[I2nsf] draft-kim-i2nsf-consumer-facing-interface-dm-00 and draft-kim-i2nsf-security-management-architecture-03

Rakesh Kumar <rkkumar@juniper.net> Thu, 03 November 2016 00:48 UTC

Return-Path: <rkkumar@juniper.net>
X-Original-To: i2nsf@ietfa.amsl.com
Delivered-To: i2nsf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1C7F61296B1 for <i2nsf@ietfa.amsl.com>; Wed, 2 Nov 2016 17:48:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FILL_THIS_FORM=0.001, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=junipernetworks.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Qqum87sY7ofS for <i2nsf@ietfa.amsl.com>; Wed, 2 Nov 2016 17:48:33 -0700 (PDT)
Received: from NAM03-BY2-obe.outbound.protection.outlook.com (mail-by2nam03on0136.outbound.protection.outlook.com [104.47.42.136]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 30C741296AC for <i2nsf@ietf.org>; Wed, 2 Nov 2016 17:48:32 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=junipernetworks.onmicrosoft.com; s=selector1-juniper-net; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=58q3jzUXmvUgc0XFX9jRQpfV5lvOwV/1kNvhaWhiW3Q=; b=gPd6ghqztld+BnGg8mHPQUlxu4HEpeMfo0I47KaHMIjlBK5D6Rjvc7FILB4AivVPke6lQNyNllfxqYBLS/4v/e+xREblahKccafVVQ0cE1hjPwQzZ2c7nihWLmLyzIPzkFMOVFoLxcYUT+XXfVB95A06m84wilaGCjj8EVIMpAc=
Received: from BN6PR05MB2993.namprd05.prod.outlook.com (10.173.19.11) by BN6PR05MB2993.namprd05.prod.outlook.com (10.173.19.11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) id 15.1.707.1; Thu, 3 Nov 2016 00:48:31 +0000
Received: from BN6PR05MB2993.namprd05.prod.outlook.com ([10.173.19.11]) by BN6PR05MB2993.namprd05.prod.outlook.com ([10.173.19.11]) with mapi id 15.01.0707.004; Thu, 3 Nov 2016 00:48:31 +0000
From: Rakesh Kumar <rkkumar@juniper.net>
To: "Mr. Jaehoon Paul Jeong" <jaehoon.paul@gmail.com>
Thread-Topic: draft-kim-i2nsf-consumer-facing-interface-dm-00 and draft-kim-i2nsf-security-management-architecture-03
Thread-Index: AQHSNWv/Nlfict/za0atRM7rTVjwzw==
Date: Thu, 03 Nov 2016 00:48:31 +0000
Message-ID: <D5EB9EC5-527C-4D15-8DEC-5F7089B99BDF@juniper.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/f.18.0.160709
authentication-results: spf=none (sender IP is ) smtp.mailfrom=rkkumar@juniper.net;
x-ms-exchange-messagesentrepresentingtype: 1
x-originating-ip: [66.129.239.14]
x-ms-office365-filtering-correlation-id: 670f897e-cac0-4338-3808-08d403832238
x-microsoft-exchange-diagnostics: 1; BN6PR05MB2993; 7:lCUwkc6S1OW6BOlmyUHQbsYDHtOwg5wxKi68M8CQ7As9V96fja5zDN+Nj4LJi+xAPddXo7ERK+9xkz0EWRkdnuVbXrzSriT1WR7DjT5hg1AbRXw/S/ZAhLfAB+hCWhrSA+aAcYgDoPnuir0CnJufOgeMcU7Weg8fvFXd6QyhOdedip6o8RMquFLVe5i0o5iiBzbx8aX8RvvNbsajMnPMBCeAbByF2bmF/pOMa6Cxnd8y9BCHFZzZgDmhoq8Vb8aO8caU73XGGEyOi7xvCjUXJvp7A3tdHljmBW1/vjbH6SwL/j7hcviG6llL+gf8oD5AwLoZurN5YQkjUkLVY4JUJIoVAM9pTMYk/ka5VyCDXW8=
x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:BN6PR05MB2993;
x-microsoft-antispam-prvs: <BN6PR05MB29935B6B1797E4AEA863E60BADA30@BN6PR05MB2993.namprd05.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(192374486261705)(21748063052155);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(102415321)(6040176)(601004)(2401047)(5005006)(8121501046)(10201501046)(3002001)(6055026); SRVR:BN6PR05MB2993; BCL:0; PCL:0; RULEID:; SRVR:BN6PR05MB2993;
x-forefront-prvs: 011579F31F
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(979002)(6009001)(7916002)(51414003)(189002)(199003)(52314003)(5002640100001)(77096005)(86362001)(36756003)(8936002)(11100500001)(105586002)(99286002)(101416001)(6916009)(54356999)(19625215002)(50986999)(106356001)(99936001)(110136003)(106116001)(5660300001)(68736007)(2906002)(10710500007)(4326007)(229853001)(122556002)(83716003)(9326002)(8676002)(97736004)(7110500001)(3280700002)(15650500001)(19300405004)(19580395003)(586003)(81156014)(81166006)(230783001)(10400500002)(4001350100001)(6116002)(2420400007)(102836003)(3846002)(189998001)(2900100001)(33656002)(15975445007)(92566002)(7736002)(83506001)(3660700001)(66066001)(7846002)(16236675004)(82746002)(87936001)(104396002)(969003)(989001)(999001)(1009001)(1019001); DIR:OUT; SFP:1102; SCL:1; SRVR:BN6PR05MB2993; H:BN6PR05MB2993.namprd05.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; MX:1; A:1; LANG:en;
received-spf: None (protection.outlook.com: juniper.net does not designate permitted sender hosts)
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/mixed; boundary="_004_D5EB9EC5527C4D158DEC5F7089B99BDFjunipernet_"
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-originalarrivaltime: 03 Nov 2016 00:48:31.4079 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR05MB2993
Archived-At: <https://mailarchive.ietf.org/arch/msg/i2nsf/0_3o868i1XS6easzLCKFbWkwRgM>
Cc: "i2nsf@ietf.org" <i2nsf@ietf.org>
Subject: [I2nsf] draft-kim-i2nsf-consumer-facing-interface-dm-00 and draft-kim-i2nsf-security-management-architecture-03
X-BeenThere: i2nsf@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "*I2NSF: Interface to Network Security Functions mailing list*" <i2nsf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2nsf>, <mailto:i2nsf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2nsf/>
List-Post: <mailto:i2nsf@ietf.org>
List-Help: <mailto:i2nsf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2nsf>, <mailto:i2nsf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 03 Nov 2016 00:48:36 -0000

Hi Paul,

Regarding the two drafts draft-kim-i2nsf-consumer-facing-interface-dm-00 and draft-kim-i2nsf-security-management-architecture-03 and merging these with other drafts as mentioned in other threads. I have responded to “draft-kim-i2nsf-security-management-architecture-03” earlier but here is the consolidated input on both.

Here is my understanding based on reading the two candidate drafts for merge:


1.       draft-kim-i2nsf-security-management-architecture-03: As per WG suggestion that we merge this draft with “draft-kumar-i2nsf-client-facing-interface-req-01”. I have responded earlier but now that draft has become WG draft “draft-ietf-i2nsf-client-facing-interface-req”. I see your draft has few main themes:

o    I2NSF user architecture: As I stated earlier that “draft-ietf-i2nsf-client-facing-interface-req” does not focus on specifics of a client/user system. As far as I know, this is outside the scope of I2NSF charter since focus is on the client-interface; so I don’t see this as a candidate for merge. We can discuss if you think my understanding is incorrect.

o    Security requirements for VoIP/VolTE :  I see security requirements such as malware domains,  URL/IP filtering which can be enforced dynamically based on time calendar. This definitely falls into the scope of “draft-ietf-i2nsf-client-facing-interface-req”. We have defined these requirements and scheduling methods already but in a more generic way like threat feeds (IP, URL) in section 4.8. The use-case could be as VoIP/VoLTE security as you mentioned but if you think it is not coming out clearly then we can modify the text. Let us work on it.

o    Security management system architecture:  This is not in the scope of “draft-ietf-i2nsf-client-facing-interface-req”. As far as I know, this is outside the scope of I2NSF charter since focus is on the NSF-interface; so I don’t see this as a candidate for merge. We can discuss if you think my understanding is incorrect.

2.       draft-kim-i2nsf-consumer-facing-interface-dm-00: This is a candidate for merge with draft-kumar-i2nsf-client-facing-interface-im as you and Linda pointed out but our draft is an information model, not a data model as yours. Anyway, I feel, we have defined these in section 5.1 and 5.3 but we can work with you to see whether you want to add or modify.

I know, this is one of the agenda items in Seoul, we should hash this out while in Seoul. I look forward to working with you on this.

Thanks & Regards,
Rakesh

--- Begin Message ---
Hi Paul,

 

Based on suggestion from Diego to see if we could merge draft-kim-i2nsf-security-management-architecture-01 with draft-kumar-i2nsf-client-facing-interface-req-01.

Our draft deals with interfaces client would use to interact with the security controller/management system. We are discussing only the client interfaces and not the client structure itself. 

 

We should have a discussion to see what can be merged. I look forward to working with you.

 

Thanks & Regards,

Rakesh

From: I2nsf <i2nsf-bounces@ietf.org> on behalf of "Mr. Jaehoon Paul Jeong" <jaehoon.paul@gmail.com>
Date: Sunday, October 23, 2016 at 10:43 PM
To: "Diego R. Lopez" <diego.r.lopez@telefonica.com>
Cc: "i2nsf@ietf.org" <i2nsf@ietf.org>, "Prof. Hyoungshick Kim" <hyoung@skku.edu>, "Pauljeong@skku.edu" <Pauljeong@skku.edu>, "skku_secu-brain_all@googlegroups.com" <skku_secu-brain_all@googlegroups.com>, Linda Dunbar <linda.dunbar@huawei.com>
Subject: Re: [I2nsf] questions about draft-kim-i2nsf-security-management-architecture-01

 

Hi Diego, 

Thanks for your comments.

 

Our draft can be aligned with draft-kumar-i2nsf-client-facing-interface-req-01 in that

ours deals with the interface between I2NSF Client and Security Controller.

However, draft-kumar-i2nsf-client-facing-interface-req-01 does not clarify the structure of 

I2NSF Client in a detailed level, but our draft proposes such a detailed structure for I2NSF Client.

 

In addition, our draft considers the policy update in I2NSF through the report from an NSF 

for a security attack (e.g., DDoS attack) or an event (e.g., the detection of a new malware)

toward I2NSF Client. This updated policy is disseminated to the whole I2NSF systems

for spontaneous reaction to the new security attack or event.

 

Like this, our draft is closely related to the the I2NSF framework.

Let us prepare for the text for the I2NSF framework draft, and then discuss

whether our text can fit the I2NSF framework.

 

Thanks.

 

Best Regards,

Paul

 

 

 

 

On Sat, Oct 22, 2016 at 7:49 PM, Diego R. Lopez <diego.r.lopez@telefonica.com> wrote:

Hi Paul, 

 

While I find agreeable that your draft could be merged with another one (or other ones) in order to consolidate the documents to be produced by I2NSF, I am not 100% sure it should be the framework draft. Looking at the proposals you make  in your draft I see it more aligned with what the drafts dealing with the client-facing interface are considering than with the general framework. In particular, draft-kumar-i2nsf-client-facing-interface-req-01 has  a section(3.3) that discusses management deployment models, and I am under the impression this architecture you propose could be seen as a refinement of those models.

 

Be goode,

 

On 21 Oct 2016, at 02:54 , Mr. Jaehoon Paul Jeong <jaehoon.paul@gmail.com> wrote:

 

Hi Linda, 

Are you agreeing at merging our draft (draft-kim-i2nsf-security-management-architecture-02) 

into draft-ietf-i2nsf-framework-03?

 

Thanks.

 

Best Regards,

Paul

 

On Fri, Oct 7, 2016 at 5:32 AM, Mr. Jaehoon Paul Jeong <jaehoon.paul@gmail.com> wrote:

Hi Linda, 

As a coauthor of this draft, I will answer your questions inline below.

 

On Wed, Oct 5, 2016 at 1:34 PM, Linda Dunbar <linda.dunbar@huawei.com> wrote:

Hyoungshick, et al, 

 

How would you position your draft-kim-i2nsf-security-management-architecture-01 with regard to the I2NSF framework draft? I find there are  a lot of duplicated content to the I2nsf  framework draft.

 

 [Paul] We would like to merge our draft into the i2nsf framework draft 

 because our draft has one depth more detailed architecture.

 This detailed architecture will be helpful to implement the i2nsf framework. 

 

 

There are some differences,  such as the following: Are you trying to define how “security policy” is structured?  

 

<image002.png>

 

 [Paul] Our architecture allows an NSF to update a low-level policy and apply it to the related high-level policy

 via the control path of Security Controller and Policy Collector (renamed Event Collector in version 02) in Figure 1

 of our version 02:

 https://tools.ietf.org/html/draft-kim-i2nsf-security-management-architecture-02

 

 For example, if an NSF of firewall detects a new DoS-attack host, it reports the updated blacklist having

 the IP address of such a host to Application Logic in I2NSF Client via Security Controller and Event Collector. 

 Application Logic asks Policy Updater to disseminate the updated blacklist to the security controllers 

 under the administration of the same I2NSF Client. 

 

Will the “High Level security management” eventually lead to Client Facing Policy data models?

 

 [Paul] Yes, as explained above, the High-level security management leads to update and handle Client facing policy 

 data models.

 

Do you plan to define interfaces between all those components depicted in Figure 1?  The interfaces between some of those components are not really in the I2NSF WG current charter,  such as “Security Policy Manager” <-> “NSF Capability Manager”,  or the interface between “Application Logic” <-> “Policy Updater”.

 

 [Paul]  Yes, we have a plan to define such interfaces.

 

 

Are those components in your current implementation? Is it like an “example of one implementation”?

 

 [Paul] Though those components are not fully implemented yet in our implementation, my team at SKKU 

 will make implement those components in a later version.

 

 Thanks for your clarification questions.

 

 Best Regards,

 Paul

  

 

 

Thanks, Linda 


_______________________________________________
I2nsf mailing list
I2nsf@ietf.org
https://www.ietf.org/mailman/listinfo/i2nsf



 

-- 

===========================
Mr. Jaehoon (Paul) Jeong, Ph.D.
Assistant Professor
Department of Software
Sungkyunkwan University
Office: +82-31-299-4957
Email: jaehoon.paul@gmail.com, pauljeong@skku.edu
Personal Homepage: http://iotlab.skku.edu/people-jaehoon-jeong.php



 

-- 

===========================
Mr. Jaehoon (Paul) Jeong, Ph.D.
Assistant Professor
Department of Software
Sungkyunkwan University
Office: +82-31-299-4957
Email: jaehoon.paul@gmail.com, pauljeong@skku.edu
Personal Homepage: http://iotlab.skku.edu/people-jaehoon-jeong.php

_______________________________________________
I2nsf mailing list
I2nsf@ietf.org
https://www.ietf.org/mailman/listinfo/i2nsf

 

--
"Esta vez no fallaremos, Doctor Infierno"

Dr Diego R. Lopez
Telefonica I+D
http://people.tid.es/diego.lopez/

e-mail: diego.r.lopez@telefonica.com
Tel:    +34 913 129 041
Mobile: +34 682 051 091
----------------------------------

 



 

-- 

===========================
Mr. Jaehoon (Paul) Jeong, Ph.D.
Assistant Professor
Department of Software
Sungkyunkwan University
Office: +82-31-299-4957
Email: jaehoon.paul@gmail.com, pauljeong@skku.edu
Personal Homepage: http://iotlab.skku.edu/people-jaehoon-jeong.php

--- End Message ---