Mike Bishop has entered the following ballot position for
draft-ietf-bfd-secure-sequence-numbers-25: Abstain

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to 
https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ 
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-bfd-secure-sequence-numbers/



----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

If there are no implementations and no plans to implement, why are we
publishing this?

In Section 3.1, "is fully use" doesn't parse. Given that it talks about the
computation taking noticeable time, I thought this wasn't a simple typo of "is
fully used" (i.e. consumed), but Section 11.1 suggests that it might be. Should
this be something like "becomes active" or more explicitly "after a packet is
received which falls into the current page"? Do we really wait for all values
on one page to have been consumed before beginning computation of the next page
when "the next page calculation is complex, and there is a long period of time
available before the next page is needed"?

I do appreciate the discussion in the Security Considerations of why the
potential attacks are likely irrelevant, and would suggest copying similar
language into draft-ietf-bfd-optimizing-authentication.

===NITS FOLLOW===
Section 3.1, "of design" => "by design"?
Section 10, "Where the" => "The"
Section 15.1.1, "infeasibe" => "infeasible"



Reply via email to