Last Call Review of draft-ietf-avtcore-monarch-
review-ietf-avtcore-monarch-secdir-lc-tsou-2012-08-10-00
Request | Review of | draft-ietf-avtcore-monarch |
---|---|---|
Requested revision | No specific revision (document currently at 22) | |
Type | Last Call Review | |
Team | Security Area Directorate (secdir) | |
Deadline | 2012-08-02 | |
Requested | 2012-07-21 | |
Authors | Qin Wu , Geoff Hunt , Philip Arden | |
I-D last updated | 2012-08-10 | |
Completed reviews |
Genart Last Call review of -17
by Meral Shirazipour
(diff)
Genart Telechat review of -18 by Meral Shirazipour (diff) Secdir Last Call review of -?? by Tina Tsou (Ting ZOU) Secdir Telechat review of -?? by Tina Tsou (Ting ZOU) |
|
Assignment | Reviewer | Tina Tsou (Ting ZOU) |
State | Completed | |
Request | Last Call review on draft-ietf-avtcore-monarch by Security Area Directorate Assigned | |
Result | Ready w/issues | |
Completed | 2012-08-10 |
review-ietf-avtcore-monarch-secdir-lc-tsou-2012-08-10-00
Hello, I have reviewed this document as part of the security directorate's ongoing effort to review all IETF documents being processed by the IESG. These comments were written primarily for the benefit of the security area directors. Document editors and WG chairs should treat these comments just like any other last call comments. Draft-ietf-avtcore-monarch-17 as a whole provides useful advice. There are a number of editorial nits that will be provided to the authors in a separate E-mail. Unfortunately, the Security Considerations section fails to appreciate both the more nuanced view and the contradiction exhibited by the same section of RFC 3611, to which it refers. On the one hand, the measurements reported in XR blocks could be sensitive and one might wish to provide them with confidentiality. On the other hand, intermediate parties may have legitimate reasons to view the measurements, so that end-to-end encryption is not always desirable. It would be helpful for this document to discuss the trust models that might be encountered in operation, and how confidentiality and authorized usage could co-exist within these models. Of course, it may be legitimate to conclude that under some circumstances such coexistence may be impossible, and local policy may therefore be either to suppress the measurements or accept the consequences of their disclosure. Tina