Roman Danyliw has entered the following ballot position for
draft-ietf-isis-yang-isis-cfg-40: Discuss

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-isis-yang-isis-cfg/



----------------------------------------------------------------------
DISCUSS:
----------------------------------------------------------------------

Section 7.  A DISCUSS for discussion.  Thanks for this enumeration of writeable
and readable nodes which could be considered sensitive.  Per the list of nodes
that could expose the topology of the network, wouldn’t the following also have
sensitive topology information:

-- /isis/local-rib

-- /isis/hostnames

Furthermore, shouldn’t the log files also be protected as the errors or status
posted there could also leak topology information: -- /isis/spf-log

-- /isis/lsp-log




_______________________________________________
Lsr mailing list
Lsr@ietf.org
https://www.ietf.org/mailman/listinfo/lsr

Reply via email to