Last Call Review of draft-ietf-pim-source-discovery-bsr-07

Request Review of draft-ietf-pim-source-discovery-bsr
Requested rev. no specific revision (document currently at 12)
Type Last Call Review
Team Security Area Directorate (secdir)
Deadline 2018-01-10
Requested 2017-12-20
Other Reviews Rtgdir Telechat review of -11 by Papadimitriou Dimitri (diff)
Genart Last Call review of -07 by Stewart Bryant (diff)
Opsdir Last Call review of -07 by Joel Jaeggli (diff)
Genart Telechat review of -08 by Stewart Bryant (diff)
Tsvart Telechat review of -08 by David Black (diff)
Review State Completed
Reviewer Liang Xia
Review review-ietf-pim-source-discovery-bsr-07-secdir-lc-xia-2018-01-07
Posted at
Reviewed rev. 07 (document currently at 12)
Review result Has Issues
Draft last updated 2018-01-07
Review completed: 2018-01-07


1. In Abstract, the abbreviation is missed when the Term are firstly appeared, such as: Sparse-Mode, Rendezvous Point;
2. Every word in the section titles should be in the capital form

1. In Security Considerations section,  should one sentence be "even if the sources are actually not active"?
2. Generally, the peer authentication (by certificate, shared key...) and the message integration protection are always helpful to defend against the forged routers and PEM messages, even the resulted resource consumption. But in current Security Considerations section, there is nothing discussed about these countermeasures, even in the general way. Suggest to consider this point personally.