Skip to main content

Last Call Review of draft-ietf-sidrops-rtr-keying-01
review-ietf-sidrops-rtr-keying-01-rtgdir-lc-dhody-2018-12-16-00

Request Review of draft-ietf-sidrops-rtr-keying
Requested revision No specific revision (document currently at 06)
Type Last Call Review
Team Routing Area Directorate (rtgdir)
Deadline 2018-12-18
Requested 2018-12-05
Requested by Alvaro Retana
Authors Randy Bush , Sean Turner , Keyur Patel
I-D last updated 2018-12-16
Completed reviews Rtgdir Last Call review of -01 by Dhruv Dhody (diff)
Secdir Last Call review of -01 by Daniel Fox Franke (diff)
Opsdir Last Call review of -02 by Scott O. Bradner (diff)
Assignment Reviewer Dhruv Dhody
State Completed
Request Last Call review on draft-ietf-sidrops-rtr-keying by Routing Area Directorate Assigned
Reviewed revision 01 (document currently at 06)
Result Has issues
Completed 2018-12-16
review-ietf-sidrops-rtr-keying-01-rtgdir-lc-dhody-2018-12-16-00
Hello,

I have been selected as the Routing Directorate reviewer for this
draft. The Routing Directorate seeks to review all routing or
routing-related drafts as they pass through IETF last call and IESG
review, and sometimes on special request. The purpose of the review is
to provide assistance to the Routing ADs. For more information about
the Routing Directorate, please see
http://trac.tools.ietf.org/area/rtg/trac/wiki/RtgDir

Although these comments are primarily for the use of the Routing ADs,
it would be helpful if you could consider them along with any other
IETF Last Call comments that you receive, and strive to resolve them
through discussion or by updating the draft.

Document: draft-ietf-sidrops-rtr-keying-01
Reviewer: Dhruv Dhody
Review Date: 14 Dec 2018
IETF LC End Date: Unknown
Intended Status: Standard

Summary:

   I have some minor concerns about this document that I think should be
   resolved before publication.

Comments:

   This document describe the provisioning of BGPsec-speaking routers with the
   appropriate public-private key-pairs. It describes two ways - Router Driven
   and Operator Driven of doing this. This document does not provide any
   protocol extensions.

   Thank you for including Appendix B, it helped a lot.

Major Issues:

   No major issues found.

Minor Issues:

   (1) I am not sure about the status of the document. Since this document
   does not define any protocol extensions, this document reads to me as
   Informational or BCP. I am quite sure this is going to be asked during IESG
   reviews, it would be good idea to discuss and conclude on this early on.

   (2) I also find 'sub-methods' to describe the two different mechanism (or
   models) as incorrect.
   Also, did the authors/WG consider making Router-driven as default and
   operator-driven to be used with utmost care and only when router-driven is
   not possible?

   (3) Introduction mentions only Section 8, suggest to include some more text
   that describes the flow of the document to increase the readability.

   (4) Section 4/5 used AS number and the BGP Identifier; where as Appendix B
   says subject name and serial number for the router. We should link these
   somehow.

   (5) Section 5.2.1 has 'AS's End Entity (EE) private key' and AS's EE
   certificate(s); This is not clear, is this 'AS's key and certificate'
   belongs to the management station? Can you add a sentence clarifying this.

   (6) It feels like, this document uses SHOULD as a default level. I am not
   sure if that is right in every instance of its use.

Nits:

   - section 4
     s/a BGP Identifier of 0 may be used/a BGP Identifier of 0 MAY be used/
   - section 5
     s/transmits the AS it has chosen or the router/transmits the AS
it has chosen on the router/
   - section 7
     s/certs-ony/certs-only
   - section 9
     Took me a while to parse this, might be helpful to make a list or
     rephrase -

         When an active router key is to be revoked, the process of requesting
         the CA to revoke, the process of the CA actually revoking the
         router's certificate, and then the process of re-keying/renewing the
         router's certificate, (possibly distributing a new key and
         certificate to the router), and distributing the status, takes time
         during which the operator must decide how they wish to maintain
         continuity of operations, with or without the compromised private
         key, or whether they wish to bring the router offline to address the
         compromise.

   - section 10
     Does not parse -

         ..employees that no longer need access to a
         routers SHOULD be removed the router to ensure only those authorized
         have access to a router.