Deborah: 

I asked Kathleen to move this one out 2 more weeks so that we could work
through any issues you have with the document.   Version 15 will take care
of all other editorial comments.   During the next few days or next Monday,
perhaps we could chat on a phone call. 

I'm glad to change anything that does not parse or smooth out particular
sections. 

Sue 

-----Original Message-----
From: I2nsf [mailto:i2nsf-boun...@ietf.org] On Behalf Of Deborah Brungard
Sent: Tuesday, April 11, 2017 5:21 PM
To: The IESG
Cc: i2nsf@ietf.org; adr...@olddog.co.uk;
draft-ietf-i2nsf-problem-and-use-ca...@ietf.org; i2nsf-cha...@ietf.org
Subject: [I2nsf] Deborah Brungard's Abstain on
draft-ietf-i2nsf-problem-and-use-cases-12: (with COMMENT)

Deborah Brungard has entered the following ballot position for
draft-ietf-i2nsf-problem-and-use-cases-12: Abstain

When responding, please keep the subject line intact and reply to all email
addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-i2nsf-problem-and-use-cases/



----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

Similar to other Abstains, I won't block publication but question the value,
especially the current version to be published at this time. The document
rambles on descriptions and it is not concise on the problem to be addressed
by i2nsf. I recommend holding off on publication until it can be fine tuned,
it currently appears to be a cut and paste of many documents.

Examples, section 5 seems to summarize that i2nsf will only focus on policy
provisioning. Yet, section 3.4 discusses capability negotiation and 3.1.2
discusses monitoring mechanisms and execution status of NSFs capabilities.
And other sections also infer much more, describing expectations of security
controller functionality.

There are several rather overzealous claims: Section 4.4 "botnet attacks
could be easily prevented by provisioning security policies using the
i2nsf..interface" and section 4.5 "security controller would keep track of
..if there is any policy violation ..proof..in full compliance with the
required regulations".

Several sentences don't parse e.g. "thereby raising concerns about the
ability of SDN computation logic to send security policy-provisioning
information to the participating NSFs".


_______________________________________________
I2nsf mailing list
I2nsf@ietf.org
https://www.ietf.org/mailman/listinfo/i2nsf

_______________________________________________
I2nsf mailing list
I2nsf@ietf.org
https://www.ietf.org/mailman/listinfo/i2nsf

Reply via email to