Skip to main content

LDP 'Typed Wildcard' Forwarding Equivalence Class (FEC) for PWid and Generalized PWid FEC Elements
draft-ietf-pwe3-pw-typed-wc-fec-03

Yes

(Stewart Bryant)

No Objection

(Barry Leiba)
(Benoît Claise)
(Brian Haberman)
(Gonzalo Camarillo)
(Pete Resnick)
(Ralph Droms)
(Robert Sparks)
(Ron Bonica)
(Russ Housley)
(Wesley Eddy)

Note: This ballot was opened for revision 03 and is now closed.

Adrian Farrel Former IESG member
Yes
Yes (2012-04-12) Unknown
Thanks for a well-written document.
Stewart Bryant Former IESG member
Yes
Yes () Unknown

                            
Barry Leiba Former IESG member
No Objection
No Objection () Unknown

                            
Benoît Claise Former IESG member
No Objection
No Objection () Unknown

                            
Brian Haberman Former IESG member
No Objection
No Objection () Unknown

                            
Gonzalo Camarillo Former IESG member
No Objection
No Objection () Unknown

                            
Pete Resnick Former IESG member
No Objection
No Objection () Unknown

                            
Ralph Droms Former IESG member
No Objection
No Objection () Unknown

                            
Robert Sparks Former IESG member
No Objection
No Objection () Unknown

                            
Ron Bonica Former IESG member
No Objection
No Objection () Unknown

                            
Russ Housley Former IESG member
No Objection
No Objection () Unknown

                            
Sean Turner Former IESG member
No Objection
No Objection (2012-04-09) Unknown
ONly a nit:

S2: R bit: r/Must/MUST
Stephen Farrell Former IESG member
No Objection
No Objection (2012-04-10) Unknown
I'm not sure if there are really no new security
considerations here, but the difference may be relatively
minor, (given how I understand these protocols are used, i.e.
without any cryptographic authentication;-).  

Anyway, my questions:

Which of the RFCs referred to in section 5 calls out that
sending a spoofed wildcard message will have a bigger
impact for lower cost for an attacker?  

Could it also be the case that an attacker able to inject one
of these needs less information about the network to cause
the same amount of damage compared to an attacker who could
not send a wildcard message?
Wesley Eddy Former IESG member
No Objection
No Objection () Unknown