On 5/15/16 09:39, Stephen Farrell wrote:
----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------
Thanks for handling my discuss point. The comments below
are old and I didn't check if you'd done anything about them
in -10 but that's fine either way unless you want to chat more
about 'em.
--------- OLD COMMENTS
- 5.2: Requested/Applied Operation Data - I would guess
this can include sensitive values, e.g. keys/passwords.
Shouldn’t you say to at least be careful of those, or
perhaps to not log them, or to zero out known sensitive
values before logging?
- 7.2: how is privacy an implementation detail?
- 7.4: What does "being preferred" mean in 2119 terms? Why
is one of the three options not mandatory-to-implement?
All of these should now be addressed in -10. Thanks again for the review.
Joe
_______________________________________________
i2rs mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/i2rs