Hi Dale and Tom,
Here is the revised draft of I2NSF Monitoring Interface:
https://datatracker.ietf.org/doc/html/draft-ietf-i2nsf-nsf-monitoring-data-model-13
Parick and I have addressed your comments from page 6 and page 39, respectively, in the attached revision letter.
Thanks for your help to improve our draft.
Best Regards,
Paul
Here is the revised draft of I2NSF Monitoring Interface:
https://datatracker.ietf.org/doc/html/draft-ietf-i2nsf-nsf-monitoring-data-model-13
Parick and I have addressed your comments from page 6 and page 39, respectively, in the attached revision letter.
Thanks for your help to improve our draft.
Best Regards,
Paul
On Mon, Nov 29, 2021 at 8:03 AM Dale Worley via Datatracker <noreply@xxxxxxxx> wrote:
Reviewer: Dale Worley
Review result: Ready with Issues
I am the assigned Gen-ART reviewer for this draft. The General Area
Review Team (Gen-ART) reviews all IETF documents being processed
by the IESG for the IETF Chair. Please treat these comments just
like any other last call comments.
For more information, please see the FAQ at
<https://trac.ietf.org/trac/gen/wiki/GenArtfaq>.
Document: draft-ietf-i2nsf-nsf-monitoring-data-model-12
Reviewer: Dale R. Worley
Review Date: 2021-11-28
IETF LC End Date: 2021-12-01
IESG Telechat date: not known
Summary:
This draft is on the right track but has open issues, described in
the review. It is clear that all of these issues can be fixed
appropriately, but they need to be fixed before publication.
Major issues:
This document presents a data model for data being passed between
various I2NSF entities. It appears that the author has a thorough
understanding of the I2NSF architecture and so has made various
references to it in the document. But since the data model definition
does not depend on the overall architecture, the document should be
revised to either (1) remove unnecessary references to the overall
architecture, (2) segregate them in ways that show they are not needed
to understand the data model, or (3) carefully referenced back to the
documents that define them.
There are also a few points where there seems to be technical issues
regarding the definitions of specific data items.
Details:
1. Introduction
Why do we have both "administrative entities" and "Security
Controller" here, and "NSF data collector" in section 3? Naively, I
would expect that in regard to the definition of the data model
presented by the "server side", all "client side" processes would be
considered an amorphous group covered by one generic term.
2. Terminology
This document uses the terminology described in [RFC8329].
Given that RFC 8329 doesn't define the terminology, it would be better
to expand on this to "This document uses the terminology described in
[RFC8329], much of which is defined in the I2NSF terminology document
[I2NSF-TERMS]." Indeed, since I2NSF-TERMS is
draft-ietf-i2nsf-terminology-05, presumably part of the same effort as
this document, why is RFC 8329 being mentioned?
--
There seems to be trouble with terms used in this document. Some of
them are mentioned in section 2.2 of RFC 8329, which simply refers to
I2NSF-TERMS. Others (e.g. "I2NSF Record") seem like they should be
listed in RFC 8329, but aren't, and seem to be entirely undefined.
Some of those terms appear in text that may as well be omitted from
this document. Ideally, the specialized vocabulary in this document
should be listed in this section and proper definitions or references
provided for them.
3. Use Cases for NSF Monitoring Data
* The security administrator with I2NSF User can configure a policy
"I2NSF User" is not listed in RFC 8329. Also, the placement of "with
I2NSF User" suggests that that phrase is some aspect of "security
administrator", and you might want to say "The I2NSF User that is the
security administrator ...". OTOH, if "with I2NSF User" is some
aspect of "can configure", it should probably be placed after "can
configure". (Is an I2NSF User a type of "user", as that word is
normally used?)
4. Classification of NSF Monitoring Data
This enables security administrators to assess the state of
the networks and in a timely fashion.
Likely should delete "and".
In essence, these types of monitoring data can be leveraged to
Probably can be simplified to "This monitoring data ...".
As with I2NSF components, every generic system entity can include a
set of capabilities that creates information about some context with
monitoring data (i.e., monitoring information), composition,
configuration, state or behavior of that system entity.
I am sure this could be clarified if it was simplified. I think the
meaning is "Every system entity creates information about some context
with defined I2NSF monitoring data, and so every entity can be an
I2NSF component."
This
information is intended to be provided to other consumers of
information and in the scope of this document, which deals with NSF
monitoring data in an automated fashion.
I think this means "This information is can be consumed by other I2NSF
components."
4.1. Retention and Emission
I2NSF Event: I2NSF Event is defined as an important occurrence over
time,
This should be "an important occurrence at a particular time,". "over
time" means that there is an extended period of time over which the
event occurs, but I'm sure that I2NSF Events specify only a single
instant for "when it happened".
Records can be
continuously processed by a system entity as an I2NSF Producer and
Up until this point, the description of "record" could apply to any
database system. But I suspect that the intended semantics are that
Records are generated at particular instants (and are unchanging
afterward), and thus a set of records has an ordering in time based on
when they are generated. This is the fundamental characteristic of a
"log file". In particular, a database of users does not have this
property but a database of user activities does. If Record is
intended to be constrained to this situation, that should be stated
explicitly.
I2NSF Counter: [...] When an NSF data collector asks for the value
of a counter to it, a system entity emits
Note this sentence is incomplete in the draft.
It might be valuable to note that an I2NSF Counter can be an integer
approximation of a value that is actually continuous. (All of the
examples that are given are values that are intrinsically integers.)
Perhaps add as the 3rd sentence "Other examples are integer
approximations to continuous values, such as a processor temperature
measured in tenths of a degree or the percentage of a disk that is
used."
Indeed, the first sentence of this paragraph says "continuous value
changes", despite that all of the examples are integer values that
cannot change continuously. Perhaps a better phrasing is "a specific
representation of an information element whose value changes very
frequently."
The retention of I2NSF monitoring information listed in Section 9 may
It seems like "in Section 9" could/should be omitted.
4.2. Notifications, Events, and Records
In consequence, an I2NSF Event is specified to
trigger an I2NSF Policy Rule. Such an I2NSF Event is defined as any
important occurrence over time in the system being managed, and/or in
the environment of the system being managed,
This text provides two definitions of "I2NSF Event" which aren't quite
the same. One is "anything that triggers an I2NSF Policy Rule", a
purely technical face. The other is "any important occurrence over
time", which is a human fact. The two definitions coincide only if
the policy rules exactly cover everything that is "important". This
needs to be tracked back to the source definition of "I2NSF Event" and
these sentences revised to match it.
which aligns well with
the generic definition of Event from [RFC3877].
Strictly, this clause says that "an I2NSF Event" "aligns well with the
generic definition of Event", but I think you mean that the *concept*
of an I2NSF Event aligns etc.
4.3. Unsolicited Poll and Solicited Push
Ideally, an I2NSF User is accessing every relevant
information about the I2NSF Component and is emitting I2NSF Events to
an NSF data collector (e.g., Security Controller) in a timely manner.
OK, what *is* the model of operations? In this sentence, it seems
that an "I2NSF User" is a process that accesses (by some method)
information about (in?) an I2NSF Component, and then emits (via I2NSF
Events) that data to an NSF data collector. But none of that is laid
out in the preceding sections. Indeed "I2NSF User" is not defined,
though here it doesn't sound like the usual definition of "user".
The actual mechanism
implemented by an I2NSF Component is out of the scope of this
document.
In this sentence, it sounds like the Component is the thing that sends
the data, whereas just above, it is the User.
In some
cases, the collection of information has to be conducted via a login
mechanism provided by a system entity.
What is the use of the terms solicited, unsolicited, poll, and push
here? Usually, the data source is considered a "server", and the
consumer is a "client". If the client makes a request to the server,
that is called "solicited" "pulling", and if it happens periodically,
it is called "polling". Whereas if the server initiates an
interaction to send data, that is called "unsolicited" "pushing".
Terminology in this draft doesn't seem to use those conventions, but
it doesn't tell what conventions it does use.
5. Basic Information Model for Monitoring Data
* vendor-name: The name of the NSF vendor.
Generally, the minimum information needed to identify how to interact
with a device is (1) vendor name, (2) device model name/number, (3)
software version identifier. Vendor name alone isn't particularly
useful.
6. Extended Information Model for Monitoring Data
This section covers the additional information associated with the
system messages.
What is "system messages"? The term has not been defined or mentioned
previously. Is it a special class of "messages"? Indeed, the term
seems to not be used elsewhere.
The extended information model is only for the
structured data such as events, record, and counters. Any
unstructured data is specified with the basic information model only.
There has been no previous discussion of "structured"
vs. "unstructured" data.
--
The final sentence of this section suggests that the dampening type
can be set by the user of the monitoring system. But all occurrences
of dampening-type in the below descriptions say either
"dampening-type: on-repetition" or "dampening-type: none", which
implies that for each type of alarm, only a particular value of
dampening-type is allowed.
Also "dampening-type: none" is invalid (as it is undefined in the
model in section 9) and "dampening-type: no-dampening" is probably
intended.
6.1.1. Memory Alarm
* severity: The severity of the alarm such as critical, high,
medium, and low.
"such as" implies that there may be other values, whereas section 5
states that there are exactly 4 severities and section 9 agrees. You
need to decide what the rule is and align all descriptions of
"security" data to that rule.
6.2.2. Configuration Change
Should there be components of the event that describe what change was
made to the configuration? The examples for "message" only
distinguish creating a new configuration vs. modifying an existing
configuration, but that information seems to me to be inadequate for
any significant security monitoring.
6.2.3. Session Table Event
The following information should be included in a Session
Table Event:
Is "session table event" a known term of art?
6.2.4. Traffic Flows
* arrival-rate: Arrival rate of packets of the traffic flow.
Most data for "packets per second" have a twin datum for "bytes per
second". Should there be an "arrival-speed" datum for traffic flows?
6.3.1. DDoS Detection
* attack-type: Any one of SYN flood, ACK flood, SYN-ACK flood, FIN/
RST flood, TCP Connection flood, UDP flood, ICMP flood, HTTPS
flood, HTTP flood, DNS query flood, DNS reply flood, SIP flood,
SSL flood, and NTP amplification flood.
The module definition gives a fixed set of attack-types, but given
that there are 14 described types, it seems likely that additional
types will be defined. Some extension mechanism needs to be used,
either a catch-all extension type or recogition that users will define
additional types.
* end-time: The time stamp indicating when the attack ended. If the
attack is still undergoing when sending out the alarm, this field
can be empty.
The Yang definition seems to make this field mandatory and provide no
null value. Perhaps making it optional in the model is the best way
of modeling the desired semantics.
6.3.2. Virus Event
It's not clear whether this event is for when a virus is found within
a packet flow or for when it is found within a host system. Are there
two different types of virus events for these? Or does each type use
a subset of the fields of one common event schema?
* virus: Type of the virus. e.g., trojan, worm, macro virus type.
It seems like this datum should be named "virus-type". Also, it seems
unlikely that virus types form a definitive taxonomy, so this field
should be considered less important than "virus-name" (which is likely
to be a key into a database of known viruses).
6.3.3. Intrusion Event
* event-name: The name of the event. e.g., detection-intrusion.
Why is there not a single, definitive event-name value for intrusion
events? Or was "i.e." meant rather than "e.g."?
* raw-info: The information describing the flow triggering the
event.
Given there are 8 defined fields that describe the flow, what
additional information can raw-info contain? Also, the semantics of
this raw-info is different from that in 6.3.2.
Indeed, there is some disalignment in the description of this field:
In section 6, raw-info is listed for:
6.3.2 Virus Event
6.3.3 Intrustion event
In section 8, raw-info is listed for:
i2nsf-nsf-detection-ddos
i2nsf-nsf-detection-virus
i2nsf-nsf-detection-intrusion
i2nsf-nsf-detection-web-attack
i2nsf-nsf-detection-voip-volte
In the model in section 9, raw-info is listed as a component of:
i2nsf-nsf-detection-ddos
grouping i2nsf-nsf-event-type-content, which is used in
i2nsf-nsf-detection-virus
i2nsf-nsf-detection-intrusion
i2nsf-nsf-detection-web-attack
i2nsf-nsf-detection-voip-volte
Only in section is raw-info described as "describing the flow
triggering the event".
6.3.4. Web Attack Event
* event-name: The name of event. e.g., detection-web-attack.
Why is there not a single, definitive event-name value for intrusion
events? Or was "i.e." meant rather than "e.g."?
* cookies: The HTTP Set-Cookie header field of the response.
I would think the cookies header in the request would be of more
interest than the cookies header in the response.
6.3.5. VoIP/VoLTE Event
This event type has no event-type field. Is that correct?
6.4.3. User Activity Log
6.4.1 and 6.4.3 are only weakly aligned with each other, despite that
they describe login and activities of two types of users (administrators
and ordinary users). Should these types be unified, or at least their
fields compared to better align them?
6.7.2. Policy Hit Counter
* hit-times: The hit times that the security policy matches the
specified traffic.
Given the Yang definition, I think the wording you want here is "The
number of times that the security policy ...".
7. NSF Monitoring Management in I2NSF
It's not clear to me that any of this is needed for the definition of
the data model. It seems more to be a higher-level description of the
entire I2NSF system, but the details of the data model aren't directly
relevant to the higher-level description (as long as the data model
provides the required fields) and that the data model isn't directly
affected by the higher-level I2NSF system.
9. YANG Data Model
The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL',
'SHALL NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED',
'NOT RECOMMENDED', 'MAY', and 'OPTIONAL' in this
document are to be interpreted as described in BCP 14
(RFC 2119) (RFC 8174) when, and only when, they appear
in all capitals, as shown here.
This module contains the full RFC 8174 text, but the only use of it is
the instance of MUST in nsf-name.
10. I2NSF Event Stream
The following example
It seems like this should start a new paragraph. The preceding text
is an overview of the event stream, but the following text is a single
example. The example is not what I would expect; it is not an event.
I think this text would better state the purpose:
The following example XML shows the capabilities of the event
streams generated by an NSF (e.g., "NETCONF" and "I2NSF-Monitoring"
event streams) for the subscription of an NSF data collector. The
XML examples in this document ...
--
<replayLogCreationTime>
2021-04-29T09:37:39+00:00
</replayLogCreationTime>
It's not clear to me "2021-04-29T09:37:39+00:00" is a value that is
applicable to all NSF event streams.
15. Contributors
Chaehong Chung Department of Electronic, Electrical and Computer
Engineering Sungkyunkwan University 2066 Seo-ro Jangan-gu Suwon,
Gyeonggi-do 16419 Republic of Korea EMail: darkhong@xxxxxxxx
[and others]
For clarity, between the name and the affiliation should be a comma or
dash.
[END]
_______________________________________________
I2nsf mailing list
I2nsf@xxxxxxxx
https://www.ietf.org/mailman/listinfo/i2nsf
Attachment:
Revision-Letter-for-draft-ietf-i2nsf-nsf-monitoring-data-model-13-2022-01-26.pdf
Description: Adobe PDF document
-- last-call mailing list last-call@xxxxxxxx https://www.ietf.org/mailman/listinfo/last-call