Skip to main content

Last Call Review of draft-ietf-opsawg-l2nm-07
review-ietf-opsawg-l2nm-07-secdir-lc-lonvick-2021-10-10-00

Request Review of draft-ietf-opsawg-l2nm-06
Requested revision 06 (document currently at 19)
Type Last Call Review
Team Security Area Directorate (secdir)
Deadline 2021-10-01
Requested 2021-09-16
Requested by Joe Clarke
Authors Mohamed Boucadair , Oscar Gonzalez de Dios , Samier Barguil , Luis Angel Munoz
I-D last updated 2021-10-10
Completed reviews Rtgdir Early review of -01 by Yingzhen Qu (diff)
Secdir Last Call review of -07 by Chris M. Lonvick (diff)
Rtgdir Last Call review of -10 by Himanshu C. Shah (diff)
Yangdoctors Last Call review of -07 by Ladislav Lhotka (diff)
Genart Last Call review of -15 by Dale R. Worley (diff)
Secdir Last Call review of -15 by Chris M. Lonvick (diff)
Rtgdir Telechat review of -16 by Yingzhen Qu (diff)
Assignment Reviewer Chris M. Lonvick
State Completed
Request Last Call review on draft-ietf-opsawg-l2nm by Security Area Directorate Assigned
Posted at https://mailarchive.ietf.org/arch/msg/secdir/4UzNFEYEiGWQKI3iXYlWvYDLUvM
Reviewed revision 07 (document currently at 19)
Result Ready
Completed 2021-10-10
review-ietf-opsawg-l2nm-07-secdir-lc-lonvick-2021-10-10-00
Hello,

I have reviewed this document as part of the security directorate's ongoing
effort to review all IETF documents being processed by the IESG.  These
comments were written primarily for the benefit of the security area directors.
 Document editors and WG chairs should treat these comments just like any other
last call comments.

The summary of the review is READY with some very minor nits in the Security
Considerations section.

I'm not well versed in this area but I'll say that the entire document is
understandable and appears well written. I found no obvious errors or problems
in my brief review.

The first paragraph in the Security Considerations section lists that this work
is built atop YANG, NETCONF, or RESTCONF, and lists the transport protocols
that are used for them, but stops short of providing guidance. My
recommendation is to address this by adding a sentence such as, "Developers,
implementers, and administrators of this specification should be familiar with
the Security Considerations sections of those RFCs."

The remaining paragraphs of the Security Considerations section provide a list
of tools that may be used along with guidance on using them to secure access to
sensitive items. The authors may wish to summarize this by adding a sentence
such as, "Administrators may consider using these, and perhaps other tools, to
enforce a security policy."

Regards,
Chris