Re: [secdir] SECDIR Review of draft-ietf-teas-actn-framework-13
Leeyoung <leeyoung@huawei.com> Tue, 01 May 2018 18:37 UTC
Return-Path: <leeyoung@huawei.com>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CE27E12E9D9; Tue, 1 May 2018 11:37:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.198
X-Spam-Level:
X-Spam-Status: No, score=-3.198 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HK_RANDOM_ENVFROM=0.001, HK_RANDOM_FROM=1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BacXraMRfzze; Tue, 1 May 2018 11:37:42 -0700 (PDT)
Received: from huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6DF92126B6D; Tue, 1 May 2018 11:37:42 -0700 (PDT)
Received: from lhreml701-cah.china.huawei.com (unknown [172.18.7.108]) by Forcepoint Email with ESMTP id 2906ABE956D16; Tue, 1 May 2018 19:37:38 +0100 (IST)
Received: from SJCEML703-CHM.china.huawei.com (10.208.112.39) by lhreml701-cah.china.huawei.com (10.201.108.42) with Microsoft SMTP Server (TLS) id 14.3.382.0; Tue, 1 May 2018 19:37:39 +0100
Received: from SJCEML521-MBX.china.huawei.com ([169.254.1.34]) by SJCEML703-CHM.china.huawei.com ([169.254.5.239]) with mapi id 14.03.0382.000; Tue, 1 May 2018 11:37:35 -0700
From: Leeyoung <leeyoung@huawei.com>
To: Catherine Meadows <catherine.meadows@nrl.navy.mil>, "secdir@ietf.org" <secdir@ietf.org>, "iesg@ietf.org" <iesg@ietf.org>, "draft-ietf-teas-actn-framework.all@ietf.org" <draft-ietf-teas-actn-framework.all@ietf.org>
Thread-Topic: SECDIR Review of draft-ietf-teas-actn-framework-13
Thread-Index: AQHT4Wy2Hsu3pCw+EEKp0Sy+v2VlCqQbMv9w
Date: Tue, 01 May 2018 18:37:34 +0000
Message-ID: <7AEB3D6833318045B4AE71C2C87E8E173CFE4EA5@sjceml521-mbx.china.huawei.com>
References: <8B342EAB-8678-4FC4-B793-3BEA944AC523@nrl.navy.mil>
In-Reply-To: <8B342EAB-8678-4FC4-B793-3BEA944AC523@nrl.navy.mil>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.192.11.77]
Content-Type: multipart/alternative; boundary="_000_7AEB3D6833318045B4AE71C2C87E8E173CFE4EA5sjceml521mbxchi_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/aElrzFZabaQxW-uU7fZLUe7qSMM>
Subject: Re: [secdir] SECDIR Review of draft-ietf-teas-actn-framework-13
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 01 May 2018 18:37:46 -0000
Hi Cathy, Thanks for providing your review of this draft. We agree with all your comments. The Nits will be fixed in the revision. Best regards, Young & Daniele From: Catherine Meadows [mailto:catherine.meadows@nrl.navy.mil] Sent: Tuesday, May 01, 2018 11:52 AM To: secdir@ietf.org; iesg@ietf.org; draft-ietf-teas-actn-framework.all@ietf.org Cc: Catherine Meadows <catherine.meadows@nrl.navy.mil> Subject: SECDIR Review of draft-ietf-teas-actn-framework-13 I have reviewed this document as part of the security directorate's ongoing effort to review all IETF documents being processed by the IESG. These comments were written primarily for the benefit of the security area directors. Document editors and WG chairs should treat these comments just like any other last call comments. The summary of the review is Ready with Nits. This draft describes a framework for abstraction and control of traffic engineered networks (ACTN). According to the abstract, a traffic engineered network is a network that uses any connection-oriented technology under the control of a distributed or centralized control plane to support dynamic provisioning of end-to-end connectivity. Abstraction in this context is a technique can be applied across a single or multiply domains to create a single virtualized network under the control of a network operator or owner. This is thus a very broad topic, and the ID is informational only. The most important part is probably the description of the ACTN base architecture. It describes three components: the Customer Network Controller (CNC) responsible for communicating the customer’s requirements to the network provider , the Multi-Domain Servicing Coordinator (MDSC), responsible for implementing ACTN functions, and the Provisioning Network Controller (PNC), responsible for configuration and topology management. It also describes as the interfaces between them. The document also gives a description of some more advanced ACTN architectures, a description of several topology abstraction methods, and an example of an advanced ACTN application: a multi-destination servers. The security considerations section, while it lists some general considerations that would hold for any kind of network, mainly concentrates on the two interfaces between the components: the CNC-MDSC (CMI) and the MDSC-PNC (MPI) interfaces. It gives a good overview of the types of security risks that might arise with respect to the two interfaces, and the means for mitigating them. For the rest, it defers security considerations to the specific applications, which I assume would be handled by other working groups. I believe that this is reasonable for an informational document that is providing a general framework. A nit: I couldn’t parse the last sentence of Section 9.3: Which MDSC the PNC exports topology information to, and the level of detail (full or abstracted) should also be authenticated and specific access restrictions and topology views, should be configurable and/or policy-based. I think it may be the commas are misplaced, and what you really want to say is this: Which MDSC the PNC exports topology information to, and the level of detail (full or abstracted), should also be authenticated, and specific access restrictions and topology views should be configurable and/or policy-based. Cathy Meadows Catherine Meadows Naval Research Laboratory Code 5543 4555 Overlook Ave., S.W. Washington DC, 20375 phone: 202-767-3490 fax: 202-404-7942 email: catherine.meadows@nrl.navy.mil<mailto:catherine.meadows@nrl.navy.mil>
- [secdir] SECDIR Review of draft-ietf-teas-actn-fr… Catherine Meadows
- Re: [secdir] SECDIR Review of draft-ietf-teas-act… Leeyoung