Opsdir telechat review of draft-ietf-lime-yang-connectionless-oam-methods-10

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Reviewer: Jouni Korhonen
Review result: Ready

I did a quite shallow review on the document. Apart from some trivial
editorials (that the RFC editor will catch better than I do anyway), and one
comment in Section 5, the document is ready to go.

In Section 5 on lines:
1006       Some of the RPC operations in this YANG module may be considered
1007       sensitive or vulnerable in some network environments.  It is thus
1008       important to control access to these operations.  These are the
1009       operations and their sensitivity/vulnerability:
1011       o  continuity-check: Generates continuity check.
1013       o  path-discovery: Generates path discovery.
1015       which may lead to Denial-of-Service attack on both the local device
1016       and the network or unauthorized source access to some sensitive
1017       information.

Some basic questions. What are the mentioned "some networks environment" and
why they are vulnerable? How/why the DoS is the identified vulnerability here?
And in general lines 1015-1017 are hard (at least to me) to understand in the
light of earlier text.

The IDnits comments are not relevant (the reported error is just editorial).

The YANG module also passed the validation (I used yangvalidator) with date
related warnings.





[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Fedora Users]