Skip to main content

Last Call Review of draft-ietf-tictoc-1588v2-yang-10
review-ietf-tictoc-1588v2-yang-10-secdir-lc-weiler-2018-10-03-00

Request Review of draft-ietf-tictoc-1588v2-yang
Requested revision No specific revision (document currently at 11)
Type Last Call Review
Team Security Area Directorate (secdir)
Deadline 2018-09-07
Requested 2018-08-24
Authors Yuanlong Jiang , Xian Liu , Jinchun Xu , Rodney Cummings
I-D last updated 2018-10-03
Completed reviews Intdir Early review of -07 by Dave Thaler (diff)
Opsdir Last Call review of -09 by Sheng Jiang (diff)
Genart Last Call review of -09 by Linda Dunbar (diff)
Secdir Last Call review of -10 by Samuel Weiler (diff)
Genart Telechat review of -10 by Linda Dunbar (diff)
Yangdoctors Early review of -10 by Radek Krejčí (diff)
Assignment Reviewer Samuel Weiler
State Completed
Request Last Call review on draft-ietf-tictoc-1588v2-yang by Security Area Directorate Assigned
Reviewed revision 10 (document currently at 11)
Result Has issues
Completed 2018-10-03
review-ietf-tictoc-1588v2-yang-10-secdir-lc-weiler-2018-10-03-00
I wonder whether there should be a requirement to use authentication when
making updates.  As the doc says:

   Write operations (e.g., edit-config) to these data nodes without
   proper protection can have a negative effect on network operations.

I'm sure someone will argue "if this is used in a closed network, we can avoid
the use of authentication".  Prudence suggests that "closed" networks don't
remain that way forever, and defense-in-depth is advisable.  Let's add a MUST
or at least a SHOULD.