[secdir] Secdir last call review of draft-ietf-bess-dci-evpn-overlay-08

Tero Kivinen <kivinen@iki.fi> Fri, 09 February 2018 07:51 UTC

Return-Path: <kivinen@iki.fi>
X-Original-To: secdir@ietf.org
Delivered-To: secdir@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 03885129511; Thu, 8 Feb 2018 23:51:15 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: Tero Kivinen <kivinen@iki.fi>
To: <secdir@ietf.org>
Cc: ietf@ietf.org, draft-ietf-bess-dci-evpn-overlay.all@ietf.org, bess@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.72.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <151816267496.1260.17184693315315179259@ietfa.amsl.com>
Date: Thu, 08 Feb 2018 23:51:15 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/Ynjh-60-tkGqUU_A2zRYzMidQ_8>
Subject: [secdir] Secdir last call review of draft-ietf-bess-dci-evpn-overlay-08
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.22
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 09 Feb 2018 07:51:15 -0000

Reviewer: Tero Kivinen
Review result: Ready

I have reviewed this document as part of the security directorate's
ongoing effort to review all IETF documents being processed by the
IESG.  These comments were written primarily for the benefit of the
security area directors.  Document editors and WG chairs should treat
these comments just like any other last call comments.

This document describes how Network Virtualization Overlays (NVO) can 
be connected to a Wide Area Network (WAN) in order to extend the
layer-2 connectivity required for some tenants.

The security considerations section refers to several other documents
describing other technologies (RFC7432], [EVPN-Overlays], [RFC7623], 
[RFC4761] and [RFC4762]) and continues to describe that the "DCI using
GWs" method covered by this document is more secure than the other
 method "DCI using ASBRs".