Last Call Review of draft-ietf-tictoc-1588v2-yang-10

Request Review of draft-ietf-tictoc-1588v2-yang
Requested rev. no specific revision (document currently at 11)
Type Last Call Review
Team Security Area Directorate (secdir)
Deadline 2018-09-07
Requested 2018-08-24
Authors Yuanlong Jiang, Xian Liu, Jinchun Xu, Rodney Cummings
Draft last updated 2018-10-03
Completed reviews Intdir Early review of -07 by Dave Thaler (diff)
Opsdir Last Call review of -09 by Sheng Jiang (diff)
Genart Last Call review of -09 by Linda Dunbar (diff)
Secdir Last Call review of -10 by Samuel Weiler (diff)
Genart Telechat review of -10 by Linda Dunbar (diff)
Yangdoctors Early review of -10 by Radek Krejčí (diff)
Assignment Reviewer Samuel Weiler
State Completed
Review review-ietf-tictoc-1588v2-yang-10-secdir-lc-weiler-2018-10-03
Reviewed rev. 10 (document currently at 11)
Review result Has Issues
Review completed: 2018-10-03


I wonder whether there should be a requirement to use authentication when making updates.  As the doc says:

   Write operations (e.g., edit-config) to these data nodes without
   proper protection can have a negative effect on network operations.

I'm sure someone will argue "if this is used in a closed network, we can avoid the use of authentication".  Prudence suggests that "closed" networks don't remain that way forever, and defense-in-depth is advisable.  Let's add a MUST or at least a SHOULD.