Re: [secdir] SECDIR review of draft-hui-6man-rpl-routing-header

David Culler <culler@EECS.Berkeley.EDU> Thu, 03 November 2011 16:10 UTC

Return-Path: <culler@EECS.Berkeley.EDU>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4EBDD1F0C7C; Thu, 3 Nov 2011 09:10:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level:
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fhiqRj0fgEBi; Thu, 3 Nov 2011 09:10:20 -0700 (PDT)
Received: from gateway0.EECS.Berkeley.EDU (gateway0.EECS.Berkeley.EDU [169.229.60.87]) by ietfa.amsl.com (Postfix) with ESMTP id 8DCF921F8D25; Thu, 3 Nov 2011 09:10:20 -0700 (PDT)
Received: from [192.168.43.97] (mobile-166-190-135-213.mycingular.net [166.190.135.213] (may be forged)) (authenticated bits=0) by gateway0.EECS.Berkeley.EDU (8.14.5/8.13.5) with ESMTP id pA3GA747018752 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NOT); Thu, 3 Nov 2011 09:10:10 -0700 (PDT)
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: text/plain; charset="us-ascii"
From: David Culler <culler@EECS.Berkeley.EDU>
In-Reply-To: <Pine.GSO.4.63.1111021538130.13427@sjc-cde-021.cisco.com>
Date: Thu, 03 Nov 2011 09:10:07 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <FA77E010-E2D2-46FB-94AD-D53D3AE89CA0@EECS.Berkeley.EDU>
References: <Pine.GSO.4.63.1111021538130.13427@sjc-cde-021.cisco.com>
To: Chris Lonvick <clonvick@cisco.com>
X-Mailer: Apple Mail (2.1084)
X-Mailman-Approved-At: Thu, 03 Nov 2011 09:28:55 -0700
Cc: draft-hui-6man-rpl-routing-header.all@tools.ietf.org, iesg@ietf.org, secdir@ietf.org
Subject: Re: [secdir] SECDIR review of draft-hui-6man-rpl-routing-header
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 03 Nov 2011 16:10:22 -0000

Chris,
   Thanks very much.  It should be natural to address these comments.

D.




On Nov 2, 2011, at 4:16 PM, Chris Lonvick wrote:

> Hi,
> 
> I have reviewed this document as part of the security directorate's
> ongoing effort to review all IETF documents being processed by the
> IESG.  These comments were written primarily for the benefit of the
> security area directors.  Document editors and WG chairs should treat
> these comments just like any other last call comments.
> 
> I havn't seen source routing in a long time so I had to wrap my head around that again.  I tried working through some examples on how this would work for verious network conditions, but gave up before my head started hurting.  :)
> 
> Overall, it looks like the security concerns are addressed in the document.
> 
> I do have some minor nits that the authors may wish to discuss.
> 
> 1. I don't think that the following sentence in Section 6.1 is needed:
>   "Furthermore, it is RECOMMENDED that non-RPL
>   routers and firewalls drop packets with a SRH by default."
> That is already discussed in RFC 5095.  Having it here is therefore redundant.
> 
> 2. I'm not sure that I am correctly following all of your pseudocode in Section 4.2.  In most places it looks like separate instructions within curly braces are separated by blank lines.  From that, I'm not sure of what is meant by a semicolon in the following:
>       else {
>          decrement Segments Left by 1;
>          compute i, the index of the next address to be visited in
>          the address vector, by subtracting Segments Left from n
> 
>          if Address[i] or the IPv6 Destination Address is multicast {
>             discard the packet
>          }
> 
> Hope this helps,
> Chris