Skip to main content

Last Call Review of draft-ietf-dots-architecture-15
review-ietf-dots-architecture-15-tsvart-lc-tuexen-2020-02-10-00

Request Review of draft-ietf-dots-architecture
Requested revision No specific revision (document currently at 18)
Type Last Call Review
Team Transport Area Review Team (tsvart)
Deadline 2020-01-27
Requested 2020-01-13
Authors Andrew Mortensen , Tirumaleswar Reddy.K , Flemming Andreasen , Nik Teague , Rich Compton
I-D last updated 2020-02-10
Completed reviews Tsvart Last Call review of -15 by Michael Tüxen (diff)
Genart Last Call review of -15 by Paul Kyzivat (diff)
Opsdir Last Call review of -15 by Joe Clarke (diff)
Genart Telechat review of -16 by Paul Kyzivat (diff)
Assignment Reviewer Michael Tüxen
State Completed
Request Last Call review on draft-ietf-dots-architecture by Transport Area Review Team Assigned
Posted at https://mailarchive.ietf.org/arch/msg/tsv-art/DcRQl34XYjJbQLyyTzv_rzbxB9M
Reviewed revision 15 (document currently at 18)
Result Ready w/issues
Completed 2020-01-27
review-ietf-dots-architecture-15-tsvart-lc-tuexen-2020-02-10-00
Reviewer: Michael Tüxen
Review result: Ready with Issues

This document has been reviewed as part of the transport area review team's
ongoing effort to review key IETF documents. These comments were written
primarily for the transport area directors, but are copied to the document's
authors and WG to allow them to address any issues raised and also to the IETF
discussion list for information.

When done at the time of IETF Last Call, the authors should consider this
review as part of the last-call comments they receive. Please always CC
tsv-art@ietf.org if you reply to or forward this review.

The document describes the intended architecture very well.

What is not described is how loss recovery and congestion control will be designed
to allow the signal channel to transfer message during an attack:
"Some operators may utilize non-impacted paths
or networks for DOTS, but in general conditions should be assumed
to be hostile and DOTS must be able to function in all
circumstances, including when the signaling path is significantly
impaired." 

Nit:
In Figure 4 the top and the middle client have the same name "c1.example.org". Is this intended?