Re: [I2nsf] [Last-Call] New Version Notification for draft-ietf-i2nsf-sdn-ipsec-flow-protection-11.txt

tom petch <daedulus@btconnect.com> Thu, 29 October 2020 17:06 UTC

Return-Path: <daedulus@btconnect.com>
X-Original-To: i2nsf@ietfa.amsl.com
Delivered-To: i2nsf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 69A283A0A84; Thu, 29 Oct 2020 10:06:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.147
X-Spam-Level:
X-Spam-Status: No, score=-2.147 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, MSGID_FROM_MTA_HEADER=0.001, NICE_REPLY_A=-0.247, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=btconnect.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RJqd7PEwfPT2; Thu, 29 Oct 2020 10:06:36 -0700 (PDT)
Received: from EUR04-VI1-obe.outbound.protection.outlook.com (mail-eopbgr80090.outbound.protection.outlook.com [40.107.8.90]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5AE793A0A81; Thu, 29 Oct 2020 10:06:32 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=UFEegz/Wr523vutiOkRXtCaQHutLk/GtVmWvbu4Y8M7wQFtq/oqcFRTo4ZVysuPxfvlfmlHJzSseaL1R09YP+Vd2Eb+nLaUnyIBhrnMsUBUMqKUtxlYziLJosEbNtiUiw8j97VoNrkOaDzeQoHA0kYYS1B5ebQ23hixG27uL1AiNsorDX/El3lYlGK/FXzJ29oSyDoSVFGd6sH0SXYeSimxQ/4vP7Tz7e4d6stmed4MF9erVMNn8q62VNk5ao/EWdaYpLxLcWbA5KEz4n3H4KFMKDlw2PoJaznrr3zo8hJlk1MqEEm1QOUsMnUIUTHsOgnhQQrz/Eh2g9RdZSJEbXQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=pqBbQWfmTW0kVsReQFuInboguEDya75rtjPMO/GqN/E=; b=e6qkIpKfUwftoIdOl2xbA/F/pdnmbOvfpCguePJuIB4An1OCotZ9nTkoSIXJaNRja//ewqlWQiGWrI+NFgfIDVA2BtuaJP1mnqnYmVrsf5lqlIKhFlEF11xAQGTmW6IyvaPEymMCtWTWi+kBHVjEgn9xqAqbdyND3QEeL5WKOQnSDeOsXzViyLaPc6H0uR+TmhscHNKtuCyNIwDwWDlryLIJQklIW3qio7KGIU6UV83jj9d3iFf86OsA+FuKdGnEXo0XC5wQ7GDC9GEn4i14V+uiPWiU4EDvrVv9IXbzsTKVsPGBi5fweuG9xk9I9908kxQcgqCdpEKBAtij2pwhyQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=btconnect.com; dmarc=pass action=none header.from=btconnect.com; dkim=pass header.d=btconnect.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=btconnect.onmicrosoft.com; s=selector2-btconnect-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=pqBbQWfmTW0kVsReQFuInboguEDya75rtjPMO/GqN/E=; b=Vn+hK+1J5gJkxRWpPN8wtiMcS5HCO9NuPGA80vNR7czvL84phripqWNyJX2ynayo2FdiiX6xlbvwFbjOuecvLHvgDTzbXrMEAgoq+jRrTrgg/71skDpoPevYD5HAOGnmhRcXq1DkfFUmtKOutgkuUmDoRGuVdvxilDKmAryDbic=
Authentication-Results: gmail.com; dkim=none (message not signed) header.d=none;gmail.com; dmarc=none action=none header.from=btconnect.com;
Received: from DBAPR07MB6695.eurprd07.prod.outlook.com (2603:10a6:10:18a::15) by DB6PR0701MB2758.eurprd07.prod.outlook.com (2603:10a6:4:22::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3499.8; Thu, 29 Oct 2020 17:06:29 +0000
Received: from DBAPR07MB6695.eurprd07.prod.outlook.com ([fe80::b1d9:17c1:e593:89e9]) by DBAPR07MB6695.eurprd07.prod.outlook.com ([fe80::b1d9:17c1:e593:89e9%6]) with mapi id 15.20.3455.029; Thu, 29 Oct 2020 17:06:29 +0000
To: Rafa Marin-Lopez <rafa@um.es>
References: <160337357077.29083.9236626834026808055@ietfa.amsl.com> <EE5AB669-73BB-4517-A6F4-23B7807FB36E@um.es> <5F9815D1.9010303@btconnect.com> <DDE550B1-9A9E-4954-B6F9-C0A33ECE1275@um.es> <5F99B221.3040504@btconnect.com> <56155C91-BFE8-4BA9-A55C-46B12E59CD94@um.es>
Cc: i2nsf@ietf.org, Gabriel Lopez <gabilm@um.es>, Fernando Pereniguez-Garcia <fernando.pereniguez@cud.upct.es>, last-call@ietf.org, ynir.ietf@gmail.com
From: tom petch <daedulus@btconnect.com>
Message-ID: <5F9AF68D.7060105@btconnect.com>
Date: Thu, 29 Oct 2020 17:06:21 +0000
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:38.0) Gecko/20100101 Thunderbird/38.5.0
In-Reply-To: <56155C91-BFE8-4BA9-A55C-46B12E59CD94@um.es>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 8bit
X-Originating-IP: [86.146.121.140]
X-ClientProxiedBy: LO2P123CA0002.GBRP123.PROD.OUTLOOK.COM (2603:10a6:600:a6::14) To DBAPR07MB6695.eurprd07.prod.outlook.com (2603:10a6:10:18a::15)
MIME-Version: 1.0
X-MS-Exchange-MessageSentRepresentingType: 1
Received: from [192.168.1.65] (86.146.121.140) by LO2P123CA0002.GBRP123.PROD.OUTLOOK.COM (2603:10a6:600:a6::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.3499.19 via Frontend Transport; Thu, 29 Oct 2020 17:06:28 +0000
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 6a68573e-4416-45b2-fbbc-08d87c2cfa5d
X-MS-TrafficTypeDiagnostic: DB6PR0701MB2758:
X-Microsoft-Antispam-PRVS: <DB6PR0701MB275865AFFB2DF937A80BBD1CC6140@DB6PR0701MB2758.eurprd07.prod.outlook.com>
X-MS-Oob-TLC-OOBClassifiers: OLM:9508;
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: igGHrwzhhb/+LqMyVG8fEfFolZuCfjvrPY923tioC84bh9Bsi2aAruMce+y4WmlvQwkoggFEfCrsbP2YagAHIod2gTPuR4E/3o4apqgJUJLKpK2qjUSGOyWEMFMMeHlEfOHVsQVMFYwybVijSFqRRs7mEknEBHo5iodgFHhYllRr+xcr023fH0B4hMyAEeuTSRDqDqBRFWyB+hk49RTkegeyYv2G3THY7+KhCtKpeFNosPLyyVhaj/UeMCFIM5bEQXC+wLgwIcaI8qCnwYnReYV+nh0qCBWg+aWk6hQXyawlyMN4bzsIO809UH+Z/5822jjsVNXrAmDJZJQtVP64hpXxRLRQydDtcC67O4VNpIG9h3Z1Qqzg4zbc7JzU8RsFT5NUkLMxUqiNzIujkCnEhA==
X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DBAPR07MB6695.eurprd07.prod.outlook.com; PTR:; CAT:NONE; SFS:(396003)(376002)(39860400002)(346002)(136003)(366004)(66946007)(8676002)(966005)(316002)(5660300002)(956004)(66476007)(66556008)(478600001)(36756003)(2906002)(6916009)(6666004)(8936002)(83380400001)(66574015)(52116002)(87266011)(4326008)(30864003)(33656002)(2616005)(15650500001)(53546011)(4001150100001)(26005)(54906003)(16576012)(186003)(6486002)(16526019)(86362001); DIR:OUT; SFP:1102;
X-MS-Exchange-AntiSpam-MessageData: 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
X-OriginatorOrg: btconnect.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 6a68573e-4416-45b2-fbbc-08d87c2cfa5d
X-MS-Exchange-CrossTenant-AuthSource: DBAPR07MB6695.eurprd07.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 29 Oct 2020 17:06:29.5775 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: cf8853ed-96e5-465b-9185-806bfe185e30
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: Sj69Qf1fy6ArQwRBIM6SGbM0eKSEFtMLjrEshycQz9Cm7vl236UrbqmnUB/V+2wUatz+rE/NUJsELBuhDoB7dQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6PR0701MB2758
Archived-At: <https://mailarchive.ietf.org/arch/msg/i2nsf/XaL2TbIRV96LDzJVhnH4W-R4M6g>
Subject: Re: [I2nsf] [Last-Call] New Version Notification for draft-ietf-i2nsf-sdn-ipsec-flow-protection-11.txt
X-BeenThere: i2nsf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "*I2NSF: Interface to Network Security Functions mailing list*" <i2nsf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2nsf>, <mailto:i2nsf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2nsf/>
List-Post: <mailto:i2nsf@ietf.org>
List-Help: <mailto:i2nsf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2nsf>, <mailto:i2nsf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 29 Oct 2020 17:06:40 -0000

Back to routine comments on this I-D; I don't think that any of my 
earlier ones are unresolved.

On 29/10/2020 11:23, Rafa Marin-Lopez wrote:
> Hi Tom:
>
>> El 28 oct 2020, a las 19:02, tom petch <daedulus@btconnect.com> escribió:
>>
>> On 28/10/2020 10:42, Rafa Marin-Lopez wrote:
>>> Hi Tom:
>>>
>>> Thank you very much for your insight. It is very helpful. Please see our comments/questions inline.
>>>
>>>> El 27 oct 2020, a las 13:42, tom petch <daedulus@btconnect.com> escribió:
>>>>
>>>> I think that the IESG will find a number of problems with this I-D.
>>>>
>>>> YANG module references RFC822 which is several years out of date

Rafa

Several YANG leaf are in seconds, eight I think, but none use the YANG
units seconds;
statement.  I suggest adding it.

typedef ipsec-spd-action
capitalises the actions as does RFC4301 but later uses of this have 
lower case actions; probably ok as it is

protocol number appears in several places but technically, IPv6, which 
we must all love and promote, has 'next header' instead.  Probably 
worth a mention at least once in the YANG module

On the start >= end, I was looking at nat-yang and it has
  must ". >= ../start-port-number"
which is the sort of YANG constraint I had in mind

leaf dscp-mapping
I do not understand, a hex string of indeterminate length for DSCP 
values (plural).  I expect DSCP to be six bit and values to be a leaf-list

leaf ecn
/Annex C/Appendix C/

I see that RFC8247 gives AEAD status which is a good reference to have 
except that as my other post today says there is no requirement for any 
future additions to the IANA data to include this information; IANA for 
IKEv2 needs updating iun a separate I-D!

leaf mask
hex-string with no length specified

leaf ds-algorithm
default 1
which I think is RSA; worth stating as it might raise some AD eyebrows

pfs-groups
/it is required perfect forward secrecy/perfect forward secrecy is required/
and a reference to Transform Type 4?

leaf ext-seq-num
/FALSE/false/ or /False/?

leaf encryption-algorithm (twice, in separate containers)
/the integrity leaf/ the integrity-algorithm leaf/

I have yet to look at the text or the examples, probably next week.

Tom Petch










>>
>> On boiler plate, I mean the reference to RFC2119 which now must use the language from RFC8174 in the body of the I-D; sorry for the confusion.
>
> Ah ok. I guess you are referring to change that paragraph with this:
>
>
> The key words "MUST", "MUST NOT", "REQUIRED",
> "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT",
> "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
> "OPTIONAL" in this document are to be interpreted
> as described in BCP 14 RFC2119 RFC8174 when,
> and only when, they appear in all capitals,
> as shown here.
>
>>
>> On XXXX, you have XXXX standing in for more than one RFC-to-be which confuses.  The convention is to use XXXX for this I-D and then AAAA BBBB etc for any others such as the netconf I-D in this instance.
>
> Ah ok. In any case, we have now only XXXX for our RFC-to-be so problem fixed.
>>
>> Two big issues, for me (perhaps not for others).  The convention with YANG is for each successive line to be indented two characters, you have four, which creates a lot of white space and pushes the text to the right hand margin.  I think that two characters is the default when you use pyang to format a YANG module.
>
> We can try to reduce it to two characters.
>
>>
>> And references.  I have had to work harder than I want to to make sense of the IANA references.  I think you should have five separate references in the I-D for IANA for
>> Transform Type 1
>> Transform Type 3
>> Transform Type 4
>> Authentication Method
>> Protocol Numbers
>> and each reference in the I-D should have a URL pointing to the specific section of IANA web site.
>
> Ok, good. This follows what we thought.
>
>> In the YANG, it is harder to know what to do.  Those first three references are in the third tier i.e.
>> Group - Internet Key Exchange V2 (IKEv2) Parameters
>> Registry  -Transform Attribute Types
>> and then Type 1, 3, 4 as the third tier as I am calling it
>> and I think that every reference in the YANG should give me all three tiers after IANA in that order perhaps
>> IANA; IKEv2 Parameters; Transform Atribute Types; Transform Type 1
>
> Great. We also considered this as a possible solution after sending our e-mail. Let’s do it.
>
>> If the syntax needs tweeking, then the RFC Editor will do a good job of that but at present the references are inconsistent in which elements are specified in what order and that is something the RFC Editor probably cannot cope with.
>> Authentication Method is a registry so that just needs Group name and Registry name after IANA.
>
> Ok, good.
>>
>> Some minor glitches.
>> I-D appears twice in the body of the I-D - perhaps document or memo.
>
> Ok.
>
>> objetives/objectives/
>
> Fixed.
>> end port number perhaps /must/MUST/
>
>> and YANG is very good at including such checks with a must ....
>> 'If AEAD is used .. where? this occurs in several places and I think that you need to specify the leaf where AEAD will be specified or implied.
>
> Ok we have changed it to:
>
> If Authenticated Encryption with Associated Data (AEAD) is used (leaf esp-algorithms/encryption/algorithm-type)
> this flag MUST be false."
>
>> And is it possible to make that a YANG 'must' statement - looking at the IKEv2 registries it is not obvious which are AEAD so that might be more complexity than it is worth.
>> 'only available on linux kernels' Um implementation detail, you may get asked to remove that altogether or at least to a Informative Appendix - I would leave it in for now.
>
> Ok.
>
>> 'import ietf-i2nsf-ikec' the reference needs to be to a RFC and if it is not yet an RFC then RFC XXXX <title> in both Appendix B and C
>
> Yes, we have changed that to:
>
> RFC XXXX: Software-Defined Networking
>                 (SDN)-based IPsec Flow Protection.
>
>> leaf-list pfs-groups could do with a reference - Transform Type 4?
>
> The leaf list is referring to type pfs-group and we have now
>
> typedef pfs-group {
>              type uint16;
>              description
>                  "DH groups for IKE and IPsec SA rekey.";
>              reference
>                  "IANA; Internet Key Exchange V2 (IKEv2) Parameters;
> 				Transform Atribute Types; Transform Type 4 -
>                  Diffie-Hellman Group Transform IDs.
> 				Section 3.3.2 in RFC 7296.";
>          }
>
>
>>
>> I am still working my way through the YANG so may have some more comments tomorrow.
>
> Ok, do not worry we will work in -12 with these comments so far to have a quick response. We can prepare a another version later with the rest of them.
>
> Thank you very much for your effort.
>>
>> Tom Petch
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>> We have realized that we missed to change this, even though we discussed it. We will change it right away in the following way (bold):
>>>
>>> case rfc822-address-string {
>>>       leaf rfc822-address-string {
>>>            type string;
>>>            description
>>>                "Specifies the identity as a
>>>                 fully-qualified RFC5322 email
>>>                 address string. An example is,
>>>                 jsmith@example.com. The string
>>>                 MUST NOT contain any
>>>                 terminators e.g., NULL, CR,
>>>                 etc.).";
>>>             reference
>>>                    "RFC 5322.";
>>>       }
>>> }
>>>
>>> Btw, we already used in the past “case rfc822-address-string” and “leaf rfc822-address-string” since this is coming from IKEv2 standard. Do you think we should change that name as well?
>>>
>>>
>>>>
>>>> YANG module references IANA Protocol Numbers which is not in the I-D references
>>>
>>> We have included the following reference:
>>>
>>> [IANA-Protocols-Number]
>>>                Internet Assigned Numbers Authority (IANA), "Protocol
>>>                Numbers", January 2020.
>>>
>>>
>>>>
>>>> s.2 boiler plate is out of date
>>>
>>> What we see is the I-D has the second choice stated in https://www.ietf.org/standards/ids/guidelines/
>>>
>>> This Internet-Draft is submitted in full conformance with the
>>>     provisions of BCP 78 and BCP 79.
>>>
>>>     Internet-Drafts are working documents of the Internet Engineering
>>>     Task Force (IETF).  Note that other groups may also distribute
>>>     working documents as Internet-Drafts.  The list of current Internet-
>>>     Drafts is at https://datatracker.ietf.org/drafts/current/.
>>>
>>>     Internet-Drafts are draft documents valid for a maximum of six months
>>>     and may be updated, replaced, or obsoleted by other documents at any
>>>     time.  It is inappropriate to use Internet-Drafts as reference
>>>     material or to cite them other than as "work in progress."
>>>
>>> Could you refer what is out of date?
>>>
>>>>
>>>> XXXX is standing in for more than one RFC
>>>
>>> Yes, XXXX has been used because we do not know the future number assigned to our I-D.
>>>
>>> Also we realized we also included this to refer to crypto-types I-D but this has been solved now in a new version -12 that we are preparing to include your comments. We noticed we can replace the type of rw cert-data?, ca-data*, crl-data? for binary without any problem.
>>>
>>> |           |     +--rw cert-data?        binary
>>> |           +--rw private-key?            binary
>>> |           +--rw ca-data*                binary
>>> |           +--rw crl-data?               binary
>>>
>>>>
>>>> but the show stopper that makes a proper review of this too costly is the references.  Those to IANA of which there are several I want to pursue.  The I-D reference is to IKEv2 parameters. Sadly, this is a three tier structure and noone agrees on what to call the third tier so I will call it tier3 here.  Top level is Group, as per RFC8126, second level is Registry.  The I-D reference is to the Group only which is fine if the actual reference then specifies the Registry and Tier3 but they never do, usually just Tier3 e.g. Transform Type 3 which makes for a lot of work for the reader, too much for this one.  You have to go hunting in all the second level Registry until you can find a match for the Tier3 identifier. And there are no URL.  If you want an example that I find easy to use, go look at RFC8407 (as usual).
>>>
>>> You’re right. Could you point the exact part at RFC 8407 with that example? We would really appreciate it.
>>>
>>> On the other hand, would it be enough to include the URL for Transform Type 3 https://www.iana.org/assignments/ikev2-parameters/ikev2-parameters.xhtml#ikev2-parameters-7 ?
>>>
>>> (Same for Transform Type 1, Transform Type 4)
>>>
>>>>
>>>> The reference for import of i2nsf-ikec gives a YANG module name; this needs to be the name of the RFC to be
>>>
>>> Fixed.
>>>
>>> import ietf-i2nsf-ikec {
>>>              prefix nsfikec;
>>>              reference
>>>                  "RFC XXXX: Software-Defined Networking
>>>                 (SDN)-based IPsec Flow Protection.";
>>> }
>>>
>>> We still use XXXX because we do not know the number assigned to the RFC to be.
>>>
>>>>
>>>> The example IPv6 address in the YANG module has :0:0: which is usually just ::
>>>
>>> Fixed.
>>>
>>> If you have any further comments, please let us know so we can include them in -12
>>>
>>> Best Regards.
>>>>
>>>> And I have some way to go still.
>>>>
>>>> Tom Petch
>>>>
>>>> On 22/10/2020 18:39, Rafa Marin-Lopez wrote:
>>>>> Dear all:
>>>>>
>>>>> After receiving a suggestion to make things clearer in the feature ikeless-notification description, we have just uploaded a new version -11 with a minor change to add the following text:
>>>>>
>>>>> feature ikeless-notification {
>>>>>              description
>>>>>                  "This feature indicates that the server supports
>>>>>                  generating notifications in the ikeless module.
>>>>>
>>>>>                  To ensure broader applicability of this module,
>>>>>                  the notifications are marked as a feature.
>>>>>                  For the implementation of ikeless case,
>>>>>                  the NSF is expected to implement this
>>>>>                  feature.";
>>>>>          }
>>>>>
>>>>> Best Regards.
>>>>>
>>>>>> Inicio del mensaje reenviado:
>>>>>>
>>>>>> De: internet-drafts@ietf.org
>>>>>> Asunto: New Version Notification for draft-ietf-i2nsf-sdn-ipsec-flow-protection-11.txt
>>>>>> Fecha: 22 de octubre de 2020, 15:32:50 CEST
>>>>>> Para: "Fernando Pereniguez-Garcia" <fernando.pereniguez@cud.upct.es>, "Rafael Lopez" <rafa@um.es>, "Gabriel Lopez-Millan" <gabilm@um.es>, "Rafa Marin-Lopez" <rafa@um.es>
>>>>>>
>>>>>>
>>>>>> A new version of I-D, draft-ietf-i2nsf-sdn-ipsec-flow-protection-11.txt
>>>>>> has been successfully submitted by Rafa Marin-Lopez and posted to the
>>>>>> IETF repository.
>>>>>>
>>>>>> Name:		draft-ietf-i2nsf-sdn-ipsec-flow-protection
>>>>>> Revision:	11
>>>>>> Title:		Software-Defined Networking (SDN)-based IPsec Flow Protection
>>>>>> Document date:	2020-10-22
>>>>>> Group:		i2nsf
>>>>>> Pages:		92
>>>>>> URL:            https://www.ietf.org/archive/id/draft-ietf-i2nsf-sdn-ipsec-flow-protection-11.txt
>>>>>> Status:         https://datatracker.ietf.org/doc/draft-ietf-i2nsf-sdn-ipsec-flow-protection/
>>>>>> Htmlized:       https://datatracker.ietf.org/doc/html/draft-ietf-i2nsf-sdn-ipsec-flow-protection
>>>>>> Htmlized:       https://tools.ietf.org/html/draft-ietf-i2nsf-sdn-ipsec-flow-protection-11
>>>>>> Diff:           https://www.ietf.org/rfcdiff?url2=draft-ietf-i2nsf-sdn-ipsec-flow-protection-11
>>>>>>
>>>>>> Abstract:
>>>>>>    This document describes how to provide IPsec-based flow protection
>>>>>>    (integrity and confidentiality) by means of an Interface to Network
>>>>>>    Security Function (I2NSF) controller.  It considers two main well-
>>>>>>    known scenarios in IPsec: (i) gateway-to-gateway and (ii) host-to-
>>>>>>    host.  The service described in this document allows the
>>>>>>    configuration and monitoring of IPsec Security Associations (SAs)
>>>>>>    from a I2NSF Controller to one or several flow-based Network Security
>>>>>>    Functions (NSFs) that rely on IPsec to protect data traffic.
>>>>>>
>>>>>>    The document focuses on the I2NSF NSF-facing interface by providing
>>>>>>    YANG data models for configuring the IPsec databases (SPD, SAD, PAD)
>>>>>>    and IKEv2.  This allows IPsec SA establishment with minimal
>>>>>>    intervention by the network administrator.  It does not define any
>>>>>>    new protocol.
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>> Please note that it may take a couple of minutes from the time of submission
>>>>>> until the htmlized version and diff are available at tools.ietf.org.
>>>>>>
>>>>>> The IETF Secretariat
>>>>>>
>>>>>>
>>>>>
>>>>> -------------------------------------------------------
>>>>> Rafa Marin-Lopez, PhD
>>>>> Dept. Information and Communications Engineering (DIIC)
>>>>> Faculty of Computer Science-University of Murcia
>>>>> 30100 Murcia - Spain
>>>>> Telf: +34868888501 Fax: +34868884151 e-mail: rafa@um.es
>>>>> -------------------------------------------------------
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>
>>>
>>> -------------------------------------------------------
>>> Rafa Marin-Lopez, PhD
>>> Dept. Information and Communications Engineering (DIIC)
>>> Faculty of Computer Science-University of Murcia
>>> 30100 Murcia - Spain
>>> Telf: +34868888501 Fax: +34868884151 e-mail: rafa@um.es
>>> -------------------------------------------------------
>>>
>>>
>>>
>>>
>>>
>
> -------------------------------------------------------
> Rafa Marin-Lopez, PhD
> Dept. Information and Communications Engineering (DIIC)
> Faculty of Computer Science-University of Murcia
> 30100 Murcia - Spain
> Telf: +34868888501 Fax: +34868884151 e-mail: rafa@um.es
> -------------------------------------------------------
>
>
>
>
>