Hi Warren,
Thanks for that, I'll publish the revision right after your confirmation
(for the security question). Please see inline ([JI] tag).
On 5/20/23 22:02, Warren Kumari wrote:
Hi there, authors (and WG),
Thank you for this document. In general I found it clear, useful, and
an easy read.
I do have a few comments/nits; addressing these now should help the IETF
LC and IESG evaluation go more smoothly.
The majority of these are simply readability comments, but it does end
with a more important question…
Please SHOUT loudly once you've had a chance to address these, and I'll
start IETF LC.
S1:
O: "Active measurements at Internet-scale can target either collaborating
parties or non-collaborating ones."
P: "Active measurements can target either collaborating
parties or non-collaborating ones."
C: Even at none Internet-scale the target can be collaborating, or not.
[JI] Applied 2 times (abstract and intro).
O: "This document suggests some simple techniques allowing any party or
organization to understand:"
P: "This document suggests some simple techniques to allow any party or
organization to understand:"
C: Flow / grammar.
[JI] Applied.
O: "Note: it is expected that only researchers with no bad intentions
will use these techniques, although anyone might use them. This is
discussed in Section 7."
C: "with no bd intentions" seems a bit clunky - perhaps "with good
intentions" instead?
[JI] Applied 2 times ("with good intentions").
S4:
O: "This could be:
* thing
* other thing
* more other thing
* etc."
P: "Examples of this include:
* thing
* other thing
* more other thing"
C: Having 'etc' as it's own bullet seems somewhat odd.
[JI] Applied ("etc" bullet removed).
O: "The probe description URI should start at the first octet of the
payload and should be terminated by an octet of 0x00, i.e., it must be
null terminated."
C: So, which is it? It should be null terminated. or it must be null
terminated?
[JI] Good catch! Applied ("must" for all).
S5:
O: "The advantage of using the in-band technique is to cover the cases
where the out-of-band technique is not possible, as listed above."
P: "The primary advantage of using the in-band technique is that it
covers the cases where the out-of-bounds technique is not feasible (as
[JI] you probably meant out-of-band, right? :-D
described above)"
C: Readability.
[JI] Applied.
P: "The primary disadvantage is that it potentially biases the
measurements, since packets with the Probe Description URI might be
discarded."
C: Readability
[JI] Applied.
S6:
O: "Executing some measurement experiences over the global Internet
obviously require some ethical considerations when transit/
destination non-solicited parties are involved."
P: "Executing measurement experiments over the global Internet
obviously requires ethical consideration, especially when transit/
destination non-solicited parties are involved."
C: Readability.
[JI] Applied (+ s/non-solicited/unsolicited/g).
S7: Security Considerations
C: I wonder if this should speak more about "false flag" operations? I
send 1Mpps, and include a probe-attribution saying that I'm Eric Vynke,
at +1-212-555-1212?? Suddenly you have hundreds of irate network admins
calling you at 3AM....
[JI] What about:
[JI] OLD: "This information is provided to identify the source and
intent of specific probes, but there is no authentication possible for
the inline information. As a result, a malevolent actor could provide
false information while conducting the probes, so that the action is
attributed to a third party. As a consequence, the recipient of this
information cannot trust this information without confirmation. If a
recipient cannot confirm the information or does not wish to do so, it
should treat the flows as if there were no attribution."
[JI] NEW: "This information is provided to identify the source and
intent of specific probes, but there is no authentication possible for
the inline information. Therefore, a malevolent actor could provide
false information while conducting the probes, so that the action is
attributed to a third party. In that case, not only this third party
would be wrongly accused, but it might also be exposed to unwanted
solicitations (e.g., angry emails or phone calls, if the malevolent
actor used someone else's email address or phone number). As a
consequence, the recipient of this information cannot trust it without
confirmation. If a recipient cannot confirm the information or does not
wish to do so, it should treat the flows as if there were no attribution."
Thank you again; I know that making edits to address nits can be
annoying, but we are expecting many people to read and review the
document, and so having it polished is important and polite (also, once
people start commenting on nits, they seem to continue :-) )
[JI] Thank YOU!
Justin
W
_______________________________________________
OPSEC mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/opsec