[secdir] Secdir last call review of draft-ietf-ipsecme-split-dns-12

Stefan Santesson <stefan@aaa-sec.com> Sun, 19 August 2018 17:59 UTC

Return-Path: <stefan@aaa-sec.com>
X-Original-To: secdir@ietf.org
Delivered-To: secdir@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 63C39130E91; Sun, 19 Aug 2018 10:59:35 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: Stefan Santesson <stefan@aaa-sec.com>
To: secdir@ietf.org
Cc: ipsec@ietf.org, draft-ietf-ipsecme-split-dns.all@ietf.org, ietf@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.83.1
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <153470157533.21344.975291793985145087@ietfa.amsl.com>
Date: Sun, 19 Aug 2018 10:59:35 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/UR89OiOxJgCAXY2zdz88n3saHkY>
Subject: [secdir] Secdir last call review of draft-ietf-ipsecme-split-dns-12
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.27
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 19 Aug 2018 17:59:36 -0000

Reviewer: Stefan Santesson
Review result: Has Nits

In agreement with nit comments in the Gen-Art review.

1) Section 2. Background seems to be a duplication with the introduction
section and could probably be merged with this section.

2) In general I wander wether the requirement level "SHOULD" is to week in some
places. The concern (and question) here is whether this may lead to uncertainty
whether a Split-DNS configuration always will provide the expected level of
security (or fail), or wether such configuration may lead to successful
communication without the expected level of security ( in compliance with this
specification).