I did a quite shallow review on the document. Apart from some trivial editorials (that the RFC editor will catch better than I do anyway), and one comment in Section 5, the document is ready to go. In Section 5 on lines: 1006 Some of the RPC operations in this YANG module may be considered 1007 sensitive or vulnerable in some network environments. It is thus 1008 important to control access to these operations. These are the 1009 operations and their sensitivity/vulnerability: 1011 o continuity-check: Generates continuity check. 1013 o path-discovery: Generates path discovery. 1015 which may lead to Denial-of-Service attack on both the local device 1016 and the network or unauthorized source access to some sensitive 1017 information. Some basic questions. What are the mentioned "some networks environment" and why they are vulnerable? How/why the DoS is the identified vulnerability here? And in general lines 1015-1017 are hard (at least to me) to understand in the light of earlier text. The IDnits comments are not relevant (the reported error is just editorial). The YANG module also passed the validation (I used yangvalidator) with date related warnings.