Hi Wassim,
On Wed, Oct 23, 2024 at 10:32 AM Wassim Haddad via Datatracker <noreply@xxxxxxxx> wrote:
Reviewer: Wassim Haddad
Review result: Ready
Summary: IMHO, this draft is in good shape. It is clear and easy to read.
Major issues: None
Minor issues: None
Proposal:
It would be helpful for the reader if more explanation can be added to the
following text in the “Security Considerations” section:
“While there is limited protection against this, an operator monitoring the
PCEP sessions can detect the use of vendor-specific information, be aware of
the decoding mechanism for this information, and stay vigilant for potential
misuse.”
=> Agree always good to stay vigilant. But on what basis the operator can
detect the potential misuse to prevent potential harm?
How is this as a possible update -
While there is limited protection against this, an operator monitoring the
PCEP sessions can detect the use of vendor-specific information, be aware of
the decoding mechanism for this data, and inspect it accordingly. It’s crucial for
the operator to remain vigilant and monitor for any potential misuse of this object.
Thanks!
Dhruv (Document shepherd)
_______________________________________________
Pce mailing list -- pce@xxxxxxxx
To unsubscribe send an email to pce-leave@xxxxxxxx
-- last-call mailing list -- last-call@xxxxxxxx To unsubscribe send an email to last-call-leave@xxxxxxxx