Linda,

As written by Justin below, the -06 should make it clear that nothing is 
changing in the data and control planes of routers or any forwarding devices.

The probe attribution is only done off-line (after the measurement) when 
required by a security analyst based on a captured packet (e.g., tcpdump).

We hope it clarifies your issue,

Regards

-éric


On 17/06/2023, 17:09, "Justin Iurman" <[email protected] 
<mailto:[email protected]>> wrote:


Hi Linda,


The new published version (-06) clarifies what you mentioned in your 
review, to avoid any confusion. Hope it's better now.


Thanks,
Justin


On 6/8/23 18:06, Linda Dunbar via Datatracker wrote:
> Reviewer: Linda Dunbar
> Review result: Not Ready
> 
> I have reviewed this document as part of the Ops area directorate's ongoing
> effort to review all IETF documents being processed by the IESG. These
> comments were written primarily for the benefit of the Ops area directors.
> Document editors and WG chairs should treat these comments just like any other
> last-call comments.
> 
> Summary:
> This document describes the method for any organizations to send queries to
> understand the received unsolicited probing packets.
> 
> Issues:
> - Are those queries generated automatically?
> - If the queries are generated automatically, does it require routers upgrade
> to support the auto-generating of those queries? - If the queries are 
> generated
> manually, the draft should give some detailed examples since those queries 
> will
> be generated by people not coming to IETF. - Today, most routers ignore the
> Internet probes they don't support. What are the problems of ignoring them?
> 
> Best Regards,
> Linda Dunbar
> 
> 
> 



_______________________________________________
OPSEC mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/opsec

Reply via email to