Skip to main content

Last Call Review of draft-ietf-opsawg-ntf-09
review-ietf-opsawg-ntf-09-secdir-lc-melnikov-2021-10-26-00

Request Review of draft-ietf-opsawg-ntf
Requested revision No specific revision (document currently at 13)
Type Last Call Review
Team Security Area Directorate (secdir)
Deadline 2021-10-27
Requested 2021-10-13
Authors Haoyu Song , Fengwei Qin , Pedro Martinez-Julia , Laurent Ciavaglia , Aijun Wang
I-D last updated 2021-10-26
Completed reviews Genart Last Call review of -09 by Gyan Mishra (diff)
Secdir Last Call review of -09 by Alexey Melnikov (diff)
Opsdir Last Call review of -09 by Sheng Jiang (diff)
Tsvart Last Call review of -09 by Michael Scharf (diff)
Intdir Telechat review of -10 by Jean-Michel Combes (diff)
Rtgdir Telechat review of -10 by Dhruv Dhody (diff)
Assignment Reviewer Alexey Melnikov
State Completed
Request Last Call review on draft-ietf-opsawg-ntf by Security Area Directorate Assigned
Posted at https://mailarchive.ietf.org/arch/msg/secdir/OcaHzauz3C13X8qDk25v7AfBSkM
Reviewed revision 09 (document currently at 13)
Result Ready
Completed 2021-10-26
review-ietf-opsawg-ntf-09-secdir-lc-melnikov-2021-10-26-00
Reviewer: Alexey Melnikov
Review result: Ready

Hi,

I have reviewed this document as part of the security directorate's 
ongoing effort to review all IETF documents being processed by the IESG. 
These comments were written primarily for the benefit of the security 
area directors. Document editors and WG chairs should treat these 
comments just like any other last call comments.

Network telemetry is a technology for gaining network insight and 
facilitating efficient and automated network management. This document 
defines network telemetry as an extension
of Operations, Administration, and Management (OAM) techniques. This 
document clarifies the terminologies and classifies the modules and 
components of a network telemetry system from different perspectives, in 
particilar whether they operate at the control plane, the management 
plane or the forwarding plane. Examples of both IETF and non IETF 
technologies are given.

The document is well written and has a good Security Considerations 
section. As this document is describing a framework, the security 
considerations stay generic, but the Security Considerations covers 
everything I can think of in regards to data confidentiality, privacy, 
access control, etc.


Nits: JSON and XML should have informative references.


Best Regards,

Alexey