Re: [OPSAWG] Roman Danyliw's Discuss on draft-ietf-opsawg-ntf-11: (with DISCUSS and COMMENT)

Haoyu Song <haoyu.song@futurewei.com> Wed, 01 December 2021 21:24 UTC

Return-Path: <haoyu.song@futurewei.com>
X-Original-To: opsawg@ietfa.amsl.com
Delivered-To: opsawg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5A77C3A0B3E; Wed, 1 Dec 2021 13:24:28 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.09
X-Spam-Level:
X-Spam-Status: No, score=-2.09 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H2=-0.001, T_SPF_PERMERROR=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=futurewei.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eM7Yc-1m0Xoq; Wed, 1 Dec 2021 13:24:23 -0800 (PST)
Received: from NAM10-BN7-obe.outbound.protection.outlook.com (mail-bn7nam10on2118.outbound.protection.outlook.com [40.107.92.118]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AB8C33A0B3A; Wed, 1 Dec 2021 13:24:22 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Pk+77DYHREVQZtdXFQ3tdd1xNhPGjaatow7klh53XGLO+TcMPJ6JiVmELYeAct1th9LHWuRxPGMMirKi4e7kMAz/FhOPI64HvCzlf9bhZ5RdSPmRK9S3SrRD+fPiq2Z4FcXeMR5JV01jo1bFyGrq2CWONWbvZLiJz0NP9K2TaaSE3jDj6ptnl33XWRQWCTq+CcC7WS86b8hmEQiIj6krfYXf/TvF++OOsVvCIdU3UkUK29AHzK5vyJuN1sU/m7Qf3C2HIm33NavKLflrRZWCJhwjqoQvtJ3DMVL9cIMxC7bbN4U6OCzF6eCWpq/wQ195GpNzw7DyKV6NsvI0hcEAxA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=XyaMVbueA1QvqAkfcDoWb6HJuj5T92ZPzUGmIPO0fC8=; b=ncIjgiVD69mOrjQoQE9WFb1pJIZyutq6q+laAIw/vdXO9zaMhcdXsnBndJyv8sk1Fk/fkg7sYANfHUwnMWV7wGmPSKz148TscFhyOItMF6EH9Pj3DC+bSZzEtxPtoNOBa/Wm6BqD792hA8edtx3SXtIsW7UQNBL0NlD0RzTUVgSBJUIYrvOQUcMlEuVWkg7nn75yoleC1BrgwRQ2SHZZ1CTkhdp6eGA2h9SrErzTBc4IXtg+KwGalE5jNCZaWbU16P880IXLwWN51oot17f28q0CJAqrsaUl78VHeIPx9uU9+GAUYVtdfqmOqvI2YdBOFpgwsGnBqMVOM/h538EnXA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=futurewei.com; dmarc=pass action=none header.from=futurewei.com; dkim=pass header.d=futurewei.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Futurewei.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=XyaMVbueA1QvqAkfcDoWb6HJuj5T92ZPzUGmIPO0fC8=; b=rVCeZryhnJrDixASMrGKBxGXDjjrE6feFeK+EEDsYjHK4ZxFFV8lwjETWBNXbqgLFxAgBFM65AQ0IxZHMijayRTdQ75qDBNEpZ1duMC6tdFcPBLm2J+sfHZ5q6Ya7go9qw3ubsrVpto87IFWDoUu44Tm0dbXC+STSTCYkcwbEo8=
Received: from BY3PR13MB4787.namprd13.prod.outlook.com (2603:10b6:a03:357::13) by BY5PR13MB3330.namprd13.prod.outlook.com (2603:10b6:a03:1af::32) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4755.6; Wed, 1 Dec 2021 21:24:15 +0000
Received: from BY3PR13MB4787.namprd13.prod.outlook.com ([fe80::618d:61cf:753e:be55]) by BY3PR13MB4787.namprd13.prod.outlook.com ([fe80::618d:61cf:753e:be55%5]) with mapi id 15.20.4778.003; Wed, 1 Dec 2021 21:24:14 +0000
From: Haoyu Song <haoyu.song@futurewei.com>
To: Roman Danyliw <rdd@cert.org>, The IESG <iesg@ietf.org>
CC: "draft-ietf-opsawg-ntf@ietf.org" <draft-ietf-opsawg-ntf@ietf.org>, "opsawg-chairs@ietf.org" <opsawg-chairs@ietf.org>, "opsawg@ietf.org" <opsawg@ietf.org>, "ludwig@clemm.org" <ludwig@clemm.org>
Thread-Topic: Roman Danyliw's Discuss on draft-ietf-opsawg-ntf-11: (with DISCUSS and COMMENT)
Thread-Index: AQHX5liFuXkvrLhhzkWpG7ne+gEhv6wd8eEA
Date: Wed, 01 Dec 2021 21:24:14 +0000
Message-ID: <BY3PR13MB4787A775D0A7913B928A8FDF9A689@BY3PR13MB4787.namprd13.prod.outlook.com>
References: <163832458350.9944.17802735924974626797@ietfa.amsl.com>
In-Reply-To: <163832458350.9944.17802735924974626797@ietfa.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=futurewei.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 6bee6f05-02de-403d-a66d-08d9b510ed03
x-ms-traffictypediagnostic: BY5PR13MB3330:
x-microsoft-antispam-prvs: <BY5PR13MB3330A9F83D72FCB2F2E19ACD9A689@BY5PR13MB3330.namprd13.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BY3PR13MB4787.namprd13.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(136003)(376002)(366004)(396003)(39840400004)(346002)(38100700002)(66446008)(122000001)(64756008)(66556008)(66476007)(83380400001)(8676002)(9686003)(966005)(86362001)(38070700005)(186003)(66946007)(33656002)(76116006)(30864003)(26005)(8936002)(52536014)(71200400001)(45080400002)(44832011)(5660300002)(508600001)(54906003)(55016003)(6506007)(53546011)(7696005)(2906002)(316002)(110136005)(4326008); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: Futurewei.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BY3PR13MB4787.namprd13.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 6bee6f05-02de-403d-a66d-08d9b510ed03
X-MS-Exchange-CrossTenant-originalarrivaltime: 01 Dec 2021 21:24:14.7200 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 0fee8ff2-a3b2-4018-9c75-3a1d5591fedc
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: R4vWfJj9YPNIGaFfET/E25Vd8ZskekKR1DWZM1eh3q1VlOZTfgKV5+AxUgOFg1hmWBtuXYOPMndb2H/5zpkWfw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY5PR13MB3330
Archived-At: <https://mailarchive.ietf.org/arch/msg/opsawg/3Y4WUlvjiAYcX_uUFAy_DrVCqNc>
Subject: Re: [OPSAWG] Roman Danyliw's Discuss on draft-ietf-opsawg-ntf-11: (with DISCUSS and COMMENT)
X-BeenThere: opsawg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: OPSA Working Group Mail List <opsawg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/opsawg>, <mailto:opsawg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/opsawg/>
List-Post: <mailto:opsawg@ietf.org>
List-Help: <mailto:opsawg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsawg>, <mailto:opsawg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 01 Dec 2021 21:24:29 -0000

Hi Roman,

Thank you very much for the review and comments! Please find inline my response and proposed modifications. The modifications will be reflected in the version -12. 

Best regards,
Haoyu

-----Original Message-----
From: Roman Danyliw via Datatracker <noreply@ietf.org> 
Sent: Tuesday, November 30, 2021 6:10 PM
To: The IESG <iesg@ietf.org>
Cc: draft-ietf-opsawg-ntf@ietf.org; opsawg-chairs@ietf.org; opsawg@ietf.org; ludwig@clemm.org; ludwig@clemm.org
Subject: Roman Danyliw's Discuss on draft-ietf-opsawg-ntf-11: (with DISCUSS and COMMENT)

Roman Danyliw has entered the following ballot position for
draft-ietf-opsawg-ntf-11: Discuss

When responding, please keep the subject line intact and reply to all email addresses included in the To and CC lines. (Feel free to cut this introductory paragraph, however.)


Please refer to https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fblog%2Fhandling-iesg-ballot-positions%2F&amp;data=04%7C01%7Chaoyu.song%40futurewei.com%7C44cefd5adab943c3365e08d9b46fa527%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C637739213905186071%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=aiyR0NZZCOj8m9JfGw2RBnbYIje7oaROrZN%2BPj2ytMo%3D&amp;reserved=0
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fdraft-ietf-opsawg-ntf%2F&amp;data=04%7C01%7Chaoyu.song%40futurewei.com%7C44cefd5adab943c3365e08d9b46fa527%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C637739213905186071%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=jwSUX6LNW7mwPmYYILyM5gKEyHF5zKDfyddVBBlXvH4%3D&amp;reserved=0



----------------------------------------------------------------------
DISCUSS:
----------------------------------------------------------------------

Thank you for being responsive to the SECDIR review threat to improve the security considerations text.  Specifically, https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fmailarchive.ietf.org%2Farch%2Fmsg%2Fsecdir%2FGUvFWXP7n9IjXW8xlIdMS5ZE5u0%2F&amp;data=04%7C01%7Chaoyu.song%40futurewei.com%7C44cefd5adab943c3365e08d9b46fa527%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C637739213905186071%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=%2FcZ2Ccch7Z24xce%2F8C4zEyHxMS9Dvb8HoG8HOAmGInU%3D&amp;reserved=0.

Even after these edits, there are a few straightforward ambiguities to clear up.

(a) Section 2.  "When a network's endpoints do not represent individual users (e.g. in industrial, datacenter, and infrastructure contexts), network operations can often benefit from large-scale data collection without breaching user privacy."

Is network telemetry architecture being restricted to such a limited applicability?  To quote the original SECDIR thread, is this saying "The Network Telemetry Framework is not applicable to networks whose endpoints represent individual users, such as general-purpose access networks"?  If so, I'd recommend being that explicit.

HS> Thank you for pointing that out. We'll make it explicit. 


(b) Section 2.1.  "To preserve user privacy, the user packet content should not be collected." This is a great principle, but extremely nuanced and potentially complicated to implement.  Is this saying (using the words of this framework), "To preserve the privacy of end-users, no user packet content should be collected.  Specifically, the data objects generated, exported, and collected by the Network Telemetry Framework should not include any packet payload from traffic associated with end-users systems"?

HS> We will adopt the new wording you suggested above. 


(c) Section 2.5.  Please use stronger and consistent language.

OLD
Disclaimer: large-scale network data collection is a major threat to user privacy [RFC7258].  The network telemetry framework presented in this document should not be applied to collect and retain individual user data or any data that can identify end users without consent.
Any data collection or retention using the framework must be tightly limited to protect user privacy.

NEW
Large-scale network data collection is a major threat to user privacy and may be indistinguishable from pervasive monitoring [RFC7258].  The network telemetry framework presented in this document must not be applied to generating, exporting, collecting, analyzing or retaining individual user data or any data that can identify end users or characterize their behavior without consent.

The principles described in (a), (b) and (c) seems sufficiently important they shouldn't be scattered across the document.  Please either make an applicability statement section early in the document or a dedicated privacy consideration section.

HS> Thank you for the suggestion. The applicability statement is now made a subsection 1.1.

----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

(Apologize if any of the below section numbers are wrong.  I conducted most of my review on -10 and then -11 was published which renumbered the document)

Thanks to Alexey Melnikov for the SECDIR review.

I'm a bit of confusion on the framing of this document.  It seems to me to be suggesting that "OAM" is a tied to a series of static technologies and practices, and a set of new practices called "network telemetry" are needed.  I don't disagree with the idea that network management practices need to evolve, and that the "networks of the future" will look different than today.  Relying on BCP 161 (RFC 6291), I took OAM to mean an evolving set of practices and technology.  Using Section 3 of BCP 161, O + A + M seemed like a contextual set of operations that would be done now and still required in networks of the future.  The document acknowledges that there is some ambiguity in "network telemetry".  I think it needs to equally acknowledge that the same is true of OAM, and that RFC7276 is not OAM.  In the aggregate, I don't think the text realizes the clarity that it set out to provide by defining "key characteristics of network telemetry which set a clear distinction from the conventional network OAM and show that some conventional OAM technologies can be considered a subset of the network telemetry technologies.".  To be clear, I'm not raising an objection to many of the properties linked to network telemetry.  Instead, I think the clarity of message is getting diluted because a very particular distinction is trying to be made (OAM vs. network telemetry) and it isn't clear.  See below for a specifics.

** Section 1.
... using a wide variety of techniques including machine learning, data analysis, and correlation.

ML, data analysis and correlation are unlike things.  ML is a particular AI technique, data analysis is a generic description of an activity, and is correlation intended to be a statistical technique?

HS>  change to "... using a wide variety of data analytical techniques."

** Section 1
   Network telemetry extends beyond the historical network Operations,
   Administration, and Management (OAM) techniques and expects to
   support better flexibility, scalability, accuracy, coverage, and
   performance.

This seems hypothetical depending on the definition on which technologies are considered in scope of network telemetry and OAM.

HS> change "historical" to "classical". We admit the term "network telemetry" is just an extension of OAM with a bigger scope and more future oriented. So many classical OAM techniques are also considered as network telemetry, as stated in the document. 

** Section 2.

Today one can access advanced big data analytics capability through a
   plethora of commercial and open source platforms (e.g., Apache
   Hadoop), tools (e.g., Apache Spark), and techniques (e.g., machine
   learning).  Thanks to the advance of computing and storage
   technologies, network big data analytics gives network operators an
   opportunity to gain network insights and move towards network
   autonomy.
In trying to contextual this observation, where is this capability relative to Figure 1?  In general, I would recommend that this reference architecture when assessing the ecosystem.

HS> This capability is mainly supported by the "Network Operation Applications" block in Figure 1. Add "Once the network operation applications acquire the data from these modules, they can apply data analytics and take actions." In Section 3 for clarification. 

** Section 2.

However, while the data processing capability is improved and
   applications are hungry for more data ...

What does it mean and what applications are "hungry for more data".  Is a reference possible here?

HS> Rephrase to "... and applications require more data to function better, ..."

** Section 2.  Editorial.  s/concerned in the context/relevant in this document/

HS> Done

** Section 2.1
Less but higher quality data are often better
   than lots of low quality data.

This seems like a broad generalization that doesn't consider the application and the cost of acquisition or processing.

HS> Rephrase to "In some cases, if the cost is acceptable, less but higher quality data are preferred than lots of low quality data."

** Section 2.2.

The ultimate goal is to achieve the
      ideal security with no, or only minimal, human intervention.

What is "ideal" security?

HS> removed the word "ideal"

** Section 2.2.
While machine learning technologies can be used for
      root cause analysis, it up to the network to sense and provide the
      relevant diagnostic data which are either actively fed into, or
      passively retrieved by, machine learning applications.

This text is asymmetric with the others bullets since don't discuss specific
techniques.   Personally, it also seem odd to include this text as there are
other ways  to do root cause analysis beyond ML (to include other AI approaches).

HS> Rephrase to "While technologies such as machine learning can be used for root cause analysis, it is up to the network to sense and provide the relevant diagnostic data which are either actively fed into, or passively retrieved by, the root cause analysis applications."

** Section 2.3
   For a long time, network operators have relied upon SNMP [RFC3416],
   Command-Line Interface (CLI), or Syslog to monitor the network.  Some
   other OAM techniques as described in [RFC7276] are also used to
   facilitate network troubleshooting.
...
   These challenges were addressed by newer standards and techniques
   (e.g., IPFIX/Netflow, PSAMP, IOAM, and YANG-Push) and more are
   emerging.  These standards and techniques need to be recognized and
   accommodated in a new framework.

This section is an exemplar of the disconnect I noted in the definitions of OAM.  The first paragraph presents a narrow view of currently used (albeit
older) network monitoring technologies (SNMP, CLI Syslog).  However, in the closing paragraph, the text names more modern technologies I would also consider OAM, and these technologies could meet some of the challenges mentioned in this section.  Furthermore, some of these "newer standards" are framed as things that need to be "recognized".  This is puzzling because my understanding was that technologies like IPFIX/Netflow have been very widely deployed for quite some time now.  What's the new framework needed?

HS> We are expecting more new techniques will emerge and new applications (e.g., interactive telemetry, programmable telemetry) will be used which is beyond the conventional understanding of the network OAM. While we summarize all these using the new term "network telemetry", we admit it's not a brand-new concept coming from no-where and a long line of related techniques and standards one may considered as OAM are developed. To emphasize the new features and new potentials, we think the term "network telemetry" is better than "OAM".

** Section 2.4
Network telemetry covers the conventional network OAM and
   has a wider scope.

Can the text be more specific in what way network telemetry is wider.  I thought OAM was rather ambiguous.

HS> The next sentence "It is expected that network telemetry can provide the necessary network insight for autonomous networks and address the shortcomings of conventional OAM techniques." means to  provide a specific explanation. Add "For instance, ..." to make it clear.

** Section 2.4
Hence, the network telemetry can directly
   trigger the automated network operation, while in contrast some
   conventional OAM tools are designed and used to help human operators
   to monitor and diagnose the networks and guide manual network
   operations.

I'm not sure if this is a fair generalization.  Even "older technologies" like SNMP currently trigger automated responses based on the values they return.

HS> We admit some old technologies can have new use in an automated environment. That's why we say "some" and only say their original intention when being designed. In other words, any technique that is used in the new context is a network telemetry technique for sure. 

** Section 2.4.  Per "data fusion," which part of the Figure 1 is this happening?

HS> It should be in the "network operation applications" block. 

** Section 2.5.

Network data analytics and machine-learning technologies are applied
   for network operation automation, relying on abundant and coherent
   data from networks.

-- What is the difference between a network data analytics system and ML technologies?  Isn't analytics a superset of ML?

HS> Rephrase to "Network data analytics (e.g., machine learning) is applied

-- What is coherent data?

HS> Here "coherent" means  united as or forming a whole

** Section 2.5.
In detail, such a framework would benefit application
   development for the following reasons:

It might be helpful to level set what an application is in this context.  Is this the "network operations application" of Figure 1?

HS> Yes. Expand "application" to "network operation application" for clarification. 

** Section 2.5
All the use cases and
      applications are better to be supported uniformly and coherently
      under a single intelligent agent

-- Editorial.  There is a missing word which leads to this sentence not parsing.

-- What's the basis for asserting that a "single intelligent agent" is the best approach?

-- Maybe the issue is of semantics, what is an "intelligent agent" in this context?

HS> Remove " under a single intelligent agent" to avoid confusion. 

** Section 2.5.

Network visibility presents multiple viewpoints

and

Efficient data fusion is critical for applications to reduce the
      overall quantity of data and improve the accuracy of analysis.

Are these generalizations expected to be true across the broad use cases?

HS> We think the first point is valid.  The second point has been corrected as "efficient data aggregation" in -11. 

** Figure 2.  For the management plane, the data model module has MIB and syslog listed, but the data encodings as GPB, JSON and XML.  These data models and encodings don't line up (i.e., MIBs and syslog typically don't rely on GPB, JSON or XML).

HS> We explained that this table is not exhaustive and does not mean to provide 1-to-1 matching. It only provides some representative examples. 

** Section 3.1.  Where do network security applications such as WAFs, IDS/IPS/ NGF, DLP, web-proxies, and pDNS fit into this taxonomy?

HS> Security application is a branch of telemetry applications for which its parts will spread in all components of the framework just as the other telemetry applications.  

** Section 3.1.* These sections inconsistently describe properties/requirements for an architectural element and their challenges (but no solutions or requirements for) a given elements.  As a result, I had trouble understanding what an implementer should understand these components.  It would have been clearer is the different modules had common and module specific requirements.

HS> We describe the common challenges/requirements in earlier sections. Here we want to summarize some specific requirements pertaining to each element. Of course, some requirements are relevant to the other elements as well.

** Section 3.1.1.  Per the requirements of "Convenient Data Subscription", "Structured Data", etc. why wouldn't those be desirable requirements for all four of the modules?

HS> We note that "the requirements may pertain across all telemetry modules; however, we emphasize those that are most pronounced for a  particular plane."

** Section 3.1.3.  Providing "timely data" and "structured data", seem like the restatements of Section 4.1.1's "structure data" and "high speed transport". Is this a common requirement?

HS> Yes indeed.

** Section 3.1.3.  Why wouldn't it be desirable for all of the modules to support incremental deployment note here?

HS> We note that " Although not specific to the forwarding plane, these challenges are  more difficult to the forwarding plane because of the limited  resource and flexibility."

** Section 3.2.
   *  Data Query, Analysis, and Storage: This component works at the
      application layer.

I need a bit of topological orientation.  What is the application layer of say a "forwarding plane" or "external data" be?  What are the other layers?

HS> Thanks for the catch. We actually mean "the application block" in the Figure 1. We will correct it.  

** Section 5.  Recommend explicitly saying that this document doesn't define specific technologies to shift the responsibility of specific considerations.

HS> We will make it explicit at the beginning of the document. 

OLD
   Security considerations for networks that use telemetry methods may
   include:

NEW

This document proposes a conceptual architectural for collecting, transporting, and analyzing a wide variety of data sources in support of network applications.  The protocols, data formats, and configurations chosen to implement this framework will dictate the specific Security Considerations. 
These considerations may include:

HS> Done

** Section 5.

OLD
   *  Telemetry data stores, storage encryption and methods of access;

NEW
   *  Telemetry data stores, storage encryption, methods of access, and
   retention practices.

HS> Done