Re: [OPSAWG] (final) WGLCondraft-ietf-opsawg-operations-and-management

"David Harrington" <ietfdbh@comcast.net> Tue, 10 February 2009 20:21 UTC

Return-Path: <ietfdbh@comcast.net>
X-Original-To: opsawg@core3.amsl.com
Delivered-To: opsawg@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 618583A6A58 for <opsawg@core3.amsl.com>; Tue, 10 Feb 2009 12:21:04 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.102
X-Spam-Level:
X-Spam-Status: No, score=-2.102 tagged_above=-999 required=5 tests=[AWL=-0.103, BAYES_00=-2.599, J_CHICKENPOX_35=0.6]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7XdEIoEzrks4 for <opsawg@core3.amsl.com>; Tue, 10 Feb 2009 12:21:02 -0800 (PST)
Received: from QMTA04.westchester.pa.mail.comcast.net (qmta04.westchester.pa.mail.comcast.net [76.96.62.40]) by core3.amsl.com (Postfix) with ESMTP id 87CD03A6C7E for <opsawg@ietf.org>; Tue, 10 Feb 2009 12:21:01 -0800 (PST)
Received: from OMTA09.westchester.pa.mail.comcast.net ([76.96.62.20]) by QMTA04.westchester.pa.mail.comcast.net with comcast id EFyR1b07C0SCNGk54LM5dw; Tue, 10 Feb 2009 20:21:05 +0000
Received: from Harrington73653 ([24.147.240.21]) by OMTA09.westchester.pa.mail.comcast.net with comcast id ELM41b00L0UQ6dC3VLM4o9; Tue, 10 Feb 2009 20:21:05 +0000
From: David Harrington <ietfdbh@comcast.net>
To: "'tom.petch'" <cfinss@dial.pipex.com>, 'Adrian Farrel' <adrian@olddog.co.uk>, opsawg@ietf.org
References: <EDC652A26FB23C4EB6384A4584434A040132E373@307622ANEX5.global.avaya.com><5C8D68E9DDC2439B82F3CC0591A54F05@your029b8cecfe> <000801c98ba3$80df0780$0601a8c0@allison>
Date: Tue, 10 Feb 2009 15:21:03 -0500
Message-ID: <003601c98bbd$19086470$0600a8c0@china.huawei.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Office Outlook 11
Thread-Index: AcmLrBDYOSfamgweT5q5kVZzzbvZbQAEOuiA
In-Reply-To: <000801c98ba3$80df0780$0601a8c0@allison>
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3198
Cc: 'David B Harrington' <dbharrington@comcast.net>, tseely5@gmail.com
Subject: Re: [OPSAWG] (final) WGLCondraft-ietf-opsawg-operations-and-management
X-BeenThere: opsawg@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OPSA Working Group Mail List <opsawg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/opsawg>, <mailto:opsawg-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/opsawg>
List-Post: <mailto:opsawg@ietf.org>
List-Help: <mailto:opsawg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsawg>, <mailto:opsawg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 10 Feb 2009 20:21:04 -0000

Besides the comments form Juergen, Mike, and Adrian, what needs to be
done to make this live up to its billing? Do you have explicit
recommendations of text?

dbh 

> -----Original Message-----
> From: opsawg-bounces@ietf.org 
> [mailto:opsawg-bounces@ietf.org] On Behalf Of tom.petch
> Sent: Tuesday, February 10, 2009 12:05 PM
> To: Adrian Farrel; opsawg@ietf.org
> Cc: David B Harrington; tseely5@gmail.com
> Subject: Re: [OPSAWG] (final) 
> WGLCondraft-ietf-opsawg-operations-and-management
> 
> I was going to say +1 to Juergen's comments and then I was 
> going to say +1 to
> Mike's comments and then I was going to say +1 to Adrian's 
> comments and while I
> was pondering, ... I left it too late:-(
> 
> But I do echo much of what has been said.  I cannot see that 
> this I-D lives up
> to its billing.  It is a good idea, and it is good stuff 
> (give or take some
> infelicities of wording, most of which have been pointed out 
> already) but I do
> not see it as good stuff for a working group coming up with a 
> new protocol, say
> an MPLS-TP or sieve or sidr. And that is what I think is 
> needed.  If something
> is not designed to be managed ab initio, then it may be 
> costly, impossible even,
> to manage it in the wild.
> 
> Tom Petch
> 
> 
> ----- Original Message -----
> From: "Adrian Farrel" <adrian@olddog.co.uk>
> To: <opsawg@ietf.org>
> Cc: "David B Harrington" <dbharrington@comcast.net>; 
> <tseely5@gmail.com>
> Sent: Wednesday, February 04, 2009 8:54 PM
> Subject: Re: [OPSAWG] (final) WGLC 
> ondraft-ietf-opsawg-operations-and-management
> 
> 
> > Hi,
> >
> > Dan asked me to have a look at this which I do primarily 
> with a routing area
> > view on the world.
> >
> > I'm sorry that I haven't been following this I-D very 
> closely and apologise
> > if you have already discussed and reached conclusion on 
> some of the points I
> > make.
> >
> > I am largely supportive of this work (see
> > draft-ietf-pce-manageability-requirements-06.txt), but I do 
> have some
> > issues. I would be comforted to know that the I-D had had 
> extensive review
> > from within the Ops Area without relying just on my comments!
> >
> > I would also like to understand how the recommendations 
> parts of the draft
> > will be interpreted by the Ops ADs as they perform IESG 
> review of I-Ds from
> > other areas. Depending on the answer (which I would like to 
> see encapsulated
> > in the document!) I might have other harsher comments about 
> the content.
> >
> > More details below.
> >
> > Cheers,
> > Adrian
> >
> > ===
> > Title is...
> >  Guidelines for Considering Operations and Management of 
> New Protocols
> > ...but the Abstract immediately includes...
> >    New protocols or protocol extensions
> > ===
> > Obviously needs the new IPR boilerplate.
> > ===
> > Abstract line 3
> > s/protocol/protocols/
> > ===
> > I am somewhat worried by "recommend appropriate standard
management
> > protocols ... to address the relevant operations and management
> > needs."
> >
> > I understand the theory behind this guidance in terms of making
> > equipment that will interwork with management systems, but I
> > question its practicality given the vast array of management
> > protocols available. And actually, I am not sure that this has a
> > direct impact on the success of or development of a protocol.
> >
> > The introduction says that this "is similar to a WG considering
> > which security threats are relevant to their protocol, and then
> > recommending appropriate standard security protocols to mitigate
> > the relevant threats." I dispute this. The security considerations
> > normally make modifications to the protocol under development to
> > make it secure, or mandate security features in other protocols
> > that the protocol under development uses. But where there is a
> > need for an external protocol, this is not usually mandated. For
> > example, where key exchange is needed the text will usually say
> > something like "may use some form of secure key exchange protocol
> > (such as the Internet Key Exchange protocol v2 (IKE) [RFC4306]."
> > This is far looser than a recommendation of a specific protocol.
> >
> > I believe that in practice operators want to go on using the
> > management protocols that they already have deployed. If, for
> > example, I have deployed routers that I manage using SNMP, I will
> > not want to deploy a new routing protocol on those routers if that
> > protocol is strongly recommended to be managed using TL1.
> >
> > Since data modeling is usually tied closely to the protocol used
> > for management, it follows from this that developing specific
> > data formats (SNMP MIB modules, XML schema, etc.) might also not
> > be so very practical. (Arguably we have found this out with MIB
> > modules over the last 10 years, but still churn them out.)
> >
> > What *would* be beneficial, however, is an abstract data model
> > for management of the protocol. There are many ways of
> > representing the data (XML, BNF, ASN.1, graphical representation,
> > etc.) and the Ops Area could usefully pick one and standardise
> > it. From there we would have a solid data set that all
> > implementations could make available and which separate documents
> > could easily map to suitable formats for use by specific
> > management protocols. Smart implementers would be able to support
> > multiple management protocols with ease.
> >
> > You do come to this to some extent in section 4.1, and the text
> > there seems to be at odds with what you have said in the
> > Introduction.
> >
> > ===
> > Section 1
> >
> > Can you expand "WG" on first usage?
> >
> > ===
> > Section 1
> >
> >    We want to avoid seeming to impose a solution by putting 
> in place a
> >    strict terminology - for example implying that a formal 
> data model,
> >    or even using a management protocol is mandatory.
> >
> > <grin mode=wry>
> >
> > You want to avoid seeming to impose it?
> > So, you want to impose it, but you don't want anyone to notice?
> >
> > </grin>
> >
> > ===
> > Section 1
> >
> >    Making a Management Considerations section a mandatory 
> publication
> >    requirement for IETF documents is the responsibility of 
> the IESG, or
> >    specific area directors, or working groups, and this 
> document avoids
> >    recommending any mandatory publication requirements.
> >
> > I think you may need to go a step further to get this through the
> > IESG. It would not be funny to see this paragraph as written, but
> > to get a DISCUSS on an I-D from an Ops AD because the I-D did not
> > contain a Management Considerations section.
> >
> > ===
> > Introduction
> >
> >    We provide some objective criteria to promote interoperability
> >
> > <grin mode=laconic>
> >
> > There seems to be only one author. Are you royalty?
> > Perhaps... "This document provides..."
> >
> > </grin>
> >
> > ===
> > Section 1 final line
> >
> > s/??/?"/
> >
> > ===
> >
> > 2.1.  IETF Management Framework
> >
> >    For years the IETF has stressed the use of the IETF Standard
> >    Management Framework and MIB modules [RFC2578] for managing new
> >    protocols.  The IETF designed these to permit multiple 
> protocols to
> >    utilize the MIB data [RFC1052], but it became a common
> >
> > s/became/is/
> >
> > ===
> >
> > 3.1.  Operations Model
> >
> >    o  what are the typical user interfaces - Command line (CLI) or
> >       graphical user interface (GUI)?
> >
> > I am not sure that this last item is particularly relevant for a
> > large number of the protocols designed in the IETF. We might say
> > that the question is valid for a protocol such as FTP, but is it
> > relevant for OSPF? Yes, there is a configuration interface to a
> > device that runs OSPF, but it is surely nothing to do with the
> > protocol design how that interface works. Indeed, you might
> > reduce the question to: are the configuration interfaces local or
> > remote? But I think you will find that the answer to the question
> > is "both" as in the subsequent paragraph.
> >
> > ===
> >
> > 3.1.  Operations Model
> >
> >    Auto-configuration and default parameters might be
> >    possible for some new protocols.
> >
> > I would make a much bigger noise about default parameters. There
is
> > a key question about how the protocol can operate "out of the
box".
> > If implementers are free to select their own defaults, the
protocol
> > needs to operate well with any choice of values. If there are
> > sensible defaults, these need to be stated.
> >
> > Indeed, section 3.2 seems to say this. Perhaps a forward
reference?
> >
> > ===
> >
> > 3.1.  Operations Model
> >
> >    There may be a need to support a human interface, e.g., for
> >    troubleshooting, and a programmatic interface, e.g., for 
> automated
> >    monitoring and root cause analysis.  It might be 
> important that the
> >    internal method routines used by the application programming
> >    interfaces and the human interfaces should be the same 
> to ensure that
> >    data exchanged between these two interfaces is always
consistent.
> >    Mixing methods leads to inconsistency, so identifying
consistent
> >    methods of retrieving information is relevant.
> >
> > This is really sailing too close to the implementation. People
> > must be free to construct sub-standard and unmarketable
> > implementations. The IETF is not responsible for making all
> > implementations successful. The job is to make it possible for
> > all implementations to be successful given core competences in the
> > developers.
> >
> > I think the furthest a protocol spec RFC could go would be to say
> > what information must be available to an operator at a human
> > interface for troubleshooting
> >
> > ===
> >
> > 3.2.  Installation and Initial Setup
> >
> > In view of the reasons you give why defaults might become out-
> > dated, you might point out that sometimes it is not advisable to
> > have defaults. In these cases explicit configuration is required.
> >
> > ===
> >
> > 3.2.  Installation and Initial Setup
> >
> > Is the text at the top of page 8 supposed to be a bullet list?
> >
> > ===
> >
> > 3.4.  Requirements on Other Protocols and Functional Components
> >
> >    These considerations should generally remain 
> illustrative to avoid
> >    creating restrictions or dependencies, or potentially 
> impacting the
> >    behavior of existing protocols, or restricting the 
> extensibility of
> >    other protocols, or assuming other protocols will not be 
> extended in
> >    certain ways.
> >
> > Well, this is quite interesting.
> >
> > Suppose you decide to utilise a particular feature of a transport
> > protocol. You are creating a hard requirement that that feature is
> > implemented in all implementations of the set {your new protocol,
> > the transport protocol}. But more importantly, perhaps, you are
> > requiring that new versions of the transport protocol do not
> > deprecate the feature you require.
> >
> > In short, I don't think you should be too nervous about creating
> > restrictions or dependencies. If they exist, they must be stated.
> >
> > ===
> >
> > 3.2.  Installation and Initial Setup
> >
> >    For example, the design of Resource ReSerVation Protocol (RSVP)
> >
> > I think this example is not well expressed.
> >
> > The problem in RSVP was that the IP packet was addressed to the
> > ultimate RSVP-capable destination, but the RSVP-capable routers
> > along the path needed to intercept and process the Path message.
> > This they could only do by "deep packet inspection" or by the
> > router alert option.
> >
> > I wonder whether this example adds significantly to the I-D.
> >
> > ===
> >
> > 4.  Management Considerations
> >
> >    NETCONF addresses this in a generic manner by
> >
> > Add citation.
> >
> > ===
> >
> > 4.  Management Considerations
> >
> >    However, debugging on-the-wire interactions is a protocol
> >    issue: it is enormously helpful if a protocol has hooks to make
> >    debugging of network interactions easy, and/or is 
> designed in such a
> >    way that debugging protocol behaviors is easy.  
> Hand-waving this away
> >    is not something that operators like ...
> >
> > I think you are including this by hand-waving!
> > What do you mean by "hooks"?
> > Surely any protocol can be debugged simply by sniffing it.
> > If you have specific hooks in mind you must set them out and not
> > leave the reader guessing.
> > But if you force the implementation I shall be peeved!
> > You might, for example, say that there should be alerts issued
when
> > messages are received, or when there are state transitions in the
> > protocol state machine, but you must recall that:
> > - the messages can be seen by sniffing
> > - the state machine is not part of the protocol specification.
> > This latter point is key. The state machine explains how the
> > protocol works in order that an implementer can decide how to
> > react to a received event, but it does not require that the
> > machine is implemented.
> >
> > ===
> >
> > 4.1.  Interoperability
> >
> >    Interoperability needs to be considered on the syntactic 
> level and
> >    the semantic level.  While it can be irritating and 
> time-consuming,
> >    application designers including operators who write 
> their own scripts
> >    can make their processing conditional to accommodate
differences
> >
> > s/differences/syntactic differences/ ?
> >
> >    Then, whether the counter is gathered via SNMP or a CLI
> >    command or a SYSLOG message, the counter will have 
> similar meaning.
> >
> > "similar"? I think that might not be good enough. Don't you need
> > "the same"?
> >
> >    o  [RFC3805] - Printer MIB v2 (contains both an IM and a DM
> >
> > Missing ")"
> >
> > ===
> >
> > 4.2.  Management Information
> >
> > I would find it really helpful if you were able to recommend a
> > language in which to write the information model. Ideally, all
> > IETF IMs would be in the same language.
> >
> >    It is important to be able to separately fetch 
> configuration data,
> >    operational state data, and statistics from devices, and 
> to be able
> >    to compare current state to initial state, and to compare data
> >    between devices.
> >
> > You seem to have drifted into DMs here. You cannot fetch data from
> > an IM. It simply explains what data elements exist. In fact, an IM
> > states all of the data that exists and so there is no confusion.
> > Confusion can only arise as the DM is constructed and multiple IM
> > data elements are conflated into single DM objects.
> >
> > ===
> >
> > 4.3.  Fault Management
> >
> >    The protocol designer should document the basic faults and
health
> >    indicators that need to be instrumented for the new 
> protocol, and the
> >    alarms and events that must be propagated to management 
> applications
> >    or exposed through a data model.
> >
> > Isn't "propagated to management applications" a subset of "exposed
> > through a data model"?
> >
> >    The protocol designer should consider how faults 
> information will be
> >
> > s/faults/fault/
> >
> >    Should the event reporting provide gyaranteed accurate 
> delivery of
> > s/gyaranteed/guaranteed/
> >
> > ===
> >
> > 4.3.3.  Fault Isolation
> >
> >    It might be useful to isolate faults, such as a system that
emits
> >    malformed messages necessary to coordinate connections
properly.
> >    Spanning tree comes to mind.  This might be able to be done by
> >    configuring next-hop devices to drop the faulty messages 
> to prevent
> >    them from entering the rest of the network.
> >
> > This is not what *I* mean by fault isolation!
> > Fault isolation is about working out where in the network the
fault
> > is. For example, if end-to-end data delivery is failing (reported
by
> > a notification), fault isolation will find the failed link or node
> > in the end-to-end path.
> >
> > You seem to be describing the process of quarantining faulty
> > devices. This may also be valuable.
> >
> > "Spanning tree comes to mind" is a rather strange sentence without
> > much context.
> >
> > ===
> >
> > 4.4.  Configuration Management
> >
> >    A protocol desoigners should document what the basic 
> configuration
> >
> > s/desoigners/designers/
> >
> >    "Requirements for Configuration Management of IP-based
Networks"
> >    [RFC3139] discusses requirements for configuration management.
> > More precisely,
> >    "Requirements for Configuration Management of IP-based
Networks"
> >    [RFC3139] discusses requirements for configuration management
of
> >    IP-based networks.
> > Which makes me wonder about the purpose of the sentence :-)
> >
> >    This document includes...
> > This document or that document?
> >
> >    A number of efforts have existed in the IETF to develop 
> policy-based
> >    management.  "Terminology for Policy-Based Management" 
> [RFC3198] was
> >    written to standardize the terminology across these 
> efforts.  Some of
> >    the efforts resulted in proposals that are NOT RECOMMENDED, so
a
> >    protocol designer should check the current recommendation
status
> >    before depending on a specific protocol suggestion.
> >
> > You have used RFC2119 language, but in section 1.1 you said
> >    This document deliberately does not use the 
> (capitalized) keywords
> >    described in RFC 2119 [RFC2119].
> > Furthermore, it is not clear to me whether this I-D is doing the
> > NOT RECOMMENDing or whether some other RFC has done it. If it is
> > this I-D, you will need to give reasons. If is some other RFC, you
> > will need to give references.
> >
> >    It is highly desirable that text processing tools such 
> as diff, and
> >    version management tools such as RCS or CVS or SVN, can 
> be used to
> >    process configurations.  This approach simplifies comparing the
> >    current operational state to the initial configuration.  It is
> >    commonplace to compare configuration changes to e.g., 
> last day, last
> >    week, last month, etc. -- having configuration in a 
> text, and human-
> >    understandable format is very valuable for various 
> reasons such as
> >    change control (or verification), configuration 
> consistency checks,
> >    etc.
> >
> > Yes, but what has this to do with the protocol design? It might be
> > related to device implementation. Or it might be relevant to
> > EMS/NMS implementation.
> >
> > As you note in the subsequent paragraph, this may be impossible
> > even in some text-based DMs. It would certainly be impossible in
> > an SNMP MIB module.
> >
> >    To simplify such configuration comparisons, devices should not
> >    arbitrarily reorder data such as access control lists.  
> If a protocol
> >    designer defines mechanisms for configuration, it would 
> be desirable
> >    to standardize the order of elements for consistency of 
> configuration
> >    and of reporting across vendors, and across releases 
> from vendors.
> >
> > This example seems a bit specific. And in any case, it is
perfectly
> > possible to sort a list before comparing.
> >
> >    There are two parts to this: 1.  An NMS system could 
> optimize ACLs
> >    for performance reasons 2.  Unless the device/NMS 
> systems has correct
> >    rules/a lot of experience, reordering ACLs can lead to a huge
> >    security issue.
> >
> > Maybe what you are saying is:
> >    Implementations should not arbitrarily modify configuration
data.
> >    In some cases (such as Access Control Lists) the order of data
> >    items is significant and comprises part of the configured data.
> >
> >    Network wide configurations are ideally stored in central
master
> >    databases
> >
> > This looks like an unsubstantiated assertion. You might get away
> > with "Many operators prefer that..."
> >
> >    It is important to distinguish between the distribution of
> >    configurations and the activation of a certain configuration.
> >    Devices should be able to hold multiple configurations.
> >
> > This is really an implementation issue and nothing to do with the
> > protocol under design.
> >
> >    Consensus of the 2002 IAB Workshop was that textual
configuration
> >    files should be able to contain international characters.
> >
> > Do you have a citation?
> >
> >    These timers may need default values
> >    suggested in the protocol specification and do not need to be
> >    otherwise configurable.
> >
> > I had formed the opinion that timers must be given default values
> > in IETF protocol specifications, but I can't lay my hands on a
> > reference.
> >
> > ===
> >
> > 4.5.  Accounting Management
> >
> >    A protocol designer should consider whether it would be 
> appropriate
> >    to collect usage information related to this protocol, and if
so,
> >    what usage information would be appropriate to collect?
> >
> > s/collect?/collect./
> >
> >    "Introduction to Accounting Management" [RFC2975] 
> discusses a number
> >    of factors relevant to monitoring usage of protocols for 
> purposes of
> >    capacity and trend analysis, cost allocation, auditing, 
> and billing.
> >    This document also discusses how Remote Authentication 
> Dial In User
> > This or that?
> >
> >    Service (RADIUS) [RFC2865], Terminal Access Controller 
> Access Control
> >    System (TACACS) [RFC1492], SNMP, IPFIX, and Packet 
> Sampling (PSAMP)
> >    Protocol [I-D.ietf-psamp-protocol] protocols can be used 
> for these
> >    purposes.
> >
> > Surely RFC 2975 does not mention PSAMP? Which makes me wonder what
> > you are trying to achieve with a list of example protocols. Are
> > they intended as recommendations (in which case say so and why),
> > or as a non-exclusive list (in which case a "such as" would be
> > useful). At the moment it reads like these are your favorites and
> > you would be upset if someone used a different protocol!
> >
> > ===
> >
> > 4.6.  Performance Management
> >
> >    There are several parts to performance management to be 
> considered:
> >    protocol monitoring, services monitoring, and device 
> monitoring (the
> >    impact of the new protocol/service activation on the device).
> >
> > s/services/service/
> >
> >    Consider scalability, such as whether performance will 
> be affected by
> >    the number of protocol connections.
> >
> > Maybe say "protocol entities" rather than connections?
> >
> >
> > This section seems to flit between the performance of the protocol
> > under design and the network running the protocol under design,
and
> > the performance of the management of the protocol. Each is
> > important, but it may be constructive to split them out into
> > separate sections. The latter will also include a consideration of
> > how the act of monitoring impacts on network performance.
> >
> >
> >    The Benchmarking Methodology WG (bmwg) has defined 
> recommendations
> > Later you have BMWG.
> >
> > ===
> >
> > 4.7.  Security Management
> >
> >    It must be possible to do consistency checks of access 
> control lists
> >    across devices.  Protocol designers should consider information
> >    models to promote comparisons across devices and across 
> vendors to
> >    permit checking the consistency of security configurations.
> >
> > I think this "must" is massively excessive!
> > I would expect each router to have a different access list in the
> > control plane (a list of its neighbors). Such a mechanism would
> > actually open up a security vulnerability that has to be
protected.
> > Perhaps you are talking about management plane access lists. This
> > takes us into the area of securing management activity - see my
> > comments on Section 7.
> >
> >    RADIUS and DIAMETER can provide authentication and 
> authorization.  A
> >    protocol designer should consider which attributes would be
> >    appropriate for their protocol.
> >
> > This paragraph is apropos of what? What are you trying to tell me?
> > Should I run my management using Radius? Should I try to build
> > Diameter into my new protocol?
> >
> >    Different protocols use different assumptions about 
> message security
> > s/protocols/management protocols/
> >
> >    and data access controls.  A protocol designer that 
> recommends using
> >    different protocols should consider how security will be 
> applied in a
> > s/protocols/management protocols/
> >
> >
> > Although you talk about (presumably management) access 
> lists, I think
> > I would have expected a discussion of authority levels and policy
> > with regard to management tasks.
> >
> > ===
> >
> > 7.  Security Considerations
> >
> >    This document is informational and provides guidelines for
> >    considering manageability and operations.  It introduces no new
> >    security concerns.
> >
> > I think that, although you introduce no new security concerns
> > directly, you have some things to talk about.
> >
> > Firstly, the provision of a management portal to a network device
> > provides a doorway through which an attack on the device may be
> > launched. Since you are recommending that the protocol under
> > development be manageable through the management protocol, you are
> > requiring that the protocol be vulnerable to a new source of
> > attacks. Therefore, you must talk about securing the protocol
> > against these attacks. This might be as simple as saying that only
> > management protocols with adequate (for some definition of
> > adequate) security apparatus be used.
> >
> > I think it is also of note that a standard description of the
> > manageable knobs and whistles on a protocol makes it easier for an
> > attacker to understand what they may try to control and how to
> > tweak it.
> >
> > On the other hand, it would be well worth pointing out that a
> > well-designed protocol is usually more stable and secure. And that
> > a protocol that can be managed and inspected offers the operator
> > a better chance of spotting and quarantining any attacks.
> > Conversely making a protocol inspectable, is a risk if the wrong
> > person inspects it!
> >
> > If security events cause logs and or notifications/alerts, can
> > a concerted attack be mounted by causing an excess of these
> > events? In other words, to the security management mechanisms
> > constitute the security vulnerability?
> >
> > Lastly, the management of security aspects is important, and you
> > can just reference back to section 4.7.
> >
> > ===
> >
> > 9.  Informative References
> >
> > I (of course) would favor an informational reference to 
> draft-ietf-pce-
> > manageability-requirements-06.txt
> >
> > ===
> >
> >    [RFC2821]                       Klensin, J., "Simple 
> Mail Transfer
> >                                    Protocol", RFC 2821, April
2001.
> >
> > I think this has been obsoleted.
> >
> > ===
> >
> > Appendix A.  Operations and Management Review Checklist
> >
> > Maybe a forward reference to this appendix from sections 1 and 5?
> >
> > ===
> >
> > A.3.  Documentation
> >
> >    Does the proposed protocol have a significant 
> operational impact on
> >    the Internet.  If it does, and the document under review
targets
> >    standards track, is their enough proof of implementation and/or
> >    operational experience to grant Proposed Standard status?
> >
> > Whoah!
> >
> > You are going to use this I-D to try to block standards track I-Ds
> > from becoming RFCs? You are going to get into such a fight!!!
> >
> > IMHO this sentence is a complete show-stopper in your I-D.
> >
> > (Oh, and s/their/there/)
> >
> > ===
> >
> > Appendix B.  Change Log
> >
> > Suggest you flag this for removal upon publication as an RFC.
> >
> > ===
> >
> > > Sent: Sunday, January 25, 2009 6:40 PM
> > > To: opsawg@ietf.org
> > > Subject: [OPSAWG] (final) WGLC on
> > > draft-ietf-opsawg-operations-and-management
> > >
> > > This is a (hopefully final) WGLC for
> > > draft-ietf-opsawg-operations-and-management
> > > there was not enough respose to the last one back in October
> > > please let the list know what you think of the draft
> >
> > _______________________________________________
> > OPSAWG mailing list
> > OPSAWG@ietf.org
> > https://www.ietf.org/mailman/listinfo/opsawg
> 
> _______________________________________________
> OPSAWG mailing list
> OPSAWG@ietf.org
> https://www.ietf.org/mailman/listinfo/opsawg
>