Skip to main content

Telechat Review of draft-ietf-netmod-rfc6087bis-18
review-ietf-netmod-rfc6087bis-18-secdir-telechat-farrell-2018-02-22-00

Request Review of draft-ietf-netmod-rfc6087bis
Requested revision No specific revision (document currently at 20)
Type Telechat Review
Team Security Area Directorate (secdir)
Deadline 2018-03-06
Requested 2018-02-21
Authors Andy Bierman
I-D last updated 2018-02-22
Completed reviews Secdir Telechat review of -18 by Stephen Farrell (diff)
Assignment Reviewer Stephen Farrell
State Completed
Request Telechat review on draft-ietf-netmod-rfc6087bis by Security Area Directorate Assigned
Reviewed revision 18 (document currently at 20)
Result Ready
Completed 2018-02-22
review-ietf-netmod-rfc6087bis-18-secdir-telechat-farrell-2018-02-22-00
I reviewed the diff between -18 and RFC6087. [1]

   [1] https://www.ietf.org/rfcdiff?url1=rfc6087&url2=draft-ietf-netmod-rfc6087bis-18

I assume the security ADs were involved already in discussion about
the new security considerations template in 3.7.1 and the text there
does seem fine to me, so I won't even nit-pick about it:-)

I do have some other nits to note though.

- There are a number of URLs given for access to updated materials
that use http schemed URLs and that do not use https schemed URLs.
There was a recent IESG statement to the effect that those'd be better
as https URLs. The first such example is in 3.1. In fact that URL is
re-directed (for me) to https. I think a general pass to fix such URLs
to use https wherever possible would be easy and better practice.

- Some of the namespaces use http schemed URLs, for example in
section 4.2. I don't know if people are expected to de-reference such
URLs, but if they are then it'd be good to say if https is better to use
or not. (I'd argue it is.) If those URLs are not expected to be 
de-referenced, then saying that would be good. (Not that it'd stop 
people de-referencing 'em so the change is better in any case;-)

Cheers,
S.