Rtgdir telechat review of draft-ietf-sidrops-bgpsec-algs-rfc8208-bis-04

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Reviewer: Carlos Pignataro
Review result: Has Issues

Hello,

I have been selected as the Routing Directorate reviewer for this draft. The
Routing Directorate seeks to review all routing or routing-related drafts as
they pass through IETF last call and IESG review, and sometimes on special
request. The purpose of the review is to provide assistance to the Routing ADs.
For more information about the Routing Directorate, please see
​http://trac.tools.ietf.org/area/rtg/trac/wiki/RtgDir

Although these comments are primarily for the use of the Routing ADs, it would
be helpful if you could consider them along with any other IETF Last Call
comments that you receive, and strive to resolve them through discussion or by
updating the draft.

Document: draft-ietf-sidrops-bgpsec-algs-rfc8208-bis-04
Reviewer: Carlos Pignataro
Intended Status: Proposed Standard

Summary:
This document specifies the algorithms and parameters for BGPsec (Border
Gateway Protocol Security).

Comments:
This is a clear, comprehensive, and well written document. It states it updates
(if approved) RFC 8208, and I particularly appreciate Section 1.2, "Changes
from RFC 8208", in explicitly showing how. However, it is unclear to me if the
right relationship is to "update" or to "obsolete" RFC 8208. Should this
document be approved and published, would RFC 8208 still be active and
relevant, only updated, or re-written?

Minor Issues:

1.  Introduction

   This document updates [RFC7935] to add support for a) a different
   algorithm for BGPsec certificate requests, which are issued only by
   BGPsec speakers; b) a different Subject Public Key Info format for

CMP: Does this document update RFC7935 or RFC8208 on these issues? Meaning, if
it really updates RFC7935, then it would obsolete RFC 8208. If it does not
obsolete RFC 8208, then it would update RFC 8208 and RFC 7935, perhaps? CMP: I
believe the right metadata would be: Updates: 7935 Obsoletes: 8208

CMP: Also, an editorial: this is a very thick paragraph to parse containing an
enumerated list embedded in it. Should clarity be improved if turned into an
actual list? (a), (b), etc.

   Appendix A contains example BGPsec UPDATE messages as well as the
   private keys used to generate the messages and the certificates
   necessary to validate the signatures.

CMP: Maybe overkill, but might be useful to explicitly say that the Appendix is
non-normative. Just a thought for your consideration.

2.1. Algorithm ID Types

   o  Special-Use Algorithm ID

      Special-Use algorithm IDs span from 0xFA (250) to 0xFE (254).  To
      allow documentation and experimentation to accurately describe

CMP: I was wondering if it is appropriate to use a common block for both
documentation (paper) and experimentation (wire in labs). CMP: In this, I note
that RFC 4727 says:

"  It is not
   appropriate to use addresses in the documentation prefix [RFC3849]
   for experimentation."

CMP: So, while I have no strong position (I think), it might be useful to
consider separating these two semantics with different allocations.

8.  References

CMP: Lastly, I am sure ADs are checking downrefs and the such.

Also Nits:

Found possible IPv6 address '2001:0010:0000:0000:0000:0000:c633:6464' in
position 783 in the paragraph; this doesn't match RFC 3849's suggested
2001:DB8::/32 address range or RFC 4193's Unique Local Address range FC00::/7.

CMP: I hope these are useful.

Thank you,

Carlos Pignataro.




[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux