Last Call Review of draft-ietf-ospf-encapsulation-cap-06
review-ietf-ospf-encapsulation-cap-06-secdir-lc-mandelberg-2017-08-31-00
Request | Review of | draft-ietf-ospf-encapsulation-cap |
---|---|---|
Requested revision | No specific revision (document currently at 09) | |
Type | Last Call Review | |
Team | Security Area Directorate (secdir) | |
Deadline | 2017-08-28 | |
Requested | 2017-08-14 | |
Authors | Xiaohu Xu , Bruno Decraene , Robert Raszuk , Luis M. Contreras , Luay Jalil | |
I-D last updated | 2017-08-31 | |
Completed reviews |
Opsdir Last Call review of -06
by Tim Wicinski
(diff)
Tsvart Last Call review of -06 by Dr. Joseph D. Touch (diff) Secdir Last Call review of -06 by David Mandelberg (diff) Genart Last Call review of -06 by Pete Resnick (diff) Opsdir Last Call review of -06 by Susan Hares (diff) |
|
Assignment | Reviewer | David Mandelberg |
State | Completed | |
Request | Last Call review on draft-ietf-ospf-encapsulation-cap by Security Area Directorate Assigned | |
Reviewed revision | 06 (document currently at 09) | |
Result | Has nits | |
Completed | 2017-08-31 |
review-ietf-ospf-encapsulation-cap-06-secdir-lc-mandelberg-2017-08-31-00
I have reviewed this document as part of the security directorate's ongoing effort to review all IETF documents being processed by the IESG. These comments were written primarily for the benefit of the security area directors. Document editors and WG chairs should treat these comments just like any other last call comments. The summary of the review is Ready with nits. This document extends OSPF for use with tunnels. As mentioned in the security considerations, an attacker who can modify routing information can cause packets to be misdirected or dropped. However, that seems to be the general nature of routing attacks. I don't know if this document makes such attacks any more likely or more severe, but it would be nice to see a bit more discussion of that in the security considerations. E.g., are OSPF attacks without tunneling less severe because of some limitation on where packets can be forwarded, while tunneling makes it easier to forward packets to anywhere on the Internet? Or is that not the case? (I'm not very familiar with OSPF or with the environments it's typically used in.)