Last Call Review of draft-ietf-tcpm-tcpmss-
review-ietf-tcpm-tcpmss-secdir-lc-wierenga-2012-06-19-00

Request Review of draft-ietf-tcpm-tcpmss
Requested rev. no specific revision (document currently at 05)
Type Last Call Review
Team Security Area Directorate (secdir)
Deadline 2012-05-30
Requested 2012-05-18
Draft last updated 2012-06-19
Completed reviews Genart Last Call review of -?? by Martin Thomson
Secdir Last Call review of -?? by Klaas Wierenga
Assignment Reviewer Klaas Wierenga
State Completed
Review review-ietf-tcpm-tcpmss-secdir-lc-wierenga-2012-06-19
Review result Ready
Review completed: 2012-06-19

Review
review-ietf-tcpm-tcpmss-secdir-lc-wierenga-2012-06-19

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi,

I have reviewed this document as part of the security directorate's
ongoing effort to review all IETF documents being processed by the
IESG.  These comments were written primarily for the benefit of the
security area directors.  Document editors and WG chairs should treat
these comments just like any other last call comments.

General comments:
==================

This is a short, clear and to the point draft. I have only a few
general comments

1 (introduction)
- ----------------

- - Please expand MSS on first use

- - "(see appendix A)" and "but there still seems to be some confusion"

This sounds pretty vague to me. I thought Appendix A would be a
verbatim copy of the text from 1122, but it is much more, and I
appreciated the discussion. I propose to make that explicit:

"RFC1122 clarified the MSS option, but confusion remains as discussed
in Appendix A"

Security Considerations:
========================
I don't really think what you have written down here qualifies as
security considerations. It sort of hints to a denial-of-service, but
I don't see any evil, just an operational problem. What I wonder about
(but I am not knowledgable to judge) is whether wrong MSS size
settings could be exploited for for example buffer overflow attacks.


Cheers,

Klaas
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.17 (Darwin)
Comment: GPGTools - 

http://gpgtools.org


Comment: Using GnuPG with Mozilla - 

http://enigmail.mozdev.org/



iEYEARECAAYFAk/GNzAACgkQH2Wy/p4XeFJQrACdEZggKbo9y+3p3W35N7FBzpho
izcAoIl1J9o04ymIXyYmEZP+IiHRH18I
=aIb0
-----END PGP SIGNATURE-----