Last Call Review of draft-ietf-sidrops-ov-clarify-03
review-ietf-sidrops-ov-clarify-03-secdir-lc-nir-2018-08-04-00
Request | Review of | draft-ietf-sidrops-ov-clarify |
---|---|---|
Requested revision | No specific revision (document currently at 05) | |
Type | Last Call Review | |
Team | Security Area Directorate (secdir) | |
Deadline | 2018-08-10 | |
Requested | 2018-07-27 | |
Authors | Randy Bush | |
I-D last updated | 2018-08-04 | |
Completed reviews |
Genart Last Call review of -03
by Brian E. Carpenter
(diff)
Rtgdir Telechat review of -03 by Dhruv Dhody (diff) Secdir Last Call review of -03 by Yoav Nir (diff) |
|
Assignment | Reviewer | Yoav Nir |
State | Completed | |
Request | Last Call review on draft-ietf-sidrops-ov-clarify by Security Area Directorate Assigned | |
Reviewed revision | 03 (document currently at 05) | |
Result | Ready | |
Completed | 2018-08-04 |
review-ietf-sidrops-ov-clarify-03-secdir-lc-nir-2018-08-04-00
I have reviewed this document as part of the security directorate's ongoing effort to review all IETF documents being processed by the IESG. These comments were written primarily for the benefit of the security area directors. Document editors and WG chairs should treat these comments just like any other last call comments. The document clarifies two things about RFC 6811: That all routes MUST be marked as Valid, Invalid, or NotFound unless policy specifically says not to do so. The original text in RFC 6811 said SHOULD (perform a lookup...) and MAY (provide configuration options...), so this interpretation seems to be already strongly implied by 6811. That policy (such as rejecting invalid routes) MUST NOT be applied unless the operator specifically configured it. RFC 6811 already says, "An implementation MUST NOT exclude a route from the Adj-RIB-In or from consideration in the decision process as a side effect of its validation state, unless explicitly configured to do so." so I believe this is already stated in RFC 6811. Still, the text says that some implementers got it wrong. So I think the claim in the security considerations section, that this document does not introduce any security considerations beyond those of 6811 is reasonable. The fact that the security policy suggested by RFC 6811 MUST NOT be turned on by default may have been pointed out more emphatically, but this perhaps should have to be done in 6811.