Skip to main content

LDP 'Typed Wildcard' Forwarding Equivalence Class (FEC) for PWid and Generalized PWid FEC Elements
draft-ietf-pwe3-pw-typed-wc-fec-03

Yes

(Stewart Bryant)

No Objection

(Barry Leiba)
(Benoît Claise)
(Brian Haberman)
(Gonzalo Camarillo)
(Pete Resnick)
(Ralph Droms)
(Robert Sparks)
(Ron Bonica)
(Russ Housley)
(Wesley Eddy)

Note: This ballot was opened for revision 03 and is now closed.

(Adrian Farrel; former steering group member) Yes

Yes (2012-04-12)
Thanks for a well-written document.

(Stewart Bryant; former steering group member) Yes

Yes ()

                            

(Barry Leiba; former steering group member) No Objection

No Objection ()

                            

(Benoît Claise; former steering group member) No Objection

No Objection ()

                            

(Brian Haberman; former steering group member) No Objection

No Objection ()

                            

(Gonzalo Camarillo; former steering group member) No Objection

No Objection ()

                            

(Pete Resnick; former steering group member) No Objection

No Objection ()

                            

(Ralph Droms; former steering group member) No Objection

No Objection ()

                            

(Robert Sparks; former steering group member) No Objection

No Objection ()

                            

(Ron Bonica; former steering group member) No Objection

No Objection ()

                            

(Russ Housley; former steering group member) No Objection

No Objection ()

                            

(Sean Turner; former steering group member) No Objection

No Objection (2012-04-09)
ONly a nit:

S2: R bit: r/Must/MUST

(Stephen Farrell; former steering group member) No Objection

No Objection (2012-04-10)
I'm not sure if there are really no new security
considerations here, but the difference may be relatively
minor, (given how I understand these protocols are used, i.e.
without any cryptographic authentication;-).  

Anyway, my questions:

Which of the RFCs referred to in section 5 calls out that
sending a spoofed wildcard message will have a bigger
impact for lower cost for an attacker?  

Could it also be the case that an attacker able to inject one
of these needs less information about the network to cause
the same amount of damage compared to an attacker who could
not send a wildcard message?

(Wesley Eddy; former steering group member) No Objection

No Objection ()