Summary: Has enough positions to pass.
sorry we came to some comclusions on the basis of late review that make this hard to advance without correcting. this will be withdrawn from this review cycle.
Nit: s/This specification defines the values from zero (0) to five (5)/This specification defines the values from zero (0) to six (6)/
+1 to Katleen's comment about optional data channel protection. In 3.3. IEEE 802.11 WTP Alternate Tunnel Failure Indication Length == 4, but should it be >4 due to IPv4/IPv6 address at the end?
I'm surprised to see security is optional and an assertion that RFCs published in 2009 covers everything. Threats have evolved since then. In looking at RFC5415, Section 12.1, I see: Within CAPWAP, DTLS is used to secure the link between the WTP and AC. In addition to securing control messages, it's also a link in this chain of trust for establishing link layer keys. Consequently, much rests on the security of DTLS. In some CAPWAP deployment scenarios, there are two channels between the WTP and AC: the control channel, carrying CAPWAP Control messages, and the data channel, over which client data packets are tunneled between the AC and WTP. Typically, the control channel is secured by DTLS, while the data channel is not. The use of parallel protected and unprotected channels deserves special consideration, but does not create a threat. There are two potential concerns: attempting to convert protected data into unprotected data and attempting to convert un-protected data into protected data. These concerns are addressed below. Wouldn't interception and tampering of that traffic pose a threat? How about gaining access to the control channel? While I don't think this is the right draft to make changes for RFC5415, I don't think it's adequate to say the control channel is optional for encryption. I could see how the data might be handled elsewhere. The description discusses this as talking to hundreds of thousands of access points, isn't that access a threat? This draft allows for additional encapsulation methods, we could require encryption for these new encapsulation methods. This should probably be a discuss, so I would appreciate some discussion on this to see if we have option here or if something will change in the referenced RFCs soon. Thank you.