Skip to main content

Last Call Review of draft-ietf-madinas-use-cases-12
review-ietf-madinas-use-cases-12-secdir-lc-weis-2024-11-19-00

Request Review of draft-ietf-madinas-use-cases
Requested revision No specific revision (document currently at 19)
Type IETF Last Call Review
Team Security Area Directorate (secdir)
Deadline 2024-11-28
Requested 2024-11-15
Requested by Éric Vyncke
Authors Jerome Henry , Yiu Lee
I-D last updated 2025-04-30 (Latest revision 2024-12-20)
Completed reviews Intdir IETF Last Call review of -15 by Dave Thaler (diff)
Iotdir IETF Last Call review of -13 by Behcet Sarikaya (diff)
Secdir IETF Last Call review of -12 by Brian Weis (diff)
Artart IETF Last Call review of -13 by Marco Tiloca (diff)
Tsvart IETF Last Call review of -12 by Tommy Pauly (diff)
Genart IETF Last Call review of -13 by Thomas Fossati (diff)
Comments
This I-D is simple to read but it is quite broad as it touches many areas... Meeting the deadline is important but, as the responsible AD for this I-D, I will gladly consider directorate reviews done before the IESG evaluation telechat date (probably in December).

Thank you
Assignment Reviewer Brian Weis
State Completed
Request IETF Last Call review on draft-ietf-madinas-use-cases by Security Area Directorate Assigned
Posted at https://mailarchive.ietf.org/arch/msg/secdir/jD-2zFIaDErNChxoCIX960Z5YcA
Reviewed revision 12 (document currently at 19)
Result Ready
Completed 2024-11-19
review-ietf-madinas-use-cases-12-secdir-lc-weis-2024-11-19-00
I have reviewed this document as part of the security directorate's
ongoing effort to review all IETF documents being processed by the
IESG. These comments were written primarily for the benefit of the
security area directors. Document editors and WG chairs should treat
these comments just like any other last call comments.

The summary of the review is Ready.

MAC address randomization has become a common method to enhance
privacy of a user device. This document describes the affects of
MAC address randomization on higher-level network services, in
particular how MAC address randomization can negatively affect the
operation of those network services. It provides an assessment of
those risks, and presents some use cases for a reader to consider.

This document is well-written, and I believe fairly presents the
privacy issues in scope. I just have one comment and point out a
couple of nits.

1. Except for the first sentence, the last paragraph in Section 2
seems to only be pertinent to the "Personal Device" class. Perhaps
this could be made more clear.

2. Nit: Section 6.1 s/Soilict//

3. Nit: Section 6.2 s/operators.Table/operators. Table/