Re: [Last-Call] [IPsec] New Version Notification for draft-ietf-i2nsf-sdn-ipsec-flow-protection-09.txt

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 





On 10/16/2020 4:19 AM, Rafa Marin-Lopez wrote:
>   If there is no objection, we can include this feature adding a
> description about the motivation behind this and prepare v10 very quickly.

Thank you for this. I think it would be a really helpful change -- and I support it.

Lou

(as contributor with multiple hats)

On 10/16/2020 4:19 AM, Rafa Marin-Lopez wrote:
Dear all:

Recently we submitted v09. We would like to summarize the status:

- We have applied all the comments we received so far (except one, see below). In particular, we would like to highlight that we have renamed the modules as a consequence of some comments. In particular:

ietf-ipsec-common —> ietf-i2nsf-ikec
ietf-ipsec-ike —> ietf-i2nsf-ike
ietf-ipsec-ikeless -> ietf-i2nsf-ikeless

- Moreover we made a minor change. We realized that encryption algorithms should also have a key-length. For example, it is not enough to say the algorithm is AES-CBC without specifying the key-length (e.g. 128 bits).

- Regarding the pending comment, as you may have followed in the mailing list, it has been proposed to add a feature *ikeless-notification* and the corresponding *if ikeless-notification* in each notification to indicate whether notifications are implemented by the NSF. The goal here is to ensure broader applicability of the ikeless module. If there is no objection, we can include this feature adding a description about the motivation behind this and prepare v10 very quickly.

"To ensure broader applicability of this module, the notifications are marked as a feature. For the implementation of ikeless case, the NSF is expected to implement this feature.";

The result would be (in tree format):

notifications:
     +---n sadb-acquire *{ikeless-notification}*?
     |  +--ro ipsec-policy-name    string
     |  +--ro traffic-selector
     |     +--ro local-subnet      inet:ip-prefix
     |     +--ro remote-subnet     inet:ip-prefix
     |     +--ro inner-protocol?   ipsec-inner-protocol
     |     +--ro local-ports* [start end]
     |     |  +--ro start    inet:port-number
     |     |  +--ro end      inet:port-number
     |     +--ro remote-ports* [start end]
     |        +--ro start    inet:port-number
     |        +--ro end      inet:port-number
     +---n sadb-expire *{ikeless-notification}*?
     |  +--ro ipsec-sa-name           string
     |  +--ro soft-lifetime-expire?   boolean
     |  +--ro lifetime-current
     |     +--ro time?      uint32
     |     +--ro bytes?     uint32
     |     +--ro packets?   uint32
     |     +--ro idle?      uint32
     +---n sadb-seq-overflow *{ikeless-notification}*?
     |  +--ro ipsec-sa-name    string
     +---n sadb-bad-spi *{ikeless-notification}*?
        +--ro spi    uint32


Best Regards.

El 12 oct 2020, a las 20:15, internet-drafts@xxxxxxxx <mailto:internet-drafts@xxxxxxxx> escribió:


A new version of I-D, draft-ietf-i2nsf-sdn-ipsec-flow-protection-09.txt
has been successfully submitted by Rafa Marin-Lopez and posted to the
IETF repository.

Name:draft-ietf-i2nsf-sdn-ipsec-flow-protection
Revision:09
Title:Software-Defined Networking (SDN)-based IPsec Flow Protection
Document date:2020-10-12
Group:i2nsf
Pages:92
URL: https://www.ietf.org/archive/id/draft-ietf-i2nsf-sdn-ipsec-flow-protection-09.txt Status: https://datatracker.ietf.org/doc/draft-ietf-i2nsf-sdn-ipsec-flow-protection/ Htmlized: https://datatracker.ietf.org/doc/html/draft-ietf-i2nsf-sdn-ipsec-flow-protection Htmlized: https://tools.ietf.org/html/draft-ietf-i2nsf-sdn-ipsec-flow-protection-09 Diff: https://www.ietf.org/rfcdiff?url2=draft-ietf-i2nsf-sdn-ipsec-flow-protection-09

Abstract:
  This document describes how to provide IPsec-based flow protection
  (integrity and confidentiality) by means of an Interface to Network
  Security Function (I2NSF) controller.  It considers two main well-
  known scenarios in IPsec: (i) gateway-to-gateway and (ii) host-to-
  host.  The service described in this document allows the
  configuration and monitoring of IPsec Security Associations (SAs)
  from a I2NSF Controller to one or several flow-based Network Security
  Functions (NSFs) that rely on IPsec to protect data traffic.

  The document focuses on the I2NSF NSF-facing interface by providing
  YANG data models for configuring the IPsec databases (SPD, SAD, PAD)
  and IKEv2.  This allows IPsec SA establishment with minimal
  intervention by the network administrator.  It does not define any
  new protocol.




Please note that it may take a couple of minutes from the time of submission until the htmlized version and diff are available at tools.ietf.org <http://tools.ietf.org>.

The IETF Secretariat



-------------------------------------------------------
Rafa Marin-Lopez, PhD
Dept. Information and Communications Engineering (DIIC)
Faculty of Computer Science-University of Murcia
30100 Murcia - Spain
Telf: +34868888501 Fax: +34868884151 e-mail: rafa@xxxxx <mailto:rafa@xxxxx>
-------------------------------------------------------





--
last-call mailing list
last-call@xxxxxxxx
https://www.ietf.org/mailman/listinfo/last-call




[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux