Skip to main content

Last Call Review of draft-ietf-ccamp-ospf-availability-extension-07
review-ietf-ccamp-ospf-availability-extension-07-secdir-lc-shekh-yusef-2016-10-20-00

Request Review of draft-ietf-ccamp-ospf-availability-extension
Requested revision No specific revision (document currently at 13)
Type Last Call Review
Team Security Area Directorate (secdir)
Deadline 2016-10-24
Requested 2016-10-14
Authors Hao Long , Min Ye , Greg Mirsky , Alessandro D'Alessandro , Himanshu C. Shah
Draft last updated 2016-10-20
Completed reviews Genart Last Call review of -07 by Jouni Korhonen (diff)
Secdir Last Call review of -07 by Rifaat Shekh-Yusef (diff)
Rtgdir Early review of -05 by Jonathan Hardwick (diff)
Genart Telechat review of -08 by Jouni Korhonen (diff)
Opsdir Telechat review of -08 by Mehmet Ersue (diff)
Genart Telechat review of -09 by Jouni Korhonen (diff)
Genart Telechat review of -10 by Jouni Korhonen (diff)
Assignment Reviewer Rifaat Shekh-Yusef
State Completed
Review review-ietf-ccamp-ospf-availability-extension-07-secdir-lc-shekh-yusef-2016-10-20
Reviewed revision 07 (document currently at 13)
Result Ready
Completed 2016-10-20
review-ietf-ccamp-ospf-availability-extension-07-secdir-lc-shekh-yusef-2016-10-20-00
I have reviewed this document as part of the security directorate's

ongoing effort to review all IETF documents being processed by the

IESG.  These comments were written primarily for the benefit of the

security area directors.  Document editors and WG chairs should treat

these comments just like any other last call comments.

Summary:

Ready

This is a Standard Track document that extend the GMPLS OSPF routing protocol
by introducing

an optional ISCD Availability sub-TLV, which could be used for route
computation in a network that contains links with variable discrete bandwidth.
This document defines the distribution mechanism for this new extension.

The Security Consideration section clearly describes the security and privacy
issues with this new extension, and since this is only an extension to an
existing mechanism, it points to other documents that cover the mechanism and
the security implications and potential solutions.

Regards,

 Rifaat