Hi, Eric,

A few days ago this doc came to mind, and I was wondering it had been abandoned. So thanks for rev'ing and pushing ti forward!

Regards,
Fernando




On 8/2/21 16:01, Eric Vyncke (evyncke) wrote:
This new revision (long due...) addresses the comments received from the OPS 
directorate (Tim Chown and Don Smith) + Mohamed Boucadair.

The authors still need to address the IETF Last Call comments from the 
following directorates: IoT (Ted Lemon), Routing (Acee Lindem), Security (Linda 
Dunbar), and GEN (Erik Kline).

Stay tuned but do not hold your breath __

-éric


-----Original Message-----
From: OPSEC <[email protected]> on behalf of "[email protected]" 
<[email protected]>
Reply-To: "[email protected]" <[email protected]>
Date: Monday, 8 February 2021 at 19:56
To: "[email protected]" <[email protected]>
Cc: "[email protected]" <[email protected]>
Subject: [OPSEC] I-D Action: draft-ietf-opsec-v6-22.txt


     A New Internet-Draft is available from the on-line Internet-Drafts 
directories.
     This draft is a work item of the Operational Security Capabilities for IP 
Network Infrastructure WG of the IETF.

             Title           : Operational Security Considerations for IPv6 
Networks
             Authors         : Eric Vyncke
                               Kiran Kumar
                               Merike Kaeo
                               Enno Rey
        Filename        : draft-ietf-opsec-v6-22.txt
        Pages           : 55
        Date            : 2021-02-08

     Abstract:
        Knowledge and experience on how to operate IPv4 securely is
        available: whether it is the Internet or an enterprise internal
        network.  However, IPv6 presents some new security challenges.  RFC
        4942 describes the security issues in the protocol, but network
        managers also need a more practical, operations-minded document to
        enumerate advantages and/or disadvantages of certain choices.

        This document analyzes the operational security issues in several
        types of network (enterprises, service providers and residential
        users) and proposes technical and procedural mitigation techniques.
        The residential users case assumes a managed ISP CPE device.  Some
        very specific places of a network such as the Internet of Things and
        unmanaged home networks are not discussed in this document.


     The IETF datatracker status page for this draft is:
     https://datatracker.ietf.org/doc/draft-ietf-opsec-v6/

     There are also htmlized versions available at:
     https://tools.ietf.org/html/draft-ietf-opsec-v6-22
     https://datatracker.ietf.org/doc/html/draft-ietf-opsec-v6-22

     A diff from the previous version is available at:
     https://www.ietf.org/rfcdiff?url2=draft-ietf-opsec-v6-22


     Please note that it may take a couple of minutes from the time of 
submission
     until the htmlized version and diff are available at tools.ietf.org.

     Internet-Drafts are also available by anonymous FTP at:
     ftp://ftp.ietf.org/internet-drafts/


     _______________________________________________
     OPSEC mailing list
     [email protected]
     https://www.ietf.org/mailman/listinfo/opsec

_______________________________________________
OPSEC mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/opsec



--
Fernando Gont
SI6 Networks
e-mail: [email protected]
PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492




_______________________________________________
OPSEC mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/opsec

Reply via email to