[Teas] Secdir last call review of draft-ietf-teas-rfc3272bis-24
Shawn Emery via Datatracker <noreply@ietf.org> Sun, 09 July 2023 05:37 UTC
Return-Path: <noreply@ietf.org>
X-Original-To: teas@ietf.org
Delivered-To: teas@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id DA881C15198E; Sat, 8 Jul 2023 22:37:10 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: Shawn Emery via Datatracker <noreply@ietf.org>
To: secdir@ietf.org
Cc: draft-ietf-teas-rfc3272bis.all@ietf.org, last-call@ietf.org, teas@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 11.4.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <168888103088.52836.7750865099878917689@ietfa.amsl.com>
Reply-To: Shawn Emery <shawn.emery@gmail.com>
Date: Sat, 08 Jul 2023 22:37:10 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/teas/gaE5dXEEsnfiJF08irSmI_j0td4>
Subject: [Teas] Secdir last call review of draft-ietf-teas-rfc3272bis-24
X-BeenThere: teas@ietf.org
X-Mailman-Version: 2.1.39
List-Id: Traffic Engineering Architecture and Signaling working group discussion list <teas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teas>, <mailto:teas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teas/>
List-Post: <mailto:teas@ietf.org>
List-Help: <mailto:teas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teas>, <mailto:teas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 09 Jul 2023 05:37:11 -0000
Reviewer: Shawn Emery Review result: Has Nits This informational track draft provides an up-to-date description of common Internet traffic engineering concepts from the original RFC which was published in 2002. The security considerations section does exit and states that this draft doesn't introduce any new security issues, which I agree. The section discusses the implications of when an attacker does compromise the control and management protocols of TE networks. This could lead to the adversary diverting traffic to nodes controlled by the attacker, in which case the privacy of the transmitted data can be compromised. The traffic could also be sent to the wrong place or slower network in order to perform a DoS of the affected traffic. The document doesn't prescribe mitigating steps for said attacks. I find this appropriate given the intent of this draft, which is to describe a compilation of protocols. General comments: A well written and comprehensive document, however I mainly focused on the changes from RFC 3272 to this draft. Thank you for Appendix A. Editorial comments: s/example operating/example of operating/ s/Exampls/Examples/ s/netrok/network/ s/conforma/conforms/ s/determination of/determined by/ s/is conformed with for/conforms with/ s/enters a/enters/
- [Teas] Secdir last call review of draft-ietf-teas… Shawn Emery via Datatracker
- Re: [Teas] Secdir last call review of draft-ietf-… Adrian Farrel