I have reviewed this document as part of the security directorate's ongoing effort to review all IETF documents being processed by the IESG. These comments were written primarily for the benefit of the security area directors. Document editors and WG chairs should treat these comments just like any other last call comments. In particular, I don't know a lot about MPLS, whatever "TP"s and "G"s and "PWE"s are attached to it. I've tried to read this from a security point of view only. The GenART review has given an excellent editorial look at the document, so I won't try to repeat that. I have only one concern, from the security viewpoint, and I'm not sure how much of a concern it is. Sections 2.1 to 2.3 list more than 130 requirements for the MPLS-TP control plane. Section 2.4, "Security Requirements", then says this: There are no specific MPLS-TP control plane security requirements. The existing framework for MPLS and GMPLS security is documented in [RFC5920] and that document applies equally to MPLS-TP. I have no way to tell whether, perhaps, some of those 130+ functional requirements ought to be generating some security requirements beyond what's in RFC 5920. For example, requirement 14, just to pick one: 14. The MPLS-TP control plane must support the logical separation of the control plane from the management and data plane [RFC5654, requirement 15]. Note that this implies that the addresses used in the control plane are independent from the addresses used in the management and data planes. Is it possible that requiring logical separation of the control plane from the management and data planes might also introduce a security requirement with respect to that separation? Perhaps the working group and the joint effort have already considered this for each requirement, and all is well. I can't tell: there are far too many requirements and variables here, and my knowledge of MPLS is far too slight. I just think it's important to bring up this point, and whenever I see discussion of out-of-band controls, I wonder about the security implications. The security considerations section (6) points out that this document is showing how other specifications provide the means to meet the requirements listed here, and that those specifications have (and possible future extension specifications will have) security considerations sections that properly cover the issues. I think that's correct; my concern is only about whether any security requirements might have been overlooked, which might necessitate an unanticipated adaptation in order to use, say, GMPLS to satisfy functional requirements here. Barry