Hi Corey, 

Thanks for the review. 

> On Feb 6, 2025, at 5:40 PM, Corey Bonnell via Datatracker <[email protected]> 
> wrote:
> 
> Reviewer: Corey Bonnell
> Review result: Ready
> 
> My primary area of experience is PKI, and this is my first foray for delving
> into YANG. I hope the comments below are useful despite that.
> 
> I have reviewed the document and found that the security considerations 
> section
> provides appropriate guidance on the use of secure transport protocols as well
> as access controls for reading and writing the nodes defined in this document.
> Additionally, there is sufficient enumeration of the specific risks posed by
> allowing an attacker write access to the nodes defined in the document or
> allowing an attacker read access to nodes. Given this, I believe the current
> security considerations section is sufficient.
> 
> Nit:
> In the Security Considerations section, replace "Dos" with "DoS" in several
> locations for consistency.

I see we have 2 instances of this - will fix. 

> 
> Question:
> Should the various read-only nodes defined in this document (such as
> "prefix-sid-sub-tlvs") be marked as "config false" as they are not writable?

Since these TLV and Sub-TLV augmentations are additions to "config false" 
containers, they are
are also "config false".  Note the "ro" in the tree diagrams in section 2.

Thanks,
Acee




> 
> 
> 

_______________________________________________
Lsr mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to