Stephen Farrell has entered the following ballot position for
draft-ietf-ospf-prefix-link-attr-12: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-ospf-prefix-link-attr/



----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------


- The opaque ID field descriptions in sections 2 and 3 read a
little oddly to me. What happens if someone decides to use up
ID=0? Does that mean they can't overwrite that value until
much later maybe? And what if a whole bunch of routers choose
the same value (because it's configured or hard-coded)? I
think you need a bit more text on that. And with only 24 bits
the probability of a collision if you just pick randomly isn't
that low, so I'm not sure if random selection is a good plan
here either. (How often will a new one of these be seen?)

- Do these opaque values get forwarded widely? If so, then I
guess they may provide a covert channel. I didn't see that
mentioned in the security considerations of RFC5250. Is it
mentioned elsewhere? If not, is it worth a mention here?
(Probably not, but thought I'd ask.)

- Thanks for section 5. Nice to see. (Makes me wonder what
those implementations do with the opaque ID though:-)


_______________________________________________
OSPF mailing list
OSPF@ietf.org
https://www.ietf.org/mailman/listinfo/ospf

Reply via email to