Skip to main content

Last Call Review of draft-ietf-ccamp-flexi-grid-fwk-05
review-ietf-ccamp-flexi-grid-fwk-05-secdir-lc-hartman-2015-08-06-00

Request Review of draft-ietf-ccamp-flexi-grid-fwk
Requested revision No specific revision (document currently at 07)
Type Last Call Review
Team Security Area Directorate (secdir)
Deadline 2015-08-04
Requested 2015-07-16
Authors Iftekhar Hussain , Xihua Fu , Fatai Zhang , Daniele Ceccarelli , Oscar Gonzalez de Dios , Ramon Casellas
I-D last updated 2015-08-06
Completed reviews Genart Last Call review of -05 by David L. Black (diff)
Genart Telechat review of -05 by David L. Black (diff)
Secdir Last Call review of -05 by Sam Hartman (diff)
Opsdir Last Call review of -05 by Tina Tsou (Ting ZOU) (diff)
Assignment Reviewer Sam Hartman
State Completed
Request Last Call review on draft-ietf-ccamp-flexi-grid-fwk by Security Area Directorate Assigned
Reviewed revision 05 (document currently at 07)
Result Ready
Completed 2015-08-06
review-ietf-ccamp-flexi-grid-fwk-05-secdir-lc-hartman-2015-08-06-00
I've been assigned at the secdir reviewer for
draft-ietf-ccamp-flexi-grid-fwk-05.

This document appears ready for publication.

This document describes a framework and requirements for the GMPLS
control plane for flexible grid DWDM optical transport networks.
The basic change is that rather than having a fixed grid of frequencies,
the frequency and slot widthof each media channel are parameters of the
control plane.


I read through section 1, 2, good chunks of section3, 4 and 7.

The authors claim in section 7 that the security implications are the
same between a flexible grid network and a fixed grip netwerk.

This seems to generally be true.
I think that the flexible grid network introduces new ways that attacks
can result.  As an example, the control plane might be able to loosen
restrictions on a filter so that an attacker was able to see more than
they should.  (my physics is entirely inadequate to the task of figuring
out whether this is interesting or would for example just create a DOS)
It might be harder to express this particular misconfiguration/attack in
a fixed network.
However it seems that the general issue is as the authors claim present
in the fixed grid network.

Which is to say, that I don't think the security is identical, but I
agree with the authors that the security considerations seem
substantially similar.
I don't see value for changes in the text in this document.

I did not read the cited references and confirm that the described
security considerations in those documents are adequate.

Thanks for a well-written document.