021 20:22:08 +0000
Received: from BL3PR11MB5732.namprd11.prod.outlook.com ([fe80::1c1c:533d:ef59:5fed]) by BL3PR11MB5732.namprd11.prod.outlook.com ([fe80::1c1c:533d:ef59:5fed%4]) with mapi id 15.20.4457.024; Tue, 31 Aug 2021 20:22:08 +0000
From: "Nagendra Kumar Nainar (naikumar)" <naikumar@cisco.com>
To: Tero Kivinen <kivinen@iki.fi>, "secdir@ietf.org" <secdir@ietf.org>
CC: "draft-ietf-mpls-lsp-ping-ospfv3-codepoint.all@ietf.org" <draft-ietf-mpls-lsp-ping-ospfv3-codepoint.all@ietf.org>, "last-call@ietf.org" <last-call@ietf.org>, "mpls@ietf.org" <mpls@ietf.org>
Thread-Topic: Secdir last call review of draft-ietf-mpls-lsp-ping-ospfv3-codepoint-04
Thread-Index: AQHXXgPKnSgH5QomtUKAK8yBTGMG8auOj2PO
Date: Tue, 31 Aug 2021 20:22:07 +0000
Message-ID: <BL3PR11MB5732F1592884274961E7B268C6CC9@BL3PR11MB5732.namprd11.prod.outlook.com>
References: <162333482591.8235.4418205938937483332@ietfa.amsl.com>
In-Reply-To: <162333482591.8235.4418205938937483332@ietfa.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: iki.fi; dkim=none (message not signed) header.d=none;iki.fi; dmarc=none action=none header.from=cisco.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 7b609bb8-9caf-4769-dff5-08d96cbd0196
x-ms-traffictypediagnostic: MN2PR11MB4629:
x-microsoft-antispam-prvs: <MN2PR11MB46296A1A13A1EB298D551A2BC6CC9@MN2PR11MB4629.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BL3PR11MB5732.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(376002)(39860400002)(136003)(396003)(366004)(346002)(9686003)(66556008)(55016002)(33656002)(8676002)(66446008)(186003)(66476007)(66946007)(76116006)(38070700005)(26005)(54906003)(8936002)(4326008)(38100700002)(122000001)(6506007)(7696005)(71200400001)(5660300002)(2906002)(9326002)(110136005)(53546011)(166002)(86362001)(83380400001)(478600001)(316002)(52536014)(64756008); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?Windows-1252?Q?lUAUSh5g+UMiVktfYD0Fx8Aau2sVvR35FZjTXcr6iIbV7oBJrJwu7416?= =?Windows-1252?Q?7xYeaKbE/fxRFSI9XJCETsQqHzFd03k12y9yb35k6gDu2oe0o4Z6AOC6?= =?Windows-1252?Q?I3RE4xyq1Rd112iE8UIEzgtSlBu0QGqfIAqHO1vvtd6aaSVbQ2j7h9Qx?= =?Windows-1252?Q?P1fujql4YshK4H8oiJ+lh0WAp124Ffy2rSvunTl4mMzvDDwogJ+9C3PG?= =?Windows-1252?Q?xU51zKFbw/L22eKXEXMxZKN4NO21E1ObvI55cS6UmHSbBG0iucV5dOzG?= =?Windows-1252?Q?/xheVvfzfRPJe29VjjIDnNqOs/EmN7KaIrRhavkoRVVRgzBIVFCIKhzE?= =?Windows-1252?Q?e6i70u4JwIDG5RzPRmNVvBTAbFHnSiUVEbthDejkox2oT1LufyZVw/XQ?= =?Windows-1252?Q?0z4lRCfcfeMvKgXREwH53jIdV2uoYXq5q/fYfMStVORS2jweGo2nqr98?= =?Windows-1252?Q?9vSPfA5UcDslOPvzxGN1c30D3oWEMIY+CKQebzzDABcASbg7lw15a6mF?= =?Windows-1252?Q?ho7it0kVCqeBL0ifC9YQPkkZVV7JyedLcDdnAL8OAgSJtb+RLLw6mcBd?= =?Windows-1252?Q?vwlj79oRm0Mi7bTGPxODsJrq5Hyw7WTaKgCWBq3C2wTF7/B+K9CzJaRW?= =?Windows-1252?Q?fZMGvOfCu9QLiaY/GeXoWCDdzRqZnvD1McGuRU4wqqX5Wvg+hcG8lffT?= =?Windows-1252?Q?AeQiAdzLLlB00fMWwpXuAR/7+l7s6QpgVBrPnDH0yaNglMkU8COSF9qS?= =?Windows-1252?Q?A/XeePltagJooHLhM/juPO5hmfj0Q6QrzJzLBOi0JL6Vs1d2DbVEFK11?= =?Windows-1252?Q?zJTXUA3WMooutjLEokubI7wnjgaZam9n/+KKtVUleQXKNsydzO1sQwy/?= =?Windows-1252?Q?tzVwfuy7aG3GSnz5TwOC5XFLkyJNZpUA1catCiwWnD0S4WZ2RLeKCFgI?= =?Windows-1252?Q?ZRf/RVbjLbknAQq0OGTYC3Dxgb9mfXcSWgbXmMrR6JGu51xZPhq+gMyb?= =?Windows-1252?Q?2+ro7itQ7OktrLnYgfgNFMB5zvciHv2xIa9cqP0U0DODEDvVApzubN+G?= =?Windows-1252?Q?xMWfBvGc7JEtl4pXNCITqaQmaCx7fuAiLIX4DaF0n0Pw6432arKkQBvM?= =?Windows-1252?Q?9mnBhdmXKrwkhaiGz3X+Bnp7TblwJno6VlJ36lGSBOKwdNNx2bPJCIV1?= =?Windows-1252?Q?Rr9uJlpnU7VHwJdTLk+O6LRPrYWj0s+T6w002CdpVY/yvHj8yJm1Yv4h?= =?Windows-1252?Q?sfEcUme9aH5plfB80FVgrUKJ4GVUYmleg3m6lxCrVgANaiXhOvhDFzQ8?= =?Windows-1252?Q?vBTBoIyQuETs6vsLZI6ves0TssW7XzAhgIfZ8mhIF8BDKZiPz25E2Znc?= =?Windows-1252?Q?MO7o3eeZHSR6BYTMu93ZoZ7hKRV4AjANLgPdNT211qynbeGKo+AH3uxw?= =?Windows-1252?Q?wrXT9YBYDnXE7uc2nYoI1g=3D=3D?=
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_BL3PR11MB5732F1592884274961E7B268C6CC9BL3PR11MB5732namp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BL3PR11MB5732.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 7b609bb8-9caf-4769-dff5-08d96cbd0196
X-MS-Exchange-CrossTenant-originalarrivaltime: 31 Aug 2021 20:22:07.8898 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: G8MHaxqMfWgclXF8jJgQit566JwWLTWM0JjkYrrHM+q/44QZ2mfE+vorqX5z9pLgdics38XWh48tQyxDX5hSWA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR11MB4629
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.22, xbe-rcd-007.cisco.com
X-Outbound-Node: rcdn-core-5.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/BNSMBgSXZ76BwbVoN55anu3XPrc>
Subject: Re: [secdir] Secdir last call review of draft-ietf-mpls-lsp-ping-ospfv3-codepoint-04
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 31 Aug 2021 20:22:18 -0000

Hi Tero,

Thank you for the detailed review and apologies for the very late response. I was between responsibility change and took some time to change up.

Please see below for the response.


The security considerations section just says:

   This document updates [RFC8287] and does not introduce any additional
   security considerations.

And I am not completely sure if that is true, if this document really allows using
IPv6 when it was not possible before. Quite often having multiple address families do
cause new security considerations too.
<Authors> This draft only introduces the codepoint to indicate the protocol is OSPFv3. What to do when the protocol is OSPFv3 is defined in RFC8287. So we believe that this draft doesn’t introduce any new semantics/actions.
Also RFC8287 refers to the RFC8029 for its
security considerations, so perhaps direct reference to RFC8029 would be needed here.
<Authors> Ok. We can clarify that in the section as below:



“This document updates [RFC8287<https://datatracker.ietf.org/doc/html/rfc8287>]7>], [RFC8029] and does not introduce any additional

   security considerations.
“
Please let us know if the above is fine.

There are several acronyms which are not expanded on their first use (including
in title, and in abstract). Examples of such are IS, TLV, OSPF, IS+IS, IGP, SUb-TLV (is the
spelling correct in abstract with uppercase u?),  FEC.
<Authors> “Protocol in the Segment ID Sub-TLV” is the IANA registry name and I am not sure if we should try expanding it. For clarity, we will expand the rest. Let us know if that solves the concern.

The use of just RFC numbers in reference format makes the document hard to read
as not everybody remembers what RFC is RFC number 8287, 8402 etc. It would be
much nicer to at least on the first time use the format where the text refers to RFC
with title or similar and just has the reference in parenthesis, i.e.:

   RFC5340 "OSPF for IPv6" ([RFC5340]) describes OSPF version 3 (OSPFv3) to
   support IPv6. RFC5838 "Support of Address Families in OSPFv3" ([RFC5838])
   describes the mechanism to support multiple address families (AFs) in OSPFv3.
   Accordingly, OSPFv3 may be used to advertise IPv6 and IPv4 prefixes.


is easier for reader than current format:

   [RFC5340] describes OSPF version 3 (OSPFv3) to support IPv6.
   [RFC5838] describes the mechanism to support multiple address
   families (AFs) in OSPFv3. Accordingly, OSPFv3 may be used to
   advertise IPv6 and IPv4 prefixes.


<Authors> The use of RFC number alone as the reference is a common use AFAIK and we feel that it is not specific to this document. But we don’t want that to be a hurdle to move this document forward and if the consensus is to include the RFC document name, we are ok.

Or, as the rfc title tells what the RFC is about you do not need to explain it that much
you can simply say:

   RFC5340 "OSPF for IPv6" ([RFC5340]) describes OSPF version 3 (OSPFv3) and
   RFC5838 "Support of Address Families in OSPFv3" ([RFC5838])
   describes how OSPFv3 may be used to advertise IPv6 and IPv4 prefixes.

Also someone who is not at all familiar with this it is bit hard to know what are
Type 34, 35, and 36 in Segment Id Sub-TLV registry.


<Authors> Ok. We will expand the same.

As a personal note, I have never liked to just use the reference inside text
(for example "This document updates [RFC8287] ...") as in case the RFC
rendering engine decides to render references in some other way than just
text with [] around it, the text might get unreadable (For example it replaces the
text inside [] with number or footnote or similar). Thats why I myself usually
want to write those either as "This document updates RFC8287 ([RFC8287])..." or
even "This document updates RFC8287..." as RFC8287 is referenced so many times
in the document that there is no need to make each instance a reference. But this
is just my personal view, and authors might have different views...


<Authors> Thank you for the comment. We will leave it as it is for now and if others believe it needs to be changed, we can look into it.
Once again, thanks a lot for the great comments.
Regards,
Nagendra (on behalf of the authors)





From: Tero Kivinen via Datatracker <noreply@ietf.org>
Date: Thursday, June 10, 2021 at 10:20 AM
To: secdir@ietf.org <secdir@ietf.org>
Cc: draft-ietf-mpls-lsp-ping-ospfv3-codepoint.all@ietf.org <draft-ietf-mpls-lsp-ping-ospfv3-codepoint.all@ietf.org>rg>, last-call@ietf.org <last-call@ietf.org>rg>, mpls@ietf.org <mpls@ietf.org>
Subject: Secdir last call review of draft-ietf-mpls-lsp-ping-ospfv3-codepoint-04
Reviewer: Tero Kivinen
Review result: Has Nits

I have reviewed this document as part of the security directorate's
ongoing effort to review all IETF documents being processed by the
IESG.  These comments were written primarily for the benefit of the
security area directors.  Document editors and WG chairs should treat
these comments just like any other last call comments.

This document allocates a code point for OSPFv3 for MPLS LSP Ping and
updates previous allocation to only cover OSPFv2. It also defines
behavior when using IPv6 with OSPv3.

This document is quite short but hard to ready because of heavy use of acronyms
and just referencing code points with numbers and same with RFCs.

The security considerations section just says:

   This document updates [RFC8287] and does not introduce any additional
   security considerations.

And I am not completely sure if that is true, if this document really allows using
IPv6 when it was not possible before. Quite often having multiple address families do
cause new security considerations too. Also RFC8287 refers to the RFC8029 for its
security considerations, so perhaps direct reference to RFC8029 would be needed here.

There are several acronyms which are not expanded on their first use (including
in title, and in abstract). Examples of such are IS, TLV, OSPF, IS+IS, IGP, SUb-TLV (is the
spelling correct in abstract with uppercase u?),  FEC.

The use of just RFC numbers in reference format makes the document hard to read
as not everybody remembers what RFC is RFC number 8287, 8402 etc. It would be
much nicer to at least on the first time use the format where the text refers to RFC
with title or similar and just has the reference in parenthesis, i.e.:

   RFC5340 "OSPF for IPv6" ([RFC5340]) describes OSPF version 3 (OSPFv3) to
   support IPv6. RFC5838 "Support of Address Families in OSPFv3" ([RFC5838])
   describes the mechanism to support multiple address families (AFs) in OSPFv3.
   Accordingly, OSPFv3 may be used to advertise IPv6 and IPv4 prefixes.


is easier for reader than current format:

   [RFC5340] describes OSPF version 3 (OSPFv3) to support IPv6.
   [RFC5838] describes the mechanism to support multiple address
   families (AFs) in OSPFv3. Accordingly, OSPFv3 may be used to
   advertise IPv6 and IPv4 prefixes.

Or, as the rfc title tells what the RFC is about you do not need to explain it that much
you can simply say:

   RFC5340 "OSPF for IPv6" ([RFC5340]) describes OSPF version 3 (OSPFv3) and
   RFC5838 "Support of Address Families in OSPFv3" ([RFC5838])
   describes how OSPFv3 may be used to advertise IPv6 and IPv4 prefixes.

Also someone who is not at all familiar with this it is bit hard to know what are
Type 34, 35, and 36 in Segment Id Sub-TLV registry.

As a personal note, I have never liked to just use the reference inside text
(for example "This document updates [RFC8287] ...") as in case the RFC
rendering engine decides to render references in some other way than just
text with [] around it, the text might get unreadable (For example it replaces the
text inside [] with number or footnote or similar). Thats why I myself usually
want to write those either as "This document updates RFC8287 ([RFC8287])..." or
even "This document updates RFC8287..." as RFC8287 is referenced so many times
in the document that there is no need to make each instance a reference. But this
is just my personal view, and authors might have different views...