[secdir] Secdir telechat review of draft-wu-l3sm-rfc8049bis-09

Rifaat Shekh-Yusef <rifaat.ietf@gmail.com> Mon, 27 November 2017 21:38 UTC

Return-Path: <rifaat.ietf@gmail.com>
X-Original-To: secdir@ietf.org
Delivered-To: secdir@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 6E6A712702E; Mon, 27 Nov 2017 13:38:20 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
To: secdir@ietf.org
Cc: ietf@ietf.org, draft-wu-l3sm-rfc8049bis.all@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.66.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <151181870041.30959.17144962798564184590@ietfa.amsl.com>
Date: Mon, 27 Nov 2017 13:38:20 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/jDzvq6lWnAWnaDjs_1IsmHocRLI>
Subject: [secdir] Secdir telechat review of draft-wu-l3sm-rfc8049bis-09
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.22
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 27 Nov 2017 21:38:21 -0000

Reviewer: Rifaat Shekh-Yusef
Review result: Ready

I have reviewed this document as part of the security directorate's
ongoing effort to review all IETF documents being processed by the
IESG.  These comments were written primarily for the benefit of the
security area directors.  Document editors and WG chairs should treat
these comments just like any other last call comments.

The document defines a YANG data model that defines service configuration
elements that can be used in communication protocols between customers
and network operators. Those elements can also be used as input to
automated control and configuration applications.

The authors addressed my comments on version -05 of the document.
I have not further comments on this version of the draft.

Regards.
 Rifaat