Skip to main content

Telechat Review of draft-ietf-ospf-link-overload-11
review-ietf-ospf-link-overload-11-secdir-telechat-turner-2018-01-04-00

Request Review of draft-ietf-ospf-link-overload
Requested revision No specific revision (document currently at 16)
Type Telechat Review
Team Security Area Directorate (secdir)
Deadline 2018-01-23
Requested 2017-12-19
Authors Shraddha Hegde , Pushpasis Sarkar , Hannes Gredler , Mohan Nanduri , Luay Jalil
I-D last updated 2018-12-19 (Latest revision 2018-02-04)
Completed reviews Rtgdir IETF Last Call review of -09 by Martin Vigoureux (diff)
Genart IETF Last Call review of -11 by Joel M. Halpern (diff)
Genart Telechat review of -10 by Joel M. Halpern (diff)
Secdir Telechat review of -11 by Sean Turner (diff)
Opsdir Telechat review of -13 by Tim Chown (diff)
Genart Telechat review of -12 by Joel M. Halpern (diff)
Assignment Reviewer Sean Turner
State Completed
Request Telechat review on draft-ietf-ospf-link-overload by Security Area Directorate Assigned
Reviewed revision 11 (document currently at 16)
Result Ready
Completed 2018-01-04
review-ietf-ospf-link-overload-11-secdir-telechat-turner-2018-01-04-00
In reviewing this draft, I was most concerned that this mechanism could be used
by an attacker to push traffic towards or away from a node.  If the messages
are authenticated then I tend to agree with your assessment that this draft
doesn't introduce any new security considerations beyond those in
[RFC2328]/[RFC5340].  If not, well all bets are off.

I did note a couple of editorial nits, but I sent those directly to the authors.