Re: [I2nsf] Narrowing down the scope of work for the I2NSF Re-Chartering
"Mr. Jaehoon Paul Jeong" <jaehoon.paul@gmail.com> Tue, 05 April 2022 16:29 UTC
Return-Path: <jaehoon.paul@gmail.com>
X-Original-To: i2nsf@ietfa.amsl.com
Delivered-To: i2nsf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 961CD3A07D3 for <i2nsf@ietfa.amsl.com>; Tue, 5 Apr 2022 09:29:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_HK_NAME_FM_MR_MRS=0.01, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RmTuDTUDDNL1 for <i2nsf@ietfa.amsl.com>; Tue, 5 Apr 2022 09:29:46 -0700 (PDT)
Received: from mail-lj1-x232.google.com (mail-lj1-x232.google.com [IPv6:2a00:1450:4864:20::232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B7C463A09B7 for <i2nsf@ietf.org>; Tue, 5 Apr 2022 09:29:45 -0700 (PDT)
Received: by mail-lj1-x232.google.com with SMTP id by7so17929708ljb.0 for <i2nsf@ietf.org>; Tue, 05 Apr 2022 09:29:45 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=htVmXWh5VOFbz/i364QjhNM1Cs+TuRE/xBUJmKCmdYs=; b=R7T9lP5RN9scdkrZIeV1HI4ToeowXkMJS8gsLQBeomQLyj+hZpxLA0FpvkON64Ha4K 8syQeH2AUfwGQwPYdIGxwelf3EUhZeSHytdBT8U05oz3moFHTvdNcjsGOwdMDGWrtkpX xe2NfQJRxqB/NZrgdRhSFLfzJjiDBR8mWg9G8VXPB33j5TWbsYrl6QjnU6L/Q4l7unhD c1o49QVqdBuE+PisDnTkwKC1UHM+dLNo/TmwmdgmlTqzU9oyJjR8TbeQVegPTQsMMutu KVOAK17wTTZdgbugMu2Vt/8DVbzz8kUgcxu4ZDG4UIpXQE6WIcmCpIBoYFhbxgV49KWm wwEw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=htVmXWh5VOFbz/i364QjhNM1Cs+TuRE/xBUJmKCmdYs=; b=nvEfLxKPtpaE6tEU7ywXV6Kp1TvXYjiUVawYU+dkpxe5yZrkw5zqFuRMqNjC8PSxpz kuJlJSZ5uW/OiS+jGD0uHWh4XOCyy386CVXwybpUZ1bfQyiSAY2oJRrcgswyzrnR3bPr oTAMC4h66dZ8P1PuDkuKxR5+BUPPXuces7zdHiXRERhLSxsWOUG/vvrmPzOREU7bAS4q HEkBmJfMh9vBJZEemM7GEgnnFQkW4+rIW1JC3bTE59mw3eClZ6JlERwdXOKx2SX/4z1j eQ9xcrrBDFbFmrCfbL0xwpeq+X83/hVMcTzDXrff9MvYwYdjig2mNXmUMwAo1AKoZW9G prsg==
X-Gm-Message-State: AOAM5331CP7YiqFpgw4J6g6CnUUQKipQlKBRYICdg3q4shVWQZgIO+nY PjFRlmYMVKfVuNLHFBLV5VoCDFgGc0YBdWDXn3I=
X-Google-Smtp-Source: ABdhPJw9NFpCYJk9twDS0H6urcqifSiR9yAUNPojqvgKnwJi8uP1RAem8gVv9vf5nNUn3z3FAJBHLOQ1hJX4nuf3tD4=
X-Received: by 2002:a2e:9886:0:b0:24a:c13b:5337 with SMTP id b6-20020a2e9886000000b0024ac13b5337mr2703946ljj.409.1649176183084; Tue, 05 Apr 2022 09:29:43 -0700 (PDT)
MIME-Version: 1.0
References: <CO1PR13MB49205BF5D1A1519D98655AA2851F9@CO1PR13MB4920.namprd13.prod.outlook.com> <CAPK2Dex2D9YTn+TVQG6GN6RwOuRVHNYQ8mmHRg64SLvd0=i92g@mail.gmail.com> <CO1PR13MB4920DDEDAE7F30D6C9F4C1C685E59@CO1PR13MB4920.namprd13.prod.outlook.com> <CAPK2DeydM+t+3xavropPt85dCTU_vYWwy+asjh40g8CHzAavqA@mail.gmail.com>
In-Reply-To: <CAPK2DeydM+t+3xavropPt85dCTU_vYWwy+asjh40g8CHzAavqA@mail.gmail.com>
From: "Mr. Jaehoon Paul Jeong" <jaehoon.paul@gmail.com>
Date: Wed, 06 Apr 2022 01:29:06 +0900
Message-ID: <CAPK2DeyHO7LmDTxK6L-zrzAO8VDGhdsVPBQrNi_oC2_mTXz4qQ@mail.gmail.com>
To: Linda Dunbar <linda.dunbar@futurewei.com>, Yoav Nir <ynir.ietf@gmail.com>
Cc: "i2nsf@ietf.org" <i2nsf@ietf.org>, Roman Danyliw <rdd@cert.org>, tom petch <daedulus@btconnect.com>, Susan Hares <shares@ndzh.com>, DIEGO LOPEZ GARCIA <diego.r.lopez@telefonica.com>, JungSoo Park <pjs@etri.re.kr>, Yunchul Choi <cyc79@etri.re.kr>, Patrick Lingga <patricklink888@gmail.com>, Jeong Hyeon Kim <jeonghyeonkim92@gmail.com>, Younghan Kim <younghak@ssu.ac.kr>, "Panwei (William)" <william.panwei@huawei.com>, Henk Birkholz <henk.birkholz@sit.fraunhofer.de>, yangpenglin <yangpenglin@chinamobile.com>, Kyoungjae Sun <gomjae@dcn.ssu.ac.kr>, Hyunsik Yang <yangun@dcn.ssu.ac.kr>, skku-iotlab-members <skku-iotlab-members@googlegroups.com>, "Mr. Jaehoon Paul Jeong" <jaehoon.paul@gmail.com>
Content-Type: multipart/alternative; boundary="000000000000909ca205dbeac0e4"
Archived-At: <https://mailarchive.ietf.org/arch/msg/i2nsf/O9P1cmitBDI__4pq9Iuz703_bSQ>
Subject: Re: [I2nsf] Narrowing down the scope of work for the I2NSF Re-Chartering
X-BeenThere: i2nsf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "*I2NSF: Interface to Network Security Functions mailing list*" <i2nsf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2nsf>, <mailto:i2nsf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2nsf/>
List-Post: <mailto:i2nsf@ietf.org>
List-Help: <mailto:i2nsf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2nsf>, <mailto:i2nsf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 05 Apr 2022 16:29:52 -0000
Hi Linda and Yoav, Here is the proposed structure with four categories for the I2NSF Rechartering based on our discussion. --------------------------------------------------------------------------------------------------------------- 1. The Augmentation of Architecture and Interfaces for Security Management Automation in I2NSF - An Extension of I2NSF Framework for Security Management Automation - Support of Security Policy/Feedback Translation - Support of Cloud Native Systems for I2NSF - Support of Security Audit System - Support of Remote Attestation 2. YANG Data Models for Security Management Automation in I2NSF - Application Interface YANG Data Model - Remote Attestation Interface YANG Data Model - Enhancement of five I2NSF YANG Data Models to support New Protocols such as QUIC and HTTP/3 - A Common YANG Data Model for I2NSF YANG Data Models (including common identities) 3. Guidelines of Security Policy Translation for Security Management Automation in I2NSF - Policy Translation between Consumer-Facing Interface and NSF-Facing Interface - Policy/Feedback Translation between Application Interface and NSF-Facing Interface (or Consumer-Facing Interface) 4. Use Cases of I2NSF for Secured Networks - I2NSF for BGP Security Parameter Exchange (i.e., IPsec policies to functions embedded in nodes running BGP) - I2NSF for Security Management in Internet of Things Devices - I2NSF for Security Management in Autonomous Vehicles --------------------------------------------------------------------------------------------------------------- How about it? Thanks. Best Regards, Paul On Wed, Apr 6, 2022 at 12:47 AM Mr. Jaehoon Paul Jeong < jaehoon.paul@gmail.com> wrote: > Hi Linda, > > On Tue, Apr 5, 2022 at 3:22 AM Linda Dunbar <linda.dunbar@futurewei.com> > wrote: > >> Paul, >> >> >> >> IESG doesn’t like fancy acronyms, mentioning Block chain without >> describing the additional features won’t go very far. >> >> >> >> Suggest to have a narrower scoped work proposal, so that it is more >> likely to get IESG approval. >> >> >> >> Comments to your suggested work items for I2NSF Rechartering are inserted >> below: >> >> >> >> >> >> *From:* Mr. Jaehoon Paul Jeong <jaehoon.paul@gmail.com> >> *Sent:* Friday, April 1, 2022 2:51 AM >> *To:* Linda Dunbar <linda.dunbar@futurewei.com> >> *Cc:* i2nsf@ietf.org; Roman Danyliw <rdd@cert.org>; Yoav Nir < >> ynir.ietf@gmail.com>; tom petch <daedulus@btconnect.com>; Susan Hares < >> shares@ndzh.com>; DIEGO LOPEZ GARCIA <diego.r.lopez@telefonica.com>; >> JungSoo Park <pjs@etri.re.kr>; Yunchul Choi <cyc79@etri.re.kr>; Patrick >> Lingga <patricklink888@gmail.com>; Jeong Hyeon Kim < >> jeonghyeonkim92@gmail.com>; Younghan Kim <younghak@ssu.ac.kr>; Panwei >> (William) <william.panwei@huawei.com>; Henk Birkholz < >> henk.birkholz@sit.fraunhofer.de>; yangpenglin < >> yangpenglin@chinamobile.com>; Kyoungjae Sun <gomjae@dcn.ssu.ac.kr>; >> Hyunsik Yang <yangun@dcn.ssu.ac.kr>; skku-iotlab-members < >> skku-iotlab-members@googlegroups.com>; Mr. Jaehoon Paul Jeong < >> jaehoon.paul@gmail.com> >> *Subject:* Re: Narrowing down the scope of work for the I2NSF >> Re-Chartering >> >> >> >> Hi Linda and Yoav, >> >> I would say that the theme of this I2NSF Re-Chartering is "Security >> Management Automation". >> This theme is based on 7-year I2NSF standardization and hackathon >> projects with our I2NSF WG colleagues. >> >> May I suggest three more work items in addition to your proposed work >> items? >> >> The following three work items can be handled with focus along with the >> CCed I2NSF WG colleagues >> >> as coauthors and contributors: >> >> --------------------------------------------------------------------------------------------------------------------------------------------------------------- >> 1. Security Service Management through Leveraging I2NSF Framework and >> Interfaces >> - Main Contents >> . An Extension of I2NSF Framework for Intelligent Security Management >> Automation >> . Distributed Auditing Services for Supply Chain Attacks and Insider >> Attacks by Distributed Ledger Technology (DLT) and Remote Attestation >> . Support of Containers for I2NSF in Cloud Native Systems >> . Support of Other Contemporary Technologies for I2NSF such as Quantum >> Key Distribution (QKD) and Post Quantum Cryptography (PQC) >> >> [Linda] The above items should be already covered by the existing I2NSF >> Charter, except I don’t know what additional features required by QKD and >> PQC to NSF or Consumer facing interfaces. >> >> > >> => [Paul] A certain level of security management automation (e.g., >> enforcement of a high-level security policy from I2NSF User to an NSF) is >> mentioned >> > in the current I2NSF charter, and are fulfilled by the five I2NSF >> YANG data models. >> > However, the full level of security mangement automation can be >> completed by the adding the feedback-control-loop to augment security >> policies >> > through NSF monitoring data collection, the analysis of those >> monitoring data, and the delivery of feedback information to Security >> Controller. >> > Refer to Figure 1 and Section 3 in >> https://datatracker.ietf.org/doc/html/draft-jeong-i2nsf-security-management-automation-03 >> >> > for the detailed explanation of the extension of the I2NSF >> framework. >> > > => [Paul] For QKD and PQC, we need to extend the NSF-Facing Interface > for the exchange of parameters for quantum computing-based security > rather than the Consumer-Facing Interface. This is because the > I2NSF User just specifies a high-level security policy to the Security > Controller, and > the Security Controller needs to translate it into a low-level > security policy along with the detailed handling of QKD and PQC. > >> >> 2. I2NSF Application Interface YANG Data Model >> - Main Contents >> . A New I2NSF Interface for Feedback-control-loop-based Security >> Management Automation >> >> . Support of Feedback Information Delivery from I2NSF (Data) Analyzer to >> Security Controller for Security Policy Augmentation and Generation >> > => [Paul] In Figure 1 in the above I-D, the feedback-loop-based security > management requires a new interface called Application Interface. > This interface delivers feedback information (or policy > reconfiguration) with an NSF name, a problem description and a possible > solution to > either Security Controller or I2NSF User rather than a high-level > security policy delivered from the I2NSF User to the Security Controller via > the Consumer-Facing Interface. > Either the Security Controller or the I2NSF User needs to evaluate > whether the suggested solution in the feedback information is good for > the reported problem or not. After this evaluation, one of them can > update the current high-level security policy or generate a high-level > security policy for a low-level security policy. > > >> 3. Guidelines to Security Policy Translation for I2NSF-Based Security >> Enforcement >> >> - Main Contents >> . A Relation between I2NSF Consumer-Facing Interface and NSF >> Facing-Interface >> . Handling of Default Actions for a High-level Security Policy to be >> translated to a Low-level Security Policy >> . Population of Information for Security Policy Translation (e.g., >> mapping of IP addresses for users and devices) >> . Implementation Guidelines for Security Policy Translator (will be put >> as Appendix rather than main text) >> >> [Linda] I can see this being the potential work item for the rechartering. >> > => [Paul] Thanks. Actually, this security policy translation needs to > include the following translations: > - Policy Translation between the Consumer-Facing Interface and the > NSF-Facing Interface > - Policy Translation between the Application Interface and the > Consumer-Facing Interface (or NSF-Facing Interface) > > Thanks. > > Best Regards, > Paul > > >> >> Linda >> >> >> >> --------------------------------------------------------------------------------------------------------------------------------------------------------------- >> >> >> As you know, my SKKU team with ETRI demonstrated the feasibility of those >> three work items through the past I2NSF Projects. >> >> For the 1st work item, this provides autonomous security management >> services to minimize human engagement for security services. >> >> The I2NSF extension for this autonomous security management is explained >> by my new I2NSF I-D: >> >> https://datatracker.ietf.org/doc/html/draft-jeong-i2nsf-security-management-automation-03 >> <https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fhtml%2Fdraft-jeong-i2nsf-security-management-automation-03&data=04%7C01%7Clinda.dunbar%40futurewei.com%7C56912b91156d4740dcd408da13b4799e%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C637843963123356743%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=2Ok0aDHdpx%2Ft36oaWiOfeIntayLaTd8cfEDtc0kqQc0%3D&reserved=0> >> >> As a use case, a new outside (or inside) security attack is detected and >> blocked by an I2NSF system. >> >> For this, an NSF reports monitoring data of a suspicious activity to an >> I2NSF Analyzer (as a new component which is >> >> a data collector and a data analyzer with machine learning), which is >> defined in the above I-D. >> >> The I2NSF Analyzer analyzes the monitoring data and diagnoses what is a >> problem or security attack. >> The I2NSF Analyzer makes a feedback report to a Security Controller so >> that the Security Controller can augment >> >> its existing security policy or generate a new security policy to cope >> with the problem or security attack. >> >> The involved security functions include the following steps: >> 1. The monitoring data delivery from an NSF to an I2NSF Analyzer, >> 2. The analysis of the monitoring data at the I2NSF Analyzer, >> 3. The construction of a feedback report by the I2NSF Analyzer, >> 4. The delivery of the feedback report from the I2NSF Analyzer to the >> Security Controller, >> 5. The interpretation/translation of the feedback report at the Security >> Controller, and >> >> the augmentation of an existing security policy (or the generation of a >> new security policy) by the Security Controller, and >> 6. The delivery of the augmented (or generated) security policy to an >> appropriate NSF. >> >> These steps are explained in the above I-D. I have explained them in the >> presentation of I2NSF Re-chartering slides >> >> during the IETF-113 I2NSF WG Session. >> >> For the support of the containers for I2NSF NSFs, the interface to >> security functions on Container will be the same >> >> with that to the security functions on VM. >> However, the operation and management of I2NSF in container deployment >> can be specified in the document. >> Here is my I2NSF I-D for Cloud Native Systems for your reference: >> >> >> https://datatracker.ietf.org/doc/html/draft-yang-i2nsf-nfv-architecture-07#page-11 >> <https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fhtml%2Fdraft-yang-i2nsf-nfv-architecture-07%23page-11&data=04%7C01%7Clinda.dunbar%40futurewei.com%7C56912b91156d4740dcd408da13b4799e%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C637843963123356743%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=5jkxDRkVzgA0VMltvNAAyDIM5KsvMyuLcYIqPPkMvH8%3D&reserved=0> >> >> >> I CC Dr. Kyoungjae Sun and Dr. Hyunsik Yang as the authors of this I-D >> for the Cloud Native Systems for I2NSF >> >> since they are experts in this domain. >> >> For the support of Other Contemporary Technologies, "Quantum Key" can be >> distributed to NSFs through Security Controllers. >> The work of RFC 9061 (A YANG Data Model for IPsec Flow Protection Based >> on Software-Defined Networking (SDN)) >> >> can be extended for this key distribution. >> >> For the 2nd work item, I2NSF Application Interface delivers a feedback >> report containing feedback information as >> >> a high-level policy to describe a problem or security attack rather than >> monitoring data. >> The Application Interface is a newly defined interface from I2NSF >> Analyzed to Security Controller, >> >> so it is different from the Monitoring Interface. >> You can refer to my I2NSF I-D for the Application Interface: >> >> https://datatracker.ietf.org/doc/html/draft-lingga-i2nsf-application-interface-dm-02 >> <https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fhtml%2Fdraft-lingga-i2nsf-application-interface-dm-02&data=04%7C01%7Clinda.dunbar%40futurewei.com%7C56912b91156d4740dcd408da13b4799e%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C637843963123356743%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=sEbIvZW4NFSUzG0SALRlqdzS8WKOfS8ywjTGozvQfbc%3D&reserved=0> >> >> For the 3rd work item, the guidelines for security policy translation are >> specified in terms of the mapping of interfaces, >> >> default action handling, the population of translation information (e.g., >> mapping of user group (or device group) and >> >> their IP addresses), the procedures of the security policy translation >> rather than translation algorithm itself. >> >> You can refer to my I2NSF I-D for the Security Policy Translation: >> >> https://datatracker.ietf.org/doc/html/draft-yang-i2nsf-security-policy-translation-10 >> <https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fhtml%2Fdraft-yang-i2nsf-security-policy-translation-10&data=04%7C01%7Clinda.dunbar%40futurewei.com%7C56912b91156d4740dcd408da13b4799e%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C637843963123356743%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=s93IFrkZ4%2BAVWUjLe0NMNPFBqDwM1HuZutZsUJC%2Brog%3D&reserved=0> >> >> >> >> If you have questions and comments, let me know. >> >> Thanks. >> >> Best Regards, >> Paul >> >> >> >> On Thu, Mar 31, 2022 at 2:10 AM Linda Dunbar <linda.dunbar@futurewei.com> >> wrote: >> >> I2NSF Rechartering Proponents, >> >> >> >> I re-read all the emails exchanged about I2NSF Re-Chartering plus the >> discussion minutes at IETF113, I concluded the 2 key points: >> >> - The proposed Rechartered work is too broad, the scope of work is to >> wide, >> - We don’t have enough people and expertise to cover all the proposed >> work. >> >> >> >> Therefore I would like to suggest prioritizing the work items based on >> available expertise, and choose the highest 3~4 work items for the I2NSF >> rechartering. >> >> >> >> With the current available expertise among the I2NSF participants, we can >> confidently tackle the following work items. Therefore I think they should >> be high on the priority list of the rechartering. >> >> >> >> - Work around the remote attestation of NSF in I2NSF architecture, >> including the YANG Data Model. >> - Add the support recently developed protocols such as QUIC and >> HTTP/3. >> - Develop the YANG module of IPsec policies to functions embedded in >> nodes running BGP. >> >> >> >> For the proposed work item of the Interface tot eh Data Analysis >> Entities, I am wondering if the work is similar to the >> draft-ietf-i2nsf-nsf-monitoring-data-model? >> >> >> >> For the proposed work item of “controlling container deployments in Cloud >> Native NFV architecture”, I am not sure how different between the >> “Interface to NSF” vs. the “interface to Container”. >> >> >> >> Can you please chime in to express your opinion? >> >> >> >> Thank you >> >> Linda >> >> >> >> *From:* I2nsf <i2nsf-bounces@ietf.org> *On Behalf Of *Mr. Jaehoon Paul >> Jeong >> *Sent:* Thursday, March 24, 2022 2:38 AM >> *To:* i2nsf@ietf.org >> *Cc:* Roman Danyliw <rdd@cert.org>; Panwei (William) < >> william.panwei@huawei.com>; Henk Birkholz < >> henk.birkholz@sit.fraunhofer.de>; tom petch <daedulus@btconnect.com>; >> yangpenglin <yangpenglin@chinamobile.com>; Susan Hares <shares@ndzh.com>; >> DIEGO LOPEZ GARCIA <diego.r.lopez@telefonica.com> >> *Subject:* [I2nsf] Request for Comments, Interest and Support in I2NSF >> Re-Chartering >> >> >> >> Hi I2NSF WG, >> >> As you know, our I2NSF WG will discuss the I2NSF Re-Chartering >> >> at IETF-113 I2NSF WG Session today. >> >> >> >> I attach the text of the re-chartering as pdf and txt files. >> >> >> >> Our five core I2NSF YANG data model drafts are almost completed. >> >> >> ------------------------------------------------------------------------------------ >> >> 1. Capability YANG Data Model >> >> https://datatracker.ietf.org/doc/html/draft-ietf-i2nsf-capability-data-model-27 >> <https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fhtml%2Fdraft-ietf-i2nsf-capability-data-model-27&data=04%7C01%7Clinda.dunbar%40futurewei.com%7C56912b91156d4740dcd408da13b4799e%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C637843963123356743%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=TRzRqjLtK7Vqg%2F4yJxZMc5xFSDjCmBHohns6VUrlLPM%3D&reserved=0> >> >> 2. NSF-Facing Interface YANG Data Model >> >> https://datatracker.ietf.org/doc/html/draft-ietf-i2nsf-nsf-facing-interface-dm-22 >> <https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fhtml%2Fdraft-ietf-i2nsf-nsf-facing-interface-dm-22&data=04%7C01%7Clinda.dunbar%40futurewei.com%7C56912b91156d4740dcd408da13b4799e%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C637843963123356743%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=ifm6PB3tFG%2B8F2JbDviFnwd0B30iftCRKr0aze6vOJY%3D&reserved=0> >> >> 3. Monitoring Interface YANG Data Model >> >> https://datatracker.ietf.org/doc/html/draft-ietf-i2nsf-nsf-monitoring-data-model-16 >> <https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fhtml%2Fdraft-ietf-i2nsf-nsf-monitoring-data-model-16&data=04%7C01%7Clinda.dunbar%40futurewei.com%7C56912b91156d4740dcd408da13b4799e%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C637843963123356743%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=Y7Q3ursUB3KalwVGmvSGJxQbohoN9yjjn4MwDXsOIvc%3D&reserved=0> >> >> 4. Consumer-Facing Interface YANG Data Model >> >> https://datatracker.ietf.org/doc/html/draft-ietf-i2nsf-consumer-facing-interface-dm-17 >> <https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fhtml%2Fdraft-ietf-i2nsf-consumer-facing-interface-dm-17&data=04%7C01%7Clinda.dunbar%40futurewei.com%7C56912b91156d4740dcd408da13b4799e%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C637843963123356743%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=OQNZ4F5iRKNe9G74OehRS%2BWLcBzJX%2FF9sok7f7sYBLY%3D&reserved=0> >> >> 5. Registration Interface YANG Data Model >> >> https://datatracker.ietf.org/doc/html/draft-ietf-i2nsf-registration-interface-dm-15 >> <https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fhtml%2Fdraft-ietf-i2nsf-registration-interface-dm-15&data=04%7C01%7Clinda.dunbar%40futurewei.com%7C56912b91156d4740dcd408da13b4799e%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C637843963123356743%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=CHYx5DQsaPESpsMD14nhTwTZa9ZSxlMXfc%2Bf61q14BY%3D&reserved=0> >> >> >> ------------------------------------------------------------------------------------ >> >> >> >> The three of them (i.e., 1, 2, and 3) got the feedback of the IESG and >> >> the revisions have been sent to the IESG reviewers. >> >> >> >> The remaining two (i.e., 4, 5) are well-synchronized with the others. >> >> I will present the updates of them today's I2NSF WG. >> >> I attach the slides for them for your easy checking. >> >> >> >> Our AD Roman has concerns about the low energy of our I2NSF WG for the new >> >> work items in the I2NSF Re-chartering. >> >> >> >> Could you speak up your voice about your comments, interest, and support >> of our I2NSF Re-Chartering? >> >> >> >> See you online at IETF-113 I2NSF WG Session today. >> >> >> >> Thanks. >> >> >> >> Best Regards, >> >> Paul >> -- >> >> =========================== >> Mr. Jaehoon (Paul) Jeong, Ph.D. >> Associate Professor >> >> Department Head >> Department of Computer Science and Engineering >> Sungkyunkwan University >> Office: +82-31-299-4957 >> Email: pauljeong@skku.edu, jaehoon.paul@gmail.com >> Personal Homepage: http://iotlab.skku.edu/people-jaehoon-jeong.php >> <https://nam11.safelinks.protection.outlook.com/?url=http%3A%2F%2Fcpslab.skku.edu%2Fpeople-jaehoon-jeong.php&data=04%7C01%7Clinda.dunbar%40futurewei.com%7C56912b91156d4740dcd408da13b4799e%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C637843963123356743%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=lArXzPvmAjhFcwKMhNgNEmpbnRo70lLtU0pEHU8HiHI%3D&reserved=0> >> >>
- [I2nsf] Narrowing down the scope of work for the … Linda Dunbar
- Re: [I2nsf] Narrowing down the scope of work for … Mr. Jaehoon Paul Jeong
- Re: [I2nsf] Narrowing down the scope of work for … Linda Dunbar
- Re: [I2nsf] Narrowing down the scope of work for … Mr. Jaehoon Paul Jeong
- Re: [I2nsf] Narrowing down the scope of work for … Mr. Jaehoon Paul Jeong