Re: [I2nsf] New Version Notification for draft-baspez-i2nsf-capabilities-00.txt

Linda Dunbar <linda.dunbar@huawei.com> Fri, 08 July 2016 15:30 UTC

Return-Path: <linda.dunbar@huawei.com>
X-Original-To: i2nsf@ietfa.amsl.com
Delivered-To: i2nsf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B164212D827 for <i2nsf@ietfa.amsl.com>; Fri, 8 Jul 2016 08:30:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.646
X-Spam-Level:
X-Spam-Status: No, score=-5.646 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-1.426, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yA1lMSJ4zXJT for <i2nsf@ietfa.amsl.com>; Fri, 8 Jul 2016 08:30:22 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8D36B12D7C2 for <I2NSF@ietf.org>; Fri, 8 Jul 2016 08:30:15 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml701-cah.china.huawei.com) ([172.18.7.190]) by lhrrg02-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CNJ11820; Fri, 08 Jul 2016 15:30:12 +0000 (GMT)
Received: from DFWEML701-CAH.china.huawei.com (10.193.5.175) by lhreml701-cah.china.huawei.com (10.201.5.93) with Microsoft SMTP Server (TLS) id 14.3.235.1; Fri, 8 Jul 2016 16:30:09 +0100
Received: from DFWEML501-MBB.china.huawei.com ([10.193.5.179]) by dfweml701-cah.china.huawei.com ([10.193.5.175]) with mapi id 14.03.0235.001; Fri, 8 Jul 2016 08:30:04 -0700
From: Linda Dunbar <linda.dunbar@huawei.com>
To: "Diego R. Lopez" <diego.r.lopez@telefonica.com>, "I2NSF@ietf.org" <I2NSF@ietf.org>
Thread-Topic: New Version Notification for draft-baspez-i2nsf-capabilities-00.txt
Thread-Index: AQHR2Rj1BpYAbBJtA0O3j8gWCqhBMKAOqLHQ
Date: Fri, 08 Jul 2016 15:30:03 +0000
Message-ID: <4A95BA014132FF49AE685FAB4B9F17F657EE0F7D@dfweml501-mbb>
References: <20160708130136.32109.64951.idtracker@ietfa.amsl.com> <4102F4FC-6EFC-458F-9B54-46E6E4812312@telefonica.com>
In-Reply-To: <4102F4FC-6EFC-458F-9B54-46E6E4812312@telefonica.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.47.132.252]
Content-Type: multipart/alternative; boundary="_000_4A95BA014132FF49AE685FAB4B9F17F657EE0F7Ddfweml501mbb_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A090204.577FC705.0216, ss=1, re=0.000, recu=0.000, reip=0.000, cl=1, cld=1, fgs=0, ip=0.0.0.0, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: 951e85af0fa830b0a255e8bc27d420f8
Archived-At: <https://mailarchive.ietf.org/arch/msg/i2nsf/70qQdQ39RjV1KCHDoL3StI3GuN0>
Subject: Re: [I2nsf] New Version Notification for draft-baspez-i2nsf-capabilities-00.txt
X-BeenThere: i2nsf@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "*I2NSF: Interface to Network Security Functions mailing list*" <i2nsf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2nsf>, <mailto:i2nsf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2nsf/>
List-Post: <mailto:i2nsf@ietf.org>
List-Help: <mailto:i2nsf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2nsf>, <mailto:i2nsf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 08 Jul 2016 15:30:27 -0000

Diego and Aldo,

Thank you very much for the contribution. Is the “capability model” applicable to “Customer facing interface” or the NSF facing interface?

Linda

From: I2nsf [mailto:i2nsf-bounces@ietf.org] On Behalf Of Diego R. Lopez
Sent: Friday, July 08, 2016 8:07 AM
To: I2NSF@ietf.org
Subject: [I2nsf] Fwd: New Version Notification for draft-baspez-i2nsf-capabilities-00.txt

Hi,

After some discussions, Aldo and I have decided to submit a draft reflecting the experience we have gained within the SECURED project with respect to the application of a capability model for NSFs. We think the capability model is one of the crucial aspects for I2NSF and wanted to bring a self-consistent view of how to apply it in the context of the WG.

We intend to discuss and align this contribution with other capability-related ones in the WG.

Be goode,


Begin forwarded message:

From: <internet-drafts@ietf.org<mailto:internet-drafts@ietf.org>>
Subject: New Version Notification for draft-baspez-i2nsf-capabilities-00.txt
Date: 8 July 2016 at 15:01:36.000 GMT+2
To: Diego Lopez <diego.r.lopez@telefonica.com<mailto:diego.r.lopez@telefonica.com>>, Cataldo Basile <cataldo.basile@polito.it<mailto:cataldo.basile@polito.it>>, "Diego R. Lopez" <diego.r.lopez@telefonica.com<mailto:diego.r.lopez@telefonica.com>>


A new version of I-D, draft-baspez-i2nsf-capabilities-00.txt
has been successfully submitted by Diego R. Lopez and posted to the
IETF repository.

Name: draft-baspez-i2nsf-capabilities
Revision: 00
Title: A Model of Security Capabilities for Network Security Functions
Document date: 2016-07-08
Group: Individual Submission
Pages: 11
URL:            https://www.ietf.org/internet-drafts/draft-baspez-i2nsf-capabilities-00.txt
Status:         https://datatracker.ietf.org/doc/draft-baspez-i2nsf-capabilities/
Htmlized:       https://tools.ietf.org/html/draft-baspez-i2nsf-capabilities-00


Abstract:
  This document presents a model of Security Capabilities.  Security
  Capabilities are intended to describe the potentiality that Network
  Security Functions (NSFs) have for security policy enforcement
  purposes.  Therefore, Security Capabilities are represented as
  abstract functionalities that a NSF owns in terms of enforcement
  actions, conditions that can apply in order to determine to which
  packet or traffic enforce the actions, and other mechanisms that NSF
  use to determine the actions to enforce.  The proposed capability
  model defines without ambiguities the operations a function can do in
  term of security policy enforcement.




Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org<http://tools.ietf.org>.

The IETF Secretariat

--
"Esta vez no fallaremos, Doctor Infierno"

Dr Diego R. Lopez
Telefonica I+D
http://people.tid.es/diego.lopez/

e-mail: diego.r.lopez@telefonica.com<mailto:diego.r.lopez@telefonica.com>
Tel:    +34 913 129 041
Mobile: +34 682 051 091
----------------------------------


________________________________

Este mensaje y sus adjuntos se dirigen exclusivamente a su destinatario, puede contener información privilegiada o confidencial y es para uso exclusivo de la persona o entidad de destino. Si no es usted. el destinatario indicado, queda notificado de que la lectura, utilización, divulgación y/o copia sin autorización puede estar prohibida en virtud de la legislación vigente. Si ha recibido este mensaje por error, le rogamos que nos lo comunique inmediatamente por esta misma vía y proceda a su destrucción.

The information contained in this transmission is privileged and confidential information intended only for the use of the individual or entity named above. If the reader of this message is not the intended recipient, you are hereby notified that any dissemination, distribution or copying of this communication is strictly prohibited. If you have received this transmission in error, do not read it. Please immediately reply to the sender that you have received this communication in error and then delete it.

Esta mensagem e seus anexos se dirigem exclusivamente ao seu destinatário, pode conter informação privilegiada ou confidencial e é para uso exclusivo da pessoa ou entidade de destino. Se não é vossa senhoria o destinatário indicado, fica notificado de que a leitura, utilização, divulgação e/ou cópia sem autorização pode estar proibida em virtude da legislação vigente. Se recebeu esta mensagem por erro, rogamos-lhe que nos o comunique imediatamente por esta mesma via e proceda a sua destruição