Re: [I2nsf] [Last-Call] New Version Notification for draft-ietf-i2nsf-sdn-ipsec-flow-protection-11.txt

tom petch <daedulus@btconnect.com> Fri, 30 October 2020 11:14 UTC

Return-Path: <daedulus@btconnect.com>
X-Original-To: i2nsf@ietfa.amsl.com
Delivered-To: i2nsf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 740493A09EA; Fri, 30 Oct 2020 04:14:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.147
X-Spam-Level:
X-Spam-Status: No, score=-2.147 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, MSGID_FROM_MTA_HEADER=0.001, NICE_REPLY_A=-0.247, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=btconnect.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vA0B3n1Wk8GH; Fri, 30 Oct 2020 04:14:11 -0700 (PDT)
Received: from EUR04-HE1-obe.outbound.protection.outlook.com (mail-eopbgr70110.outbound.protection.outlook.com [40.107.7.110]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2F9103A098D; Fri, 30 Oct 2020 04:14:10 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=P9cN6EE3hKJCPn639dAWV418dqwlRcw+nmbwefwfl/6mGfFRRp8rsrY91FvFhojp4GU9+MbbiGSlsTGGy7BulT6/wEUjQELb5C5mxixmkVBMWeoIh8Kl5YFytvX1fU0waSGLQV8tyDDsEQLGwxT+MLzVN0TjoknkTSAoN+8VFH5LOKsd/R7nzd/jZjkmMFF0WmuukkcImdPVovTmWNLErSLAxd8insoEuLXQ4eQgbTGLgAJE0zWkZvAqkPqYqoil3K1b+ToMA4Gz9pe+0LO04nL1COuCGv7TDmjvQKcfLSqx5RnfxhvDCQKIjuykJQyq8UyyfHgpGWvKpJswyarQ8g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=RGwFUnIR8Iivb50F8q85Ns9Poz456tWO82o8o74V0UA=; b=IwO2SAgZf6e/edrvRTdyIc+shS4zGqDh3gHOEjNh9uxm3T9l4LiwAT7jFQ+QBP8iORHc+Ox4TVYSz0K8vjeoAyZIS7QnwV6B9UskADF46/3QLd+RcXRzCNAi1vUj2extZmo5GpzBrTBe3YZ0We/y+H8+IKNJa7WbxLJPSKYgfjUHc3fnO1YG1GEWN1t2FMbMKADylazGOkSb2OYB5Z/O7+6CESFIjJ2n77m1s4EJqbfbUSc9/cVgzi894nXdK6H/JspYdAiL30hlET0I1k0jG34MW0WUtKB2T3WyiVzp2Opv/+Vzvsqr4a/1WZcghujZOaKfo/YqarK0+gyXZ1LNmQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=btconnect.com; dmarc=pass action=none header.from=btconnect.com; dkim=pass header.d=btconnect.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=btconnect.onmicrosoft.com; s=selector2-btconnect-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=RGwFUnIR8Iivb50F8q85Ns9Poz456tWO82o8o74V0UA=; b=mh7SX0uoS7XOQYvvPalZUUQzTjSiFk3bqlcHhw9URc0IWqPto9UZ4zm3tUwNK4waqUJICwHkUXozE4XX8LlPMS0C5uk76LQXXLipQKspfGp4iQxxxM6f6Ac5eCJah//DK2OtKlJ/ZrcH7zULDiVOge8hl3RG0eCi5vSfXeyJzpQ=
Authentication-Results: ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=none action=none header.from=btconnect.com;
Received: from VI1PR07MB6704.eurprd07.prod.outlook.com (2603:10a6:800:18b::8) by VI1PR0701MB2221.eurprd07.prod.outlook.com (2603:10a6:800:22::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3499.14; Fri, 30 Oct 2020 11:14:08 +0000
Received: from VI1PR07MB6704.eurprd07.prod.outlook.com ([fe80::6407:6ea2:f517:eeae]) by VI1PR07MB6704.eurprd07.prod.outlook.com ([fe80::6407:6ea2:f517:eeae%7]) with mapi id 15.20.3499.028; Fri, 30 Oct 2020 11:14:08 +0000
To: Roman Danyliw <rdd@cert.org>, Rafa Marin-Lopez <rafa@um.es>
References: <160337357077.29083.9236626834026808055@ietfa.amsl.com> <EE5AB669-73BB-4517-A6F4-23B7807FB36E@um.es> <5F9815D1.9010303@btconnect.com> <DDE550B1-9A9E-4954-B6F9-C0A33ECE1275@um.es> <5F99B221.3040504@btconnect.com> <56155C91-BFE8-4BA9-A55C-46B12E59CD94@um.es> <5F9AEFD3.90903@btconnect.com> <059aaae84a354411ad1023afa2a837ba@cert.org>
Cc: "i2nsf@ietf.org" <i2nsf@ietf.org>, Fernando Pereniguez-Garcia <fernando.pereniguez@cud.upct.es>, Gabriel Lopez <gabilm@um.es>, "ynir.ietf@gmail.com" <ynir.ietf@gmail.com>, "last-call@ietf.org" <last-call@ietf.org>
From: tom petch <daedulus@btconnect.com>
Message-ID: <5F9BF578.6000101@btconnect.com>
Date: Fri, 30 Oct 2020 11:14:00 +0000
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:38.0) Gecko/20100101 Thunderbird/38.5.0
In-Reply-To: <059aaae84a354411ad1023afa2a837ba@cert.org>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 8bit
X-Originating-IP: [86.146.121.140]
X-ClientProxiedBy: LO3P123CA0009.GBRP123.PROD.OUTLOOK.COM (2603:10a6:600:ba::14) To VI1PR07MB6704.eurprd07.prod.outlook.com (2603:10a6:800:18b::8)
MIME-Version: 1.0
X-MS-Exchange-MessageSentRepresentingType: 1
Received: from [192.168.1.65] (86.146.121.140) by LO3P123CA0009.GBRP123.PROD.OUTLOOK.COM (2603:10a6:600:ba::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.3499.18 via Frontend Transport; Fri, 30 Oct 2020 11:14:07 +0000
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: c6f295c8-d9fa-465c-1e2d-08d87cc4eb6f
X-MS-TrafficTypeDiagnostic: VI1PR0701MB2221:
X-Microsoft-Antispam-PRVS: <VI1PR0701MB22213D3B627F65FFFCA6CA9AC6150@VI1PR0701MB2221.eurprd07.prod.outlook.com>
X-MS-Oob-TLC-OOBClassifiers: OLM:9508;
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 7ZR1cgCtiY1hI12TeQs7JeWgm019DJznkNxKBHDHBaGJ5tCohJG2pWmnxsCATtNvDGlTY2PmSiNpCHcNfJ0bsM4Bi8mXeP3tnMReSkLwBw985EtJHxKbY+KAsldLxJ8UUou++AyE33SgGBx1L1/vSeEvNA9rsW+T3gpswbSyEOTT+j+B+gvZS/Q+9A+LkrnWS+tNwGcNd8QXiGhBT+ATHNL85d5itQcX8422B5wsk3BV2ZVNgGLGcOe5aHoDmflDRqb8yaIjDvjzjTjCjoGqGFvthnqeXJH9kmneSjpxe8T81KRYG73BJ5svfTUeFM2Vfgnmc7wLj7c92ZY7/ZbLpQqxO+DLiYsR2a62/kDDhLOYON47ulfRuFzl1MBGDYmgBVxGg9ZpIBWt1M4lBMo9vA==
X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:VI1PR07MB6704.eurprd07.prod.outlook.com; PTR:; CAT:NONE; SFS:(39860400002)(136003)(366004)(346002)(376002)(396003)(16526019)(8936002)(33656002)(15650500001)(186003)(66476007)(87266011)(66574015)(966005)(26005)(36756003)(86362001)(83380400001)(6486002)(2906002)(4326008)(16576012)(6666004)(66946007)(52116002)(66556008)(316002)(478600001)(5660300002)(8676002)(110136005)(4001150100001)(30864003)(54906003)(2616005)(53546011)(956004); DIR:OUT; SFP:1102;
X-MS-Exchange-AntiSpam-MessageData: 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
X-OriginatorOrg: btconnect.com
X-MS-Exchange-CrossTenant-Network-Message-Id: c6f295c8-d9fa-465c-1e2d-08d87cc4eb6f
X-MS-Exchange-CrossTenant-AuthSource: VI1PR07MB6704.eurprd07.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Oct 2020 11:14:08.0577 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: cf8853ed-96e5-465b-9185-806bfe185e30
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: gWTkAwUhPCjP5WLgw4whEZIpVODs1MZsDvKfnF63ShyyL81kIi341K9yUxuOFcaMQlRaLBUwyu53EZEjAr6oFQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0701MB2221
Archived-At: <https://mailarchive.ietf.org/arch/msg/i2nsf/805Mpu1k4QUSyZuR-69RGAP0GbQ>
Subject: Re: [I2nsf] [Last-Call] New Version Notification for draft-ietf-i2nsf-sdn-ipsec-flow-protection-11.txt
X-BeenThere: i2nsf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "*I2NSF: Interface to Network Security Functions mailing list*" <i2nsf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2nsf>, <mailto:i2nsf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2nsf/>
List-Post: <mailto:i2nsf@ietf.org>
List-Help: <mailto:i2nsf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2nsf>, <mailto:i2nsf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 30 Oct 2020 11:14:14 -0000

Roman  not this I-D but see below

On 29/10/2020 18:46, Roman Danyliw wrote:
> Hi Tom!
>
>> -----Original Message-----
>> From: last-call <last-call-bounces@ietf.org> On Behalf Of tom petch
>> Sent: Thursday, October 29, 2020 12:38 PM
>> To: Rafa Marin-Lopez <rafa@um.es>
>> Cc: i2nsf@ietf.org; Fernando Pereniguez-Garcia
>> <fernando.pereniguez@cud.upct.es>; Gabriel Lopez <gabilm@um.es>;
>> ynir.ietf@gmail.com; last-call@ietf.org
>>
>> Top posting a new, related issue that may need Security AD or WG Chair to act
>> on.
>>
>> It seems to me that the IANA entries for IKEv2 are incomplete.  RFC8247 does a
>> fine job of specifying algorithms and adding information such as status
>> (MUST/SHOULD+), IoT, AEAD and so on, information which is not present on
>> IANA.  The policy for, e.g. Transform Type 1, is expert review and entries have
>> been added via draft-smyslov-esp-gont but the IANA entries lack this
>> information and, looking at the I-D, I see no such information (nor is there any
>> reason for it to be there).  Yet draft-ietf-i2nsf-sdn... needs this information as
>> references in the YANG module show.
>>
>> It seems to me that this is a similar situation to that which the TLS WG found
>> itself in and which led to a revision of the TLS IANA entries to provide what was
>> needed via additional columns.
>
> Please help me understand.  In particular, I'm not following why this document should modify IKE IANA registries.  In my view, this document is provides a data model to encode an "IKEv2 configuration" of sorts.  Certainly, there are valid/invalid/incomplete/not recommended ways to provide a configuration with this data model if one relied solely on the pointers to the IANA registries from the YANG module definition.  However, as you noted, RFC8247 already provides guidance on specifying a configuration (albeit this guidance isn't fully encoded in the registries).  Furthermore, this document states:
>
> Section 8.1
>     o  IKEv2 configurations should adhere to the recommendations in
>        [RFC8247].
>
> so there is guidance on producing a configuration.  What is missing?
>
>> I think that the IANA pages for IKEv2 need revising so that that additional
>> information that RFC8247 provides is required as additional columns in the
>> IANA entries at least for Type 1, Type 2, Type 3, Type 4 and Authentication
>> Method.
>
> While things could be clearer, I'm unsure of why _this YANG document_ should do a registry reengineering.  Did you mean it should be done in general?

Not this I-D but another I-D from a WG with closer links to IKEv2; I 
don't know which WG that would be but a Security AD would:-)

This I-D, as you quote, points to RFC8247 for guidance and that is fine. 
  But security moves on and new algorithms will be needed and this I-D 
also points to the IANA registry, which is Expert Review, where new 
entries have been added already; and for those the IANA Registry gives 
no guidance and the I-D that IANA references for the new entries - 
written by the Expert Reviewer! - also gives no guidance. Over time we 
are likely to accrue algorithms with no guidance unless and until an 
RFC8247-bis appears or we require IANA to have columns for guidance. 
Currently the new algorithms are GOST and so perhaps of limited interest 
but on the TLS list I am always seeing new algorithms appear and there 
the new IANA entry is required to give guidance.  My sense is that IKEv2 
is a bit slower to take up new ones but, as with RFC8247, it does 
eventually.

I think that users need those extra columns that RFC8247 provides on the 
IANA website so that when new algorithms are added by Expert Review, 
then that guidance must be added as well.  This is what the TLS WG came 
round to and I think that IKEv2 needs to do the same.

Tom Petch


> Regards,
> Roman
>
>> Tom Petch
>>
>> On 29/10/2020 11:23, Rafa Marin-Lopez wrote:
>>> Hi Tom:
>>>
>>>> El 28 oct 2020, a las 19:02, tom petch <daedulus@btconnect.com> escribió:
>>>>
>>>> On 28/10/2020 10:42, Rafa Marin-Lopez wrote:
>>>>> Hi Tom:
>>>>>
>>>>> Thank you very much for your insight. It is very helpful. Please see our
>> comments/questions inline.
>>>>>
>>>>>> El 27 oct 2020, a las 13:42, tom petch <daedulus@btconnect.com>
>> escribió:
>>>>>>
>>>>>> I think that the IESG will find a number of problems with this I-D.
>>>>>>
>>>>>> YANG module references RFC822 which is several years out of date
>>>>
>>>> Rafa
>>>>
>>>> On boiler plate, I mean the reference to RFC2119 which now must use the
>> language from RFC8174 in the body of the I-D; sorry for the confusion.
>>>
>>> Ah ok. I guess you are referring to change that paragraph with this:
>>>
>>>
>>> The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
>>> "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
>> "MAY", and
>>> "OPTIONAL" in this document are to be interpreted as described in BCP
>>> 14 RFC2119 RFC8174 when, and only when, they appear in all capitals,
>>> as shown here.
>>>
>>>>
>>>> On XXXX, you have XXXX standing in for more than one RFC-to-be which
>> confuses.  The convention is to use XXXX for this I-D and then AAAA BBBB etc
>> for any others such as the netconf I-D in this instance.
>>>
>>> Ah ok. In any case, we have now only XXXX for our RFC-to-be so problem
>> fixed.
>>>>
>>>> Two big issues, for me (perhaps not for others).  The convention with YANG
>> is for each successive line to be indented two characters, you have four, which
>> creates a lot of white space and pushes the text to the right hand margin.  I
>> think that two characters is the default when you use pyang to format a YANG
>> module.
>>>
>>> We can try to reduce it to two characters.
>>>
>>>>
>>>> And references.  I have had to work harder than I want to to make
>>>> sense of the IANA references.  I think you should have five separate
>>>> references in the I-D for IANA for Transform Type 1 Transform Type 3
>>>> Transform Type 4 Authentication Method Protocol Numbers and each
>>>> reference in the I-D should have a URL pointing to the specific section of
>> IANA web site.
>>>
>>> Ok, good. This follows what we thought.
>>>
>>>> In the YANG, it is harder to know what to do.  Those first three references
>> are in the third tier i.e.
>>>> Group - Internet Key Exchange V2 (IKEv2) Parameters Registry
>>>> -Transform Attribute Types and then Type 1, 3, 4 as the third tier as
>>>> I am calling it and I think that every reference in the YANG should
>>>> give me all three tiers after IANA in that order perhaps IANA; IKEv2
>>>> Parameters; Transform Atribute Types; Transform Type 1
>>>
>>> Great. We also considered this as a possible solution after sending our e-mail.
>> Let’s do it.
>>>
>>>> If the syntax needs tweeking, then the RFC Editor will do a good job of that
>> but at present the references are inconsistent in which elements are specified
>> in what order and that is something the RFC Editor probably cannot cope with.
>>>> Authentication Method is a registry so that just needs Group name and
>> Registry name after IANA.
>>>
>>> Ok, good.
>>>>
>>>> Some minor glitches.
>>>> I-D appears twice in the body of the I-D - perhaps document or memo.
>>>
>>> Ok.
>>>
>>>> objetives/objectives/
>>>
>>> Fixed.
>>>> end port number perhaps /must/MUST/
>>>
>>>> and YANG is very good at including such checks with a must ....
>>>> 'If AEAD is used .. where? this occurs in several places and I think that you
>> need to specify the leaf where AEAD will be specified or implied.
>>>
>>> Ok we have changed it to:
>>>
>>> If Authenticated Encryption with Associated Data (AEAD) is used (leaf
>>> esp-algorithms/encryption/algorithm-type)
>>> this flag MUST be false."
>>>
>>>> And is it possible to make that a YANG 'must' statement - looking at the
>> IKEv2 registries it is not obvious which are AEAD so that might be more
>> complexity than it is worth.
>>>> 'only available on linux kernels' Um implementation detail, you may get
>> asked to remove that altogether or at least to a Informative Appendix - I would
>> leave it in for now.
>>>
>>> Ok.
>>>
>>>> 'import ietf-i2nsf-ikec' the reference needs to be to a RFC and if it
>>>> is not yet an RFC then RFC XXXX <title> in both Appendix B and C
>>>
>>> Yes, we have changed that to:
>>>
>>> RFC XXXX: Software-Defined Networking
>>>                  (SDN)-based IPsec Flow Protection.
>>>
>>>> leaf-list pfs-groups could do with a reference - Transform Type 4?
>>>
>>> The leaf list is referring to type pfs-group and we have now
>>>
>>> typedef pfs-group {
>>>               type uint16;
>>>               description
>>>                   "DH groups for IKE and IPsec SA rekey.";
>>>               reference
>>>                   "IANA; Internet Key Exchange V2 (IKEv2) Parameters;
>>> 				Transform Atribute Types; Transform Type 4 -
>>>                   Diffie-Hellman Group Transform IDs.
>>> 				Section 3.3.2 in RFC 7296.";
>>>           }
>>>
>>>
>>>>
>>>> I am still working my way through the YANG so may have some more
>> comments tomorrow.
>>>
>>> Ok, do not worry we will work in -12 with these comments so far to have a
>> quick response. We can prepare a another version later with the rest of them.
>>>
>>> Thank you very much for your effort.
>>>>
>>>> Tom Petch
>>>>
>>>>
>>>>
>>>>
>>>>
>>>>
>>>>
>>>>
>>>>
>>>>
>>>>
>>>>
>>>>
>>>>
>>>>> We have realized that we missed to change this, even though we discussed
>> it. We will change it right away in the following way (bold):
>>>>>
>>>>> case rfc822-address-string {
>>>>>        leaf rfc822-address-string {
>>>>>             type string;
>>>>>             description
>>>>>                 "Specifies the identity as a
>>>>>                  fully-qualified RFC5322 email
>>>>>                  address string. An example is,
>>>>>                  jsmith@example.com. The string
>>>>>                  MUST NOT contain any
>>>>>                  terminators e.g., NULL, CR,
>>>>>                  etc.).";
>>>>>              reference
>>>>>                     "RFC 5322.";
>>>>>        }
>>>>> }
>>>>>
>>>>> Btw, we already used in the past “case rfc822-address-string” and “leaf
>> rfc822-address-string” since this is coming from IKEv2 standard. Do you think
>> we should change that name as well?
>>>>>
>>>>>
>>>>>>
>>>>>> YANG module references IANA Protocol Numbers which is not in the
>>>>>> I-D references
>>>>>
>>>>> We have included the following reference:
>>>>>
>>>>> [IANA-Protocols-Number]
>>>>>                 Internet Assigned Numbers Authority (IANA), "Protocol
>>>>>                 Numbers", January 2020.
>>>>>
>>>>>
>>>>>>
>>>>>> s.2 boiler plate is out of date
>>>>>
>>>>> What we see is the I-D has the second choice stated in
>>>>> https://www.ietf.org/standards/ids/guidelines/
>>>>>
>>>>> This Internet-Draft is submitted in full conformance with the
>>>>>      provisions of BCP 78 and BCP 79.
>>>>>
>>>>>      Internet-Drafts are working documents of the Internet Engineering
>>>>>      Task Force (IETF).  Note that other groups may also distribute
>>>>>      working documents as Internet-Drafts.  The list of current Internet-
>>>>>      Drafts is at https://datatracker.ietf.org/drafts/current/.
>>>>>
>>>>>      Internet-Drafts are draft documents valid for a maximum of six months
>>>>>      and may be updated, replaced, or obsoleted by other documents at any
>>>>>      time.  It is inappropriate to use Internet-Drafts as reference
>>>>>      material or to cite them other than as "work in progress."
>>>>>
>>>>> Could you refer what is out of date?
>>>>>
>>>>>>
>>>>>> XXXX is standing in for more than one RFC
>>>>>
>>>>> Yes, XXXX has been used because we do not know the future number
>> assigned to our I-D.
>>>>>
>>>>> Also we realized we also included this to refer to crypto-types I-D but this
>> has been solved now in a new version -12 that we are preparing to include your
>> comments. We noticed we can replace the type of rw cert-data?, ca-data*, crl-
>> data? for binary without any problem.
>>>>>
>>>>> |           |     +--rw cert-data?        binary
>>>>> |           +--rw private-key?            binary
>>>>> |           +--rw ca-data*                binary
>>>>> |           +--rw crl-data?               binary
>>>>>
>>>>>>
>>>>>> but the show stopper that makes a proper review of this too costly is the
>> references.  Those to IANA of which there are several I want to pursue.  The I-D
>> reference is to IKEv2 parameters. Sadly, this is a three tier structure and noone
>> agrees on what to call the third tier so I will call it tier3 here.  Top level is
>> Group, as per RFC8126, second level is Registry.  The I-D reference is to the
>> Group only which is fine if the actual reference then specifies the Registry and
>> Tier3 but they never do, usually just Tier3 e.g. Transform Type 3 which makes
>> for a lot of work for the reader, too much for this one.  You have to go hunting
>> in all the second level Registry until you can find a match for the Tier3
>> identifier. And there are no URL.  If you want an example that I find easy to use,
>> go look at RFC8407 (as usual).
>>>>>
>>>>> You’re right. Could you point the exact part at RFC 8407 with that
>> example? We would really appreciate it.
>>>>>
>>>>> On the other hand, would it be enough to include the URL for Transform
>> Type 3 https://www.iana.org/assignments/ikev2-parameters/ikev2-
>> parameters.xhtml#ikev2-parameters-7 ?
>>>>>
>>>>> (Same for Transform Type 1, Transform Type 4)
>>>>>
>>>>>>
>>>>>> The reference for import of i2nsf-ikec gives a YANG module name;
>>>>>> this needs to be the name of the RFC to be
>>>>>
>>>>> Fixed.
>>>>>
>>>>> import ietf-i2nsf-ikec {
>>>>>               prefix nsfikec;
>>>>>               reference
>>>>>                   "RFC XXXX: Software-Defined Networking
>>>>>                  (SDN)-based IPsec Flow Protection."; }
>>>>>
>>>>> We still use XXXX because we do not know the number assigned to the RFC
>> to be.
>>>>>
>>>>>>
>>>>>> The example IPv6 address in the YANG module has :0:0: which is usually
>> just ::
>>>>>
>>>>> Fixed.
>>>>>
>>>>> If you have any further comments, please let us know so we can
>>>>> include them in -12
>>>>>
>>>>> Best Regards.
>>>>>>
>>>>>> And I have some way to go still.
>>>>>>
>>>>>> Tom Petch
>>>>>>
>>>>>> On 22/10/2020 18:39, Rafa Marin-Lopez wrote:
>>>>>>> Dear all:
>>>>>>>
>>>>>>> After receiving a suggestion to make things clearer in the feature ikeless-
>> notification description, we have just uploaded a new version -11 with a minor
>> change to add the following text:
>>>>>>>
>>>>>>> feature ikeless-notification {
>>>>>>>               description
>>>>>>>                   "This feature indicates that the server supports
>>>>>>>                   generating notifications in the ikeless module.
>>>>>>>
>>>>>>>                   To ensure broader applicability of this module,
>>>>>>>                   the notifications are marked as a feature.
>>>>>>>                   For the implementation of ikeless case,
>>>>>>>                   the NSF is expected to implement this
>>>>>>>                   feature.";
>>>>>>>           }
>>>>>>>
>>>>>>> Best Regards.
>>>>>>>
>>>>>>>> Inicio del mensaje reenviado:
>>>>>>>>
>>>>>>>> De: internet-drafts@ietf.org
>>>>>>>> Asunto: New Version Notification for
>>>>>>>> draft-ietf-i2nsf-sdn-ipsec-flow-protection-11.txt
>>>>>>>> Fecha: 22 de octubre de 2020, 15:32:50 CEST
>>>>>>>> Para: "Fernando Pereniguez-Garcia"
>>>>>>>> <fernando.pereniguez@cud.upct.es>, "Rafael Lopez" <rafa@um.es>,
>>>>>>>> "Gabriel Lopez-Millan" <gabilm@um.es>, "Rafa Marin-Lopez"
>>>>>>>> <rafa@um.es>
>>>>>>>>
>>>>>>>>
>>>>>>>> A new version of I-D,
>>>>>>>> draft-ietf-i2nsf-sdn-ipsec-flow-protection-11.txt
>>>>>>>> has been successfully submitted by Rafa Marin-Lopez and posted to
>>>>>>>> the IETF repository.
>>>>>>>>
>>>>>>>> Name:		draft-ietf-i2nsf-sdn-ipsec-flow-protection
>>>>>>>> Revision:	11
>>>>>>>> Title:		Software-Defined Networking (SDN)-based IPsec Flow
>> Protection
>>>>>>>> Document date:	2020-10-22
>>>>>>>> Group:		i2nsf
>>>>>>>> Pages:		92
>>>>>>>> URL:            https://www.ietf.org/archive/id/draft-ietf-i2nsf-sdn-ipsec-
>> flow-protection-11.txt
>>>>>>>> Status:         https://datatracker.ietf.org/doc/draft-ietf-i2nsf-sdn-ipsec-
>> flow-protection/
>>>>>>>> Htmlized:       https://datatracker.ietf.org/doc/html/draft-ietf-i2nsf-sdn-
>> ipsec-flow-protection
>>>>>>>> Htmlized:       https://tools.ietf.org/html/draft-ietf-i2nsf-sdn-ipsec-flow-
>> protection-11
>>>>>>>> Diff:           https://www.ietf.org/rfcdiff?url2=draft-ietf-i2nsf-sdn-ipsec-
>> flow-protection-11
>>>>>>>>
>>>>>>>> Abstract:
>>>>>>>>     This document describes how to provide IPsec-based flow protection
>>>>>>>>     (integrity and confidentiality) by means of an Interface to Network
>>>>>>>>     Security Function (I2NSF) controller.  It considers two main well-
>>>>>>>>     known scenarios in IPsec: (i) gateway-to-gateway and (ii) host-to-
>>>>>>>>     host.  The service described in this document allows the
>>>>>>>>     configuration and monitoring of IPsec Security Associations (SAs)
>>>>>>>>     from a I2NSF Controller to one or several flow-based Network
>> Security
>>>>>>>>     Functions (NSFs) that rely on IPsec to protect data traffic.
>>>>>>>>
>>>>>>>>     The document focuses on the I2NSF NSF-facing interface by providing
>>>>>>>>     YANG data models for configuring the IPsec databases (SPD, SAD,
>> PAD)
>>>>>>>>     and IKEv2.  This allows IPsec SA establishment with minimal
>>>>>>>>     intervention by the network administrator.  It does not define any
>>>>>>>>     new protocol.
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>> Please note that it may take a couple of minutes from the time of
>>>>>>>> submission until the htmlized version and diff are available at
>> tools.ietf.org.
>>>>>>>>
>>>>>>>> The IETF Secretariat
>>>>>>>>
>>>>>>>>
>>>>>>>
>>>>>>> -------------------------------------------------------
>>>>>>> Rafa Marin-Lopez, PhD
>>>>>>> Dept. Information and Communications Engineering (DIIC) Faculty of
>>>>>>> Computer Science-University of Murcia
>>>>>>> 30100 Murcia - Spain
>>>>>>> Telf: +34868888501 Fax: +34868884151 e-mail: rafa@um.es
>>>>>>> -------------------------------------------------------
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>
>>>>> -------------------------------------------------------
>>>>> Rafa Marin-Lopez, PhD
>>>>> Dept. Information and Communications Engineering (DIIC) Faculty of
>>>>> Computer Science-University of Murcia
>>>>> 30100 Murcia - Spain
>>>>> Telf: +34868888501 Fax: +34868884151 e-mail: rafa@um.es
>>>>> -------------------------------------------------------
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>
>>>
>>> -------------------------------------------------------
>>> Rafa Marin-Lopez, PhD
>>> Dept. Information and Communications Engineering (DIIC) Faculty of
>>> Computer Science-University of Murcia
>>> 30100 Murcia - Spain
>>> Telf: +34868888501 Fax: +34868884151 e-mail: rafa@um.es
>>> -------------------------------------------------------
>>>
>>>
>>>
>>>
>>>
>>
>> --
>> last-call mailing list
>> last-call@ietf.org
>> https://www.ietf.org/mailman/listinfo/last-call