[OPSAWG] FW: Adrian Farrel's Discuss on draft-ietf-opsawg-management-stds-06:(with DISCUSS and COMMENT)

"Romascanu, Dan (Dan)" <dromasca@avaya.com> Tue, 13 March 2012 10:50 UTC

Return-Path: <dromasca@avaya.com>
X-Original-To: opsawg@ietfa.amsl.com
Delivered-To: opsawg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B702A21F8781 for <opsawg@ietfa.amsl.com>; Tue, 13 Mar 2012 03:50:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -103.366
X-Spam-Level:
X-Spam-Status: No, score=-103.366 tagged_above=-999 required=5 tests=[AWL=0.233, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nZEX63xnbEqB for <opsawg@ietfa.amsl.com>; Tue, 13 Mar 2012 03:50:49 -0700 (PDT)
Received: from co300216-co-outbound.net.avaya.com (co300216-co-outbound.net.avaya.com [198.152.13.100]) by ietfa.amsl.com (Postfix) with ESMTP id 6DDE621F86E2 for <opsawg@ietf.org>; Tue, 13 Mar 2012 03:50:47 -0700 (PDT)
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AgIFAJIkX0+HCzI1/2dsb2JhbABDhTevLXyBB4IJAQEBAQMSEQ0ERQwGAQgNAQMEAQEDAgYGDAsBAgIDAUQHAQEFBAEEEwgBGYdoC6BmiXmSJIEvjiAzYwSbWooYgmaBWw
X-IronPort-AV: E=Sophos;i="4.73,576,1325480400"; d="scan'208";a="336412646"
Received: from unknown (HELO p-us1-erheast.us1.avaya.com) ([135.11.50.53]) by co300216-co-outbound.net.avaya.com with ESMTP; 13 Mar 2012 06:50:46 -0400
Received: from unknown (HELO 307622ANEX5.global.avaya.com) ([135.64.140.13]) by p-us1-erheast-out.us1.avaya.com with ESMTP; 13 Mar 2012 06:35:27 -0400
x-mimeole: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Date: Tue, 13 Mar 2012 11:50:44 +0100
Message-ID: <EDC652A26FB23C4EB6384A4584434A04075BFF39@307622ANEX5.global.avaya.com>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: Adrian Farrel's Discuss on draft-ietf-opsawg-management-stds-06:(with DISCUSS and COMMENT)
Thread-Index: Ac0AhcX2kFmL6it7Q/+T7iCiJK4PEwAgTMmw
From: "Romascanu, Dan (Dan)" <dromasca@avaya.com>
To: Benoit Claise <bclaise@cisco.com>, "Ersue, Mehmet (NSN - DE/Munich)" <mehmet.ersue@nsn.com>
Cc: opsawg@ietf.org
Subject: [OPSAWG] FW: Adrian Farrel's Discuss on draft-ietf-opsawg-management-stds-06:(with DISCUSS and COMMENT)
X-BeenThere: opsawg@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OPSA Working Group Mail List <opsawg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/opsawg>, <mailto:opsawg-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/opsawg>
List-Post: <mailto:opsawg@ietf.org>
List-Help: <mailto:opsawg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsawg>, <mailto:opsawg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 13 Mar 2012 10:50:52 -0000

Mehmet and Benoit,

Please address the issues raised by Adrian in his DISCUSS.

Thanks and Regards,

Dan




-----Original Message-----
From: iesg-bounces@ietf.org [mailto:iesg-bounces@ietf.org] On Behalf Of Adrian Farrel
Sent: Monday, March 12, 2012 9:24 PM
To: The IESG
Cc: draft-ietf-opsawg-management-stds@tools.ietf.org; opsawg-chairs@tools.ietf.org
Subject: Adrian Farrel's Discuss on draft-ietf-opsawg-management-stds-06:(with DISCUSS and COMMENT)

Adrian Farrel has entered the following ballot position for
draft-ietf-opsawg-management-stds-06: Discuss

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)

Please refer to http://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.



----------------------------------------------------------------------
DISCUSS:
----------------------------------------------------------------------

I had some difficulty determining what are "IETF network management
standards".

The Introduction helpfully explains that "OAM technologies on the data-
path" are not covered. I think this might usefully be mentioned in the
Abstract.

---

I found the lists of existing MIB modules in Section 4.1 a bit hit and
miss.

For example, in Section 4.1.2 only one of te GMPLS MIB module RFCs is
listed. This is kind of "by example" of a data plane model, so is
probably OK, but why not mention the MIB modules for the GMPLS control
plane.

In Section 4.1.3 I would have expected to see discussion of both the
MPLS forwarding plane, and some of the MPLS control plane protcols.
Conversely, I found it off-puting that Section 4.1.3 lumps together
the routing protocols with the IP forwarding plane.

Looking at Section 4.1 as a whole, I wondered whether you really want to
enumerate the existing MIB modules for all IETF protocols. This seems
like a thankless task and one that is hard to keep complete unless you
go to the OID tree (in IANA) and make a full list.

On the other hand, there are some technology-specific "MIB overview"
documents that might provide useful things to point at. For example:
- RFC 4221
- draft-ietf-mpls-tp-mib-management-overview

I'm finding this a hard one to make actionable! How about...

  Please use the OID tree in the IANA registry to ensure that you have
  not left out any MIB modules for key IETF protocols.

  Please consider including references to RFC 4221 and draft-ietf-mpls-
  tp-mib-management-overview.

You might also find it beneficial to split 4.1 into forwarding plane
management and control protocol management.

---

Rather than removing Section 6, I think you should use it to summarise
the secuirty issues of network management, point to the sections of this
document that discuss security, and reference other documents specific
to the security of network management.
                                                 
This might point to the fact that security discussions are patchy in 
this document. 2.1.4 is a good detailed cover of SNMP security, 2.2 
briefly mentions how to secure syslog, and 2.3 has a rather scanty 
mention of security for ipfix. Why is there not similar discussion of
how to secure netconf?

Similarly, in section 3 there is mention of security for RADIUS, 
DIAMETER, CAPWAP, ANCP, and ACAP, but not for DHCP, BOOTP, the various
autoconf options, COPS, and XCAP.


----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

I think that a general change of s/MIB/MIB module/ is needed.