PengLin,

Thank you very much for posting the draft in I2NSF WG.
A few questions to your proposal:


  1.  Are the three threats in Section 3.2 specific to Network Security 
Functions? Or applicable to any network functions?
  2.  The Second Threat is the leak of policy rules and core asset of security 
knowledge.  Where do the  "policy rules" leaked to?  The "core asset of 
security knowledge" is from network operators? Or is it to the Network Security 
Functions?
  3.  The "third threat on potential spoofing attack to the NSF architecture". 
Are the spoofing attack also applicable to any network functions? Is "spoofing 
attack" addressed by RAT?

Thank you
Linda Dunbar

From: I2nsf <[email protected]> On Behalf Of [email protected]
Sent: Wednesday, December 1, 2021 9:46 PM
To: [email protected]
Subject: [I2nsf] topic about draft-yang-i2nsf-trust-enhanced-i2nsf

Hi everyone,

This is Penglin Yang from China Mobile Research Institute.  Recently, we 
composed a document named  trust enhanced I2NSF and submitted to the I2NSF 
group. 
(https://datatracker.ietf.org/doc/draft-yang-i2nsf-trust-enhanced-i2nsf/) The 
motivation of this document is trying to use remote attestation technology to 
augment the security and to enhance the trustworthiness of NSF. In this 
document we illustrated the architecture of trsuted enhanced I2NSF and the 
relevant interfaces.

We sincerely welcome everyone to comment on this document. And if you are 
interested, we can work together to promote this idea to a better version.

BR
Penglin Yang
CMCC

_______________________________________________
I2nsf mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/i2nsf

Reply via email to