Skip to main content

Last Call Review of draft-ietf-dmm-srv6-mobile-uplane-21
review-ietf-dmm-srv6-mobile-uplane-21-secdir-lc-farrell-2022-11-05-00

Request Review of draft-ietf-dmm-srv6-mobile-uplane
Requested revision No specific revision (document currently at 24)
Type Last Call Review
Team Security Area Directorate (secdir)
Deadline 2022-11-23
Requested 2022-11-02
Authors Satoru Matsushima , Clarence Filsfils , Miya Kohno , Pablo Camarillo , Daniel Voyer
I-D last updated 2022-11-05
Completed reviews Genart Last Call review of -22 by Gyan Mishra (diff)
Secdir Last Call review of -21 by Stephen Farrell (diff)
Rtgdir Last Call review of -23 by Mike McBride (diff)
Assignment Reviewer Stephen Farrell
State Completed
Request Last Call review on draft-ietf-dmm-srv6-mobile-uplane by Security Area Directorate Assigned
Posted at https://mailarchive.ietf.org/arch/msg/secdir/jgAWwA4f1V8MhicyV3P-6gLxYBQ
Reviewed revision 21 (document currently at 24)
Result Has issues
Completed 2022-11-05
review-ietf-dmm-srv6-mobile-uplane-21-secdir-lc-farrell-2022-11-05-00
This is a relatively minor issue, but worth fixing. This draft is aiming for
standards-track. RFC2804 says that we won't standardise lawful intercept
mechanisms, yet the draft specifies in 6.1 that Args.Mob.Session can be used
for that. I'd say best is to just drop that example usage to avoid having to
worry about this.

Otherwise, if one believes the basic security claim of SRv6 (that traffic can
be kept within a "trusted" local n/w) then the security considerations here are
correct that this doesn't add anything new.