Skip to main content

IETF Last Call Review of draft-ietf-bmwg-mlrsearch-11
review-ietf-bmwg-mlrsearch-11-secdir-lc-emery-2025-07-19-00

Request Review of draft-ietf-bmwg-mlrsearch
Requested revision No specific revision (document currently at 15)
Type IETF Last Call Review
Team Security Area Directorate (secdir)
Deadline 2025-08-06
Requested 2025-07-16
Authors Maciek Konstantynowicz , Vratko Polák
I-D last updated 2025-11-05 (Latest revision 2025-11-04)
Completed reviews Genart IETF Last Call review of -11 by Lars Eggert (diff)
Secdir IETF Last Call review of -11 by Shawn M Emery (diff)
Opsdir IETF Last Call review of -11 by Nabeel Cocker (diff)
Perfmetrdir IETF Last Call review of -14 by Xiao Min (diff)
Tsvart IETF Last Call review of -11 by Yoshifumi Nishida (diff)
Intdir Telechat review of -11 by Jen Linkova (diff)
Assignment Reviewer Shawn M Emery
State Completed
Request IETF Last Call review on draft-ietf-bmwg-mlrsearch by Security Area Directorate Assigned
Posted at https://mailarchive.ietf.org/arch/msg/secdir/rv5I5vCyzyAjZpohhf7zP5YjlDY
Reviewed revision 11 (document currently at 15)
Result Has nits
Completed 2025-07-19
review-ietf-bmwg-mlrsearch-11-secdir-lc-emery-2025-07-19-00
I have reviewed this document as part of the security directorate's ongoing
effort to review all IETF documents being processed by the IESG.  These
comments were written primarily for the benefit of the security area directors.
 Document editors and WG chairs should treat these comments just like any other
last call comments.

This informational track draft specifies a new methodology that allows for
Multiple Loss Ratio searches (MLRsearch), which in turn can be used to
benchmark data plane throughput.

The security considerations section does exist and provides assertions that the
benchmark functions described in the draft are executed in a controlled and
constrained laboratory environment.  As a result, the devices being tested MUST
NOT be connected to devices that could potentially forward test traffic to
production or test management networks.  Lastly, any device tested will have
the same security implication in the test environment as they would in a
production environment.  I agree with these assertions and can't think of any
other security considerations for this type of draft.

General Comments:

None.

Editorial Comments:

The SUT and DUT definitions are repeated in 2.2 and 4.4.1.

The following has a line-jump:
The proliferation of software DUTs, with frequent software updates
   and a

   number ...

Suggest more concise terms for "wander", "way more", etc.

Not needed: ", a draft at the time of writing.".