PengLin, Thank you very much for posting the draft in I2NSF WG. A few questions to your proposal:
1. Are the three threats in Section 3.2 specific to Network Security Functions? Or applicable to any network functions? 2. The Second Threat is the leak of policy rules and core asset of security knowledge. Where do the "policy rules" leaked to? The "core asset of security knowledge" is from network operators? Or is it to the Network Security Functions? 3. The "third threat on potential spoofing attack to the NSF architecture". Are the spoofing attack also applicable to any network functions? Is "spoofing attack" addressed by RAT? Thank you Linda Dunbar From: I2nsf <[email protected]> On Behalf Of [email protected] Sent: Wednesday, December 1, 2021 9:46 PM To: [email protected] Subject: [I2nsf] topic about draft-yang-i2nsf-trust-enhanced-i2nsf Hi everyone, This is Penglin Yang from China Mobile Research Institute. Recently, we composed a document named trust enhanced I2NSF and submitted to the I2NSF group. (https://datatracker.ietf.org/doc/draft-yang-i2nsf-trust-enhanced-i2nsf/) The motivation of this document is trying to use remote attestation technology to augment the security and to enhance the trustworthiness of NSF. In this document we illustrated the architecture of trsuted enhanced I2NSF and the relevant interfaces. We sincerely welcome everyone to comment on this document. And if you are interested, we can work together to promote this idea to a better version. BR Penglin Yang CMCC
_______________________________________________ I2nsf mailing list [email protected] https://www.ietf.org/mailman/listinfo/i2nsf
