Skip to main content

Last Call Review of draft-mm-wg-effect-encrypt-13
review-mm-wg-effect-encrypt-13-secdir-lc-shekh-yusef-2017-12-03-00

Request Review of draft-mm-wg-effect-encrypt
Requested revision No specific revision (document currently at 25)
Type Last Call Review
Team Security Area Directorate (secdir)
Deadline 2017-12-04
Requested 2017-11-06
Authors Kathleen Moriarty , Al Morton
I-D last updated 2017-12-03
Completed reviews Secdir Telechat review of -09 by Rifaat Shekh-Yusef (diff)
Genart Telechat review of -10 by Meral Shirazipour (diff)
Rtgdir Last Call review of -13 by Ines Robles (diff)
Opsdir Last Call review of -13 by Joe Clarke (diff)
Genart Last Call review of -13 by Meral Shirazipour (diff)
Secdir Last Call review of -13 by Rifaat Shekh-Yusef (diff)
Genart Telechat review of -15 by Meral Shirazipour (diff)
Assignment Reviewer Rifaat Shekh-Yusef
State Completed
Request Last Call review on draft-mm-wg-effect-encrypt by Security Area Directorate Assigned
Reviewed revision 13 (document currently at 25)
Result Ready
Completed 2017-12-03
review-mm-wg-effect-encrypt-13-secdir-lc-shekh-yusef-2017-12-03-00
I have reviewed this document as part of the security directorate's
ongoing effort to review all IETF documents being processed by the
IESG.  These comments were written primarily for the benefit of the
security area directors.  Document editors and WG chairs should treat
these comments just like any other last call comments.

This Informational document presents the current security and network 
management practices used in the industry today. The document indicates
that these practices will be impacted by the increased use of encryption,
and that new protocols development should take this into consideration
and balance that with the need for a manageable network.

This seems like a useful document that describes what is being done today,
to allow the IETF to make an informed decision on new protocols and balance
that with the need for network manageability. I do not read it as an 
endorsement of any of the practices described in the document.

The document does not define any new protocol or mechanism, thus the 
security consideration section seems appropriate to me.

Regards,
 Rifaat