Alissa Cooper has entered the following ballot position for
draft-ietf-trill-directory-assist-mechanisms-11: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-trill-directory-assist-mechanisms/



----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

Since this document implies the creation of centralized databases of
addressing information, I think it would help to call out in Section 6
the need to secure the directory contents themselves, not just against
abuses of the push or pull services but in general against unauthorized
access.

Also, I recall in prior evaluations of TRILL documents some discussion
about how TRILL deals with ephemeral MAC addresses and my recollection is
that they are likely prohibited by policy on TRILL networks. But if there
is some interaction between ephemeral MAC addresses and the services
described in this document that would be good for implementors to be
aware of, those are probably worth mentioning.


_______________________________________________
trill mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/trill

Reply via email to