Last Call Review of draft-ietf-pim-source-discovery-bsr-07
review-ietf-pim-source-discovery-bsr-07-secdir-lc-xia-2018-01-07-00
Request | Review of | draft-ietf-pim-source-discovery-bsr |
---|---|---|
Requested revision | No specific revision (document currently at 12) | |
Type | Last Call Review | |
Team | Security Area Directorate (secdir) | |
Deadline | 2018-01-10 | |
Requested | 2017-12-20 | |
Authors | IJsbrand Wijnands , Stig Venaas , Michael Brig , Anders Jonasson | |
I-D last updated | 2018-01-07 | |
Completed reviews |
Rtgdir Telechat review of -11
by Papadimitriou Dimitri
(diff)
Genart Last Call review of -07 by Stewart Bryant (diff) Secdir Last Call review of -07 by Liang Xia (diff) Opsdir Last Call review of -07 by Joel Jaeggli (diff) Genart Telechat review of -08 by Stewart Bryant (diff) Tsvart Telechat review of -08 by David L. Black (diff) |
|
Assignment | Reviewer | Liang Xia |
State | Completed | |
Request | Last Call review on draft-ietf-pim-source-discovery-bsr by Security Area Directorate Assigned | |
Reviewed revision | 07 (document currently at 12) | |
Result | Has issues | |
Completed | 2018-01-07 |
review-ietf-pim-source-discovery-bsr-07-secdir-lc-xia-2018-01-07-00
Nits: 1. In Abstract, the abbreviation is missed when the Term are firstly appeared, such as: Sparse-Mode, Rendezvous Point; 2. Every word in the section titles should be in the capital form Issues: 1. In Security Considerations section, should one sentence be "even if the sources are actually not active"? 2. Generally, the peer authentication (by certificate, shared key...) and the message integration protection are always helpful to defend against the forged routers and PEM messages, even the resulted resource consumption. But in current Security Considerations section, there is nothing discussed about these countermeasures, even in the general way. Suggest to consider this point personally.