Reply to your request dated 24/05/2013
I-D: draft-ietf-manet-nhdp-sec-threats-03
Draft Reviewed By: Abdussalam Baryun (AB)    Dated:06/06/2013
Reviewer Comment A3: Use Cases not considered and the Information Bases Threats.
+++++++++++++++++++++++++++++++++++++++
*Use-cases threats*

Reading the RFC6130 applicability section 3, the I-D does not consider
all the use-cases included in the that section 3.

AB> Does the use-case of NHDP [RFC6130] add any value to the threats,
or the I-D assumes only one use case which is OLSRv2 network.

The NHDP uses RFC5444 packets and RFC5444 messages, so what are the
threats to NHDP use for each? not mentioned in I-D.

RFC6130> NHDP Can use relevant link-layer information if it is available.
AB> is there any threat from that use-case? not mentioned in the I-D.

*Information bases threats*

RFC6130> Appendix F> This appendix illustrates various examples of
physical topologies, as well as how these are logically recorded by
NHDP from the point of
view of the router A. This representation is a composite of
information that would be contained within A’s various Information
Bases after NHDP has been running for sufficiently long time for the
state to converge.

AB> Why the logically recording of the NHDP for all the examples not
mentioned in the I-D and were not threat analysed? If there is similar
level of threats related to all exampels in RFC6130, then please
mention that.


This is my last message, thanks.

Regards
AB

Reply via email to