Mohit, thanks for your review. Rafa, thanks for your responses. I entered a No 
Objection ballot.

Alissa


> On Oct 6, 2020, at 7:57 AM, Mohit Sethi M 
> <mohit.m.sethi=40ericsson....@dmarc.ietf.org> wrote:
> 
> Hi Rafa,
> 
> Thanks for addressing my comments. Your changes and updates look good. 
> 
> --Mohit
> 
> On 9/22/20 9:41 AM, Rafa Marin-Lopez wrote:
>> Dear Mohit:
>> 
>> Thank you very much for your review. We really appreciate it. Please see our 
>> comments inline:
>> 
>>> El 31 ago 2020, a las 13:28, Mohit Sethi via Datatracker <nore...@ietf.org 
>>> <mailto:nore...@ietf.org>> escribió:
>>> 
>>> Reviewer: Mohit Sethi
>>> Review result: On the Right Track
>>> 
>>> I am the assigned Gen-ART reviewer for this draft. The General Area
>>> Review Team (Gen-ART) reviews all IETF documents being processed
>>> by the IESG for the IETF Chair.  Please treat these comments just
>>> like any other last call comments.
>>> 
>>> For more information, please see the FAQ at
>>> 
>>> <https://trac.ietf.org/trac/gen/wiki/GenArtfaq 
>>> <https://trac.ietf.org/trac/gen/wiki/GenArtfaq>>.
>>> 
>>> Document: draft-ietf-i2nsf-sdn-ipsec-flow-protection-08
>>> Reviewer: Mohit Sethi
>>> Review Date: 2020-08-31
>>> IETF LC End Date: 2020-09-04
>>> IESG Telechat date: Not scheduled for a telechat
>>> 
>>> Summary: This document describes how IPsec SAs can be setup from a 
>>> centralized
>>> I2NSF controller. The document is "On the Right Track".
>>> 
>>> Major issues:
>>> - The document should highlight in the abstract and elsewhere that it does 
>>> not
>>> define a protocol between the I2NSF controller and the NSF. It only 
>>> specifies
>>> the YANG model. Several appendices refer to notification messages. Where are
>>> they defined/specified?
>> 
>> [Authors] Regarding the abstract, we have applied your suggestions. We can 
>> also include a few words to highlight the aspect you mention: we do not 
>> define any new protocol but a YANG model.
>> 
>>> This document describes how to provide IPsec-based flow protection 
>>> (integrity
>>> and confidentiality) by means of an Interface to Network Security Function
>>> (I2NSF) controller.  It considers two main well-known scenarios in IPsec: 
>>> (i)
>>> gateway-to-gateway and (ii) host-to-host.  The service described in this
>>> document allows the configuration and monitoring of IPsec Security 
>>> Associations
>>> (SAs) from a I2NSF Controller to one or several flow-based Network Security
>>> Functions (NSFs) that rely on IPsec to protect data traffic.
>>> 
>>> The document focuses on the I2NSF NSF-facing interface by providing YANG 
>>> data
>>> models for configuring the IPsec databases (SPD, SAD, PAD) and IKEv2. 
>>> Therefore, it does not not define any new protocol. This
>>> allows IPsec SA establishment with minimal intervention by the network
>>> administrator.
>> 
>> 
>> 
>> With respect to notifications, they are defined in NETCONF itself but we had 
>> to define through the YANG model the information (notification data) that 
>> will be sent:
>> 
>> For example:
>> 
>>  notifications:
>>      +---n sadb-acquire
>>      |  +--ro ipsec-policy-name          string
>>      |  +--ro traffic-selector
>>      |     +--ro local-subnet            inet:ip-prefix
>>      |     +--ro remote-subnet           inet:ip-prefix
>>      |     +--ro inner-protocol?         ipsec-inner-protocol
>>      |     +--ro local-ports* [start end]
>>      |     |  +--ro start                inet:port-number
>>      |     |  +--ro end                  inet:port-number
>>      |     +--ro remote-ports* [start end]
>>      |        +--ro start                inet:port-number
>>      |        +--ro end                  inet:port-number
>>      +---n sadb-expire
>>      |  +--ro ipsec-sa-name           string
>>      |  +--ro soft-lifetime-expire?   boolean
>>      |  +--ro lifetime-current
>>      |     +--ro time?                uint32
>>      |     +--ro bytes?               uint32
>>      |     +--ro packets?             uint32
>>      |     +--ro idle?                uint32
>>      +---n sadb-seq-overflow
>>      |  +--ro ipsec-sa-name           string
>>      +---n sadb-bad-spi
>>         +--ro spi                     uint32
>> 
>> Therefore We define YANG notifications for the ikeless case making use of 
>> the notification message defined by NETCONF.
>> 
>>> 
>>> - For the IKE case, a lot would depend on the cryptographic suites 
>>> implemented
>>> in the NSF. For example, what if the I2NSF issues certificates for curves 
>>> not
>>> implemented. The document should maybe mention that the I2NSF is aware of 
>>> the
>>> NSF and its IKEv2 implementation/version details based on which it issues 
>>> the
>>> credentials. This relates to the text: "and applying other IKEv2 
>>> configuration
>>> parameters (e.g.  cryptographic algorithms for establishing an IKEv2 SA)". 
>>> You
>>> can't configure what is not implemented?
>> 
>> We think this is discussed in Section 5.4 NSF registration and discovery. We 
>> acknowledged that I2NSF must discover NSF features. However this is a 
>> previous step to what we define in this I-D. Once the NSF is operative and 
>> I2NSF controller has knowledge of the NSF and their features, the I2NSF 
>> controller can configure properly.
>> 
>> Should we extend the section 5.4 somehow? Any suggestion?
>> 
>> 
>>> 
>>> - Does the specification allow NSF's to derive many CHILD SAs?
>> 
>> If you are referring to IKE case, the IKE implementation in the NSF may 
>> derive several child SAs based on a particular policy. However, under I2NSF 
>> controller standpoint.
>> 
>> In the IKE-less case, the I2NSF controller can apply multiple IPsec SAs in 
>> the NSF.
>> 
>> Beyond these comments all the minor issues below has been already fixed in 
>> the v09 we are preparing. 
>> 
>> Best regards and thank you so much again!
>> 
>> 
>>> 
>>> Minor issues:
>>> - The document has several grammatical errors. I have fixed many of them in 
>>> my
>>> review below but surely not all. I hope that chairs/ADs could do another 
>>> pass
>>> before sending this to the RFC editor.
>>> 
>>> Nits/editorial comments:
>>> - The document uses terms such as NSF ships/implements IKEv2. Use consistent
>>> terminology.
>>> 
>>> - Abstract: There were too many issues with the abstract to individually 
>>> point
>>> out. Here is an edited version for you to consider:
>>> 
>>> This document describes how to provide IPsec-based flow protection 
>>> (integrity
>>> and confidentiality) by means of an Interface to Network Security Function
>>> (I2NSF) controller.  It considers two main well-known scenarios in IPsec: 
>>> (i)
>>> gateway-to-gateway and (ii) host-to-host.  The service described in this
>>> document allows the configuration and monitoring of IPsec Security 
>>> Associations
>>> (SAs) from a I2NSF Controller to one or several flow-based Network Security
>>> Functions (NSFs) that rely on IPsec to protect data traffic.
>>> 
>>> The document focuses on the I2NSF NSF-facing interface by providing YANG 
>>> data
>>> models for configuring the IPsec databases (SPD, SAD, PAD) and IKEv2. This
>>> allows IPsec SA establishment with minimal intervention by the network
>>> administrator.
>>> 
>>> - The SDN controller manages and configures the distributed network 
>>> resources
>>> and provides an abstracted view of the network resources to the SDN
>>> applications. -> Incorrect usage of "the" in several places. Consider 
>>> changing
>>> to: "SDN controllers configure and manage distributed network resources and
>>> provide an abstracted view of the network resources to SDN applications"
>>> 
>>> - The SDN application can customize and automate the operations (including
>>> management) of the abstracted network resources in a programmable manner via
>>> this interface [RFC7149] [ITU-T.Y.3300] [ONF-SDN-Architecture] 
>>> [ONF-OpenFlow].
>>> -> Remove article from the beginning of the sentence "SDN applications can
>>> customize and automate the operations (including management) of the 
>>> abstracted
>>> network resources in a programmable manner via this interface [RFC7149]
>>> [ITU-T.Y.3300] [ONF-SDN-Architecture] [ONF-OpenFlow]."
>>> 
>>> - Several sentences are way too long. Here is an edited version of the 2nd
>>> paragraph that you could consider: Several network scenarios now demand a
>>> centralized way of managing different security aspects.  For example,
>>> Software-Defined WANs (SD-WANs). SD-WANs are an SDN extension providing a
>>> software abstraction to create secure network overlays over traditional WAN 
>>> and
>>> branch networks.  SD-WANs utilize IPsec [RFC4301] as an underlying security
>>> protocol. The goal of SD-WANs is to provide flexible and automated 
>>> deployment
>>> from a centralized point to enable on-demand network security services such 
>>> as
>>> IPsec Security Association (IPsec SA) management.
>>> 
>>> Additionally, Section 4.3.3 in [RFC8192] describes another example use case 
>>> for
>>> Cloud Data Center Scenario titled "Client-Specific Security Policy in Cloud
>>> VPNs". The use case in RFC 8192 states that "dynamic key management is 
>>> critical
>>> for securing the VPN and the distribution of policies".  These VPNs can be
>>> established using IPsec.  The management of IPsec SAs in data centers using 
>>> a
>>> centralized entity is a scenario where the current specification maybe
>>> applicable.
>>> 
>>> - This text is repeated twice: "In the IKE case, IKEv2 already provides a
>>> mechanism to detect whether ..."
>>> 
>>> - "view is built either requesting information to the NSFs under its 
>>> control,
>>> or because these NSFs inform the I2NSF Controller." -> "view is built 
>>> either by
>>> requesting information from the NSFs under its control, or by information
>>> pushed from the NSFs to the I2NSF Controller"
>>> 
>>> - "Combined algorithms has been removed" -> have been
>>> 
>>> - "admit the configurations of these values." -> "accept configuration of 
>>> these
>>> values"
>>> 
>>> - "Beside, IaaS services providing virtualization environments are 
>>> deployments
>>> solutions based on IPsec to provide" -> "Besides, IaaS services providing
>>> virtualization environments are deployments that often rely on IPsec to 
>>> provide"
>>> 
>>> - "Despite this procedure may increase the latency to complete the process, 
>>> no
>>> traffic is sent over the network until the IPsec SAs are completely 
>>> operative."
>>> -> "Even though this procedure may increase"
>>> 
>>> - "If some of the operations described above fails" -> "If some of the
>>> operations described above fail"
>>> 
>>> - "In such as reactive mode, upon reception of the sadb-acquire 
>>> notification,
>>> the I2NSF Controller installs the new IPsec SAs in NSF A and B (following" 
>>> -> ""
>>> 
>>> - "If this is not critic then it is an" -> this is not critical
>>> 
>>> 
>>> _______________________________________________
>>> I2nsf mailing list
>>> i2...@ietf.org <mailto:i2...@ietf.org>
>>> https://www.ietf.org/mailman/listinfo/i2nsf 
>>> <https://www.ietf.org/mailman/listinfo/i2nsf>
>> 
>> -------------------------------------------------------
>> Rafa Marin-Lopez, PhD
>> Dept. Information and Communications Engineering (DIIC)
>> Faculty of Computer Science-University of Murcia
>> 30100 Murcia - Spain
>> Telf: +34868888501 Fax: +34868884151 e-mail: r...@um.es <mailto:r...@um.es>
>> -------------------------------------------------------
>> 
>> 
>> 
>> 
>> 
>> 
> _______________________________________________
> Gen-art mailing list
> Gen-art@ietf.org
> https://www.ietf.org/mailman/listinfo/gen-art

_______________________________________________
Gen-art mailing list
Gen-art@ietf.org
https://www.ietf.org/mailman/listinfo/gen-art

Reply via email to