Skip to main content

Last Call Review of draft-ietf-lsr-yang-isis-reverse-metric-04
review-ietf-lsr-yang-isis-reverse-metric-04-secdir-lc-orman-2021-11-18-00

Request Review of draft-ietf-lsr-yang-isis-reverse-metric
Requested revision No specific revision (document currently at 06)
Type Last Call Review
Team Security Area Directorate (secdir)
Deadline 2021-11-15
Requested 2021-10-25
Authors Christian Hopps
I-D last updated 2021-11-18
Completed reviews Yangdoctors Last Call review of -01 by Ladislav Lhotka (diff)
Rtgdir Last Call review of -01 by Michael Richardson (diff)
Secdir Last Call review of -04 by Hilarie Orman (diff)
Genart Last Call review of -04 by Vijay K. Gurbani (diff)
Assignment Reviewer Hilarie Orman
State Completed
Request Last Call review on draft-ietf-lsr-yang-isis-reverse-metric by Security Area Directorate Assigned
Posted at https://mailarchive.ietf.org/arch/msg/secdir/oUGqZ3DJ9PNOMI51X8cfYFKkTOo
Reviewed revision 04 (document currently at 06)
Result Ready
Completed 2021-11-15
review-ietf-lsr-yang-isis-reverse-metric-04-secdir-lc-orman-2021-11-18-00
	 Security review of YANG Module for IS-IS Reverse Metric
	 draft-ietf-lsr-yang-isis-reverse-metric-04

Do not be alarmed.  I generated this review of this document as part
of the security directorate's ongoing effort to review all IETF
documents being processed by the IESG.  These comments were written
with the intent of improving security requirements and considerations
in IETF drafts.  Comments not addressed in last call may be included
in AD reviews during the IESG review.  Document editors and WG chairs
should treat these comments just like any other last call comments.

The abstract (with typo noted):

   This document defines a YANG module for managing the reverse metric
   extension to the Intermediate System to Intermediate System intra-
   domain routeing information exchange protocol (IS-IS).
              ^
The spelling error seems to have been copied from ISO Standard 10589:2002.
There's no need to continue propagating it.

The draft has a decent discussion of security considerations regarding
the privacy of the information expressed in the data.

The document is READY.  


Hilarie