Re: [OPSAWG] Benjamin Kaduk's Abstain on draft-ietf-opsawg-ntf-12: (with COMMENT)

Haoyu Song <haoyu.song@futurewei.com> Fri, 03 December 2021 01:28 UTC

Return-Path: <haoyu.song@futurewei.com>
X-Original-To: opsawg@ietfa.amsl.com
Delivered-To: opsawg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F1E413A0D63; Thu, 2 Dec 2021 17:28:24 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.09
X-Spam-Level:
X-Spam-Status: No, score=-2.09 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H2=-0.001, T_SPF_PERMERROR=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=futurewei.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wjgut5ijIemV; Thu, 2 Dec 2021 17:28:19 -0800 (PST)
Received: from NAM10-DM6-obe.outbound.protection.outlook.com (mail-dm6nam10on2097.outbound.protection.outlook.com [40.107.93.97]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 26A383A0D61; Thu, 2 Dec 2021 17:28:19 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=eh+K9VJkJ0nY/S3YXP2B6+IPIqbwKmxB/LyrTeadGbiCTYBTERrFeJtQ3sHxP4dxdf65ImnZgz6qE6gVhsjoNx+7aQC/iGJ4Ic/XKL3JpnAvZ1kkQpjKioHKQjrcPK9+3k2XfDEQypiGVd9gakNP7oCDTw+4tayXfpqC0v9/60URpw4h55DMaWuHTSHhMEBVb/XLtZ+QuQ4jj+Fp63SUeP6NdVFW4FoyNPhdMSi/lwjqkmMNOmNG6lEPLBa/0sYO7xtl1LrTeC1gouTrobArnlQ4s3FdtjcxgBToqzfzw3Cw2Qz4iC/evlj0NykwPqfuld9z7svV6h1qJPDGWFKkvQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=ji7CGzf10WGYB/AhV9gHkCKXPOCO+x84+wtDWWxembk=; b=lMpq+TROlrgTRKWILDaFYam2rNUtfOb/KbMaRkLBd6RsFXjjLRr1HOzchCdPXxejDuOhEPEdCovgUOhQQnNMvDrQF0somWGUOIeQSoAJG07RVm/O8NRUY0h9LTMhnkHjWkpsveaFyrDCEHaj7jP0uaeZGxjdgcMFMx9lIZdTnlbo92XWXhrb5Ym+/UKkgB+Do1S4YkyxtVxzMyhp23KIj4XCAmeIcHr8vdlxRQvzgAWamzMiNZL85o/M7EFfT1sgb0n/AyVu8ekL0BBHLlTNoVRd2vZIMAmb7rSsAALEfIQXSHeda+3ZFmL279MYBERk2qFCs7BO5jSRp3kX5LiHuw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=futurewei.com; dmarc=pass action=none header.from=futurewei.com; dkim=pass header.d=futurewei.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Futurewei.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=ji7CGzf10WGYB/AhV9gHkCKXPOCO+x84+wtDWWxembk=; b=eqePJky1r8tvi20jopGH1IcBEM9vxI9zlCJTsFB9x5H0gd20diFyAZxlCr/hzIPKnzIy8BthzOuHiRZhyvk3SYBfdMbWLNJT5/CIvERpwJbyFiHx8w9xd714ap2GmpFGzNVv3s9BzPlxybXcS59AwB4f2x8gZO6Focv8Hv4mm9k=
Received: from BY3PR13MB4787.namprd13.prod.outlook.com (2603:10b6:a03:357::13) by BYAPR13MB4296.namprd13.prod.outlook.com (2603:10b6:a03:9d::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4755.8; Fri, 3 Dec 2021 01:28:09 +0000
Received: from BY3PR13MB4787.namprd13.prod.outlook.com ([fe80::618d:61cf:753e:be55]) by BY3PR13MB4787.namprd13.prod.outlook.com ([fe80::618d:61cf:753e:be55%5]) with mapi id 15.20.4778.004; Fri, 3 Dec 2021 01:28:09 +0000
From: Haoyu Song <haoyu.song@futurewei.com>
To: Benjamin Kaduk <kaduk@mit.edu>, The IESG <iesg@ietf.org>
CC: "draft-ietf-opsawg-ntf@ietf.org" <draft-ietf-opsawg-ntf@ietf.org>, "opsawg-chairs@ietf.org" <opsawg-chairs@ietf.org>, "opsawg@ietf.org" <opsawg@ietf.org>, "ludwig@clemm.org" <ludwig@clemm.org>
Thread-Topic: Benjamin Kaduk's Abstain on draft-ietf-opsawg-ntf-12: (with COMMENT)
Thread-Index: AQHX59f2JU3KEh1dgU2cuzVKXDM1h6wf5Ixg
Date: Fri, 03 Dec 2021 01:28:09 +0000
Message-ID: <BY3PR13MB4787D5EA5451523242BC4DEB9A6A9@BY3PR13MB4787.namprd13.prod.outlook.com>
References: <163848927236.16105.4220774638600851890@ietfa.amsl.com>
In-Reply-To: <163848927236.16105.4220774638600851890@ietfa.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=futurewei.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 04fc5c14-237e-4ed1-ea9c-08d9b5fc2a50
x-ms-traffictypediagnostic: BYAPR13MB4296:EE_
x-microsoft-antispam-prvs: <BYAPR13MB4296D912BE09DF3D66D3F2709A6A9@BYAPR13MB4296.namprd13.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:7219;
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BY3PR13MB4787.namprd13.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(346002)(136003)(376002)(366004)(396003)(39840400004)(54906003)(44832011)(53546011)(6506007)(110136005)(8676002)(5660300002)(38070700005)(38100700002)(52536014)(83380400001)(2906002)(66446008)(26005)(33656002)(64756008)(76116006)(45080400002)(122000001)(316002)(186003)(9686003)(66556008)(966005)(8936002)(508600001)(55016003)(66946007)(4326008)(7696005)(66476007)(86362001)(30864003)(71200400001); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: Futurewei.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BY3PR13MB4787.namprd13.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 04fc5c14-237e-4ed1-ea9c-08d9b5fc2a50
X-MS-Exchange-CrossTenant-originalarrivaltime: 03 Dec 2021 01:28:09.4249 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 0fee8ff2-a3b2-4018-9c75-3a1d5591fedc
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: ix5gxyo7SCUiIPmG4lQub8aXrr0MbiXU98GGheNRUOGGJQeX+Q4jn+bie/1dcW7BtCZ+2OCHzYBfn5cEWlbyRg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR13MB4296
Archived-At: <https://mailarchive.ietf.org/arch/msg/opsawg/t20UNVwMz2g54gGIWOHP5hLjx4A>
Subject: Re: [OPSAWG] Benjamin Kaduk's Abstain on draft-ietf-opsawg-ntf-12: (with COMMENT)
X-BeenThere: opsawg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: OPSA Working Group Mail List <opsawg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/opsawg>, <mailto:opsawg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/opsawg/>
List-Post: <mailto:opsawg@ietf.org>
List-Help: <mailto:opsawg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsawg>, <mailto:opsawg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 Dec 2021 01:28:25 -0000

Hi Benjamin,

Thank you very much for the review and suggestions. We'll update the document accordingly. Please see below for some inline response. Thanks!

Best regards,
Haoyu

-----Original Message-----
From: Benjamin Kaduk via Datatracker <noreply@ietf.org> 
Sent: Thursday, December 2, 2021 3:55 PM
To: The IESG <iesg@ietf.org>
Cc: draft-ietf-opsawg-ntf@ietf.org; opsawg-chairs@ietf.org; opsawg@ietf.org; ludwig@clemm.org; ludwig@clemm.org
Subject: Benjamin Kaduk's Abstain on draft-ietf-opsawg-ntf-12: (with COMMENT)

Benjamin Kaduk has entered the following ballot position for
draft-ietf-opsawg-ntf-12: Abstain

When responding, please keep the subject line intact and reply to all email addresses included in the To and CC lines. (Feel free to cut this introductory paragraph, however.)


Please refer to https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fblog%2Fhandling-iesg-ballot-positions%2F&amp;data=04%7C01%7Chaoyu.song%40futurewei.com%7Cc7879ca6fb9f4ce0e84608d9b5ef1794%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C637740860777850482%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=ZE%2FsHakG%2FKHLe%2BggRd20khc%2F09JIUwv6EQb9jwtkm%2Bw%3D&amp;reserved=0
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fdraft-ietf-opsawg-ntf%2F&amp;data=04%7C01%7Chaoyu.song%40futurewei.com%7Cc7879ca6fb9f4ce0e84608d9b5ef1794%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C637740860777850482%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=U12enw6njHNOFbWicKmSYIH8bzUC70jIQrlHKGMbdY8%3D&amp;reserved=0



----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

Thanks for making the applicability statement more prominent in the -12.

I think the document paints an exciting picture of a new mindset in which to frame discussion of network monitoring and management (even if it does stray too far into marketing language for my taste in places).
It doesn't do quite as well at convincing me that an entirely new technology suite is merited (as opposed to just extending existing protocols to align with the new mindset), but I am willing to admit the possibility that the new technology suite is the right approach.

That said, I have strong misgivings about the current state of the document, mostly relating to privacy considerations and the risk of pervasive monitoring, so I am balloting Abstain.

While we do clearly say to not analyze individual users, we also have guidance (e.g., in §2.1) that only says "no user packet content should be collected".  However, packet contents are not the only things that can be a threat to user privacy, and we've seen numerous instances where just metadata about user flows are sufficient to make strong conclusions about user behavior that impact user privacy.  But if we try to strengthen the requirement to be not collecting any data about user packets, the utility of the system decreases greatly, and I don't see a clear way to reconcile the impasse.

(There are also a few lingering references to "user flows", "user packets", "user traffic", etc. in the main body text, especially in §2.3.  I'm not convinced that all of the instanaces of these phrases are compatible with the applicability statement.)

Furthermore, the applicability statement seems to be a case of wishful thinking.  I do not see any proposals for technical measures to enforce that data is not collected from networks where endpoints represent users, and I also don't see any mechansisms to disincentivize such use in favor of other, more privacy-friendly, alternatives.  So even if we consider such usage of the network telemetry framework to be an abuse case rather than a use case, if we are going to honestly document the implications of the technology, I can't escape the conclusion that we need to consider these scenarios in our assessment of whether we are defining the right technology.

<HS> In this informational document, we only provide the high level guidelines. Given many related technologies and standards have been developed, we expect these technologies and standards can address the privacy issues. The detailed mechanism is out of the scope of this document.  

Though I am balloting Abstain, I will also some specific comments on the document that might help improve it, even if I may not be completely happy with the resulting document (for the reasons described above).

It's pretty surprising to see a document that mentions autonomic networking and aims to achieve self-managing networks make no reference at all to the IETF ANIMA WG or its outputs, a group that is specifically chartered to produce protocols and procedures for automated network management.  In particular, it's my understanding that ANMIA has had very little traction with network Intent thus far, and this document references IRTF documents in many places (both for Intent and other things).  Are we confident that these concepts are ready to move from the IRTF into the engineering world?

<HS> We'll add reference to the IETF ANIMA WG as an example for the effort of autonomic networking. 

Section 1

   Network visibility is the ability of management tools to see the
   state and behavior of a network, which is essential for successful

In the TLS WG we've sometimes seen participants use the term "visibility" to include the plaintext of encrypted data flows.  While I have no reason to believe that that's a universally held understanding of the term, I mention it only to ask that clarification be provided if the intent of the term here is to include such decryption capabilities.
If the intent is only to observe the normal visible wire image of the protocol, I don't see particular need for clarification.

<HS> Your latter understanding is right and it's from the network operator's perspective to understand what's going on in their networks. 

Section 2

   forward.  When a network's endpoints do not represent individual
   users (e.g. in industrial, datacenter, and infrastructure contexts),
   network operations can often benefit from large-scale data collection
   without breaching user privacy.

In the vein of my toplevel remarks, I don't think that just "a network's endpoints do not represent individual users" is sufficient to ensure that large-scale data collection does not breach user privacy.  It covers first-order effects, I think, but we've seen a lot of research indicating that second- and higher-order analyses can still extract information that reduces user privacy.

<HS> If network operators want to protect user privacy, they can achieve it with many means, and otherwise they can also easily violate it. We just claim a high level principle and don't provide detailed mechanisms and policies. The issue is out of scope of this document.  

Section 2.1

   To preserve the privacy of end-users, no user packet content should
   be collected.  Specifically, the data objects generated, exported,
   and collected by a network telemetry application should not include
   any packet payload from traffic associated with end-users systems.

Also in the vein of my toplevel remarks, while "do not include user traffic payload" is a minimum requirement, and I'm happy to see it stated clearly, it in and of itself is not sufficient to fully protect end-user privacy.

Section 2.2

      visibility into networks.  The ultimate goal is to achieve the
      security with no, or only minimal, human intervention.

It's easy to achieve security without human intervention, if you're willing to accept a high false positive rate and denial of legitimate traffic.  Should we say something about tempering the security goal with a need for not disrupting legitimate traffic flows?

<HS> we'll add "and without needing to disrupt legitimate traffic flows." for completeness. 

Section 2.3

      Conventional OAM only covers a narrow range of data (e.g., SNMP
      only handles data from the Management Information Base (MIB)).

This argument feels a bit weak given that anyone with an OID arc (that is, just about anyone) can add to the MIB.

<HS> We agree that everything is extensible if we decide to do so. Here we just state the past status.

Section 2.4

   Network telemetry has emerged as a mainstream technical term to refer

It's a little surprising to see network telemetry called a "mainstream"
term here, when up in §1 we said that it lacks an unambiguous definition.

<HS> It's used everywhere already in networking industry but people have different understanding on it. That's part of the reason we have this document. 

   *  Model-based: The telemetry data is modeled in advance which allows
      applications to configure and consume data with ease.
   [...]
   *  In-Network Customization: The data that is generated can be
      customized in network at run-time to cater to the specific need of
      applications.  This needs the support of a programmable data plane
      which allows probes with custom functions to be deployed at
      flexible locations.

I'm having a hard time seeing how data that's customized in-network at runtime would be compatible with being modeled in advance.  Maybe the disclaimer about "not expected to be held by every specific technique"
is intended to apply here, but it might be worth acknowledging the tradeoff.

<HS> Due to the diversity of the techniques, the disclaimer applies to most of the characteristics.

   *  In-band Data Collection: In addition to the passive and active
      data collection approaches, the new hybrid approach allows to
      directly collect data for any target flow on its entire forwarding
      path [I-D.song-opsawg-ifit-framework].

I'm pretty skeptical that the functionality that's claimed here (and in the referenced draft) can be achieved while complying with the existing requirements from current IETF RFCs.  I recognize that this is under the "an ideal [solution] may also have" heading, but it still feels a little premature to include.

<HS> Related techniques are already RFC (e.g., Alternate Marking) or in the RFC queue (e.g., IOAM).

Section 3.1

I'm having a really hard time seeing how figure 2 is internally consistent if it lists "plain text" as the only option for data encoding of data modelled using YANG (e.g., in the forwarding plane column).

<HS> In the figure we only list some representative elements. If there are other good examples, we can also include them. 

Section 3.1.1

   network statistics and state data.  The management plane includes
   many protocols, including some that are considered "legacy", such as
   SNMP and syslog.  Regardless the protocol, management plane telemetry

It's not clear that we gain any real value from labeling SNMP and syslog as "legacy".  Perhaps we should just skip the examples and avoid debate on what is or isn't legacy (leaving each person to hold their own opinion on that question)?

<HS> Suggestion adopted.

Section 3.1.2

      Then in case of an unusually poor UE KPI or a service
      disconnection, it is non-trivial to delimit and pinpoint the issue
      in the responsible protocol layer (e.g., the Transport Layer or
      the Network Layer), the responsible protocol (e.g., ISIS or BGP at
      the Network Layer), and finally the responsible device(s) with

I don't really follow the example of IS-IS or BGP "at the Network Layer" -- in what sense do we use "network layer" here?

<HS> It is the conventional sense of network layer. 

Section 3.3

I don't really understand the logic behind the direction of arrowheads in Figure 4.  I'd be more inclined to just remove the figure than add more explanatory text, though, as the relationships don't seem terribly key to the core purpose of this document.

<HS> The arrow means "derived from" or "built with"

Section 5

   *  Authentication and signing of telemetry data to make data more
      trustworthy.

Signing is typically treated as a way to provide authentication; it might make more sense to discuss "authentication and integrity protection" in terms of the typical security properties we consider.

<HS> Suggestion adopted.

NITS

Section 1

   operations.  Based on the distinction of modules and function
   components, we can map the existing and emerging techniques and

It would be "distinction between" or "definition of", I think.

   protocols into the framework.  The framework can also simplify the
   designing, maintaining, and understanding a network telemetry system.

The "the" leading into "designing, maintaining, and understanding"
should be removed.

   The purpose of the framework and taxonomy is to set a common ground
   for the collection of related work and provide guidance for future
   technique and standard developments.  To the best of our knowledge,

s/technique/techniques/

Section 1.2

   AI:  Artificial Intelligence.  In network domain, AI refers to the
      machine-learning based technologies for automated network
      operation and other tasks.

"the network domain"

   SNMP:  Simple Network Management Protocol.  Version 1, 2, and 3 are
      specified in [RFC1157], [RFC3416], and [RFC3414], respectively.

RFC 3411 might be a better reference for SNMPv3, as it's the architecture doc (rather than the user-based security model doc).

Section 2

   It is conceivable that an autonomic network [RFC7575] is the logical
   next step for network evolution following Software Defined Network

I think "Software Defined Networking" would fit better in this situation.

   protocols are insufficient for these use cases.  The discussion
   underlines the need of new methods, techniques, and protocols, as
   well as the extensions of existing ones, which we assign under the

s/need of/need for/

Section 2.2

      Given increasingly sophisticated attack vector coupled with

"vectors" plural

      visibility into networks.  The ultimate goal is to achieve the
      security with no, or only minimal, human intervention.

s/the//

      visibility that is provided through network telemetry data.  Any
      violation must be notified immediately, potentially resulting in
      updates to how the policy or intent is applied in the network to

The subject of the verb "notified" is the target of the notification, not the thing that the notification is about.  So "reported" might fit better here.

      operators need to evaluate how they can deliver the services that
      can meet the SLA based on realtime network telemetry data,
      including data from network measurements.

s/deliver the services/deliver services/

Section 2.3

   *  Comprehensive data is needed from packet processing engines to
      traffic manager, from line cards to main control board, from user
      flows to control protocol packets, from device configurations to
      operations, and from physical layer to application layer.

It's possible to read this as a set of "from A to B" relations where A is sending data to B".  I think that's not the intent, and this is just intending to show a broad spread of scenarios across many different axes; if that's the case, I'd suggest "... needed, ranging from"

   *  The conventional passive measurement techniques can either consume
      excessive network resources and render excessive redundant data,

Something seems awry around "render excessive redundant data", to the extent that I can't extrct meaning and propose an alternative.

Section 2.4

      overall network automation needs.  Efforts are made to normalize
      the data representation and unify the protocols, so to simplify
      data analysis and provide integrated analysis across heterogeneous

"so as to"

Section 2.5

      network with a low data sampling rate.  Only when issues arise or
      critical trends emerge should telemetry data source be modified
      and telemetry data rates boosted as needed.

I think we need ""the telemetry data source".

Section 3.1.2

   *  An example of the control plane telemetry is the BGP monitoring
      protocol (BMP), it is currently used for monitoring the BGP routes

I'd end the sentence at this comma to avoid a comma splice.

Section 3.2

      responsible for configuring the desired data that might not be
      directly available form data sources.  The subscription data can

s/form/from/

Section 5

   *  Protocol transport used telemetry data and inherent security
      capabilities;

There seems to be a word or two missing here, maybe "used for" and "its inherent".

Section A.3.6

   Various data planes raises unique OAM requirements.  IETF has

s/raises/raise/

<HS> Thank you very much for catching the nits!