Skip to main content

Last Call Review of draft-ietf-pim-source-discovery-bsr-07
review-ietf-pim-source-discovery-bsr-07-secdir-lc-xia-2018-01-07-00

Request Review of draft-ietf-pim-source-discovery-bsr
Requested revision No specific revision (document currently at 12)
Type Last Call Review
Team Security Area Directorate (secdir)
Deadline 2018-01-10
Requested 2017-12-20
Authors IJsbrand Wijnands , Stig Venaas , Michael Brig , Anders Jonasson
I-D last updated 2018-01-07
Completed reviews Rtgdir Telechat review of -11 by Papadimitriou Dimitri (diff)
Genart Last Call review of -07 by Stewart Bryant (diff)
Secdir Last Call review of -07 by Liang Xia (diff)
Opsdir Last Call review of -07 by Joel Jaeggli (diff)
Genart Telechat review of -08 by Stewart Bryant (diff)
Tsvart Telechat review of -08 by David L. Black (diff)
Assignment Reviewer Liang Xia
State Completed
Request Last Call review on draft-ietf-pim-source-discovery-bsr by Security Area Directorate Assigned
Reviewed revision 07 (document currently at 12)
Result Has issues
Completed 2018-01-07
review-ietf-pim-source-discovery-bsr-07-secdir-lc-xia-2018-01-07-00
Nits:
1. In Abstract, the abbreviation is missed when the Term are firstly appeared,
such as: Sparse-Mode, Rendezvous Point; 2. Every word in the section titles
should be in the capital form

Issues:
1. In Security Considerations section,  should one sentence be "even if the
sources are actually not active"? 2. Generally, the peer authentication (by
certificate, shared key...) and the message integration protection are always
helpful to defend against the forged routers and PEM messages, even the
resulted resource consumption. But in current Security Considerations section,
there is nothing discussed about these countermeasures, even in the general
way. Suggest to consider this point personally.