Last Call Review of draft-ietf-dots-architecture-15
review-ietf-dots-architecture-15-tsvart-lc-tuexen-2020-02-10-00
Request | Review of | draft-ietf-dots-architecture |
---|---|---|
Requested revision | No specific revision (document currently at 18) | |
Type | Last Call Review | |
Team | Transport Area Review Team (tsvart) | |
Deadline | 2020-01-27 | |
Requested | 2020-01-13 | |
Authors | Andrew Mortensen , Tirumaleswar Reddy.K , Flemming Andreasen , Nik Teague , Rich Compton | |
I-D last updated | 2020-02-10 | |
Completed reviews |
Tsvart Last Call review of -15
by Michael Tüxen
(diff)
Genart Last Call review of -15 by Paul Kyzivat (diff) Opsdir Last Call review of -15 by Joe Clarke (diff) Genart Telechat review of -16 by Paul Kyzivat (diff) |
|
Assignment | Reviewer | Michael Tüxen |
State | Completed | |
Request | Last Call review on draft-ietf-dots-architecture by Transport Area Review Team Assigned | |
Posted at | https://mailarchive.ietf.org/arch/msg/tsv-art/DcRQl34XYjJbQLyyTzv_rzbxB9M | |
Reviewed revision | 15 (document currently at 18) | |
Result | Ready w/issues | |
Completed | 2020-01-27 |
review-ietf-dots-architecture-15-tsvart-lc-tuexen-2020-02-10-00
Reviewer: Michael Tüxen Review result: Ready with Issues This document has been reviewed as part of the transport area review team's ongoing effort to review key IETF documents. These comments were written primarily for the transport area directors, but are copied to the document's authors and WG to allow them to address any issues raised and also to the IETF discussion list for information. When done at the time of IETF Last Call, the authors should consider this review as part of the last-call comments they receive. Please always CC tsv-art@ietf.org if you reply to or forward this review. The document describes the intended architecture very well. What is not described is how loss recovery and congestion control will be designed to allow the signal channel to transfer message during an attack: "Some operators may utilize non-impacted paths or networks for DOTS, but in general conditions should be assumed to be hostile and DOTS must be able to function in all circumstances, including when the signaling path is significantly impaired." Nit: In Figure 4 the top and the middle client have the same name "c1.example.org". Is this intended?