Tony, I believe those changes will address my comments. If I don’t get around to updating my review, please accept this email as “proof” :)
From: Antoni Przygienda <p...@juniper.net> Date: Saturday, October 22, 2022 at 5:45 AM To: Rich Salz <rs...@akamai.com>, "sec...@ietf.org" <sec...@ietf.org> Cc: "draft-ietf-lsr-isis-flood-reflection....@ietf.org" <draft-ietf-lsr-isis-flood-reflection....@ietf.org>, "last-c...@ietf.org" <last-c...@ietf.org>, "lsr@ietf.org" <lsr@ietf.org> Subject: Re: Secdir last call review of draft-ietf-lsr-isis-flood-reflection-10 Rich, thanks for comments 1. I will explain in glossary quickly that L1 and L2 pertains to ISIS concepts 2. Paragraph moved before figure 3. Paragraph 1 and 2 talk about different tunnel types hence I kept it separate. I pointed out the tunnel type. * Tony From: Rich Salz via Datatracker <nore...@ietf.org> Date: Monday, 3 October 2022 at 18:23 To: sec...@ietf.org <sec...@ietf.org> Cc: draft-ietf-lsr-isis-flood-reflection....@ietf.org <draft-ietf-lsr-isis-flood-reflection....@ietf.org>, last-c...@ietf.org <last-c...@ietf.org>, lsr@ietf.org <lsr@ietf.org> Subject: Secdir last call review of draft-ietf-lsr-isis-flood-reflection-10 [External Email. Be cautious of content] Reviewer: Rich Salz Review result: Has Nits I am a routing naïf and do not have a lot of time these days. I hope this review is still useful, anyway. The glossary was very helpful. I still don't have a clear understanding of L1 and L2. The picture is a tour de force. The description "Figure 1 is an example..." paragraph should be moved before the picture, not directly after it. Sections 6 and 7 indicate, to me, that this document is comprehensive and informed by real-world concerns. Sec 9, Security Considerations. This is where I did the most careful reading. "If an attacker should be able..." s/should be able/can/ s/could be in most extreme case/could be in THE most extreme case/ It was a bit surprising to me to see the same sentence at the end of both paragraph 1 and paragraph 2. Maybe remove them and move them to the start of paragraph 3. I think the risks are well-described, and the importance to preventing is made. Is it possible to mitigate the damage if a risk occurs? "No" is a reasonable answer. Juniper Business Use Only
_______________________________________________ Lsr mailing list Lsr@ietf.org https://www.ietf.org/mailman/listinfo/lsr