Linda, As written by Justin below, the -06 should make it clear that nothing is changing in the data and control planes of routers or any forwarding devices.
The probe attribution is only done off-line (after the measurement) when required by a security analyst based on a captured packet (e.g., tcpdump). We hope it clarifies your issue, Regards -éric On 17/06/2023, 17:09, "Justin Iurman" <[email protected] <mailto:[email protected]>> wrote: Hi Linda, The new published version (-06) clarifies what you mentioned in your review, to avoid any confusion. Hope it's better now. Thanks, Justin On 6/8/23 18:06, Linda Dunbar via Datatracker wrote: > Reviewer: Linda Dunbar > Review result: Not Ready > > I have reviewed this document as part of the Ops area directorate's ongoing > effort to review all IETF documents being processed by the IESG. These > comments were written primarily for the benefit of the Ops area directors. > Document editors and WG chairs should treat these comments just like any other > last-call comments. > > Summary: > This document describes the method for any organizations to send queries to > understand the received unsolicited probing packets. > > Issues: > - Are those queries generated automatically? > - If the queries are generated automatically, does it require routers upgrade > to support the auto-generating of those queries? - If the queries are > generated > manually, the draft should give some detailed examples since those queries > will > be generated by people not coming to IETF. - Today, most routers ignore the > Internet probes they don't support. What are the problems of ignoring them? > > Best Regards, > Linda Dunbar > > > _______________________________________________ OPSEC mailing list [email protected] https://www.ietf.org/mailman/listinfo/opsec
