Re: [I2nsf] Fwd: AUTH48 [AP]: RFC 9061 <draft-ietf-i2nsf-sdn-ipsec-flow-protection-14.txt> NOW AVAILABLE

tom petch <ietfa@btconnect.com> Tue, 15 June 2021 10:43 UTC

Return-Path: <ietfa@btconnect.com>
X-Original-To: i2nsf@ietfa.amsl.com
Delivered-To: i2nsf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3256B3A1E58 for <i2nsf@ietfa.amsl.com>; Tue, 15 Jun 2021 03:43:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.601
X-Spam-Level:
X-Spam-Status: No, score=-2.601 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=btconnect.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id W-kHrrzLfrIJ for <i2nsf@ietfa.amsl.com>; Tue, 15 Jun 2021 03:43:45 -0700 (PDT)
Received: from EUR01-VE1-obe.outbound.protection.outlook.com (mail-eopbgr140114.outbound.protection.outlook.com [40.107.14.114]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EABF93A1E50 for <i2nsf@ietf.org>; Tue, 15 Jun 2021 03:43:44 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=DR9yx6Jbfp6OKzkHnZKikkllJ9zJB6/Js/P47WfGX2LXzjIqUJq/LizUenT+YdwvY8TQ2DowGcgtTXAFPR+n8Sj2qg50yvT1JYyaBHd5nFg8SKvLhcTuZSMUIqwCZjNFM19a4g2YMJ90sVzSL2lnfylnRF6+djI6Bc61iIyy8nCa3VMLJsmlhwWUEIr/viHzmCpbqf21+hNhbXhB79QwgrVya48rFyBaZzZ3dqq/ZTKj6rxO1X0YWYSBFkZPX79kFbq5raqoODbFtvbSZhFCvu/lLVLBS6H7YnlJ+/vDs5gFfmIqOGu0fhJYwyQtZGRLVI+MPyh6TdA1XuG7AmHJ6w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=9CYDS7gh+QOVoZUmtETusQiYLx424aSHoGNQyor7gdU=; b=ioWU4jsKGTa6qjqFjushz4B3Bbk6bKcJ2KXwTIZJuBnoSM8QgTJJaG1AuM29co1j1Lj0uDx7hQOzO3RJRL7kJPOPWtmLaNuW/lyLfO5rARdaeSqXFAPpTPiZLEw5VmGy3a4rtayUq/SxUzAojI+MOqR49N4zzrFg03vCdjLrqVt8gYKCztwkUHvBwup+0hQLaDNinX2w1mbD5cXYssqijx7YDxEp2yROE2DiYhWG+zbUpo771kEmVaEnIh2tSYdzk12TOgJ0eU4jaJRzjh7h7LMOyxtem09cbd3qynPT5zQyntaz5rKMFcH6TQBAbJcqHXDJRrwWPjI/bNOtg/jsTQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=btconnect.com; dmarc=pass action=none header.from=btconnect.com; dkim=pass header.d=btconnect.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=btconnect.onmicrosoft.com; s=selector2-btconnect-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=9CYDS7gh+QOVoZUmtETusQiYLx424aSHoGNQyor7gdU=; b=vhXoLzh2lyYcrJIKw+Y0xIOcxUhfdJDCHKoll3U68e0SkuAxekC2obXWKQ4GZADWdsPRXUH/3sphxgA7Z1nMWMffJw+ikvB4ceLpY4NC+3gPoTggRf332JJLNwe/WoAhOTgLwUAolv9rqXAK0LWbvKr8JnkreObYpd2QJ5GR3wc=
Received: from DB7PR07MB5546.eurprd07.prod.outlook.com (2603:10a6:10:73::23) by DB6PR07MB4231.eurprd07.prod.outlook.com (2603:10a6:6:50::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4242.10; Tue, 15 Jun 2021 10:43:38 +0000
Received: from DB7PR07MB5546.eurprd07.prod.outlook.com ([fe80::6d5c:6704:7e3a:8e52]) by DB7PR07MB5546.eurprd07.prod.outlook.com ([fe80::6d5c:6704:7e3a:8e52%7]) with mapi id 15.20.4242.015; Tue, 15 Jun 2021 10:43:38 +0000
From: tom petch <ietfa@btconnect.com>
To: Rafa Marin-Lopez <rafa@um.es>, "i2nsf@ietf.org" <i2nsf@ietf.org>
CC: Roman Danyliw <rdd@cert.org>, Gabriel Lopez <gabilm@um.es>, Yoav Nir <ynir.ietf@gmail.com>, Fernando Pereniguez-Garcia <fernando.pereniguez@cud.upct.es>, Linda Dunbar <linda.dunbar@futurewei.com>, Benjamin Kaduk <kaduk@mit.edu>, "rfc-editor@rfc-editor.org" <rfc-editor@rfc-editor.org>
Thread-Topic: [I2nsf] Fwd: AUTH48 [AP]: RFC 9061 <draft-ietf-i2nsf-sdn-ipsec-flow-protection-14.txt> NOW AVAILABLE
Thread-Index: AQHXYO47u8r+XTmnxUi84ix0gg9EpasU4teU
Date: Tue, 15 Jun 2021 10:43:38 +0000
Message-ID: <DB7PR07MB5546A76F0156F2C0A54709E2A2309@DB7PR07MB5546.eurprd07.prod.outlook.com>
References: <20210610205829.E2527F407AE@rfc-editor.org>, <6BCE4D74-963A-4CF6-9CA5-E5FCA01340F0@um.es>
In-Reply-To: <6BCE4D74-963A-4CF6-9CA5-E5FCA01340F0@um.es>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: um.es; dkim=none (message not signed) header.d=none;um.es; dmarc=none action=none header.from=btconnect.com;
x-originating-ip: [86.143.250.86]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: c25e7161-9a56-4772-134c-08d92fea6f54
x-ms-traffictypediagnostic: DB6PR07MB4231:
x-microsoft-antispam-prvs: <DB6PR07MB4231A83A8B15ED1E9F7D352BA2309@DB6PR07MB4231.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:7219;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DB7PR07MB5546.eurprd07.prod.outlook.com; PTR:; CAT:NONE; SFS:(136003)(39860400002)(346002)(366004)(376002)(396003)(4326008)(26005)(2906002)(86362001)(9686003)(316002)(83380400001)(55016002)(52536014)(110136005)(54906003)(71200400001)(33656002)(38100700002)(186003)(122000001)(7696005)(66556008)(66476007)(66446008)(64756008)(91956017)(76116006)(66946007)(8676002)(53546011)(966005)(5660300002)(478600001)(8936002)(6506007); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: btconnect.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DB7PR07MB5546.eurprd07.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: c25e7161-9a56-4772-134c-08d92fea6f54
X-MS-Exchange-CrossTenant-originalarrivaltime: 15 Jun 2021 10:43:38.5030 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: cf8853ed-96e5-465b-9185-806bfe185e30
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: k6JQVhmQ55i+MPchLzYNPdznd4CP+G9a2iWibeWIxv47yW/Upv+f6FP8NrkdJ4qfAuF44dRNLlPpUzLdKui2/g==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6PR07MB4231
Archived-At: <https://mailarchive.ietf.org/arch/msg/i2nsf/IIzelS-Xx3t_QcjNsZTcaJI0VS0>
Subject: Re: [I2nsf] Fwd: AUTH48 [AP]: RFC 9061 <draft-ietf-i2nsf-sdn-ipsec-flow-protection-14.txt> NOW AVAILABLE
X-BeenThere: i2nsf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "*I2NSF: Interface to Network Security Functions mailing list*" <i2nsf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2nsf>, <mailto:i2nsf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2nsf/>
List-Post: <mailto:i2nsf@ietf.org>
List-Help: <mailto:i2nsf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2nsf>, <mailto:i2nsf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 15 Jun 2021 10:43:50 -0000

From: I2nsf <i2nsf-bounces@ietf.org> on behalf of Rafa Marin-Lopez <rafa@um.es>
Sent: 14 June 2021 08:23

Dear I2NSF WG members:

We have received a suggestion from the RFC editor about a possible change in the title:

Software-Defined Networking (SDN)-based IPsec Flow Protection —>

A YANG Data Model for Software-Defined Networking (SDN)-based IPsec Flow Protection

We think this is reasonable and it is inline with the document.

If you do not have any objection, we can apply this change. Any thoughts?

<tp>
I think that the amended title does  underplay the I-D slightly.  There are ten or so pages at the front of this I-D which, as the Abstract says, 'describes how to provide IPsec-based flow protection'.  Other I2NSF I-D have even more such material such as an Information model and I think that this is a good feature of I2NSF I-D.  By contrast, some WG produce I-D which have no such material, a page of abstract and Introduction and then 'Bang', all YANG, so I quite like the current title..

Tom Petch

Best Regards.

Inicio del mensaje reenviado:

De: rfc-editor@rfc-editor.org<mailto:rfc-editor@rfc-editor.org>
Asunto: Re: AUTH48 [AP]: RFC 9061 <draft-ietf-i2nsf-sdn-ipsec-flow-protection-14.txt> NOW AVAILABLE
Fecha: 10 de junio de 2021, 22:58:29 CEST
Para: rafa@um.es<mailto:rafa@um.es>, gabilm@um.es<mailto:gabilm@um.es>, fernando.pereniguez@cud.upct.es<mailto:fernando.pereniguez@cud.upct.es>
Cc: rfc-editor@rfc-editor.org<mailto:rfc-editor@rfc-editor.org>, i2nsf-ads@ietf.org<mailto:i2nsf-ads@ietf.org>, i2nsf-chairs@ietf.org<mailto:i2nsf-chairs@ietf.org>, ynir.ietf@gmail.com<mailto:ynir.ietf@gmail.com>

Authors,

While reviewing this document during AUTH48, please resolve (as necessary) the following questions, which are also in the XML file.

1) <!--[rfced] We note that most of the recently published RFCs containing
YANG modules format their titles as "A YANG Data Model for...", for example:

   RFC 8022 - A YANG Data Model for Routing Management
   RFC 7407 - A YANG Data Model for SNMP Configuration
   RFC 7317 - A YANG Data Model for System Management
   RFC 7277 - A YANG Data Model for IP Management

Please consider whether the title of this document should be updated.
-->


2) <!--[rfced] For clarity, may we change "while" to "whereas" here?
This would make it clear that the intended meaning is a contrast
rather than "at the same time".

Original:
 Therefore, the NSF will only have support for
 IPsec while key management functionality is moved to the I2NSF
 Controller.
-->


3) <!--[rfced] We see a number of author-inserted comments in the .xml
file for this document. We are unsure if these have been resolved.
Please review and let us know if these can be deleted or if they need
to be addressed.
-->


4) <!-- [rfced] FYI: Note that the YANG modules have been updated per
the formatting option of pyang.  Please let us know any concerns.
-->


5) <!--[rfced] In Sections 6.2.1 and 6.2.3, should "rw enable?"
and "leaf enable" be "rw enabled?" (as used in RFC 8340 ad most
published RFCs) and "leaf enabled" (as used in most published RFCs)?

Original:
rw enable?   boolean
...
leaf enable {
-->


6) <!--[rfced] RFC 2560 is referenced in the YANG module in Section 5.2.3
but is not mentioned anywhere else in the text. May we add it as a
Normative Reference and to the introductory text in Section 5.2.3?
-->


7) <!--[rfced] In tree diagram in Section 5.3.1, the two lines that
include "ipsec-protocol-parameters" are one character too long to
fit in the space allowed in the txt output file. Please let us know
how to adjust this so that it will fit.
-->


8) <!--[rfced] In the Security Considerations section, the text
does not exactly match what appears on
<https://trac.ietf.org/trac/ops/wiki/yang-security-guidelines>.
Paragraph 5 of the YANG boilerplate text is missing. This seems
intentional, but we'd like to confirm that this is correct.
-->


9) <!--[rfced] The following reference has been superseded
by a 2021 version.  Would you like for it to be updated?

Original:
  [ITU-T.X.690]
             "Recommendation ITU-T X.690", August 2015.

2021 version:
  [ITU-T.X.690]
             International Telecommunication Union, "Information
             technology - ASN.1 encoding rules: Specification of Basic
             Encoding Rules (BER), Canonical Encoding Rules (CER) and
             Distinguished Encoding Rules (DER)", ITU-T Recommendation
             X.690, ISO/IEC 8825-1, February 2021.
-->


10) <!--[rfced] Should "SaaS" be expanded as "Software as a Service"
or "Storage as a Service"?

Original:
  For example, SD-WAN technologies are providing
  dynamic and on-demand VPN connections between branch offices, or
  between branches and SaaS cloud services.
-->


11) <!-- [rfced] Please review the "Inclusive Language" portion of
the online Style Guide
<https://www.rfc-editor.org/styleguide/part2/#inclusive_language> and let
us know if any changes are needed.
-->


Thank you.

RFC Editor/ap/jm

On 6/10/21 3:55 PM, rfc-editor@rfc-editor.org<mailto:rfc-editor@rfc-editor.org> wrote:

*****IMPORTANT*****

Updated 2021/06/10

RFC Author(s):
--------------

Instructions for Completing AUTH48

Your document has now entered AUTH48.  Once it has been reviewed and
approved by you and all coauthors, it will be published as an RFC.
If an author is no longer available, there are several remedies
available as listed in the FAQ (https://www.rfc-editor.org/faq/).

You and you coauthors are responsible for engaging other parties
(e.g., Contributors or Working Group) as necessary before providing
your approval.

Planning your review
---------------------

Please review the following aspects of your document:

*  RFC Editor questions

  Please review and resolve any questions raised by the RFC Editor
  that have been included in the XML file as comments marked as
  follows:

  <!-- [rfced] ... -->

  These questions will also be sent in a subsequent email.

*  Changes submitted by coauthors

  Please ensure that you review any changes submitted by your
  coauthors.  We assume that if you do not speak up that you
  agree to changes submitted by your coauthors.

*  Content

  Please review the full content of the document, as this cannot
  change once the RFC is published. Please pay particular attention to:
  - IANA considerations updates (if applicable)
  - contact information
  - references

*  Copyright notices and legends

  Please review the copyright notice and legends as defined in
  RFC 5378 and the Trust Legal Provisions
  (TLP – https://trustee.ietf.org/license-info/).

*  Semantic markup

  Please review the markup in the XML file to ensure that elements of
  content are correctly tagged.  For example, ensure that <sourcecode>
  and <artwork> are set correctly.  See details at
  <https://xml2rfc.tools.ietf.org/xml2rfc-doc.html>.

*  Formatted output

  Please review the PDF, HTML, and TXT files to ensure that the
  formatted output, as generated from the markup in the XML file, is
  reasonable.  Please note that the TXT will have formatting
  limitations compared to the PDF and HTML.


Submitting changes
------------------

To submit changes, please reply to this email with one of the following,
using ‘REPLY ALL’ as all the parties CC’ed on this message need to see
your changes:

An update to the provided XML file
— OR —
An explicit list of changes in this format

Section # (or indicate Global)

OLD:
old text

NEW:
new text

You do not need to reply with both an updated XML file and an explicit
list of changes, as either form is sufficient.

We will ask a stream manager to review and approve any changes that seem
beyond editorial in nature, e.g., addition of new text, deletion of text,
and technical changes.  Information about stream managers can be found in
the FAQ.  Editorial changes do not require approval from a stream manager.


Approving for publication
--------------------------

To approve your RFC for publication, please reply to this email s
tating that you approve this RFC for publication.  Please use ‘REPLY ALL’
as all the parties CC’ed on this message need to see your approval.


Files
-----

The files are available here:
  https://www.rfc-editor.org/authors/rfc9061.xml
  https://www.rfc-editor.org/authors/rfc9061.html
  https://www.rfc-editor.org/authors/rfc9061.pdf
  https://www.rfc-editor.org/authors/rfc9061.txt

Diff file of the text:
  https://www.rfc-editor.org/authors/rfc9061-diff.html

Diff of the XML:
  https://www.rfc-editor.org/authors/rfc9061-xmldiff1.html

The following files are provided to facilitate creation of your own
diff files of the XML.

Initial XMLv3 created using XMLv2 as input:
  https://www.rfc-editor.org/authors/rfc9061.original.v2v3.xml

XMLv3 file that is a best effort to capture v3-related format updates
only:
  https://www.rfc-editor.org/authors/rfc9061.form.xml


Tracking progress
-----------------

The details of the AUTH48 status of your document are here:
  https://www.rfc-editor.org/auth48/rfc9061

Please let us know if you have any questions.

Thank you for your cooperation,

RFC Editor

--------------------------------------
RFC9061 (draft-ietf-i2nsf-sdn-ipsec-flow-protection-14)

Title            : Software-Defined Networking (SDN)-based IPsec Flow Protection
Author(s)        : R. Marin-Lopez, G. Lopez-Millan, F. Pereniguez-Garcia
WG Chair(s)      : Linda Dunbar, Yoav Nir
Area Director(s) : Roman Danyliw, Benjamin Kaduk



-------------------------------------------------------
Rafa Marin-Lopez, PhD
Dept. Information and Communications Engineering (DIIC)
Faculty of Computer Science-University of Murcia
30100 Murcia - Spain
Telf: +34868888501 Fax: +34868884151 e-mail: rafa@um.es<mailto:rafa@um.es>
-------------------------------------------------------