Kathleen: 

Thank you for your comments.  Please see the inline comments below.  I will be 
uploading a version -08.txt that will resolve some of these comments. 

Sue 

-----Original Message-----
From: Kathleen Moriarty [mailto:[email protected]] 
Sent: Wednesday, August 17, 2016 5:36 PM
To: The IESG
Cc: [email protected]; Jeffrey Haas; 
[email protected]; [email protected]; [email protected]
Subject: Kathleen Moriarty's Discuss on 
draft-ietf-i2rs-protocol-security-requirements-07: (with DISCUSS and COMMENT)

Kathleen Moriarty has entered the following ballot position for
draft-ietf-i2rs-protocol-security-requirements-07: Discuss

When responding, please keep the subject line intact and reply to all email 
addresses included in the To and CC lines. (Feel free to cut this introductory 
paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-i2rs-protocol-security-requirements/



----------------------------------------------------------------------
DISCUSS:
----------------------------------------------------------------------

Thanks for your work on this draft.  There may be some overlap in points, I 
tried to minimize them...
----
>Section 3.1:
>
>I don't see any actual requirements for mutual authentication in this section, 
>just requirements for identifiers.  Did I miss something?  

No, there are no additional requirements.  We only have requirements for 
identifiers.   Do you have a suggestion for improved language. 

> Are all mutual auth schemes in scope?  Are there any considerations for 
> mutual authentication (passwords, keys, etc.)?

All mutual identification schemes are in scope.  Is there a reason we should 
restrict the mutual authentication schemes to a subset. 

----
>I share the same concern as others for secure transport, but since there are 
>already discusses on that, I have one comment to add to the existing discusses 
>below.

You have a concern regarding the secure transport?  My understanding is that 
other people had a concern regarding the insecure transport.   I have provide 
an example of the BGP data feed utilized by http://www.routeviews.org/ project. 
 


----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

> Section 3: 
> Can you clarify the second to last sentence?  Do you mean there are sections 
> that indicate an insecure transport should be used?
>   I2RS allows the use of an
>  insecure transport for portions of data models that clearly indicate
>  insecure transport.

>  Perhaps:
>  I2RS allows the use of an
>  insecure transport for portions of data models that clearly indicate the use 
> of an
>  insecure transport.

Changed to :

I2RS allows the use of an insecure transport for portions of data models that 
clearly indicate
the use of an insecure transport. Operators deploying I2RS must determine if 
they want to populate and 
deploy the portions of the data model which use insecure transports.


----
> Section 3.2
> I agree with Alissa's discuss point on the following sentence (that could 
> also be reworded a bit):
>  A non-secure transport can be can be used for publishing telemetry
>  data or other operational state that was specifically indicated to
>  non-confidential in the data model in the Yang syntax.

I would appreciate a recommended set of text or additional explanation on what 
you would like to see in rewording. 

----
>Section 3.4: In the following text:
>   SEC-REQ-15: The integrity that the message data is not repeated means
>   that I2RS client to I2RS agent transport SHOULD protect against
>   replay attack

>I'm not sure why this just doesn't say:
> SEC-REQ-15: I2RS client to I2RS agent transport SHOULD protect against
 > replay attack
>The additional text doesn't add anything and sounds a bit confusing.

Sue: Is this ok.  It will be changed 
 
----
Nit:

I'm not sure these definitions add any value as they seem to restate the term 
defined:

>   I2RS protocol data integrity
>
>    The transfer of data via the I2RS protocol has the property of
>    data integrity described in [RFC4949].

Deleted 


>   I2RS component protocols
>
>    Protocols which are combined to create the I2RS protocol.

Please suggest alternative text for this section. 

-----

> I also agree that the definitions from 4949 should be removed.
> Thank you in advance.

These definition have been removed.  I will provide feedback if this removal 
cause problems in the creation of the protocol. 

_______________________________________________
i2rs mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/i2rs

Reply via email to