Hi!

Thanks for all of the work on draft versions -17 to -20.  To make thing easier 
to track, I'm starting a new thread on the -20 version of the document to 
comment on my AD review of -16 
(https://mailarchive.ietf.org/arch/msg/i2nsf/BJ4GUttBVZRvHGm3m2_bEycNQWI/) and 
the changes made to address the IESG review in September 2020 
(https://datatracker.ietf.org/doc/draft-ietf-i2nsf-capability-data-model/ballot/).
  Unless otherwise mentioned below, please consider any feedback as resolved:

** Section 1. We've polished this sentence a bit.  Recommend:

OLD
Note that this YANG data model constructs the structure of the
   NSF Monitoring Interface YANG data model
   [I-D.ietf-i2nsf-nsf-monitoring-data-model] and the NSF-Facing
   Interface YANG Data Model [I-D.ietf-i2nsf-nsf-facing-interface-dm].

NEW
Note that this YANG data model forms the basis of the NSF Monitoring Interface 
YANG data model [I-D.ietf-i2nsf-nsf-monitoring-data-model] and the NSF-Facing 
Interface YANG Data Model [I-D.ietf-i2nsf-nsf-facing-interface-dm].

** Section 8.  

   This YANG module specifies the capabilities for NSFs.  Some of the
   capabilities in this document MAY require highly sensitive private
   data to operate properly.  The usage of such capability MUST be
   reported to the users and permitted before using the private
   information related to the capability.  Using any of the capabilities
   that require private data MUST preserve the privacy by preventing any
   leakage or unauthorized disclosure of the private data.

I appreciate the inclusion of this new section in response to the original IESG 
telechat (per Ben Kaduk's discuss position).  The current text is right in 
spirit, but I see the use of all of this normative language as risky.  It will 
likely invite the need for further clarifying text which will be difficult (and 
unnecessary) to produce.  Consider the following alternative to the above.

NEW

This YANG module specifies the capabilities of NSFs.  These capabilities are 
consistent with the diverse set of network security function in common use in 
enterprise security operations.  The configuration of the capabilities may 
entail privacy sensitive information as explicitly outlines in Section 9.  The 
NSFs implementing these capabilities may inspect, alter or drop user traffic; 
and be capable of attributing user traffic to individual users.

Due to the sensitivity of these capabilities, notice must be provided to and 
consent must be received from the users of the network.  Additionally, the 
collected data and associated infrastructure must be secured to prevent the 
leakage or unauthorized disclosure of this private data.

** References

-- RFC8805 should be a normative reference

-- idnits says: Obsolete normative reference: RFC 3501 (Obsoleted by RFC 9051)

-- (needs to be done before the IESG review) Can the shepherd write-up please 
be updated to reflect that there is a downref with RFC8805

Regards,
Roman

_______________________________________________
I2nsf mailing list
I2nsf@ietf.org
https://www.ietf.org/mailman/listinfo/i2nsf

Reply via email to