Hi Tom,
I have addressed your comments on I2NSF Consumer-Facing Interface:
https://datatracker.ietf.org/doc/html/draft-ietf-i2nsf-consumer-facing-interface-dm-27

I attach a revision letter to explain how I have addressed your comments on
the revision.

Thanks.

Best Regards,
Paul


On Sat, Mar 18, 2023 at 12:54 AM tom petch <daedu...@btconnect.com> wrote:

> On 15/03/2023 11:32, tom petch wrote:
> > On 02/03/2023 14:16, The IESG wrote:
> >>
> >> The IESG has received a request from the Interface to Network Security
> >> Functions WG (i2nsf) to consider the following document: - 'I2NSF
> >> Consumer-Facing Interface YANG Data Model'
> >>    <draft-ietf-i2nsf-consumer-facing-interface-dm-26.txt> as Proposed
> >> Standard
>
> Belatedly I notice another area of divergence which makes the set of
> documents incoherent and that is with threats.
>
> This I-D uses 'ioc' as a basis' from which is derived
>
>       identity stix {
>       identity misp {
>       identity openioc {
>       identity iodef {
>
> Earlier versions used threaat feed with
>
>       identity signature-yara {
>       identity signature-snort {
>       identity signature-suricata {
>
> and the capability I-D, with the RFC Editor, has
>
>       identity content-security-control {
>
> from which are derived
>
>       identity ips {
>      identity anti-virus {
>
> which give rise to
>
>       identity signature-set {
>       identity exception-signature {
>
> and
>
>       identity detect {
>       identity exception-files {
>
> I am unclear how the capabilities which can be configured in this I-D
> are specified with the YANG identity of the capability I-D.  A sentence
> or two in this I-D explaining the relationship might clarify.
>
> Tom Petch
>
>
> > This is one of a set of seven or so documents, one of which (framework)
> > made RFC8329 six years ago, the others are waiting on MISSREF and then
> > there is this one.  It would be good to get these out as RFC.
> >
> > A problem I have seen with them is ideas changing with them, evolving,
> > so that the I-D are out of step.  As this is the last, this might be the
> > place to address this.
> >
> > I have not had time, in the tsunami of I-D prior to IETF submission
> > cut-off, to review this thoroughly but do see a divergence in the
> > treatment of location.  This used to be geo-ip, RFC8179, as is mentioned
> > in RFC8329 and that is still referenced in e.g. nsf-facing.  This I-D
> > now uses country/region/city which is fine except for documents like
> > 'capability' in the RFC-Editor Q which references RFC8179.  The
> > technically correct solution might be to update 'capability' etc but I
> > think that the time for that is past.  I put in some effort a few years
> > ago to get them in line but no sooner had I done so than they diverged
> > again after comments by other reviewers so I think that keeping them in
> > line is a never ending task.
> >
> > What this I-D perhaps could do is to mention this divergence in
> > treatment.  I will look some more to see where else they have diverged
> > but not before the end of thie Last Call.
> >
> > In passing, I note that the SIP example uses what might be genuine
> > addresses.
> >
> > Tom Petch
> >
> >> The IESG plans to make a decision in the next few weeks, and solicits
> >> final
> >> comments on this action. Please send substantive comments to the
> >> last-c...@ietf.org mailing lists by 2023-03-16. Exceptionally,
> >> comments may
> >> be sent to i...@ietf.org instead. In either case, please retain the
> >> beginning
> >> of the Subject line to allow automated sorting.
> >>
> >> Abstract
> >>
> >>
> >>     This document describes an information model and the corresponding
> >>     YANG data model for the Consumer-Facing Interface of the Security
> >>     Controller in an Interface to Network Security Functions (I2NSF)
> >>     system in a Network Functions Virtualization (NFV) environment.  The
> >>     information model defines various types of managed objects and the
> >>     relationship among them needed to build the flow policies from
> users'
> >>     perspective.  This information model is based on the "Event-
> >>     Condition-Action" (ECA) policy model defined by a capability
> >>     information model for I2NSF, and the YANG data model is defined for
> >>     enabling different users of a given I2NSF system to define, manage,
> >>     and monitor flow policies within an administrative domain (e.g.,
> user
> >>     group).
> >>
> >>
> >>
> >>
> >> The file can be obtained via
> >>
> https://datatracker.ietf.org/doc/draft-ietf-i2nsf-consumer-facing-interface-dm/
> >>
> >>
> >>
> >> The following IPR Declarations may be related to this I-D:
> >>
> >>     https://datatracker.ietf.org/ipr/3554/
> >>     https://datatracker.ietf.org/ipr/3604/
> >>     https://datatracker.ietf.org/ipr/5749/
> >>     https://datatracker.ietf.org/ipr/5694/
> >>
> >>
> >>
> >>
> >>
> >>
> >> _______________________________________________
> >> IETF-Announce mailing list
> >> ietf-annou...@ietf.org
> >> https://www.ietf.org/mailman/listinfo/ietf-announce
> >> .
> >>
>
> _______________________________________________
> I2nsf mailing list
> I2nsf@ietf.org
> https://www.ietf.org/mailman/listinfo/i2nsf
>

Attachment: Revision-Letter-for-Consumer-Facing Interface-27-20230326.pdf
Description: Adobe PDF document

_______________________________________________
I2nsf mailing list
I2nsf@ietf.org
https://www.ietf.org/mailman/listinfo/i2nsf

Reply via email to