Last Call Review of draft-ietf-sipping-nat-scenarios-
review-ietf-sipping-nat-scenarios-secdir-lc-kelly-2011-04-06-00

Request Review of draft-ietf-sipping-nat-scenarios
Requested rev. no specific revision (document currently at 15)
Type Last Call Review
Team Security Area Directorate (secdir)
Deadline 2011-03-18
Requested 2011-02-22
Authors Gonzalo Camarillo, Francois Audet, Jonathan Rosenberg, Chris Boulton
Draft last updated 2011-04-06
Completed reviews Secdir Last Call review of -?? by Scott Kelly
Assignment Reviewer Scott Kelly
State Completed
Review review-ietf-sipping-nat-scenarios-secdir-lc-kelly-2011-04-06
Review completed: 2011-04-06

Review
review-ietf-sipping-nat-scenarios-secdir-lc-kelly-2011-04-06

I have reviewed this document as part of the security directorate's ongoing effort to review all IETF documents being processed by the IESG.  These comments were written primarily for the benefit of the security area directors.  Document editors and WG chairs should treat these comments just like any other last call comments.

This draft is a summary of best practices/recommendations for SIP session NAT traversal. It is well-written, although to say it is easy to understand (especially for someone not steeped in SIP NAT traversal lore) would be to significantly understate the ground it covers.

The security considerations is among the most concise I've ever seen, simply stating "There are no Security Considerations beyond the ones inherited by reference." My security geek hackles went up a little when I read that, but after looking at some of the referenced RFCs and thinking about it for a bit, I couldn't think of any attacks that aren't already covered in the security considerations of those documents. So, I don't have any concrete criticisms or concerns with this document.

--Scott