Skip to main content

Management of Networks with Constrained Devices: Use Cases
draft-ietf-opsawg-coman-use-cases-05

Yes

(Joel Jaeggli)

No Objection

(Adrian Farrel)
(Jari Arkko)
(Spencer Dawkins)

Note: This ballot was opened for revision 04 and is now closed.

Joel Jaeggli Former IESG member
Yes
Yes (for -04) Unknown

                            
Adrian Farrel Former IESG member
No Objection
No Objection (for -04) Unknown

                            
Jari Arkko Former IESG member
No Objection
No Objection (for -04) Unknown

                            
Kathleen Moriarty Former IESG member
(was Discuss) No Objection
No Objection (2015-03-01) Unknown
Thank you for adding in the text on safety and security considerations for the use cases.
Martin Stiemerling Former IESG member
No Objection
No Objection (2015-02-17 for -04) Unknown
The write-up says something about additional reviews. Does this include reviews by an outside party of the IETF that, for instance, an entity that operates building automation systems?
Spencer Dawkins Former IESG member
No Objection
No Objection (for -04) Unknown

                            
Ted Lemon Former IESG member
(was Discuss) No Objection
No Objection (2015-02-19 for -04) Unknown
I'm dropping my DISCUSS since Kathleen raised the same point with a lot more detail than I did.   FTR, I support Kathleen's DISCUSS.   Here is the text of my former DISCUSS:

I was surprised to see no mention of the specific security requirements of the various use cases described here.   E.g., the medical use case makes no mention at all of security.   While in general security is required in all cases, I think there are differences in the level of security that is required for the various use cases described here, and I wonder if the authors considered this, and if so, why it wasn't mentioned.

I don't necessarily want to delay the document's publication pending a resolution to this issue, but I'd like to have a quick discussion about it.