Skip to main content

Last Call Review of draft-livingood-woundy-p4p-experiences-
review-livingood-woundy-p4p-experiences-secdir-lc-kelly-2009-07-03-00

Request Review of draft-livingood-woundy-p4p-experiences
Requested revision No specific revision (document currently at 10)
Type Last Call Review
Team Security Area Directorate (secdir)
Deadline 2009-06-30
Requested 2009-05-23
Authors Y. Richard Yang , Laird Popkin , Richard Woundy , Chris Griffiths , Jason Livingood
I-D last updated 2009-07-03
Completed reviews Secdir Last Call review of -?? by Scott G. Kelly
Assignment Reviewer Scott G. Kelly
State Completed
Request Last Call review on draft-livingood-woundy-p4p-experiences by Security Area Directorate Assigned
Completed 2009-07-03
review-livingood-woundy-p4p-experiences-secdir-lc-kelly-2009-07-03-00
I have reviewed this document as part of the security directorate's
ongoing effort to review all IETF documents being processed by the
IESG.  These comments were written primarily for the benefit of the
security area directors.  Document editors and WG chairs should treat
these comments just like any other last call comments.

This is in informational document describing a technical trial of a
proposed approach to peer-to-peer traffic flow improvement. Here's the
security considerations section:

"7.  Security Considerations

   There are no security considerations in this document.

   NOTE TO RFC EDITOR: PLEASE REMOVE THIS NULL SECTION PRIOR TO
   PUBLICATION."


The current instructions to RFC authors are at



http://www.rfc-editor.org/rfc-editor/instructions2authors.txt



This document says "All RFCs must contain a section that discusses the
security considerations relevant to the specification in the RFC; see
       [Secur03] for more information.", so the RFC editor is probably
not going to remove this section. RFC 3552 (referenced as Secur03 above)
gives further guidance.

I believe that the mechanism proposed/described by the document
certainly has security considerations, and any developers/deployers of
such a protocol should do a thorough analysis as a fundamental element
of the effort. However, since this document is an informational
presentation of a study that was undertaken, it is probably most
appropriate to simply state how security considerations were addressed.

If security was entirely ignored (the network was assumed to be benign,
messages between clients and trackers were sent in the clear with no
authentication), it is probably important to explicitly say so. If
security mechanisms were employed, then I think that a discussion of
what threats were perceived and addressed might be helpful in
interpreting the data.

--Scott
_______________________________________________
secdir mailing list
secdir at mit.edu


https://mailman.mit.edu/mailman/listinfo/secdir