[Anima] Next steps for the reference document

"Michael Behringer (mbehring)" <mbehring@cisco.com> Thu, 04 June 2015 13:18 UTC

Return-Path: <mbehring@cisco.com>
X-Original-To: anima@ietfa.amsl.com
Delivered-To: anima@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 86D631A879B for <anima@ietfa.amsl.com>; Thu, 4 Jun 2015 06:18:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.511
X-Spam-Level:
X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yMQwR98Efx1A for <anima@ietfa.amsl.com>; Thu, 4 Jun 2015 06:18:46 -0700 (PDT)
Received: from alln-iport-5.cisco.com (alln-iport-5.cisco.com [173.37.142.92]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 194C51A87A5 for <anima@ietf.org>; Thu, 4 Jun 2015 06:18:46 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=2803; q=dns/txt; s=iport; t=1433423927; x=1434633527; h=from:to:subject:date:message-id: content-transfer-encoding:mime-version; bh=/EpjEJf3Dx2EjgBucmwyVWeZc64Y21zLau5R2p0eszw=; b=GXjCFvZr5pe60qF46LLqDazqJWVcBERbv/SRNqOOU4WzhOwivVN2KcoG soHr5Q1W3HP21yFk87R/pNolgTnVV1FBomcFBzfGTWjFqA2J4pjmEkZwQ OtfQBQdf5APXn7Ka7IYOgOWGaNAZrSeRw2gVIiV0viw9mwjc8eMV2UOeU A=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0CfBAClT3BV/4cNJK1bgxCBOL1ZZgmHUQKBODgUAQEBAQEBAYEKhCQBBDpRASoUQiYBBBuIJadUs04BAQEHAQEBAQEdj2ULKINPgRYFi1yHPoxTg3WSLCSDd4FyQ4EBAQEB
X-IronPort-AV: E=Sophos;i="5.13,552,1427760000"; d="scan'208";a="156342227"
Received: from alln-core-2.cisco.com ([173.36.13.135]) by alln-iport-5.cisco.com with ESMTP; 04 Jun 2015 13:18:46 +0000
Received: from xhc-aln-x03.cisco.com (xhc-aln-x03.cisco.com [173.36.12.77]) by alln-core-2.cisco.com (8.14.5/8.14.5) with ESMTP id t54DIjmB032411 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL) for <anima@ietf.org>; Thu, 4 Jun 2015 13:18:45 GMT
Received: from xmb-rcd-x14.cisco.com ([169.254.4.238]) by xhc-aln-x03.cisco.com ([173.36.12.77]) with mapi id 14.03.0195.001; Thu, 4 Jun 2015 08:18:45 -0500
From: "Michael Behringer (mbehring)" <mbehring@cisco.com>
To: Anima WG <anima@ietf.org>
Thread-Topic: Next steps for the reference document
Thread-Index: AdCeyJnnoO1vHkFQQ5yr85+CL+laOw==
Date: Thu, 04 Jun 2015 13:18:44 +0000
Message-ID: <3AA7118E69D7CD4BA3ECD5716BAF28DF22FC52BD@xmb-rcd-x14.cisco.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.61.168.8]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/anima/GneQs5Ys7iyuYDcQ_HAtpvbrIMw>
Subject: [Anima] Next steps for the reference document
X-BeenThere: anima@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Autonomic Networking Integrated Model and Approach <anima.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/anima>, <mailto:anima-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/anima/>
List-Post: <mailto:anima@ietf.org>
List-Help: <mailto:anima-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/anima>, <mailto:anima-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 04 Jun 2015 13:18:47 -0000

Thanks for all who volunteered to participate in the reference doc. While detailed discussions may be between the contributors, the main technical discussions should probably take place on the main list. Here, I summarise my view on what needs to be done in the reference document. 

If someone thinks he/she can produce text for the respective sections, please let me / the list know. 

The overall goal is to show how all the various drafts, protocols, and discussions in the ANIMA WG fit together.

Points to address: 

-	We should have a short section on intent. Explaining ingest of intent, distribution, the nature (on top of what's in RFC7575). That intent is signed, time stamps, etc. Probably pointing back to RFC7575. (Note intent distribution is handled in section 7.3)
-	Do we want to address "constrained" AN nodes, with limited capabilities, here? I think so... We'll need that for AN in constrained environments. This could go into a new section in section 3: "constrained network elements". 
-	The masa section needs to be written. The masa will be an optional element. Needs to point to the bootstrap draft, which explains the basics. 
-	Naming section needs meat. What names are used for, where it is in the domain cert. 
-	Addressing section needs to bring in recent discussions. Needs to include how an ASA uses addressing. per node or per ASA. (I think we concluded per node). 
-	Domain certificate template. We should write a section on the AN domain certificate. How the various fields are used. 
-	Need to explain sub-domains
-	Section 9 needs to be worked out. This is all about conflict resolution. Maybe we should re-name that section? RFC 7575 already mentions this. Maybe we don't need much more here. 
-	trust management: inside a domain, between domain and sub-domain, and between domains. This should become a new section. 
-	Need to treat the question of the "out of band" ACP versus the inline ACP. The two models both work, but there are implications, different benefits, drawbacks, etc. This needs to be explained. 
-	Routing: In the case of a virtually separate ACP, as in draft-behringer-anima-autonomic-control-plane, we need to also define a routing protocol (thinking of the discussion in homenet, this might be "fun"...) 
-	Need considerations for APIs: How can ASAs use the ANI? 
-	Need considerations for a data model. What it should cover, scope. 
-	We should also describe the management angle
-	Security considerations need to be expanded. Threat analysis needs work; need general security considerations, talk about the PKI and trust model, etc. 

Thoughts? Anything missing? Any volunteer for a specific part? 

Michael