Roman Danyliw has entered the following ballot position for draft-ietf-isis-yang-isis-cfg-40: Discuss
When responding, please keep the subject line intact and reply to all email addresses included in the To and CC lines. (Feel free to cut this introductory paragraph, however.) Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html for more information about IESG DISCUSS and COMMENT positions. The document, along with other ballot positions, can be found here: https://datatracker.ietf.org/doc/draft-ietf-isis-yang-isis-cfg/ ---------------------------------------------------------------------- DISCUSS: ---------------------------------------------------------------------- Section 7. A DISCUSS for discussion. Thanks for this enumeration of writeable and readable nodes which could be considered sensitive. Per the list of nodes that could expose the topology of the network, wouldn’t the following also have sensitive topology information: -- /isis/local-rib -- /isis/hostnames Furthermore, shouldn’t the log files also be protected as the errors or status posted there could also leak topology information: -- /isis/spf-log -- /isis/lsp-log _______________________________________________ Lsr mailing list Lsr@ietf.org https://www.ietf.org/mailman/listinfo/lsr