[secdir] Secdir early review of draft-ietf-i2nsf-registration-interface-dm-17

Scott Kelly via Datatracker <noreply@ietf.org> Sun, 05 June 2022 14:16 UTC

Return-Path: <noreply@ietf.org>
X-Original-To: secdir@ietf.org
Delivered-To: secdir@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 2A5D8C14792F; Sun, 5 Jun 2022 07:16:15 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: Scott Kelly via Datatracker <noreply@ietf.org>
To: secdir@ietf.org
Cc: draft-ietf-i2nsf-registration-interface-dm.all@ietf.org, i2nsf@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 8.3.1
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <165443857516.47535.10227677229591675705@ietfa.amsl.com>
Reply-To: Scott Kelly <scott@hyperthought.com>
Date: Sun, 05 Jun 2022 07:16:15 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/8kAjU1qRZfJiZfS3KIpeMat5dPQ>
Subject: [secdir] Secdir early review of draft-ietf-i2nsf-registration-interface-dm-17
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.39
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 05 Jun 2022 14:16:15 -0000

Reviewer: Scott Kelly
Review result: Ready

>From the abstract,
   This document defines an information model and a YANG data model for
   Registration Interface between Security Controller and Developer's
   Management System (DMS) in the Interface to Network Security
   Functions (I2NSF) framework to register Network Security Functions
   (NSF) of the DMS with the Security Controller.

The document contains a well-written security considerations section that
describes potential threats and mitigations. I have no experience with YANG,
but from a security point of view, I see no issues with this document.