[Last-Call] Re: draft-ietf-raw-architecture-25 telechat Iotdir review

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi Pascal,

 

The link you posted (and indeed all of https://github.com/raw-wg/raw-architecture)

gives me a 404 not found error, so I cannot confirm whether it addresses my editorial comments.

 

For the technical comment, the text you quoted in your email below looks good to me.

 

Thanks!

Dave

 

From: Pascal Thubert <pascal.thubert@xxxxxxxxx>
Sent: Monday, July 7, 2025 4:53 AM
To: Dave Thaler <dave.thaler.ietf@xxxxxxxxx>
Cc: iot-directorate@xxxxxxxx; detnet@xxxxxxxx; draft-ietf-raw-architecture.all@xxxxxxxx; last-call@xxxxxxxx
Subject: Re: draft-ietf-raw-architecture-25 telechat Iotdir review

 

Hello Dave:

 

Many thanks for your review!

 

 

Please see below for my individual responses:

 

 

 

Le jeu. 3 juil. 2025 à 03:12, Dave Thaler via Datatracker <noreply@xxxxxxxx> a écrit :

Document: draft-ietf-raw-architecture
Title: Reliable and Available Wireless Architecture
Reviewer: Dave Thaler
Review result: Ready with Nits

I am the assigned IOTDIR reviewer for this document.

I found the document to be easily readable and well-written, modulo a
bunch of typos and grammatical nits.  A marked up copy with all
of my comments/suggestions to fix editorial nits is at:

https://1drv.ms/b/c/dc2b364f3f06fea8/EX2CTd0YGM9FkbK2YqL-oyAB56Tn91O4M2eqkq_63OsqNA?e=pmZlen

I only had 1 technical comment on the document, which is in the
security considerations section.  Section 6.2 (Forced Access) only
discusses financial cost as a metric that can be attacked.  However,
I believe that forced access can similarly be used to attack other
metrics such as battery life of IOT nodes, or causing congestion on the
forced path, thus reducing throughput, etc.  I believe these should
be similarly called out in that section before publication.

added

"

   Similar attacks may also be used to deplete resources in lower-power
   nodes by forcing additional transmissions for FEC and ARQ, and attack
   metrics such as battery life of the nodes.  By affecting the
   transmissions and the associated routing metrics in one area, an
   attacker may force the traffic and cause congestion along a remote
   path, thus reducing the overall throughput of the network.

"

 

Dave

Many thanks also for your in-depth corrections in the pdf. I applied them all.

 

all the best;

 

--

Pascal

-- 
last-call mailing list -- last-call@xxxxxxxx
To unsubscribe send an email to last-call-leave@xxxxxxxx

[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux