Hi,

I looked at this document from the perspective of NETCONF/RESTCONF and
here are some comments I wrote down while reading the document:

a) The abstract says:

    Environment security requirements are independent of the protocol
    used for I2RS.

   Hence, there should be no requirements for NETCONF. But lets see...

     REQ 3:  The I2RS Agent validates data to ensure injecting the
           information will not create a deadlock with any other system,
           nor will it create a routing loop, nor will it cause the
           control plane to fail to converge.

   This is not implementable. How should an I2RS Agent determine this?
   This would require that every I2RS Agent has a global view on the
   network and the routing state in all network elements.

b) There are a number of AAA requirements, some are difficult to
   understand and it remains unclear why they are not already covered
   in the authentication document. Overall, I am a bit confused which
   problem this document tries to solve. There are a few bits of
   implementation advice, perhaps this document could be the beginning
   of an implementation guidelines document.

c) The discussion of communication requirements between an I2RS Client
   and its Applications seems a bit out of scope since I understand
   this is not something I2RS actively works on. The I2RS architecture
   document says:

    The details of how applications communicate with a remote client
    is out of scope for I2RS.

   Similarly, the authentication requirements document says:

    Please note the security of the application to I2RS client connection
    is outside of the I2RS protocol or I2RS interface.

/js

-- 
Juergen Schoenwaelder           Jacobs University Bremen gGmbH
Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
Fax:   +49 421 200 3103         <http://www.jacobs-university.de/>

_______________________________________________
i2rs mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/i2rs

Reply via email to