Last Call Review of draft-ietf-i2rs-yang-network-topo-18
review-ietf-i2rs-yang-network-topo-18-secdir-lc-perlman-2017-11-30-00

Request Review of draft-ietf-i2rs-yang-network-topo
Requested rev. no specific revision (document currently at 19)
Type Last Call Review
Team Security Area Directorate (secdir)
Deadline 2017-12-11
Requested 2017-11-27
Other Reviews Rtgdir Early review of -02 by John Drake (diff)
Rtgdir Early review of -02 by Ines Robles (diff)
Genart Last Call review of -09 by Stewart Bryant (diff)
Yangdoctors Early review of -02 by Kent Watsen (diff)
Genart Last Call review of -14 by Stewart Bryant (diff)
Rtgdir Last Call review of -14 by Ines Robles (diff)
Yangdoctors Last Call review of -14 by Kent Watsen (diff)
Genart Last Call review of -18 by Stewart Bryant (diff)
Opsdir Last Call review of -18 by Qin Wu (diff)
Review State Completed
Reviewer Radia Perlman
Review review-ietf-i2rs-yang-network-topo-18-secdir-lc-perlman-2017-11-30
Posted at https://mailarchive.ietf.org/arch/msg/secdir/B3Yk3U_MbqNeNpb7Ku7hQbiIodQ
Reviewed rev. 18 (document currently at 19)
Review result Ready
Draft last updated 2017-11-30
Review completed: 2017-11-30

Review
review-ietf-i2rs-yang-network-topo-18-secdir-lc-perlman-2017-11-30

Summary:  No security issues found

I have reviewed this document as part of the security directorate's ongoing
effort to review all IETF documents being processed by the IESG.  These
comments were written primarily for the benefit of the security area
directors.  Document editors and WG chairs should treat these comments just
like any other last call comments.

I am not an expert at the "YANG model".  This document introduces a YANG
model to represent networks and topologies.  As they point out in the
security considerations section, if there was no authentication of network
management traffic, people could do bad things, but the assumption is that
this will run over TLS or SSH.  Therefore, no security issues are raised by
this document.

Radia