On 5/15/16 09:39, Stephen Farrell wrote:
----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------


Thanks for handling my discuss point. The comments below
are old and I didn't check if you'd done anything about them
in -10 but that's fine either way unless you want to chat more
about 'em.

--------- OLD COMMENTS

- 5.2: Requested/Applied Operation Data - I would guess
this can include sensitive values, e.g. keys/passwords.
Shouldn’t you say to at least be careful of those, or
perhaps to not log them, or to zero out known sensitive
values before logging?

- 7.2: how is privacy an implementation detail?

- 7.4: What does "being preferred" mean in 2119 terms? Why
is one of the three options not mandatory-to-implement?



All of these should now be addressed in -10.  Thanks again for the review.

Joe

_______________________________________________
i2rs mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/i2rs

Reply via email to