Last Call Review of draft-ietf-i2rs-yang-network-topo-18
review-ietf-i2rs-yang-network-topo-18-secdir-lc-perlman-2017-11-30-00

Request Review of draft-ietf-i2rs-yang-network-topo
Requested rev. no specific revision (document currently at 20)
Type Last Call Review
Team Security Area Directorate (secdir)
Deadline 2017-12-11
Requested 2017-11-27
Draft last updated 2017-11-30
Completed reviews Rtgdir Early review of -02 by John Drake (diff)
Rtgdir Early review of -02 by Ines Robles (diff)
Genart Last Call review of -09 by Stewart Bryant (diff)
Yangdoctors Early review of -02 by Kent Watsen (diff)
Genart Last Call review of -14 by Stewart Bryant (diff)
Rtgdir Last Call review of -14 by Ines Robles (diff)
Yangdoctors Last Call review of -14 by Kent Watsen (diff)
Secdir Last Call review of -18 by Radia Perlman (diff)
Genart Last Call review of -18 by Stewart Bryant (diff)
Opsdir Last Call review of -18 by Qin Wu (diff)
Assignment Reviewer Radia Perlman
State Completed
Review review-ietf-i2rs-yang-network-topo-18-secdir-lc-perlman-2017-11-30
Reviewed rev. 18 (document currently at 20)
Review result Ready
Review completed: 2017-11-30

Review
review-ietf-i2rs-yang-network-topo-18-secdir-lc-perlman-2017-11-30

Summary:  No security issues found

I have reviewed this document as part of the security directorate's ongoing
effort to review all IETF documents being processed by the IESG.  These
comments were written primarily for the benefit of the security area
directors.  Document editors and WG chairs should treat these comments just
like any other last call comments.

I am not an expert at the "YANG model".  This document introduces a YANG
model to represent networks and topologies.  As they point out in the
security considerations section, if there was no authentication of network
management traffic, people could do bad things, but the assumption is that
this will run over TLS or SSH.  Therefore, no security issues are raised by
this document.

Radia