Dear Robert Sparks. Regarding the 6lo use cases draft, thanks for your valuable comments.
We updated the 6lo use cases draft to resolve your comment of Security Considerations. https://www.ietf.org/archive/id/draft-ietf-6lo-use-cases-14.html#name-security-considerations-8 It is appreciated to review the updated Security Consideration section. Best regards Yong-Geun. 2022년 7월 13일 (수) 오전 12:01, Robert Sparks <rjspa...@nostrum.com>님이 작성: > > On 7/11/22 8:16 PM, Yong-Geun Hong wrote: > > > Dear Robert Sparks. > > First, thanks for your valuable review and comments of the 6lo use cases > draft. > Second, sorry for the late reply. I have acknowledged your email but due > to other business, I lost the chance to reply immediately. > > During the update of this draft, I tried to resolve your comments in the > revision. > The following are my responses for your comments. > > 1. Update the section of Security Considerations > As you mentioned, it seems that the use cases draft does not have > close relation with security issues but it has several parts which are > related to security issues in the main body. > As you recommend, I added the summary texts in the section of Security > Considerations. > > I don't think the addition is sufficient. As written it's almost cryptic. > This section should say _why_ L2 security is required, and what the threats > are if it is not provided. > > > 2. Handling of Appendix A > In old versions of this draft, the content in Appendix A is located in > the main body. During progressing this draft and resolving the comments, it > was moved to Appendix A. > At the IETF 114, I would ask for directions and decide how to proceed. > > > 3. Misuse of technology description and marketing words > As you pointed, the draft has some parts which are recognized as > marketing words. Because we invited some experts who are involved in the > specific area, some marketing words could be included. > I tried to change the marketing words to technology words in the revision. > > You could find the revised version of this draft in here : > https://datatracker.ietf.org/doc/draft-ietf-6lo-use-cases > > Once again, thanks for your review and comments > > Best regards. > > Yong-Geun. > > 2022년 4월 6일 (수) 오전 6:09, Robert Sparks <rjspa...@nostrum.com>님이 작성: > >> Apologies, there's an edit-buffer glitch below, corrected in what's >> uploaded at >> >> https://datatracker.ietf.org/doc/review-ietf-6lo-use-cases-12-secdir-lc-sparks-2022-04-05/ >> . >> >> On 4/5/22 4:04 PM, Robert Sparks via Datatracker wrote: >> > Reviewer: Robert Sparks >> > Review result: Has Issues >> > >> > I have reviewed this document as part of the security directorate's >> ongoing >> > effort to review all IETF documents being processed by the IESG. These >> comments >> > were written primarily for the benefit of the security area directors. >> Document >> > editors and WG chairs should treat these comments just like any other >> last call >> > comments. >> > >> > This document has issues to address before publication as an >> Informational RFC >> > >> > Issues: >> > >> > >From the abstract: "The document targets an audience who would like to >> > understand and evaluate running end-to-end IPv6 over the constrained >> node >> > networks for local or Internet connectivity." >> > >> > Its security considerations section claims "Security considerations are >> not >> > directly applicable to this document". Yet the text of the draft has >> several >> > places that rightly call out thing like "there exist implications for >> privacy", >> > "privacy also becomes a serious issue", and "the assumption is that L2 >> security >> > must be present." A summary of these things in the security >> considerations >> > section seems prudent. At _least_ call out again the assumption about L2 >> > security. >> > >> > The "Security Requirement"A summary of these things in the security >> > considerations section seems prudent. At _least_ call out again the >> assumption >> > about L2 security. >> > >> > The "Security Requirement" row in Table 2 is not well explained. The >> values in >> > that row are explained at all. (For instance, the word "Partially" >> appears >> > exactly once in the document - it is unclear what it means). >> > >> > Nits/Comments: >> > >> > Appendix A is neither introduced nor referenced from the body of the >> document. >> > Why is it here? >> > >> > I'm a little concerned about some of the technology descriptions >> possibly >> > moving beyond simple facts into interpretation or even marketing. The >> last >> > paragraph of section 2.5 is a particularly strong example. Look for >> phrases >> > section 4 that include "targets" or "targeted by" and make sure that's >> what the >> > organizations ins that define those technologies say (consider >> references). >> > >> > At 'superior "range"', why is range in quotes? Think about >> restructuring the >> > sentences that use 'superior' to avoid the connotation of "better >> than". All >> > this document really needs to acknowledge is "goes further". >> > >> > >> > >> > _______________________________________________ >> > secdir mailing list >> > sec...@ietf.org >> > https://www.ietf.org/mailman/listinfo/secdir >> > wiki: https://trac.ietf.org/trac/sec/wiki/SecDirReview >> >
_______________________________________________ 6lo mailing list 6lo@ietf.org https://www.ietf.org/mailman/listinfo/6lo