Last Call Review of draft-ietf-pim-source-discovery-bsr-07

Request Review of draft-ietf-pim-source-discovery-bsr
Requested rev. no specific revision (document currently at 12)
Type Last Call Review
Team Security Area Directorate (secdir)
Deadline 2018-01-10
Requested 2017-12-20
Authors IJsbrand Wijnands, Stig Venaas, Michael Brig, Anders Jonasson
Draft last updated 2018-01-07
Completed reviews Rtgdir Telechat review of -11 by Papadimitriou Dimitri (diff)
Genart Last Call review of -07 by Stewart Bryant (diff)
Secdir Last Call review of -07 by Liang Xia (diff)
Opsdir Last Call review of -07 by Joel Jaeggli (diff)
Genart Telechat review of -08 by Stewart Bryant (diff)
Tsvart Telechat review of -08 by David Black (diff)
Assignment Reviewer Liang Xia 
State Completed Snapshot
Review review-ietf-pim-source-discovery-bsr-07-secdir-lc-xia-2018-01-07
Reviewed rev. 07 (document currently at 12)
Review result Has Issues
Review completed: 2018-01-07


1. In Abstract, the abbreviation is missed when the Term are firstly appeared, such as: Sparse-Mode, Rendezvous Point;
2. Every word in the section titles should be in the capital form

1. In Security Considerations section,  should one sentence be "even if the sources are actually not active"?
2. Generally, the peer authentication (by certificate, shared key...) and the message integration protection are always helpful to defend against the forged routers and PEM messages, even the resulted resource consumption. But in current Security Considerations section, there is nothing discussed about these countermeasures, even in the general way. Suggest to consider this point personally.