Last Call Review of draft-mm-wg-effect-encrypt-13
review-mm-wg-effect-encrypt-13-secdir-lc-shekh-yusef-2017-12-03-00
Request | Review of | draft-mm-wg-effect-encrypt |
---|---|---|
Requested revision | No specific revision (document currently at 25) | |
Type | Last Call Review | |
Team | Security Area Directorate (secdir) | |
Deadline | 2017-12-04 | |
Requested | 2017-11-06 | |
Authors | Kathleen Moriarty , Al Morton | |
I-D last updated | 2017-12-03 | |
Completed reviews |
Secdir Telechat review of -09
by Rifaat Shekh-Yusef
(diff)
Genart Telechat review of -10 by Meral Shirazipour (diff) Rtgdir Last Call review of -13 by Ines Robles (diff) Opsdir Last Call review of -13 by Joe Clarke (diff) Genart Last Call review of -13 by Meral Shirazipour (diff) Secdir Last Call review of -13 by Rifaat Shekh-Yusef (diff) Genart Telechat review of -15 by Meral Shirazipour (diff) |
|
Assignment | Reviewer | Rifaat Shekh-Yusef |
State | Completed | |
Request | Last Call review on draft-mm-wg-effect-encrypt by Security Area Directorate Assigned | |
Reviewed revision | 13 (document currently at 25) | |
Result | Ready | |
Completed | 2017-12-03 |
review-mm-wg-effect-encrypt-13-secdir-lc-shekh-yusef-2017-12-03-00
I have reviewed this document as part of the security directorate's ongoing effort to review all IETF documents being processed by the IESG. These comments were written primarily for the benefit of the security area directors. Document editors and WG chairs should treat these comments just like any other last call comments. This Informational document presents the current security and network management practices used in the industry today. The document indicates that these practices will be impacted by the increased use of encryption, and that new protocols development should take this into consideration and balance that with the need for a manageable network. This seems like a useful document that describes what is being done today, to allow the IETF to make an informed decision on new protocols and balance that with the need for network manageability. I do not read it as an endorsement of any of the practices described in the document. The document does not define any new protocol or mechanism, thus the security consideration section seems appropriate to me. Regards, Rifaat