--- 1/draft-ietf-i2nsf-applicability-15.txt 2019-07-25 04:16:43.925149952 -0700 +++ 2/draft-ietf-i2nsf-applicability-16.txt 2019-07-25 04:16:43.981151364 -0700 @@ -1,26 +1,26 @@ I2NSF Working Group J. Jeong Internet-Draft Sungkyunkwan University Intended status: Informational S. Hyun -Expires: January 25, 2020 Chosun University +Expires: January 26, 2020 Chosun University T. Ahn Korea Telecom S. Hares Huawei D. Lopez Telefonica I+D - July 24, 2019 + July 25, 2019 Applicability of Interfaces to Network Security Functions to Network- Based Security Services - draft-ietf-i2nsf-applicability-15 + draft-ietf-i2nsf-applicability-16 Abstract This document describes the applicability of Interface to Network Security Functions (I2NSF) to network-based security services in Network Functions Virtualization (NFV) environments, such as firewall, deep packet inspection, or attack mitigation engines. Status of This Memo @@ -30,21 +30,21 @@ Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at https://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." - This Internet-Draft will expire on January 25, 2020. + This Internet-Draft will expire on January 26, 2020. Copyright Notice Copyright (c) 2019 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents @@ -67,31 +67,31 @@ System . . . . . . . . . . . . . . . . . . . . . . . . . 15 6.3. Attack Mitigation: Centralized DDoS-attack Mitigation System . . . . . . . . . . . . . . . . . . . . . . . . . 15 7. I2NSF Framework with NFV . . . . . . . . . . . . . . . . . . 16 8. Security Considerations . . . . . . . . . . . . . . . . . . . 18 9. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 19 10. Contributors . . . . . . . . . . . . . . . . . . . . . . . . 19 11. References . . . . . . . . . . . . . . . . . . . . . . . . . 19 11.1. Normative References . . . . . . . . . . . . . . . . . . 19 11.2. Informative References . . . . . . . . . . . . . . . . . 21 - Appendix A. Changes from draft-ietf-i2nsf-applicability-14 . . . 23 + Appendix A. Changes from draft-ietf-i2nsf-applicability-15 . . . 23 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 23 1. Introduction Interface to Network Security Functions (I2NSF) defines a framework and interfaces for interacting with Network Security Functions (NSFs). Note that an NSF is defined as software that provides a set of security-related services, such as (i) detecting unwanted activity, (ii) blocking or mitigating the effect of such unwanted - activity in order to fulfil service requirements, and (iii) + activity in order to fulfill service requirements, and (iii) supporting communication stream integrity and confidentiality [i2nsf-terminology]. The I2NSF framework allows heterogeneous NSFs developed by different security solution vendors to be used in the Network Functions Virtualization (NFV) environment [ETSI-NFV] by utilizing the capabilities of such NSFs through I2NSF interfaces such as Customer- Facing Interface [consumer-facing-inf-dm] and NSF-Facing Interface [nsf-facing-inf-dm]. In the I2NSF framework, each NSF initially registers the profile of its own capabilities with the Security @@ -147,21 +147,21 @@ operation of network services in a dynamic and scalable manner [ITU-T.Y.3300]. o Network Function: A functional block within a network infrastructure that has well-defined external interfaces and well- defined functional behavior [NFV-Terminology]. o Network Security Function (NSF): Software that provides a set of security-related services. Examples include detecting unwanted activity and blocking or mitigating the effect of such unwanted - activity in order to fulfil service requirements. The NSF can + activity in order to fulfill service requirements. The NSF can also help in supporting communication stream integrity and confidentiality [i2nsf-terminology]. o Network Functions Virtualization (NFV): A principle of separating network functions (or network security functions) from the hardware they run on by using virtual hardware abstraction [NFV-Terminology]. o Service Function Chaining (SFC): The execution of an ordered set of abstract service functions (i.e., network functions) according @@ -988,29 +988,28 @@ [tls-esni] Rescorla, E., Oku, K., Sullivan, N., and C. Wood, "Encrypted Server Name Indication for TLS 1.3", draft- ietf-tls-esni-04 (work in progress), July 2019. [VNF-ONBOARDING] "VNF Onboarding", Available: https://wiki.opnfv.org/display/mano/VNF+Onboarding, November 2016. -Appendix A. Changes from draft-ietf-i2nsf-applicability-14 +Appendix A. Changes from draft-ietf-i2nsf-applicability-15 The following changes have been made from draft-ietf-i2nsf- - applicability-14: + applicability-15: - o In Section 4, to handle HTTP-session packets using TLS in web - filtering, it is clarified that the Server Name Indication (SNI) - can be used to detect a website's URL if the SNI field is not - encryped in TLS versions without the encrypted SNI. + o This version reflects the comments from Francis Dupont who is a + member of the General Area Review Team (Gen-ART) for review. That + is, a typo of "fulfil" is corrected as "fulfill". Authors' Addresses Jaehoon Paul Jeong Department of Computer Science and Engineering Sungkyunkwan University 2066 Seobu-Ro, Jangan-Gu Suwon, Gyeonggi-Do 16419 Republic of Korea