[secdir] Secdir last call review of draft-ietf-lsr-isis-invalid-tlv-02

Leif Johansson via Datatracker <noreply@ietf.org> Mon, 13 July 2020 20:54 UTC

Return-Path: <noreply@ietf.org>
X-Original-To: secdir@ietf.org
Delivered-To: secdir@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 78F3F3A09B1; Mon, 13 Jul 2020 13:54:37 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: Leif Johansson via Datatracker <noreply@ietf.org>
To: secdir@ietf.org
Cc: last-call@ietf.org, lsr@ietf.org, draft-ietf-lsr-isis-invalid-tlv.all@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 7.8.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <159467367745.10834.16297254494468289081@ietfa.amsl.com>
Reply-To: Leif Johansson <leifj@sunet.se>
Date: Mon, 13 Jul 2020 13:54:37 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/O81Wf1GCoPk4kUQqTbg3g3LyF6E>
Subject: [secdir] Secdir last call review of draft-ietf-lsr-isis-invalid-tlv-02
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.29
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 13 Jul 2020 20:54:41 -0000

Reviewer: Leif Johansson
Review result: Ready

I have reviewed this document as part of the security directorate's 
ongoing effort to review all IETF documents being processed by the 
IESG.  These comments were written primarily for the benefit of the 
security area directors.  Document editors and WG chairs should treat 
these comments just like any other last call comments.

The subject matter is outside my area of expertise but addressing the 
obvious attack vector related to authenticated purge messages seems
like a good catch. 

The document is well written and clearly describes what registries
and documents are updated.