Hi,

Please find my comments reading the document. In addition to these comments
I have two questions regarding the policy model.

The draft provide example for a policy where actions are "deny" or "allow".
I am wondering if I2NSF considers also more complex actions and be a
service such as "anti-dns-reflexion-attack" - or if there is a preferred
way to do this?

In addition, although the draft is describing policies, but is there any
"future work" or intentions to model strategies. In other words, do we
think that strategies will have their own structure or do we expect
strategies being described vi the policies conditions?

BR,

Daniel



3.  Policy model
   """
   Moreover, it is known that packet
   filter rules are prioritized and it is possible to specify a default
   action.  More precisely, packet filters implement the First Matching
   Rule (FMR) or Last Matching Rule (LMR) resolution strategies.
   """
My understanding  is that the document provides an abstract way to describe
policies. It is not clear to me weather LMR or FMT are part of the policies
themselves. I think what confuses me is that LMR or FMT are not part of
policies, but instead related to how to interpret a "set of policies" in
which case it would not be a parameter of a single policy. What is not
clear to me is whether LMR FMT are part of the policies (implicit or
explicit), or the implementation of the policies - that is given a set of
policies, and the southbound NFS the implementation the controller uses one
or the other.

   """
   For instance, in Figure
   Figure 1 the conditions are s1 [ S1 (read as s1 subset of S1) and s2
   [ S2 (s1 subset of S2), both s1 and s2 match the packet x1, while
   only s2 matches x2.
   """
The sentence needs some nits "Figure" is repeated and ther eis a "]"
missing. I also find the notation confusing. From the text this is what I
understand: s1 is a condition. On the other hand I also understand that s1
is the value of the selector that is testes against S1 the subset of
accepatble values. It also seems to me that index for packets and those
used for the selectors are different and so it may be better to use a
different notation. I might by wrong but here is the text I would expect:

   NEW TEXT:
   """
   A condition selector c(S, x.s) is met with packet x if the selector s
from x is a subset of S.
   For instance, in Figure 1 the multiselector condition is expressed as
the intersection of  selector conditions c([IP_start, ..., IP_stop],
x.ip_src) and c([port_start, ..., port_stop], x.port_dst).
   """

  Some nits should be corrected from the line above.

     c = s1 X s2 X ...  X sm [ S1 \times S1 X S2 X ...  X Sm = S

I also suggest that if you are using a specific notation with [] you
explicitly provide the explanation of the notation. It seems you use the
notation and then add text to clarify the use of it. I beleive this could
be done once for all and have formal and informal description separated.

In the text below, it is not clear to me how the use of chain can be used
as how it could be added. Maybe some additional text could clarify this.

   """
   However, security controls may have specific characteristics that
   automatic processes or administrators need to know when they have to
   generate configurations, like the available resolution strategies and
   the possibility to set default actions.  We have ignored, to simplify
   this presentation, options to generate configurations that may have
   better performance, like the use of chains or ad hoc structures
   [Taylor].  However, security controls may have specific characteristics
that
   automatic processes or administrators need to know when they have to
   generate configurations, like the available resolution strategies and
   the possibility to set default actions.  We have ignored, to simplify
   this presentation, options to generate configurations that may have
   better performance, like the use of chains or ad hoc structures
   [Taylor].  Adding support to these forms of optimization is certainly
   feasible with a limited effort but it was outside the scope of this
   paper, that is, to show that adding security awareness to NFV
   management and orchestration features is possible.  It is one of the
   task for future work.
   """

 section 4.1 time structure has not been defined.
_______________________________________________
I2nsf mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/i2nsf

Reply via email to