
From nobody Fri Aug 14 12:29:13 2015
Return-Path: <shares@ndzh.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E41881A6F2E for <i2rs@ietfa.amsl.com>; Fri, 14 Aug 2015 12:29:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -96.354
X-Spam-Level: 
X-Spam-Status: No, score=-96.354 tagged_above=-999 required=5 tests=[BAYES_50=0.8, DOS_OUTLOOK_TO_MX=2.845, HTML_MESSAGE=0.001, USER_IN_WHITELIST=-100] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nMBo2DO6dnK7 for <i2rs@ietfa.amsl.com>; Fri, 14 Aug 2015 12:29:11 -0700 (PDT)
Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3ED4C1A6EF1 for <i2rs@ietf.org>; Fri, 14 Aug 2015 12:29:11 -0700 (PDT)
X-Default-Received-SPF: pass (skip=forwardok (res=PASS)) x-ip-name=174.124.199.108; 
From: "Susan Hares" <shares@ndzh.com>
To: <i2rs@ietf.org>
Date: Fri, 14 Aug 2015 15:29:02 -0400
Message-ID: <01af01d0d6c7$7a772910$6f657b30$@ndzh.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_01B0_01D0D6A5.F3670FB0"
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AdDWxo9i2d9AMcjKRhSrdCSYdShHOw==
Content-Language: en-us
X-Authenticated-User: skh@ndzh.com 
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/Iga2RTpqzRQyfReScaSL42QpiLM>
Cc: 'Mahesh Jethanandani' <mjethanandani@gmail.com>, 'Jeffrey Haas' <jhaas@pfrc.org>, 'Alia Atlas' <akatlas@gmail.com>, "'Ersue, Mehmet \(Nokia - DE/Munich\)'" <mehmet.ersue@nokia.com>
Subject: [i2rs] Call for participation in Protocol Design team
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Aug 2015 19:29:13 -0000

This is a multipart message in MIME format.

------=_NextPart_000_01B0_01D0D6A5.F3670FB0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit

This is a call for participation for individuals who would like to
participate in the joint Netconf-I2RS work to design the I2RS protocol.
Below I've indicated my understanding of the design team commitment.  

 

If you are inter

 

Time frame: 8/17 to 11/17 

Protocol definition: 8/17 to 10/17 with refinements after IETF 4 

Key Qualities desired:  Implementation experience, NETCONF knowledge, I2RS
knowledge 

( A willing person may have 1 out of the 3 qualities if they are willing to
work on the other 2 qualities). 

Weekly time commitment:  weekly 1 hour meetings with Design Team, work
outside the design team. 

 

Presentations for the following I2RS interims is required:  

 

 9/16 10:00 - 11:30 ET  -  I2RS Protocol Definition status + Draft status

10/07 10:00 - 11:30 ET -  I2rs Protocol Creation Status

10/21 10:00 - 11:30 ET -  Final Details for I2RS Protocol and IETF 

 

Attendance for the following I2RS interims is suggested: 

   9/02 22:00 - 23:30 ET Service Data Model and Filter-Based RIBS

   9/30 10:00 - 11:30 ET Plans for IETF hack-a-thon + All Data Models

Please contact me off list (shares@ndzh.com) to sign up. 

 

Sue 

 


------=_NextPart_000_01B0_01D0D6A5.F3670FB0
Content-Type: text/html;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><META =
HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Dus-ascii"><meta name=3DGenerator content=3D"Microsoft Word 14 =
(filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoPlainText, li.MsoPlainText, div.MsoPlainText
	{mso-style-priority:99;
	mso-style-link:"Plain Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
span.PlainTextChar
	{mso-style-name:"Plain Text Char";
	mso-style-priority:99;
	mso-style-link:"Plain Text";
	font-family:"Calibri","sans-serif";}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri","sans-serif";}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue =
vlink=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal>This is a =
call for participation for individuals who would like to participate in =
the joint Netconf-I2RS work to design the I2RS protocol.&nbsp; Below =
I&#8217;ve indicated my understanding of the design team =
commitment.&nbsp; <o:p></o:p></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>If you are =
inter<o:p></o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p =
class=3DMsoNormal>Time frame: 8/17 to 11/17 <o:p></o:p></p><p =
class=3DMsoNormal>Protocol definition: 8/17 to 10/17 with refinements =
after IETF 4 <o:p></o:p></p><p class=3DMsoNormal>Key Qualities =
desired:&nbsp; Implementation experience, NETCONF knowledge, I2RS =
knowledge <o:p></o:p></p><p class=3DMsoNormal>( A willing person may =
have 1 out of the 3 qualities if they are willing to work on the other 2 =
qualities). <o:p></o:p></p><p class=3DMsoNormal>Weekly time =
commitment:&nbsp; weekly 1 hour meetings with Design Team, work outside =
the design team. <o:p></o:p></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p =
class=3DMsoNormal>Presentations for the following I2RS interims is =
required: &nbsp;<o:p></o:p></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoPlainText> =
&nbsp;9/16 10:00 - 11:30 ET &nbsp;- &nbsp;I2RS Protocol Definition =
status + Draft status<o:p></o:p></p><p class=3DMsoPlainText> 10/07 10:00 =
- 11:30 ET - &nbsp;I2rs Protocol Creation Status<o:p></o:p></p><p =
class=3DMsoPlainText> 10/21 10:00 - 11:30 ET - &nbsp;Final Details for =
I2RS Protocol and IETF <o:p></o:p></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>Attendance =
for the following I2RS interims is suggested: <o:p></o:p></p><p =
class=3DMsoPlainText>&nbsp;&nbsp;&nbsp;9/02 22:00 - 23:30 ET Service =
Data Model and Filter-Based RIBS<o:p></o:p></p><p =
class=3DMsoPlainText>&nbsp;&nbsp; 9/30 10:00 - 11:30 ET Plans for IETF =
hack-a-thon + All Data Models<o:p></o:p></p><p class=3DMsoPlainText> =
<o:p></o:p></p><p class=3DMsoPlainText>Please contact me off list (<a =
href=3D"mailto:shares@ndzh.com">shares@ndzh.com</a>) to sign up. =
<o:p></o:p></p><p class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText>Sue <o:p></o:p></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div></body></html>
------=_NextPart_000_01B0_01D0D6A5.F3670FB0--


From nobody Fri Aug 14 12:35:41 2015
Return-Path: <shares@ndzh.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E0CB91A7004 for <i2rs@ietfa.amsl.com>; Fri, 14 Aug 2015 12:35:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -97.654
X-Spam-Level: 
X-Spam-Status: No, score=-97.654 tagged_above=-999 required=5 tests=[BAYES_05=-0.5, DOS_OUTLOOK_TO_MX=2.845, HTML_MESSAGE=0.001, USER_IN_WHITELIST=-100] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Amo-aBxkVr6m for <i2rs@ietfa.amsl.com>; Fri, 14 Aug 2015 12:35:37 -0700 (PDT)
Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 84FA21A6FFC for <i2rs@ietf.org>; Fri, 14 Aug 2015 12:35:37 -0700 (PDT)
X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=174.124.199.108; 
From: "Susan Hares" <shares@ndzh.com>
To: <i2rs@ietf.org>
Date: Fri, 14 Aug 2015 15:35:22 -0400
Message-ID: <01c901d0d6c8$5ce8d370$16ba7a50$@ndzh.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_01CA_01D0D6A6.D5D8BA10"
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AdDWx74+zbjtvBi9RJyuBugURaScTg==
Content-Language: en-us
X-Authenticated-User: skh@ndzh.com 
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/_m0HpWGp77vAA2gImmOR-tJ90LA>
Cc: 'Jeffrey Haas' <jhaas@pfrc.org>, 'Benoit Claise' <bclaise@cisco.com>, 'joel jaeggli' <joelja@bogus.com>, "'Scott O. Bradner'" <sob@sobco.com>, 'Alia Atlas' <akatlas@gmail.com>
Subject: [i2rs] I2RS Service topology design team
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Aug 2015 19:35:39 -0000

This is a multipart message in MIME format.

------=_NextPart_000_01CA_01D0D6A6.D5D8BA10
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit

This is a call for participation for individuals who would like to
participate in the service I2RS design Team.    If you are interested,
please contact me off-list (shares@ndzh.com) 

 

---------------------

Time frame: 8/17 to 11/17 

Model definition: 8/17 to 10/17 with refinements after IETF 94 

Key Qualities desired:  Knowledge of I2RS models and protocol requirements. 

                                             Experience with network-wide
service models (E.g. L3SM)

                                              Experience with service models
link to device models 

 

An initial revision of the model will occur during August, and initial ideas
will be presented the 9/2 interim.  A second pass on this information will
be presented at the 9/30 information. 

 

I2RS interims: 

   9/02 22:00 - 23:30 ET Service Data Model and Filter-Based RIBS

   9/30 10:00 - 11:30 ET Plans for IETF hack-a-thon + All Data Models

 

Please contact me off list (shares@ndzh.com) to sign up.   

 

Sue Hares 

Co-chair I2RS 

shares@nzh.com 

 


------=_NextPart_000_01CA_01D0D6A6.D5D8BA10
Content-Type: text/html;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><META =
HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Dus-ascii"><meta name=3DGenerator content=3D"Microsoft Word 14 =
(filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoPlainText, li.MsoPlainText, div.MsoPlainText
	{mso-style-priority:99;
	mso-style-link:"Plain Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
span.PlainTextChar
	{mso-style-name:"Plain Text Char";
	mso-style-priority:99;
	mso-style-link:"Plain Text";
	font-family:"Calibri","sans-serif";}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri","sans-serif";}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue =
vlink=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal>This is a =
call for participation for individuals who would like to participate in =
the service I2RS design Team. &nbsp; &nbsp;If you are interested, please =
contact me off-list (<a =
href=3D"mailto:shares@ndzh.com">shares@ndzh.com</a>) <o:p></o:p></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p =
class=3DMsoNormal>---------------------<o:p></o:p></p><p =
class=3DMsoNormal>Time frame: 8/17 to 11/17 <o:p></o:p></p><p =
class=3DMsoNormal>Model definition: 8/17 to 10/17 with refinements after =
IETF 94 <o:p></o:p></p><p class=3DMsoNormal>Key Qualities desired:&nbsp; =
Knowledge of I2RS models and protocol requirements. <o:p></o:p></p><p =
class=3DMsoNormal>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;Experience with network-wide service models =
(E.g. L3SM)<o:p></o:p></p><p =
class=3DMsoNormal>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp; Experience with service models link to device models =
<o:p></o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p =
class=3DMsoNormal>An initial revision of the model will occur during =
August, and initial ideas will be presented the 9/2 interim.&nbsp; A =
second pass on this information will be presented at the 9/30 =
information. <o:p></o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p =
class=3DMsoNormal>I2RS interims: <o:p></o:p></p><p =
class=3DMsoPlainText>&nbsp;&nbsp;&nbsp;9/02 22:00 - 23:30 ET Service =
Data Model and Filter-Based RIBS<o:p></o:p></p><p =
class=3DMsoPlainText>&nbsp;&nbsp; 9/30 10:00 - 11:30 ET Plans for IETF =
hack-a-thon + All Data Models<o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p class=3DMsoPlainText>Please =
contact me off list (<a =
href=3D"mailto:shares@ndzh.com">shares@ndzh.com</a>) to sign up. =
&nbsp;&nbsp;<o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p class=3DMsoPlainText>Sue =
Hares <o:p></o:p></p><p class=3DMsoPlainText>Co-chair I2RS =
<o:p></o:p></p><p class=3DMsoPlainText><a =
href=3D"mailto:shares@nzh.com">shares@nzh.com</a> <o:p></o:p></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div></body></html>
------=_NextPart_000_01CA_01D0D6A6.D5D8BA10--


From nobody Fri Aug 14 13:57:58 2015
Return-Path: <linda.dunbar@huawei.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 98B951A8999 for <i2rs@ietfa.amsl.com>; Fri, 14 Aug 2015 13:57:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.21
X-Spam-Level: 
X-Spam-Status: No, score=-4.21 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id km8r0saG4mou for <i2rs@ietfa.amsl.com>; Fri, 14 Aug 2015 13:57:52 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 11FA01A8996 for <i2rs@ietf.org>; Fri, 14 Aug 2015 13:57:50 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml403-hub.china.huawei.com) ([172.18.7.190]) by lhrrg02-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id BWG50463; Fri, 14 Aug 2015 20:57:49 +0000 (GMT)
Received: from DFWEML704-CHM.china.huawei.com (10.193.5.141) by lhreml403-hub.china.huawei.com (10.201.5.217) with Microsoft SMTP Server (TLS) id 14.3.235.1; Fri, 14 Aug 2015 21:57:47 +0100
Received: from DFWEML701-CHM.china.huawei.com ([10.193.5.50]) by dfweml704-chm ([10.193.5.141]) with mapi id 14.03.0235.001; Fri, 14 Aug 2015 13:57:38 -0700
From: Linda Dunbar <linda.dunbar@huawei.com>
To: Andy Bierman <andy@yumaworks.com>
Thread-Topic: [i2rs] multi-headed control of I2RS agent v.s. i2rs-Ephemeral-state
Thread-Index: AQHQwaU9HuAloP1M20KLFQfoTKupJZ3ijrGAgCmU2LA=
Date: Fri, 14 Aug 2015 20:57:37 +0000
Message-ID: <4A95BA014132FF49AE685FAB4B9F17F657D1175A@dfweml701-chm>
References: <4A95BA014132FF49AE685FAB4B9F17F657CDFA09@dfweml702-chm> <CABCOCHS=LjcE5Cgx4JQhTWKW9sMvDFe6Okf8NE5Ox_57aOe1OQ@mail.gmail.com>
In-Reply-To: <CABCOCHS=LjcE5Cgx4JQhTWKW9sMvDFe6Okf8NE5Ox_57aOe1OQ@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.47.134.214]
Content-Type: multipart/alternative; boundary="_000_4A95BA014132FF49AE685FAB4B9F17F657D1175Adfweml701chm_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/dJNuLkFgz0jkr_w29seU53d50ag>
Cc: "jhaas@juniper.net" <jhaas@juniper.net>, "i2rs@ietf.org" <i2rs@ietf.org>, Susan Hares <shares@ndzh.com>
Subject: Re: [i2rs] multi-headed control of I2RS agent v.s. i2rs-Ephemeral-state
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Aug 2015 20:57:55 -0000

--_000_4A95BA014132FF49AE685FAB4B9F17F657D1175Adfweml701chm_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64

VGhhbmtzIEpvZWwgYW5kIEFuZHkgZm9yIHRoZSBjbGFyaWZpY2F0aW9uLg0KDQpTZWUgbXkgYWRk
aXRpb25hbCBjb21tZW50cyBpbnNlcnRlZCBiZWxvdzoNCg0KRnJvbTogQW5keSBCaWVybWFuIFtt
YWlsdG86YW5keUB5dW1hd29ya3MuY29tXQ0KU2VudDogU2F0dXJkYXksIEp1bHkgMTgsIDIwMTUg
OTo1NSBQTQ0KVG86IExpbmRhIER1bmJhcg0KQ2M6IGkycnNAaWV0Zi5vcmc7IFN1c2FuIEhhcmVz
OyBqaGFhc0BqdW5pcGVyLm5ldA0KU3ViamVjdDogUmU6IFtpMnJzXSBtdWx0aS1oZWFkZWQgY29u
dHJvbCBvZiBJMlJTIGFnZW50IHYucy4gaTJycy1FcGhlbWVyYWwtc3RhdGUNCg0KSGksDQoNCnZl
cnkgaW50ZXJlc3RpbmcgY29tbWVudHMuLi4NCg0KSSBhZ3JlZSB0aGVzZSBhcmUgcmVxdWlyZW1l
bnRzIHRoYXQgY291bGQgYXBwbHkgdG8gbW9yZSB0aGFuIEkyUlMuDQpUaGUgZmlyc3Qtb25lLXdp
bnMgKHZpYSBjbGllbnQgcHJpb3JpdHkpIGRldGFpbHMgY291bGQgYXBwbHkgdG8gY29uZmlndXJh
dGlvbg0KYXMgd2VsbCBhcyBlcGhlbWVyYWwgc3RhdGUsIGFuZCBJIHdvbmRlciBpZiBORVRDT05G
DQpzaG91bGQgYmUgY2hhbmdlZCB0byBzdXBwb3J0IGl0Lg0KDQpJIGRvbid0IGFncmVlIHRoYXQg
YSBsb3N0IGNvbm5lY3Rpb24gY2F1c2VkIGFsbCB0aGUgc3RhdGUgZm9yIHRoYXQgY2xpZW50DQp0
byBkaXNhcHBlYXIuICBJbiBORVRDT05GLCBpdCBpcyBnZW5lcmFsbHkgb25seSB0aGUgZWRpdHMg
aW4gcHJvZ3Jlc3MNCnRoYXQgYXJlIHRvc3NlZC4gIFNpbmNlIEkyUlMgd2lsbCBub3QgdXNlIGEg
Y2FuZGlkYXRlIGNvbmZpZywNCnRoZXNlIG11bHRpLVBEVSBlZGl0cyBzaG91bGQgbm90IGJlIHBv
c3NpYmxlIGluIEkyUlMuDQoNCltMaW5kYV0gIFRoZSBsb3N0IGNvbm5lY3Rpb24gY291bGQgbWVh
biB0aGF0IGNvbmZpZ3VyYXRpb24gZnJvbSB0aGUgSTJSUyBhZ2VudCBpcyBzdGFsZS4gQXQgbGVh
c3QgdGhlcmUgc2hvdWxkIGJlIGEgdGltZXIgZm9yIHRoZSBkYXRhIGZyb20gdGhlIEkyUlMgYWdl
bnQgd2hvc2UgY29ubmVjdGlvbiBoYXMgYmVlbiBsb3N0LiBXaGVuIHRoZSBUaW1lciBleHBpcmVk
IGR1cmluZyB0aGUgY29ubmVjdGlvbiBsb3NzLCB0aGUgY29uZmlndXJhdGlvbiBzaG91bGQgYmUg
d2lwZWQgb3V0Lg0KDQpMaW5kYQ0KDQpJIGFncmVlIHRoYXQgdGhlICJhY2Nlc3MiIHByb2NlZHVy
ZXMgZm9yIGVwaGVtZXJhbCBzdGF0ZSBjYW4NCmJlIHNlcGFyYXRlZCBmcm9tICJtdWx0aS1oZWFk
IiBwcm9jZWR1cmVzLCBidXQgdGhleSBhcmUgc29tZXdoYXQNCmNvdXBsZWQuIEkgdGhpbmsgdGhl
IGFyY2guIGRvYyBtZW50aW9uZWQgcGFyYW1ldGVycyBzZW50IHdpdGggYW4NCmVkaXQgdG8gYXNr
IGZvciBhIG5vdGlmaWNhdGlvbiBpZiB0aGUgZWRpdCBpcyByZWplY3RlZCBiZWNhdXNlIGhpZ2hl
cg0KcHJpb3JpdHkgZGF0YSBhbHJlYWR5IGV4aXN0cyAobm90aWZ5IG1lIHdoZW4gbXkgZWRpdCBt
aWdodCB3b3JrKS4NCkl0IHNlZW1zIG11bHRpLWhlYWQgY29udHJvbCBpcyBtYW5kYXRvcnkgdG8g
c3VwcG9ydC4NCg0KDQpBbmR5DQoNCg0KDQoNCk9uIFNhdCwgSnVsIDE4LCAyMDE1IGF0IDM6MDEg
UE0sIExpbmRhIER1bmJhciA8bGluZGEuZHVuYmFyQGh1YXdlaS5jb208bWFpbHRvOmxpbmRhLmR1
bmJhckBodWF3ZWkuY29tPj4gd3JvdGU6DQoNClN1ZSBhbmQgSmVmZiwNCg0KVGhlcmUgaGF2ZSBi
ZWVuIG1hbnkgcG9zdGluZ3MvY29tbWVudHMgdG8gZHJhZnQtaWV0Zi1pMnJzLWVwaGVtZXJhbC1z
dGF0ZS0wMCwgSSB3ZW50IHRocm91Z2ggbWFueSwgYnV0IG5vdCBhbGwuIEluIGNhc2UgbXkgY29t
bWVudHMgaGF2ZSBiZWVuIGFkZHJlc3NlZCBieSBwcmV2aW91cyBwb3N0aW5ncyB0aGF0IEkgbWlz
c2VkLCBJIGFtIHJlYWxseSBzb3JyeSBmb3Igd2FzdGluZyB5b3VyIHRpbWUuDQoNCg0KSSBmaW5k
IHRoZSBtYWpvcml0eSBvZiB0aGUgY29udGVudCBpbiBkcmFmdC1pZXRmLWkycnMtZXBoZW1lcmFs
LXN0YXRlLTAwIGlzIGFib3V0IHRoZSDigJxtdWx0aS1oZWFkZWQgY29udHJvbCBvZiBhIEkyUlMg
YWdlbnTigJ0uDQoNCklNSE8sIHRoZSDigJxJMlJTLWVwaGVtZXJhbC1zdGF0ZeKAnSBzaG91bGQg
YmUgYWRkcmVzc2VkIHNlcGFyYXRlbHkgZnJvbSDigJxtdWx0aS1oZWFkZWQgY29udHJvbOKAnSwg
YmVjYXVzZSBmb3IgbmV0d29ya3MgdGhhdCBvbmx5IHVzZSBzaW5nbGUgY29udHJvbGxlciwgdGhl
eSBkb27igJl0IGhhdmUgdG8gZGVhbCB3aXRoIHRoZSBjb21wbGljYXRlZCBzY2hlbWUgb2YgbXVs
dGlwbGUgY29udHJvbGxlcnMsIGJ1dCB0aGV5IGRvIG5lZWQgdG8gY29uZm9ybSB0byB0aGUg4oCc
ZXBoZW1lcmFsLXN0YXRl4oCdIHZpYSBJMlJTIGludGVyZmFjZS4NCg0K4oCcSTJSUy1lcGhlbWVy
YWwtc3RhdGXigJ0gc2hvdWxkIGJlIHNpbXBseToNCi0gYWxsIGNvbW1hbmRzIGZyb20gSTJSUyBp
bnRlcmZhY2UgYXJlIGVwaGVtZXJhbCwgaS5lLiB0aGV5IGRvIG5vdCBzdXN0YWluIHJlc3RhcnQs
IGFuZCBhbGwgY29uZmlndXJhdGlvbiBmcm9tIEkyUlMgaW50ZXJmYWNlIGFyZSB2b2lkZWQgKG9y
IHJlbW92ZWQpIHdoZW4gdGhlIGNvbm5lY3Rpb24gdG8gdGhlIEkyUlMgYWdlbnQgaXMgbG9zdC4N
Cg0KDQpUaGUgTXVsdGktaGVhZGVkIGNvbnRyb2wgc2NoZW1lIGRlc2NyaWJlZCBpbiB0aGUgZHJh
ZnQgY2FuIGFsc28gYmUgYXBwbGllZCB0byBwZXJzaXN0ZW50IGNvbmZpZ3VyYXRpb24uDQoNCg0K
ZHJhZnQtaWV0Zi1pMnJzLWVwaGVtZXJhbC1zdGF0ZS0wMCBpbnRyb2R1Y2VkIGEgbmV3IOKAnGVw
aGVtZXJhbC1jb25maWfigJ0gdG8gTkVUQ09ORiwgZG9lcyBpdCBtZWFuIHRoYXQgaWYgSTJSUyBj
bGllbnQgdXNlcyByZWd1bGFyIOKAnGNvbmZpZ+KAnSBpbnN0ZWFkIG9mICDigJxlcGhlbWVyYWwt
Y29uZmln4oCdLCB0aGUgY29uZmlndXJhdGlvbiBiZWNvbWVzIHBlcnNpc3RlbnQ/ICBJdCBzaG91
bGRu4oCZdCwgaW4gbXkgb3Bpbmlvbi4NCg0KDQpMaW5kYSBEdW5iYXINCg0KDQpfX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fXw0KaTJycyBtYWlsaW5nIGxpc3QN
CmkycnNAaWV0Zi5vcmc8bWFpbHRvOmkycnNAaWV0Zi5vcmc+DQpodHRwczovL3d3dy5pZXRmLm9y
Zy9tYWlsbWFuL2xpc3RpbmZvL2kycnMNCg0K

--_000_4A95BA014132FF49AE685FAB4B9F17F657D1175Adfweml701chm_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_4A95BA014132FF49AE685FAB4B9F17F657D1175Adfweml701chm_--


From nobody Fri Aug 14 14:06:57 2015
Return-Path: <jmh@joelhalpern.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2E3641A89F9 for <i2rs@ietfa.amsl.com>; Fri, 14 Aug 2015 14:06:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.602
X-Spam-Level: 
X-Spam-Status: No, score=-2.602 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id w2NlNjPn96pj for <i2rs@ietfa.amsl.com>; Fri, 14 Aug 2015 14:06:53 -0700 (PDT)
Received: from mailb2.tigertech.net (mailb2.tigertech.net [208.80.4.154]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5716F1A89F1 for <i2rs@ietf.org>; Fri, 14 Aug 2015 14:06:53 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mailb2.tigertech.net (Postfix) with ESMTP id 3BD4E1C04BD; Fri, 14 Aug 2015 14:06:53 -0700 (PDT)
X-Virus-Scanned: Debian amavisd-new at b2.tigertech.net
Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mailb2.tigertech.net (Postfix) with ESMTPSA id 647791C0393; Fri, 14 Aug 2015 14:06:47 -0700 (PDT)
To: Linda Dunbar <linda.dunbar@huawei.com>, Andy Bierman <andy@yumaworks.com>
References: <4A95BA014132FF49AE685FAB4B9F17F657CDFA09@dfweml702-chm> <CABCOCHS=LjcE5Cgx4JQhTWKW9sMvDFe6Okf8NE5Ox_57aOe1OQ@mail.gmail.com> <4A95BA014132FF49AE685FAB4B9F17F657D1175A@dfweml701-chm>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <55CE5865.6040705@joelhalpern.com>
Date: Fri, 14 Aug 2015 17:06:45 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:38.0) Gecko/20100101 Thunderbird/38.1.0
MIME-Version: 1.0
In-Reply-To: <4A95BA014132FF49AE685FAB4B9F17F657D1175A@dfweml701-chm>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 8bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/xANucGNESJnkKfCL8xCbNoBRdHg>
Cc: "jhaas@juniper.net" <jhaas@juniper.net>, "i2rs@ietf.org" <i2rs@ietf.org>, Susan Hares <shares@ndzh.com>
Subject: Re: [i2rs] multi-headed control of I2RS agent v.s. i2rs-Ephemeral-state
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Aug 2015 21:06:55 -0000

This was discussed with the working group, and the agreement was that 
I2RS changes did not have lifetimes, were not dependent upon a 
maintained connection, and were removed either on device reboot or 
removal by the controller that put them there (or when overriden my 
erroneous overlap.)

If you ahve new perspectives that were not discussed before, you can of 
course ask the chairs to reopen the discussion.

Yours,
Joel

On 8/14/15 4:57 PM, Linda Dunbar wrote:
> Thanks Joel and Andy for the clarification.
>
> See my additional comments inserted below:
>
> *From:*Andy Bierman [mailto:andy@yumaworks.com]
> *Sent:* Saturday, July 18, 2015 9:55 PM
> *To:* Linda Dunbar
> *Cc:* i2rs@ietf.org; Susan Hares; jhaas@juniper.net
> *Subject:* Re: [i2rs] multi-headed control of I2RS agent v.s.
> i2rs-Ephemeral-state
>
> Hi,
>
> very interesting comments...
>
> I agree these are requirements that could apply to more than I2RS.
>
> The first-one-wins (via client priority) details could apply to
> configuration
>
> as well as ephemeral state, and I wonder if NETCONF
>
> should be changed to support it.
>
> I don't agree that a lost connection caused all the state for that client
>
> to disappear.  In NETCONF, it is generally only the edits in progress
>
> that are tossed.  Since I2RS will not use a candidate config,
>
> these multi-PDU edits should not be possible in I2RS.
>
> [Linda]  The lost connection could mean that configuration from the I2RS
> agent is stale. At least there should be a timer for the data from the
> I2RS agent whose connection has been lost. When the Timer expired during
> the connection loss, the configuration should be wiped out.
>
> Linda
>
> I agree that the "access" procedures for ephemeral state can
>
> be separated from "multi-head" procedures, but they are somewhat
>
> coupled. I think the arch. doc mentioned parameters sent with an
>
> edit to ask for a notification if the edit is rejected because higher
>
> priority data already exists (notify me when my edit might work).
>
> It seems multi-head control is mandatory to support.
>
> Andy
>
> On Sat, Jul 18, 2015 at 3:01 PM, Linda Dunbar <linda.dunbar@huawei.com
> <mailto:linda.dunbar@huawei.com>> wrote:
>
> Sue and Jeff,
>
> There have been many postings/comments to
> draft-ietf-i2rs-ephemeral-state-00, I went through many, but not all. In
> case my comments have been addressed by previous postings that I missed,
> I am really sorry for wasting your time.
>
> I find the majority of the content in draft-ietf-i2rs-ephemeral-state-00
> is about the “multi-headed control of a I2RS agent”.
>
> IMHO, the “I2RS-ephemeral-state” should be addressed separately from
> “multi-headed control”, because for networks that only use single
> controller, they don’t have to deal with the complicated scheme of
> multiple controllers, but they do need to conform to the
> “ephemeral-state” via I2RS interface.
>
> “I2RS-ephemeral-state” should be simply:
>
> - all commands from I2RS interface are ephemeral, i.e. they do not
> sustain restart, and all configuration from I2RS interface are voided
> (or removed) when the connection to the I2RS agent is lost.
>
> The Multi-headed control scheme described in the draft can also be
> applied to persistent configuration.
>
> draft-ietf-i2rs-ephemeral-state-00 introduced a new “ephemeral-config”
> to NETCONF, does it mean that if I2RS client uses regular “config”
> instead of  “ephemeral-config”, the configuration becomes persistent?
> It shouldn’t, in my opinion.
>
> Linda Dunbar
>
>
> _______________________________________________
> i2rs mailing list
> i2rs@ietf.org <mailto:i2rs@ietf.org>
> https://www.ietf.org/mailman/listinfo/i2rs
>
>
>
> _______________________________________________
> i2rs mailing list
> i2rs@ietf.org
> https://www.ietf.org/mailman/listinfo/i2rs
>


From nobody Fri Aug 14 14:40:26 2015
Return-Path: <shares@ndzh.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 23EF51A8A43 for <i2rs@ietfa.amsl.com>; Fri, 14 Aug 2015 14:40:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -99.054
X-Spam-Level: 
X-Spam-Status: No, score=-99.054 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DOS_OUTLOOK_TO_MX=2.845, HTML_MESSAGE=0.001, USER_IN_WHITELIST=-100] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id r4n6mVz7oXZO for <i2rs@ietfa.amsl.com>; Fri, 14 Aug 2015 14:40:22 -0700 (PDT)
Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 93A661A8A7B for <i2rs@ietf.org>; Fri, 14 Aug 2015 14:40:22 -0700 (PDT)
X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=174.124.199.108; 
From: "Susan Hares" <shares@ndzh.com>
To: <i2rs@ietf.org>
References: <01af01d0d6c7$7a772910$6f657b30$@ndzh.com>
In-Reply-To: <01af01d0d6c7$7a772910$6f657b30$@ndzh.com>
Date: Fri, 14 Aug 2015 17:40:14 -0400
Message-ID: <027201d0d6d9$ce66df40$6b349dc0$@ndzh.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_0273_01D0D6B8.47584C80"
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQIu/7TPXe12XX73+aIzkYKOSC7tSJ1Ps4wg
Content-Language: en-us
X-Authenticated-User: skh@ndzh.com 
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/K3SlW1knp4RpQdTNKWGdzxT1UnU>
Cc: 'Mahesh Jethanandani' <mjethanandani@gmail.com>, 'Jeffrey Haas' <jhaas@pfrc.org>, "'Ersue, Mehmet \(Nokia - DE/Munich\)'" <mehmet.ersue@nokia.com>, 'Alia Atlas' <akatlas@gmail.com>
Subject: Re: [i2rs] Call for participation in Protocol Design team
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Aug 2015 21:40:25 -0000

This is a multipart message in MIME format.

------=_NextPart_000_0273_01D0D6B8.47584C80
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit

HI all:  

 

I part of a sentence got removed, and Mehmet Ensue mentioned it to me.  See
the corrected text below.  I have three volunteers, and I welcome more.
Please drop me a note ASAP as we will be starting the work next week. 

 

Sue Hares

 

From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Susan Hares
Sent: Friday, August 14, 2015 3:29 PM
To: i2rs@ietf.org
Cc: 'Mahesh Jethanandani'; 'Jeffrey Haas'; 'Alia Atlas'; 'Ersue, Mehmet
(Nokia - DE/Munich)'
Subject: [i2rs] Call for participation in Protocol Design team

 

This is a call for participation for individuals who would like to
participate in the joint Netconf-I2RS work to design the I2RS protocol.
Below I've indicated my understanding of the design team commitment.  

 

If you are interested, please let me know (shares@ndzh.com).  

 

Time frame: 8/17 to 11/17 

Protocol definition: 8/17 to 10/17 with refinements after IETF 4 

Key Qualities desired:  Implementation experience, NETCONF knowledge, I2RS
knowledge 

( A willing person may have 1 out of the 3 qualities if they are willing to
work on the other 2 qualities). 

Weekly time commitment:  weekly 1 hour meetings with Design Team, work
outside the design team. 

 

Presentations for the following I2RS interims is required:  

 

 9/16 10:00 - 11:30 ET  -  I2RS Protocol Definition status + Draft status

10/07 10:00 - 11:30 ET -  I2rs Protocol Creation Status

10/21 10:00 - 11:30 ET -  Final Details for I2RS Protocol and IETF 

 

Attendance for the following I2RS interims is suggested: 

   9/02 22:00 - 23:30 ET Service Data Model and Filter-Based RIBS

   9/30 10:00 - 11:30 ET Plans for IETF hack-a-thon + All Data Models

 

Please contact me off list (shares@ndzh.com) to sign up. 

 

Sue 

 


------=_NextPart_000_0273_01D0D6B8.47584C80
Content-Type: text/html;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><META =
HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Dus-ascii"><meta name=3DGenerator content=3D"Microsoft Word 14 =
(filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoPlainText, li.MsoPlainText, div.MsoPlainText
	{mso-style-priority:99;
	mso-style-link:"Plain Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
span.PlainTextChar
	{mso-style-name:"Plain Text Char";
	mso-style-priority:99;
	mso-style-link:"Plain Text";
	font-family:"Calibri","sans-serif";}
span.EmailStyle19
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
span.EmailStyle20
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue =
vlink=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal><span =
style=3D'color:#1F497D'>HI all:&nbsp; <o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'color:#1F497D'><o:p>&nbsp;</o:p></span></p><p =
class=3DMsoNormal><span style=3D'color:#1F497D'>I part of a sentence got =
removed, and Mehmet Ensue mentioned it to me.&nbsp; See the corrected =
text below. &nbsp;I have three volunteers, and I welcome more.&nbsp; =
Please drop me a note ASAP as we will be starting the work next week. =
<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'color:#1F497D'><o:p>&nbsp;</o:p></span></p><p =
class=3DMsoNormal><span style=3D'color:#1F497D'>Sue =
Hares<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'color:#1F497D'><o:p>&nbsp;</o:p></span></p><div><div =
style=3D'border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in'><p class=3DMsoNormal><b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>From:</span>=
</b><span style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'> =
i2rs [mailto:i2rs-bounces@ietf.org] <b>On Behalf Of </b>Susan =
Hares<br><b>Sent:</b> Friday, August 14, 2015 3:29 PM<br><b>To:</b> =
i2rs@ietf.org<br><b>Cc:</b> 'Mahesh Jethanandani'; 'Jeffrey Haas'; 'Alia =
Atlas'; 'Ersue, Mehmet (Nokia - DE/Munich)'<br><b>Subject:</b> [i2rs] =
Call for participation in Protocol Design =
team<o:p></o:p></span></p></div></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>This is a =
call for participation for individuals who would like to participate in =
the joint Netconf-I2RS work to design the I2RS protocol.&nbsp; Below =
I&#8217;ve indicated my understanding of the design team =
commitment.&nbsp; <o:p></o:p></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>If you are =
inter<span style=3D'color:#1F497D'>ested, please let me know (<a =
href=3D"mailto:shares@ndzh.com">shares@ndzh.com</a>). =
&nbsp;</span><o:p></o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p =
class=3DMsoNormal>Time frame: 8/17 to 11/17 <o:p></o:p></p><p =
class=3DMsoNormal>Protocol definition: 8/17 to 10/17 with refinements =
after IETF 4 <o:p></o:p></p><p class=3DMsoNormal>Key Qualities =
desired:&nbsp; Implementation experience, NETCONF knowledge, I2RS =
knowledge <o:p></o:p></p><p class=3DMsoNormal>( A willing person may =
have 1 out of the 3 qualities if they are willing to work on the other 2 =
qualities). <o:p></o:p></p><p class=3DMsoNormal>Weekly time =
commitment:&nbsp; weekly 1 hour meetings with Design Team, work outside =
the design team. <o:p></o:p></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p =
class=3DMsoNormal>Presentations for the following I2RS interims is =
required: &nbsp;<o:p></o:p></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText>&nbsp;9/16 10:00 - 11:30 ET &nbsp;- &nbsp;I2RS =
Protocol Definition status + Draft status<o:p></o:p></p><p =
class=3DMsoPlainText>10/07 10:00 - 11:30 ET - &nbsp;I2rs Protocol =
Creation Status<o:p></o:p></p><p class=3DMsoPlainText>10/21 10:00 - =
11:30 ET - &nbsp;Final Details for I2RS Protocol and IETF =
<o:p></o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p =
class=3DMsoNormal>Attendance for the following I2RS interims is =
suggested: <o:p></o:p></p><p class=3DMsoPlainText>&nbsp;&nbsp;&nbsp;9/02 =
22:00 - 23:30 ET Service Data Model and Filter-Based =
RIBS<o:p></o:p></p><p class=3DMsoPlainText>&nbsp;&nbsp; 9/30 10:00 - =
11:30 ET Plans for IETF hack-a-thon + All Data Models<o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p class=3DMsoPlainText>Please =
contact me off list (<a =
href=3D"mailto:shares@ndzh.com">shares@ndzh.com</a>) to sign up. =
<o:p></o:p></p><p class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText>Sue <o:p></o:p></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div></body></html>
------=_NextPart_000_0273_01D0D6B8.47584C80--


From nobody Sat Aug 15 08:42:36 2015
Return-Path: <shares@ndzh.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B00271B2F76; Sat, 15 Aug 2015 08:42:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -97.155
X-Spam-Level: 
X-Spam-Status: No, score=-97.155 tagged_above=-999 required=5 tests=[BAYES_40=-0.001, DOS_OUTLOOK_TO_MX=2.845, HTML_MESSAGE=0.001, USER_IN_WHITELIST=-100] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zyE8ttyra6Kp; Sat, 15 Aug 2015 08:42:32 -0700 (PDT)
Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 972051B2F72; Sat, 15 Aug 2015 08:42:32 -0700 (PDT)
X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=174.124.199.108; 
From: "Susan Hares" <shares@ndzh.com>
To: <i2rs@ietf.org>
Date: Sat, 15 Aug 2015 11:42:32 -0400
Message-ID: <03a001d0d771$007a8490$016f8db0$@ndzh.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_03A1_01D0D74F.796A6B30"
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AdDXcCsRi+dV8dVhTn2lAZ4excD+Nw==
Content-Language: en-us
X-Authenticated-User: skh@ndzh.com 
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/_kmjhPto8-PIePcg03fzlH5hBbw>
Cc: 'Netconf' <netconf@ietf.org>
Subject: [i2rs] Minutes posted for IETF 93
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 15 Aug 2015 15:42:34 -0000

This is a multipart message in MIME format.

------=_NextPart_000_03A1_01D0D74F.796A6B30
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit

I2RS WG: 

 

A big thanks to John Messenger and Eric Voit who recorded notes on Thursday.


 

The I2RS minutes are posted at: 

https://www.ietf.org/proceedings/93/minutes/minutes-93-i2rs

 

Due to the lengthy discussion for I2RS on Thursday, the minutes are rather
long (27 pages of minutes).  However, these minutes will be very useful in
setting up the action items for the following design teams: 

.         Service topology design team, 

.         I2RS protocol design team, 

.         FB-RIB design team, and a 

.         IETF-94 hack-a-thon design. 

 

These design teams will be busy in 8/17 - 11/17 - with status reports coming
to the I2RS at the I2RS interims. 

 

Please review the notes.  I will post action items for each design team
based on the Notes on Monday. Please compare my action items with what you
think the notes said, and respond on the list. 

 

I ask a favor of those who spoke at the microphone.  Please check that your
name was represented.  I missed several names - so I need your help to
improve these notes. 

 

Sue Hares 

 


------=_NextPart_000_03A1_01D0D74F.796A6B30
Content-Type: text/html;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><META =
HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Dus-ascii"><meta name=3DGenerator content=3D"Microsoft Word 14 =
(filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0in;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:.5in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri","sans-serif";}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:1560090656;
	mso-list-type:hybrid;
	mso-list-template-ids:1889163876 67698689 67698691 67698693 67698689 =
67698691 67698693 67698689 67698691 67698693;}
@list l0:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Symbol;}
@list l0:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l0:level3
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Wingdings;}
@list l0:level4
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Symbol;}
@list l0:level5
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l0:level6
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Wingdings;}
@list l0:level7
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Symbol;}
@list l0:level8
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l0:level9
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Wingdings;}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue =
vlink=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal>I2RS WG: =
<o:p></o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p =
class=3DMsoNormal>A big thanks to John Messenger and Eric Voit who =
recorded notes on Thursday.&nbsp; <o:p></o:p></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>The I2RS =
minutes are posted at: <o:p></o:p></p><p class=3DMsoNormal><a =
href=3D"https://www.ietf.org/proceedings/93/minutes/minutes-93-i2rs">http=
s://www.ietf.org/proceedings/93/minutes/minutes-93-i2rs</a><o:p></o:p></p=
><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>Due to =
the lengthy discussion for I2RS on Thursday, the minutes are rather long =
(27 pages of minutes).&nbsp; However, these minutes will be very useful =
in setting up the action items for the following design teams: =
<o:p></o:p></p><p class=3DMsoListParagraph =
style=3D'text-indent:-.25in;mso-list:l0 level1 lfo1'><![if =
!supportLists]><span style=3D'font-family:Symbol'><span =
style=3D'mso-list:Ignore'>&middot;<span style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
</span></span></span><![endif]>Service topology design team, =
<o:p></o:p></p><p class=3DMsoListParagraph =
style=3D'text-indent:-.25in;mso-list:l0 level1 lfo1'><![if =
!supportLists]><span style=3D'font-family:Symbol'><span =
style=3D'mso-list:Ignore'>&middot;<span style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
</span></span></span><![endif]>I2RS protocol design team, =
<o:p></o:p></p><p class=3DMsoListParagraph =
style=3D'text-indent:-.25in;mso-list:l0 level1 lfo1'><![if =
!supportLists]><span style=3D'font-family:Symbol'><span =
style=3D'mso-list:Ignore'>&middot;<span style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
</span></span></span><![endif]>FB-RIB design team, and a =
<o:p></o:p></p><p class=3DMsoListParagraph =
style=3D'text-indent:-.25in;mso-list:l0 level1 lfo1'><![if =
!supportLists]><span style=3D'font-family:Symbol'><span =
style=3D'mso-list:Ignore'>&middot;<span style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
</span></span></span><![endif]>IETF-94 hack-a-thon design. =
<o:p></o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p =
class=3DMsoNormal>These design teams will be busy in 8/17 &#8211; 11/17 =
&#8211; with status reports coming to the I2RS at the I2RS interims. =
<o:p></o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p =
class=3DMsoNormal>Please review the notes.&nbsp; I will post action =
items for each design team based on the Notes on Monday. Please compare =
my action items with what you think the notes said, and respond on the =
list. <o:p></o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p =
class=3DMsoNormal>I ask a favor of those who spoke at the =
microphone.&nbsp; Please check that your name was represented.&nbsp; I =
missed several names &#8211; so I need your help to improve these notes. =
<o:p></o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p =
class=3DMsoNormal>Sue Hares <o:p></o:p></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div></body></html>
------=_NextPart_000_03A1_01D0D74F.796A6B30--


From nobody Sat Aug 15 10:50:33 2015
Return-Path: <jclarke@cisco.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4C6731A1F16; Sat, 15 Aug 2015 10:50:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.511
X-Spam-Level: 
X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TQF58RV3xY-0; Sat, 15 Aug 2015 10:50:30 -0700 (PDT)
Received: from rcdn-iport-2.cisco.com (rcdn-iport-2.cisco.com [173.37.86.73]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8CDBA1A1EF4; Sat, 15 Aug 2015 10:50:30 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=415; q=dns/txt; s=iport; t=1439661030; x=1440870630; h=subject:to:references:cc:from:message-id:date: mime-version:in-reply-to:content-transfer-encoding; bh=URktU9hUjccwDIuSBWIJaoYOdXRVijqjYf7smtFwojQ=; b=loO6vIwLLDbvuhAtLfoGn59K4c38O+uMrJrDUxIxIq6izLFboo0lEBu7 vX2Rc/QWlOy3VOvie9tICCmZeCa0pQHjPKZTX9wqWJzFz4/Za8nJCEVc+ R12SRaBevhQWDMj+T6YB6YGSR7J1tr482ZIHGIGVKe6iGJ49XhfL4lu41 o=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0ArBQDxes9V/49dJa1dgxtUwH+FeQKBLjwQAQEBAQEBAYEKhCQBAQQ4QAEQCw4KCRYPCQMCAQIBRQYBDAgBAYgqDc5sAQEBAQEBAQEBAQEBAQEBAQEBAQEBEwSLUoUJB4QsAQSVHYxsiG2ROiaEGSKCfwEBAQ
X-IronPort-AV: E=Sophos;i="5.15,685,1432598400"; d="scan'208";a="24322058"
Received: from rcdn-core-7.cisco.com ([173.37.93.143]) by rcdn-iport-2.cisco.com with ESMTP; 15 Aug 2015 17:50:29 +0000
Received: from [10.117.46.164] (rtp-jclarke-8913.cisco.com [10.117.46.164]) by rcdn-core-7.cisco.com (8.14.5/8.14.5) with ESMTP id t7FHoT40007345; Sat, 15 Aug 2015 17:50:29 GMT
To: Susan Hares <shares@ndzh.com>, i2rs@ietf.org
References: <03a001d0d771$007a8490$016f8db0$@ndzh.com>
From: Joe Clarke <jclarke@cisco.com>
Organization: Cisco Systems, Inc.
Message-ID: <55CF7BE5.8000905@cisco.com>
Date: Sat, 15 Aug 2015 13:50:29 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:38.0) Gecko/20100101 Thunderbird/38.2.0
MIME-Version: 1.0
In-Reply-To: <03a001d0d771$007a8490$016f8db0$@ndzh.com>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/U92hV4mBpIeWnQ_5RpVOPbXuI9E>
Cc: 'Netconf' <netconf@ietf.org>
Subject: Re: [i2rs] Minutes posted for IETF 93
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 15 Aug 2015 17:50:32 -0000

On 8/15/15 11:42, Susan Hares wrote:
> I2RS WG:
>
> A big thanks to John Messenger and Eric Voit who recorded notes on
> Thursday.
>
> The I2RS minutes are posted at:
>
> https://www.ietf.org/proceedings/93/minutes/minutes-93-i2rs

As a follow on to the traceability+IPSE work, I have already reached out 
to Sami on where there might be interconnect.  I'll keep the list 
informed on progress.

Joe


From nobody Mon Aug 17 10:42:58 2015
Return-Path: <shares@ndzh.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1D5CC1ACDDD for <i2rs@ietfa.amsl.com>; Mon, 17 Aug 2015 10:42:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -96.354
X-Spam-Level: 
X-Spam-Status: No, score=-96.354 tagged_above=-999 required=5 tests=[BAYES_50=0.8, DOS_OUTLOOK_TO_MX=2.845, HTML_MESSAGE=0.001, USER_IN_WHITELIST=-100] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id X1Br1EHXQAKN for <i2rs@ietfa.amsl.com>; Mon, 17 Aug 2015 10:42:55 -0700 (PDT)
Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0338B1ACDEA for <i2rs@ietf.org>; Mon, 17 Aug 2015 10:42:54 -0700 (PDT)
X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=174.124.199.108; 
From: "Susan Hares" <shares@ndzh.com>
To: <i2rs@ietf.org>
Date: Mon, 17 Aug 2015 13:42:52 -0400
Message-ID: <019b01d0d914$24c02590$6e4070b0$@ndzh.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_019C_01D0D8F2.9DB192D0"
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AdDZEzlbg/lhoVOJTZijTrMq3pCI4Q==
Content-Language: en-us
X-Authenticated-User: skh@ndzh.com 
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/vwfRrv9ewtzqtRqKvFxuBW07YkI>
Cc: 'Jeffrey Haas' <jhaas@pfrc.org>
Subject: [i2rs] WG adoption - draft-hares-i2rs-auth-trans-04 (8/17 to 8/31)
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Aug 2015 17:42:57 -0000

This is a multipart message in MIME format.

------=_NextPart_000_019C_01D0D8F2.9DB192D0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit

This is a 2 week WG adoption call for the draft-hares-i2rs-auth-trans-04.txt
which provides the security requirements for the I2RS protocol.  

 

To be adopted, this draft does not need to be perfect, but a good direction
for the I2RS protocol security. 

 

Please note that Juergen's review of this draft has the following feedback:

.       Requirements 1, 2, 5, 6, 7, 9, 11, 13, 14, 15, 16, 18, 19, 20 - were
ok, 

.       Editorial requirements 3 and 4 need clarifications on words, and
requirement 10 is ambiguous, and 

.       Requirements 8, 12, and the multiple message sequence (was req-17)
are not security protocols, 

.       Technical question: Why should we support an insecure protocol. 

 

A security directorate reviewer will review this draft starting on 8/20.  I
will post these reviews and the document changes.  Please suggest changes to
requirement 3, 4, and 10; and if I2RS should support an insecure protocol. 

 

Once we get the security reviewers feedback on 8, 12, and the multiple
messages - I will post the feedback and we'll discuss real time. 

 

Sue Hares 

 


------=_NextPart_000_019C_01D0D8F2.9DB192D0
Content-Type: text/html;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><META =
HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Dus-ascii"><meta name=3DGenerator content=3D"Microsoft Word 14 =
(filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri","sans-serif";}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:191501893;
	mso-list-type:hybrid;
	mso-list-template-ids:112877596 -1481069822 -435412656 1725966378 =
1582492244 618430874 1839903306 1257410356 1168773564 -777858306;}
@list l0:level1
	{mso-level-number-format:bullet;
	mso-level-text:\2022;
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Arial","sans-serif";
	mso-bidi-font-family:"Times New Roman";}
@list l0:level2
	{mso-level-number-format:bullet;
	mso-level-text:\2022;
	mso-level-tab-stop:1.0in;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Arial","sans-serif";
	mso-bidi-font-family:"Times New Roman";}
@list l0:level3
	{mso-level-number-format:bullet;
	mso-level-text:\2022;
	mso-level-tab-stop:1.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Arial","sans-serif";
	mso-bidi-font-family:"Times New Roman";}
@list l0:level4
	{mso-level-number-format:bullet;
	mso-level-text:\2022;
	mso-level-tab-stop:2.0in;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Arial","sans-serif";
	mso-bidi-font-family:"Times New Roman";}
@list l0:level5
	{mso-level-number-format:bullet;
	mso-level-text:\2022;
	mso-level-tab-stop:2.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Arial","sans-serif";
	mso-bidi-font-family:"Times New Roman";}
@list l0:level6
	{mso-level-number-format:bullet;
	mso-level-text:\2022;
	mso-level-tab-stop:3.0in;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Arial","sans-serif";
	mso-bidi-font-family:"Times New Roman";}
@list l0:level7
	{mso-level-number-format:bullet;
	mso-level-text:\2022;
	mso-level-tab-stop:3.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Arial","sans-serif";
	mso-bidi-font-family:"Times New Roman";}
@list l0:level8
	{mso-level-number-format:bullet;
	mso-level-text:\2022;
	mso-level-tab-stop:4.0in;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Arial","sans-serif";
	mso-bidi-font-family:"Times New Roman";}
@list l0:level9
	{mso-level-number-format:bullet;
	mso-level-text:\2022;
	mso-level-tab-stop:4.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Arial","sans-serif";
	mso-bidi-font-family:"Times New Roman";}
@list l1
	{mso-list-id:542139783;
	mso-list-type:hybrid;
	mso-list-template-ids:1363721814 -1914295934 -744313986 1794022898 =
-1170072660 522996194 -230138580 -178255518 1449057226 1708455556;}
@list l1:level1
	{mso-level-number-format:bullet;
	mso-level-text:\2022;
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Arial","sans-serif";
	mso-bidi-font-family:"Times New Roman";}
@list l1:level2
	{mso-level-number-format:bullet;
	mso-level-text:\2022;
	mso-level-tab-stop:1.0in;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Arial","sans-serif";
	mso-bidi-font-family:"Times New Roman";}
@list l1:level3
	{mso-level-number-format:bullet;
	mso-level-text:\2022;
	mso-level-tab-stop:1.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Arial","sans-serif";
	mso-bidi-font-family:"Times New Roman";}
@list l1:level4
	{mso-level-number-format:bullet;
	mso-level-text:\2022;
	mso-level-tab-stop:2.0in;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Arial","sans-serif";
	mso-bidi-font-family:"Times New Roman";}
@list l1:level5
	{mso-level-number-format:bullet;
	mso-level-text:\2022;
	mso-level-tab-stop:2.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Arial","sans-serif";
	mso-bidi-font-family:"Times New Roman";}
@list l1:level6
	{mso-level-number-format:bullet;
	mso-level-text:\2022;
	mso-level-tab-stop:3.0in;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Arial","sans-serif";
	mso-bidi-font-family:"Times New Roman";}
@list l1:level7
	{mso-level-number-format:bullet;
	mso-level-text:\2022;
	mso-level-tab-stop:3.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Arial","sans-serif";
	mso-bidi-font-family:"Times New Roman";}
@list l1:level8
	{mso-level-number-format:bullet;
	mso-level-text:\2022;
	mso-level-tab-stop:4.0in;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Arial","sans-serif";
	mso-bidi-font-family:"Times New Roman";}
@list l1:level9
	{mso-level-number-format:bullet;
	mso-level-text:\2022;
	mso-level-tab-stop:4.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Arial","sans-serif";
	mso-bidi-font-family:"Times New Roman";}
@list l2
	{mso-list-id:1061754986;
	mso-list-type:hybrid;
	mso-list-template-ids:-1291652102 1716403368 1198045858 1880513082 =
-71168584 -1438584468 1375513852 -171559164 -220578074 -2040263562;}
@list l2:level1
	{mso-level-number-format:bullet;
	mso-level-text:\2022;
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Arial","sans-serif";
	mso-bidi-font-family:"Times New Roman";}
@list l2:level2
	{mso-level-number-format:bullet;
	mso-level-text:\2022;
	mso-level-tab-stop:1.0in;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Arial","sans-serif";
	mso-bidi-font-family:"Times New Roman";}
@list l2:level3
	{mso-level-number-format:bullet;
	mso-level-text:\2022;
	mso-level-tab-stop:1.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Arial","sans-serif";
	mso-bidi-font-family:"Times New Roman";}
@list l2:level4
	{mso-level-number-format:bullet;
	mso-level-text:\2022;
	mso-level-tab-stop:2.0in;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Arial","sans-serif";
	mso-bidi-font-family:"Times New Roman";}
@list l2:level5
	{mso-level-number-format:bullet;
	mso-level-text:\2022;
	mso-level-tab-stop:2.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Arial","sans-serif";
	mso-bidi-font-family:"Times New Roman";}
@list l2:level6
	{mso-level-number-format:bullet;
	mso-level-text:\2022;
	mso-level-tab-stop:3.0in;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Arial","sans-serif";
	mso-bidi-font-family:"Times New Roman";}
@list l2:level7
	{mso-level-number-format:bullet;
	mso-level-text:\2022;
	mso-level-tab-stop:3.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Arial","sans-serif";
	mso-bidi-font-family:"Times New Roman";}
@list l2:level8
	{mso-level-number-format:bullet;
	mso-level-text:\2022;
	mso-level-tab-stop:4.0in;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Arial","sans-serif";
	mso-bidi-font-family:"Times New Roman";}
@list l2:level9
	{mso-level-number-format:bullet;
	mso-level-text:\2022;
	mso-level-tab-stop:4.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Arial","sans-serif";
	mso-bidi-font-family:"Times New Roman";}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue =
vlink=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal>This is a =
2 week WG adoption call for the draft-hares-i2rs-auth-trans-04.txt which =
provides the security requirements for the I2RS protocol. =
&nbsp;<o:p></o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p =
class=3DMsoNormal>To be adopted, this draft does not need to be perfect, =
but a good direction for the I2RS protocol security. <o:p></o:p></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>Please note =
that Juergen&#8217;s review of this draft has the following =
feedback:<o:p></o:p></p><p class=3DMsoNormal =
style=3D'margin-left:.5in;text-indent:-.25in;mso-list:l0 level1 =
lfo1'><![if !supportLists]><span =
style=3D'font-family:"Arial","sans-serif"'><span =
style=3D'mso-list:Ignore'>&#8226;<span style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
</span></span></span><![endif]>Requirements 1, 2, 5, 6, 7, 9, 11, 13, =
14, 15, 16, 18, 19, 20 &#8211; were ok, <o:p></o:p></p><p =
class=3DMsoNormal =
style=3D'margin-left:.5in;text-indent:-.25in;mso-list:l0 level1 =
lfo1'><![if !supportLists]><span =
style=3D'font-family:"Arial","sans-serif"'><span =
style=3D'mso-list:Ignore'>&#8226;<span style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
</span></span></span><![endif]>Editorial requirements 3 and 4 need =
clarifications on words, and requirement 10 is ambiguous, and =
<o:p></o:p></p><p class=3DMsoNormal =
style=3D'margin-left:.5in;text-indent:-.25in;mso-list:l0 level1 =
lfo1'><![if !supportLists]><span =
style=3D'font-family:"Arial","sans-serif"'><span =
style=3D'mso-list:Ignore'>&#8226;<span style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
</span></span></span><![endif]>Requirements 8, 12, and the multiple =
message sequence (was req-17) are not security protocols, =
<o:p></o:p></p><p class=3DMsoNormal =
style=3D'margin-left:.5in;text-indent:-.25in;mso-list:l0 level1 =
lfo1'><![if !supportLists]><span =
style=3D'font-family:"Arial","sans-serif"'><span =
style=3D'mso-list:Ignore'>&#8226;<span style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
</span></span></span><![endif]>Technical question: Why should we support =
an insecure protocol. <o:p></o:p></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>A security =
directorate reviewer will review this draft starting on 8/20.&nbsp; I =
will post these reviews and the document changes. &nbsp;Please suggest =
changes to requirement 3, 4, and 10; and if I2RS should support an =
insecure protocol. <o:p></o:p></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>Once we get =
the security reviewers feedback on 8, 12, and the multiple messages =
&#8211; I will post the feedback and we&#8217;ll discuss real time. =
<o:p></o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p =
class=3DMsoNormal><b>Sue Hares </b><o:p></o:p></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div></body></html>
------=_NextPart_000_019C_01D0D8F2.9DB192D0--


From nobody Mon Aug 17 10:49:43 2015
Return-Path: <shares@ndzh.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 309081ACDC9 for <i2rs@ietfa.amsl.com>; Mon, 17 Aug 2015 10:49:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -96.354
X-Spam-Level: 
X-Spam-Status: No, score=-96.354 tagged_above=-999 required=5 tests=[BAYES_50=0.8, DOS_OUTLOOK_TO_MX=2.845, HTML_MESSAGE=0.001, USER_IN_WHITELIST=-100] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MbkdHmAC0D0I for <i2rs@ietfa.amsl.com>; Mon, 17 Aug 2015 10:49:39 -0700 (PDT)
Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C03E61ACDBC for <i2rs@ietf.org>; Mon, 17 Aug 2015 10:49:39 -0700 (PDT)
X-Default-Received-SPF: pass (skip=forwardok (res=PASS)) x-ip-name=174.124.199.108; 
From: "Susan Hares" <shares@ndzh.com>
To: <i2rs@ietf.org>
Date: Mon, 17 Aug 2015 13:49:33 -0400
Message-ID: <01a801d0d915$1558b4e0$400a1ea0$@ndzh.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_01A9_01D0D8F3.8E489B80"
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AdDZFQfGZ2x8EJ+fRrOcN4ltvsrslg==
Content-Language: en-us
X-Authenticated-User: skh@ndzh.com 
X-IsFriend: <shares@ndzh.com>
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/wwv1o8_mwurB05dN4D2yjr9tNFg>
Cc: 'Jeffrey Haas' <jhaas@pfrc.org>, daniel.migault@ericsson.com, 'Joel Halpern' <jmh@joelhalpern.com>, shares@ndzh.com, 'Alia Atlas' <akatlas@gmail.com>
Subject: [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG adoption call (8/17 to 8/31)
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Aug 2015 17:49:41 -0000

This is a multipart message in MIME format.

------=_NextPart_000_01A9_01D0D8F3.8E489B80
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit

This begins a 2 week WG adoption call for
draft-mglt-i2rs-security-requirements.  This draft discusses the security
requirements for the I2RS environment.  You can find the draft at:

 

https://tools.ietf.org/html/draft-mglt-i2rs-security-environment-reqs-00

 

A security reviewer will review this draft during the time 8/20 to 8/25.
We will post the security directorate review to this discussion. 

 

Sue Hares 

 


------=_NextPart_000_01A9_01D0D8F3.8E489B80
Content-Type: text/html;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><META =
HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Dus-ascii"><meta name=3DGenerator content=3D"Microsoft Word 14 =
(filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri","sans-serif";}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue =
vlink=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal>This =
begins a 2 week WG adoption call for =
draft-mglt-i2rs-security-requirements.&nbsp; This draft discusses the =
security requirements for the I2RS environment. &nbsp;You can find the =
draft at:<o:p></o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p =
class=3DMsoNormal><a =
href=3D"https://tools.ietf.org/html/draft-mglt-i2rs-security-environment-=
reqs-00">https://tools.ietf.org/html/draft-mglt-i2rs-security-environment=
-reqs-00</a><o:p></o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p =
class=3DMsoNormal>A security reviewer will review this draft during the =
time 8/20 to 8/25.&nbsp;&nbsp; We will post the security directorate =
review to this discussion. <o:p></o:p></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>Sue Hares =
<o:p></o:p></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div></body></html>
------=_NextPart_000_01A9_01D0D8F3.8E489B80--


From nobody Mon Aug 17 10:51:12 2015
Return-Path: <iesg-secretary@ietf.org>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3900A1ACDE4; Mon, 17 Aug 2015 10:51:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.9
X-Spam-Level: 
X-Spam-Status: No, score=-101.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, USER_IN_WHITELIST=-100] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SsdjlqnF10Gd; Mon, 17 Aug 2015 10:51:09 -0700 (PDT)
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 7204A1ACDC4; Mon, 17 Aug 2015 10:51:09 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: IESG Secretary <iesg-secretary@ietf.org>
To: "IETF Announcement List" <ietf-announce@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 6.4.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <20150817175109.31441.13974.idtracker@ietfa.amsl.com>
Date: Mon, 17 Aug 2015 10:51:09 -0700
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/5bQ7I_-WNA0ln3RT_-1M9l9wh3E>
Cc: i2rs@ietf.org
Subject: [i2rs] I2RS WG Virtual Interim Meetings
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Reply-To: ietf@ietf.org
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Aug 2015 17:51:10 -0000

The Interface to the Routing System (I2RS) Working Group will hold a 
series of virtual interim meetings as follows:

2015-09-02: 22:00 - 23:30 ET 
Service Data Model and Filter-Based RIBS

2015-09-16: 10:00 - 11:30 ET 
I2RS Protocol Definition status + Draft status

2015-09-30: 10:00 - 11:30 ET 
Plans for IETF hack-a-thon + All Data Models

2015-10-07: 10:00 - 11:30 ET 
I2rs Protocol Creation Status

2015-10-21: 10:00 - 11:30 ET 
Final Details for I2RS Protocol and IETF hack-a-thon on I2RS

WebEx details will follow on the I2RS mailing list.


From nobody Mon Aug 17 10:54:28 2015
Return-Path: <j.schoenwaelder@jacobs-university.de>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9D99D1ACDED for <i2rs@ietfa.amsl.com>; Mon, 17 Aug 2015 10:54:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.86
X-Spam-Level: 
X-Spam-Status: No, score=-3.86 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_EQ_DE=0.35, RCVD_IN_DNSWL_MED=-2.3, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3CFgHB3FeVqe for <i2rs@ietfa.amsl.com>; Mon, 17 Aug 2015 10:54:25 -0700 (PDT)
Received: from atlas3.jacobs-university.de (atlas3.jacobs-university.de [212.201.44.18]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 99F701ACDDF for <i2rs@ietf.org>; Mon, 17 Aug 2015 10:54:25 -0700 (PDT)
Received: from localhost (demetrius5.irc-it.jacobs-university.de [10.70.0.222]) by atlas3.jacobs-university.de (Postfix) with ESMTP id 1670AF7B; Mon, 17 Aug 2015 19:54:24 +0200 (CEST)
X-Virus-Scanned: amavisd-new at jacobs-university.de
Received: from atlas3.jacobs-university.de ([10.70.0.220]) by localhost (demetrius5.jacobs-university.de [10.70.0.222]) (amavisd-new, port 10030) with ESMTP id avyxWnVQt-ou; Mon, 17 Aug 2015 19:54:23 +0200 (CEST)
Received: from hermes.jacobs-university.de (hermes.jacobs-university.de [212.201.44.23]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "hermes.jacobs-university.de", Issuer "Jacobs University CA - G01" (verified OK)) by atlas3.jacobs-university.de (Postfix) with ESMTPS; Mon, 17 Aug 2015 19:54:23 +0200 (CEST)
Received: from localhost (demetrius2.jacobs-university.de [212.201.44.47]) by hermes.jacobs-university.de (Postfix) with ESMTP id 624672005C; Mon, 17 Aug 2015 19:54:23 +0200 (CEST)
X-Virus-Scanned: amavisd-new at jacobs-university.de
Received: from hermes.jacobs-university.de ([212.201.44.23]) by localhost (demetrius2.jacobs-university.de [212.201.44.32]) (amavisd-new, port 10024) with ESMTP id wm_Rq1DgVYMG; Mon, 17 Aug 2015 19:54:22 +0200 (CEST)
Received: from elstar.local (elstar.jacobs.jacobs-university.de [10.50.231.133]) by hermes.jacobs-university.de (Postfix) with ESMTP id BCECD20058; Mon, 17 Aug 2015 19:54:21 +0200 (CEST)
Received: by elstar.local (Postfix, from userid 501) id 095A53654A12; Mon, 17 Aug 2015 19:54:17 +0200 (CEST)
Date: Mon, 17 Aug 2015 19:54:17 +0200
From: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
To: Susan Hares <shares@ndzh.com>
Message-ID: <20150817175417.GA65489@elstar.local>
Mail-Followup-To: Susan Hares <shares@ndzh.com>, i2rs@ietf.org, 'Jeffrey Haas' <jhaas@pfrc.org>, daniel.migault@ericsson.com, 'Joel Halpern' <jmh@joelhalpern.com>, 'Alia Atlas' <akatlas@gmail.com>
References: <01a801d0d915$1558b4e0$400a1ea0$@ndzh.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <01a801d0d915$1558b4e0$400a1ea0$@ndzh.com>
User-Agent: Mutt/1.4.2.3i
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/-ZbYWkI3cJJHuAOdpoDwJL_UTPw>
Cc: 'Jeffrey Haas' <jhaas@pfrc.org>, i2rs@ietf.org, daniel.migault@ericsson.com, 'Joel Halpern' <jmh@joelhalpern.com>, 'Alia Atlas' <akatlas@gmail.com>
Subject: Re: [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG adoption call (8/17 to 8/31)
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Aug 2015 17:54:27 -0000

On Mon, Aug 17, 2015 at 01:49:33PM -0400, Susan Hares wrote:
> This begins a 2 week WG adoption call for
> draft-mglt-i2rs-security-requirements.  This draft discusses the security
> requirements for the I2RS environment.  You can find the draft at:
> 
>  
> 
> https://tools.ietf.org/html/draft-mglt-i2rs-security-environment-reqs-00
> 
>  
> 
> A security reviewer will review this draft during the time 8/20 to 8/25.
> We will post the security directorate review to this discussion. 
>

I believe there should be at max 1 I2RS security requirements document
to avoid overlap and thus to improve overall document review and
processing efficiency.

/js

-- 
Juergen Schoenwaelder           Jacobs University Bremen gGmbH
Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
Fax:   +49 421 200 3103         <http://www.jacobs-university.de/>


From nobody Mon Aug 17 11:02:24 2015
Return-Path: <jclarke@cisco.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 433DA1ACE3C for <i2rs@ietfa.amsl.com>; Mon, 17 Aug 2015 11:02:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.511
X-Spam-Level: 
X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aNWuxN9eKGyv for <i2rs@ietfa.amsl.com>; Mon, 17 Aug 2015 11:02:17 -0700 (PDT)
Received: from rcdn-iport-6.cisco.com (rcdn-iport-6.cisco.com [173.37.86.77]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8E9011ACE37 for <i2rs@ietf.org>; Mon, 17 Aug 2015 11:02:17 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=502; q=dns/txt; s=iport; t=1439834537; x=1441044137; h=subject:to:references:cc:from:message-id:date: mime-version:in-reply-to:content-transfer-encoding; bh=R4r+TFJIf7h8XqVB/A9zSA56xgOYjFfarjN60JGv4+s=; b=ZO+flFG4oUaAeoneRq3P4bvcyGW91v7SLuXEhutrXtnlI0kUEOyZ2l0H Wbd/8kEquDJLrXdbeOnqsJdQjgzKZO8yO1JkS5MqYO76e3Cy39H2heuA9 eefTwgGhjOMGEexKBQe8ExAUq5C/zTf2R2/XnHFGyAf66Hk/QHWV6+TXx U=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0B4AgA0IdJV/49dJa1dgxtUvlcBCYF3hXcCgTE4FAEBAQEBAQGBCoQkAQEEHRtAARALDgoJFg8JAwIBAgFFBgEMCAEBiCoN0SkBAQEBAQEBAQEBAQEBAQEBAQEBAQETBItShQkHhCwBBJUdhQSHaIhtkTomgj+BWiKCfwEBAQ
X-IronPort-AV: E=Sophos;i="5.15,696,1432598400"; d="scan'208";a="21224056"
Received: from rcdn-core-7.cisco.com ([173.37.93.143]) by rcdn-iport-6.cisco.com with ESMTP; 17 Aug 2015 18:02:16 +0000
Received: from [10.117.46.164] (rtp-jclarke-8913.cisco.com [10.117.46.164]) by rcdn-core-7.cisco.com (8.14.5/8.14.5) with ESMTP id t7HI2Gxx020875; Mon, 17 Aug 2015 18:02:16 GMT
To: Susan Hares <shares@ndzh.com>, i2rs@ietf.org
References: <01a801d0d915$1558b4e0$400a1ea0$@ndzh.com>
From: Joe Clarke <jclarke@cisco.com>
Organization: Cisco Systems, Inc.
Message-ID: <55D221A8.5040603@cisco.com>
Date: Mon, 17 Aug 2015 14:02:16 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:38.0) Gecko/20100101 Thunderbird/38.2.0
MIME-Version: 1.0
In-Reply-To: <01a801d0d915$1558b4e0$400a1ea0$@ndzh.com>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/fFX7z74lS_4gTC9fHK18VSEvBGM>
Cc: 'Jeffrey Haas' <jhaas@pfrc.org>, daniel.migault@ericsson.com, 'Joel Halpern' <jmh@joelhalpern.com>, 'Alia Atlas' <akatlas@gmail.com>
Subject: Re: [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG adoption call (8/17 to 8/31)
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Aug 2015 18:02:22 -0000

On 8/17/15 13:49, Susan Hares wrote:
> This begins a 2 week WG adoption call for
> draft-mglt-i2rs-security-requirements.  This draft discusses the
> security requirements for the I2RS environment.  You can find the draft at:
>
> https://tools.ietf.org/html/draft-mglt-i2rs-security-environment-reqs-00
>
> A security reviewer will review this draft during the time 8/20 to
> 8/25.   We will post the security directorate review to this discussion.

I support adoption of this draft.

Joe


From nobody Mon Aug 17 11:04:34 2015
Return-Path: <shares@ndzh.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 757511ACE3C for <i2rs@ietfa.amsl.com>; Mon, 17 Aug 2015 11:04:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -99.055
X-Spam-Level: 
X-Spam-Status: No, score=-99.055 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DOS_OUTLOOK_TO_MX=2.845, USER_IN_WHITELIST=-100] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cwiyYatnYljm for <i2rs@ietfa.amsl.com>; Mon, 17 Aug 2015 11:04:32 -0700 (PDT)
Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6275D1ACE0A for <i2rs@ietf.org>; Mon, 17 Aug 2015 11:04:32 -0700 (PDT)
X-Default-Received-SPF: pass (skip=forwardok (res=PASS)) x-ip-name=174.124.199.108; 
From: "Susan Hares" <shares@ndzh.com>
To: "'Juergen Schoenwaelder'" <j.schoenwaelder@jacobs-university.de>
References: <01a801d0d915$1558b4e0$400a1ea0$@ndzh.com> <20150817175417.GA65489@elstar.local>
In-Reply-To: <20150817175417.GA65489@elstar.local>
Date: Mon, 17 Aug 2015 14:04:22 -0400
Message-ID: <01d701d0d917$25e23000$71a69000$@ndzh.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQGnzkX7E0ureH0U9OjgTsVHj87UVwK9Mm0Hnkync8A=
Content-Language: en-us
X-Authenticated-User: skh@ndzh.com 
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/kiIQT02nrDgFZa4zKD5Wtu_ss_k>
Cc: 'Jeffrey Haas' <jhaas@pfrc.org>, i2rs@ietf.org, daniel.migault@ericsson.com, 'Joel Halpern' <jmh@joelhalpern.com>, 'Alia Atlas' <akatlas@gmail.com>
Subject: Re: [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG adoption call (8/17 to 8/31)
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Aug 2015 18:04:33 -0000

Juergen: 

Normally, I would agree with you.  However, these environmental security
issues are not directed at the I2RS protocol but the environment.  I thought
it would be clearer to have this split so the I2RS protocol development work
would not need to considered these hard requirements for the protocol. 

Sue 

-----Original Message-----
From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Juergen Schoenwaelder
Sent: Monday, August 17, 2015 1:54 PM
To: Susan Hares
Cc: 'Jeffrey Haas'; i2rs@ietf.org; daniel.migault@ericsson.com; 'Joel
Halpern'; 'Alia Atlas'
Subject: Re: [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG
adoption call (8/17 to 8/31)

On Mon, Aug 17, 2015 at 01:49:33PM -0400, Susan Hares wrote:
> This begins a 2 week WG adoption call for 
> draft-mglt-i2rs-security-requirements.  This draft discusses the 
> security requirements for the I2RS environment.  You can find the draft
at:
> 
>  
> 
> https://tools.ietf.org/html/draft-mglt-i2rs-security-environment-reqs-
> 00
> 
>  
> 
> A security reviewer will review this draft during the time 8/20 to 8/25.
> We will post the security directorate review to this discussion. 
>

I believe there should be at max 1 I2RS security requirements document to
avoid overlap and thus to improve overall document review and processing
efficiency.

/js

-- 
Juergen Schoenwaelder           Jacobs University Bremen gGmbH
Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
Fax:   +49 421 200 3103         <http://www.jacobs-university.de/>

_______________________________________________
i2rs mailing list
i2rs@ietf.org
https://www.ietf.org/mailman/listinfo/i2rs


From nobody Mon Aug 17 11:28:28 2015
Return-Path: <jmh@joelhalpern.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D5B891B2EBA for <i2rs@ietfa.amsl.com>; Mon, 17 Aug 2015 11:28:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.602
X-Spam-Level: 
X-Spam-Status: No, score=-2.602 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id h_PBWkIKsfRx for <i2rs@ietfa.amsl.com>; Mon, 17 Aug 2015 11:28:26 -0700 (PDT)
Received: from mailb2.tigertech.net (mailb2.tigertech.net [208.80.4.154]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 27CC31B2EB4 for <i2rs@ietf.org>; Mon, 17 Aug 2015 11:28:26 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mailb2.tigertech.net (Postfix) with ESMTP id 04AF1740304; Mon, 17 Aug 2015 11:28:26 -0700 (PDT)
X-Virus-Scanned: Debian amavisd-new at b2.tigertech.net
Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mailb2.tigertech.net (Postfix) with ESMTPSA id 58FA974030A; Mon, 17 Aug 2015 11:28:25 -0700 (PDT)
To: Susan Hares <shares@ndzh.com>, i2rs@ietf.org
References: <01a801d0d915$1558b4e0$400a1ea0$@ndzh.com>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <55D227C8.3080005@joelhalpern.com>
Date: Mon, 17 Aug 2015 14:28:24 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:38.0) Gecko/20100101 Thunderbird/38.2.0
MIME-Version: 1.0
In-Reply-To: <01a801d0d915$1558b4e0$400a1ea0$@ndzh.com>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/VMmrJGuxOghvd6yzbD08zXj_hX8>
Cc: 'Jeffrey Haas' <jhaas@pfrc.org>, daniel.migault@ericsson.com, 'Alia Atlas' <akatlas@gmail.com>
Subject: Re: [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG adoption call (8/17 to 8/31)
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Aug 2015 18:28:28 -0000

As a co-author, I believe this document is ready for Working Group 
Adoption.  Looking forward to comments on how to improve the document.

Yours,
Joel

On 8/17/15 1:49 PM, Susan Hares wrote:
> This begins a 2 week WG adoption call for
> draft-mglt-i2rs-security-requirements.  This draft discusses the
> security requirements for the I2RS environment.  You can find the draft at:
>
> https://tools.ietf.org/html/draft-mglt-i2rs-security-environment-reqs-00
>
> A security reviewer will review this draft during the time 8/20 to
> 8/25.   We will post the security directorate review to this discussion.
>
> Sue Hares
>


From nobody Mon Aug 17 11:34:45 2015
Return-Path: <j.schoenwaelder@jacobs-university.de>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1E7BE1A88AB for <i2rs@ietfa.amsl.com>; Mon, 17 Aug 2015 11:34:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.86
X-Spam-Level: 
X-Spam-Status: No, score=-3.86 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_EQ_DE=0.35, RCVD_IN_DNSWL_MED=-2.3, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cTDmQYdWNE22 for <i2rs@ietfa.amsl.com>; Mon, 17 Aug 2015 11:34:43 -0700 (PDT)
Received: from atlas3.jacobs-university.de (atlas3.jacobs-university.de [212.201.44.18]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C35781A8896 for <i2rs@ietf.org>; Mon, 17 Aug 2015 11:34:43 -0700 (PDT)
Received: from localhost (demetrius5.irc-it.jacobs-university.de [10.70.0.222]) by atlas3.jacobs-university.de (Postfix) with ESMTP id 8809DFB0; Mon, 17 Aug 2015 20:34:42 +0200 (CEST)
X-Virus-Scanned: amavisd-new at jacobs-university.de
Received: from atlas3.jacobs-university.de ([10.70.0.220]) by localhost (demetrius5.jacobs-university.de [10.70.0.222]) (amavisd-new, port 10030) with ESMTP id ADH7c79-xeSC; Mon, 17 Aug 2015 20:34:41 +0200 (CEST)
Received: from hermes.jacobs-university.de (hermes.jacobs-university.de [212.201.44.23]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "hermes.jacobs-university.de", Issuer "Jacobs University CA - G01" (verified OK)) by atlas3.jacobs-university.de (Postfix) with ESMTPS; Mon, 17 Aug 2015 20:34:41 +0200 (CEST)
Received: from localhost (demetrius3.jacobs-university.de [212.201.44.48]) by hermes.jacobs-university.de (Postfix) with ESMTP id 7531C20054; Mon, 17 Aug 2015 20:34:41 +0200 (CEST)
X-Virus-Scanned: amavisd-new at jacobs-university.de
Received: from hermes.jacobs-university.de ([212.201.44.23]) by localhost (demetrius3.jacobs-university.de [212.201.44.32]) (amavisd-new, port 10024) with ESMTP id sPAz-l1qttm4; Mon, 17 Aug 2015 20:34:40 +0200 (CEST)
Received: from elstar.local (elstar.jacobs.jacobs-university.de [10.50.231.133]) by hermes.jacobs-university.de (Postfix) with ESMTP id 23A0120053; Mon, 17 Aug 2015 20:34:40 +0200 (CEST)
Received: by elstar.local (Postfix, from userid 501) id 76E0F3654B39; Mon, 17 Aug 2015 20:34:36 +0200 (CEST)
Date: Mon, 17 Aug 2015 20:34:36 +0200
From: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
To: Susan Hares <shares@ndzh.com>
Message-ID: <20150817183435.GA65596@elstar.local>
Mail-Followup-To: Susan Hares <shares@ndzh.com>, 'Jeffrey Haas' <jhaas@pfrc.org>, i2rs@ietf.org, daniel.migault@ericsson.com, 'Joel Halpern' <jmh@joelhalpern.com>, 'Alia Atlas' <akatlas@gmail.com>
References: <01a801d0d915$1558b4e0$400a1ea0$@ndzh.com> <20150817175417.GA65489@elstar.local> <01d701d0d917$25e23000$71a69000$@ndzh.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <01d701d0d917$25e23000$71a69000$@ndzh.com>
User-Agent: Mutt/1.4.2.3i
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/GVQKYWRo0i_dJ1Bv6h9P_nRhdHw>
Cc: 'Jeffrey Haas' <jhaas@pfrc.org>, i2rs@ietf.org, daniel.migault@ericsson.com, 'Joel Halpern' <jmh@joelhalpern.com>, 'Alia Atlas' <akatlas@gmail.com>
Subject: Re: [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG adoption call (8/17 to 8/31)
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Aug 2015 18:34:45 -0000

On Mon, Aug 17, 2015 at 02:04:22PM -0400, Susan Hares wrote:
> Juergen: 
> 
> Normally, I would agree with you.  However, these environmental security
> issues are not directed at the I2RS protocol but the environment.  I thought
> it would be clearer to have this split so the I2RS protocol development work
> would not need to considered these hard requirements for the protocol. 
>

I reviewed both documents before the last IETF meeting and I believe
one document is all that is needed.

/js

-- 
Juergen Schoenwaelder           Jacobs University Bremen gGmbH
Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
Fax:   +49 421 200 3103         <http://www.jacobs-university.de/>


From nobody Mon Aug 17 11:39:09 2015
Return-Path: <jeff.tantsura@ericsson.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 35DB41ACDDA for <i2rs@ietfa.amsl.com>; Mon, 17 Aug 2015 11:39:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vlPjx8bwFX9t for <i2rs@ietfa.amsl.com>; Mon, 17 Aug 2015 11:39:06 -0700 (PDT)
Received: from usevmg21.ericsson.net (usevmg21.ericsson.net [198.24.6.65]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BCF071A889F for <i2rs@ietf.org>; Mon, 17 Aug 2015 11:39:06 -0700 (PDT)
X-AuditID: c6180641-f792c6d00000686a-40-55d1c0e5ce87
Received: from EUSAAHC003.ericsson.se (Unknown_Domain [147.117.188.81]) by usevmg21.ericsson.net (Symantec Mail Security) with SMTP id 09.51.26730.5E0C1D55; Mon, 17 Aug 2015 13:09:25 +0200 (CEST)
Received: from EUSAAMB109.ericsson.se ([147.117.188.126]) by EUSAAHC003.ericsson.se ([147.117.188.81]) with mapi id 14.03.0210.002; Mon, 17 Aug 2015 14:39:05 -0400
From: Jeff Tantsura <jeff.tantsura@ericsson.com>
To: Susan Hares <shares@ndzh.com>
Thread-Topic: [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG adoption call (8/17 to 8/31)
Thread-Index: AdDZFQfGZ2x8EJ+fRrOcN4ltvsrslgABvZGr
Date: Mon, 17 Aug 2015 18:39:04 +0000
Message-ID: <A65814AF-1B14-4CDD-9D39-F23FA8493AA9@ericsson.com>
References: <01a801d0d915$1558b4e0$400a1ea0$@ndzh.com>
In-Reply-To: <01a801d0d915$1558b4e0$400a1ea0$@ndzh.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Content-Type: multipart/alternative; boundary="_000_A65814AF1B144CDD9D39F23FA8493AA9ericssoncom_"
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFupmkeLIzCtJLcpLzFFi42KZXLonUPfpgYuhBqdnWFl8eniJ2WLdjA8s FvsPvmW1+HjqDZPFnzevWBxYPXbOusvusWTJTyaPc1O+M3rMfn2d1eNy71bWANYoLpuU1JzM stQifbsErow3Ew8xFdySq3j5pI2tgbFZuouRg0NCwESi4aB3FyMnkCkmceHeerYuRi4OIYGj jBKzW4+xQzjLGSX+TjzBDFLFJmAg8f/bcRYQW0RAUeLI1XVgRcwCuxglJlzeyg6SEBZIldi2 8wZUUZrE1K09rBC2kcTSG21gcRYBVYnjm26D2bwC9hKz7u4G6xUSMJP49HY/WD2ngLnEjTvH wOKMQOd9P7WGCcRmFhCXuPVkPhPE2QISS/acZ4awRSVePv7HClGTLLH84DV2iPmCEidnPmGZ wCgyC0n7LCRls5CUQcR1JBbs/sQGYWtLLFv4mhnGPnPgMROy+AJG9lWMHKXFqWW56UaGmxiB sXdMgs1xB+OCT5aHGAU4GJV4eBOmXwgVYk0sK67MPcQozcGiJM4r7ZcXKiSQnliSmp2aWpBa FF9UmpNafIiRiYNTqoHRJDigRWzBpPzssyk68nF6Lo3qF+Y9/BKz4NaNs2YvbOTfS1h/eT1b /XzP41a5X5zxVoHXPnEG/OPr3OZW9a6bu0u7NfhTWt6E4Lb8wkTpScybw0//y/A9MfPL8rcc M99/5tNdNp1nsX3ckeDmY/8b+vc8UD2tKZDXv+d4A2OHxXrRw6/sk2YosRRnJBpqMRcVJwIA kotUzZ4CAAA=
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/i8GbxEOzWqdgfHdW7Ua3hOH_F3w>
Cc: Jeffrey Haas <jhaas@pfrc.org>, "i2rs@ietf.org" <i2rs@ietf.org>, Daniel Migault <daniel.migault@ericsson.com>, Joel Halpern <jmh@joelhalpern.com>, Alia Atlas <akatlas@gmail.com>
Subject: Re: [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG adoption call (8/17 to 8/31)
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Aug 2015 18:39:08 -0000

--_000_A65814AF1B144CDD9D39F23FA8493AA9ericssoncom_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Yes/support

Regards,
Jeff

On Aug 17, 2015, at 10:49 AM, Susan Hares <shares@ndzh.com<mailto:shares@nd=
zh.com>> wrote:

This begins a 2 week WG adoption call for draft-mglt-i2rs-security-requirem=
ents.  This draft discusses the security requirements for the I2RS environm=
ent.  You can find the draft at:

https://tools.ietf.org/html/draft-mglt-i2rs-security-environment-reqs-00

A security reviewer will review this draft during the time 8/20 to 8/25.   =
We will post the security directorate review to this discussion.

Sue Hares

_______________________________________________
i2rs mailing list
i2rs@ietf.org<mailto:i2rs@ietf.org>
https://www.ietf.org/mailman/listinfo/i2rs

--_000_A65814AF1B144CDD9D39F23FA8493AA9ericssoncom_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
</head>
<body dir=3D"auto">
<div>Yes/support&nbsp;<br>
<br>
Regards,
<div>Jeff</div>
</div>
<div><br>
On Aug 17, 2015, at 10:49 AM, Susan Hares &lt;<a href=3D"mailto:shares@ndzh=
.com">shares@ndzh.com</a>&gt; wrote:<br>
<br>
</div>
<blockquote type=3D"cite">
<div>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri","sans-serif";}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
<div class=3D"WordSection1">
<p class=3D"MsoNormal">This begins a 2 week WG adoption call for draft-mglt=
-i2rs-security-requirements.&nbsp; This draft discusses the security requir=
ements for the I2RS environment. &nbsp;You can find the draft at:<o:p></o:p=
></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><a href=3D"https://tools.ietf.org/html/draft-mglt-i2=
rs-security-environment-reqs-00">https://tools.ietf.org/html/draft-mglt-i2r=
s-security-environment-reqs-00</a><o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">A security reviewer will review this draft during th=
e time 8/20 to 8/25.&nbsp;&nbsp; We will post the security directorate revi=
ew to this discussion.
<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Sue Hares <o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</div>
</blockquote>
<blockquote type=3D"cite">
<div><span>_______________________________________________</span><br>
<span>i2rs mailing list</span><br>
<span><a href=3D"mailto:i2rs@ietf.org">i2rs@ietf.org</a></span><br>
<span><a href=3D"https://www.ietf.org/mailman/listinfo/i2rs">https://www.ie=
tf.org/mailman/listinfo/i2rs</a></span><br>
</div>
</blockquote>
</body>
</html>

--_000_A65814AF1B144CDD9D39F23FA8493AA9ericssoncom_--


From nobody Mon Aug 17 11:40:37 2015
Return-Path: <jmh@joelhalpern.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8D3E81B2EF8 for <i2rs@ietfa.amsl.com>; Mon, 17 Aug 2015 11:40:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.602
X-Spam-Level: 
X-Spam-Status: No, score=-2.602 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wQTFT46JTK3U for <i2rs@ietfa.amsl.com>; Mon, 17 Aug 2015 11:40:34 -0700 (PDT)
Received: from mailb2.tigertech.net (mailb2.tigertech.net [208.80.4.154]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 34CDC1B2EF5 for <i2rs@ietf.org>; Mon, 17 Aug 2015 11:40:34 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mailb2.tigertech.net (Postfix) with ESMTP id 1BA76760023; Mon, 17 Aug 2015 11:40:34 -0700 (PDT)
X-Virus-Scanned: Debian amavisd-new at b2.tigertech.net
Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mailb2.tigertech.net (Postfix) with ESMTPSA id A6BD176001E; Mon, 17 Aug 2015 11:40:33 -0700 (PDT)
To: i2rs@ietf.org, daniel.migault@ericsson.com, 'Alia Atlas' <akatlas@gmail.com>
References: <01a801d0d915$1558b4e0$400a1ea0$@ndzh.com> <20150817175417.GA65489@elstar.local> <01d701d0d917$25e23000$71a69000$@ndzh.com> <20150817183435.GA65596@elstar.local>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <55D22AA0.8070009@joelhalpern.com>
Date: Mon, 17 Aug 2015 14:40:32 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:38.0) Gecko/20100101 Thunderbird/38.2.0
MIME-Version: 1.0
In-Reply-To: <20150817183435.GA65596@elstar.local>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/5L-MoIq28bSj8zFAAT2ytoSdZxM>
Subject: Re: [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG adoption call (8/17 to 8/31)
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Aug 2015 18:40:35 -0000

If others in the WG agree with you, presumably the chairs will direct 
that and we will do so.

Having tried to work on a single document, it seemed to us to be MUCH 
cleaner to have two separate ones.

Yours,
Joel

On 8/17/15 2:34 PM, Juergen Schoenwaelder wrote:
> On Mon, Aug 17, 2015 at 02:04:22PM -0400, Susan Hares wrote:
>> Juergen:
>>
>> Normally, I would agree with you.  However, these environmental security
>> issues are not directed at the I2RS protocol but the environment.  I thought
>> it would be clearer to have this split so the I2RS protocol development work
>> would not need to considered these hard requirements for the protocol.
>>
>
> I reviewed both documents before the last IETF meeting and I believe
> one document is all that is needed.
>
> /js
>


From nobody Mon Aug 17 12:38:31 2015
Return-Path: <shares@ndzh.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D55A21B2F89 for <i2rs@ietfa.amsl.com>; Mon, 17 Aug 2015 12:38:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -99.055
X-Spam-Level: 
X-Spam-Status: No, score=-99.055 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DOS_OUTLOOK_TO_MX=2.845, USER_IN_WHITELIST=-100] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9ydaVCIUwP8R for <i2rs@ietfa.amsl.com>; Mon, 17 Aug 2015 12:38:29 -0700 (PDT)
Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 668331B2F85 for <i2rs@ietf.org>; Mon, 17 Aug 2015 12:38:29 -0700 (PDT)
X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=174.124.199.108; 
From: "Susan Hares" <shares@ndzh.com>
To: "'Juergen Schoenwaelder'" <j.schoenwaelder@jacobs-university.de>
References: <01a801d0d915$1558b4e0$400a1ea0$@ndzh.com> <20150817175417.GA65489@elstar.local> <01d701d0d917$25e23000$71a69000$@ndzh.com> <20150817183435.GA65596@elstar.local>
In-Reply-To: <20150817183435.GA65596@elstar.local>
Date: Mon, 17 Aug 2015 15:38:22 -0400
Message-ID: <020b01d0d924$47291870$d57b4950$@ndzh.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQGnzkX7E0ureH0U9OjgTsVHj87UVwK9Mm0HAQFJJIkB7iVFk541Rolw
Content-Language: en-us
X-Authenticated-User: skh@ndzh.com 
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/a4856LAkctr5ypiW33ssDSsVZMk>
Cc: 'Jeffrey Haas' <jhaas@pfrc.org>, i2rs@ietf.org, daniel.migault@ericsson.com, 'Joel Halpern' <jmh@joelhalpern.com>, 'Alia Atlas' <akatlas@gmail.com>
Subject: Re: [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG adoption call (8/17 to 8/31)
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Aug 2015 19:38:31 -0000

Juergen: 

Thank you for letting me know you would like these two documents merged.
Your advice is always wise.  Let's see what other people think about 1
security document or two. 

Sue 

-----Original Message-----
From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Juergen Schoenwaelder
Sent: Monday, August 17, 2015 2:35 PM
To: Susan Hares
Cc: 'Jeffrey Haas'; i2rs@ietf.org; daniel.migault@ericsson.com; 'Joel
Halpern'; 'Alia Atlas'
Subject: Re: [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG
adoption call (8/17 to 8/31)

On Mon, Aug 17, 2015 at 02:04:22PM -0400, Susan Hares wrote:
> Juergen: 
> 
> Normally, I would agree with you.  However, these environmental 
> security issues are not directed at the I2RS protocol but the 
> environment.  I thought it would be clearer to have this split so the 
> I2RS protocol development work would not need to considered these hard
requirements for the protocol.
>

I reviewed both documents before the last IETF meeting and I believe one
document is all that is needed.

/js

-- 
Juergen Schoenwaelder           Jacobs University Bremen gGmbH
Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
Fax:   +49 421 200 3103         <http://www.jacobs-university.de/>

_______________________________________________
i2rs mailing list
i2rs@ietf.org
https://www.ietf.org/mailman/listinfo/i2rs


From nobody Mon Aug 17 12:38:50 2015
Return-Path: <shares@ndzh.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A0FD31ACEB6 for <i2rs@ietfa.amsl.com>; Mon, 17 Aug 2015 12:38:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -99.055
X-Spam-Level: 
X-Spam-Status: No, score=-99.055 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DOS_OUTLOOK_TO_MX=2.845, USER_IN_WHITELIST=-100] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IHL__S042hPf for <i2rs@ietfa.amsl.com>; Mon, 17 Aug 2015 12:38:47 -0700 (PDT)
Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9C8D21B2F25 for <i2rs@ietf.org>; Mon, 17 Aug 2015 12:38:47 -0700 (PDT)
X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=174.124.199.108; 
From: "Susan Hares" <shares@ndzh.com>
To: "'Joel M. Halpern'" <jmh@joelhalpern.com>, <i2rs@ietf.org>, <daniel.migault@ericsson.com>, "'Alia Atlas'" <akatlas@gmail.com>
References: <01a801d0d915$1558b4e0$400a1ea0$@ndzh.com> <20150817175417.GA65489@elstar.local> <01d701d0d917$25e23000$71a69000$@ndzh.com> <20150817183435.GA65596@elstar.local> <55D22AA0.8070009@joelhalpern.com>
In-Reply-To: <55D22AA0.8070009@joelhalpern.com>
Date: Mon, 17 Aug 2015 15:38:46 -0400
Message-ID: <020d01d0d924$557ab6e0$007024a0$@ndzh.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQGnzkX7E0ureH0U9OjgTsVHj87UVwK9Mm0HAQFJJIkB7iVFkwEK4iQSnizv9lA=
Content-Language: en-us
X-Authenticated-User: skh@ndzh.com 
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/neGsj5MwWVSncjFA-3b8C68OWNY>
Subject: Re: [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG adoption call (8/17 to 8/31)
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Aug 2015 19:38:48 -0000

Joel: 

I agree it was much clearer as two documents. 

Sue 

-----Original Message-----
From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Joel M. Halpern
Sent: Monday, August 17, 2015 2:41 PM
To: i2rs@ietf.org; daniel.migault@ericsson.com; 'Alia Atlas'
Subject: Re: [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG
adoption call (8/17 to 8/31)

If others in the WG agree with you, presumably the chairs will direct that
and we will do so.

Having tried to work on a single document, it seemed to us to be MUCH
cleaner to have two separate ones.

Yours,
Joel

On 8/17/15 2:34 PM, Juergen Schoenwaelder wrote:
> On Mon, Aug 17, 2015 at 02:04:22PM -0400, Susan Hares wrote:
>> Juergen:
>>
>> Normally, I would agree with you.  However, these environmental 
>> security issues are not directed at the I2RS protocol but the 
>> environment.  I thought it would be clearer to have this split so the 
>> I2RS protocol development work would not need to considered these hard
requirements for the protocol.
>>
>
> I reviewed both documents before the last IETF meeting and I believe 
> one document is all that is needed.
>
> /js
>

_______________________________________________
i2rs mailing list
i2rs@ietf.org
https://www.ietf.org/mailman/listinfo/i2rs


From nobody Thu Aug 20 06:49:15 2015
Return-Path: <linda.dunbar@huawei.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5B1241A8A65; Fri, 14 Aug 2015 08:01:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.211
X-Spam-Level: 
X-Spam-Status: No, score=-4.211 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0rOVdNJGoMU1; Fri, 14 Aug 2015 08:01:37 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 47F081A8A60; Fri, 14 Aug 2015 08:01:36 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml402-hub.china.huawei.com) ([172.18.7.190]) by lhrrg02-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id BWG31980; Fri, 14 Aug 2015 15:01:34 +0000 (GMT)
Received: from DFWEML706-CHM.china.huawei.com (10.193.5.225) by lhreml402-hub.china.huawei.com (10.201.5.241) with Microsoft SMTP Server (TLS) id 14.3.235.1; Fri, 14 Aug 2015 16:01:33 +0100
Received: from DFWEML701-CHM.china.huawei.com ([10.193.5.50]) by dfweml706-chm ([10.193.5.225]) with mapi id 14.03.0235.001; Fri, 14 Aug 2015 08:01:30 -0700
From: Linda Dunbar <linda.dunbar@huawei.com>
To: Russ White <russw@riw.us>, "'Andy Bierman'" <andy@yumaworks.com>, "'Jeffrey Haas'" <jhaas@pfrc.org>
Thread-Topic: [i2rs] some doubt about "draft-ietf-i2rs-ephemeral-state-00".// I-D Action: draft-ietf-i2rs-ephemeral-state-00.txt
Thread-Index: AQHQwv2Jwf/Gvm/0mkqUr23oEsrJkp3afESAgAABrgCAC6I9AIAlnf4A
Date: Fri, 14 Aug 2015 15:01:29 +0000
Message-ID: <4A95BA014132FF49AE685FAB4B9F17F657D0D688@dfweml701-chm>
References: <20150623165237.12779.22569.idtracker@ietfa.amsl.com> <OF5744358B.3CEE4C66-ON48257E78.0011EC09-48257E78.0012D25E@zte.com.cn> <20150713224652.GB5779@pfrc.org> <CABCOCHQ3uR=gc2qhCTncbUKx18HaAn3xNhCNPU2XnB333A5qYA@mail.gmail.com> <20150713230952.GI13783@pfrc.org> <55A44B12.10201@joelhalpern.com> <20150713234843.GK13783@pfrc.org> <CABCOCHSd+q0wtb9am3MvOoyHG+Y9y+reFpJYdbFTJBE7Co+aGQ@mail.gmail.com> <03cc01d0c398$87f4ff50$97defdf0$@riw.us>
In-Reply-To: <03cc01d0c398$87f4ff50$97defdf0$@riw.us>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.192.11.198]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/h_C42xn_5wHZtjtTyOy0r0MtMUs>
X-Mailman-Approved-At: Thu, 20 Aug 2015 06:49:14 -0700
Cc: "i2rs@ietf.org" <i2rs@ietf.org>, "dai.xianxian@zte.com.cn" <dai.xianxian@zte.com.cn>, 'Jeff Haas' <jhaas@juniper.net>, "internet-drafts@ietf.org" <internet-drafts@ietf.org>, 'Alia Atlas' <akatlas@gmail.com>, 'i2rs' <i2rs-bounces@ietf.org>, "i-d-announce@ietf.org" <i-d-announce@ietf.org>, "'Joel M. Halpern'" <jmh@joelhalpern.com>, 'Susan Hares' <shares@ndzh.com>
Subject: Re: [i2rs] some doubt about "draft-ietf-i2rs-ephemeral-state-00".// I-D Action: draft-ietf-i2rs-ephemeral-state-00.txt
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Aug 2015 15:01:39 -0000

+1.=20

Linda

-----Original Message-----
From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Russ White
Sent: Tuesday, July 21, 2015 4:34 AM
To: 'Andy Bierman'; 'Jeffrey Haas'
Cc: i2rs@ietf.org; dai.xianxian@zte.com.cn; 'Jeff Haas'; internet-drafts@ie=
tf.org; 'Alia Atlas'; 'i2rs'; i-d-announce@ietf.org; 'Joel M. Halpern'; 'Su=
san Hares'
Subject: Re: [i2rs] some doubt about "draft-ietf-i2rs-ephemeral-state-00"./=
/ I-D Action: draft-ietf-i2rs-ephemeral-state-00.txt

=20
> The design does not directly support different priorities per broker.
> The broker needs to pretend to be different clients, and each session=20
> will have a different client-id and priority.  This is non-optimal but no=
t broken.

And it's much simpler to implement. It would leave proxies out of scope whi=
le allowing those who want to implement proxies a way to do so. In short --=
 this seems like a good solution.

Russ

_______________________________________________
i2rs mailing list
i2rs@ietf.org
https://www.ietf.org/mailman/listinfo/i2rs


From nobody Thu Aug 20 15:43:01 2015
Return-Path: <linda.dunbar@huawei.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 19C761B2C6C for <i2rs@ietfa.amsl.com>; Thu, 20 Aug 2015 15:43:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.21
X-Spam-Level: 
X-Spam-Status: No, score=-4.21 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id B1HJ-2sE2usV for <i2rs@ietfa.amsl.com>; Thu, 20 Aug 2015 15:42:55 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B7DEC1B2C7D for <i2rs@ietf.org>; Thu, 20 Aug 2015 15:42:54 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml405-hub.china.huawei.com) ([172.18.7.190]) by lhrrg01-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CAE94938; Thu, 20 Aug 2015 22:42:51 +0000 (GMT)
Received: from DFWEML704-CHM.china.huawei.com (10.193.5.141) by lhreml405-hub.china.huawei.com (10.201.5.242) with Microsoft SMTP Server (TLS) id 14.3.235.1; Thu, 20 Aug 2015 23:42:49 +0100
Received: from DFWEML701-CHM.china.huawei.com ([10.193.5.50]) by dfweml704-chm ([10.193.5.141]) with mapi id 14.03.0235.001; Thu, 20 Aug 2015 15:42:46 -0700
From: Linda Dunbar <linda.dunbar@huawei.com>
To: Susan Hares <shares@ndzh.com>, "i2rs@ietf.org" <i2rs@ietf.org>
Thread-Topic: [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG adoption call (8/17 to 8/31)
Thread-Index: AdDZFQfGZ2x8EJ+fRrOcN4ltvsrslgCdyKQg
Date: Thu, 20 Aug 2015 22:42:45 +0000
Message-ID: <4A95BA014132FF49AE685FAB4B9F17F657D1422E@dfweml701-chm>
References: <01a801d0d915$1558b4e0$400a1ea0$@ndzh.com>
In-Reply-To: <01a801d0d915$1558b4e0$400a1ea0$@ndzh.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
x-originating-ip: [10.192.11.159]
Content-Type: multipart/related; boundary="_004_4A95BA014132FF49AE685FAB4B9F17F657D1422Edfweml701chm_"; type="multipart/alternative"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/IyJj3-AivtW9aIptdcl-Xo8YJCo>
Cc: 'Jeffrey Haas' <jhaas@pfrc.org>, "daniel.migault@ericsson.com" <daniel.migault@ericsson.com>, 'Joel Halpern' <jmh@joelhalpern.com>, 'Alia Atlas' <akatlas@gmail.com>
Subject: Re: [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG adoption call (8/17 to 8/31)
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 20 Aug 2015 22:43:00 -0000

--_004_4A95BA014132FF49AE685FAB4B9F17F657D1422Edfweml701chm_
Content-Type: multipart/alternative;
	boundary="_000_4A95BA014132FF49AE685FAB4B9F17F657D1422Edfweml701chm_"

--_000_4A95BA014132FF49AE685FAB4B9F17F657D1422Edfweml701chm_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

I support the WG adoption because I think the I2RS WG needs it. However, I =
hope the authors can consider/address the following suggestions/comments:

When you think about the I2RS security,  there are following different aspe=
cts:

-          Communication channel between I2RS client and Agent (and the cha=
nnel between I2RS client and applications):
The channel can be

o   Via physical Private network (e.g. within a secured direct connect with=
in one site),

o   within one administrative domain,  via virtual private network

o   Secured connection, such as TLS or IPSec

o   Public internet

o   ..



-          Authentication & Authorization

o   the authentication & authorization requirement for different communicat=
ion channels can be different. Therefore, should have separate sections to =
address specific requirement  for each communication channels between I2RS =
agent <-> clients (and client <-> applications)
The current Section 4 of the draft already has very good description on the=
 subject. I think 4.4.1 and 4.42 can be separated out of the section.




-          Encryption for the actual content between Client and Agent

-          DoS Design requirement (currently in Section 5.2.1)

-          Management of conflict with other plane (e.g. the management pla=
ne, multi-headed control, which has been discussed extensively in ephemeral=
 draft)

I think the draft should be organized from the aspects of the security to I=
2RS as suggested above.

Here are some detailed questions and comments to the requirements listed in=
 the document:

Section 1:
The second paragraph stated the security recommendations must "specifying w=
here security functions may be hosted". First of all I don't see the draft =
address this aspect. Second, I think   "where security functions are hosted=
" is orthogonal to "I2RS security" .
[cid:image003.png@01D0DB6F.9EF3B950]

Section 3:
what does isolating two planes mean? does it mean they have different secur=
ity requirement/issues? Or does it mean they need different protocols?

What are the key differences with regard to the security requirements for  =
I2RS plane and for management plane?  Section 3.1 describes the interaction=
 between I2RS plane and management plane. But I see the security requiremen=
t for the management plane is similar to I2RS plane . If you think that the=
y are very different, can you elaborate more?

Section 3.4 has title "Recommendations", but the content are all requiremen=
ts. Why not name the section "Requirement"?

REQ 2: Does it that a different IP address than the one used by the managem=
ent system?

How is REQ 22 different from REQ 21?

REQ 27 is hard to enforce. How about say something like "shouldn't send any=
 information beyond what have been defined by the I2RS data model"?

REQ 30: simply controlling the resource can hardly prevent DoS. Malicious c=
lient can occupy the resource while the valid one can't access.

Thanks for consideration,
Linda

From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Susan Hares
Sent: Monday, August 17, 2015 12:50 PM
To: i2rs@ietf.org
Cc: 'Jeffrey Haas'; daniel.migault@ericsson.com; 'Joel Halpern'; shares@ndz=
h.com; 'Alia Atlas'
Subject: [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG adoption=
 call (8/17 to 8/31)

This begins a 2 week WG adoption call for draft-mglt-i2rs-security-requirem=
ents.  This draft discusses the security requirements for the I2RS environm=
ent.  You can find the draft at:

https://tools.ietf.org/html/draft-mglt-i2rs-security-environment-reqs-00

A security reviewer will review this draft during the time 8/20 to 8/25.   =
We will post the security directorate review to this discussion.

Sue Hares


--_000_4A95BA014132FF49AE685FAB4B9F17F657D1422Edfweml701chm_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<!--[if !mso]><style>v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]--><style><!--
/* Font Definitions */
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:SimSun;
	panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:"\@SimSun";
	panose-1:2 1 6 0 3 1 1 1 1 1;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0in;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:.5in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
span.EmailStyle17
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:1029911661;
	mso-list-type:hybrid;
	mso-list-template-ids:1133296566 1383766216 67698691 67698693 67698689 676=
98691 67698693 67698689 67698691 67698693;}
@list l0:level1
	{mso-level-start-at:0;
	mso-level-number-format:bullet;
	mso-level-text:-;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Calibri","sans-serif";
	mso-fareast-font-family:SimSun;
	mso-bidi-font-family:"Times New Roman";}
@list l0:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Courier New";}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"2050" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">I support the WG adopt=
ion because I think the I2RS WG needs it. However, I hope the authors can c=
onsider/address the following suggestions/comments:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">When you think about t=
he I2RS security, &nbsp;there are following different aspects:<o:p></o:p></=
span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo1"><![if !supportLists]><span style=3D"color:#1F497D"><span style=3D"m=
so-list:Ignore">-<span style=3D"font:7.0pt &quot;Times New Roman&quot;">&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"color:#1F497D">Communication =
channel between I2RS client and Agent (and the channel between I2RS client =
and applications):
<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:.75in"><span style=3D"color:#1F=
497D">The channel can be
<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"margin-left:1.0in;text-indent:-.25in=
;mso-list:l0 level2 lfo1">
<![if !supportLists]><span style=3D"font-family:&quot;Courier New&quot;;col=
or:#1F497D"><span style=3D"mso-list:Ignore">o<span style=3D"font:7.0pt &quo=
t;Times New Roman&quot;">&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"color:#1F497D">Via physical P=
rivate network (e.g. within a secured direct connect within one site),
<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"margin-left:1.0in;text-indent:-.25in=
;mso-list:l0 level2 lfo1">
<![if !supportLists]><span style=3D"font-family:&quot;Courier New&quot;;col=
or:#1F497D"><span style=3D"mso-list:Ignore">o<span style=3D"font:7.0pt &quo=
t;Times New Roman&quot;">&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"color:#1F497D">within one adm=
inistrative domain, &nbsp;via virtual private network<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"margin-left:1.0in;text-indent:-.25in=
;mso-list:l0 level2 lfo1">
<![if !supportLists]><span style=3D"font-family:&quot;Courier New&quot;;col=
or:#1F497D"><span style=3D"mso-list:Ignore">o<span style=3D"font:7.0pt &quo=
t;Times New Roman&quot;">&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"color:#1F497D">Secured connec=
tion, such as TLS or IPSec<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"margin-left:1.0in;text-indent:-.25in=
;mso-list:l0 level2 lfo1">
<![if !supportLists]><span style=3D"font-family:&quot;Courier New&quot;;col=
or:#1F497D"><span style=3D"mso-list:Ignore">o<span style=3D"font:7.0pt &quo=
t;Times New Roman&quot;">&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"color:#1F497D">Public interne=
t<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"margin-left:1.0in;text-indent:-.25in=
;mso-list:l0 level2 lfo1">
<![if !supportLists]><span style=3D"font-family:&quot;Courier New&quot;;col=
or:#1F497D"><span style=3D"mso-list:Ignore">o<span style=3D"font:7.0pt &quo=
t;Times New Roman&quot;">&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"color:#1F497D">..<o:p></o:p><=
/span></p>
<p class=3D"MsoListParagraph" style=3D"margin-left:1.0in"><span style=3D"co=
lor:#1F497D"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo1"><![if !supportLists]><span style=3D"color:#1F497D"><span style=3D"m=
so-list:Ignore">-<span style=3D"font:7.0pt &quot;Times New Roman&quot;">&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"color:#1F497D">Authentication=
 &amp; Authorization<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"margin-left:1.0in;text-indent:-.25in=
;mso-list:l0 level2 lfo1">
<![if !supportLists]><span style=3D"font-family:&quot;Courier New&quot;;col=
or:#1F497D"><span style=3D"mso-list:Ignore">o<span style=3D"font:7.0pt &quo=
t;Times New Roman&quot;">&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"color:#1F497D">the authentica=
tion &amp; authorization requirement for different communication channels c=
an be different. Therefore, should have separate sections to address specif=
ic requirement &nbsp;for each communication
 channels between I2RS agent &lt;-&gt; clients (and client &lt;-&gt; applic=
ations)<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:1.0in"><span style=3D"color:#1F=
497D">The current Section 4 of the draft already has very good description =
on the subject. I think 4.4.1 and 4.42 can be separated out of the section.=
<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:1.5in"><span style=3D"color:#1F=
497D"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:1.5in"><span style=3D"color:#1F=
497D"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:1.5in"><span style=3D"color:#1F=
497D"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo1"><![if !supportLists]><span style=3D"color:#1F497D"><span style=3D"m=
so-list:Ignore">-<span style=3D"font:7.0pt &quot;Times New Roman&quot;">&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"color:#1F497D">Encryption for=
 the actual content between Client and Agent<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo1"><![if !supportLists]><span style=3D"color:#1F497D"><span style=3D"m=
so-list:Ignore">-<span style=3D"font:7.0pt &quot;Times New Roman&quot;">&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"color:#1F497D">DoS Design req=
uirement (currently in Section 5.2.1)<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo1"><![if !supportLists]><span style=3D"color:#1F497D"><span style=3D"m=
so-list:Ignore">-<span style=3D"font:7.0pt &quot;Times New Roman&quot;">&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"color:#1F497D">Management of =
conflict with other plane (e.g. the management plane, multi-headed control,=
 which has been discussed extensively in ephemeral draft)<o:p></o:p></span>=
</p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">I think the draft shou=
ld be organized from the aspects of the security to I2RS as suggested above=
.
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Here are some detailed=
 questions and comments to the requirements listed in the document:<o:p></o=
:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Section 1: <o:p></o:p>=
</span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">The second paragraph s=
tated the security recommendations must &#8220;specifying where security fu=
nctions may be hosted&#8221;. First of all I don&#8217;t see the draft addr=
ess this aspect. Second, I think &nbsp;&nbsp;&#8220;where security function=
s
 are hosted&#8221; is orthogonal to &#8220;I2RS security&#8221; . <o:p></o:=
p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><img width=3D"484" hei=
ght=3D"69" id=3D"Picture_x0020_1" src=3D"cid:image003.png@01D0DB6F.9EF3B950=
"></span><span style=3D"color:#1F497D"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Section 3: <o:p></o:p>=
</span></p>
<p class=3D"MsoNormal" style=3D"margin-left:.5in"><span style=3D"color:#1F4=
97D">what does isolating two planes mean? does it mean they have different =
security requirement/issues? Or does it mean they need different protocols?
<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:.5in"><span style=3D"color:#1F4=
97D"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:.5in"><span style=3D"color:#1F4=
97D">What are the key differences with regard to the security requirements =
for &nbsp;I2RS plane and for management plane? &nbsp;Section 3.1 describes =
the interaction between I2RS plane and management
 plane. But I see the security requirement for the management plane is simi=
lar to I2RS plane . If you think that they are very different, can you elab=
orate more?
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Section 3.4 has title =
&#8220;Recommendations&#8221;, but the content are all requirements. Why no=
t name the section &#8220;Requirement&#8221;?
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">REQ 2: Does it that a =
different IP address than the one used by the management system?<o:p></o:p>=
</span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">How is REQ 22 differen=
t from REQ 21?
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">REQ 27 is hard to enfo=
rce. How about say something like &quot;shouldn't send any information beyo=
nd what have been defined by the I2RS data model&quot;?
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">REQ 30: simply control=
ling the resource can hardly prevent DoS. Malicious client can occupy the r=
esource while the valid one can't access.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Thanks for considerati=
on, <o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Linda<o:p></o:p></span=
></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> i2rs [ma=
ilto:i2rs-bounces@ietf.org]
<b>On Behalf Of </b>Susan Hares<br>
<b>Sent:</b> Monday, August 17, 2015 12:50 PM<br>
<b>To:</b> i2rs@ietf.org<br>
<b>Cc:</b> 'Jeffrey Haas'; daniel.migault@ericsson.com; 'Joel Halpern'; sha=
res@ndzh.com; 'Alia Atlas'<br>
<b>Subject:</b> [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG a=
doption call (8/17 to 8/31)<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">This begins a 2 week WG adoption call for draft-mglt=
-i2rs-security-requirements.&nbsp; This draft discusses the security requir=
ements for the I2RS environment. &nbsp;You can find the draft at:<o:p></o:p=
></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><a href=3D"https://tools.ietf.org/html/draft-mglt-i2=
rs-security-environment-reqs-00">https://tools.ietf.org/html/draft-mglt-i2r=
s-security-environment-reqs-00</a><o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">A security reviewer will review this draft during th=
e time 8/20 to 8/25.&nbsp;&nbsp; We will post the security directorate revi=
ew to this discussion.
<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Sue Hares <o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</body>
</html>

--_000_4A95BA014132FF49AE685FAB4B9F17F657D1422Edfweml701chm_--

--_004_4A95BA014132FF49AE685FAB4B9F17F657D1422Edfweml701chm_
Content-Type: image/png; name="image003.png"
Content-Description: image003.png
Content-Disposition: inline; filename="image003.png"; size=20705;
	creation-date="Thu, 20 Aug 2015 22:42:45 GMT";
	modification-date="Thu, 20 Aug 2015 22:42:45 GMT"
Content-ID: <image003.png@01D0DB6F.9EF3B950>
Content-Transfer-Encoding: base64

iVBORw0KGgoAAAANSUhEUgAAAeQAAABFCAYAAACbmZUGAAAAAXNSR0ICQMB9xQAAAAlwSFlzAAAO
xAAADsQBlSsOGwAAABl0RVh0U29mdHdhcmUATWljcm9zb2Z0IE9mZmljZX/tNXEAAFBhSURBVHja
7d0HtCxV0S/wWb71PpcuWT6f8j1RFMOnIqCiGDGhKOacE0bMOWcxK+aAGDAHzJgzKuacc8CcxZww
9Ztfj/9z6jYz032451zuubdrrVn3npnu3XvXrqp/VfXetSdN0xww/Rw6fsbP+Bk/42f8jJ+T7zP5
z39GGmmkkUYaaaSTkUZAHmmkkUYaaaTtgHYIQP773//e/PnPf27+/e9/b/izPOeEE07Y1Pz617/+
tenm9/jjj295P9JyogO///3ve3nluj/+8Y/NP//5zw3vE33ZqLkjy9tC7/vod7/7XfOb3/ymldVt
qcfmcLPp89bYgW1l508uGgTIf/rTn5p3vetdzdvf/vbmta99bfOa17ymedOb3tQcd9xx27Szf/vb
35pPfvKTJ/r+K1/5SnOpS12qefOb37zhfXjKU57SHHDAAc0//vGPNQnSe9/73uboo49e4eF3v/vd
La55//vf3/4esCd473nPe5q3vvWtLb8/8IEPnKjdH//4x81b3vKW5sMf/vDgufjWt77VHHzwwc1f
/vKX7U4Yv/Od75yIL+jTn/50c4tb3KK5zGUu08rdSMt15OEPf3hzyUtespW1Zdfd/va3b25729uu
6/O/9KUvNb/4xS+2+O6zn/1sq5/keb3pdre7Xdv+UPrMZz7T/OEPf1i359Pt5z//+W0/yOjHP/7x
bTbXnNRrX/vazUMf+tA138uObkvnYa08nWfnv/GNbzSXvvSlW/u5o9IgQOb9MeLnPe95mwc/+MHN
Ix/5yOaa17xmc6c73an57W9/23rkPgh4+463GPL3z3/+85W/gdmvf/3rFeb7bUjU+eUvf7k56KCD
mh/+8IftPZ4Vute97tW8+MUvbpXN87rEk/zZz3624l3xKvUxz/V7V1GB4q9+9av2/37761//2oLg
Na5xjXa8DM+QCMN9z3ve85ob3OAGzbnPfe7mgQ98YPOpT31q5bcHPehBzX3ve992DE9/+tNX+Hmd
61yn2W+//ZrHPOYx7T3Pfe5zV/rPCfH94x//+OaqV71qc8c73rG3H/j1uc99rjn88MPnKiOemhfG
um9c+IE/+Ibwss7HPJ7Xfvje7+E/mXjIQx7Sypd+/PKXv1xxevQVn/z+1Kc+dYt2PDd9SHRoDEPk
yb2JarpRhj5EjrQbecUXv+lPl1xDV7rtud94K3GIyFb6GX76PnJoLPjQpfRhHnkOQ32/+92vBYpl
9IlPfKK58Y1v3PbVfYli9cnYjSXP87d2l8mF+25+85u3eqh/xhc+3Pve925e/vKXt+OjN12ZMOYu
j5aRZ/30pz9tnv3sZ7f2oM5peOr5GUN4fvWrX71597vf3fbPeGo/yL0+VN0gg/qbOfFbbJv/czKu
dKUrNV/72tdaZzLXadd18+Q/smJuPbM6967Vt6EO80tf+tLmHve4RzvmRbKiD55T7bE+s0GeFR5F
9qoex75n3o25y6OKE1Uuk9nq2tI++uY3v9lc8YpXbIMM7UW/0QMe8IDWDvquYky12e7ZrFmDwSnr
973vfa1ShQg1z+yZz3xmc77zna9lFHrWs57V7L///i1YoGOPPbY55JBDWkA/8sgj28mmSFe+8pWb
m93sZs1znvOc1ku///3v3/zoRz9a2odHPepRzZnPfObm+te/fnOjG92oef3rX7/y2xOe8IS2ncMO
O6xtV0QaEinoO2PxiEc8op1oEwog7373u7fXaAv4pQ/An1G7293u1kYc++yzT+tdm2hKDTiBICCN
se4jXl8XOPHjZS972YrS3uEOd2ij4iibcQW4r3KVq6w4Ppyhd77zne3/RchPfvKTe58vg3C9612v
9eSrYcWLl7zkJc1NbnKTlk+8bs9eRvgoYr3nPe/ZPOlJT2rHhZ/f+9735vJc9ItE6JwL8sARwUtK
RMkvfOELNxe4wAWam970pu1cduXBc57xjGdsIYM8ZnIRY3ab29ymucIVrjA30g6Zw6OOOqq5y13u
0s4teUo0qR94iUciSHLBKOHbda973dYY+N64v/3tb68YHiBkTjirHKkPfehD7W8cuMc+9rHteB72
sIetyMpHP/rR5mpXu1pz61vfus0AkH+yqF8XvOAF2365jywD1oAM/h566KHtOB/96EevGFPf+xu/
OS7afsUrXrF0Dt1z2ctetn2O+4wJSNOPi170ou044hiIuPFgnrMbMrfnOte52mjYHN71rnddASj2
wJxzqIzJPMYBAAzmQh8A7LJnhL7+9a83t7zlLVtbk3lAj3vc45oLXehCrV2iv7e61a1WbAGen/Ws
Z22derLOfkUPjBnf9BEfI8dAzncXv/jFWz2j95yYL37xi80PfvCDtq1znOMc7TVsgb6TL9ku8m+e
jP0nP/nJCui/+tWvbuWLvABT9wWkZeDwhyzobx8Z24EHHtg65mwHPQ74Aibf4ytnP5kEcsGOkhFj
YbPRK1/5ytbOvfGNb2ztDX0S+csIkjOyTL61h7dsZIid93zznqDi+9//fnP5y1++lX065Xl9diW2
XP/IGzuPXyHyY97xybPe8Y53rPz2+c9/vuU5/pGDbqZmhwJkE49BX/3qV1vwZdzjiTA0BBC94Q1v
aA0uI0VoGdEYDROeCeEtU3KKxUMUGQHnZcTIMhJ5n1i9NEJPUAg1QdZX9LGPfax1CACC6/VP/yki
4KMwMdIMLk8XEBAi/+c1MviAIx7Y5S53ueZ1r3td2x7A5mgMIUZaXxYRcKacBCuArH8MHcBgpONN
E3CGgzEn+EMiQmNmaK51rWutADt629ve1ioTMGJQKLE0+TKigIBMxE1hyQIl5VzgG9AKz8mG3/yf
oaFgDDVDyhDH06WIFIlBweeul/vEJz5xC0BmMMhUANlcMXJf+MIXlvZdf4APWcFzcw0ItUcOX/jC
F7Z94Dje5z73aeXJKwUOA5nGR33Bpxg4MkXO8bUaCsapOlgAPWTugMcLXvCC1tjRLfczkvqXTBNZ
Nm/44bnHHHNMe/8RRxzRjt/3nB5jwGN851z2ATK5OfvZz96+Boi+kgPgwdlLKlQfGDopwz7imNEN
/KtRnv7RL8/Ec88B/nQNHxPd6Ytx9ZExax+vKnDp67777rvCCyBqPiIvDLzr3ZssBzngyEu3I8DF
SYmOkEUBhDkh28YQwCYXwDXjjWONV9oj43QegMQ+somiRffEkTMeWbQ42ewiO9oHKuzy3nvv3doM
z2cXIhOA9oMf/ODKmMxnMkLsKHkztgC4Z8l8kjtyb2zmQz+097SnPW0llfyRj3ykBWc81FdyGT2m
o2QAuUebdEnkC5T71hPIeAgK9Ke7Zsc8mXPyYkxsWWSZPeQkxVmna5ttvc9gQAYmUtYM7R577LFi
ZJCJBSQmWtSTdCwBYOx4NSaMsSPYyIQBmBBBqunIecRoUah56QgKD+QzOTzgADUDW4kCmXSgQhlC
vGkK5H2ta0JAhweMGF19iDIDkXiYQ3jI45xHhJmwyUSEgKJIhTNAgWqaFA8oM/5SeP+vqZ1FpP83
vOENt0jPA2Lj8HxG4UUvelFv+tC7sjvf+c5te+EVIyai5Fh1nRTOEocKzykynon8AFfm0/wvkwH9
E/lUMmbGAwhxEvvStMic1/eZMc7mgJNRydoJcmq8ooyQ8RkH4rFH5uNYMQQMvSwC2dd3UbBUYYhx
j+NYCV/ru0iyDAA4PaJPusKoc24YJ99H3kOiaPO4jDy/yjmivww6otP4yskaApJIn/Bsnn6+6lWv
2mKMjDvdFNFwXMgg50rUXlOsy4j8V16RawCc+zmzlTfGWyO7gJrXPsCDcwBQLnKRi2xxHZ2Po1zJ
vHffwwMRwCtDQDdlbCLX+tZ9PhnmBEnT4gF50Rd63/fenczXrBsnh3xzdDyXnGhTe0lTZzzsaZfo
LjslU0Ve2XmZQbKif8ahPf/6G9D6P9vpGeScDEWuvB7L2Dk4bE9fBgQQu24emLIxsS1slOsQp9Yc
el4ce+MdmibfdIDMK09qxSRIazDeSMTAODGG0j7xEhkFwspTBy6UL2lmnpdrQyazT+mBaDVgJjYg
ZaICyLwkAIBEYxyB9ImgijoJBw+QMYgiUwD3+o2Rt2CKp0uxCDDyPEYw3j8BJAxDiDLMe9drXAwS
wRf9J1oQUTEODLwIM+9jKB1+hRgfQDLPYHRJvxmomrLm7RJkRsH4ecR9zpEog1EFOuE1GRB9MiJ4
HqCl+HhOOSi851Em/RU1JdpgPBJJ5B1/ff+2SEZkDxgh8lQj/0XEc67A7vkcC3zkMHHAQq6TBjQ3
eb2BOECJkPW5gh/HI2l4ACoNayEKYCP/GZOIIRmaSrIGSXnHmdEWPl7iEpdo9U575EN2g1yQK+CD
OMaikr4sh/nWXhYEkg1zT74QwOSImuehho3DnkU3+BmZrfqJZJZEkMZAHv2rv/gIuIcuOAJ4Ve6j
n3FOORTV6SBvifLolXlnB7wOosfhKx7XMWuD3euSZ3ezXmyOjIl5BipsYPQVWFTHhA3D/wAyfdcH
vKIrgotlpO/S5ok6yaX7yIpUtv9H9uh4sprsRcZT3xuTTxlA4+eIWi9jDLJO+ldlT3uey0HklOqz
OQSYsfOuj06bE3Mzb/1FJbJunqIneBR7y0YEkAF3sh/mTrBHV/XBv64b6thtKkDGQIq21157tUaX
sRaxVc9QVHm6052uTRGFCBODxiABHMrmOgwmEFJLAI/wMFxSn/O8tpDJ5z3y3KQn/N8zAJpIkvBo
m/B7V8SJIEy8bsLlX0abEMexMAZtmejddtutjaizCEeKyrh59971Rdl23333dtIJBIPGM5u3oKIC
JkVheM5znvO07eV9jucYtzYo48UudrHWK8VzzgdPXduMiHe0xiSq9K4HX/GAsaMc3UVVXaJEojwZ
Dg5HDANlPf/5z986VBwMjlSN+BY5F94PSXPuueeerXFlbBguCo+PledJs/LagSe5cI0xx3jiiX55
vt/0V4oecPF4yYjoyW9dQyUSnReZzSNAz2Dqnw8ATJpbBO+9HpnwG1kyR4yuDBEDbN4ZcHOVhSf6
bV7dA2yAIzmSguSImivGCR98L+IgU+c85znbe2JkOANkBMAylObafJljvOB8pD3zFeAmMxxHfNJ3
ugqUF6U8AZ7rTnva07bjzcLBChaIDHazEstI5ku0xAhzWESKHJ5kesiyMZIZckB38cV4yAIbYYx9
gIyP+GaRJJlzP/sAFOindhhxY8S/yAaAki5nj8gm59Gz3Cdr4+Ne+p3FldqQ2nefeYiuA1FzqA/s
ojbJMllio4yf3gPM2DayhNccVu36F5jQGXOoDX2gk9LuixbvBUjZJ3bL8/XNXAZ0gWLaExQB0jhI
ZEeAhQf6E32nx6c5zWnaKF7f2B9E9mROyIL2/F/7WRNk7syB3/Sb082hEaV6NUkOyZa5qe+EF9lL
IC8IwSN85OTit7bw0zg41mc5y1naufU3PkaO9EH2YIcEZIPiiYuKTWw8oXjkUXBg212pTKAxxn1A
RVu+E0lRVoaVkJpcyrxMAAPKrtWXXEsgfKdNbTOq/l89Z4ZLv7O4KCTCIyDGIvVlcrtbmkRHPEBk
DNr2r3s9V7QfQZ9HnAKG2XPCwyxE0V+KaOz6R2k4Ffjke+1nnHmuZzFqhN49otUhe/Ok5iiSdvwb
kNQ+hTR/+paIdRlRRI6Ne8kGvso+5B0Y4pzpX110A8D1HS9kILq85qDpg7mIV8xoaycy4v9VTqw4
FzmvZWVlwA0futEf4+H7pNPNBRk2d+TEvOOh/mThWa6hF3Vlb4ycPuNXogMGhtHQjvF654W8j/Mc
fcuq+GQdMse+0x6Zrmk9ffM9edUvsrRowaHxJx1pftxnvUUlugn01rpNiGNlfo1bnwFR9JPscrCM
0fyzG8ZgvPhAloe8esED12vHs+gg3rrfc+iGv70C8rdxVltAjvSjyox7tOmegK6+4KM2zJdPUq6u
8Vt02ngSqWZ+/Uueqm0zXv0lY9WGRj8iD/Mi8q4O6hfw5ATgcXeujFt7dL06ZzJkbB2QzPqE2HF2
078AsLudUvZEe95NV9lix4xfe/pCvji+0RPXujc2rI/oPr66N3zAP5jhQ8fYF+0luKGD+KZ/ZHlI
tmxTAvLOSJSWdya6EynXd7sjbR/EMIoArEpetlhupLUT4yqbYRX7sqzVSCONtH40AvIC4tGJtHlo
IrCRtj8SjYhiReh5DTHS+pCoAyjj7WbcPjLSSJuRRkAeaaSRRhpppO2ARkAeaaSRRhpppO2AdhhA
tghhLfWlNxNZcLG1dWd3lgL0m522xWEPI21e2l7rT4+0PjQYkL2vswrXYierES1yqrVErcazErR+
Z/Wf1bKu9Vv3XSyQ8K7KykgrHofuddSuVX5W39k3a9WiIiT2rtnWM2/FsVV5Fv6sx/swhVC25XJ6
47UP2p7pvhq3DDo+d3lgfmxBSNGHrSXtW01p9aY5toK7rqYmL2TFKs/0Rd+sjrUC0mpI8951FMgB
WcHjvlKq2rVy07t+Kzc3+sAMK8DXc+WmrU/dqkXeidsHig87Iqn4VbdGIjrZ3f0w0nyy0NR+4Lqb
YRFZPb2swI9V9LZNbfbT66o+DVmhvz3TYECmNFYc2wuq3J89ajHAtkwoHmD/pX1t2SNqK4r9wPb6
WqmssEJKuVmybx+Z/XpKb9rTacXsMmK87c9zj+fbx2gzeIpIaNvey26k7G+Caf/0PINqe0Q15q5P
G4C3Cqz/24MNaIxhLcDMu+3uFa73L9pHbDUxg6XsXF8FLVsD7McGZqkYFd6poGO/tbHN67dr+vYy
h4Ch/ZqchLOd7WytYlsEhICkfbTmyce+2fTFXln7Nu2BJBP2LaaPQJqMMdr2v86rYtXtL5lhoHbd
dde5xUwAXrYacQiqbHTnI1uccm1XJoxVH91TyySeFNKevficGe2lj3hhvzlnRv8WORlD5ylkPO5Z
lEVa1J7+1D7gT3Wi6t+eUY/H83ciOtf4zX55hrPKkT2xHGnGVD/cl6Ia+lu35PhuWRbBfZ5Tr+nK
etWLefI/j0eRldqXbtvd38K3ef2dZ3Nyn77N00/fsQV0KsU2MubumDzTvnL64bfusYWexX77fV7/
urat8l2/5/HImIYes9nlUfeQj3rdvP6Rla4uKxIS/ewrPrLpATnEuObgiFDqFyMgm5KY9sTVUpci
t5Q6cw+BCSnA0Fd4XCREgMJsEZbKL5kw0bK/u8LCI9cPYF09KEJgL55CBjb42yvoO2BrI79xKlKh
oEHq5dr3ZnO7whAKffRVtArJKuCL/cw28ScbYDO/Ahv4mgL/2UvoGr+L7P0rwu07yMLGfYXZOQ14
gc8hBRiMFQh6Vi3LRzk5Ob5XHGTogRmyFN2yjeYptWwREE5kLsvCeQupRSt650C4LnNpDuphJsso
h04wVOk3x4ssqjSlwIBCAw4iSL1iToPn6TveMwycHf3hTCgwgIfhn72ZHA/Vjyi+NrcmS0ImOasc
Sn0gG9ETjibnSZEPToCV/uGLvaEKsKjwZUxDgJleyCApoOFfupBMVg6lIP/GXMdEPsije1Qwy1Gg
Ivjsu+eAxynmNHIyOBR0Xf+1mypjKSOZOYhBxmeFQvRP3xLpkF8BQLJaHHvProDeJZkw/LNdi7OT
0pz+z2jbJ5ta4bUGNvnnDLpWsR1znAwNI6+QjLGwCcapHXZBIQ5zpyiF5/qNXJkfcuR7AYf7AkKy
StrCU/uRzS35Mja2AU8537VaG2dXYRL2CI9TJdEefU6O52kvY9IPxYPUNDcmfavFi+z71g79qGBI
LgRSOfwiR9rKciqCxE5zpmUja8aTPNNrH/Pf3dPedZrwn61xvf6zb/ho3vE0RafYCzJgf3702tjZ
UfzA6zyffrKl9AmfNmN6f82AzJtNMf95hLkpJUk5RGuKTjAkADf3SrmIqkwcwQeyfe+Au+kuRkAa
MQJFCOcBMiMjalcNq+6pJLwAlXHheTKCCv5rj/GIMbFBPSU29VPh81SiGZrCBDqUzr+UM6c4KQyg
biyFyzGXnodUqAEqnsH4uq6vDqzxMRRSnhSwOiAUjSOhDwCPg8IYuE6fpKD9bauLa4cAziInKEQp
GPRkRvzL6Jpzz5M1yVGWeEwugET38JBFZJw5BAF4JpWn/wDBHGmb8hqvuaXcDIA+GCOjncNRVHJS
9Uu7PvjFQXIfIw2UyMu8o9/WQiIOGQAGhxNR55WxYWDx1nym9ro+iIySiSC7feUxEQOnSIV+exVA
xnLMJhljbM07fqVGPfmmn4BK3xh7zp45IV/aQQpfAGRzqH94pioXPWewvaIIsGmne0IPIuNVDuJ8
6AM9jI4xsgCsLzNhbtgdffYqw3zrF3BROYsOyySRed/rFxniSCYbBRzZDDaCo6oN+qk913pFw7kw
L+wSPpoPY1F1De/YDgChXTqiDfygy/hPxvEU4BsTAEyJTnMcR5euqiaH1/jODlQb63c6besf/uak
Jg4qZxU/PK9Gmq5hjwB/9Nw95k3Q4x5zL+vJMWBr2T2Oibboid+Qv4E7W8yW6Ou889srmQd2wDzQ
MYERe8tx4iwnO6ZPgric2GXcnGH9ywlTrvHBL3yLPm1NBmvTADLvJEX1uyQq4mVn4gkcDy2eLqGt
RpYHblIJod/6ojIe57IjyQhsjZgrAYxuQXWCI0rnZPjw2igfMukxfAxL6jUjQt+tsLOMPJuyaJuh
JYDAH1G+1GNFlJ33LfJJ/WzEmIre+t6Bp4D7vOpKvNu8FqDIPFlCq9oQI5t6t+aQkR1SEILR0s95
4MkQM/L1KEwGzXGdFFgZzBxLh3LCjSie58w56iNOnuer3uNZPGZjAmq1mhfQidctYvF/RgFwA+fw
2uuXOI3kCC/TDnBInef1IMA4L9rryjmZZnAZOwZenxl+xlGk0kdAFpi5R43flJHEb+0xcuQfKOYQ
FW3XMprkKlExxyn9TiSb6mRxwhdVmTI/3RKneG5O5hHHVUQJyIYe4hLe1gxQTnMT/eIfPui3/+tP
9DEETOmtOa+RKgKo5DS1zdkuDh3Al6nBN0AYW0EXAYfMALsCKGNz/B3bwj6Q48xNvseb6ni5LuVM
yQVHAJiRaZm9pIHJ8bKT6MgT+Q4gA7HYhBDeKAuLOBmpeEafcjAPPTFuMmZM+tM9QKNLsj45y4C+
0zGRt7nmJEUOEVuQwkzkjmyaA1hkfBlv96CRzUhrBmSCnKL6FXCUryOIhC8GDKgEbEQulCETWN+B
IELad/wioa/H7+Xw8KpEFTi7pC81EgGOJpuh8iFIibAoaAA5dYdD9dxfkU7f+wqeHG+d8XKttmOA
KEUFZGkbEbKxeWZAkUHikfctWuA5SgFGyTwv/8ffKDIDGw8cEEvx+Y1CMXzAe8gCCf1P9qCSEoCA
LsfChe+Mm4hCnzhAGZ/r6wENeJ/XG8sIeDGOqU3N8AEDRt54OAUUnFxQfMTAcAg4H5Q6NZSRSDKA
zIhXsDFPifTzvrQSfq1llbQoIDW0OTRpD2jVTBCHlU4Zi/Ub5DTzNCRCZrS0x3gzWPiKRxxNVc7M
tfbwSwSKOCtVR4Fx5AHvsuhMFMWZi0NmDFWeuyRapw9dm+L7ysek743ZnNKXtTjB9K0ujNMvr3y0
Y6yAGB8tKuUkkomqx+RSH7y+qYdiGCfHjy4FkETaKQVMntjBnE9Ox8i+MSTiJLOe71oOcrIz5DeA
LNqMzUmN6CoP5ieOR7J6dEud5/DOWCsgd98jk+v6uomeemZ1EvUxzoV+x0kGnPQXyUIZh/nBc/wy
3mVEbpPZMoYcdSpjauxxNHNkZoBWdiWljumOPuUgC+2kJjf7udGLPE9WQGbogZboToFv/090g5HS
VISG0WMcw3TvyVJMnBACwByOYKJTDFzUvezdEGLEKQiDmWO2/EsA1S9l6B0WDgiqFy5C0L4C8fqW
s28pI6VkENxvYnmx0lAMn7FwMDggDgHIZBsHLzUF9PsOEic8eGSs0qOETdF2qTHPxSMRNIfCmbsU
jlEi9MDGfTz1U53qVG3flxEHAV8od45KI+CyD+Yu7/8yNxwQvxkTUMILBqLW5Z1H+IevvFo8Z5Sk
GDPvDqo314wfrz3AYTwOaeDQ8KIpESNkvrxH1AcAwdv2nmsRMYyu814ryopnnCyZBADG0cjB8Ry+
RMj4QeaMlWEzXkAbJ8UCQ46eCEvx+hhkPMp7QXwNeCFZgBzkPpTIP/BlNMmR+RYZOd8WQBmPyIDc
kjVjJqPexxubfnVXLM8jcy4bZKw5YtBYyYq20l5qiCNyj2fm1bPdn/mlc+SZEbYYa5dddmnnEM8Z
We/yzB9jHpBjyLUjO0K+/RYnjc5x6jgEAcqa4QEsAbg+YoS1YeEgwNQWvWIjpIbpEj4Yqw+b4zey
QGf0UT+MC9DQFYeGZJ0Cfpgvts8zODX4adza4Ax7hsyD+QOQ7IOsAd5LOeOba33wnl3heLAJ+GDs
nkev8E0fcpiO/uFvzoX3N1mkZ6454xnPuGIjyDSbmONvOQpxGF3DFpIt90WWybzIX1+1m8M0jNOh
J6Ja4+JYsOFZ/+E3c+rjWX27OWTl2DoyYCzskKyWYIXdoava4fjQwZxhT67IM3uSA2qyJoE+uC52
r+/oyk0NyBhHEE08gwSQk5byztF3mOcTrx9DAFCiTgbFfTxkyu2T00GGLiIyKRTLcxgPyuRjgnyX
k3DqZDDsAUPGpB6BBxiMydhEc9qX+va3Cc5BGO5NEXPeFwOkTaAy5F0noTV2yslA4BdgYIS1zTPk
lfvec2PYRcaEnKHW7+77t3kkM8HAaisr4QEMsDNWhoah99xEfAyZcRoTcOxLjeOfvlSex5gzIp6T
U3yMO+8RRf94G+cLHz2X0nNKvHuqbS0DZPdpKw4RI2mMDHL3kBJt16MOA9jkAajhGRkP38g2+TS2
Kktkz+/GWN+xc9BqlDeU6I5n0Bk8ZVyMKdkmY/M7PkVm9ReP8H/IqlZtiJ7MifF1Iwe80R6nokaJ
ADtyXrclkX/z6HsGWapWX/A/8oCvXifkWVKdrjc28uCa6ryQU/PGVtTFR/QRgA5dq4Efrte+9jyz
7kzA34ByDkEImW+/cTRrdkibWVcRuTQX2gCw7EW2/dFd33m+PtNvf/s9dpAu4IP2PBOfvfohV3iG
L3iqjUSkvgNy5I+dqsdDsgtZIwBYk9lDXrEYU/fgH4BojqK71a5Yu+A3bUa+ZLBc67WkcfnNGETE
dNE4Y8+H2Cj6Zbz6TJ6Nyf1ZPwMP/M5ZYaPwlSyQQ2MxRv3uHoTj2b5nqzfbSU9rAuSRRtpMBBxE
NLxsEYDIvJsqXS9iKBiivvdmI62NRJBZXLnWE6dGGmkz0gjII+2QxLMXzYg4ePIbeUCIaGkzvq/a
3kl0LuPh3814lN5II62VRkAeaaSRRhpppO2ARkAeaaSRRlo38l73+dPP4dPPEeNnwz925iiS8pMd
QnpGQB5ppJFGWheyAMpWvcn42eaf608/m/+10XYLyFZ72udmC1KXrMCzz9D2lnm/rwdZhTvvsAsL
hezjPLlP5bFSc9kWmxQh2EiyqtRqRivArQath0FYvWplZt0LajW8e6ywtvdz3iIobVhZaaXn0JX3
60UWgtkbvKyYgpXdtt5VskrWStv1lP3u6tGdmaywtSK5S1bGWzluu4ztY0NtgRXKfWV6TxpZXbwY
NE44YdLc4x6TqV6OAJrP3/8+ae5970nzne+sfvePf0ya4447Ke29ftPL+poBOWXKFv226O9F9yw6
FpCy2d837zAFy+wpn1KI3So6y/qwljEyuvbidcdrcZB9cFt7uEAf/5a17Tf7QG1dmDcf/gZ63eIr
Q45gHHpMo2cwkopE2KOd/cTIFgb7OG0D8q8tPDmkw95Q+43tUfZ/Wymy9cQqaPsQ7fUFjPMKjgzt
9zI5XUTZ51hrrHfbtK2iC9icDgVE8sx5z13G1+71tgilxvDQcQy5Zr2P4FzW3qLf1nqPcXGCyHr3
e0BtvyonzxbCZXW9wx//2rKTEqFrsRnL9dPfhzR9oPGud02mdmv2/3//e/413e8XXbcen6F9qJ9/
/Wt4e8uu9fnrXyfNE584mTriq9/99KeTadAzaf74x1l7abOfDwf/Zx42Lw0GZAaVUiicYPO1Ygsp
vG9PmX1rlMP39rEybjaVi2IpgO8ZYftqkSjAvjqGxyZzAFMPFvActVNTrg8BYpv5RcciVbWpRVpp
j4KqEqSgQVbV2renEIfiAiI5/+r/sm0UojMVjPbdd98WFGy9SEUpSm8jOw8bcNiAnr16lNSeVWPy
m/2dQ0i/bODXd+0aS6I14GBvp/+noo/IU1EChyW4B+/qeBRiAZR4HrJKFf8VB7E30b5tkUUcGs9T
PEVFKxvuh24z4RjJGFRjas9lKgmZM0UlUhjEfsVaxccciwbJkIxIeKlfeNhH2d+tiIt2I1+KsQDJ
lKe0Lck82jeLzA2HwZj1L1ui9NM9QNe/KftJNhUc0N8U9g/ZWuXAETLrmbV6liyG+bMHWkGIum9Y
hsD+ZZkMH9t8kOILiraYW+1l/yq5Vr6QnGnXmJMF0U99UzTHXs2ciJZzwukufmp7UVnLoUQXtK3A
h2IaolPZDO2TMeP1G12LHpIn35MvxRzoWMh+YHORg01yqAgHLjaE3leyj17xHjqKt+YXX8yRqnPZ
O04OFemwrxcf9JcjX4u6sBGuIUeeb97t7U2NA7xjc8gJO6cATIqkrJJ53bs1qR/96GTqtE+mfZqB
yNe+NmmufvXJVK8mzW9+M5nq4GSqo5Mp3yZT3Z1MeTEDlL/8ZdK86EWTqc2ZTPk7mTp6s+/f8pbJ
1OZMpryYtfWgB02ahz50MrXJs9+POWYy1eXJVDYmU74MA+Ivf3kydZYn0zmbNLe+9aT54AdXAfQd
75j14c53njQf/vDqPb/4xQw8/XbYYbPfv/KVSfPoR8/acM2nPjVpDjpo9r2MgDEa78c+Nmle97rJ
VGZXn/XFL87awpuf/3z1OU94wqQ505kmUxs2merUZKpPs++POGIytfmT6dzM/v7VrybNDW4waW50
oxl4N825pp+d5PhFUY6IizfKCItuRBOUhpAzQpSMp8rIiSQYS5VgKKIUMEBJtSQgTfFEwIw0Zczx
YaJPz1HqrpbLE4ExNDbRe94ee+yxUoQECFE+hsFGc2AEzLVlI7lKMsBTKpfxXXb2co4qZLyM1fNS
/INhcfhACqNQ1NT89Vw8Mm79BzD40WfcGB390nfGyuZ4fVCtRyUqACwlrBB8jh3DR0YIz/WxptAZ
a8VQGLI6JnMA2FUNwnORrI/n4o3+K46BtwBpSMGTvsMlAjAxkObCXKeIPyPu/+RAO4pYmBvjGeIU
6LvtTVLGngGkOI/67jvVj4AEJ8QHIBun53KEkmmJA2Hs6q6TK+l4vEqRCP0074C9khS7udG2MaUC
FZ5LqcoCAGLVplLBiEyZQ31RhIVTlcIinAXgirfaCx88R41x4wM+ijQo4xqd8TdH0jPJE5DmQPqX
jGkHuJjrrTkJRyUnMsqJA0z6YP7J1OlPf/pWt+mGYhp4Tx84mkCObCqCo/wkvuaUMXNDFxR8oF85
glGREJWyUmM+xGmlK3RMP1IIxnxyZFJzWV9SXQrhNdvg+SF2h3PP+SYzMh6pYQ64OT2+4zgCfzp5
Yv45bOT/tCb1d7+bTAF+Bk5A+NvfnkwdlMlUhyfT8UymzvRkGsxMpuOdTJ2wydRxmQHMy18++xx/
/AxkH/jAWVt//vNkqs+z+572tBnYAbU//GEy5dtkKleT6bgn077PQParX10OxtoDhJ/85GTKu8nU
kZ1M53MV3J/+9Nn3X//6ZMrfWdvuecxjZteJZr/xjcnU8ZmN8QtfmEzlcjXdDETf8IaZMwLERbuA
lLPg2s9+djU6lpp2L3BO//Tfd5wGv+OH7/FOf175ytVI2rM+97lEz6dlEXZ8QKbsBLTWgc4JIrzL
FFkPASFeJmNAyCO8vmd0kagFIIt0Kav9ht3KKu6t7yBFdPVvNU4BleeICFV2oYAU372pWENJGbK1
HF7NeKbucyUgjxfZd8q4qQyDEjEz6vrAWORUp0XE42a0OBucClGU6AKJmHLUJQPF8CW6YSRS1WYe
MXTzUr68fABRSX8BtSiCc2E+AFE9+GERMVLmYd75suQDH2t6UEZjr732arMWjjJMxIo4B0BJv8lU
XylVhB9kCBBzjrxOqNWmgG33kAoRXS3LaZypTAaYAUAAFc/rIRvADQ+H8JqsAGrzaG45WP7OvFdQ
AFQ5R1yUX2unhzgteJ3xcRhq9THjBOTduaCLIj/zLKul9O2QuV1EMlGcbuOib6n2BgTpaKWc3et7
US75AnLOsNbfbq1oRMdrxsVzMieV5h0Fi8ib103sAkekW3WOI9tdB0AmauEY88le0cVUu0OyGqmJ
fmJAPt0KqBx55CyyPfDAyXTMk+nczyJa4Hzzm6+Cz7HHziLNP/1pMtWJWYR81FGzaBKQJeIVGV/t
ajMQq+Dq3sc9bjJ1tGb3iLhFrMsA+Z//nAH7oYfOHAJOQwDxNreZAbyoVCR6l7vM+sSZEO3Wdr73
vRlQi/BvetPV770jB8j5+253m0ydxMX9OfjgLQEZ8Ip6vV/uXssZ0T7g1+bznld/5xAdv+MDMkAF
GvUcU+CZ4guMaDWCvH6pVtfwVgNeFC3C7BpGSiTCY2bkuu+JKENdKKQPKZPoebxaZel4/owMT5jR
A4Ki96TLtDHPwC0jxrICciJASi41mfFS7BxMANT00XfSmNKHHJZl5D25SNa/7mNAcsgGAxajDZBT
qB4BrJp260aogLKemBLiBHXfu4uoLn7xi7fP0gf/MnRDItRFh0vIbBiLec7h7pl38iIK5sAkUwF8
6xnKHJruOctdIl85A5azJbLM2bxVhuprj8xZXdRTj3oEGCp7BZD1oS4uE+GnqH4FkJqNMFc+QE9K
NbWQzXHS3ZzFnBseHYueAKpEvmlPX8ix1yUhr4YqIAPEetY0EmXKNFW5NL/dYzzXskgRgNLZROEy
HhwKuoz/GQfHgE7Ktkjz0oeqn8YDVOuBMS20TZ39+o7W88hSl+YddJP59Nx6QEwl+tV9Jn2qRwZy
IDhA1kmwA+SUHHgtwlk9MeHnrivgIAoENFLPgFSK2vfAS7Sc6z70ock0Yp+lqy9xiclUJmbg/fjH
zwDzW9+aXSdaPeSQEwMU0JZ2lkKWTn7Uo2Yp52WALL0LzD7/+dlHxKkNKWbvty08057Usfakm0Wt
gLU6BL///QzcORnXutbq9/r5zneu/m18H/jA4v5IY2ujvkPmnNT30J6Tv42TEyKzoA+rbZ222Ski
ZEQBCTnvkiJ4DytCozgiU0ZMdMHgUATeJcBQIF3kxXjyWqWOgSildPyetFY87hxqzWiLIFzrPZTn
MBgMjrY9x/WnPvWpWwXXNu8fsHgmQyU9TqGkoBR+15ZIVmQ0ZHGL9BvwYkyMGTi6z/s8aXjPYNSc
wCRqYZAAAkX3bOMy7r5yioBLFAmM3Kd9gAlggAlDBlBEIZ6bhVOuNwecgXpijPkAZlJ8KfgurYh/
7nEcJhBjCBP5ySCYGzzUDicCn/oOl8Aj8+B9NqOVNKE5OP/5z98CV452DNgCJ+e5imxdL/2Ll15x
WOzFSSNfDHDXQeuSMQE185pTmnbbbbctDsxwyAXjn9rQyLhFRO7DH/8XbeI5h9E7SPebBzzHE/fi
j/7iIbnI3LqPATcPrgESoipOErkxDrJAjs0j3gWsXMs5kLJOxoPx58gCDvxwjT6Tc5kRwIpHsgxe
23AIZBqsxcB3fct7Z2QuXZ8+4HXNFnFW561iXkReA+g7WaT7ZEDf6LyDAPBbJG5u8t6czvqObNAN
MioljK8cBFE0WSZH9NXcAmb95ujSA3xKtEpvOCeyLL433upUGCceVkeVzOmHLAXHQX/w1asBjpNU
doIMMk0+zBNbxOkExuZ/vqPIQb9wU9+3/vd/z4D4kpecRb2+9175f/5n9p5ZdPmAB0yaC15wBryu
eeELJ1MeTaY6OPvXe1K/iQr32mv2HtVveQ6gk2I++uhJ89a3TqZzvGW0Oe+jb3vuOYsuRdbPfvbs
A/S0rY/akybXB9G5iFQ0DaBf8ILJlI+TqRMzS5OLZL3DFmm/9KWTqc7MIvXf/nbWzoUvPIu8ja0u
3vr4x2fjOe95Z+l5UbW28MU78qc8ZZZp8K8Uee6TTnfPiR2PCzWbfevTmlZZU3pAauGE95rVixWl
AEcKlBQRI+w7SihCojj+BriUl4FgwBjfCly8Wt+5lrJS+kQwWT3MsFFqhiQpOoDoPoqd6Fi0oQ1t
+c07vKGrTRlk9+h/IjnGRFuMGgUXcQCzvMMSJfiOYZGeHVJSUSQFGDwLGAJ6gKANxpfR8H40vAzp
i3v8lojHnCQdmjEDPPzjLGjPHPq9bq3JwQquZ2jroptFgIz/9TlJXeIbEMn3PjmcgAzoA/lB5gpo
4UEcGdfn/NM+wl9tkJEcLqH/eTcfGcLLuk2Mk4Pn+pn3/JXnnBTRn/sBmt/wr2Yy6gEYZN7vHB2y
V3WD4+J646zRNrmlI36jP/Ue0WNOIvOuOyQj4XtOon77v35I91ee54S1ELnM65WkxgNSTrdy/1DC
D/JPzr1TrwcQACzPwiNylzEBS/fpG4dBdB09xIdEwdpNNoVD7Tv9Ds+j15w5z/eJ81YBmW2Jgxgi
766t9/lOX7TPlsSxxkfg3c08eZ2wePX/fZq6dUf0++tfT6b9mEzHMvseqImApaK9H37uc2fRaN6r
vve9s8VbrgOEvhOhipjd5zep6bri+EtfmkWNz3jGDOQAWt/2K0D7nvfM2vM+u66G1l/PA9JS1TUq
9u7aPYBXJFtBnmOgTdExcDbm5zxnNdp2HwDPPa7znXGJePEiz+KIaC/vzPEz93FmODLGseXY7rqp
wXjNgDzSSCPtWGShGAd3a7fwiZBFxI7WzPGEJwdxTmTrvEuvr9hOKnG0OEXGJGOhbWA/n2T4TtmM
+4s35gOUOQ8yBdLqW75j/t/Tzwc3vT6OgDzSSDsxiW7X45g6mQrZDxG4VzDZfratyXtgz5etqAtA
t2ZcXvkAY46L1eDLSZR8ivGzAZ8TTjjFdB5OMZ3bUzRHHXWKqezW3y0sXt999icHjYA80kgjjbRu
5F2ySO2Y6ef942fDP8f8h99/3SGkZyAge1dmVepR42f8bMDHtpfjRls+0kgj7dQ0AJClaP5vM77D
GD8b+7lYM9s6MtJII420c1IPIFvoce2mGk4r/lRLue1tJ837378xxtnquVpKrftRHcaqvR0ZoCzt
V0AgZeO29qPijeo8b3vb+vXRKlGlAE/KvVZokiHbIayonH1/2DYVfivPbauzPSYV39ZK3i+6v66E
HkpW5q/H+1srhe0FrsVOtpasmFdJzBafrIjvkgVhtkzZNrZs5wIeaWc93uluLa0Xz7eGrPBXynZb
kS1gahLYFtqVfwvxyO9aVtmPtHHUA8gWZuzSxIhawm/DtqX1SqApqbYRYKRtG9UX/W6LgKXyOzIg
c0qcgqKwwHq0p0qQEnm2M6xXH1/xiq1zjJTGU8lI6bvZd5drtvW7INu7gEVKZ66V7KNVKGLxytvF
pC71eoAUgLHne141q5NKtmfZm63SWXcLVciCJ1uE1BNYBjC21ClOYvvXyU14PqQC3EaSoju13vlG
U0q+zts/nVKjy044G2nbUQ8gH9nEeIpYRWxnPeusiLmN6gBaLdXrXW9WCF21GddYmp6KKqqwKCFn
4zeAyd46S9ZtBFfN5pGPnFVdSXWXhzxk0uyxx2yzud/rBnD735Rp03Y3WrNZXZHzRzxitcKN/XyK
lNugfqc7zfqtTF1OD7GnzXhsZNe/7Bec91E7Vik5/bMp3iZ6ZepSW9W9ysyJ+izLT3F4Y1MKDq/8
bZO7v+2lWwZYSu4Zz+GHz7IS+prfjMGmer/bfzgkUrXPT79ttgfOqvTkN/sDgav27B1M/VhVfZ76
1Nn39grqh2fZ9K+A/j77zOb4drfbco+hCBhv/KY+b/YMKj5gH6W5MF8q/NhHObvv9NPPV9YkwCn2
oNiJwhiJVO3rVTjD3l+FKhTuqGU67ZVWncl+Xr+lHvki0raSqfYBI/tU/W2VsiiDkbX/W+Use2kR
oLQnWgSZAiiJJPXPARKKpni+7TRD9scDcH3RHgBOCUj7eNWXVyAFL2otcnuyrX52jyIeoiHbnBS+
SbUw49IPK5QrKT7TBQ+FfWQWRND2fdti1FfVzalf9oMbp+Ir9pynfkAOqxBt+35ZXfQAmr77GK/9
5PYVZ7zmWZGPzEX4qvAQnisMYqx4MaRCmRXjKp0ZA8cnxUn0nyPmO9Xn7Mvvi77tL1cYRz1sfDBn
kSmRs/30+IBP2bu/jOzVti0r8l+dDc9SLEfVRLznjFT5d7199/oRp0vhJVXiZD/sw1cMJY4UBwyw
65/aC3VPvefiA53yScYJf/HIPeaEvPXVUbcX3L5y1RvJWPb723dP5+iZfivDbG48w1xzLFJbQZ+V
U07Vw3kk82OsdIUeaa/Ww+Cs6C9ZwR9yqT5C97ATcqR4zXps9esB5Ic1dQ8YYHSSh4jGZm1RFxB2
EglwtbncJnDGNnVHndqh0orzLkVUaq8GbES5QEFZNqCe6E1aVTFy93vWakpzZuiVfXPKRz3CSySp
wgwQVGFGH2xWl/oFGsAEEAJfwJQIDdBwEkTdTh2pFWHmHTumfJzoXZYAINlgL2vAYfE8tWn1wRhc
h2/GceMbT5qPfGR1473+ywQsA1Dp6nOda7UouzEqCM+RUGVHFSCl+FTO4aCceKP8iQH5gANmm/1V
9VF2L44EQPWdvnMAlPAzXhv3PYuD49nm//vfnwGrqj34af5UB4qjA8zxW5EDqXLPTeqdnCil5x7P
4eDFcWma/zX9HLsmAZaCVIMYUDG+jA6FB5TATrUzxSQAaGpQAySGRuEWIOn4yGV1wREDyahQ4hwH
yJAx9gy1CFB7okrGkTFlnEWQnu8+ihzjwug4eUs79svWesmLiME2PoV1XK+QRcqj2nLk9CNFYgCm
Pvm/IhuMLLBgNIESA60/xp7a2oyNrUKpox7KMZ8hRgeIaFt7qmrZezyvlnklgKYAieczevqgSA+j
rqAJgJCtYGz1dRlxwFToMgbZCX+bC3KgPQU/PAcwqxSWVL4oHs+BeHjet/9an/DY9frN+QBWSBEY
RUuAgjkGUtLCy0CebMYxwj9tut48qcLGuSDLCgDhWcB6mfzjXZV/c6k9AAg49F3t8MwtsCT/tnBF
/lMBUNEYhU9UIKQTXjdonyxzFjiueMIRM2+eRZaBliJMQBPIaRcZB6CmD6qp4d+yCoDRDc+MvNI7
cpfjW809PeMoAlH8oxNAMdUHAagx1iI4XVL+GE/IEJ4A5tRiz0E/Xt2o9shxVyOdA6RSnXHiLX3G
J7amz5FcB0C+/xYGXYq6FhHPR3SZYuLA0Ikjia6cxpFjwoCdCFr9Ue8zgXnaACyJsIBjjvOa9wFo
otBaqUY0Xa8RNabwuD4DyxzhBWRSDUZU7Fr991sF/3kfDocI0/9FuUDQWDgconRtADcRqBNfsnkd
2LnX/z0/p6ss+4i2RaT5W5SvpBw+4SNeO19V2wA+WYFFH1VvFI5PtM8J8n8l7bqpZ/03X0rxifA5
UP4vK5AxpZRe9zkiX++HVfXRP44DXomq8Qagx8G59rW3jNSbZm3vQYFUTmCigA6XCDjw1HN8IuOT
OuoAqh54Qcm7Bxx0icEFFjxp72uBMsOe6K/WTKbUjDawdp32RcnqhefUq1zXdxpYJUaRYwBkGFCG
IJEIQ54a3PHaVQFzXbcONJ4AWsac8Q0ocR66tbC7gAx0atSB/0pY9r0TxYMKtApumC88FemKaBhs
86BG/bIoSjU7PEecH1GRSAYIAERgL5JxHRABApXnHJahJPLXnnHrv7HrO6CUAq79ZJB9J7JaRvqa
U79CnDljqQTs+16lpOJc5F+JUXJnP3Z4FGBM3XPjqfJqzmttd2VRqywhzg9ZUUkPnzk5olWOAB4k
W0NWzGkcTM6ASJyO+s14+iJkkTj+6Be94cgluyUTknrw5kAUnKyEueEwAGg6PuTVhExPsmOchqT1
PYPMcvKMN0f7apv+GRd9xnPZrr4M2zoB8sOb7kIj4NM1wNK40tL+L317//uvplUBcoBXJMRQixr9
6/ixerB1IjypXRHlooOvGfBaaB1wAORaucVRYQAjgOwEkUSJUrBxMKTXRbtqwgKXvnfTongA5ln6
aIzSssbGEbHQTRQv/S7Kr++E8QVgS+XWUnDLUtYALH/jrXJ2otGLXGT1XFSRs6gzTseij4iU85EU
v7nxf4ApIq6nwRgTgBedi3TxSIaEoxTgNxavG7rPAe777z9L7ad/XiPglfHkeDgl/hTeVzh/tdrO
RwYLL+ClsABG6poBFgEFYHjmSbfxZHMOMyWs70UBdT3YYhEYMgZSkyIm/6a8qBONKsBLs/HMRVA5
IpOyi0brAQYiiZSCHEKiHl65SIQRAD4AEyl7Wk+PYlD1CTBJ2Vfyvd/1i1ENcR7wsxLjXd+PM1Sy
DSGGF8/7jCznqJ4jrRY1wy+lCoClrEXb/hV5LYu4gUHOTMZrvDWnojntAWBtpz0FPSrP17KAj9EH
VuSHcZbSxzu1wAFcPcbVu1rAKIpaRuSlC7T6pL0aXev/MkMf+efkkX//qtGN9LWeSgZQcmyoduNM
IhFofS3BYUht/JBIVWQI6MJXsmesIlo84lSIbAFjzmKXjaJr5JWe0pu+GvXaTzld2QfRfSJfoJ/3
3RxKIBl9dw254Dx1z89eRByJjJ1MJkKmM9ZGVDmKkwKg8YzT636H5AzJcK0DIL+gqWdoAgNlywCF
VG3eW4rkGPSkmi972Rk4iKbOc55ZfVOAJGKVPmbQRU6MtTS2yA9YZQUwQPPeFwCJ/oCkCBpQAAX3
XehCs+PBRMe+B7L6IIqT0gZ6QEc0rQ++j4MgxS5CBDR77z3rCwAVPerPMlDzDO+13S/9yxkQCXsv
CnS84xa5Aqozn3n1MG4fKWsp6L7i73FmpMcVqOdYKDwvPcwpMheiXc/kADhE3DO3PPlky4/fOBDG
LnNhTpyvCmg9izMBsM0rfue4NGl8x645J9XzvIPPgeqeK4JXoF4fRcbmGU+k0PXJfdL4eMyp4vgA
ahkCp9n813/N7pud5nLWqZP0nuaa17zRIAEXkUjzMW7SdRTmTGc6U2sUGArv6RgXqSkg4qzgnFUN
aBg7EdQZznCGVpH7Umk8fak8768uetGLtobAcxxGkft55d4RAuPUJ6fAPH7vLylwPHp9oOwcCW32
nQzG4Egvaotxk7IGEDncAjBKtQEJKXQRF2Mp0tI+I+t9o+eK4gCIKISBE/0ddNBB7eEUDB0+ia4Z
JQYHCIoWRWQMfe4RRTjkZdmCLf3GL/xnjBlAfeOcSAcysuZPG3hlbMsAXl/233//dtwOdhFZAya8
xX880Q5nxG8i/wCdsTOufucs1UM45pFMh4MmRJTuwcc4FhwVbXHm8MJcikT70uDmgEE3ZrILzIwX
Hxh57Yooyc6yzEPkX/pYW1Ks5B9fgTVHRH9lUpyGt88++7TzCngi/+Zx1113baNp8yv1KyXMOTD/
ifb1Q2RorPjpOvPASeTY4ZHfyLC+uxaZC+db6xNH0PiStVpEHEugam6AuzFxKMg2Z0uGiq7htQN0
8goBee0CwIec9609+kyGReXmxdGwon6vEiKX5EjqOv2W1ZpMJq08sCvOAO97ZbNOgPytZrbQZpbK
FUGKyixGAngpLs6YAk8FxRlf13jnCbj9H5gAAQbf31m8JdLVlveNtjLVqFHEyWBbYCSFLb3J2OuD
BWLpRz3mSzTnN+9UPc93InfX6p/3vMDAR3Tub9EuoHEf0O4DSgXjgTKwB1rGaVzu1X9AqSi6FDZg
A9C5F9gB6hrtL/roG8dDKh0fRebOH62L2ET3+g3QRJ3L2pUN0G+8MG9A1P+TOgfynBHtAdLaZ/Nn
vvGeQ1Db5XCYB05Z7Z/nicb95v664IsTwHnhsCVqn2VHrjqdp5dMDcJVtjjOcxkBHEpIgUVKjBDv
mGfNm6cwTg1yjb/zDte1FJ/3zpCIsPre10lTAXsAE+X0Lku7jKf7GSt/M0iMlfZFbYACGPl/Drlg
VBh3hpQhq4dfzCMABOgBGoOaNKNIIscNMhaelUgGuDLcjJe/GeCcqR0++B7fGDbt4p2P/2vHvyKG
RH45SMP37nHARfeM7Uoi+vCegbVQrJagZNC14XuGtx56Mo9crz3jBl4iQ8ZeGwjIy2ZoTyRYj3DF
c5mFoTzn3BgbcDLeGllm/kX0Pt3DLJYR54jMAfJEf1LNjLznAOo+BzFACXSr/Oc4WDqkHTpAbvEs
x9fikT4bD/nnzOiHtjLnPrUeuGeZH9/XQ1TIpecA/vyWhXQiZHLqYz7qgSzLIn/t0SmLNHMKmP/j
GXklg/RcX6XRQ+Y276/7SHvup5PAmXPu7xxsI8sVuaS7kUv9Mx6y4fXHSdlhcRIBGV2/FzzGz/KP
aBpgOXYtC8rGz7zPkdOo71W9C6xGGmmkkSp5xw3AZQL6XhlszzQAkD89/fy/ZgSLk/7x/lp0KuIX
mdajzsZPPgdOP3+ceqq/G7QVZaSRRhopJEsies5ri81KAwAZfXb6sULy6PEzfjbgY8vFT0erMtJI
I+3UNBCQRxpppJFGGmmkjaQRkEcaaaSRRhppO6B1AWQr6myhmEeWk1uFt7XkvaJVgbZwnNxkrEPK
HI7UtCUbbSvI6s55ZDWo9z+u3QiyCtL2nq3ZvG+FpW1PxjJ0FecQsnVko+sa2wLSXU1s65X3bVZL
LyMrWfu2qWxrskLbPCzbGmfFsZXHXcKHIVti1mILNtuaB6uErb7XdzsQrFjeqDHQ7XllVW0nsp2u
lt8caZ0A2V61bkGBkOXrtSDA1pDVt/ZFrkeJsq0hY12PuqU7A9k6YM+prQWLiDGwVSJlHNebKL09
hfasnlRiVOxFNBZbO9aLbKdYVm93Pci2I1s3KnEo7bu0d3kZcZL6iqZsa7IX2j7rlHucR7b12B7T
JYUp/LZeZE92LQ6yGchWJkVC7NNX2csYgPJGkC1Etph1SeUthUY28wKsjaDBgGzCKDCvhmddC/Xb
+6bogTqqPtmXxRu18Xq//fZr7/PJXi573uz74ularp69eLnPpn3Xu8Z+Ud4cRcymcPep0tOtKFOJ
d2YjuntUMoqBsek9f6fur8IO9QgyXrTIRXUne+BE5/Z42uBurEq2+U1xhpA9efahiqRSLxjx1vHF
Hjd89GwGMsvz7ZMUIapuw4gMOQote+HwyN5SY2Vk7X81XkbYvlj/tzlfOTsVgnim+g0ga9lGe1ON
U3vatYcWiaSM0ff25NmPGq/W8+z/1J59n3Ufr+IDxmQejbVWd5pHeKRqlH2ZeZb51g/zpepW2hdV
dqsLzSP9JJtkwNhSqSjyZyzmJUUtyJq5EwEzUuai7sNEdKBb+UofAas+epa9qQjPlRu0BxTZ86l2
bopRGKOCHnUfo2hUJTDXuF9/FGEIqZhEVskKXqVM5yIik+RbQRF8Nd70hy6qXGX8ZIOMJ9PlX3qu
L929o/ajms/ME/3tK4zA8JoLekueUvBCBo2cmGNAqS9A0z5opOKU5+CriDclH+27Jtf2qMp+0LuQ
Pdccp27JUJWkzna2s7WlPsms8SYy1H/z71myAvWQCPtVFeDAR0UvfFBsAUdPe8k20AnV30SfZNbY
ImPkzhwYI/n0LHMZW2B82sLXvn3xJ5XorXGrtEU/2TpyImo2P+Quh5RU2VtGCmmYx9Q51x47zU6q
dW5Mxl3LluKL8Ztbc1n3XcMX9pIeJruGn/imHY4+O2BO1lLtbocBZAxgJDCewBPCCC0jooYw5SGk
KSkokmU8GELK4PcYegbbxnzMVHmI4ptEvwPglKvTtuopjAcBJegMiufrR930P0/wGKvLX/7yK1WQ
AEdKG+qD6k4iH22afN+5j3JSCuX49IM3KVIgFMaqf+6pwuA7ykWA8IoQAldGB1/23XfftoSgjeza
YqT85joGhRFiLPoiEgrEEIkqgT4QZqx8D0AohfQs7xRwAQj92GWXXVrDon8cGQon0md8GSJKiF+U
g1drPvxfBKdvxqAqVQq266dna1/2QhRKJjgd+gBogNuee+7Zmxo1v7vttltr6MkKRZWJ0BbgUaEn
adfUrq5OYZfwlVMkO2O8IoEcxKBN826OjNdrELIJEFQtMh+pRERWqhFReKACMkfIuBkxYEmWVG9y
P55zSAMuHDEAmuwKhwgQpgxknAi1e8mB1Cz5Vx7Q95ws8kNWyCUwVVmrr440J0J5SnJsDhne6DSg
ZpTxAWDm9CiyRLbpWwpuhDgqCkQYFx3E2+j1IlI0Q7/xEhAyttFR7agORVbNtTbplrHjNTDTP3zg
9CA8o4faNCZGOils9oeTmjKSIZGs+aDbmR8yTmbJlPlh32T1zLO+6a/5JAvkEsizJ8g8Gjv7pb85
Kcj39MT1gJ5uRWY8y7gcBIIHdETxGLaAXaAn9ElfOB3keKOIw1VLeOqruT3f+c7X2g7z4ECUvpO8
yD3+A2J8NTecZaBPnoAyHaQb7GeI/HI4yYZ7ImdsOvuDT2SWzJN9Mulflb/IApuDf56/0wEy74WQ
M5IYRBlEMEh00z0lJkTZay3ZEOPK0GuPh0t5KAeg6KaaTDKFN5kM0N57771STWUImbjUP1VKMVWC
/F/kZJIJBcNMKHixDHElRiPRvaizm/ZimBUmr14tJwAAhhjFbr8pKIUHqBQSgPQddg+E9Y8RYKgI
uj7luDaGRF8Y9UQAlAqoZc6QeWGs8bybVgJKDByQpriUk4IYE8Vg1CmU8TA8+sHwUA5tAqhqwPve
/TP+FLdrMHLoA0PI+OIXnvaV1mTEa3H9nM6EzDFjxyDrN/Ang+RPH2qlKHJT0+1dQMYT+jBvfhBj
m1c2MgVdb17atcoI4hjWmtecT0YKeNdolUx2DySYR+SEg9QlIFDPyPXMbnvksgvInDCgKhIkD+7r
W1MB/N1D3z0zBx2E9K+uITAXHKjqcJuXODcc31oT2dzWdQqcNUa7SxyibpoUTwGK+9kG/3p9ImoF
mvUdOuenRo0yIDW7F8LH9IcMdfXLCUN1jjlcHBLATyb1QxscxY0iEW23whpHnm6E6glKi4j810NT
2IboGpvWle8Qm5VsIEcs+pqsC5vMNrMl9ZWLtpOl2NFoECAzwPHmeIzSKt49ZbEWAe8a05CIhyJW
Au4mSfTkXkbLQehI24ve0fFweWwiGx5V36kqIR4zBaYANRph6ChUzlaVDtEXHi6DsehddddoB1i1
VcsSGksFBU5L9RARD5g3CWwYt5QWXGbgKKnXAOm3D0BJ5MMpoNyMT7x2DhCHINdE8EW5wLb7jpfQ
cwxEYvgNeIEH0MUf4C+6qn1gbD2PsnB0QhS8a9S7BGCdX1zHrU8pVSjyN4eUc8giKLys6xrck5Q1
Xql3m36bIwaT80K+1LINiabq4iDORk2Fmrd5gJyDLBhahm/RgkQ85ZB1AbkaYobLnOoL0AqP8JXB
7COA0gVAZA6TNUDmWMTSBeTuYjtGVpuux1d87sp19zl4DKDIFF6EP3XMHLtqc8hg90zg1IlmI8ht
iAMUsA4g41uX6Hz3NQTHQlYi8iCVa0ycV3NTSzNWYh/wPxnBSmxBSmmKepN5qL/Xxa7siaiZDUo/
8KSez7veRL+6p5wBZI4wog+ON+xLncta5AxwxC7HGQK01eZWYqMSfLguemDcbEH4oH2BXYjzVud6
pwRkRofx5k0ySLvvvntrrFGOYBOJ8sYxLxGM6ItH7HuALtVqgik+wNKeifBuR/Qg0qSwogoKT1ko
iHv8P+kiv1EGYDEkraNP3mXUCEN7vH3f8UpFVSaaovEcpbdT7J4DkciagQU6+sBIpk3CzPAk3cOJ
cYqL6J7nK2WtXbxIn3mfir7jnfbzTmUZIDPyjLv+8yB9eKiMogiVcwMopESld8yBe6SOKbzfPMcc
cI6AdY5gE23jFSOiD9oChJ4B5NzDAJkn/DFOvGN8zAWw5pQYO7Ax53vssUdrXBettqf4op1TnvKU
7esKjhNDQQ5qukykLcofskrWuICslJz5uNSlLtU6MZw67eu7SAcI5MxX5AAEhsI9+kT5OTHmEG9E
UowFwBRBpYg/OcJXc9Kt2Sv9aO5rVG9cnkteOLfuJePmSV8ZcG1zWN1L94zJ3ABR/aBz86LALnEw
OBpk2XM4NcZkfMZLTjwLv8mLPtBpPNE+RxLP8srAsXMcbTIBrMjUMkA2BgCsDW2yBwAQ/wAsuTdm
AKF/yeKQN3POTvjeawYOs2dZ1AWUyaHo2+EV3k3TXfJojObbmGtWgnHXjvkRuZpnfKdPeYXBcQAw
5ghvPCeHKtD7OFb6blzmX3tsVhwpckyH3KOcY9a+cNzJiDmNvuG931zPwUnGTh+qA023jXtrF6Xh
rzGSCQ42OdQv/QCAzvYl7/jGNvVlI/WXs5uMCfuVtT34ybnBW9/RR3YAaJufvK/HY3pAxvCQ/OtX
MoD+pfe+w0+6zV4v2t2zQwMyIhhSvBhFwRgdYBQSOWMqYaV4eb9MaBlthocCuM53JiRF+LOwKmeE
UjLAbSJFWpSComk7yuAeRskza1S6iHLCSRcUTD7AMR6KH28QGAFR3prJp3AZUw5VB06EsKaBY2SB
tmciCqQdwg/4GJkYMIJPEQOQ3tkOcTD0kwHCI8YH8Bub+ykHxwL4eCaHhnIxrAwUpWNEKt9cy9jo
A0Od7IB+SdOaKynT+t6WEWFU9CHvYXMohOsYWPPHUTHu8KNL7pEGZuTNQcbUNfKitbW8qqCsns9A
mCe8iMHEL3NkvOQu4wIWrjVWRjXRD6OfbU8+efeV/jM25AgfulGN37oZAqlY1+NLzkv27jCpf7pG
rjhq/qZ3cdLMm99cu+hVUZeAHjnAQ/eRMW1qm9OkPXLpb78D8Tpe/cv8AR76Sc5FU0NW6OKV68mT
/wcIOGMAMrrhOTWl7Fogaj4Ye/oCAPTJd+wSZ9T92gGiAgZt+Y7e1bOHyYS5IM94G303BpkAz6cb
HLW87jH35sNvdKOO1/1sAd6Fj0hqWzscKGCuP1kHw4FJ34whiyTpb9ZO0IUAZUg0mXOst4a0wwZk
bgVE+kvf9Md3bFZkTxDRd4IVG03fBW7dhWDwwFjZJtkJcpw5MxdsT56b7AUZ1C/9FD0bM7B2XWRl
vVfMbypAHmlzEyDz7p1xGJrq316I8wXovNfrW2CyNcTpwiNOxnoour7it6iz7wzYIcRocm4Bkw8D
13eA/UgjjbR5aATknYB4t7ITIg1Ryva2r7SPpPF43j4b6RGLpMKjbIvbGuL4yMrw5NdjL76MhChM
NCZSWvRuc6SRRtqcNALySCONNNJII20HNALySCONNNJII20HNALySCONNNJII20H9P8BzkeHbR+K
WhQAAAAASUVORK5CYII=

--_004_4A95BA014132FF49AE685FAB4B9F17F657D1422Edfweml701chm_--


From nobody Fri Aug 21 06:49:14 2015
Return-Path: <mglt.ietf@gmail.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 89F4F1A8F37 for <i2rs@ietfa.amsl.com>; Fri, 21 Aug 2015 06:49:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.277
X-Spam-Level: 
X-Spam-Status: No, score=-1.277 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FM_FORGED_GMAIL=0.622, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id znACHYKNItRs for <i2rs@ietfa.amsl.com>; Fri, 21 Aug 2015 06:49:12 -0700 (PDT)
Received: from mail-ig0-x235.google.com (mail-ig0-x235.google.com [IPv6:2607:f8b0:4001:c05::235]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C52B81A9059 for <i2rs@ietf.org>; Fri, 21 Aug 2015 06:49:06 -0700 (PDT)
Received: by igui7 with SMTP id i7so14387539igu.0 for <i2rs@ietf.org>; Fri, 21 Aug 2015 06:49:06 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:sender:in-reply-to:references:date:message-id:subject :from:to:cc:content-type; bh=K/lDR9w42LMCqq2YzTz+iJhJgiHFIRsZqCdFXMNR0D4=; b=EoumdWskKBG2PEU4QrXmoOctHvRYQxbP+m7FCCt2/309PsKGPArr6GZLXuz+bDvZWV VdbrN2zdz6cn8hnbmtEFaXFDLZzuSe85TkAdwoT/zfWhqLS97r/wHVxHEWOLde+ubwrB +sBEww1KDFDMKuewmlFFPnPwgXFJczoRUOc/SQoZO454mnfyNeeK1mo2jNZRW7dYOpCY L0SyXZJ35D262AJzG0qKwVe8BBFTmnP+pxYyWIxGauiNFRpujTwuvLBp+1eRZvRTLyn3 f3duByV56hQzYDcHPtyuFiYKKIxbuVCDnVMSmpWQHx0bMs71lCumm43lcX9gH0Qe/78x ZyZA==
MIME-Version: 1.0
X-Received: by 10.50.141.193 with SMTP id rq1mr2908937igb.4.1440164946175; Fri, 21 Aug 2015 06:49:06 -0700 (PDT)
Sender: mglt.ietf@gmail.com
Received: by 10.79.21.196 with HTTP; Fri, 21 Aug 2015 06:49:06 -0700 (PDT)
In-Reply-To: <01a801d0d915$1558b4e0$400a1ea0$@ndzh.com>
References: <01a801d0d915$1558b4e0$400a1ea0$@ndzh.com>
Date: Fri, 21 Aug 2015 09:49:06 -0400
X-Google-Sender-Auth: hrClcOXmgtGXsyXk6MK4WQw9Vw4
Message-ID: <CADZyTkmEiay8oNsBLq2VS-S5kYAnokQ9rtrj40nqKUC3R=RmxQ@mail.gmail.com>
From: Daniel Migault <daniel.migault@ericsson.com>
To: Susan Hares <shares@ndzh.com>
Content-Type: multipart/alternative; boundary=089e013cbd6808ee81051dd28810
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/SW5-g4ntOeGhlWlAiMkpbworpuI>
Cc: Jeffrey Haas <jhaas@pfrc.org>, i2rs@ietf.org, Joel Halpern <jmh@joelhalpern.com>, Alia Atlas <akatlas@gmail.com>
Subject: Re: [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG adoption call (8/17 to 8/31)
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Aug 2015 13:49:13 -0000

--089e013cbd6808ee81051dd28810
Content-Type: text/plain; charset=UTF-8

As a co-author of the document, I believe the document is ready for
adoption. Feel free to comment so we can improve the document for its next
iteration.

BR,
Daniel

On Mon, Aug 17, 2015 at 1:49 PM, Susan Hares <shares@ndzh.com> wrote:

> This begins a 2 week WG adoption call for
> draft-mglt-i2rs-security-requirements.  This draft discusses the security
> requirements for the I2RS environment.  You can find the draft at:
>
>
>
> https://tools.ietf.org/html/draft-mglt-i2rs-security-environment-reqs-00
>
>
>
> A security reviewer will review this draft during the time 8/20 to 8/25.
> We will post the security directorate review to this discussion.
>
>
>
> Sue Hares
>
>
>
> _______________________________________________
> i2rs mailing list
> i2rs@ietf.org
> https://www.ietf.org/mailman/listinfo/i2rs
>
>

--089e013cbd6808ee81051dd28810
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">As a co-author of the document, I believe the document is =
ready for adoption. Feel free to comment so we can improve the document for=
 its next iteration.<div><br></div><div>BR,=C2=A0</div><div>Daniel</div></d=
iv><div class=3D"gmail_extra"><br><div class=3D"gmail_quote">On Mon, Aug 17=
, 2015 at 1:49 PM, Susan Hares <span dir=3D"ltr">&lt;<a href=3D"mailto:shar=
es@ndzh.com" target=3D"_blank">shares@ndzh.com</a>&gt;</span> wrote:<br><bl=
ockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #=
ccc solid;padding-left:1ex"><div lang=3D"EN-US" link=3D"blue" vlink=3D"purp=
le"><div><p class=3D"MsoNormal">This begins a 2 week WG adoption call for d=
raft-mglt-i2rs-security-requirements.=C2=A0 This draft discusses the securi=
ty requirements for the I2RS environment.=C2=A0 You can find the draft at:<=
u></u><u></u></p><p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p><p class=3D=
"MsoNormal"><a href=3D"https://tools.ietf.org/html/draft-mglt-i2rs-security=
-environment-reqs-00" target=3D"_blank">https://tools.ietf.org/html/draft-m=
glt-i2rs-security-environment-reqs-00</a><u></u><u></u></p><p class=3D"MsoN=
ormal"><u></u>=C2=A0<u></u></p><p class=3D"MsoNormal">A security reviewer w=
ill review this draft during the time 8/20 to 8/25.=C2=A0=C2=A0 We will pos=
t the security directorate review to this discussion. <u></u><u></u></p><p =
class=3D"MsoNormal"><u></u>=C2=A0<u></u></p><p class=3D"MsoNormal">Sue Hare=
s <u></u><u></u></p><p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p></div></=
div><br>_______________________________________________<br>
i2rs mailing list<br>
<a href=3D"mailto:i2rs@ietf.org">i2rs@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/i2rs" rel=3D"noreferrer" t=
arget=3D"_blank">https://www.ietf.org/mailman/listinfo/i2rs</a><br>
<br></blockquote></div><br></div>

--089e013cbd6808ee81051dd28810--


From nobody Fri Aug 21 06:50:54 2015
Return-Path: <mglt.ietf@gmail.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 586831A9050 for <i2rs@ietfa.amsl.com>; Fri, 21 Aug 2015 06:50:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.277
X-Spam-Level: 
X-Spam-Status: No, score=-1.277 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FM_FORGED_GMAIL=0.622, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PFdfFxgtwbDm for <i2rs@ietfa.amsl.com>; Fri, 21 Aug 2015 06:50:51 -0700 (PDT)
Received: from mail-io0-x22f.google.com (mail-io0-x22f.google.com [IPv6:2607:f8b0:4001:c06::22f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 096401A905B for <i2rs@ietf.org>; Fri, 21 Aug 2015 06:50:51 -0700 (PDT)
Received: by iodv127 with SMTP id v127so81889380iod.3 for <i2rs@ietf.org>; Fri, 21 Aug 2015 06:50:50 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:sender:in-reply-to:references:date:message-id:subject :from:to:cc:content-type; bh=1iK3l16MLAUbtF/PzWDvQualG1igZFHfeCo1VQwhJc8=; b=jXXG7M8x59eme3H7T4AJVO8FMpXmTz1WCi+FOW13eLeGE5wsTkEtdGMQUr8rUQONjY b2V/bh3G2OVz1QqoglLrytQeQ/AYTwnDRV8TX9Q1Zyyt1my83QHedZl46kMHRk6WzHox zuMZ97VGj+tnliBTeyKaYPRyWBislXRFID3mTJ5e4V5nUGyjF0d4cxaXVHSO/p3Z7qCu IJfv7/rR2DSGck+lYYsd5xHopc1MgQDnwpuVZSDi8qxc3msqQfA65y07xE5JxUKWax76 q8x9WXzRCGltME65YfyHcH8A76D9b4Q7Y7U6Feut/ENkxlxhaKDrSwoxXpV/sxyHEX00 ubCw==
MIME-Version: 1.0
X-Received: by 10.107.37.12 with SMTP id l12mr5231317iol.92.1440165050468; Fri, 21 Aug 2015 06:50:50 -0700 (PDT)
Sender: mglt.ietf@gmail.com
Received: by 10.79.21.196 with HTTP; Fri, 21 Aug 2015 06:50:50 -0700 (PDT)
In-Reply-To: <019b01d0d914$24c02590$6e4070b0$@ndzh.com>
References: <019b01d0d914$24c02590$6e4070b0$@ndzh.com>
Date: Fri, 21 Aug 2015 09:50:50 -0400
X-Google-Sender-Auth: VUbSVjUvTzF15xVwnc1uvByRUHI
Message-ID: <CADZyTkmVaYUQb9LL=zQh80tX54mGmDOLnL4ZPO7MVVh=mWqgVw@mail.gmail.com>
From: Daniel Migault <daniel.migault@ericsson.com>
To: Susan Hares <shares@ndzh.com>
Content-Type: multipart/alternative; boundary=001a1141b24e404f7d051dd28e5a
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/dwXDsU9ZrAcZKBPALtwtZauL-Vw>
Cc: Jeffrey Haas <jhaas@pfrc.org>, i2rs@ietf.org
Subject: Re: [i2rs] WG adoption - draft-hares-i2rs-auth-trans-04 (8/17 to 8/31)
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Aug 2015 13:50:53 -0000

--001a1141b24e404f7d051dd28e5a
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

As a co-author of the document, I believe the document is ready for
adoption. Feel free to comment so we can improve the document for its next
iteration.

I also support the two documents as it appears to be much cleaner to have
two separate documents.

BR,
Daniel

On Mon, Aug 17, 2015 at 1:42 PM, Susan Hares <shares@ndzh.com> wrote:

> This is a 2 week WG adoption call for the
> draft-hares-i2rs-auth-trans-04.txt which provides the security requiremen=
ts
> for the I2RS protocol.
>
>
>
> To be adopted, this draft does not need to be perfect, but a good
> direction for the I2RS protocol security.
>
>
>
> Please note that Juergen=E2=80=99s review of this draft has the following=
 feedback:
>
> =E2=80=A2       Requirements 1, 2, 5, 6, 7, 9, 11, 13, 14, 15, 16, 18, 19=
, 20 =E2=80=93
> were ok,
>
> =E2=80=A2       Editorial requirements 3 and 4 need clarifications on wor=
ds, and
> requirement 10 is ambiguous, and
>
> =E2=80=A2       Requirements 8, 12, and the multiple message sequence (wa=
s
> req-17) are not security protocols,
>
> =E2=80=A2       Technical question: Why should we support an insecure pro=
tocol.
>
>
>
> A security directorate reviewer will review this draft starting on 8/20.
> I will post these reviews and the document changes.  Please suggest chang=
es
> to requirement 3, 4, and 10; and if I2RS should support an insecure
> protocol.
>
>
>
> Once we get the security reviewers feedback on 8, 12, and the multiple
> messages =E2=80=93 I will post the feedback and we=E2=80=99ll discuss rea=
l time.
>
>
>
> *Sue Hares *
>
>
>
> _______________________________________________
> i2rs mailing list
> i2rs@ietf.org
> https://www.ietf.org/mailman/listinfo/i2rs
>
>

--001a1141b24e404f7d051dd28e5a
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">As a co-author of the document, I believe the document is =
ready for adoption. Feel free to comment so we can improve the document for=
 its next iteration.<div><br></div><div>I also support the two documents as=
 it appears to be much cleaner to have two separate documents.</div><div><b=
r></div><div>BR,=C2=A0</div><div>Daniel</div></div><div class=3D"gmail_extr=
a"><br><div class=3D"gmail_quote">On Mon, Aug 17, 2015 at 1:42 PM, Susan Ha=
res <span dir=3D"ltr">&lt;<a href=3D"mailto:shares@ndzh.com" target=3D"_bla=
nk">shares@ndzh.com</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quo=
te" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"=
><div lang=3D"EN-US" link=3D"blue" vlink=3D"purple"><div><p class=3D"MsoNor=
mal">This is a 2 week WG adoption call for the draft-hares-i2rs-auth-trans-=
04.txt which provides the security requirements for the I2RS protocol. =C2=
=A0<u></u><u></u></p><p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p><p clas=
s=3D"MsoNormal">To be adopted, this draft does not need to be perfect, but =
a good direction for the I2RS protocol security. <u></u><u></u></p><p class=
=3D"MsoNormal"><u></u>=C2=A0<u></u></p><p class=3D"MsoNormal">Please note t=
hat Juergen=E2=80=99s review of this draft has the following feedback:<u></=
u><u></u></p><p class=3D"MsoNormal" style=3D"margin-left:.5in"><u></u><span=
 style=3D"font-family:&quot;Arial&quot;,&quot;sans-serif&quot;"><span>=E2=
=80=A2<span style=3D"font:7.0pt &quot;Times New Roman&quot;">=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0 </span></span></span><u></u>Requirements 1, 2, 5, =
6, 7, 9, 11, 13, 14, 15, 16, 18, 19, 20 =E2=80=93 were ok, <u></u><u></u></=
p><p class=3D"MsoNormal" style=3D"margin-left:.5in"><u></u><span style=3D"f=
ont-family:&quot;Arial&quot;,&quot;sans-serif&quot;"><span>=E2=80=A2<span s=
tyle=3D"font:7.0pt &quot;Times New Roman&quot;">=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0 </span></span></span><u></u>Editorial requirements 3 and 4 need c=
larifications on words, and requirement 10 is ambiguous, and <u></u><u></u>=
</p><p class=3D"MsoNormal" style=3D"margin-left:.5in"><u></u><span style=3D=
"font-family:&quot;Arial&quot;,&quot;sans-serif&quot;"><span>=E2=80=A2<span=
 style=3D"font:7.0pt &quot;Times New Roman&quot;">=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0 </span></span></span><u></u>Requirements 8, 12, and the multip=
le message sequence (was req-17) are not security protocols, <u></u><u></u>=
</p><p class=3D"MsoNormal" style=3D"margin-left:.5in"><u></u><span style=3D=
"font-family:&quot;Arial&quot;,&quot;sans-serif&quot;"><span>=E2=80=A2<span=
 style=3D"font:7.0pt &quot;Times New Roman&quot;">=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0 </span></span></span><u></u>Technical question: Why should we =
support an insecure protocol. <u></u><u></u></p><p class=3D"MsoNormal"><u><=
/u>=C2=A0<u></u></p><p class=3D"MsoNormal">A security directorate reviewer =
will review this draft starting on 8/20.=C2=A0 I will post these reviews an=
d the document changes.=C2=A0 Please suggest changes to requirement 3, 4, a=
nd 10; and if I2RS should support an insecure protocol. <u></u><u></u></p><=
p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p><p class=3D"MsoNormal">Once w=
e get the security reviewers feedback on 8, 12, and the multiple messages =
=E2=80=93 I will post the feedback and we=E2=80=99ll discuss real time. <u>=
</u><u></u></p><p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p><p class=3D"M=
soNormal"><b>Sue Hares </b><u></u><u></u></p><p class=3D"MsoNormal"><u></u>=
=C2=A0<u></u></p></div></div><br>__________________________________________=
_____<br>
i2rs mailing list<br>
<a href=3D"mailto:i2rs@ietf.org">i2rs@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/i2rs" rel=3D"noreferrer" t=
arget=3D"_blank">https://www.ietf.org/mailman/listinfo/i2rs</a><br>
<br></blockquote></div><br></div>

--001a1141b24e404f7d051dd28e5a--


From nobody Fri Aug 21 08:26:52 2015
Return-Path: <mglt.ietf@gmail.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0877C1A0372 for <i2rs@ietfa.amsl.com>; Fri, 21 Aug 2015 08:26:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.277
X-Spam-Level: 
X-Spam-Status: No, score=-1.277 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FM_FORGED_GMAIL=0.622, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qGU3m2gZ71g0 for <i2rs@ietfa.amsl.com>; Fri, 21 Aug 2015 08:26:49 -0700 (PDT)
Received: from mail-io0-x22c.google.com (mail-io0-x22c.google.com [IPv6:2607:f8b0:4001:c06::22c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9F2CE1A0262 for <i2rs@ietf.org>; Fri, 21 Aug 2015 08:26:49 -0700 (PDT)
Received: by iodt126 with SMTP id t126so85532511iod.2 for <i2rs@ietf.org>; Fri, 21 Aug 2015 08:26:49 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:sender:in-reply-to:references:date:message-id:subject :from:to:cc:content-type; bh=SOQjGkXBQVy0MT5pPtXtCxw+ATwf8//shcaBmmSLsuw=; b=TOmho1xKAM4wPDTP+/7Z9SPBEQ83kv74gnamQPJTLHaBw84hg/t11XXv/Ii5hj4ABH kC+Zn1ZTbnI3jlgZ0XlF+2gr9sSliUFe0dPUXJl77FZ0e2B3ubmK9iW/gPASjb0Jjhuz gTMyjKnqGfT74lrTTFMAr3TIRw29SaPhGBGHkspGYF73TbJy9exA8rjjkDGWd+cVVnzz /vOmPzAFrH8ZDeXVvdrVghRbO4IZVXnNKDfvWXbjz9b7Ojsl+uq6XMyI09Vvx8tAlfyC XQxTFI1Mh7z0SzVLeoUCR0bLu80XxTWvbe2RLGEmnApbN2iYDdly5kcaAuMt7kjzuf4y schQ==
MIME-Version: 1.0
X-Received: by 10.107.37.12 with SMTP id l12mr5613280iol.92.1440170808888; Fri, 21 Aug 2015 08:26:48 -0700 (PDT)
Sender: mglt.ietf@gmail.com
Received: by 10.79.21.196 with HTTP; Fri, 21 Aug 2015 08:26:48 -0700 (PDT)
In-Reply-To: <01a801d0d915$1558b4e0$400a1ea0$@ndzh.com>
References: <01a801d0d915$1558b4e0$400a1ea0$@ndzh.com>
Date: Fri, 21 Aug 2015 11:26:48 -0400
X-Google-Sender-Auth: YQmK1qKs4JoLrmI8hY5Hn5AbcUM
Message-ID: <CADZyTkkGDj82fiRqP5m9nG3uhLzRNmoPJC_k7xOrX9mLEBVJVg@mail.gmail.com>
From: Daniel Migault <daniel.migault@ericsson.com>
To: Susan Hares <shares@ndzh.com>
Content-Type: multipart/alternative; boundary=001a1141b24e7ad033051dd3e5d3
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/xzs4Ag6UkZ8uNndtkWEsSEEuvtc>
Cc: Jeffrey Haas <jhaas@pfrc.org>, i2rs@ietf.org, Joel Halpern <jmh@joelhalpern.com>, Alia Atlas <akatlas@gmail.com>
Subject: Re: [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG adoption call (8/17 to 8/31)
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Aug 2015 15:26:51 -0000

--001a1141b24e7ad033051dd3e5d3
Content-Type: text/plain; charset=UTF-8

Hi,

Please note that the subject of the email may be misleading as it indicates
a different draft name from the one indicated in the link. For
clarification, the draft we consider is the one indicated by the link.

BR,
Daniel

On Mon, Aug 17, 2015 at 1:49 PM, Susan Hares <shares@ndzh.com> wrote:

> This begins a 2 week WG adoption call for
> draft-mglt-i2rs-security-requirements.  This draft discusses the security
> requirements for the I2RS environment.  You can find the draft at:
>
>
>
> https://tools.ietf.org/html/draft-mglt-i2rs-security-environment-reqs-00
>
>
>
> A security reviewer will review this draft during the time 8/20 to 8/25.
> We will post the security directorate review to this discussion.
>
>
>
> Sue Hares
>
>
>
> _______________________________________________
> i2rs mailing list
> i2rs@ietf.org
> https://www.ietf.org/mailman/listinfo/i2rs
>
>

--001a1141b24e7ad033051dd3e5d3
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Hi,=C2=A0<div><br></div><div>Please note that the subject =
of the email may be misleading as it indicates a different draft name from =
the one indicated in the link. For clarification, the draft we consider is =
the one indicated by the link.=C2=A0</div><div><br></div><div>BR,=C2=A0</di=
v><div>Daniel</div></div><div class=3D"gmail_extra"><br><div class=3D"gmail=
_quote">On Mon, Aug 17, 2015 at 1:49 PM, Susan Hares <span dir=3D"ltr">&lt;=
<a href=3D"mailto:shares@ndzh.com" target=3D"_blank">shares@ndzh.com</a>&gt=
;</span> wrote:<br><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 =
.8ex;border-left:1px #ccc solid;padding-left:1ex"><div lang=3D"EN-US" link=
=3D"blue" vlink=3D"purple"><div><p class=3D"MsoNormal">This begins a 2 week=
 WG adoption call for draft-mglt-i2rs-security-requirements.=C2=A0 This dra=
ft discusses the security requirements for the I2RS environment.=C2=A0 You =
can find the draft at:<u></u><u></u></p><p class=3D"MsoNormal"><u></u>=C2=
=A0<u></u></p><p class=3D"MsoNormal"><a href=3D"https://tools.ietf.org/html=
/draft-mglt-i2rs-security-environment-reqs-00" target=3D"_blank">https://to=
ols.ietf.org/html/draft-mglt-i2rs-security-environment-reqs-00</a><u></u><u=
></u></p><p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p><p class=3D"MsoNorm=
al">A security reviewer will review this draft during the time 8/20 to 8/25=
.=C2=A0=C2=A0 We will post the security directorate review to this discussi=
on. <u></u><u></u></p><p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p><p cla=
ss=3D"MsoNormal">Sue Hares <u></u><u></u></p><p class=3D"MsoNormal"><u></u>=
=C2=A0<u></u></p></div></div><br>__________________________________________=
_____<br>
i2rs mailing list<br>
<a href=3D"mailto:i2rs@ietf.org">i2rs@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/i2rs" rel=3D"noreferrer" t=
arget=3D"_blank">https://www.ietf.org/mailman/listinfo/i2rs</a><br>
<br></blockquote></div><br></div>

--001a1141b24e7ad033051dd3e5d3--


From nobody Fri Aug 21 08:52:48 2015
Return-Path: <jmh.direct@joelhalpern.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 527041AC3C2 for <i2rs@ietfa.amsl.com>; Fri, 21 Aug 2015 08:52:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.602
X-Spam-Level: 
X-Spam-Status: No, score=-2.602 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9RRa46AZYxWh for <i2rs@ietfa.amsl.com>; Fri, 21 Aug 2015 08:52:45 -0700 (PDT)
Received: from maila2.tigertech.net (maila2.tigertech.net [208.80.4.152]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8A4081AC3C4 for <i2rs@ietf.org>; Fri, 21 Aug 2015 08:52:45 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by maila2.tigertech.net (Postfix) with ESMTP id 4BEC825520E; Fri, 21 Aug 2015 08:52:45 -0700 (PDT)
X-Virus-Scanned: Debian amavisd-new at maila2.tigertech.net
Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by maila2.tigertech.net (Postfix) with ESMTPSA id 8B335255223; Fri, 21 Aug 2015 08:52:44 -0700 (PDT)
To: Linda Dunbar <linda.dunbar@huawei.com>, "i2rs@ietf.org" <i2rs@ietf.org>
References: <01a801d0d915$1558b4e0$400a1ea0$@ndzh.com> <4A95BA014132FF49AE685FAB4B9F17F657D1422E@dfweml701-chm>
From: Joel Halpern Direct <jmh.direct@joelhalpern.com>
Message-ID: <55D7494B.1090903@joelhalpern.com>
Date: Fri, 21 Aug 2015 11:52:43 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:38.0) Gecko/20100101 Thunderbird/38.2.0
MIME-Version: 1.0
In-Reply-To: <4A95BA014132FF49AE685FAB4B9F17F657D1422E@dfweml701-chm>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 8bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/XdGglLV52_tgaGGr4iCorpC9fpA>
Cc: 'Jeffrey Haas' <jhaas@pfrc.org>, "daniel.migault@ericsson.com" <daniel.migault@ericsson.com>, 'Joel Halpern' <jmh@joelhalpern.com>, 'Alia Atlas' <akatlas@gmail.com>
Subject: Re: [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG adoption call (8/17 to 8/31)
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Aug 2015 15:52:47 -0000

First, there may be some confusion because the announcement.  I presume 
that you are talking about the -environments documents.

If the WG concludes that a different chapter structure is useful, we can 
of course change it.  Given that the goal is environment description, I 
am not sure your proposed structure is significantly better than the 
existing one.

I believe your comment about the text  reading "where security functions 
may be hosted" is well taken, and we should remove that text when we 
next revise the document.

The isolation text is about the need to keep things separate, and the 
various possible means are degrees / approaches to separation. 
Isolation is not about treating things differently, nor is it explicitly 
about using different protocols.  So the point of isolation is not that 
there are different security requirements, but that in order to avoid 
corss-effects, things should be kept separate.

Yours,
Joel

On 8/20/15 6:42 PM, Linda Dunbar wrote:
> I support the WG adoption because I think the I2RS WG needs it. However,
> I hope the authors can consider/address the following suggestions/comments:
>
> When you think about the I2RS security,  there are following different
> aspects:
>
> -Communication channel between I2RS client and Agent (and the channel
> between I2RS client and applications):
>
> The channel can be
>
> oVia physical Private network (e.g. within a secured direct connect
> within one site),
>
> owithin one administrative domain,  via virtual private network
>
> oSecured connection, such as TLS or IPSec
>
> oPublic internet
>
> o..
>
> -Authentication & Authorization
>
> othe authentication & authorization requirement for different
> communication channels can be different. Therefore, should have separate
> sections to address specific requirement  for each communication
> channels between I2RS agent <-> clients (and client <-> applications)
>
> The current Section 4 of the draft already has very good description on
> the subject. I think 4.4.1 and 4.42 can be separated out of the section.
>
> -Encryption for the actual content between Client and Agent
>
> -DoS Design requirement (currently in Section 5.2.1)
>
> -Management of conflict with other plane (e.g. the management plane,
> multi-headed control, which has been discussed extensively in ephemeral
> draft)
>
> I think the draft should be organized from the aspects of the security
> to I2RS as suggested above.
>
> Here are some detailed questions and comments to the requirements listed
> in the document:
>
> Section 1:
>
> The second paragraph stated the security recommendations must
> “specifying where security functions may be hosted”. First of all I
> don’t see the draft address this aspect. Second, I think   “where
> security functions are hosted” is orthogonal to “I2RS security” .
>
> Section 3:
>
> what does isolating two planes mean? does it mean they have different
> security requirement/issues? Or does it mean they need different protocols?
>
> What are the key differences with regard to the security requirements
> for  I2RS plane and for management plane?  Section 3.1 describes the
> interaction between I2RS plane and management plane. But I see the
> security requirement for the management plane is similar to I2RS plane .
> If you think that they are very different, can you elaborate more?
>
> Section 3.4 has title “Recommendations”, but the content are all
> requirements. Why not name the section “Requirement”?
>
> REQ 2: Does it that a different IP address than the one used by the
> management system?
>
> How is REQ 22 different from REQ 21?
>
> REQ 27 is hard to enforce. How about say something like "shouldn't send
> any information beyond what have been defined by the I2RS data model"?
>
> REQ 30: simply controlling the resource can hardly prevent DoS.
> Malicious client can occupy the resource while the valid one can't access.
>
> Thanks for consideration,
>
> Linda
>
> *From:*i2rs [mailto:i2rs-bounces@ietf.org] *On Behalf Of *Susan Hares
> *Sent:* Monday, August 17, 2015 12:50 PM
> *To:* i2rs@ietf.org
> *Cc:* 'Jeffrey Haas'; daniel.migault@ericsson.com; 'Joel Halpern';
> shares@ndzh.com; 'Alia Atlas'
> *Subject:* [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG
> adoption call (8/17 to 8/31)
>
> This begins a 2 week WG adoption call for
> draft-mglt-i2rs-security-requirements.  This draft discusses the
> security requirements for the I2RS environment.  You can find the draft at:
>
> https://tools.ietf.org/html/draft-mglt-i2rs-security-environment-reqs-00
>
> A security reviewer will review this draft during the time 8/20 to
> 8/25.   We will post the security directorate review to this discussion.
>
> Sue Hares
>


From nobody Fri Aug 21 09:49:10 2015
Return-Path: <linda.dunbar@huawei.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ACD2F1AC426 for <i2rs@ietfa.amsl.com>; Fri, 21 Aug 2015 09:49:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.211
X-Spam-Level: 
X-Spam-Status: No, score=-4.211 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NMDZqmcwiSsi for <i2rs@ietfa.amsl.com>; Fri, 21 Aug 2015 09:48:59 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 61FD71AC42D for <i2rs@ietf.org>; Fri, 21 Aug 2015 09:48:58 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml404-hub.china.huawei.com) ([172.18.7.190]) by lhrrg01-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CAF79698; Fri, 21 Aug 2015 16:48:54 +0000 (GMT)
Received: from DFWEML704-CHM.china.huawei.com (10.193.5.141) by lhreml404-hub.china.huawei.com (10.201.5.218) with Microsoft SMTP Server (TLS) id 14.3.235.1; Fri, 21 Aug 2015 17:48:54 +0100
Received: from DFWEML701-CHM.china.huawei.com ([10.193.5.50]) by dfweml704-chm ([10.193.5.141]) with mapi id 14.03.0235.001; Fri, 21 Aug 2015 09:48:42 -0700
From: Linda Dunbar <linda.dunbar@huawei.com>
To: Joel Halpern Direct <jmh.direct@joelhalpern.com>, "i2rs@ietf.org" <i2rs@ietf.org>
Thread-Topic: [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG adoption call (8/17 to 8/31)
Thread-Index: AdDZFQfGZ2x8EJ+fRrOcN4ltvsrslgCdyKQgADX7GYAADNx6AA==
Date: Fri, 21 Aug 2015 16:48:42 +0000
Message-ID: <4A95BA014132FF49AE685FAB4B9F17F657D15893@dfweml701-chm>
References: <01a801d0d915$1558b4e0$400a1ea0$@ndzh.com> <4A95BA014132FF49AE685FAB4B9F17F657D1422E@dfweml701-chm> <55D7494B.1090903@joelhalpern.com>
In-Reply-To: <55D7494B.1090903@joelhalpern.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.192.11.159]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/R4mSrdqdeNu-2VOjlRpLnsP0vR4>
Cc: 'Jeffrey Haas' <jhaas@pfrc.org>, "daniel.migault@ericsson.com" <daniel.migault@ericsson.com>, 'Joel Halpern' <jmh@joelhalpern.com>, 'Alia Atlas' <akatlas@gmail.com>
Subject: Re: [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG adoption call (8/17 to 8/31)
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Aug 2015 16:49:06 -0000

Joel,=20

The document that I reviewed and provided comment is " http://datatracker.i=
etf.org/doc/draft-mglt-i2rs-security-requirements/"

I started to review  " draft-mglt-i2rs-security-environment-reqs-00" today,=
 and find out it has the similar Table of content as the "draft-mglt-i2rs-s=
ecurity-requirements-00". What is the intent of the  "environment-reqs"? su=
pplement to "i2rs-security-requirement" or be replaced by, or something els=
e?=20


Linda
-----Original Message-----
From: Joel Halpern Direct [mailto:jmh.direct@joelhalpern.com]=20
Sent: Friday, August 21, 2015 10:53 AM
To: Linda Dunbar; i2rs@ietf.org
Cc: 'Jeffrey Haas'; daniel.migault@ericsson.com; 'Joel Halpern'; 'Alia Atla=
s'
Subject: Re: [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG adop=
tion call (8/17 to 8/31)

First, there may be some confusion because the announcement.  I presume tha=
t you are talking about the -environments documents.

If the WG concludes that a different chapter structure is useful, we can of=
 course change it.  Given that the goal is environment description, I am no=
t sure your proposed structure is significantly better than the existing on=
e.

I believe your comment about the text  reading "where security functions ma=
y be hosted" is well taken, and we should remove that text when we next rev=
ise the document.

The isolation text is about the need to keep things separate, and the vario=
us possible means are degrees / approaches to separation.=20
Isolation is not about treating things differently, nor is it explicitly ab=
out using different protocols.  So the point of isolation is not that there=
 are different security requirements, but that in order to avoid corss-effe=
cts, things should be kept separate.

Yours,
Joel

On 8/20/15 6:42 PM, Linda Dunbar wrote:
> I support the WG adoption because I think the I2RS WG needs it.=20
> However, I hope the authors can consider/address the following suggestion=
s/comments:
>
> When you think about the I2RS security,  there are following different
> aspects:
>
> -Communication channel between I2RS client and Agent (and the channel=20
> between I2RS client and applications):
>
> The channel can be
>
> oVia physical Private network (e.g. within a secured direct connect=20
> within one site),
>
> owithin one administrative domain,  via virtual private network
>
> oSecured connection, such as TLS or IPSec
>
> oPublic internet
>
> o..
>
> -Authentication & Authorization
>
> othe authentication & authorization requirement for different=20
> communication channels can be different. Therefore, should have=20
> separate sections to address specific requirement  for each=20
> communication channels between I2RS agent <-> clients (and client <->=20
> applications)
>
> The current Section 4 of the draft already has very good description=20
> on the subject. I think 4.4.1 and 4.42 can be separated out of the sectio=
n.
>
> -Encryption for the actual content between Client and Agent
>
> -DoS Design requirement (currently in Section 5.2.1)
>
> -Management of conflict with other plane (e.g. the management plane,=20
> multi-headed control, which has been discussed extensively in=20
> ephemeral
> draft)
>
> I think the draft should be organized from the aspects of the security=20
> to I2RS as suggested above.
>
> Here are some detailed questions and comments to the requirements=20
> listed in the document:
>
> Section 1:
>
> The second paragraph stated the security recommendations must=20
> "specifying where security functions may be hosted". First of all I
> don't see the draft address this aspect. Second, I think   "where
> security functions are hosted" is orthogonal to "I2RS security" .
>
> Section 3:
>
> what does isolating two planes mean? does it mean they have different=20
> security requirement/issues? Or does it mean they need different protocol=
s?
>
> What are the key differences with regard to the security requirements=20
> for  I2RS plane and for management plane?  Section 3.1 describes the=20
> interaction between I2RS plane and management plane. But I see the=20
> security requirement for the management plane is similar to I2RS plane .
> If you think that they are very different, can you elaborate more?
>
> Section 3.4 has title "Recommendations", but the content are all=20
> requirements. Why not name the section "Requirement"?
>
> REQ 2: Does it that a different IP address than the one used by the=20
> management system?
>
> How is REQ 22 different from REQ 21?
>
> REQ 27 is hard to enforce. How about say something like "shouldn't=20
> send any information beyond what have been defined by the I2RS data model=
"?
>
> REQ 30: simply controlling the resource can hardly prevent DoS.
> Malicious client can occupy the resource while the valid one can't access=
.
>
> Thanks for consideration,
>
> Linda
>
> *From:*i2rs [mailto:i2rs-bounces@ietf.org] *On Behalf Of *Susan Hares
> *Sent:* Monday, August 17, 2015 12:50 PM
> *To:* i2rs@ietf.org
> *Cc:* 'Jeffrey Haas'; daniel.migault@ericsson.com; 'Joel Halpern';=20
> shares@ndzh.com; 'Alia Atlas'
> *Subject:* [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG=20
> adoption call (8/17 to 8/31)
>
> This begins a 2 week WG adoption call for=20
> draft-mglt-i2rs-security-requirements.  This draft discusses the=20
> security requirements for the I2RS environment.  You can find the draft a=
t:
>
> https://tools.ietf.org/html/draft-mglt-i2rs-security-environment-reqs-
> 00
>
> A security reviewer will review this draft during the time 8/20 to
> 8/25.   We will post the security directorate review to this discussion.
>
> Sue Hares
>


From nobody Fri Aug 21 09:51:50 2015
Return-Path: <jmh@joelhalpern.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0CF6B1AC42F for <i2rs@ietfa.amsl.com>; Fri, 21 Aug 2015 09:51:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.602
X-Spam-Level: 
X-Spam-Status: No, score=-2.602 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fTM5yRQiQJEH for <i2rs@ietfa.amsl.com>; Fri, 21 Aug 2015 09:51:47 -0700 (PDT)
Received: from maila2.tigertech.net (maila2.tigertech.net [208.80.4.152]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1A8F41AC42B for <i2rs@ietf.org>; Fri, 21 Aug 2015 09:51:47 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by maila2.tigertech.net (Postfix) with ESMTP id 043AD2551FD; Fri, 21 Aug 2015 09:51:47 -0700 (PDT)
X-Virus-Scanned: Debian amavisd-new at maila2.tigertech.net
Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by maila2.tigertech.net (Postfix) with ESMTPSA id 808582551F9; Fri, 21 Aug 2015 09:51:46 -0700 (PDT)
To: Linda Dunbar <linda.dunbar@huawei.com>, "i2rs@ietf.org" <i2rs@ietf.org>
References: <01a801d0d915$1558b4e0$400a1ea0$@ndzh.com> <4A95BA014132FF49AE685FAB4B9F17F657D1422E@dfweml701-chm> <55D7494B.1090903@joelhalpern.com> <4A95BA014132FF49AE685FAB4B9F17F657D15893@dfweml701-chm>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <55D75721.10003@joelhalpern.com>
Date: Fri, 21 Aug 2015 12:51:45 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:38.0) Gecko/20100101 Thunderbird/38.2.0
MIME-Version: 1.0
In-Reply-To: <4A95BA014132FF49AE685FAB4B9F17F657D15893@dfweml701-chm>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/pV0eSyjMnkl4Po7ttXqOUGIIick>
Subject: Re: [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG adoption call (8/17 to 8/31)
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Aug 2015 16:51:49 -0000

draft-mglt-security-requirements was replaced by 
draft-mglt-i2rs-security-environment, and some of the first documents 
content were moved into Sue's document which was also last called.

When the last call was issued, it provided the correct URL, but 
accidentally copied the draft name from the earlier draft.

Once we realized this, Daniel sent his note to the list to try to explain.

Yours,
Joel

On 8/21/15 12:48 PM, Linda Dunbar wrote:
> Joel,
>
> The document that I reviewed and provided comment is " http://datatracker.ietf.org/doc/draft-mglt-i2rs-security-requirements/"
>
> I started to review  " draft-mglt-i2rs-security-environment-reqs-00" today, and find out it has the similar Table of content as the "draft-mglt-i2rs-security-requirements-00". What is the intent of the  "environment-reqs"? supplement to "i2rs-security-requirement" or be replaced by, or something else?
>
>
> Linda
> -----Original Message-----
> From: Joel Halpern Direct [mailto:jmh.direct@joelhalpern.com]
> Sent: Friday, August 21, 2015 10:53 AM
> To: Linda Dunbar; i2rs@ietf.org
> Cc: 'Jeffrey Haas'; daniel.migault@ericsson.com; 'Joel Halpern'; 'Alia Atlas'
> Subject: Re: [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG adoption call (8/17 to 8/31)
>
> First, there may be some confusion because the announcement.  I presume that you are talking about the -environments documents.
>
> If the WG concludes that a different chapter structure is useful, we can of course change it.  Given that the goal is environment description, I am not sure your proposed structure is significantly better than the existing one.
>
> I believe your comment about the text  reading "where security functions may be hosted" is well taken, and we should remove that text when we next revise the document.
>
> The isolation text is about the need to keep things separate, and the various possible means are degrees / approaches to separation.
> Isolation is not about treating things differently, nor is it explicitly about using different protocols.  So the point of isolation is not that there are different security requirements, but that in order to avoid corss-effects, things should be kept separate.
>
> Yours,
> Joel
>
> On 8/20/15 6:42 PM, Linda Dunbar wrote:
>> I support the WG adoption because I think the I2RS WG needs it.
>> However, I hope the authors can consider/address the following suggestions/comments:
>>
>> When you think about the I2RS security,  there are following different
>> aspects:
>>
>> -Communication channel between I2RS client and Agent (and the channel
>> between I2RS client and applications):
>>
>> The channel can be
>>
>> oVia physical Private network (e.g. within a secured direct connect
>> within one site),
>>
>> owithin one administrative domain,  via virtual private network
>>
>> oSecured connection, such as TLS or IPSec
>>
>> oPublic internet
>>
>> o..
>>
>> -Authentication & Authorization
>>
>> othe authentication & authorization requirement for different
>> communication channels can be different. Therefore, should have
>> separate sections to address specific requirement  for each
>> communication channels between I2RS agent <-> clients (and client <->
>> applications)
>>
>> The current Section 4 of the draft already has very good description
>> on the subject. I think 4.4.1 and 4.42 can be separated out of the section.
>>
>> -Encryption for the actual content between Client and Agent
>>
>> -DoS Design requirement (currently in Section 5.2.1)
>>
>> -Management of conflict with other plane (e.g. the management plane,
>> multi-headed control, which has been discussed extensively in
>> ephemeral
>> draft)
>>
>> I think the draft should be organized from the aspects of the security
>> to I2RS as suggested above.
>>
>> Here are some detailed questions and comments to the requirements
>> listed in the document:
>>
>> Section 1:
>>
>> The second paragraph stated the security recommendations must
>> "specifying where security functions may be hosted". First of all I
>> don't see the draft address this aspect. Second, I think   "where
>> security functions are hosted" is orthogonal to "I2RS security" .
>>
>> Section 3:
>>
>> what does isolating two planes mean? does it mean they have different
>> security requirement/issues? Or does it mean they need different protocols?
>>
>> What are the key differences with regard to the security requirements
>> for  I2RS plane and for management plane?  Section 3.1 describes the
>> interaction between I2RS plane and management plane. But I see the
>> security requirement for the management plane is similar to I2RS plane .
>> If you think that they are very different, can you elaborate more?
>>
>> Section 3.4 has title "Recommendations", but the content are all
>> requirements. Why not name the section "Requirement"?
>>
>> REQ 2: Does it that a different IP address than the one used by the
>> management system?
>>
>> How is REQ 22 different from REQ 21?
>>
>> REQ 27 is hard to enforce. How about say something like "shouldn't
>> send any information beyond what have been defined by the I2RS data model"?
>>
>> REQ 30: simply controlling the resource can hardly prevent DoS.
>> Malicious client can occupy the resource while the valid one can't access.
>>
>> Thanks for consideration,
>>
>> Linda
>>
>> *From:*i2rs [mailto:i2rs-bounces@ietf.org] *On Behalf Of *Susan Hares
>> *Sent:* Monday, August 17, 2015 12:50 PM
>> *To:* i2rs@ietf.org
>> *Cc:* 'Jeffrey Haas'; daniel.migault@ericsson.com; 'Joel Halpern';
>> shares@ndzh.com; 'Alia Atlas'
>> *Subject:* [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG
>> adoption call (8/17 to 8/31)
>>
>> This begins a 2 week WG adoption call for
>> draft-mglt-i2rs-security-requirements.  This draft discusses the
>> security requirements for the I2RS environment.  You can find the draft at:
>>
>> https://tools.ietf.org/html/draft-mglt-i2rs-security-environment-reqs-
>> 00
>>
>> A security reviewer will review this draft during the time 8/20 to
>> 8/25.   We will post the security directorate review to this discussion.
>>
>> Sue Hares
>>


From nobody Fri Aug 21 09:57:04 2015
Return-Path: <linda.dunbar@huawei.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 54FEB1AC439 for <i2rs@ietfa.amsl.com>; Fri, 21 Aug 2015 09:57:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.211
X-Spam-Level: 
X-Spam-Status: No, score=-4.211 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Re8ery5n4LV4 for <i2rs@ietfa.amsl.com>; Fri, 21 Aug 2015 09:57:00 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DBCED1AC436 for <i2rs@ietf.org>; Fri, 21 Aug 2015 09:56:59 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml406-hub.china.huawei.com) ([172.18.7.190]) by lhrrg01-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CAF80110; Fri, 21 Aug 2015 16:56:57 +0000 (GMT)
Received: from DFWEML702-CHM.china.huawei.com (10.193.5.72) by lhreml406-hub.china.huawei.com (10.201.5.243) with Microsoft SMTP Server (TLS) id 14.3.235.1; Fri, 21 Aug 2015 17:56:57 +0100
Received: from DFWEML701-CHM.china.huawei.com ([10.193.5.50]) by dfweml702-chm ([10.193.5.72]) with mapi id 14.03.0235.001; Fri, 21 Aug 2015 09:56:45 -0700
From: Linda Dunbar <linda.dunbar@huawei.com>
To: Joel Halpern Direct <jmh.direct@joelhalpern.com>, "i2rs@ietf.org" <i2rs@ietf.org>
Thread-Topic: [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG adoption call (8/17 to 8/31)
Thread-Index: AdDZFQfGZ2x8EJ+fRrOcN4ltvsrslgCdyKQgADX7GYAADKYKYA==
Date: Fri, 21 Aug 2015 16:56:44 +0000
Message-ID: <4A95BA014132FF49AE685FAB4B9F17F657D158B0@dfweml701-chm>
References: <01a801d0d915$1558b4e0$400a1ea0$@ndzh.com> <4A95BA014132FF49AE685FAB4B9F17F657D1422E@dfweml701-chm> <55D7494B.1090903@joelhalpern.com>
In-Reply-To: <55D7494B.1090903@joelhalpern.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.192.11.159]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/5EEy1r4cYmaXHMRMjpK7br8Serc>
Cc: 'Jeffrey Haas' <jhaas@pfrc.org>, "daniel.migault@ericsson.com" <daniel.migault@ericsson.com>, 'Joel Halpern' <jmh@joelhalpern.com>, 'Alia Atlas' <akatlas@gmail.com>
Subject: Re: [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG adoption call (8/17 to 8/31)
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Aug 2015 16:57:02 -0000

Joel,=20

If it is the "environmental one", it is more important to differentiate the=
 requirements for different environments on how the I2RS client & Agent are=
 connected.=20

One of our customers stated that their environment has a single Controller =
(or the I2RS client) directly connected to their devices via their internal=
 network, where the connection is physically isolated from other network an=
d protected by separate mechanisms, they don't need all those sophisticated=
 authentication procedure.=20

We need to address this environment, i.e. having a simpler security require=
ment for this environment than the environment where I2RS Client is connect=
ed via public network.=20

Linda


-----Original Message-----
From: Joel Halpern Direct [mailto:jmh.direct@joelhalpern.com]=20
Sent: Friday, August 21, 2015 10:53 AM
To: Linda Dunbar; i2rs@ietf.org
Cc: 'Jeffrey Haas'; daniel.migault@ericsson.com; 'Joel Halpern'; 'Alia Atla=
s'
Subject: Re: [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG adop=
tion call (8/17 to 8/31)

First, there may be some confusion because the announcement.  I presume tha=
t you are talking about the -environments documents.

If the WG concludes that a different chapter structure is useful, we can of=
 course change it.  Given that the goal is environment description, I am no=
t sure your proposed structure is significantly better than the existing on=
e.

I believe your comment about the text  reading "where security functions ma=
y be hosted" is well taken, and we should remove that text when we next rev=
ise the document.

The isolation text is about the need to keep things separate, and the vario=
us possible means are degrees / approaches to separation.=20
Isolation is not about treating things differently, nor is it explicitly ab=
out using different protocols.  So the point of isolation is not that there=
 are different security requirements, but that in order to avoid corss-effe=
cts, things should be kept separate.

Yours,
Joel

On 8/20/15 6:42 PM, Linda Dunbar wrote:
> I support the WG adoption because I think the I2RS WG needs it.=20
> However, I hope the authors can consider/address the following suggestion=
s/comments:
>
> When you think about the I2RS security,  there are following different
> aspects:
>
> -Communication channel between I2RS client and Agent (and the channel=20
> between I2RS client and applications):
>
> The channel can be
>
> oVia physical Private network (e.g. within a secured direct connect=20
> within one site),
>
> owithin one administrative domain,  via virtual private network
>
> oSecured connection, such as TLS or IPSec
>
> oPublic internet
>
> o..
>
> -Authentication & Authorization
>
> othe authentication & authorization requirement for different=20
> communication channels can be different. Therefore, should have=20
> separate sections to address specific requirement  for each=20
> communication channels between I2RS agent <-> clients (and client <->=20
> applications)
>
> The current Section 4 of the draft already has very good description=20
> on the subject. I think 4.4.1 and 4.42 can be separated out of the sectio=
n.
>
> -Encryption for the actual content between Client and Agent
>
> -DoS Design requirement (currently in Section 5.2.1)
>
> -Management of conflict with other plane (e.g. the management plane,=20
> multi-headed control, which has been discussed extensively in=20
> ephemeral
> draft)
>
> I think the draft should be organized from the aspects of the security=20
> to I2RS as suggested above.
>
> Here are some detailed questions and comments to the requirements=20
> listed in the document:
>
> Section 1:
>
> The second paragraph stated the security recommendations must=20
> "specifying where security functions may be hosted". First of all I
> don't see the draft address this aspect. Second, I think   "where
> security functions are hosted" is orthogonal to "I2RS security" .
>
> Section 3:
>
> what does isolating two planes mean? does it mean they have different=20
> security requirement/issues? Or does it mean they need different protocol=
s?
>
> What are the key differences with regard to the security requirements=20
> for  I2RS plane and for management plane?  Section 3.1 describes the=20
> interaction between I2RS plane and management plane. But I see the=20
> security requirement for the management plane is similar to I2RS plane .
> If you think that they are very different, can you elaborate more?
>
> Section 3.4 has title "Recommendations", but the content are all=20
> requirements. Why not name the section "Requirement"?
>
> REQ 2: Does it that a different IP address than the one used by the=20
> management system?
>
> How is REQ 22 different from REQ 21?
>
> REQ 27 is hard to enforce. How about say something like "shouldn't=20
> send any information beyond what have been defined by the I2RS data model=
"?
>
> REQ 30: simply controlling the resource can hardly prevent DoS.
> Malicious client can occupy the resource while the valid one can't access=
.
>
> Thanks for consideration,
>
> Linda
>
> *From:*i2rs [mailto:i2rs-bounces@ietf.org] *On Behalf Of *Susan Hares
> *Sent:* Monday, August 17, 2015 12:50 PM
> *To:* i2rs@ietf.org
> *Cc:* 'Jeffrey Haas'; daniel.migault@ericsson.com; 'Joel Halpern';=20
> shares@ndzh.com; 'Alia Atlas'
> *Subject:* [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG=20
> adoption call (8/17 to 8/31)
>
> This begins a 2 week WG adoption call for=20
> draft-mglt-i2rs-security-requirements.  This draft discusses the=20
> security requirements for the I2RS environment.  You can find the draft a=
t:
>
> https://tools.ietf.org/html/draft-mglt-i2rs-security-environment-reqs-
> 00
>
> A security reviewer will review this draft during the time 8/20 to
> 8/25.   We will post the security directorate review to this discussion.
>
> Sue Hares
>


From nobody Fri Aug 21 10:19:46 2015
Return-Path: <jmh@joelhalpern.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B2AA41AC445 for <i2rs@ietfa.amsl.com>; Fri, 21 Aug 2015 10:19:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.602
X-Spam-Level: 
X-Spam-Status: No, score=-2.602 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tmuDU8IBukLF for <i2rs@ietfa.amsl.com>; Fri, 21 Aug 2015 10:19:43 -0700 (PDT)
Received: from maila2.tigertech.net (maila2.tigertech.net [208.80.4.152]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B775B1A889C for <i2rs@ietf.org>; Fri, 21 Aug 2015 10:19:43 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by maila2.tigertech.net (Postfix) with ESMTP id 6B20E250CB5; Fri, 21 Aug 2015 10:19:43 -0700 (PDT)
X-Virus-Scanned: Debian amavisd-new at maila2.tigertech.net
Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by maila2.tigertech.net (Postfix) with ESMTPSA id AB3E32408EA; Fri, 21 Aug 2015 10:19:42 -0700 (PDT)
To: Linda Dunbar <linda.dunbar@huawei.com>, "i2rs@ietf.org" <i2rs@ietf.org>
References: <01a801d0d915$1558b4e0$400a1ea0$@ndzh.com> <4A95BA014132FF49AE685FAB4B9F17F657D1422E@dfweml701-chm> <55D7494B.1090903@joelhalpern.com> <4A95BA014132FF49AE685FAB4B9F17F657D158B0@dfweml701-chm>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <55D75DAD.6040604@joelhalpern.com>
Date: Fri, 21 Aug 2015 13:19:41 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:38.0) Gecko/20100101 Thunderbird/38.2.0
MIME-Version: 1.0
In-Reply-To: <4A95BA014132FF49AE685FAB4B9F17F657D158B0@dfweml701-chm>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/GTO5I_mAqIOoaOqZ0mIs9iULnuU>
Cc: 'Jeffrey Haas' <jhaas@pfrc.org>, "daniel.migault@ericsson.com" <daniel.migault@ericsson.com>, 'Alia Atlas' <akatlas@gmail.com>
Subject: Re: [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG adoption call (8/17 to 8/31)
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Aug 2015 17:19:45 -0000

Yes, one of the two last calls is for the environment document.

Having a dedicated physical channel is one of the ways identified in the 
draft to provide the required isolation.

While such an environment is clearly supportable, I do not think we 
should reduce the internal protocol requirements (such as MTI security 
for the control channel) just because there are circumstances where such 
it won't be needed.  I don't expect that we will build different 
protocol stacks for the different deployments.

The purpose of this draft is to describe the environmental assumptions, 
which assumptions can be met in various ways.

Yours,
Joel

On 8/21/15 12:56 PM, Linda Dunbar wrote:
> Joel,
>
> If it is the "environmental one", it is more important to differentiate the requirements for different environments on how the I2RS client & Agent are connected.
>
> One of our customers stated that their environment has a single Controller (or the I2RS client) directly connected to their devices via their internal network, where the connection is physically isolated from other network and protected by separate mechanisms, they don't need all those sophisticated authentication procedure.
>
> We need to address this environment, i.e. having a simpler security requirement for this environment than the environment where I2RS Client is connected via public network.
>
> Linda
>
>
> -----Original Message-----
> From: Joel Halpern Direct [mailto:jmh.direct@joelhalpern.com]
> Sent: Friday, August 21, 2015 10:53 AM
> To: Linda Dunbar; i2rs@ietf.org
> Cc: 'Jeffrey Haas'; daniel.migault@ericsson.com; 'Joel Halpern'; 'Alia Atlas'
> Subject: Re: [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG adoption call (8/17 to 8/31)
>
> First, there may be some confusion because the announcement.  I presume that you are talking about the -environments documents.
>
> If the WG concludes that a different chapter structure is useful, we can of course change it.  Given that the goal is environment description, I am not sure your proposed structure is significantly better than the existing one.
>
> I believe your comment about the text  reading "where security functions may be hosted" is well taken, and we should remove that text when we next revise the document.
>
> The isolation text is about the need to keep things separate, and the various possible means are degrees / approaches to separation.
> Isolation is not about treating things differently, nor is it explicitly about using different protocols.  So the point of isolation is not that there are different security requirements, but that in order to avoid corss-effects, things should be kept separate.
>
> Yours,
> Joel
>
> On 8/20/15 6:42 PM, Linda Dunbar wrote:
>> I support the WG adoption because I think the I2RS WG needs it.
>> However, I hope the authors can consider/address the following suggestions/comments:
>>
>> When you think about the I2RS security,  there are following different
>> aspects:
>>
>> -Communication channel between I2RS client and Agent (and the channel
>> between I2RS client and applications):
>>
>> The channel can be
>>
>> oVia physical Private network (e.g. within a secured direct connect
>> within one site),
>>
>> owithin one administrative domain,  via virtual private network
>>
>> oSecured connection, such as TLS or IPSec
>>
>> oPublic internet
>>
>> o..
>>
>> -Authentication & Authorization
>>
>> othe authentication & authorization requirement for different
>> communication channels can be different. Therefore, should have
>> separate sections to address specific requirement  for each
>> communication channels between I2RS agent <-> clients (and client <->
>> applications)
>>
>> The current Section 4 of the draft already has very good description
>> on the subject. I think 4.4.1 and 4.42 can be separated out of the section.
>>
>> -Encryption for the actual content between Client and Agent
>>
>> -DoS Design requirement (currently in Section 5.2.1)
>>
>> -Management of conflict with other plane (e.g. the management plane,
>> multi-headed control, which has been discussed extensively in
>> ephemeral
>> draft)
>>
>> I think the draft should be organized from the aspects of the security
>> to I2RS as suggested above.
>>
>> Here are some detailed questions and comments to the requirements
>> listed in the document:
>>
>> Section 1:
>>
>> The second paragraph stated the security recommendations must
>> "specifying where security functions may be hosted". First of all I
>> don't see the draft address this aspect. Second, I think   "where
>> security functions are hosted" is orthogonal to "I2RS security" .
>>
>> Section 3:
>>
>> what does isolating two planes mean? does it mean they have different
>> security requirement/issues? Or does it mean they need different protocols?
>>
>> What are the key differences with regard to the security requirements
>> for  I2RS plane and for management plane?  Section 3.1 describes the
>> interaction between I2RS plane and management plane. But I see the
>> security requirement for the management plane is similar to I2RS plane .
>> If you think that they are very different, can you elaborate more?
>>
>> Section 3.4 has title "Recommendations", but the content are all
>> requirements. Why not name the section "Requirement"?
>>
>> REQ 2: Does it that a different IP address than the one used by the
>> management system?
>>
>> How is REQ 22 different from REQ 21?
>>
>> REQ 27 is hard to enforce. How about say something like "shouldn't
>> send any information beyond what have been defined by the I2RS data model"?
>>
>> REQ 30: simply controlling the resource can hardly prevent DoS.
>> Malicious client can occupy the resource while the valid one can't access.
>>
>> Thanks for consideration,
>>
>> Linda
>>
>> *From:*i2rs [mailto:i2rs-bounces@ietf.org] *On Behalf Of *Susan Hares
>> *Sent:* Monday, August 17, 2015 12:50 PM
>> *To:* i2rs@ietf.org
>> *Cc:* 'Jeffrey Haas'; daniel.migault@ericsson.com; 'Joel Halpern';
>> shares@ndzh.com; 'Alia Atlas'
>> *Subject:* [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG
>> adoption call (8/17 to 8/31)
>>
>> This begins a 2 week WG adoption call for
>> draft-mglt-i2rs-security-requirements.  This draft discusses the
>> security requirements for the I2RS environment.  You can find the draft at:
>>
>> https://tools.ietf.org/html/draft-mglt-i2rs-security-environment-reqs-
>> 00
>>
>> A security reviewer will review this draft during the time 8/20 to
>> 8/25.   We will post the security directorate review to this discussion.
>>
>> Sue Hares
>>
>


From nobody Mon Aug 24 10:37:32 2015
Return-Path: <linda.dunbar@huawei.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8E79A1A00BF for <i2rs@ietfa.amsl.com>; Mon, 24 Aug 2015 10:37:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.21
X-Spam-Level: 
X-Spam-Status: No, score=-4.21 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oq76UusaQIsM for <i2rs@ietfa.amsl.com>; Mon, 24 Aug 2015 10:37:23 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DC0401A879C for <i2rs@ietf.org>; Mon, 24 Aug 2015 10:37:21 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml402-hub.china.huawei.com) ([172.18.7.190]) by lhrrg01-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CAJ04481; Mon, 24 Aug 2015 17:37:18 +0000 (GMT)
Received: from DFWEML703-CHM.china.huawei.com (10.193.5.130) by lhreml402-hub.china.huawei.com (10.201.5.241) with Microsoft SMTP Server (TLS) id 14.3.235.1; Mon, 24 Aug 2015 18:37:17 +0100
Received: from DFWEML701-CHM.china.huawei.com ([10.193.5.50]) by dfweml703-chm ([10.193.5.130]) with mapi id 14.03.0235.001; Mon, 24 Aug 2015 10:37:11 -0700
From: Linda Dunbar <linda.dunbar@huawei.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>, "i2rs@ietf.org" <i2rs@ietf.org>
Thread-Topic: Review comments to draft-mglt-i2rs-security-environment-reqs-00 (was RE: [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG adoption call (8/17 to 8/31)
Thread-Index: AdDZFQfGZ2x8EJ+fRrOcN4ltvsrslgCdyKQgADX7GYAADKYKYP//sxyA//vLgGA=
Date: Mon, 24 Aug 2015 17:37:09 +0000
Message-ID: <4A95BA014132FF49AE685FAB4B9F17F657D173F6@dfweml701-chm>
References: <01a801d0d915$1558b4e0$400a1ea0$@ndzh.com> <4A95BA014132FF49AE685FAB4B9F17F657D1422E@dfweml701-chm> <55D7494B.1090903@joelhalpern.com> <4A95BA014132FF49AE685FAB4B9F17F657D158B0@dfweml701-chm> <55D75DAD.6040604@joelhalpern.com>
In-Reply-To: <55D75DAD.6040604@joelhalpern.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.192.11.236]
Content-Type: multipart/alternative; boundary="_000_4A95BA014132FF49AE685FAB4B9F17F657D173F6dfweml701chm_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/CkMXcbr8TCZyC_f1FMT8BsfEuwM>
Cc: 'Jeffrey Haas' <jhaas@pfrc.org>, "daniel.migault@ericsson.com" <daniel.migault@ericsson.com>, 'Alia Atlas' <akatlas@gmail.com>
Subject: [i2rs] Review comments to draft-mglt-i2rs-security-environment-reqs-00 (was RE: draft-mglt-i2rs-security-requirements-00 2 Week WG adoption call (8/17 to 8/31)
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Aug 2015 17:37:30 -0000

--_000_4A95BA014132FF49AE685FAB4B9F17F657D173F6dfweml701chm_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Joel,

Agree with you that "we don't need to build different protocol stacks for t=
he different deployments".
But the "environment-req" draft is not about "Protocol", but about security=
 issues under different "environment".

Among all our customers who are interested in I2RS, majority of them (>90%)=
 will deploy them in a closed environment, i.e. physically secured  connect=
ion between I2RS agent and I2RS client. Therefore, it is important to "prov=
ides an analysis of the security issues of" of this commonly deployed envir=
onment.

I suggest adding this Figure to Section 1 of the document:

 Closed  (over open Chnl ###>)           Open (over secure Chnl --->)
 +---------------------------------+
 |       ***********************   |      ***********************  |
 |       *    Application A    *   |      *    Application B    *  |
 |       *                     *   |      *                     *  |
 |       *  +----------------+ *   |      *  +----------------+ *  |
 |       *  |   Client A     | *   |      *  |   Client B     | *  |
 |       *  +----------------+ *   |      *  +----------------+ *  |
 |       ******* ^ *************   |      ***** ^ ****** ^ ******  |
 |               #                 |            |        |         |
 |               #                 |            |        |   |-----|
 |               #                 |                     |   |
 |  ************ v * * * * ********|   ***************** v * v ********
 |  *  +---------------------+     |   *  +---------------------+     *
 |  *  |     Agent 1         |     |   *  |    Agent 2          |     *
 |  *  +---------------------+     |   *  +---------------------+     *
 |  *     ^        ^  ^   ^        |   *     ^        ^  ^   ^        *



Just think about this fact: today's router configuration in production envi=
ronment can only be performed by a few authorized people with EMS/NMS physi=
cally and securely separated.  If the majority  of the I2RS environment req=
uirement is about open connection, I2RS WG will spend a lot energy developi=
ng the very sophisticated protocols which is expensive to develop and harde=
r to deploy.

I am not against this development, but IMHO,  to gain wider and quicker I2R=
S deployment in production environment, it is necessary to have a very lean=
 I2RS solution first, and to have a well documented security requirement fo=
r the common deployment environment. E.g. a single Controller (or the I2RS =
client) directly connected to their devices via their internal network, whe=
re the connection is physically isolated from other network and protected b=
y separate mechanisms.  Also remember, many operators will use I2RS to cont=
rol a small number of selective routers (mostly routers at ingress/egress b=
oundary) for value added services.



Some of my  detailed questions and comments to the "security-requirements" =
are still applicable to the "environment-req" document because they have th=
e same text. Plus a few more for the "environment-req" document. Hope the a=
uthors can address them.


Section 3:

      What are the key differences with regard to the security requirements=
 for  I2RS plane and for management plane?  Section 3.1 describes the inter=
action between I2RS plane and management plane. But I see the security requ=
irement for the management plane are all applicable to the security require=
ment to I2RS plane . If you think that they are very different, can you ela=
borate more?

Section 3.4 has title "Recommendations", but the content are all requiremen=
ts. Why not name the section "Requirement"?

REQ 2: Does it that a different IP address than the one used by the managem=
ent system?

REQ 21: is more about I2RS requirement, less about "Security" requirement.

REQ 24: isn't it the general goal of I2RS? Not really security per se. (sho=
uld be included in the general I2RS requirement or architecture).


REQ 26: simply controlling the resource can hardly prevent DoS. Malicious c=
lient can occupy the resource while the valid one can't access.

Thanks for your consideration,
Linda


-----Original Message-----
From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Joel M. Halpern
Sent: Friday, August 21, 2015 12:20 PM
To: Linda Dunbar; i2rs@ietf.org
Cc: 'Jeffrey Haas'; daniel.migault@ericsson.com; 'Alia Atlas'
Subject: Re: [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG adop=
tion call (8/17 to 8/31)

Yes, one of the two last calls is for the environment document.

Having a dedicated physical channel is one of the ways identified in the dr=
aft to provide the required isolation.

While such an environment is clearly supportable, I do not think we should =
reduce the internal protocol requirements (such as MTI security for the con=
trol channel) just because there are circumstances where such it won't be n=
eeded.  I don't expect that we will build different protocol stacks for the=
 different deployments.

The purpose of this draft is to describe the environmental assumptions, whi=
ch assumptions can be met in various ways.

Yours,
Joel

On 8/21/15 12:56 PM, Linda Dunbar wrote:
> Joel,
>
> If it is the "environmental one", it is more important to differentiate t=
he requirements for different environments on how the I2RS client & Agent a=
re connected.
>
> One of our customers stated that their environment has a single Controlle=
r (or the I2RS client) directly connected to their devices via their intern=
al network, where the connection is physically isolated from other network =
and protected by separate mechanisms, they don't need all those sophisticat=
ed authentication procedure.
>
> We need to address this environment, i.e. having a simpler security requi=
rement for this environment than the environment where I2RS Client is conne=
cted via public network.
>
> Linda
>
>
> -----Original Message-----
> From: Joel Halpern Direct [mailto:jmh.direct@joelhalpern.com]
> Sent: Friday, August 21, 2015 10:53 AM
> To: Linda Dunbar; i2rs@ietf.org<mailto:i2rs@ietf.org>
> Cc: 'Jeffrey Haas'; daniel.migault@ericsson.com<mailto:daniel.migault@eri=
csson.com>; 'Joel Halpern'; 'Alia Atlas'
> Subject: Re: [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG
> adoption call (8/17 to 8/31)
>
> First, there may be some confusion because the announcement.  I presume t=
hat you are talking about the -environments documents.
>
> If the WG concludes that a different chapter structure is useful, we can =
of course change it.  Given that the goal is environment description, I am =
not sure your proposed structure is significantly better than the existing =
one.
>
> I believe your comment about the text  reading "where security functions =
may be hosted" is well taken, and we should remove that text when we next r=
evise the document.
>
> The isolation text is about the need to keep things separate, and the var=
ious possible means are degrees / approaches to separation.
> Isolation is not about treating things differently, nor is it explicitly =
about using different protocols.  So the point of isolation is not that the=
re are different security requirements, but that in order to avoid corss-ef=
fects, things should be kept separate.
>
> Yours,
> Joel
>
> On 8/20/15 6:42 PM, Linda Dunbar wrote:
>> I support the WG adoption because I think the I2RS WG needs it.
>> However, I hope the authors can consider/address the following suggestio=
ns/comments:
>>
>> When you think about the I2RS security,  there are following
>> different
>> aspects:
>>
>> -Communication channel between I2RS client and Agent (and the channel
>> between I2RS client and applications):
>>
>> The channel can be
>>
>> oVia physical Private network (e.g. within a secured direct connect
>> within one site),
>>
>> owithin one administrative domain,  via virtual private network
>>
>> oSecured connection, such as TLS or IPSec
>>
>> oPublic internet
>>
>> o..
>>
>> -Authentication & Authorization
>>
>> othe authentication & authorization requirement for different
>> communication channels can be different. Therefore, should have
>> separate sections to address specific requirement  for each
>> communication channels between I2RS agent <-> clients (and client <->
>> applications)
>>
>> The current Section 4 of the draft already has very good description
>> on the subject. I think 4.4.1 and 4.42 can be separated out of the secti=
on.
>>
>> -Encryption for the actual content between Client and Agent
>>
>> -DoS Design requirement (currently in Section 5.2.1)
>>
>> -Management of conflict with other plane (e.g. the management plane,
>> multi-headed control, which has been discussed extensively in
>> ephemeral
>> draft)
>>
>> I think the draft should be organized from the aspects of the
>> security to I2RS as suggested above.
>>
>> Here are some detailed questions and comments to the requirements
>> listed in the document:
>>
>> Section 1:
>>
>> The second paragraph stated the security recommendations must
>> "specifying where security functions may be hosted". First of all I
>> don't see the draft address this aspect. Second, I think   "where
>> security functions are hosted" is orthogonal to "I2RS security" .
>>
>> Section 3:
>>
>> what does isolating two planes mean? does it mean they have different
>> security requirement/issues? Or does it mean they need different protoco=
ls?
>>
>> What are the key differences with regard to the security requirements
>> for  I2RS plane and for management plane?  Section 3.1 describes the
>> interaction between I2RS plane and management plane. But I see the
>> security requirement for the management plane is similar to I2RS plane .
>> If you think that they are very different, can you elaborate more?
>>
>> Section 3.4 has title "Recommendations", but the content are all
>> requirements. Why not name the section "Requirement"?
>>
>> REQ 2: Does it that a different IP address than the one used by the
>> management system?
>>
>> How is REQ 22 different from REQ 21?
>>
>> REQ 27 is hard to enforce. How about say something like "shouldn't
>> send any information beyond what have been defined by the I2RS data mode=
l"?
>>
>> REQ 30: simply controlling the resource can hardly prevent DoS.
>> Malicious client can occupy the resource while the valid one can't acces=
s.
>>
>> Thanks for consideration,
>>
>> Linda
>>
>> *From:*i2rs [mailto:i2rs-bounces@ietf.org] *On Behalf Of *Susan Hares
>> *Sent:* Monday, August 17, 2015 12:50 PM
>> *To:* i2rs@ietf.org<mailto:i2rs@ietf.org>
>> *Cc:* 'Jeffrey Haas'; daniel.migault@ericsson.com<mailto:daniel.migault@=
ericsson.com>; 'Joel Halpern';
>> shares@ndzh.com<mailto:shares@ndzh.com>; 'Alia Atlas'
>> *Subject:* [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG
>> adoption call (8/17 to 8/31)
>>
>> This begins a 2 week WG adoption call for
>> draft-mglt-i2rs-security-requirements.  This draft discusses the
>> security requirements for the I2RS environment.  You can find the draft =
at:
>>
>> https://tools.ietf.org/html/draft-mglt-i2rs-security-environment-reqs
>> -
>> 00
>>
>> A security reviewer will review this draft during the time 8/20 to
>> 8/25.   We will post the security directorate review to this discussion.
>>
>> Sue Hares
>>
>

_______________________________________________
i2rs mailing list
i2rs@ietf.org<mailto:i2rs@ietf.org>
https://www.ietf.org/mailman/listinfo/i2rs


--_000_4A95BA014132FF49AE685FAB4B9F17F657D173F6dfweml701chm_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Exchange Server">
<!-- converted from rtf -->
<style><!-- .EmailQuote { margin-left: 1pt; padding-left: 4pt; border-left:=
 #800000 2px solid; } --></style>
</head>
<body>
<font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt;">
<div><font color=3D"#1F497D">Joel, </font></div>
<div><font color=3D"#1F497D">&nbsp;</font></div>
<div><font color=3D"#1F497D">Agree with you that &#8220;<font color=3D"blac=
k">we </font><font color=3D"black">don&#8217;t</font><font color=3D"black">=
 need to</font><font color=3D"black"> build different protocol stacks for t=
he different deployments</font><font color=3D"black">&#8221;</font><font co=
lor=3D"black">.
</font></font></div>
<div><font color=3D"#1F497D">But the &#8220;environment-req&#8221; draft is=
 not about &#8220;Protocol&#8221;, but about security issues under differen=
t &#8220;environment&#8221;. </font></div>
<div><font color=3D"#1F497D">&nbsp;</font></div>
<div><font color=3D"#1F497D">Among all our customers who are interested in =
I2RS, majority of them (&gt;90%) will deploy them in a closed environment, =
i.e. physically secured&nbsp; connection between I2RS agent and I2RS client=
. Therefore, it is important to &#8220;<font face=3D"Courier" size=3D"2" co=
lor=3D"black"><span style=3D"font-size:10pt;">provides
an analysis of the security</span></font><font face=3D"Courier" size=3D"2" =
color=3D"black"><span style=3D"font-size:10pt;"> </span></font><font face=
=3D"Courier" size=3D"2" color=3D"black"><span style=3D"font-size:10pt;">iss=
ues of&#8221;</span></font><font face=3D"Courier" size=3D"2" color=3D"black=
"><span style=3D"font-size:10pt;">
</span></font>of this commonly deployed environment. </font></div>
<div><font face=3D"Times New Roman" color=3D"#1F497D">&nbsp;</font></div>
<div><font color=3D"#1F497D">I suggest adding this Figure to Section 1 of t=
he document:</font></div>
<div><font color=3D"#1F497D">&nbsp;</font></div>
<div><font face=3D"Courier New" size=3D"2" color=3D"#1F497D"><span style=3D=
"font-size:10pt;"> Closed&nbsp; (over open Chnl ###&gt;)&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;  Open (over secure Chnl ---&gt;)</span>=
</font></div>
<div><font face=3D"Courier New" size=3D"2" color=3D"#1F497D"><span style=3D=
"font-size:10pt;"> &#43;---------------------------------&#43;</span></font=
></div>
<div><font face=3D"Courier New" size=3D"2" color=3D"#1F497D"><span style=3D=
"font-size:10pt;"> |&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;  ***********************=
&nbsp;&nbsp; |&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ***********************&nbsp; =
|</span></font></div>
<div><font face=3D"Courier New" size=3D"2" color=3D"#1F497D"><span style=3D=
"font-size:10pt;"> |&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *&nbsp;&nbsp;&nbsp=
; Application A&nbsp;&nbsp;&nbsp; *&nbsp;&nbsp; |&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp; *&nbsp;&nbsp;&nbsp; Application B&nbsp;&nbsp;&nbsp; *&nbsp; |</span></=
font></div>
<div><font face=3D"Courier New" size=3D"2" color=3D"#1F497D"><span style=3D=
"font-size:10pt;"> |&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp; *&nbsp;&nbsp; |&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
*&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *&nbsp; |</span></font></div=
>
<div><font face=3D"Courier New" size=3D"2" color=3D"#1F497D"><span style=3D=
"font-size:10pt;"> |&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *&nbsp; &#43;-----=
-----------&#43; *&nbsp;&nbsp; |&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *&nbsp; &#43=
;----------------&#43; *&nbsp; |</span></font></div>
<div><font face=3D"Courier New" size=3D"2" color=3D"#1F497D"><span style=3D=
"font-size:10pt;"> |&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *&nbsp; |&nbsp;&nb=
sp; Client A&nbsp;&nbsp;&nbsp;&nbsp; | *&nbsp;&nbsp; |&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp; *&nbsp; |&nbsp;&nbsp; Client B&nbsp;&nbsp;&nbsp;&nbsp; | *&nbsp; =
|</span></font></div>
<div><font face=3D"Courier New" size=3D"2" color=3D"#1F497D"><span style=3D=
"font-size:10pt;"> |&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *&nbsp; &#43;-----=
-----------&#43; *&nbsp;&nbsp; |&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *&nbsp; &#43=
;----------------&#43; *&nbsp; |</span></font></div>
<div><font face=3D"Courier New" size=3D"2" color=3D"#1F497D"><span style=3D=
"font-size:10pt;"> |&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ******* ^ ********=
*****&nbsp;&nbsp; |&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ***** ^ ****** ^ ******&n=
bsp; |</span></font></div>
<div><font face=3D"Courier New" size=3D"2" color=3D"#1F497D"><span style=3D=
"font-size:10pt;"> |&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp; #&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; |&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; |&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp; |&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; |</span></=
font></div>
<div><font face=3D"Courier New" size=3D"2" color=3D"#1F497D"><span style=3D=
"font-size:10pt;"> |&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp; #&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; |&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; |&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp; |&nbsp;&nbsp; |-----|</span></font></div>
<div><font face=3D"Courier New" size=3D"2" color=3D"#1F497D"><span style=3D=
"font-size:10pt;"> |&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp; #&nbsp;&nbsp;  &nbsp;&nbsp;  &nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; |&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp; |&nbsp;&nbsp; |</span></font></div>
<div><font face=3D"Courier New" size=3D"2" color=3D"#1F497D"><span style=3D=
"font-size:10pt;"> |&nbsp; ************ v * * * * ********|&nbsp;&nbsp; ***=
************** v * v ********</span></font></div>
<div><font face=3D"Courier New" size=3D"2" color=3D"#1F497D"><span style=3D=
"font-size:10pt;"> |&nbsp; *&nbsp; &#43;---------------------&#43;&nbsp;&nb=
sp;&nbsp;&nbsp; |&nbsp;&nbsp; *&nbsp; &#43;---------------------&#43;&nbsp;=
&nbsp;&nbsp;&nbsp; *</span></font></div>
<div><font face=3D"Courier New" size=3D"2" color=3D"#1F497D"><span style=3D=
"font-size:10pt;"> |&nbsp; *&nbsp; |&nbsp;&nbsp;&nbsp;&nbsp; Agent 1&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; |&nbsp;&nbsp;&nbsp;&nbsp; |&nbsp;=
&nbsp; *&nbsp; |&nbsp;&nbsp;&nbsp; Agent 2&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp; |&nbsp;&nbsp;&nbsp;&nbsp; *</span></font></div>
<div><font face=3D"Courier New" size=3D"2" color=3D"#1F497D"><span style=3D=
"font-size:10pt;"> |&nbsp; *&nbsp; &#43;---------------------&#43;&nbsp;&nb=
sp;&nbsp;&nbsp; |&nbsp;&nbsp; *&nbsp; &#43;---------------------&#43;&nbsp;=
&nbsp;&nbsp;&nbsp; *</span></font></div>
<div><font face=3D"Courier New" size=3D"2" color=3D"#1F497D"><span style=3D=
"font-size:10pt;"> |&nbsp; *&nbsp;&nbsp;&nbsp;&nbsp; ^&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp; ^&nbsp; ^&nbsp;&nbsp; ^&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp; |&nbsp;&nbsp; *&nbsp;&nbsp;&nbsp;&nbsp; ^&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp; ^&nbsp; ^&nbsp;&nbsp; ^&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp; *</span></font></div>
<div><font face=3D"Times New Roman" color=3D"#1F497D">&nbsp;</font></div>
<div><font face=3D"Times New Roman" color=3D"#1F497D">&nbsp;</font></div>
<div><font face=3D"Times New Roman" color=3D"#1F497D">&nbsp;</font></div>
<div><font color=3D"#1F497D">Just think about this fact: today&#8217;s rout=
er configuration in production environment can only be performed by a few a=
uthorized people with EMS/NMS physically and securely separated.  If the ma=
jority  of the I2RS environment requirement
is about open connection, I2RS WG will spend a lot energy developing the ve=
ry sophisticated protocols which is expensive to develop and harder to depl=
oy. </font></div>
<div><font face=3D"Times New Roman" color=3D"#1F497D">&nbsp;</font></div>
<div><font color=3D"#1F497D">I am not against this development, but IMHO,  =
to gain wider and quicker I2RS deployment in production environment, it is =
necessary to have a very <font color=3D"red"><b><u>lean</u></b></font> I2RS=
 solution first, and to have a well
documented security requirement for the common deployment environment. E.g.=
 a single Controller (or the I2RS client) directly connected to their devic=
es via their internal network, where the connection is physically isolated =
from other network and protected
by separate mechanisms.  Also remember, many operators will use I2RS to con=
trol a small number of selective routers (mostly routers at ingress/egress =
boundary) for value added services.  </font></div>
<div><font face=3D"Times New Roman" color=3D"#1F497D">&nbsp;</font></div>
<div><font face=3D"Times New Roman" color=3D"#1F497D">&nbsp;</font></div>
<div><font face=3D"Times New Roman" color=3D"#1F497D">&nbsp;</font></div>
<div><font color=3D"#1F497D">Some of my  detailed questions and comments to=
 the &#8220;security-requirements&#8221; are still applicable to the &#8220=
;environment-req&#8221; document because they have the same text. Plus a fe=
w more for the &#8220;environment-req&#8221; document. Hope the authors
can address them. </font></div>
<div><font face=3D"Times New Roman" color=3D"#1F497D">&nbsp;</font></div>
<div><font face=3D"Times New Roman" color=3D"#1F497D">&nbsp;</font></div>
<div><font color=3D"#1F497D">Section 3: </font></div>
<div style=3D"padding-left:36pt;"><font face=3D"Times New Roman" color=3D"#=
1F497D">&nbsp;</font></div>
<div style=3D"padding-left:36pt;"><font color=3D"#1F497D">What are the key =
differences with regard to the security requirements for &nbsp;I2RS plane a=
nd for management plane? &nbsp;Section 3.1 describes the interaction betwee=
n I2RS plane and management plane. But I see the
security requirement for the management plane are all applicable to the sec=
urity requirement to I2RS plane . If you think that they are very different=
, can you elaborate more? </font></div>
<div><font face=3D"Times New Roman" color=3D"#1F497D">&nbsp;</font></div>
<div><font color=3D"#1F497D">Section 3.4 has title &#8220;Recommendations&#=
8221;, but the content are all requirements. Why not name the section &#822=
0;Requirement&#8221;? </font></div>
<div><font color=3D"#1F497D">&nbsp;</font></div>
<div><font color=3D"#1F497D">REQ 2: Does it that a different IP address tha=
n the one used by the management system?</font></div>
<div><font color=3D"#1F497D">&nbsp;</font></div>
<div><font color=3D"#1F497D">REQ 21: is more about I2RS requirement, less a=
bout &#8220;Security&#8221; requirement. </font></div>
<div><font color=3D"#1F497D">&nbsp;</font></div>
<div><font color=3D"#1F497D">REQ 24: isn&#8217;t it the general goal of I2R=
S? Not really security per se. (should be included in the general I2RS requ=
irement or architecture). </font></div>
<div><font color=3D"#1F497D">&nbsp;</font></div>
<div><font face=3D"Times New Roman" color=3D"#1F497D">&nbsp;</font></div>
<div><font color=3D"#1F497D">REQ 26: simply controlling the resource can ha=
rdly prevent DoS. Malicious client can occupy the resource while the valid =
one can't access.</font></div>
<div><font color=3D"#1F497D">&nbsp;</font></div>
<div><font color=3D"#1F497D">Thanks for your consideration, </font></div>
<div><font color=3D"#1F497D">Linda</font></div>
<div><font face=3D"Times New Roman" size=3D"2"><span style=3D"font-size:10.=
5pt;">&nbsp;</span></font></div>
<div><font face=3D"Times New Roman" size=3D"2"><span style=3D"font-size:10.=
5pt;">&nbsp;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">-=
----Original Message-----<br>

From: i2rs [<a href=3D"mailto:i2rs-bounces@ietf.org">mailto:i2rs-bounces@ie=
tf.org</a>] On Behalf Of Joel M. Halpern<br>

Sent: Friday, August 21, 2015 12:20 PM<br>

To: Linda Dunbar; i2rs@ietf.org<br>

Cc: 'Jeffrey Haas'; daniel.migault@ericsson.com; 'Alia Atlas'<br>

Subject: Re: [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG adop=
tion call (8/17 to 8/31)</span></font></div>
<div><font face=3D"Times New Roman" size=3D"2"><span style=3D"font-size:10.=
5pt;">&nbsp;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">Y=
es, one of the two last calls is for the environment document.</span></font=
></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
nbsp;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">H=
aving a dedicated physical channel is one of the ways identified in the dra=
ft to provide the required isolation.</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
nbsp;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">W=
hile such an environment is clearly supportable, I do not think we should r=
educe the internal protocol requirements (such as MTI security for the cont=
rol channel) just because there are circumstances
where such it won't be needed.&nbsp; I don't expect that we will build diff=
erent protocol stacks for the different deployments.</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
nbsp;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">T=
he purpose of this draft is to describe the environmental assumptions, whic=
h assumptions can be met in various ways.</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
nbsp;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">Y=
ours,</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">J=
oel</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
nbsp;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">O=
n 8/21/15 12:56 PM, Linda Dunbar wrote:</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt; Joel,</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt; If it is the &quot;environmental one&quot;, it is more important to dif=
ferentiate the requirements for different environments on how the I2RS clie=
nt &amp; Agent are connected.</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt; One of our customers stated that their environment has a single Control=
ler (or the I2RS client) directly connected to their devices via their inte=
rnal network, where the connection is physically
isolated from other network and protected by separate mechanisms, they don'=
t need all those sophisticated authentication procedure.</span></font></div=
>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt; We need to address this environment, i.e. having a simpler security req=
uirement for this environment than the environment where I2RS Client is con=
nected via public network.</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt; Linda</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt; -----Original Message-----</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt; From: Joel Halpern Direct [<a href=3D"mailto:jmh.direct@joelhalpern.com=
">mailto:jmh.direct@joelhalpern.com</a>]</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt; Sent: Friday, August 21, 2015 10:53 AM</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt; To: Linda Dunbar; <a href=3D"mailto:i2rs@ietf.org">i2rs@ietf.org</a></s=
pan></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt; Cc: 'Jeffrey Haas'; <a href=3D"mailto:daniel.migault@ericsson.com">dani=
el.migault@ericsson.com</a>; 'Joel Halpern'; 'Alia Atlas'</span></font></di=
v>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt; Subject: Re: [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG =
</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt; adoption call (8/17 to 8/31)</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt; First, there may be some confusion because the announcement.&nbsp; I pr=
esume that you are talking about the -environments documents.</span></font>=
</div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt; If the WG concludes that a different chapter structure is useful, we ca=
n of course change it.&nbsp; Given that the goal is environment description=
, I am not sure your proposed structure is significantly
better than the existing one.</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt; I believe your comment about the text&nbsp; reading &quot;where securit=
y functions may be hosted&quot; is well taken, and we should remove that te=
xt when we next revise the document.</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt; The isolation text is about the need to keep things separate, and the v=
arious possible means are degrees / approaches to separation.</span></font>=
</div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt; Isolation is not about treating things differently, nor is it explicitl=
y about using different protocols.&nbsp; So the point of isolation is not t=
hat there are different security requirements,
but that in order to avoid corss-effects, things should be kept separate.</=
span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt; Yours,</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt; Joel</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt; On 8/20/15 6:42 PM, Linda Dunbar wrote:</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; I support the WG adoption because I think the I2RS WG needs it.</sp=
an></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; However, I hope the authors can consider/address the following sugg=
estions/comments:</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; When you think about the I2RS security,&nbsp; there are following <=
/span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; different</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; aspects:</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; -Communication channel between I2RS client and Agent (and the chann=
el </span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; between I2RS client and applications):</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; The channel can be</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; oVia physical Private network (e.g. within a secured direct connect=
 </span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; within one site),</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; owithin one administrative domain,&nbsp; via virtual private networ=
k</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; oSecured connection, such as TLS or IPSec</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; oPublic internet</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; o..</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; -Authentication &amp; Authorization</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; othe authentication &amp; authorization requirement for different <=
/span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; communication channels can be different. Therefore, should have </s=
pan></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; separate sections to address specific requirement&nbsp; for each </=
span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; communication channels between I2RS agent &lt;-&gt; clients (and cl=
ient &lt;-&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; applications)</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; The current Section 4 of the draft already has very good descriptio=
n </span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; on the subject. I think 4.4.1 and 4.42 can be separated out of the =
section.</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; -Encryption for the actual content between Client and Agent</span><=
/font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; -DoS Design requirement (currently in Section 5.2.1)</span></font><=
/div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; -Management of conflict with other plane (e.g. the management plane=
, </span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; multi-headed control, which has been discussed extensively in </spa=
n></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; ephemeral</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; draft)</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; I think the draft should be organized from the aspects of the </spa=
n></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; security to I2RS as suggested above.</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; Here are some detailed questions and comments to the requirements <=
/span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; listed in the document:</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; Section 1:</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; The second paragraph stated the security recommendations must </spa=
n></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; &quot;specifying where security functions may be hosted&quot;. Firs=
t of all I</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; don't see the draft address this aspect. Second, I think&nbsp;&nbsp=
; &quot;where</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; security functions are hosted&quot; is orthogonal to &quot;I2RS sec=
urity&quot; .</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; Section 3:</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; what does isolating two planes mean? does it mean they have differe=
nt </span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; security requirement/issues? Or does it mean they need different pr=
otocols?</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; What are the key differences with regard to the security requiremen=
ts </span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; for&nbsp; I2RS plane and for management plane?&nbsp; Section 3.1 de=
scribes the </span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; interaction between I2RS plane and management plane. But I see the =
</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; security requirement for the management plane is similar to I2RS pl=
ane .</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; If you think that they are very different, can you elaborate more?<=
/span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; Section 3.4 has title &quot;Recommendations&quot;, but the content =
are all </span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; requirements. Why not name the section &quot;Requirement&quot;?</sp=
an></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; REQ 2: Does it that a different IP address than the one used by the=
 </span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; management system?</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; How is REQ 22 different from REQ 21?</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; REQ 27 is hard to enforce. How about say something like &quot;shoul=
dn't </span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; send any information beyond what have been defined by the I2RS data=
 model&quot;?</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; REQ 30: simply controlling the resource can hardly prevent DoS.</sp=
an></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; Malicious client can occupy the resource while the valid one can't =
access.</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; Thanks for consideration,</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; Linda</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; *From:*i2rs [<a href=3D"mailto:i2rs-bounces@ietf.org">mailto:i2rs-b=
ounces@ietf.org</a>] *On Behalf Of *Susan Hares</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; *Sent:* Monday, August 17, 2015 12:50 PM</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; *To:* <a href=3D"mailto:i2rs@ietf.org">i2rs@ietf.org</a></span></fo=
nt></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; *Cc:* 'Jeffrey Haas'; <a href=3D"mailto:daniel.migault@ericsson.com=
">daniel.migault@ericsson.com</a>; 'Joel Halpern'; </span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; <a href=3D"mailto:shares@ndzh.com">shares@ndzh.com</a>; 'Alia Atlas=
'</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; *Subject:* [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week W=
G </span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; adoption call (8/17 to 8/31)</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; This begins a 2 week WG adoption call for </span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; draft-mglt-i2rs-security-requirements.&nbsp; This draft discusses t=
he </span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; security requirements for the I2RS environment.&nbsp; You can find =
the draft at:</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; <a href=3D"https://tools.ietf.org/html/draft-mglt-i2rs-security-env=
ironment-reqs">https://tools.ietf.org/html/draft-mglt-i2rs-security-environ=
ment-reqs</a></span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; -</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; 00</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; A security reviewer will review this draft during the time 8/20 to<=
/span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; 8/25.&nbsp;&nbsp; We will post the security directorate review to t=
his discussion.</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt; Sue Hares</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">&=
nbsp;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">_=
______________________________________________</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">i=
2rs mailing list</span></font></div>
<div><font face=3D"Times New Roman" size=3D"2"><span style=3D"font-size:10.=
5pt;"><a href=3D"mailto:i2rs@ietf.org"><font face=3D"Consolas">i2rs@ietf.or=
g</font></a></span></font></div>
<div><font face=3D"Times New Roman" size=3D"2"><span style=3D"font-size:10.=
5pt;"><a href=3D"https://www.ietf.org/mailman/listinfo/i2rs"><font face=3D"=
Consolas">https://www.ietf.org/mailman/listinfo/i2rs</font></a></span></fon=
t></div>
<div><font face=3D"Times New Roman" size=3D"2"><span style=3D"font-size:10.=
5pt;">&nbsp;</span></font></div>
</span></font>
</body>
</html>

--_000_4A95BA014132FF49AE685FAB4B9F17F657D173F6dfweml701chm_--


From nobody Mon Aug 24 10:41:37 2015
Return-Path: <j.schoenwaelder@jacobs-university.de>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DEE801ACE51 for <i2rs@ietfa.amsl.com>; Mon, 24 Aug 2015 10:41:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.86
X-Spam-Level: 
X-Spam-Status: No, score=-3.86 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_EQ_DE=0.35, RCVD_IN_DNSWL_MED=-2.3, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id g_G8iD-GPgn5 for <i2rs@ietfa.amsl.com>; Mon, 24 Aug 2015 10:41:33 -0700 (PDT)
Received: from atlas3.jacobs-university.de (atlas3.jacobs-university.de [212.201.44.18]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C20801ACE48 for <i2rs@ietf.org>; Mon, 24 Aug 2015 10:41:33 -0700 (PDT)
Received: from localhost (demetrius5.irc-it.jacobs-university.de [10.70.0.222]) by atlas3.jacobs-university.de (Postfix) with ESMTP id 8AFD911ED; Mon, 24 Aug 2015 19:41:32 +0200 (CEST)
X-Virus-Scanned: amavisd-new at jacobs-university.de
Received: from atlas3.jacobs-university.de ([10.70.0.220]) by localhost (demetrius5.jacobs-university.de [10.70.0.222]) (amavisd-new, port 10030) with ESMTP id tMvBVBvRy8UC; Mon, 24 Aug 2015 19:41:31 +0200 (CEST)
Received: from hermes.jacobs-university.de (hermes.jacobs-university.de [212.201.44.23]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "hermes.jacobs-university.de", Issuer "Jacobs University CA - G01" (verified OK)) by atlas3.jacobs-university.de (Postfix) with ESMTPS; Mon, 24 Aug 2015 19:41:31 +0200 (CEST)
Received: from localhost (demetrius4.jacobs-university.de [212.201.44.49]) by hermes.jacobs-university.de (Postfix) with ESMTP id BFEFD20060; Mon, 24 Aug 2015 19:41:31 +0200 (CEST)
X-Virus-Scanned: amavisd-new at jacobs-university.de
Received: from hermes.jacobs-university.de ([212.201.44.23]) by localhost (demetrius4.jacobs-university.de [212.201.44.32]) (amavisd-new, port 10024) with ESMTP id gnY-yfFxsNe3; Mon, 24 Aug 2015 19:41:31 +0200 (CEST)
Received: from elstar.local (elstar.jacobs.jacobs-university.de [10.50.231.133]) by hermes.jacobs-university.de (Postfix) with ESMTP id CA0AA2005C; Mon, 24 Aug 2015 19:41:29 +0200 (CEST)
Received: by elstar.local (Postfix, from userid 501) id DCBFD3657C80; Mon, 24 Aug 2015 19:41:25 +0200 (CEST)
Date: Mon, 24 Aug 2015 19:41:25 +0200
From: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
To: Linda Dunbar <linda.dunbar@huawei.com>
Message-ID: <20150824174125.GB80057@elstar.local>
Mail-Followup-To: Linda Dunbar <linda.dunbar@huawei.com>, "Joel M. Halpern" <jmh@joelhalpern.com>, "i2rs@ietf.org" <i2rs@ietf.org>, 'Jeffrey Haas' <jhaas@pfrc.org>, "daniel.migault@ericsson.com" <daniel.migault@ericsson.com>, 'Alia Atlas' <akatlas@gmail.com>
References: <01a801d0d915$1558b4e0$400a1ea0$@ndzh.com> <4A95BA014132FF49AE685FAB4B9F17F657D1422E@dfweml701-chm> <55D7494B.1090903@joelhalpern.com> <4A95BA014132FF49AE685FAB4B9F17F657D158B0@dfweml701-chm> <55D75DAD.6040604@joelhalpern.com> <4A95BA014132FF49AE685FAB4B9F17F657D173F6@dfweml701-chm>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <4A95BA014132FF49AE685FAB4B9F17F657D173F6@dfweml701-chm>
User-Agent: Mutt/1.4.2.3i
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/Y5g_wG6-oAEAC01Z7r50PSbd1GM>
Cc: 'Jeffrey Haas' <jhaas@pfrc.org>, "i2rs@ietf.org" <i2rs@ietf.org>, "daniel.migault@ericsson.com" <daniel.migault@ericsson.com>, "Joel M. Halpern" <jmh@joelhalpern.com>, 'Alia Atlas' <akatlas@gmail.com>
Subject: Re: [i2rs] Review comments to draft-mglt-i2rs-security-environment-reqs-00 (was RE: draft-mglt-i2rs-security-requirements-00 2 Week WG adoption call (8/17 to 8/31)
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Aug 2015 17:41:36 -0000

On Mon, Aug 24, 2015 at 05:37:09PM +0000, Linda Dunbar wrote:
> Joel,
> 
> Agree with you that "we don't need to build different protocol stacks for the different deployments".
> But the "environment-req" draft is not about "Protocol", but about security issues under different "environment".
>

For me, this reads as another reason for having one security
requirements document instead of two...

/js

-- 
Juergen Schoenwaelder           Jacobs University Bremen gGmbH
Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
Fax:   +49 421 200 3103         <http://www.jacobs-university.de/>


From nobody Mon Aug 24 10:55:07 2015
Return-Path: <mglt.ietf@gmail.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AB9011A8AF0 for <i2rs@ietfa.amsl.com>; Mon, 24 Aug 2015 10:55:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.277
X-Spam-Level: 
X-Spam-Status: No, score=-1.277 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FM_FORGED_GMAIL=0.622, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hB-SCfDhjvWh for <i2rs@ietfa.amsl.com>; Mon, 24 Aug 2015 10:55:02 -0700 (PDT)
Received: from mail-io0-x22f.google.com (mail-io0-x22f.google.com [IPv6:2607:f8b0:4001:c06::22f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F34571ACDCA for <i2rs@ietf.org>; Mon, 24 Aug 2015 10:55:01 -0700 (PDT)
Received: by iodt126 with SMTP id t126so158330000iod.2 for <i2rs@ietf.org>; Mon, 24 Aug 2015 10:55:01 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:sender:date:message-id:subject:from:to:cc:content-type;  bh=2CkJCchvtTxe5ZtWTA55V7ChZ/Md6X25U3a7g29pKBM=; b=G6Ik+q1NFE0+hBkXQRUidPDBI12khD0nKkwiojRz6pD5/Ana+wfjpWoJTqfoGWrn0g OtZkCRid+PPOr4WN8oMSB51JFLPbBJ0ozPvGJRRHrT/l9U2mx1xY7B+BW3xs9G/syXTr UOYPHq9VS8s+qypQ53m8dsgna/+RhaZ01swTE9K7wtreSXs77kWqBT8pTdAW8g7VXlk9 c2JJzGSKp44EIZyVla5orP6fXhfKg4NRFDNiDrwqjb55CtKxPjJH2en01loLML8tuPpi rs2JilRPYaLDwfO+A/DLjFHrG1+gDQvaXBzMt6+jlQKrHgYO55Cw/5bxSyXM3KxB0auv EsJQ==
MIME-Version: 1.0
X-Received: by 10.107.9.156 with SMTP id 28mr20497403ioj.173.1440438901390; Mon, 24 Aug 2015 10:55:01 -0700 (PDT)
Sender: mglt.ietf@gmail.com
Received: by 10.79.21.196 with HTTP; Mon, 24 Aug 2015 10:55:01 -0700 (PDT)
Date: Mon, 24 Aug 2015 13:55:01 -0400
X-Google-Sender-Auth: 1-Uh9BY4FQWJtPfxzldW4ZwmGpk
Message-ID: <CADZyTknZ4ZzrxTB_Miud=-xMfckmD4LR7vdz+3uAg9gL7X22-g@mail.gmail.com>
From: Daniel Migault <daniel.migault@ericsson.com>
To: Linda Dunbar <linda.dunbar@huawei.com>
Content-Type: multipart/alternative; boundary=001a113ec2f209c500051e1251b7
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/n1jdKD4zaqCz9y0QlY6YQk8fRP8>
Cc: Jeffrey Haas <jhaas@pfrc.org>, "i2rs@ietf.org" <i2rs@ietf.org>, "Joel M. Halpern" <jmh@joelhalpern.com>, Alia Atlas <akatlas@gmail.com>
Subject: Re: [i2rs] Review comments to draft-mglt-i2rs-security-environment-reqs-00 (was RE: draft-mglt-i2rs-security-requirements-00 2 Week WG adoption call (8/17 to 8/31)
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Aug 2015 17:55:06 -0000

--001a113ec2f209c500051e1251b7
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Hi Linda,

Thank you for your comments. I agree we need to address more specifically
or explicitly the "most common" use case. I agree with your comments and we
will consider them to improve and clarify the text of the next version.
Thank you. To me the i2rs plane provides a limited number of
functionnalities that may be provided to different independant tenants.

BR,
Daniel


On Mon, Aug 24, 2015 at 1:37 PM, Linda Dunbar <linda.dunbar@huawei.com>
wrote:

> Joel,
>
> Agree with you that =E2=80=9Cwe don=E2=80=99t need to build different pro=
tocol stacks for
> the different deployments=E2=80=9D.
> But the =E2=80=9Cenvironment-req=E2=80=9D draft is not about =E2=80=9CPro=
tocol=E2=80=9D, but about
> security issues under different =E2=80=9Cenvironment=E2=80=9D.
>
> Among all our customers who are interested in I2RS, majority of them
> (>90%) will deploy them in a closed environment, i.e. physically secured
> connection between I2RS agent and I2RS client. Therefore, it is important
> to =E2=80=9Cprovides an analysis of the security issues of=E2=80=9D of th=
is commonly
> deployed environment.
>
> I suggest adding this Figure to Section 1 of the document:
>
> Closed  (over open Chnl ###>)          Open (over secure Chnl --->)
> +---------------------------------+
> |      ***********************   |      ***********************  |
> |       *    Application A    *   |      *    Application B    *  |
> |       *                     *   |      *                     *  |
> |       *  +----------------+ *   |      *  +----------------+ *  |
> |       *  |   Client A     | *   |      *  |   Client B     | *  |
> |       *  +----------------+ *   |      *  +----------------+ *  |
> |       ******* ^ *************   |      ***** ^ ****** ^ ******  |
> |               #                 |            |        |         |
> |               #                 |            |        |   |-----|
> |               #               |                     |   |
> |  ************ v * * * * ********|   ***************** v * v ********
> |  *  +---------------------+     |   *  +---------------------+     *
> |  *  |     Agent 1         |     |   *  |    Agent 2          |     *
> |  *  +---------------------+     |   *  +---------------------+     *
> |  *     ^        ^  ^   ^        |   *     ^        ^  ^   ^        *
>
>
>
> Just think about this fact: today=E2=80=99s router configuration in produ=
ction
> environment can only be performed by a few authorized people with EMS/NMS
> physically and securely separated. If the majority of the I2RS environmen=
t
> requirement is about open connection, I2RS WG will spend a lot energy
> developing the very sophisticated protocols which is expensive to develop
> and harder to deploy.
>
> I am not against this development, but IMHO, to gain wider and quicker
> I2RS deployment in production environment, it is necessary to have a very
> *lean* I2RS solution first, and to have a well documented security
> requirement for the common deployment environment. E.g. a single Controll=
er
> (or the I2RS client) directly connected to their devices via their intern=
al
> network, where the connection is physically isolated from other network a=
nd
> protected by separate mechanisms. Also remember, many operators will use
> I2RS to control a small number of selective routers (mostly routers at
> ingress/egress boundary) for value added services.
>
>
>
> Some of my detailed questions and comments to the =E2=80=9Csecurity-requi=
rements=E2=80=9D
> are still applicable to the =E2=80=9Cenvironment-req=E2=80=9D document be=
cause they have
> the same text. Plus a few more for the =E2=80=9Cenvironment-req=E2=80=9D =
document. Hope the
> authors can address them.
>
>
> Section 3:
>
> What are the key differences with regard to the security requirements for
>  I2RS plane and for management plane?  Section 3.1 describes the
> interaction between I2RS plane and management plane. But I see the securi=
ty
> requirement for the management plane are all applicable to the security
> requirement to I2RS plane . If you think that they are very different, ca=
n
> you elaborate more?
>
> Section 3.4 has title =E2=80=9CRecommendations=E2=80=9D, but the content =
are all
> requirements. Why not name the section =E2=80=9CRequirement=E2=80=9D?
>
> REQ 2: Does it that a different IP address than the one used by the
> management system?
>
> REQ 21: is more about I2RS requirement, less about =E2=80=9CSecurity=E2=
=80=9D requirement.
>
> REQ 24: isn=E2=80=99t it the general goal of I2RS? Not really security pe=
r se.
> (should be included in the general I2RS requirement or architecture).
>
>
> REQ 26: simply controlling the resource can hardly prevent DoS. Malicious
> client can occupy the resource while the valid one can't access.
>
> Thanks for your consideration,
> Linda
>
>
> -----Original Message-----
> From: i2rs [mailto:i2rs-bounces@ietf.org <i2rs-bounces@ietf.org>] On
> Behalf Of Joel M. Halpern
> Sent: Friday, August 21, 2015 12:20 PM
> To: Linda Dunbar; i2rs@ietf.org
> Cc: 'Jeffrey Haas'; daniel.migault@ericsson.com; 'Alia Atlas'
> Subject: Re: [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG
> adoption call (8/17 to 8/31)
>
> Yes, one of the two last calls is for the environment document.
>
> Having a dedicated physical channel is one of the ways identified in the
> draft to provide the required isolation.
>
> While such an environment is clearly supportable, I do not think we shoul=
d
> reduce the internal protocol requirements (such as MTI security for the
> control channel) just because there are circumstances where such it won't
> be needed.  I don't expect that we will build different protocol stacks f=
or
> the different deployments.
>
> The purpose of this draft is to describe the environmental assumptions,
> which assumptions can be met in various ways.
>
> Yours,
> Joel
>
> On 8/21/15 12:56 PM, Linda Dunbar wrote:
> > Joel,
> >
> > If it is the "environmental one", it is more important to differentiate
> the requirements for different environments on how the I2RS client & Agen=
t
> are connected.
> >
> > One of our customers stated that their environment has a single
> Controller (or the I2RS client) directly connected to their devices via
> their internal network, where the connection is physically isolated from
> other network and protected by separate mechanisms, they don't need all
> those sophisticated authentication procedure.
> >
> > We need to address this environment, i.e. having a simpler security
> requirement for this environment than the environment where I2RS Client i=
s
> connected via public network.
> >
> > Linda
> >
> >
> > -----Original Message-----
> > From: Joel Halpern Direct [mailto:jmh.direct@joelhalpern.com
> <jmh.direct@joelhalpern.com>]
> > Sent: Friday, August 21, 2015 10:53 AM
> > To: Linda Dunbar; i2rs@ietf.org
> > Cc: 'Jeffrey Haas'; daniel.migault@ericsson.com; 'Joel Halpern'; 'Alia
> Atlas'
> > Subject: Re: [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG
> > adoption call (8/17 to 8/31)
> >
> > First, there may be some confusion because the announcement.  I presume
> that you are talking about the -environments documents.
> >
> > If the WG concludes that a different chapter structure is useful, we ca=
n
> of course change it.  Given that the goal is environment description, I a=
m
> not sure your proposed structure is significantly better than the existin=
g
> one.
> >
> > I believe your comment about the text  reading "where security function=
s
> may be hosted" is well taken, and we should remove that text when we next
> revise the document.
> >
> > The isolation text is about the need to keep things separate, and the
> various possible means are degrees / approaches to separation.
> > Isolation is not about treating things differently, nor is it explicitl=
y
> about using different protocols.  So the point of isolation is not that
> there are different security requirements, but that in order to avoid
> corss-effects, things should be kept separate.
> >
> > Yours,
> > Joel
> >
> > On 8/20/15 6:42 PM, Linda Dunbar wrote:
> >> I support the WG adoption because I think the I2RS WG needs it.
> >> However, I hope the authors can consider/address the following
> suggestions/comments:
> >>
> >> When you think about the I2RS security,  there are following
> >> different
> >> aspects:
> >>
> >> -Communication channel between I2RS client and Agent (and the channel
> >> between I2RS client and applications):
> >>
> >> The channel can be
> >>
> >> oVia physical Private network (e.g. within a secured direct connect
> >> within one site),
> >>
> >> owithin one administrative domain,  via virtual private network
> >>
> >> oSecured connection, such as TLS or IPSec
> >>
> >> oPublic internet
> >>
> >> o..
> >>
> >> -Authentication & Authorization
> >>
> >> othe authentication & authorization requirement for different
> >> communication channels can be different. Therefore, should have
> >> separate sections to address specific requirement  for each
> >> communication channels between I2RS agent <-> clients (and client <->
> >> applications)
> >>
> >> The current Section 4 of the draft already has very good description
> >> on the subject. I think 4.4.1 and 4.42 can be separated out of the
> section.
> >>
> >> -Encryption for the actual content between Client and Agent
> >>
> >> -DoS Design requirement (currently in Section 5.2.1)
> >>
> >> -Management of conflict with other plane (e.g. the management plane,
> >> multi-headed control, which has been discussed extensively in
> >> ephemeral
> >> draft)
> >>
> >> I think the draft should be organized from the aspects of the
> >> security to I2RS as suggested above.
> >>
> >> Here are some detailed questions and comments to the requirements
> >> listed in the document:
> >>
> >> Section 1:
> >>
> >> The second paragraph stated the security recommendations must
> >> "specifying where security functions may be hosted". First of all I
> >> don't see the draft address this aspect. Second, I think   "where
> >> security functions are hosted" is orthogonal to "I2RS security" .
> >>
> >> Section 3:
> >>
> >> what does isolating two planes mean? does it mean they have different
> >> security requirement/issues? Or does it mean they need different
> protocols?
> >>
> >> What are the key differences with regard to the security requirements
> >> for  I2RS plane and for management plane?  Section 3.1 describes the
> >> interaction between I2RS plane and management plane. But I see the
> >> security requirement for the management plane is similar to I2RS plane=
 .
> >> If you think that they are very different, can you elaborate more?
> >>
> >> Section 3.4 has title "Recommendations", but the content are all
> >> requirements. Why not name the section "Requirement"?
> >>
> >> REQ 2: Does it that a different IP address than the one used by the
> >> management system?
> >>
> >> How is REQ 22 different from REQ 21?
> >>
> >> REQ 27 is hard to enforce. How about say something like "shouldn't
> >> send any information beyond what have been defined by the I2RS data
> model"?
> >>
> >> REQ 30: simply controlling the resource can hardly prevent DoS.
> >> Malicious client can occupy the resource while the valid one can't
> access.
> >>
> >> Thanks for consideration,
> >>
> >> Linda
> >>
> >> *From:*i2rs [mailto:i2rs-bounces@ietf.org <i2rs-bounces@ietf.org>] *On
> Behalf Of *Susan Hares
> >> *Sent:* Monday, August 17, 2015 12:50 PM
> >> *To:* i2rs@ietf.org
> >> *Cc:* 'Jeffrey Haas'; daniel.migault@ericsson.com; 'Joel Halpern';
> >> shares@ndzh.com; 'Alia Atlas'
> >> *Subject:* [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG
> >> adoption call (8/17 to 8/31)
> >>
> >> This begins a 2 week WG adoption call for
> >> draft-mglt-i2rs-security-requirements.  This draft discusses the
> >> security requirements for the I2RS environment.  You can find the draf=
t
> at:
> >>
> >> https://tools.ietf.org/html/draft-mglt-i2rs-security-environment-reqs
> >> -
> >> 00
> >>
> >> A security reviewer will review this draft during the time 8/20 to
> >> 8/25.   We will post the security directorate review to this discussio=
n.
> >>
> >> Sue Hares
> >>
> >
>
> _______________________________________________
> i2rs mailing list
> i2rs@ietf.org
> https://www.ietf.org/mailman/listinfo/i2rs
>
>
> _______________________________________________
> i2rs mailing list
> i2rs@ietf.org
> https://www.ietf.org/mailman/listinfo/i2rs
>
>

--001a113ec2f209c500051e1251b7
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div><div><div>Hi Linda, <br><br></div>Thank you for your =
comments. I agree we need to address more specifically or explicitly the &q=
uot;most common&quot; use case. I agree with your comments and we will cons=
ider them to improve and clarify the text of the next version. Thank you. T=
o me the i2rs plane provides a limited number of functionnalities that may =
be provided to different independant tenants.=C2=A0 <br><br></div>BR, <br><=
/div>Daniel<br><div><div>=C2=A0</div></div><div class=3D"gmail_extra"><br><=
div class=3D"gmail_quote">On Mon, Aug 24, 2015 at 1:37 PM, Linda Dunbar <sp=
an dir=3D"ltr">&lt;<a href=3D"mailto:linda.dunbar@huawei.com" target=3D"_bl=
ank">linda.dunbar@huawei.com</a>&gt;</span> wrote:<br><blockquote class=3D"=
gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-=
left:1ex">






<div>
<font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt">
<div><font color=3D"#1F497D">Joel, </font></div>
<div><font color=3D"#1F497D">=C2=A0</font></div>
<div><font color=3D"#1F497D">Agree with you that =E2=80=9C<font color=3D"bl=
ack">we </font><font color=3D"black">don=E2=80=99t</font><font color=3D"bla=
ck"> need to</font><font color=3D"black"> build different protocol stacks f=
or the different deployments</font><font color=3D"black">=E2=80=9D</font><f=
ont color=3D"black">.
</font></font></div>
<div><font color=3D"#1F497D">But the =E2=80=9Cenvironment-req=E2=80=9D draf=
t is not about =E2=80=9CProtocol=E2=80=9D, but about security issues under =
different =E2=80=9Cenvironment=E2=80=9D. </font></div>
<div><font color=3D"#1F497D">=C2=A0</font></div>
<div><font color=3D"#1F497D">Among all our customers who are interested in =
I2RS, majority of them (&gt;90%) will deploy them in a closed environment, =
i.e. physically secured=C2=A0 connection between I2RS agent and I2RS client=
. Therefore, it is important to =E2=80=9C<font face=3D"Courier" color=3D"bl=
ack" size=3D"2"><span style=3D"font-size:10pt">provides
an analysis of the security</span></font><font face=3D"Courier" color=3D"bl=
ack" size=3D"2"><span style=3D"font-size:10pt"> </span></font><font face=3D=
"Courier" color=3D"black" size=3D"2"><span style=3D"font-size:10pt">issues =
of=E2=80=9D</span></font><font face=3D"Courier" color=3D"black" size=3D"2">=
<span style=3D"font-size:10pt">
</span></font>of this commonly deployed environment. </font></div>
<div><font face=3D"Times New Roman" color=3D"#1F497D">=C2=A0</font></div>
<div><font color=3D"#1F497D">I suggest adding this Figure to Section 1 of t=
he document:</font></div>
<div><font color=3D"#1F497D">=C2=A0</font></div>
<div><font face=3D"Courier New" color=3D"#1F497D" size=3D"2"><span style=3D=
"font-size:10pt"> Closed=C2=A0 (over open Chnl ###&gt;)=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0  Open (over secure Chnl ---&gt;)</span=
></font></div>
<div><font face=3D"Courier New" color=3D"#1F497D" size=3D"2"><span style=3D=
"font-size:10pt"> +---------------------------------+</span></font></div>
<div><font face=3D"Courier New" color=3D"#1F497D" size=3D"2"><span style=3D=
"font-size:10pt"> |=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0  ***********************=
=C2=A0=C2=A0 |=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 ***********************=C2=A0 =
|</span></font></div>
<div><font face=3D"Courier New" color=3D"#1F497D" size=3D"2"><span style=3D=
"font-size:10pt"> |=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 *=C2=A0=C2=A0=C2=A0=
 Application A=C2=A0=C2=A0=C2=A0 *=C2=A0=C2=A0 |=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0 *=C2=A0=C2=A0=C2=A0 Application B=C2=A0=C2=A0=C2=A0 *=C2=A0 |</span></f=
ont></div>
<div><font face=3D"Courier New" color=3D"#1F497D" size=3D"2"><span style=3D=
"font-size:10pt"> |=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 *=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0 *=C2=A0=C2=A0 |=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 *=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 *=C2=A0 |</span></font></div>
<div><font face=3D"Courier New" color=3D"#1F497D" size=3D"2"><span style=3D=
"font-size:10pt"> |=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 *=C2=A0 +----------=
------+ *=C2=A0=C2=A0 |=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 *=C2=A0 +------------=
----+ *=C2=A0 |</span></font></div>
<div><font face=3D"Courier New" color=3D"#1F497D" size=3D"2"><span style=3D=
"font-size:10pt"> |=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 *=C2=A0 |=C2=A0=C2=
=A0 Client A=C2=A0=C2=A0=C2=A0=C2=A0 | *=C2=A0=C2=A0 |=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0 *=C2=A0 |=C2=A0=C2=A0 Client B=C2=A0=C2=A0=C2=A0=C2=A0 | *=C2=A0 =
|</span></font></div>
<div><font face=3D"Courier New" color=3D"#1F497D" size=3D"2"><span style=3D=
"font-size:10pt"> |=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 *=C2=A0 +----------=
------+ *=C2=A0=C2=A0 |=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 *=C2=A0 +------------=
----+ *=C2=A0 |</span></font></div>
<div><font face=3D"Courier New" color=3D"#1F497D" size=3D"2"><span style=3D=
"font-size:10pt"> |=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 ******* ^ *********=
****=C2=A0=C2=A0 |=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 ***** ^ ****** ^ ******=C2=
=A0 |</span></font></div>
<div><font face=3D"Courier New" color=3D"#1F497D" size=3D"2"><span style=3D=
"font-size:10pt"> |=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 #=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 |=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 |=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0 |=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 |</spa=
n></font></div>
<div><font face=3D"Courier New" color=3D"#1F497D" size=3D"2"><span style=3D=
"font-size:10pt"> |=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 #=C2=A0=C2=A0 =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 |=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 |=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0 |=C2=A0=C2=A0 |-----|</span></font></div>
<div><font face=3D"Courier New" color=3D"#1F497D" size=3D"2"><span style=3D=
"font-size:10pt"> |=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 #=C2=A0=C2=A0  =C2=A0=C2=A0  =C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 |=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0 |=C2=A0=C2=A0 |</span></font></div>
<div><font face=3D"Courier New" color=3D"#1F497D" size=3D"2"><span style=3D=
"font-size:10pt"> |=C2=A0 ************ v * * * * ********|=C2=A0=C2=A0 ****=
************* v * v ********</span></font></div>
<div><font face=3D"Courier New" color=3D"#1F497D" size=3D"2"><span style=3D=
"font-size:10pt"> |=C2=A0 *=C2=A0 +---------------------+=C2=A0=C2=A0=C2=A0=
=C2=A0 |=C2=A0=C2=A0 *=C2=A0 +---------------------+=C2=A0=C2=A0=C2=A0=C2=
=A0 *</span></font></div>
<div><font face=3D"Courier New" color=3D"#1F497D" size=3D"2"><span style=3D=
"font-size:10pt"> |=C2=A0 *=C2=A0 |=C2=A0=C2=A0=C2=A0=C2=A0 Agent 1=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 |=C2=A0=C2=A0=C2=A0=C2=A0 |=C2=
=A0=C2=A0 *=C2=A0 |=C2=A0=C2=A0=C2=A0 Agent 2=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0 |=C2=A0=C2=A0=C2=A0=C2=A0 *</span></font></div>
<div><font face=3D"Courier New" color=3D"#1F497D" size=3D"2"><span style=3D=
"font-size:10pt"> |=C2=A0 *=C2=A0 +---------------------+=C2=A0=C2=A0=C2=A0=
=C2=A0 |=C2=A0=C2=A0 *=C2=A0 +---------------------+=C2=A0=C2=A0=C2=A0=C2=
=A0 *</span></font></div>
<div><font face=3D"Courier New" color=3D"#1F497D" size=3D"2"><span style=3D=
"font-size:10pt"> |=C2=A0 *=C2=A0=C2=A0=C2=A0=C2=A0 ^=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0 ^=C2=A0 ^=C2=A0=C2=A0 ^=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0 |=C2=A0=C2=A0 *=C2=A0=C2=A0=C2=A0=C2=A0 ^=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0 ^=C2=A0 ^=C2=A0=C2=A0 ^=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0 *</span></font></div>
<div><font face=3D"Times New Roman" color=3D"#1F497D">=C2=A0</font></div>
<div><font face=3D"Times New Roman" color=3D"#1F497D">=C2=A0</font></div>
<div><font face=3D"Times New Roman" color=3D"#1F497D">=C2=A0</font></div>
<div><font color=3D"#1F497D">Just think about this fact: today=E2=80=99s ro=
uter configuration in production environment can only be performed by a few=
 authorized people with EMS/NMS physically and securely separated.  If the =
majority  of the I2RS environment requirement
is about open connection, I2RS WG will spend a lot energy developing the ve=
ry sophisticated protocols which is expensive to develop and harder to depl=
oy. </font></div>
<div><font face=3D"Times New Roman" color=3D"#1F497D">=C2=A0</font></div>
<div><font color=3D"#1F497D">I am not against this development, but IMHO,  =
to gain wider and quicker I2RS deployment in production environment, it is =
necessary to have a very <font color=3D"red"><b><u>lean</u></b></font> I2RS=
 solution first, and to have a well
documented security requirement for the common deployment environment. E.g.=
 a single Controller (or the I2RS client) directly connected to their devic=
es via their internal network, where the connection is physically isolated =
from other network and protected
by separate mechanisms.  Also remember, many operators will use I2RS to con=
trol a small number of selective routers (mostly routers at ingress/egress =
boundary) for value added services.  </font></div>
<div><font face=3D"Times New Roman" color=3D"#1F497D">=C2=A0</font></div>
<div><font face=3D"Times New Roman" color=3D"#1F497D">=C2=A0</font></div>
<div><font face=3D"Times New Roman" color=3D"#1F497D">=C2=A0</font></div>
<div><font color=3D"#1F497D">Some of my  detailed questions and comments to=
 the =E2=80=9Csecurity-requirements=E2=80=9D are still applicable to the =
=E2=80=9Cenvironment-req=E2=80=9D document because they have the same text.=
 Plus a few more for the =E2=80=9Cenvironment-req=E2=80=9D document. Hope t=
he authors
can address them. </font></div>
<div><font face=3D"Times New Roman" color=3D"#1F497D">=C2=A0</font></div>
<div><font face=3D"Times New Roman" color=3D"#1F497D">=C2=A0</font></div>
<div><font color=3D"#1F497D">Section 3: </font></div>
<div style=3D"padding-left:36pt"><font face=3D"Times New Roman" color=3D"#1=
F497D">=C2=A0</font></div>
<div style=3D"padding-left:36pt"><font color=3D"#1F497D">What are the key d=
ifferences with regard to the security requirements for =C2=A0I2RS plane an=
d for management plane?=C2=A0 Section 3.1 describes the interaction between=
 I2RS plane and management plane. But I see the
security requirement for the management plane are all applicable to the sec=
urity requirement to I2RS plane . If you think that they are very different=
, can you elaborate more? </font></div>
<div><font face=3D"Times New Roman" color=3D"#1F497D">=C2=A0</font></div>
<div><font color=3D"#1F497D">Section 3.4 has title =E2=80=9CRecommendations=
=E2=80=9D, but the content are all requirements. Why not name the section =
=E2=80=9CRequirement=E2=80=9D? </font></div>
<div><font color=3D"#1F497D">=C2=A0</font></div>
<div><font color=3D"#1F497D">REQ 2: Does it that a different IP address tha=
n the one used by the management system?</font></div>
<div><font color=3D"#1F497D">=C2=A0</font></div>
<div><font color=3D"#1F497D">REQ 21: is more about I2RS requirement, less a=
bout =E2=80=9CSecurity=E2=80=9D requirement. </font></div>
<div><font color=3D"#1F497D">=C2=A0</font></div>
<div><font color=3D"#1F497D">REQ 24: isn=E2=80=99t it the general goal of I=
2RS? Not really security per se. (should be included in the general I2RS re=
quirement or architecture). </font></div>
<div><font color=3D"#1F497D">=C2=A0</font></div>
<div><font face=3D"Times New Roman" color=3D"#1F497D">=C2=A0</font></div>
<div><font color=3D"#1F497D">REQ 26: simply controlling the resource can ha=
rdly prevent DoS. Malicious client can occupy the resource while the valid =
one can&#39;t access.</font></div>
<div><font color=3D"#1F497D">=C2=A0</font></div>
<div><font color=3D"#1F497D">Thanks for your consideration, </font></div>
<div><font color=3D"#1F497D">Linda</font></div>
<div><font face=3D"Times New Roman" size=3D"2"><span style=3D"font-size:10.=
5pt">=C2=A0</span></font></div>
<div><font face=3D"Times New Roman" size=3D"2"><span style=3D"font-size:10.=
5pt">=C2=A0</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">--=
---Original Message-----<br>

From: i2rs [<a href=3D"mailto:i2rs-bounces@ietf.org" target=3D"_blank">mail=
to:i2rs-bounces@ietf.org</a>] On Behalf Of Joel M. Halpern<br>

Sent: Friday, August 21, 2015 12:20 PM<br>

To: Linda Dunbar; <a href=3D"mailto:i2rs@ietf.org" target=3D"_blank">i2rs@i=
etf.org</a><br>

Cc: &#39;Jeffrey Haas&#39;; <a href=3D"mailto:daniel.migault@ericsson.com" =
target=3D"_blank">daniel.migault@ericsson.com</a>; &#39;Alia Atlas&#39;<br>

Subject: Re: [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG adop=
tion call (8/17 to 8/31)</span></font></div>
<div><font face=3D"Times New Roman" size=3D"2"><span style=3D"font-size:10.=
5pt">=C2=A0</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">Ye=
s, one of the two last calls is for the environment document.</span></font>=
</div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">=
=C2=A0</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">Ha=
ving a dedicated physical channel is one of the ways identified in the draf=
t to provide the required isolation.</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">=
=C2=A0</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">Wh=
ile such an environment is clearly supportable, I do not think we should re=
duce the internal protocol requirements (such as MTI security for the contr=
ol channel) just because there are circumstances
where such it won&#39;t be needed.=C2=A0 I don&#39;t expect that we will bu=
ild different protocol stacks for the different deployments.</span></font><=
/div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">=
=C2=A0</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">Th=
e purpose of this draft is to describe the environmental assumptions, which=
 assumptions can be met in various ways.</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">=
=C2=A0</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">Yo=
urs,</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">Jo=
el</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">=
=C2=A0</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">On=
 8/21/15 12:56 PM, Linda Dunbar wrote:</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t; Joel,</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t; If it is the &quot;environmental one&quot;, it is more important to diff=
erentiate the requirements for different environments on how the I2RS clien=
t &amp; Agent are connected.</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t; One of our customers stated that their environment has a single Controll=
er (or the I2RS client) directly connected to their devices via their inter=
nal network, where the connection is physically
isolated from other network and protected by separate mechanisms, they don&=
#39;t need all those sophisticated authentication procedure.</span></font><=
/div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t; We need to address this environment, i.e. having a simpler security requ=
irement for this environment than the environment where I2RS Client is conn=
ected via public network.</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t; Linda</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t; -----Original Message-----</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t; From: Joel Halpern Direct [<a href=3D"mailto:jmh.direct@joelhalpern.com"=
 target=3D"_blank">mailto:jmh.direct@joelhalpern.com</a>]</span></font></di=
v>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t; Sent: Friday, August 21, 2015 10:53 AM</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t; To: Linda Dunbar; <a href=3D"mailto:i2rs@ietf.org" target=3D"_blank">i2r=
s@ietf.org</a></span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t; Cc: &#39;Jeffrey Haas&#39;; <a href=3D"mailto:daniel.migault@ericsson.co=
m" target=3D"_blank">daniel.migault@ericsson.com</a>; &#39;Joel Halpern&#39=
;; &#39;Alia Atlas&#39;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t; Subject: Re: [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG <=
/span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t; adoption call (8/17 to 8/31)</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t; First, there may be some confusion because the announcement.=C2=A0 I pre=
sume that you are talking about the -environments documents.</span></font><=
/div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t; If the WG concludes that a different chapter structure is useful, we can=
 of course change it.=C2=A0 Given that the goal is environment description,=
 I am not sure your proposed structure is significantly
better than the existing one.</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t; I believe your comment about the text=C2=A0 reading &quot;where security=
 functions may be hosted&quot; is well taken, and we should remove that tex=
t when we next revise the document.</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t; The isolation text is about the need to keep things separate, and the va=
rious possible means are degrees / approaches to separation.</span></font><=
/div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t; Isolation is not about treating things differently, nor is it explicitly=
 about using different protocols.=C2=A0 So the point of isolation is not th=
at there are different security requirements,
but that in order to avoid corss-effects, things should be kept separate.</=
span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t; Yours,</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t; Joel</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t; On 8/20/15 6:42 PM, Linda Dunbar wrote:</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; I support the WG adoption because I think the I2RS WG needs it.</spa=
n></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; However, I hope the authors can consider/address the following sugge=
stions/comments:</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; When you think about the I2RS security,=C2=A0 there are following </=
span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; different</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; aspects:</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; -Communication channel between I2RS client and Agent (and the channe=
l </span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; between I2RS client and applications):</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; The channel can be</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; oVia physical Private network (e.g. within a secured direct connect =
</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; within one site),</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; owithin one administrative domain,=C2=A0 via virtual private network=
</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; oSecured connection, such as TLS or IPSec</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; oPublic internet</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; o..</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; -Authentication &amp; Authorization</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; othe authentication &amp; authorization requirement for different </=
span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; communication channels can be different. Therefore, should have </sp=
an></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; separate sections to address specific requirement=C2=A0 for each </s=
pan></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; communication channels between I2RS agent &lt;-&gt; clients (and cli=
ent &lt;-&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; applications)</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; The current Section 4 of the draft already has very good description=
 </span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; on the subject. I think 4.4.1 and 4.42 can be separated out of the s=
ection.</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; -Encryption for the actual content between Client and Agent</span></=
font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; -DoS Design requirement (currently in Section 5.2.1)</span></font></=
div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; -Management of conflict with other plane (e.g. the management plane,=
 </span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; multi-headed control, which has been discussed extensively in </span=
></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; ephemeral</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; draft)</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; I think the draft should be organized from the aspects of the </span=
></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; security to I2RS as suggested above.</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; Here are some detailed questions and comments to the requirements </=
span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; listed in the document:</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; Section 1:</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; The second paragraph stated the security recommendations must </span=
></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; &quot;specifying where security functions may be hosted&quot;. First=
 of all I</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; don&#39;t see the draft address this aspect. Second, I think=C2=A0=
=C2=A0 &quot;where</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; security functions are hosted&quot; is orthogonal to &quot;I2RS secu=
rity&quot; .</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; Section 3:</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; what does isolating two planes mean? does it mean they have differen=
t </span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; security requirement/issues? Or does it mean they need different pro=
tocols?</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; What are the key differences with regard to the security requirement=
s </span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; for=C2=A0 I2RS plane and for management plane?=C2=A0 Section 3.1 des=
cribes the </span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; interaction between I2RS plane and management plane. But I see the <=
/span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; security requirement for the management plane is similar to I2RS pla=
ne .</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; If you think that they are very different, can you elaborate more?</=
span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; Section 3.4 has title &quot;Recommendations&quot;, but the content a=
re all </span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; requirements. Why not name the section &quot;Requirement&quot;?</spa=
n></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; REQ 2: Does it that a different IP address than the one used by the =
</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; management system?</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; How is REQ 22 different from REQ 21?</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; REQ 27 is hard to enforce. How about say something like &quot;should=
n&#39;t </span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; send any information beyond what have been defined by the I2RS data =
model&quot;?</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; REQ 30: simply controlling the resource can hardly prevent DoS.</spa=
n></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; Malicious client can occupy the resource while the valid one can&#39=
;t access.</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; Thanks for consideration,</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; Linda</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; *From:*i2rs [<a href=3D"mailto:i2rs-bounces@ietf.org" target=3D"_bla=
nk">mailto:i2rs-bounces@ietf.org</a>] *On Behalf Of *Susan Hares</span></fo=
nt></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; *Sent:* Monday, August 17, 2015 12:50 PM</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; *To:* <a href=3D"mailto:i2rs@ietf.org" target=3D"_blank">i2rs@ietf.o=
rg</a></span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; *Cc:* &#39;Jeffrey Haas&#39;; <a href=3D"mailto:daniel.migault@erics=
son.com" target=3D"_blank">daniel.migault@ericsson.com</a>; &#39;Joel Halpe=
rn&#39;; </span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; <a href=3D"mailto:shares@ndzh.com" target=3D"_blank">shares@ndzh.com=
</a>; &#39;Alia Atlas&#39;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; *Subject:* [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG=
 </span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; adoption call (8/17 to 8/31)</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; This begins a 2 week WG adoption call for </span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; draft-mglt-i2rs-security-requirements.=C2=A0 This draft discusses th=
e </span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; security requirements for the I2RS environment.=C2=A0 You can find t=
he draft at:</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; <a href=3D"https://tools.ietf.org/html/draft-mglt-i2rs-security-envi=
ronment-reqs" target=3D"_blank">https://tools.ietf.org/html/draft-mglt-i2rs=
-security-environment-reqs</a></span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; -</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; 00</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; A security reviewer will review this draft during the time 8/20 to</=
span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; 8/25.=C2=A0=C2=A0 We will post the security directorate review to th=
is discussion.</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; Sue Hares</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">=
=C2=A0</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">__=
_____________________________________________</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">i2=
rs mailing list</span></font></div>
<div><font face=3D"Times New Roman" size=3D"2"><span style=3D"font-size:10.=
5pt"><a href=3D"mailto:i2rs@ietf.org" target=3D"_blank"><font face=3D"Conso=
las">i2rs@ietf.org</font></a></span></font></div>
<div><font face=3D"Times New Roman" size=3D"2"><span style=3D"font-size:10.=
5pt"><a href=3D"https://www.ietf.org/mailman/listinfo/i2rs" target=3D"_blan=
k"><font face=3D"Consolas">https://www.ietf.org/mailman/listinfo/i2rs</font=
></a></span></font></div>
<div><font face=3D"Times New Roman" size=3D"2"><span style=3D"font-size:10.=
5pt">=C2=A0</span></font></div>
</span></font>
</div>

<br>_______________________________________________<br>
i2rs mailing list<br>
<a href=3D"mailto:i2rs@ietf.org">i2rs@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/i2rs" rel=3D"noreferrer" t=
arget=3D"_blank">https://www.ietf.org/mailman/listinfo/i2rs</a><br>
<br></blockquote></div><br></div></div>

--001a113ec2f209c500051e1251b7--


From nobody Mon Aug 24 11:02:51 2015
Return-Path: <andy@yumaworks.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 474A91A003B for <i2rs@ietfa.amsl.com>; Mon, 24 Aug 2015 11:02:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.978
X-Spam-Level: 
X-Spam-Status: No, score=-1.978 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4zBDANPhawHG for <i2rs@ietfa.amsl.com>; Mon, 24 Aug 2015 11:02:45 -0700 (PDT)
Received: from mail-lb0-f172.google.com (mail-lb0-f172.google.com [209.85.217.172]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CC5431A1B19 for <i2rs@ietf.org>; Mon, 24 Aug 2015 11:02:44 -0700 (PDT)
Received: by lbbpu9 with SMTP id pu9so84985538lbb.3 for <i2rs@ietf.org>; Mon, 24 Aug 2015 11:02:43 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc:content-type; bh=xTJevIxklr7PHW8/4MuAQyuh3zI/2qKNJ3ZkFBL2WHA=; b=CPWg7MGl75go6DQd5qAQMXT7j4vNShppfEeESEzYES82RbtjwlN2HrVfTODKbGZlW3 OY9KqIV/undlJZ80zV6qoHEQQ9+O98Cq244bnQ83qRyZ9eRf5oABoHdDuMvAWT9lnAe+ TzM2nKu8Q3bjpwu592QLKM/HB7PsuQyjR4mf4wkOApjVhPfwo5zt8XMhbkcDobY+AcYl kNYQ3fYdu5cp0vkafaK3kXZ9bwtJ9JuZ/1KQRYUsnUu2l8bUWs7fmt/jDSxDacFYA97P MdjUCGN64JnuRgcv43QLf5UTwrHLnBxkb3ryDhZNHD2peN8v59mbx94BDeNLYb8wfyVY 4QwQ==
X-Gm-Message-State: ALoCoQm2j3WlOzanEKjMWK4GonhIQy/QDQjOCrQoGv9TKt/VPtvkOtcKTu5ase6/zFAeaWcC4vjF
MIME-Version: 1.0
X-Received: by 10.112.154.106 with SMTP id vn10mr21574528lbb.38.1440439363240;  Mon, 24 Aug 2015 11:02:43 -0700 (PDT)
Received: by 10.112.200.104 with HTTP; Mon, 24 Aug 2015 11:02:43 -0700 (PDT)
In-Reply-To: <4A95BA014132FF49AE685FAB4B9F17F657D173F6@dfweml701-chm>
References: <01a801d0d915$1558b4e0$400a1ea0$@ndzh.com> <4A95BA014132FF49AE685FAB4B9F17F657D1422E@dfweml701-chm> <55D7494B.1090903@joelhalpern.com> <4A95BA014132FF49AE685FAB4B9F17F657D158B0@dfweml701-chm> <55D75DAD.6040604@joelhalpern.com> <4A95BA014132FF49AE685FAB4B9F17F657D173F6@dfweml701-chm>
Date: Mon, 24 Aug 2015 11:02:43 -0700
Message-ID: <CABCOCHRGMTQWTneddfZPC+d8t2wBAdEM6-j9NmLsgf6rTVmsjg@mail.gmail.com>
From: Andy Bierman <andy@yumaworks.com>
To: Linda Dunbar <linda.dunbar@huawei.com>
Content-Type: multipart/alternative; boundary=089e0122af2a911d32051e126c51
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/R2-yTLtRJUxSWL_umykblRkAfYk>
Cc: Jeffrey Haas <jhaas@pfrc.org>, "i2rs@ietf.org" <i2rs@ietf.org>, "daniel.migault@ericsson.com" <daniel.migault@ericsson.com>, "Joel M. Halpern" <jmh@joelhalpern.com>, Alia Atlas <akatlas@gmail.com>
Subject: Re: [i2rs] Review comments to draft-mglt-i2rs-security-environment-reqs-00 (was RE: draft-mglt-i2rs-security-requirements-00 2 Week WG adoption call (8/17 to 8/31)
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Aug 2015 18:02:50 -0000

--089e0122af2a911d32051e126c51
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Hi,

I will leave it to the Security ADs to decide whether a non-secure transpor=
t
for I2RS should be standardized.

The "lean" I2RS seems to be a proprietary controller and agent
with no multi-headed control support. This will almost certainly
mean that the router will not work if any "unofficial"
controller is used instead of the vendor controller.

If this really is the expected usage then why bother with a standard?


Andy

On Mon, Aug 24, 2015 at 10:37 AM, Linda Dunbar <linda.dunbar@huawei.com>
wrote:

> Joel,
>
> Agree with you that =E2=80=9Cwe don=E2=80=99t need to build different pro=
tocol stacks for
> the different deployments=E2=80=9D.
> But the =E2=80=9Cenvironment-req=E2=80=9D draft is not about =E2=80=9CPro=
tocol=E2=80=9D, but about
> security issues under different =E2=80=9Cenvironment=E2=80=9D.
>
> Among all our customers who are interested in I2RS, majority of them
> (>90%) will deploy them in a closed environment, i.e. physically secured
> connection between I2RS agent and I2RS client. Therefore, it is important
> to =E2=80=9Cprovides an analysis of the security issues of=E2=80=9D of th=
is commonly
> deployed environment.
>
> I suggest adding this Figure to Section 1 of the document:
>
> Closed  (over open Chnl ###>)          Open (over secure Chnl --->)
> +---------------------------------+
> |      ***********************   |      ***********************  |
> |       *    Application A    *   |      *    Application B    *  |
> |       *                     *   |      *                     *  |
> |       *  +----------------+ *   |      *  +----------------+ *  |
> |       *  |   Client A     | *   |      *  |   Client B     | *  |
> |       *  +----------------+ *   |      *  +----------------+ *  |
> |       ******* ^ *************   |      ***** ^ ****** ^ ******  |
> |               #                 |            |        |         |
> |               #                 |            |        |   |-----|
> |               #               |                     |   |
> |  ************ v * * * * ********|   ***************** v * v ********
> |  *  +---------------------+     |   *  +---------------------+     *
> |  *  |     Agent 1         |     |   *  |    Agent 2          |     *
> |  *  +---------------------+     |   *  +---------------------+     *
> |  *     ^        ^  ^   ^        |   *     ^        ^  ^   ^        *
>
>
>
> Just think about this fact: today=E2=80=99s router configuration in produ=
ction
> environment can only be performed by a few authorized people with EMS/NMS
> physically and securely separated. If the majority of the I2RS environmen=
t
> requirement is about open connection, I2RS WG will spend a lot energy
> developing the very sophisticated protocols which is expensive to develop
> and harder to deploy.
>
> I am not against this development, but IMHO, to gain wider and quicker
> I2RS deployment in production environment, it is necessary to have a very
> *lean* I2RS solution first, and to have a well documented security
> requirement for the common deployment environment. E.g. a single Controll=
er
> (or the I2RS client) directly connected to their devices via their intern=
al
> network, where the connection is physically isolated from other network a=
nd
> protected by separate mechanisms. Also remember, many operators will use
> I2RS to control a small number of selective routers (mostly routers at
> ingress/egress boundary) for value added services.
>
>
>
> Some of my detailed questions and comments to the =E2=80=9Csecurity-requi=
rements=E2=80=9D
> are still applicable to the =E2=80=9Cenvironment-req=E2=80=9D document be=
cause they have
> the same text. Plus a few more for the =E2=80=9Cenvironment-req=E2=80=9D =
document. Hope the
> authors can address them.
>
>
> Section 3:
>
> What are the key differences with regard to the security requirements for
>  I2RS plane and for management plane?  Section 3.1 describes the
> interaction between I2RS plane and management plane. But I see the securi=
ty
> requirement for the management plane are all applicable to the security
> requirement to I2RS plane . If you think that they are very different, ca=
n
> you elaborate more?
>
> Section 3.4 has title =E2=80=9CRecommendations=E2=80=9D, but the content =
are all
> requirements. Why not name the section =E2=80=9CRequirement=E2=80=9D?
>
> REQ 2: Does it that a different IP address than the one used by the
> management system?
>
> REQ 21: is more about I2RS requirement, less about =E2=80=9CSecurity=E2=
=80=9D requirement.
>
> REQ 24: isn=E2=80=99t it the general goal of I2RS? Not really security pe=
r se.
> (should be included in the general I2RS requirement or architecture).
>
>
> REQ 26: simply controlling the resource can hardly prevent DoS. Malicious
> client can occupy the resource while the valid one can't access.
>
> Thanks for your consideration,
> Linda
>
>
> -----Original Message-----
> From: i2rs [mailto:i2rs-bounces@ietf.org <i2rs-bounces@ietf.org>] On
> Behalf Of Joel M. Halpern
> Sent: Friday, August 21, 2015 12:20 PM
> To: Linda Dunbar; i2rs@ietf.org
> Cc: 'Jeffrey Haas'; daniel.migault@ericsson.com; 'Alia Atlas'
> Subject: Re: [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG
> adoption call (8/17 to 8/31)
>
> Yes, one of the two last calls is for the environment document.
>
> Having a dedicated physical channel is one of the ways identified in the
> draft to provide the required isolation.
>
> While such an environment is clearly supportable, I do not think we shoul=
d
> reduce the internal protocol requirements (such as MTI security for the
> control channel) just because there are circumstances where such it won't
> be needed.  I don't expect that we will build different protocol stacks f=
or
> the different deployments.
>
> The purpose of this draft is to describe the environmental assumptions,
> which assumptions can be met in various ways.
>
> Yours,
> Joel
>
> On 8/21/15 12:56 PM, Linda Dunbar wrote:
> > Joel,
> >
> > If it is the "environmental one", it is more important to differentiate
> the requirements for different environments on how the I2RS client & Agen=
t
> are connected.
> >
> > One of our customers stated that their environment has a single
> Controller (or the I2RS client) directly connected to their devices via
> their internal network, where the connection is physically isolated from
> other network and protected by separate mechanisms, they don't need all
> those sophisticated authentication procedure.
> >
> > We need to address this environment, i.e. having a simpler security
> requirement for this environment than the environment where I2RS Client i=
s
> connected via public network.
> >
> > Linda
> >
> >
> > -----Original Message-----
> > From: Joel Halpern Direct [mailto:jmh.direct@joelhalpern.com
> <jmh.direct@joelhalpern.com>]
> > Sent: Friday, August 21, 2015 10:53 AM
> > To: Linda Dunbar; i2rs@ietf.org
> > Cc: 'Jeffrey Haas'; daniel.migault@ericsson.com; 'Joel Halpern'; 'Alia
> Atlas'
> > Subject: Re: [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG
> > adoption call (8/17 to 8/31)
> >
> > First, there may be some confusion because the announcement.  I presume
> that you are talking about the -environments documents.
> >
> > If the WG concludes that a different chapter structure is useful, we ca=
n
> of course change it.  Given that the goal is environment description, I a=
m
> not sure your proposed structure is significantly better than the existin=
g
> one.
> >
> > I believe your comment about the text  reading "where security function=
s
> may be hosted" is well taken, and we should remove that text when we next
> revise the document.
> >
> > The isolation text is about the need to keep things separate, and the
> various possible means are degrees / approaches to separation.
> > Isolation is not about treating things differently, nor is it explicitl=
y
> about using different protocols.  So the point of isolation is not that
> there are different security requirements, but that in order to avoid
> corss-effects, things should be kept separate.
> >
> > Yours,
> > Joel
> >
> > On 8/20/15 6:42 PM, Linda Dunbar wrote:
> >> I support the WG adoption because I think the I2RS WG needs it.
> >> However, I hope the authors can consider/address the following
> suggestions/comments:
> >>
> >> When you think about the I2RS security,  there are following
> >> different
> >> aspects:
> >>
> >> -Communication channel between I2RS client and Agent (and the channel
> >> between I2RS client and applications):
> >>
> >> The channel can be
> >>
> >> oVia physical Private network (e.g. within a secured direct connect
> >> within one site),
> >>
> >> owithin one administrative domain,  via virtual private network
> >>
> >> oSecured connection, such as TLS or IPSec
> >>
> >> oPublic internet
> >>
> >> o..
> >>
> >> -Authentication & Authorization
> >>
> >> othe authentication & authorization requirement for different
> >> communication channels can be different. Therefore, should have
> >> separate sections to address specific requirement  for each
> >> communication channels between I2RS agent <-> clients (and client <->
> >> applications)
> >>
> >> The current Section 4 of the draft already has very good description
> >> on the subject. I think 4.4.1 and 4.42 can be separated out of the
> section.
> >>
> >> -Encryption for the actual content between Client and Agent
> >>
> >> -DoS Design requirement (currently in Section 5.2.1)
> >>
> >> -Management of conflict with other plane (e.g. the management plane,
> >> multi-headed control, which has been discussed extensively in
> >> ephemeral
> >> draft)
> >>
> >> I think the draft should be organized from the aspects of the
> >> security to I2RS as suggested above.
> >>
> >> Here are some detailed questions and comments to the requirements
> >> listed in the document:
> >>
> >> Section 1:
> >>
> >> The second paragraph stated the security recommendations must
> >> "specifying where security functions may be hosted". First of all I
> >> don't see the draft address this aspect. Second, I think   "where
> >> security functions are hosted" is orthogonal to "I2RS security" .
> >>
> >> Section 3:
> >>
> >> what does isolating two planes mean? does it mean they have different
> >> security requirement/issues? Or does it mean they need different
> protocols?
> >>
> >> What are the key differences with regard to the security requirements
> >> for  I2RS plane and for management plane?  Section 3.1 describes the
> >> interaction between I2RS plane and management plane. But I see the
> >> security requirement for the management plane is similar to I2RS plane=
 .
> >> If you think that they are very different, can you elaborate more?
> >>
> >> Section 3.4 has title "Recommendations", but the content are all
> >> requirements. Why not name the section "Requirement"?
> >>
> >> REQ 2: Does it that a different IP address than the one used by the
> >> management system?
> >>
> >> How is REQ 22 different from REQ 21?
> >>
> >> REQ 27 is hard to enforce. How about say something like "shouldn't
> >> send any information beyond what have been defined by the I2RS data
> model"?
> >>
> >> REQ 30: simply controlling the resource can hardly prevent DoS.
> >> Malicious client can occupy the resource while the valid one can't
> access.
> >>
> >> Thanks for consideration,
> >>
> >> Linda
> >>
> >> *From:*i2rs [mailto:i2rs-bounces@ietf.org <i2rs-bounces@ietf.org>] *On
> Behalf Of *Susan Hares
> >> *Sent:* Monday, August 17, 2015 12:50 PM
> >> *To:* i2rs@ietf.org
> >> *Cc:* 'Jeffrey Haas'; daniel.migault@ericsson.com; 'Joel Halpern';
> >> shares@ndzh.com; 'Alia Atlas'
> >> *Subject:* [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG
> >> adoption call (8/17 to 8/31)
> >>
> >> This begins a 2 week WG adoption call for
> >> draft-mglt-i2rs-security-requirements.  This draft discusses the
> >> security requirements for the I2RS environment.  You can find the draf=
t
> at:
> >>
> >> https://tools.ietf.org/html/draft-mglt-i2rs-security-environment-reqs
> >> -
> >> 00
> >>
> >> A security reviewer will review this draft during the time 8/20 to
> >> 8/25.   We will post the security directorate review to this discussio=
n.
> >>
> >> Sue Hares
> >>
> >
>
> _______________________________________________
> i2rs mailing list
> i2rs@ietf.org
> https://www.ietf.org/mailman/listinfo/i2rs
>
>
> _______________________________________________
> i2rs mailing list
> i2rs@ietf.org
> https://www.ietf.org/mailman/listinfo/i2rs
>
>

--089e0122af2a911d32051e126c51
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Hi,<div><br></div><div>I will leave it to the Security ADs=
 to decide whether a non-secure transport</div><div>for I2RS should be stan=
dardized.</div><div><br></div><div>The &quot;lean&quot; I2RS seems to be a =
proprietary controller and agent</div><div>with no multi-headed control sup=
port. This will almost certainly</div><div>mean that the router will not wo=
rk if any &quot;unofficial&quot;</div><div>controller is used instead of th=
e vendor controller.</div><div><div class=3D"gmail_extra"><br></div><div cl=
ass=3D"gmail_extra">If this really is the expected usage then why bother wi=
th a standard?</div><div class=3D"gmail_extra"><br></div><div class=3D"gmai=
l_extra"><br></div><div class=3D"gmail_extra">Andy</div><div class=3D"gmail=
_extra"><br><div class=3D"gmail_quote">On Mon, Aug 24, 2015 at 10:37 AM, Li=
nda Dunbar <span dir=3D"ltr">&lt;<a href=3D"mailto:linda.dunbar@huawei.com"=
 target=3D"_blank">linda.dunbar@huawei.com</a>&gt;</span> wrote:<br><blockq=
uote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc =
solid;padding-left:1ex">






<div>
<font face=3D"Calibri" size=3D"2"><span style=3D"font-size:11pt">
<div><font color=3D"#1F497D">Joel, </font></div>
<div><font color=3D"#1F497D">=C2=A0</font></div>
<div><font color=3D"#1F497D">Agree with you that =E2=80=9C<font color=3D"bl=
ack">we </font><font color=3D"black">don=E2=80=99t</font><font color=3D"bla=
ck"> need to</font><font color=3D"black"> build different protocol stacks f=
or the different deployments</font><font color=3D"black">=E2=80=9D</font><f=
ont color=3D"black">.
</font></font></div>
<div><font color=3D"#1F497D">But the =E2=80=9Cenvironment-req=E2=80=9D draf=
t is not about =E2=80=9CProtocol=E2=80=9D, but about security issues under =
different =E2=80=9Cenvironment=E2=80=9D. </font></div>
<div><font color=3D"#1F497D">=C2=A0</font></div>
<div><font color=3D"#1F497D">Among all our customers who are interested in =
I2RS, majority of them (&gt;90%) will deploy them in a closed environment, =
i.e. physically secured=C2=A0 connection between I2RS agent and I2RS client=
. Therefore, it is important to =E2=80=9C<font face=3D"Courier" size=3D"2" =
color=3D"black"><span style=3D"font-size:10pt">provides
an analysis of the security</span></font><font face=3D"Courier" size=3D"2" =
color=3D"black"><span style=3D"font-size:10pt"> </span></font><font face=3D=
"Courier" size=3D"2" color=3D"black"><span style=3D"font-size:10pt">issues =
of=E2=80=9D</span></font><font face=3D"Courier" size=3D"2" color=3D"black">=
<span style=3D"font-size:10pt">
</span></font>of this commonly deployed environment. </font></div>
<div><font face=3D"Times New Roman" color=3D"#1F497D">=C2=A0</font></div>
<div><font color=3D"#1F497D">I suggest adding this Figure to Section 1 of t=
he document:</font></div>
<div><font color=3D"#1F497D">=C2=A0</font></div>
<div><font face=3D"Courier New" size=3D"2" color=3D"#1F497D"><span style=3D=
"font-size:10pt"> Closed=C2=A0 (over open Chnl ###&gt;)=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0  Open (over secure Chnl ---&gt;)</span=
></font></div>
<div><font face=3D"Courier New" size=3D"2" color=3D"#1F497D"><span style=3D=
"font-size:10pt"> +---------------------------------+</span></font></div>
<div><font face=3D"Courier New" size=3D"2" color=3D"#1F497D"><span style=3D=
"font-size:10pt"> |=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0  ***********************=
=C2=A0=C2=A0 |=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 ***********************=C2=A0 =
|</span></font></div>
<div><font face=3D"Courier New" size=3D"2" color=3D"#1F497D"><span style=3D=
"font-size:10pt"> |=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 *=C2=A0=C2=A0=C2=A0=
 Application A=C2=A0=C2=A0=C2=A0 *=C2=A0=C2=A0 |=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0 *=C2=A0=C2=A0=C2=A0 Application B=C2=A0=C2=A0=C2=A0 *=C2=A0 |</span></f=
ont></div>
<div><font face=3D"Courier New" size=3D"2" color=3D"#1F497D"><span style=3D=
"font-size:10pt"> |=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 *=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0 *=C2=A0=C2=A0 |=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 *=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 *=C2=A0 |</span></font></div>
<div><font face=3D"Courier New" size=3D"2" color=3D"#1F497D"><span style=3D=
"font-size:10pt"> |=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 *=C2=A0 +----------=
------+ *=C2=A0=C2=A0 |=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 *=C2=A0 +------------=
----+ *=C2=A0 |</span></font></div>
<div><font face=3D"Courier New" size=3D"2" color=3D"#1F497D"><span style=3D=
"font-size:10pt"> |=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 *=C2=A0 |=C2=A0=C2=
=A0 Client A=C2=A0=C2=A0=C2=A0=C2=A0 | *=C2=A0=C2=A0 |=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0 *=C2=A0 |=C2=A0=C2=A0 Client B=C2=A0=C2=A0=C2=A0=C2=A0 | *=C2=A0 =
|</span></font></div>
<div><font face=3D"Courier New" size=3D"2" color=3D"#1F497D"><span style=3D=
"font-size:10pt"> |=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 *=C2=A0 +----------=
------+ *=C2=A0=C2=A0 |=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 *=C2=A0 +------------=
----+ *=C2=A0 |</span></font></div>
<div><font face=3D"Courier New" size=3D"2" color=3D"#1F497D"><span style=3D=
"font-size:10pt"> |=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 ******* ^ *********=
****=C2=A0=C2=A0 |=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 ***** ^ ****** ^ ******=C2=
=A0 |</span></font></div>
<div><font face=3D"Courier New" size=3D"2" color=3D"#1F497D"><span style=3D=
"font-size:10pt"> |=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 #=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 |=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 |=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0 |=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 |</spa=
n></font></div>
<div><font face=3D"Courier New" size=3D"2" color=3D"#1F497D"><span style=3D=
"font-size:10pt"> |=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 #=C2=A0=C2=A0 =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 |=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 |=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0 |=C2=A0=C2=A0 |-----|</span></font></div>
<div><font face=3D"Courier New" size=3D"2" color=3D"#1F497D"><span style=3D=
"font-size:10pt"> |=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 #=C2=A0=C2=A0  =C2=A0=C2=A0  =C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 |=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0 |=C2=A0=C2=A0 |</span></font></div>
<div><font face=3D"Courier New" size=3D"2" color=3D"#1F497D"><span style=3D=
"font-size:10pt"> |=C2=A0 ************ v * * * * ********|=C2=A0=C2=A0 ****=
************* v * v ********</span></font></div>
<div><font face=3D"Courier New" size=3D"2" color=3D"#1F497D"><span style=3D=
"font-size:10pt"> |=C2=A0 *=C2=A0 +---------------------+=C2=A0=C2=A0=C2=A0=
=C2=A0 |=C2=A0=C2=A0 *=C2=A0 +---------------------+=C2=A0=C2=A0=C2=A0=C2=
=A0 *</span></font></div>
<div><font face=3D"Courier New" size=3D"2" color=3D"#1F497D"><span style=3D=
"font-size:10pt"> |=C2=A0 *=C2=A0 |=C2=A0=C2=A0=C2=A0=C2=A0 Agent 1=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 |=C2=A0=C2=A0=C2=A0=C2=A0 |=C2=
=A0=C2=A0 *=C2=A0 |=C2=A0=C2=A0=C2=A0 Agent 2=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0 |=C2=A0=C2=A0=C2=A0=C2=A0 *</span></font></div>
<div><font face=3D"Courier New" size=3D"2" color=3D"#1F497D"><span style=3D=
"font-size:10pt"> |=C2=A0 *=C2=A0 +---------------------+=C2=A0=C2=A0=C2=A0=
=C2=A0 |=C2=A0=C2=A0 *=C2=A0 +---------------------+=C2=A0=C2=A0=C2=A0=C2=
=A0 *</span></font></div>
<div><font face=3D"Courier New" size=3D"2" color=3D"#1F497D"><span style=3D=
"font-size:10pt"> |=C2=A0 *=C2=A0=C2=A0=C2=A0=C2=A0 ^=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0 ^=C2=A0 ^=C2=A0=C2=A0 ^=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0 |=C2=A0=C2=A0 *=C2=A0=C2=A0=C2=A0=C2=A0 ^=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0 ^=C2=A0 ^=C2=A0=C2=A0 ^=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0 *</span></font></div>
<div><font face=3D"Times New Roman" color=3D"#1F497D">=C2=A0</font></div>
<div><font face=3D"Times New Roman" color=3D"#1F497D">=C2=A0</font></div>
<div><font face=3D"Times New Roman" color=3D"#1F497D">=C2=A0</font></div>
<div><font color=3D"#1F497D">Just think about this fact: today=E2=80=99s ro=
uter configuration in production environment can only be performed by a few=
 authorized people with EMS/NMS physically and securely separated.  If the =
majority  of the I2RS environment requirement
is about open connection, I2RS WG will spend a lot energy developing the ve=
ry sophisticated protocols which is expensive to develop and harder to depl=
oy. </font></div>
<div><font face=3D"Times New Roman" color=3D"#1F497D">=C2=A0</font></div>
<div><font color=3D"#1F497D">I am not against this development, but IMHO,  =
to gain wider and quicker I2RS deployment in production environment, it is =
necessary to have a very <font color=3D"red"><b><u>lean</u></b></font> I2RS=
 solution first, and to have a well
documented security requirement for the common deployment environment. E.g.=
 a single Controller (or the I2RS client) directly connected to their devic=
es via their internal network, where the connection is physically isolated =
from other network and protected
by separate mechanisms.  Also remember, many operators will use I2RS to con=
trol a small number of selective routers (mostly routers at ingress/egress =
boundary) for value added services.  </font></div>
<div><font face=3D"Times New Roman" color=3D"#1F497D">=C2=A0</font></div>
<div><font face=3D"Times New Roman" color=3D"#1F497D">=C2=A0</font></div>
<div><font face=3D"Times New Roman" color=3D"#1F497D">=C2=A0</font></div>
<div><font color=3D"#1F497D">Some of my  detailed questions and comments to=
 the =E2=80=9Csecurity-requirements=E2=80=9D are still applicable to the =
=E2=80=9Cenvironment-req=E2=80=9D document because they have the same text.=
 Plus a few more for the =E2=80=9Cenvironment-req=E2=80=9D document. Hope t=
he authors
can address them. </font></div>
<div><font face=3D"Times New Roman" color=3D"#1F497D">=C2=A0</font></div>
<div><font face=3D"Times New Roman" color=3D"#1F497D">=C2=A0</font></div>
<div><font color=3D"#1F497D">Section 3: </font></div>
<div style=3D"padding-left:36pt"><font face=3D"Times New Roman" color=3D"#1=
F497D">=C2=A0</font></div>
<div style=3D"padding-left:36pt"><font color=3D"#1F497D">What are the key d=
ifferences with regard to the security requirements for =C2=A0I2RS plane an=
d for management plane?=C2=A0 Section 3.1 describes the interaction between=
 I2RS plane and management plane. But I see the
security requirement for the management plane are all applicable to the sec=
urity requirement to I2RS plane . If you think that they are very different=
, can you elaborate more? </font></div>
<div><font face=3D"Times New Roman" color=3D"#1F497D">=C2=A0</font></div>
<div><font color=3D"#1F497D">Section 3.4 has title =E2=80=9CRecommendations=
=E2=80=9D, but the content are all requirements. Why not name the section =
=E2=80=9CRequirement=E2=80=9D? </font></div>
<div><font color=3D"#1F497D">=C2=A0</font></div>
<div><font color=3D"#1F497D">REQ 2: Does it that a different IP address tha=
n the one used by the management system?</font></div>
<div><font color=3D"#1F497D">=C2=A0</font></div>
<div><font color=3D"#1F497D">REQ 21: is more about I2RS requirement, less a=
bout =E2=80=9CSecurity=E2=80=9D requirement. </font></div>
<div><font color=3D"#1F497D">=C2=A0</font></div>
<div><font color=3D"#1F497D">REQ 24: isn=E2=80=99t it the general goal of I=
2RS? Not really security per se. (should be included in the general I2RS re=
quirement or architecture). </font></div>
<div><font color=3D"#1F497D">=C2=A0</font></div>
<div><font face=3D"Times New Roman" color=3D"#1F497D">=C2=A0</font></div>
<div><font color=3D"#1F497D">REQ 26: simply controlling the resource can ha=
rdly prevent DoS. Malicious client can occupy the resource while the valid =
one can&#39;t access.</font></div>
<div><font color=3D"#1F497D">=C2=A0</font></div>
<div><font color=3D"#1F497D">Thanks for your consideration, </font></div>
<div><font color=3D"#1F497D">Linda</font></div>
<div><font face=3D"Times New Roman" size=3D"2"><span style=3D"font-size:10.=
5pt">=C2=A0</span></font></div>
<div><font face=3D"Times New Roman" size=3D"2"><span style=3D"font-size:10.=
5pt">=C2=A0</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">--=
---Original Message-----<br>

From: i2rs [<a href=3D"mailto:i2rs-bounces@ietf.org" target=3D"_blank">mail=
to:i2rs-bounces@ietf.org</a>] On Behalf Of Joel M. Halpern<br>

Sent: Friday, August 21, 2015 12:20 PM<br>

To: Linda Dunbar; <a href=3D"mailto:i2rs@ietf.org" target=3D"_blank">i2rs@i=
etf.org</a><br>

Cc: &#39;Jeffrey Haas&#39;; <a href=3D"mailto:daniel.migault@ericsson.com" =
target=3D"_blank">daniel.migault@ericsson.com</a>; &#39;Alia Atlas&#39;<br>

Subject: Re: [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG adop=
tion call (8/17 to 8/31)</span></font></div>
<div><font face=3D"Times New Roman" size=3D"2"><span style=3D"font-size:10.=
5pt">=C2=A0</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">Ye=
s, one of the two last calls is for the environment document.</span></font>=
</div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">=
=C2=A0</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">Ha=
ving a dedicated physical channel is one of the ways identified in the draf=
t to provide the required isolation.</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">=
=C2=A0</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">Wh=
ile such an environment is clearly supportable, I do not think we should re=
duce the internal protocol requirements (such as MTI security for the contr=
ol channel) just because there are circumstances
where such it won&#39;t be needed.=C2=A0 I don&#39;t expect that we will bu=
ild different protocol stacks for the different deployments.</span></font><=
/div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">=
=C2=A0</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">Th=
e purpose of this draft is to describe the environmental assumptions, which=
 assumptions can be met in various ways.</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">=
=C2=A0</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">Yo=
urs,</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">Jo=
el</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">=
=C2=A0</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">On=
 8/21/15 12:56 PM, Linda Dunbar wrote:</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t; Joel,</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t; If it is the &quot;environmental one&quot;, it is more important to diff=
erentiate the requirements for different environments on how the I2RS clien=
t &amp; Agent are connected.</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t; One of our customers stated that their environment has a single Controll=
er (or the I2RS client) directly connected to their devices via their inter=
nal network, where the connection is physically
isolated from other network and protected by separate mechanisms, they don&=
#39;t need all those sophisticated authentication procedure.</span></font><=
/div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t; We need to address this environment, i.e. having a simpler security requ=
irement for this environment than the environment where I2RS Client is conn=
ected via public network.</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t; Linda</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t; -----Original Message-----</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t; From: Joel Halpern Direct [<a href=3D"mailto:jmh.direct@joelhalpern.com"=
 target=3D"_blank">mailto:jmh.direct@joelhalpern.com</a>]</span></font></di=
v>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t; Sent: Friday, August 21, 2015 10:53 AM</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t; To: Linda Dunbar; <a href=3D"mailto:i2rs@ietf.org" target=3D"_blank">i2r=
s@ietf.org</a></span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t; Cc: &#39;Jeffrey Haas&#39;; <a href=3D"mailto:daniel.migault@ericsson.co=
m" target=3D"_blank">daniel.migault@ericsson.com</a>; &#39;Joel Halpern&#39=
;; &#39;Alia Atlas&#39;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t; Subject: Re: [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG <=
/span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t; adoption call (8/17 to 8/31)</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t; First, there may be some confusion because the announcement.=C2=A0 I pre=
sume that you are talking about the -environments documents.</span></font><=
/div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t; If the WG concludes that a different chapter structure is useful, we can=
 of course change it.=C2=A0 Given that the goal is environment description,=
 I am not sure your proposed structure is significantly
better than the existing one.</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t; I believe your comment about the text=C2=A0 reading &quot;where security=
 functions may be hosted&quot; is well taken, and we should remove that tex=
t when we next revise the document.</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t; The isolation text is about the need to keep things separate, and the va=
rious possible means are degrees / approaches to separation.</span></font><=
/div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t; Isolation is not about treating things differently, nor is it explicitly=
 about using different protocols.=C2=A0 So the point of isolation is not th=
at there are different security requirements,
but that in order to avoid corss-effects, things should be kept separate.</=
span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t; Yours,</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t; Joel</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t; On 8/20/15 6:42 PM, Linda Dunbar wrote:</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; I support the WG adoption because I think the I2RS WG needs it.</spa=
n></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; However, I hope the authors can consider/address the following sugge=
stions/comments:</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; When you think about the I2RS security,=C2=A0 there are following </=
span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; different</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; aspects:</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; -Communication channel between I2RS client and Agent (and the channe=
l </span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; between I2RS client and applications):</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; The channel can be</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; oVia physical Private network (e.g. within a secured direct connect =
</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; within one site),</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; owithin one administrative domain,=C2=A0 via virtual private network=
</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; oSecured connection, such as TLS or IPSec</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; oPublic internet</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; o..</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; -Authentication &amp; Authorization</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; othe authentication &amp; authorization requirement for different </=
span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; communication channels can be different. Therefore, should have </sp=
an></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; separate sections to address specific requirement=C2=A0 for each </s=
pan></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; communication channels between I2RS agent &lt;-&gt; clients (and cli=
ent &lt;-&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; applications)</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; The current Section 4 of the draft already has very good description=
 </span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; on the subject. I think 4.4.1 and 4.42 can be separated out of the s=
ection.</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; -Encryption for the actual content between Client and Agent</span></=
font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; -DoS Design requirement (currently in Section 5.2.1)</span></font></=
div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; -Management of conflict with other plane (e.g. the management plane,=
 </span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; multi-headed control, which has been discussed extensively in </span=
></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; ephemeral</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; draft)</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; I think the draft should be organized from the aspects of the </span=
></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; security to I2RS as suggested above.</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; Here are some detailed questions and comments to the requirements </=
span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; listed in the document:</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; Section 1:</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; The second paragraph stated the security recommendations must </span=
></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; &quot;specifying where security functions may be hosted&quot;. First=
 of all I</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; don&#39;t see the draft address this aspect. Second, I think=C2=A0=
=C2=A0 &quot;where</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; security functions are hosted&quot; is orthogonal to &quot;I2RS secu=
rity&quot; .</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; Section 3:</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; what does isolating two planes mean? does it mean they have differen=
t </span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; security requirement/issues? Or does it mean they need different pro=
tocols?</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; What are the key differences with regard to the security requirement=
s </span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; for=C2=A0 I2RS plane and for management plane?=C2=A0 Section 3.1 des=
cribes the </span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; interaction between I2RS plane and management plane. But I see the <=
/span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; security requirement for the management plane is similar to I2RS pla=
ne .</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; If you think that they are very different, can you elaborate more?</=
span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; Section 3.4 has title &quot;Recommendations&quot;, but the content a=
re all </span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; requirements. Why not name the section &quot;Requirement&quot;?</spa=
n></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; REQ 2: Does it that a different IP address than the one used by the =
</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; management system?</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; How is REQ 22 different from REQ 21?</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; REQ 27 is hard to enforce. How about say something like &quot;should=
n&#39;t </span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; send any information beyond what have been defined by the I2RS data =
model&quot;?</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; REQ 30: simply controlling the resource can hardly prevent DoS.</spa=
n></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; Malicious client can occupy the resource while the valid one can&#39=
;t access.</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; Thanks for consideration,</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; Linda</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; *From:*i2rs [<a href=3D"mailto:i2rs-bounces@ietf.org" target=3D"_bla=
nk">mailto:i2rs-bounces@ietf.org</a>] *On Behalf Of *Susan Hares</span></fo=
nt></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; *Sent:* Monday, August 17, 2015 12:50 PM</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; *To:* <a href=3D"mailto:i2rs@ietf.org" target=3D"_blank">i2rs@ietf.o=
rg</a></span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; *Cc:* &#39;Jeffrey Haas&#39;; <a href=3D"mailto:daniel.migault@erics=
son.com" target=3D"_blank">daniel.migault@ericsson.com</a>; &#39;Joel Halpe=
rn&#39;; </span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; <a href=3D"mailto:shares@ndzh.com" target=3D"_blank">shares@ndzh.com=
</a>; &#39;Alia Atlas&#39;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; *Subject:* [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG=
 </span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; adoption call (8/17 to 8/31)</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; This begins a 2 week WG adoption call for </span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; draft-mglt-i2rs-security-requirements.=C2=A0 This draft discusses th=
e </span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; security requirements for the I2RS environment.=C2=A0 You can find t=
he draft at:</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; <a href=3D"https://tools.ietf.org/html/draft-mglt-i2rs-security-envi=
ronment-reqs" target=3D"_blank">https://tools.ietf.org/html/draft-mglt-i2rs=
-security-environment-reqs</a></span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; -</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; 00</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; A security reviewer will review this draft during the time 8/20 to</=
span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; 8/25.=C2=A0=C2=A0 We will post the security directorate review to th=
is discussion.</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt; Sue Hares</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;&gt;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">&g=
t;</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">=
=C2=A0</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">__=
_____________________________________________</span></font></div>
<div><font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt">i2=
rs mailing list</span></font></div>
<div><font face=3D"Times New Roman" size=3D"2"><span style=3D"font-size:10.=
5pt"><a href=3D"mailto:i2rs@ietf.org" target=3D"_blank"><font face=3D"Conso=
las">i2rs@ietf.org</font></a></span></font></div>
<div><font face=3D"Times New Roman" size=3D"2"><span style=3D"font-size:10.=
5pt"><a href=3D"https://www.ietf.org/mailman/listinfo/i2rs" target=3D"_blan=
k"><font face=3D"Consolas">https://www.ietf.org/mailman/listinfo/i2rs</font=
></a></span></font></div>
<div><font face=3D"Times New Roman" size=3D"2"><span style=3D"font-size:10.=
5pt">=C2=A0</span></font></div>
</span></font>
</div>

<br>_______________________________________________<br>
i2rs mailing list<br>
<a href=3D"mailto:i2rs@ietf.org">i2rs@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/i2rs" rel=3D"noreferrer" t=
arget=3D"_blank">https://www.ietf.org/mailman/listinfo/i2rs</a><br>
<br></blockquote></div><br></div></div></div>

--089e0122af2a911d32051e126c51--


From nobody Mon Aug 24 15:09:24 2015
Return-Path: <linda.dunbar@huawei.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5C7C71A9151 for <i2rs@ietfa.amsl.com>; Mon, 24 Aug 2015 15:09:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.21
X-Spam-Level: 
X-Spam-Status: No, score=-4.21 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Rt578D1OMhkr for <i2rs@ietfa.amsl.com>; Mon, 24 Aug 2015 15:09:17 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E220F1ACC8C for <i2rs@ietf.org>; Mon, 24 Aug 2015 15:09:15 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml402-hub.china.huawei.com) ([172.18.7.190]) by lhrrg01-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CAJ18722; Mon, 24 Aug 2015 22:09:13 +0000 (GMT)
Received: from DFWEML702-CHM.china.huawei.com (10.193.5.72) by lhreml402-hub.china.huawei.com (10.201.5.241) with Microsoft SMTP Server (TLS) id 14.3.235.1; Mon, 24 Aug 2015 23:09:12 +0100
Received: from DFWEML701-CHM.china.huawei.com ([10.193.5.50]) by dfweml702-chm ([10.193.5.72]) with mapi id 14.03.0235.001; Mon, 24 Aug 2015 15:09:08 -0700
From: Linda Dunbar <linda.dunbar@huawei.com>
To: Daniel Migault <daniel.migault@ericsson.com>
Thread-Topic: Suggested section/text to be added  to draft-mglt-i2rs-security-environment-reqs-00 to address security threats in Closed Envionment.
Thread-Index: AQHQ3pX/GdxJqOcIRUi5ANb5HmY8FZ4bs7/w
Date: Mon, 24 Aug 2015 22:09:07 +0000
Message-ID: <4A95BA014132FF49AE685FAB4B9F17F657D1757E@dfweml701-chm>
References: <CADZyTknZ4ZzrxTB_Miud=-xMfckmD4LR7vdz+3uAg9gL7X22-g@mail.gmail.com>
In-Reply-To: <CADZyTknZ4ZzrxTB_Miud=-xMfckmD4LR7vdz+3uAg9gL7X22-g@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
x-originating-ip: [10.192.11.236]
Content-Type: multipart/mixed; boundary="_004_4A95BA014132FF49AE685FAB4B9F17F657D1757Edfweml701chm_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/_qUs_QK3JUAlkKLpK6ypthadIio>
Cc: Jeffrey Haas <jhaas@pfrc.org>, "i2rs@ietf.org" <i2rs@ietf.org>, "Joel M. Halpern" <jmh@joelhalpern.com>, Alia Atlas <akatlas@gmail.com>
Subject: [i2rs] Suggested section/text to be added to draft-mglt-i2rs-security-environment-reqs-00 to address security threats in Closed Envionment.
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Aug 2015 22:09:23 -0000

--_004_4A95BA014132FF49AE685FAB4B9F17F657D1757Edfweml701chm_
Content-Type: multipart/alternative;
	boundary="_000_4A95BA014132FF49AE685FAB4B9F17F657D1757Edfweml701chm_"

--_000_4A95BA014132FF49AE685FAB4B9F17F657D1757Edfweml701chm_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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=

--_000_4A95BA014132FF49AE685FAB4B9F17F657D1757Edfweml701chm_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64

PGh0bWwgeG1sbnM6dj0idXJuOnNjaGVtYXMtbWljcm9zb2Z0LWNvbTp2bWwiIHhtbG5zOm89InVy
bjpzY2hlbWFzLW1pY3Jvc29mdC1jb206b2ZmaWNlOm9mZmljZSIgeG1sbnM6dz0idXJuOnNjaGVt
YXMtbWljcm9zb2Z0LWNvbTpvZmZpY2U6d29yZCIgeG1sbnM6bT0iaHR0cDovL3NjaGVtYXMubWlj
cm9zb2Z0LmNvbS9vZmZpY2UvMjAwNC8xMi9vbW1sIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcv
VFIvUkVDLWh0bWw0MCI+DQo8aGVhZD4NCjxtZXRhIGh0dHAtZXF1aXY9IkNvbnRlbnQtVHlwZSIg
Y29udGVudD0idGV4dC9odG1sOyBjaGFyc2V0PXV0Zi04Ij4NCjxtZXRhIG5hbWU9IkdlbmVyYXRv
ciIgY29udGVudD0iTWljcm9zb2Z0IFdvcmQgMTIgKGZpbHRlcmVkIG1lZGl1bSkiPg0KPHN0eWxl
PjwhLS0NCi8qIEZvbnQgRGVmaW5pdGlvbnMgKi8NCkBmb250LWZhY2UNCgl7Zm9udC1mYW1pbHk6
Q291cmllcjsNCglwYW5vc2UtMToyIDcgNCA5IDIgMiA1IDIgNCA0O30NCkBmb250LWZhY2UNCgl7
Zm9udC1mYW1pbHk6U2ltU3VuOw0KCXBhbm9zZS0xOjIgMSA2IDAgMyAxIDEgMSAxIDE7fQ0KQGZv
bnQtZmFjZQ0KCXtmb250LWZhbWlseToiQ2FtYnJpYSBNYXRoIjsNCglwYW5vc2UtMToyIDQgNSAz
IDUgNCA2IDMgMiA0O30NCkBmb250LWZhY2UNCgl7Zm9udC1mYW1pbHk6Q2FsaWJyaTsNCglwYW5v
c2UtMToyIDE1IDUgMiAyIDIgNCAzIDIgNDt9DQpAZm9udC1mYWNlDQoJe2ZvbnQtZmFtaWx5OlRh
aG9tYTsNCglwYW5vc2UtMToyIDExIDYgNCAzIDUgNCA0IDIgNDt9DQpAZm9udC1mYWNlDQoJe2Zv
bnQtZmFtaWx5OiJcQFNpbVN1biI7DQoJcGFub3NlLTE6MiAxIDYgMCAzIDEgMSAxIDEgMTt9DQpA
Zm9udC1mYWNlDQoJe2ZvbnQtZmFtaWx5OkNvbnNvbGFzOw0KCXBhbm9zZS0xOjIgMTEgNiA5IDIg
MiA0IDMgMiA0O30NCi8qIFN0eWxlIERlZmluaXRpb25zICovDQpwLk1zb05vcm1hbCwgbGkuTXNv
Tm9ybWFsLCBkaXYuTXNvTm9ybWFsDQoJe21hcmdpbjowaW47DQoJbWFyZ2luLWJvdHRvbTouMDAw
MXB0Ow0KCWZvbnQtc2l6ZToxMi4wcHQ7DQoJZm9udC1mYW1pbHk6IlRpbWVzIE5ldyBSb21hbiIs
InNlcmlmIjt9DQphOmxpbmssIHNwYW4uTXNvSHlwZXJsaW5rDQoJe21zby1zdHlsZS1wcmlvcml0
eTo5OTsNCgljb2xvcjpibHVlOw0KCXRleHQtZGVjb3JhdGlvbjp1bmRlcmxpbmU7fQ0KYTp2aXNp
dGVkLCBzcGFuLk1zb0h5cGVybGlua0ZvbGxvd2VkDQoJe21zby1zdHlsZS1wcmlvcml0eTo5OTsN
Cgljb2xvcjpwdXJwbGU7DQoJdGV4dC1kZWNvcmF0aW9uOnVuZGVybGluZTt9DQpwLk1zb0FjZXRh
dGUsIGxpLk1zb0FjZXRhdGUsIGRpdi5Nc29BY2V0YXRlDQoJe21zby1zdHlsZS1wcmlvcml0eTo5
OTsNCgltc28tc3R5bGUtbGluazoiQmFsbG9vbiBUZXh0IENoYXIiOw0KCW1hcmdpbjowaW47DQoJ
bWFyZ2luLWJvdHRvbTouMDAwMXB0Ow0KCWZvbnQtc2l6ZTo4LjBwdDsNCglmb250LWZhbWlseToi
VGFob21hIiwic2Fucy1zZXJpZiI7fQ0Kc3Bhbi5FbWFpbFN0eWxlMTcNCgl7bXNvLXN0eWxlLXR5
cGU6cGVyc29uYWwtcmVwbHk7DQoJZm9udC1mYW1pbHk6IkNhbGlicmkiLCJzYW5zLXNlcmlmIjsN
Cgljb2xvcjojMUY0OTdEO30NCnNwYW4uQmFsbG9vblRleHRDaGFyDQoJe21zby1zdHlsZS1uYW1l
OiJCYWxsb29uIFRleHQgQ2hhciI7DQoJbXNvLXN0eWxlLXByaW9yaXR5Ojk5Ow0KCW1zby1zdHls
ZS1saW5rOiJCYWxsb29uIFRleHQiOw0KCWZvbnQtZmFtaWx5OiJUYWhvbWEiLCJzYW5zLXNlcmlm
Ijt9DQouTXNvQ2hwRGVmYXVsdA0KCXttc28tc3R5bGUtdHlwZTpleHBvcnQtb25seTt9DQpAcGFn
ZSBXb3JkU2VjdGlvbjENCgl7c2l6ZTo4LjVpbiAxMS4waW47DQoJbWFyZ2luOjEuMGluIDEuMGlu
IDEuMGluIDEuMGluO30NCmRpdi5Xb3JkU2VjdGlvbjENCgl7cGFnZTpXb3JkU2VjdGlvbjE7fQ0K
LS0+PC9zdHlsZT48IS0tW2lmIGd0ZSBtc28gOV0+PHhtbD4NCjxvOnNoYXBlZGVmYXVsdHMgdjpl
eHQ9ImVkaXQiIHNwaWRtYXg9IjEwMjYiIC8+DQo8L3htbD48IVtlbmRpZl0tLT48IS0tW2lmIGd0
ZSBtc28gOV0+PHhtbD4NCjxvOnNoYXBlbGF5b3V0IHY6ZXh0PSJlZGl0Ij4NCjxvOmlkbWFwIHY6
ZXh0PSJlZGl0IiBkYXRhPSIxIiAvPg0KPC9vOnNoYXBlbGF5b3V0PjwveG1sPjwhW2VuZGlmXS0t
Pg0KPC9oZWFkPg0KPGJvZHkgbGFuZz0iRU4tVVMiIGxpbms9ImJsdWUiIHZsaW5rPSJwdXJwbGUi
Pg0KPGRpdiBjbGFzcz0iV29yZFNlY3Rpb24xIj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFu
IHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDss
JnF1b3Q7c2Fucy1zZXJpZiZxdW90Oztjb2xvcjojMUY0OTdEIj5EYW5pZWwsDQo8bzpwPjwvbzpw
Pjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXpl
OjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYm
cXVvdDs7Y29sb3I6IzFGNDk3RCI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPg0KPHAgY2xh
c3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6
JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7O2NvbG9yOiMxRjQ5N0Qi
PlRoYW5rIHlvdSBmb3Igd2lsbGluZyB0byBhZGRyZXNzIG15IGNvbW1lbnRzLiBUbyBtYWtlIGl0
IGVhc2llciBmb3IgeW91LCBJIHB1dCB0b2dldGhlciBhIHNlY3Rpb24gdG8gZGVzY3JpYmUgdGhl
IHNlY3VyaXR5IHRocmVhdHMgaW4gQ2xvc2VkIEVudmlyb25tZW50IGFuZA0KIG5lY2Vzc2FyeSBy
ZXF1aXJlbWVudCBmb3IgSTJSUy4gU2VlIHRoZSBhdHRhY2hlZC4gPG86cD48L286cD48L3NwYW4+
PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7
Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7O2Nv
bG9yOiMxRjQ5N0QiPjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29O
b3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0Nh
bGlicmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90Oztjb2xvcjojMUY0OTdEIj5DbG9zZWQg
ZW52aXJvbm1lbnQgZGVwbG95bWVudCBjYW4gZWFzaWx5IGdpdmUgcGVvcGxlIGEgc2Vuc2Ugb2Yg
c2VjdXJlIGJlY2F1c2UgdGhlIGxpbmtzIGJldHdlZW4gSTJSUyBDbGllbnQgYW5kIEkyUlMgQWdl
bnQgYXJlIGd1aWRlZCBieSBhIHBoeXNpY2FsIOKAnFdhbGzigJ0uDQogJm5ic3A7VGhlIGZhbHNl
IHNlbnNlIG9mIOKAnFNlY3VyZeKAnSBpcyBhY3R1YWxseSBtb3JlIGRhbmdlcm91cyBiZWNhdXNl
IGl0IGNhbiBlYXNpbHkgbWFrZSB0aGUgZGVwbG95bWVudCBtaXNzIHRoZSBjcnVjaWFsIHNlY3Vy
aXR5IHByb2NlZHVyZS4NCjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3Jt
YWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGli
cmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90Oztjb2xvcjojMUY0OTdEIj48bzpwPiZuYnNw
OzwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9u
dC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMt
c2VyaWYmcXVvdDs7Y29sb3I6IzFGNDk3RCI+VGhlcmVmb3JlLCBJIHRoaW5rIGl0IGlzIGltcG9y
dGFudCB0byBoYXZlIGEgZGVkaWNhdGVkIHNlY3Rpb24gb24gc2VjdXJpdHkgdGhyZWF0cyBhbmQg
cmVxdWlyZW1lbnQgZm9yIHRoZSBDbG9zZWQgRW52aXJvbm1lbnQuDQo8bzpwPjwvbzpwPjwvc3Bh
bj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBw
dDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDs7
Y29sb3I6IzFGNDk3RCI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1z
b05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7
Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7O2NvbG9yOiMxRjQ5N0QiPkxpbmRh
PG86cD48L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9
ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtz
YW5zLXNlcmlmJnF1b3Q7O2NvbG9yOiMxRjQ5N0QiPjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwv
cD4NCjxkaXYgc3R5bGU9ImJvcmRlcjpub25lO2JvcmRlci10b3A6c29saWQgI0I1QzRERiAxLjBw
dDtwYWRkaW5nOjMuMHB0IDBpbiAwaW4gMGluIj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxiPjxz
cGFuIHN0eWxlPSJmb250LXNpemU6MTAuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O1RhaG9tYSZxdW90
OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij5Gcm9tOjwvc3Bhbj48L2I+PHNwYW4gc3R5bGU9ImZv
bnQtc2l6ZToxMC4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7VGFob21hJnF1b3Q7LCZxdW90O3NhbnMt
c2VyaWYmcXVvdDsiPiBtZ2x0LmlldGZAZ21haWwuY29tIFttYWlsdG86bWdsdC5pZXRmQGdtYWls
LmNvbV0NCjxiPk9uIEJlaGFsZiBPZiA8L2I+RGFuaWVsIE1pZ2F1bHQ8YnI+DQo8Yj5TZW50Ojwv
Yj4gTW9uZGF5LCBBdWd1c3QgMjQsIDIwMTUgMTI6NTUgUE08YnI+DQo8Yj5Ubzo8L2I+IExpbmRh
IER1bmJhcjxicj4NCjxiPkNjOjwvYj4gSm9lbCBNLiBIYWxwZXJuOyBpMnJzQGlldGYub3JnOyBK
ZWZmcmV5IEhhYXM7IEFsaWEgQXRsYXM8YnI+DQo8Yj5TdWJqZWN0OjwvYj4gUmU6IFtpMnJzXSBS
ZXZpZXcgY29tbWVudHMgdG8gZHJhZnQtbWdsdC1pMnJzLXNlY3VyaXR5LWVudmlyb25tZW50LXJl
cXMtMDAgKHdhcyBSRTogZHJhZnQtbWdsdC1pMnJzLXNlY3VyaXR5LXJlcXVpcmVtZW50cy0wMCAy
IFdlZWsgV0cgYWRvcHRpb24gY2FsbCAoOC8xNyB0byA4LzMxKTxvOnA+PC9vOnA+PC9zcGFuPjwv
cD4NCjwvZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PG86cD4mbmJzcDs8L286cD48L3A+DQo8
ZGl2Pg0KPGRpdj4NCjxkaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1h
cmdpbi1ib3R0b206MTIuMHB0Ij5IaSBMaW5kYSwgPG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxw
IGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJnaW4tYm90dG9tOjEyLjBwdCI+VGhhbmsgeW91
IGZvciB5b3VyIGNvbW1lbnRzLiBJIGFncmVlIHdlIG5lZWQgdG8gYWRkcmVzcyBtb3JlIHNwZWNp
ZmljYWxseSBvciBleHBsaWNpdGx5IHRoZSAmcXVvdDttb3N0IGNvbW1vbiZxdW90OyB1c2UgY2Fz
ZS4gSSBhZ3JlZSB3aXRoIHlvdXIgY29tbWVudHMgYW5kIHdlIHdpbGwgY29uc2lkZXIgdGhlbSB0
byBpbXByb3ZlIGFuZCBjbGFyaWZ5IHRoZSB0ZXh0IG9mIHRoZQ0KIG5leHQgdmVyc2lvbi4gVGhh
bmsgeW91LiBUbyBtZSB0aGUgaTJycyBwbGFuZSBwcm92aWRlcyBhIGxpbWl0ZWQgbnVtYmVyIG9m
IGZ1bmN0aW9ubmFsaXRpZXMgdGhhdCBtYXkgYmUgcHJvdmlkZWQgdG8gZGlmZmVyZW50IGluZGVw
ZW5kYW50IHRlbmFudHMuJm5ic3A7DQo8bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPHAgY2xhc3M9
Ik1zb05vcm1hbCI+QlIsIDxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8cCBjbGFzcz0iTXNvTm9y
bWFsIj5EYW5pZWw8bzpwPjwvbzpwPjwvcD4NCjxkaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05v
cm1hbCI+Jm5ic3A7PG86cD48L286cD48L3A+DQo8L2Rpdj4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNs
YXNzPSJNc29Ob3JtYWwiPjxvOnA+Jm5ic3A7PC9vOnA+PC9wPg0KPGRpdj4NCjxwIGNsYXNzPSJN
c29Ob3JtYWwiPk9uIE1vbiwgQXVnIDI0LCAyMDE1IGF0IDE6MzcgUE0sIExpbmRhIER1bmJhciAm
bHQ7PGEgaHJlZj0ibWFpbHRvOmxpbmRhLmR1bmJhckBodWF3ZWkuY29tIiB0YXJnZXQ9Il9ibGFu
ayI+bGluZGEuZHVuYmFyQGh1YXdlaS5jb208L2E+Jmd0OyB3cm90ZTo8bzpwPjwvbzpwPjwvcD4N
CjxkaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6
ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlm
JnF1b3Q7O2NvbG9yOiMxRjQ5N0QiPkpvZWwsDQo8L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQtc2l6
ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlm
JnF1b3Q7Ij48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0i
TXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVv
dDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDs7Y29sb3I6IzFGNDk3RCI+Jm5i
c3A7PC9zcGFuPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90
O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90OyI+PG86cD48L286cD48L3NwYW4+
PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZv
bnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5z
LXNlcmlmJnF1b3Q7O2NvbG9yOiMxRjQ5N0QiPkFncmVlIHdpdGggeW91IHRoYXQg4oCcPC9zcGFu
PjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkm
cXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90Oztjb2xvcjpibGFjayI+d2UgZG9u4oCZdCBuZWVk
IHRvIGJ1aWxkIGRpZmZlcmVudCBwcm90b2NvbCBzdGFja3MgZm9yDQogdGhlIGRpZmZlcmVudCBk
ZXBsb3ltZW50c+KAnS4gPC9zcGFuPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQt
ZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90OyI+PG86cD48
L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNw
YW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90
OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7O2NvbG9yOiMxRjQ5N0QiPkJ1dCB0aGUg4oCcZW52aXJv
bm1lbnQtcmVx4oCdIGRyYWZ0IGlzIG5vdCBhYm91dCDigJxQcm90b2NvbOKAnSwgYnV0IGFib3V0
IHNlY3VyaXR5IGlzc3VlcyB1bmRlciBkaWZmZXJlbnQg4oCcZW52aXJvbm1lbnTigJ0uDQo8L3Nw
YW4+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJy
aSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8
L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXpl
OjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYm
cXVvdDs7Y29sb3I6IzFGNDk3RCI+Jm5ic3A7PC9zcGFuPjxzcGFuIHN0eWxlPSJmb250LXNpemU6
MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZx
dW90OyI+PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1z
b05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7
Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7O2NvbG9yOiMxRjQ5N0QiPkFtb25n
IGFsbCBvdXIgY3VzdG9tZXJzIHdobyBhcmUgaW50ZXJlc3RlZCBpbiBJMlJTLCBtYWpvcml0eSBv
ZiB0aGVtICgmZ3Q7OTAlKSB3aWxsIGRlcGxveSB0aGVtIGluIGEgY2xvc2VkIGVudmlyb25tZW50
LCBpLmUuIHBoeXNpY2FsbHkgc2VjdXJlZCZuYnNwOyBjb25uZWN0aW9uIGJldHdlZW4NCiBJMlJT
IGFnZW50IGFuZCBJMlJTIGNsaWVudC4gVGhlcmVmb3JlLCBpdCBpcyBpbXBvcnRhbnQgdG8g4oCc
PC9zcGFuPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTAuMHB0O2ZvbnQtZmFtaWx5OkNvdXJpZXI7
Y29sb3I6YmxhY2siPnByb3ZpZGVzIGFuIGFuYWx5c2lzIG9mIHRoZSBzZWN1cml0eSBpc3N1ZXMg
b2bigJ0NCjwvc3Bhbj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTom
cXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDs7Y29sb3I6IzFGNDk3RCI+
b2YgdGhpcyBjb21tb25seSBkZXBsb3llZCBlbnZpcm9ubWVudC4NCjwvc3Bhbj48c3BhbiBzdHls
ZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90
O3NhbnMtc2VyaWYmcXVvdDsiPjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4N
CjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2NvbG9y
OiMxRjQ5N0QiPiZuYnNwOzwvc3Bhbj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250
LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDsiPjxvOnA+
PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxz
cGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVv
dDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90Oztjb2xvcjojMUY0OTdEIj5JIHN1Z2dlc3QgYWRkaW5n
IHRoaXMgRmlndXJlIHRvIFNlY3Rpb24gMSBvZiB0aGUgZG9jdW1lbnQ6PC9zcGFuPjxzcGFuIHN0
eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1
b3Q7c2Fucy1zZXJpZiZxdW90OyI+PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2
Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9u
dC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7O2NvbG9y
OiMxRjQ5N0QiPiZuYnNwOzwvc3Bhbj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250
LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDsiPjxvOnA+
PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxz
cGFuIHN0eWxlPSJmb250LXNpemU6MTAuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NvdXJpZXIgTmV3
JnF1b3Q7O2NvbG9yOiMxRjQ5N0QiPkNsb3NlZCZuYnNwOyAob3ZlciBvcGVuIENobmwgIyMjJmd0
OykmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsg
T3BlbiAob3ZlciBzZWN1cmUgQ2hubCAtLS0mZ3Q7KTwvc3Bhbj48c3BhbiBzdHlsZT0iZm9udC1z
aXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2Vy
aWYmcXVvdDsiPjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNz
PSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTAuMHB0O2ZvbnQtZmFtaWx5OiZx
dW90O0NvdXJpZXIgTmV3JnF1b3Q7O2NvbG9yOiMxRjQ5N0QiPiYjNDM7LS0tLS0tLS0tLS0tLS0t
LS0tLS0tLS0tLS0tLS0tLS0tJiM0Mzs8L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4w
cHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7
Ij48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9y
bWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjBwdDtmb250LWZhbWlseTomcXVvdDtDb3Vy
aWVyIE5ldyZxdW90Oztjb2xvcjojMUY0OTdEIj58Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5i
c3A7ICoqKioqKioqKioqKioqKioqKioqKioqJm5ic3A7Jm5ic3A7IHwmbmJzcDsmbmJzcDsmbmJz
cDsmbmJzcDsmbmJzcDsgKioqKioqKioqKioqKioqKioqKioqKiombmJzcDsgfDwvc3Bhbj48c3Bh
biBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7
LCZxdW90O3NhbnMtc2VyaWYmcXVvdDsiPjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0K
PGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTAuMHB0
O2ZvbnQtZmFtaWx5OiZxdW90O0NvdXJpZXIgTmV3JnF1b3Q7O2NvbG9yOiMxRjQ5N0QiPnwmbmJz
cDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsgKiZuYnNwOyZuYnNwOyZuYnNwOyBBcHBs
aWNhdGlvbiBBJm5ic3A7Jm5ic3A7Jm5ic3A7ICombmJzcDsmbmJzcDsgfCZuYnNwOyZuYnNwOyZu
YnNwOyZuYnNwOyZuYnNwOyAqJm5ic3A7Jm5ic3A7Jm5ic3A7IEFwcGxpY2F0aW9uIEImbmJzcDsm
bmJzcDsmbmJzcDsgKiZuYnNwOyB8PC9zcGFuPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0
O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90OyI+
PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1h
bCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMC4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q291cmll
ciBOZXcmcXVvdDs7Y29sb3I6IzFGNDk3RCI+fCZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNw
OyZuYnNwOyAqJm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7
Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5i
c3A7Jm5ic3A7Jm5ic3A7ICombmJzcDsmbmJzcDsgfCZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZu
YnNwOyAqJm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5i
c3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7
Jm5ic3A7Jm5ic3A7ICombmJzcDsgfDwvc3Bhbj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBw
dDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDsi
PjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3Jt
YWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTAuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NvdXJp
ZXIgTmV3JnF1b3Q7O2NvbG9yOiMxRjQ5N0QiPnwmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJz
cDsmbmJzcDsgKiZuYnNwOyAmIzQzOy0tLS0tLS0tLS0tLS0tLS0mIzQzOyAqJm5ic3A7Jm5ic3A7
IHwmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsgKiZuYnNwOyAmIzQzOy0tLS0tLS0tLS0t
LS0tLS0mIzQzOyAqJm5ic3A7IHw8L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7
Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij48
bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFs
Ij48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjBwdDtmb250LWZhbWlseTomcXVvdDtDb3VyaWVy
IE5ldyZxdW90Oztjb2xvcjojMUY0OTdEIj58Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7
Jm5ic3A7ICombmJzcDsgfCZuYnNwOyZuYnNwOyBDbGllbnQgQSZuYnNwOyZuYnNwOyZuYnNwOyZu
YnNwOyB8ICombmJzcDsmbmJzcDsgfCZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyAqJm5i
c3A7IHwmbmJzcDsmbmJzcDsgQ2xpZW50IEImbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsgfCAqJm5i
c3A7IHw8L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1
b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij48bzpwPjwvbzpwPjwvc3Bh
bj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0i
Zm9udC1zaXplOjEwLjBwdDtmb250LWZhbWlseTomcXVvdDtDb3VyaWVyIE5ldyZxdW90Oztjb2xv
cjojMUY0OTdEIj58Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7ICombmJzcDsg
JiM0MzstLS0tLS0tLS0tLS0tLS0tJiM0MzsgKiZuYnNwOyZuYnNwOyB8Jm5ic3A7Jm5ic3A7Jm5i
c3A7Jm5ic3A7Jm5ic3A7ICombmJzcDsgJiM0MzstLS0tLS0tLS0tLS0tLS0tJiM0MzsgKiZuYnNw
OyB8PC9zcGFuPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90
O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90OyI+PG86cD48L286cD48L3NwYW4+
PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZv
bnQtc2l6ZToxMC4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q291cmllciBOZXcmcXVvdDs7Y29sb3I6
IzFGNDk3RCI+fCZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyAqKioqKioqIF4g
KioqKioqKioqKioqKiZuYnNwOyZuYnNwOyB8Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7
ICoqKioqIF4gKioqKioqIF4gKioqKioqJm5ic3A7IHw8L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQt
c2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNl
cmlmJnF1b3Q7Ij48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFz
cz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjBwdDtmb250LWZhbWlseTom
cXVvdDtDb3VyaWVyIE5ldyZxdW90Oztjb2xvcjojMUY0OTdEIj58Jm5ic3A7Jm5ic3A7Jm5ic3A7
Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5i
c3A7Jm5ic3A7ICMmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJz
cDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsgfCZuYnNw
OyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZu
YnNwOyB8Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7IHwmbmJzcDsm
bmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsgfDwvc3Bhbj48c3BhbiBz
dHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZx
dW90O3NhbnMtc2VyaWYmcXVvdDsiPjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRp
dj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTAuMHB0O2Zv
bnQtZmFtaWx5OiZxdW90O0NvdXJpZXIgTmV3JnF1b3Q7O2NvbG9yOiMxRjQ5N0QiPnwmbmJzcDsm
bmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJz
cDsmbmJzcDsmbmJzcDsmbmJzcDsgIyZuYnNwOyZuYnNwOyAmbmJzcDsmbmJzcDsmbmJzcDsmbmJz
cDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsg
fCZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZu
YnNwOyZuYnNwOyB8Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7IHwm
bmJzcDsmbmJzcDsgfC0tLS0tfDwvc3Bhbj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtm
b250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDsiPjxv
OnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwi
PjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTAuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NvdXJpZXIg
TmV3JnF1b3Q7O2NvbG9yOiMxRjQ5N0QiPnwmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsm
bmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsgIyZu
YnNwOyZuYnNwOyAmbmJzcDsmbmJzcDsgJm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5i
c3A7Jm5ic3A7Jm5ic3A7IHwmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJz
cDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsm
bmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsgfCZuYnNwOyZuYnNwOyB8PC9zcGFuPjxzcGFuIHN0eWxl
PSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7
c2Fucy1zZXJpZiZxdW90OyI+PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0K
PHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMC4wcHQ7Zm9udC1m
YW1pbHk6JnF1b3Q7Q291cmllciBOZXcmcXVvdDs7Y29sb3I6IzFGNDk3RCI+fCZuYnNwOyAqKioq
KioqKioqKiogdiAqICogKiAqICoqKioqKioqfCZuYnNwOyZuYnNwOyAqKioqKioqKioqKioqKioq
KiB2ICogdiAqKioqKioqKjwvc3Bhbj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250
LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDsiPjxvOnA+
PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxz
cGFuIHN0eWxlPSJmb250LXNpemU6MTAuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NvdXJpZXIgTmV3
JnF1b3Q7O2NvbG9yOiMxRjQ5N0QiPnwmbmJzcDsgKiZuYnNwOyAmIzQzOy0tLS0tLS0tLS0tLS0t
LS0tLS0tLSYjNDM7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7IHwmbmJzcDsmbmJzcDsgKiZuYnNw
OyAmIzQzOy0tLS0tLS0tLS0tLS0tLS0tLS0tLSYjNDM7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7
ICo8L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7
Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij48bzpwPjwvbzpwPjwvc3Bhbj48
L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9u
dC1zaXplOjEwLjBwdDtmb250LWZhbWlseTomcXVvdDtDb3VyaWVyIE5ldyZxdW90Oztjb2xvcjoj
MUY0OTdEIj58Jm5ic3A7ICombmJzcDsgfCZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyBBZ2VudCAx
Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7IHwmbmJzcDsm
bmJzcDsmbmJzcDsmbmJzcDsgfCZuYnNwOyZuYnNwOyAqJm5ic3A7IHwmbmJzcDsmbmJzcDsmbmJz
cDsgQWdlbnQgMiZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNw
OyZuYnNwOyB8Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7ICo8L3NwYW4+PHNwYW4gc3R5bGU9ImZv
bnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5z
LXNlcmlmJnF1b3Q7Ij48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBj
bGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjBwdDtmb250LWZhbWls
eTomcXVvdDtDb3VyaWVyIE5ldyZxdW90Oztjb2xvcjojMUY0OTdEIj58Jm5ic3A7ICombmJzcDsg
JiM0MzstLS0tLS0tLS0tLS0tLS0tLS0tLS0mIzQzOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyB8
Jm5ic3A7Jm5ic3A7ICombmJzcDsgJiM0MzstLS0tLS0tLS0tLS0tLS0tLS0tLS0mIzQzOyZuYnNw
OyZuYnNwOyZuYnNwOyZuYnNwOyAqPC9zcGFuPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0
O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90OyI+
PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1h
bCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMC4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q291cmll
ciBOZXcmcXVvdDs7Y29sb3I6IzFGNDk3RCI+fCZuYnNwOyAqJm5ic3A7Jm5ic3A7Jm5ic3A7Jm5i
c3A7IF4mbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsgXiZuYnNwOyBe
Jm5ic3A7Jm5ic3A7IF4mbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsg
fCZuYnNwOyZuYnNwOyAqJm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7IF4mbmJzcDsmbmJzcDsmbmJz
cDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsgXiZuYnNwOyBeJm5ic3A7Jm5ic3A7IF4mbmJzcDsm
bmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsgKjwvc3Bhbj48c3BhbiBzdHlsZT0i
Zm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3Nh
bnMtc2VyaWYmcXVvdDsiPjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxw
IGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2NvbG9yOiMx
RjQ5N0QiPiZuYnNwOzwvc3Bhbj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZh
bWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDsiPjxvOnA+PC9v
OnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFu
IHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2NvbG9yOiMxRjQ5N0QiPiZuYnNwOzwvc3Bhbj48c3Bh
biBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7
LCZxdW90O3NhbnMtc2VyaWYmcXVvdDsiPjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0K
PGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0
O2NvbG9yOiMxRjQ5N0QiPiZuYnNwOzwvc3Bhbj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBw
dDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDsi
PjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3Jt
YWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGli
cmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90Oztjb2xvcjojMUY0OTdEIj5KdXN0IHRoaW5r
IGFib3V0IHRoaXMgZmFjdDogdG9kYXnigJlzIHJvdXRlciBjb25maWd1cmF0aW9uIGluIHByb2R1
Y3Rpb24gZW52aXJvbm1lbnQgY2FuIG9ubHkgYmUgcGVyZm9ybWVkIGJ5IGEgZmV3IGF1dGhvcml6
ZWQgcGVvcGxlIHdpdGggRU1TL05NUyBwaHlzaWNhbGx5DQogYW5kIHNlY3VyZWx5IHNlcGFyYXRl
ZC4gSWYgdGhlIG1ham9yaXR5IG9mIHRoZSBJMlJTIGVudmlyb25tZW50IHJlcXVpcmVtZW50IGlz
IGFib3V0IG9wZW4gY29ubmVjdGlvbiwgSTJSUyBXRyB3aWxsIHNwZW5kIGEgbG90IGVuZXJneSBk
ZXZlbG9waW5nIHRoZSB2ZXJ5IHNvcGhpc3RpY2F0ZWQgcHJvdG9jb2xzIHdoaWNoIGlzIGV4cGVu
c2l2ZSB0byBkZXZlbG9wIGFuZCBoYXJkZXIgdG8gZGVwbG95Lg0KPC9zcGFuPjxzcGFuIHN0eWxl
PSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7
c2Fucy1zZXJpZiZxdW90OyI+PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0K
PHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Y29sb3I6
IzFGNDk3RCI+Jm5ic3A7PC9zcGFuPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQt
ZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90OyI+PG86cD48
L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNw
YW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90
OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7O2NvbG9yOiMxRjQ5N0QiPkkgYW0gbm90IGFnYWluc3Qg
dGhpcyBkZXZlbG9wbWVudCwgYnV0IElNSE8sIHRvIGdhaW4gd2lkZXIgYW5kIHF1aWNrZXIgSTJS
UyBkZXBsb3ltZW50IGluIHByb2R1Y3Rpb24gZW52aXJvbm1lbnQsIGl0IGlzIG5lY2Vzc2FyeSB0
byBoYXZlIGEgdmVyeQ0KPC9zcGFuPjxiPjx1PjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0
O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90Oztj
b2xvcjpyZWQiPmxlYW48L3NwYW4+PC91PjwvYj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBw
dDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDs7
Y29sb3I6IzFGNDk3RCI+IEkyUlMgc29sdXRpb24gZmlyc3QsIGFuZCB0byBoYXZlIGEgd2VsbCBk
b2N1bWVudGVkIHNlY3VyaXR5IHJlcXVpcmVtZW50DQogZm9yIHRoZSBjb21tb24gZGVwbG95bWVu
dCBlbnZpcm9ubWVudC4gRS5nLiBhIHNpbmdsZSBDb250cm9sbGVyIChvciB0aGUgSTJSUyBjbGll
bnQpIGRpcmVjdGx5IGNvbm5lY3RlZCB0byB0aGVpciBkZXZpY2VzIHZpYSB0aGVpciBpbnRlcm5h
bCBuZXR3b3JrLCB3aGVyZSB0aGUgY29ubmVjdGlvbiBpcyBwaHlzaWNhbGx5IGlzb2xhdGVkIGZy
b20gb3RoZXIgbmV0d29yayBhbmQgcHJvdGVjdGVkIGJ5IHNlcGFyYXRlIG1lY2hhbmlzbXMuIEFs
c28gcmVtZW1iZXIsDQogbWFueSBvcGVyYXRvcnMgd2lsbCB1c2UgSTJSUyB0byBjb250cm9sIGEg
c21hbGwgbnVtYmVyIG9mIHNlbGVjdGl2ZSByb3V0ZXJzIChtb3N0bHkgcm91dGVycyBhdCBpbmdy
ZXNzL2VncmVzcyBib3VuZGFyeSkgZm9yIHZhbHVlIGFkZGVkIHNlcnZpY2VzLg0KPC9zcGFuPjxz
cGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVv
dDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90OyI+PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+
DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4w
cHQ7Y29sb3I6IzFGNDk3RCI+Jm5ic3A7PC9zcGFuPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEu
MHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90
OyI+PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05v
cm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Y29sb3I6IzFGNDk3RCI+Jm5ic3A7
PC9zcGFuPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0Nh
bGlicmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90OyI+PG86cD48L286cD48L3NwYW4+PC9w
Pg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQt
c2l6ZToxMS4wcHQ7Y29sb3I6IzFGNDk3RCI+Jm5ic3A7PC9zcGFuPjxzcGFuIHN0eWxlPSJmb250
LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1z
ZXJpZiZxdW90OyI+PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xh
c3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6
JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7O2NvbG9yOiMxRjQ5N0Qi
PlNvbWUgb2YgbXkgZGV0YWlsZWQgcXVlc3Rpb25zIGFuZCBjb21tZW50cyB0byB0aGUg4oCcc2Vj
dXJpdHktcmVxdWlyZW1lbnRz4oCdIGFyZSBzdGlsbCBhcHBsaWNhYmxlIHRvIHRoZSDigJxlbnZp
cm9ubWVudC1yZXHigJ0gZG9jdW1lbnQgYmVjYXVzZSB0aGV5IGhhdmUgdGhlIHNhbWUNCiB0ZXh0
LiBQbHVzIGEgZmV3IG1vcmUgZm9yIHRoZSDigJxlbnZpcm9ubWVudC1yZXHigJ0gZG9jdW1lbnQu
IEhvcGUgdGhlIGF1dGhvcnMgY2FuIGFkZHJlc3MgdGhlbS4NCjwvc3Bhbj48c3BhbiBzdHlsZT0i
Zm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3Nh
bnMtc2VyaWYmcXVvdDsiPjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxw
IGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2NvbG9yOiMx
RjQ5N0QiPiZuYnNwOzwvc3Bhbj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZh
bWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDsiPjxvOnA+PC9v
OnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFu
IHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2NvbG9yOiMxRjQ5N0QiPiZuYnNwOzwvc3Bhbj48c3Bh
biBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7
LCZxdW90O3NhbnMtc2VyaWYmcXVvdDsiPjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0K
PGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0
O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90Oztj
b2xvcjojMUY0OTdEIj5TZWN0aW9uIDM6DQo8L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZTox
MS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1
b3Q7Ij48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNv
Tm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtjb2xvcjojMUY0OTdEIj4mbmJz
cDs8L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7
Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij48bzpwPjwvbzpwPjwvc3Bhbj48
L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9u
dC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMt
c2VyaWYmcXVvdDs7Y29sb3I6IzFGNDk3RCI+V2hhdCBhcmUgdGhlIGtleSBkaWZmZXJlbmNlcyB3
aXRoIHJlZ2FyZCB0byB0aGUgc2VjdXJpdHkgcmVxdWlyZW1lbnRzIGZvciAmbmJzcDtJMlJTIHBs
YW5lIGFuZCBmb3IgbWFuYWdlbWVudCBwbGFuZT8mbmJzcDsgU2VjdGlvbiAzLjEgZGVzY3JpYmVz
IHRoZSBpbnRlcmFjdGlvbiBiZXR3ZWVuDQogSTJSUyBwbGFuZSBhbmQgbWFuYWdlbWVudCBwbGFu
ZS4gQnV0IEkgc2VlIHRoZSBzZWN1cml0eSByZXF1aXJlbWVudCBmb3IgdGhlIG1hbmFnZW1lbnQg
cGxhbmUgYXJlIGFsbCBhcHBsaWNhYmxlIHRvIHRoZSBzZWN1cml0eSByZXF1aXJlbWVudCB0byBJ
MlJTIHBsYW5lIC4gSWYgeW91IHRoaW5rIHRoYXQgdGhleSBhcmUgdmVyeSBkaWZmZXJlbnQsIGNh
biB5b3UgZWxhYm9yYXRlIG1vcmU/DQo8L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4w
cHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7
Ij48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9y
bWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtjb2xvcjojMUY0OTdEIj4mbmJzcDs8
L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2Fs
aWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij48bzpwPjwvbzpwPjwvc3Bhbj48L3A+
DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1z
aXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2Vy
aWYmcXVvdDs7Y29sb3I6IzFGNDk3RCI+U2VjdGlvbiAzLjQgaGFzIHRpdGxlIOKAnFJlY29tbWVu
ZGF0aW9uc+KAnSwgYnV0IHRoZSBjb250ZW50IGFyZSBhbGwgcmVxdWlyZW1lbnRzLiBXaHkgbm90
IG5hbWUgdGhlIHNlY3Rpb24g4oCcUmVxdWlyZW1lbnTigJ0/DQo8L3NwYW4+PHNwYW4gc3R5bGU9
ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtz
YW5zLXNlcmlmJnF1b3Q7Ij48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8
cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZh
bWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDs7Y29sb3I6IzFG
NDk3RCI+Jm5ic3A7PC9zcGFuPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFt
aWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90OyI+PG86cD48L286
cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4g
c3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90Oywm
cXVvdDtzYW5zLXNlcmlmJnF1b3Q7O2NvbG9yOiMxRjQ5N0QiPlJFUSAyOiBEb2VzIGl0IHRoYXQg
YSBkaWZmZXJlbnQgSVAgYWRkcmVzcyB0aGFuIHRoZSBvbmUgdXNlZCBieSB0aGUgbWFuYWdlbWVu
dCBzeXN0ZW0/PC9zcGFuPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5
OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90OyI+PG86cD48L286cD48
L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5
bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVv
dDtzYW5zLXNlcmlmJnF1b3Q7O2NvbG9yOiMxRjQ5N0QiPiZuYnNwOzwvc3Bhbj48c3BhbiBzdHls
ZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90
O3NhbnMtc2VyaWYmcXVvdDsiPjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4N
CjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQt
ZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90Oztjb2xvcjoj
MUY0OTdEIj5SRVEgMjE6IGlzIG1vcmUgYWJvdXQgSTJSUyByZXF1aXJlbWVudCwgbGVzcyBhYm91
dCDigJxTZWN1cml0eeKAnSByZXF1aXJlbWVudC4NCjwvc3Bhbj48c3BhbiBzdHlsZT0iZm9udC1z
aXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2Vy
aWYmcXVvdDsiPjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNz
PSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZx
dW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90Oztjb2xvcjojMUY0OTdEIj4m
bmJzcDs8L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1
b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij48bzpwPjwvbzpwPjwvc3Bh
bj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0i
Zm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3Nh
bnMtc2VyaWYmcXVvdDs7Y29sb3I6IzFGNDk3RCI+UkVRIDI0OiBpc27igJl0IGl0IHRoZSBnZW5l
cmFsIGdvYWwgb2YgSTJSUz8gTm90IHJlYWxseSBzZWN1cml0eSBwZXIgc2UuIChzaG91bGQgYmUg
aW5jbHVkZWQgaW4gdGhlIGdlbmVyYWwgSTJSUyByZXF1aXJlbWVudCBvciBhcmNoaXRlY3R1cmUp
Lg0KPC9zcGFuPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90
O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90OyI+PG86cD48L286cD48L3NwYW4+
PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZv
bnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5z
LXNlcmlmJnF1b3Q7O2NvbG9yOiMxRjQ5N0QiPiZuYnNwOzwvc3Bhbj48c3BhbiBzdHlsZT0iZm9u
dC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMt
c2VyaWYmcXVvdDsiPjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNs
YXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2NvbG9yOiMxRjQ5
N0QiPiZuYnNwOzwvc3Bhbj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWls
eTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDsiPjxvOnA+PC9vOnA+
PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0
eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1
b3Q7c2Fucy1zZXJpZiZxdW90Oztjb2xvcjojMUY0OTdEIj5SRVEgMjY6IHNpbXBseSBjb250cm9s
bGluZyB0aGUgcmVzb3VyY2UgY2FuIGhhcmRseSBwcmV2ZW50IERvUy4gTWFsaWNpb3VzIGNsaWVu
dCBjYW4gb2NjdXB5IHRoZSByZXNvdXJjZSB3aGlsZSB0aGUgdmFsaWQgb25lIGNhbid0IGFjY2Vz
cy48L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7
Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij48bzpwPjwvbzpwPjwvc3Bhbj48
L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9u
dC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMt
c2VyaWYmcXVvdDs7Y29sb3I6IzFGNDk3RCI+Jm5ic3A7PC9zcGFuPjxzcGFuIHN0eWxlPSJmb250
LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1z
ZXJpZiZxdW90OyI+PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xh
c3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6
JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7O2NvbG9yOiMxRjQ5N0Qi
PlRoYW5rcyBmb3IgeW91ciBjb25zaWRlcmF0aW9uLA0KPC9zcGFuPjxzcGFuIHN0eWxlPSJmb250
LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1z
ZXJpZiZxdW90OyI+PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xh
c3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6
JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7O2NvbG9yOiMxRjQ5N0Qi
PkxpbmRhPC9zcGFuPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZx
dW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90OyI+PG86cD48L286cD48L3Nw
YW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9
ImZvbnQtc2l6ZToxMC41cHQiPiZuYnNwOzwvc3Bhbj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEx
LjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVv
dDsiPjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29O
b3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTAuNXB0Ij4mbmJzcDs8L3NwYW4+PHNwYW4g
c3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90Oywm
cXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxk
aXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjVwdDtm
b250LWZhbWlseTpDb25zb2xhcyI+LS0tLS1PcmlnaW5hbCBNZXNzYWdlLS0tLS08YnI+DQpGcm9t
OiBpMnJzIFs8YSBocmVmPSJtYWlsdG86aTJycy1ib3VuY2VzQGlldGYub3JnIiB0YXJnZXQ9Il9i
bGFuayI+bWFpbHRvOmkycnMtYm91bmNlc0BpZXRmLm9yZzwvYT5dIE9uIEJlaGFsZiBPZiBKb2Vs
IE0uIEhhbHBlcm48YnI+DQpTZW50OiBGcmlkYXksIEF1Z3VzdCAyMSwgMjAxNSAxMjoyMCBQTTxi
cj4NClRvOiBMaW5kYSBEdW5iYXI7IDxhIGhyZWY9Im1haWx0bzppMnJzQGlldGYub3JnIiB0YXJn
ZXQ9Il9ibGFuayI+aTJyc0BpZXRmLm9yZzwvYT48YnI+DQpDYzogJ0plZmZyZXkgSGFhcyc7IDxh
IGhyZWY9Im1haWx0bzpkYW5pZWwubWlnYXVsdEBlcmljc3Nvbi5jb20iIHRhcmdldD0iX2JsYW5r
Ij4NCmRhbmllbC5taWdhdWx0QGVyaWNzc29uLmNvbTwvYT47ICdBbGlhIEF0bGFzJzxicj4NClN1
YmplY3Q6IFJlOiBbaTJyc10gZHJhZnQtbWdsdC1pMnJzLXNlY3VyaXR5LXJlcXVpcmVtZW50cy0w
MCAyIFdlZWsgV0cgYWRvcHRpb24gY2FsbCAoOC8xNyB0byA4LzMxKTwvc3Bhbj48c3BhbiBzdHls
ZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90
O3NhbnMtc2VyaWYmcXVvdDsiPjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4N
CjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTAuNXB0Ij4mbmJz
cDs8L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7
Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij48bzpwPjwvbzpwPjwvc3Bhbj48
L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9u
dC1zaXplOjEwLjVwdDtmb250LWZhbWlseTpDb25zb2xhcyI+WWVzLCBvbmUgb2YgdGhlIHR3byBs
YXN0IGNhbGxzIGlzIGZvciB0aGUgZW52aXJvbm1lbnQgZG9jdW1lbnQuPC9zcGFuPjxzcGFuIHN0
eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1
b3Q7c2Fucy1zZXJpZiZxdW90OyI+PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2
Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMC41cHQ7Zm9u
dC1mYW1pbHk6Q29uc29sYXMiPiZuYnNwOzwvc3Bhbj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEx
LjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVv
dDsiPjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29O
b3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTAuNXB0O2ZvbnQtZmFtaWx5OkNvbnNvbGFz
Ij5IYXZpbmcgYSBkZWRpY2F0ZWQgcGh5c2ljYWwgY2hhbm5lbCBpcyBvbmUgb2YgdGhlIHdheXMg
aWRlbnRpZmllZCBpbiB0aGUgZHJhZnQgdG8gcHJvdmlkZSB0aGUgcmVxdWlyZWQgaXNvbGF0aW9u
Ljwvc3Bhbj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtD
YWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDsiPjxvOnA+PC9vOnA+PC9zcGFuPjwv
cD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250
LXNpemU6MTAuNXB0O2ZvbnQtZmFtaWx5OkNvbnNvbGFzIj4mbmJzcDs8L3NwYW4+PHNwYW4gc3R5
bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVv
dDtzYW5zLXNlcmlmJnF1b3Q7Ij48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+
DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjVwdDtmb250
LWZhbWlseTpDb25zb2xhcyI+V2hpbGUgc3VjaCBhbiBlbnZpcm9ubWVudCBpcyBjbGVhcmx5IHN1
cHBvcnRhYmxlLCBJIGRvIG5vdCB0aGluayB3ZSBzaG91bGQgcmVkdWNlIHRoZSBpbnRlcm5hbCBw
cm90b2NvbCByZXF1aXJlbWVudHMgKHN1Y2ggYXMgTVRJIHNlY3VyaXR5IGZvciB0aGUgY29udHJv
bCBjaGFubmVsKSBqdXN0IGJlY2F1c2UgdGhlcmUgYXJlDQogY2lyY3Vtc3RhbmNlcyB3aGVyZSBz
dWNoIGl0IHdvbid0IGJlIG5lZWRlZC4mbmJzcDsgSSBkb24ndCBleHBlY3QgdGhhdCB3ZSB3aWxs
IGJ1aWxkIGRpZmZlcmVudCBwcm90b2NvbCBzdGFja3MgZm9yIHRoZSBkaWZmZXJlbnQgZGVwbG95
bWVudHMuPC9zcGFuPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZx
dW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90OyI+PG86cD48L286cD48L3Nw
YW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9
ImZvbnQtc2l6ZToxMC41cHQ7Zm9udC1mYW1pbHk6Q29uc29sYXMiPiZuYnNwOzwvc3Bhbj48c3Bh
biBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7
LCZxdW90O3NhbnMtc2VyaWYmcXVvdDsiPjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0K
PGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTAuNXB0
O2ZvbnQtZmFtaWx5OkNvbnNvbGFzIj5UaGUgcHVycG9zZSBvZiB0aGlzIGRyYWZ0IGlzIHRvIGRl
c2NyaWJlIHRoZSBlbnZpcm9ubWVudGFsIGFzc3VtcHRpb25zLCB3aGljaCBhc3N1bXB0aW9ucyBj
YW4gYmUgbWV0IGluIHZhcmlvdXMgd2F5cy48L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZTox
MS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1
b3Q7Ij48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNv
Tm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjVwdDtmb250LWZhbWlseTpDb25zb2xh
cyI+Jm5ic3A7PC9zcGFuPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5
OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90OyI+PG86cD48L286cD48
L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5
bGU9ImZvbnQtc2l6ZToxMC41cHQ7Zm9udC1mYW1pbHk6Q29uc29sYXMiPllvdXJzLDwvc3Bhbj48
c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1
b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDsiPjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2
Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTAu
NXB0O2ZvbnQtZmFtaWx5OkNvbnNvbGFzIj5Kb2VsPC9zcGFuPjxzcGFuIHN0eWxlPSJmb250LXNp
emU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJp
ZiZxdW90OyI+PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9
Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMC41cHQ7Zm9udC1mYW1pbHk6Q29u
c29sYXMiPiZuYnNwOzwvc3Bhbj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZh
bWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDsiPjxvOnA+PC9v
OnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFu
IHN0eWxlPSJmb250LXNpemU6MTAuNXB0O2ZvbnQtZmFtaWx5OkNvbnNvbGFzIj5PbiA4LzIxLzE1
IDEyOjU2IFBNLCBMaW5kYSBEdW5iYXIgd3JvdGU6PC9zcGFuPjxzcGFuIHN0eWxlPSJmb250LXNp
emU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJp
ZiZxdW90OyI+PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9
Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMC41cHQ7Zm9udC1mYW1pbHk6Q29u
c29sYXMiPiZndDsgSm9lbCw8L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9u
dC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij48bzpw
PjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48
c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjVwdDtmb250LWZhbWlseTpDb25zb2xhcyI+Jmd0Ozwv
c3Bhbj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxp
YnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDsiPjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFu
PjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJm
b250LXNpemU6MTAuNXB0O2ZvbnQtZmFtaWx5OkNvbnNvbGFzIj4mZ3Q7IElmIGl0IGlzIHRoZSAm
cXVvdDtlbnZpcm9ubWVudGFsIG9uZSZxdW90OywgaXQgaXMgbW9yZSBpbXBvcnRhbnQgdG8gZGlm
ZmVyZW50aWF0ZSB0aGUgcmVxdWlyZW1lbnRzIGZvciBkaWZmZXJlbnQgZW52aXJvbm1lbnRzIG9u
IGhvdyB0aGUgSTJSUyBjbGllbnQgJmFtcDsgQWdlbnQgYXJlIGNvbm5lY3RlZC48L3NwYW4+PHNw
YW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90
OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4N
CjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjVw
dDtmb250LWZhbWlseTpDb25zb2xhcyI+Jmd0Ozwvc3Bhbj48c3BhbiBzdHlsZT0iZm9udC1zaXpl
OjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYm
cXVvdDsiPjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNs
YXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTAuNXB0O2ZvbnQtZmFtaWx5
OkNvbnNvbGFzIj4mZ3Q7IE9uZSBvZiBvdXIgY3VzdG9tZXJzIHN0YXRlZCB0aGF0IHRoZWlyIGVu
dmlyb25tZW50IGhhcyBhIHNpbmdsZSBDb250cm9sbGVyIChvciB0aGUgSTJSUyBjbGllbnQpIGRp
cmVjdGx5IGNvbm5lY3RlZCB0byB0aGVpciBkZXZpY2VzIHZpYSB0aGVpciBpbnRlcm5hbCBuZXR3
b3JrLCB3aGVyZSB0aGUgY29ubmVjdGlvbiBpcw0KIHBoeXNpY2FsbHkgaXNvbGF0ZWQgZnJvbSBv
dGhlciBuZXR3b3JrIGFuZCBwcm90ZWN0ZWQgYnkgc2VwYXJhdGUgbWVjaGFuaXNtcywgdGhleSBk
b24ndCBuZWVkIGFsbCB0aG9zZSBzb3BoaXN0aWNhdGVkIGF1dGhlbnRpY2F0aW9uIHByb2NlZHVy
ZS48L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7
Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij48bzpwPjwvbzpwPjwvc3Bhbj48
L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9u
dC1zaXplOjEwLjVwdDtmb250LWZhbWlseTpDb25zb2xhcyI+Jmd0Ozwvc3Bhbj48c3BhbiBzdHls
ZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90
O3NhbnMtc2VyaWYmcXVvdDsiPjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0K
PGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTAuNXB0
O2ZvbnQtZmFtaWx5OkNvbnNvbGFzIj4mZ3Q7IFdlIG5lZWQgdG8gYWRkcmVzcyB0aGlzIGVudmly
b25tZW50LCBpLmUuIGhhdmluZyBhIHNpbXBsZXIgc2VjdXJpdHkgcmVxdWlyZW1lbnQgZm9yIHRo
aXMgZW52aXJvbm1lbnQgdGhhbiB0aGUgZW52aXJvbm1lbnQgd2hlcmUgSTJSUyBDbGllbnQgaXMg
Y29ubmVjdGVkIHZpYSBwdWJsaWMgbmV0d29yay48L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQtc2l6
ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlm
JnF1b3Q7Ij48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0i
TXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjVwdDtmb250LWZhbWlseTpDb25z
b2xhcyI+Jmd0Ozwvc3Bhbj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWls
eTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDsiPjxvOnA+Jm5ic3A7
PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxz
cGFuIHN0eWxlPSJmb250LXNpemU6MTAuNXB0O2ZvbnQtZmFtaWx5OkNvbnNvbGFzIj4mZ3Q7IExp
bmRhPC9zcGFuPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90
O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90OyI+PG86cD48L286cD48L3NwYW4+
PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZv
bnQtc2l6ZToxMC41cHQ7Zm9udC1mYW1pbHk6Q29uc29sYXMiPiZndDs8L3NwYW4+PHNwYW4gc3R5
bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVv
dDtzYW5zLXNlcmlmJnF1b3Q7Ij48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4N
CjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjVw
dDtmb250LWZhbWlseTpDb25zb2xhcyI+Jmd0Ozwvc3Bhbj48c3BhbiBzdHlsZT0iZm9udC1zaXpl
OjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYm
cXVvdDsiPjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNs
YXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTAuNXB0O2ZvbnQtZmFtaWx5
OkNvbnNvbGFzIj4mZ3Q7IC0tLS0tT3JpZ2luYWwgTWVzc2FnZS0tLS0tPC9zcGFuPjxzcGFuIHN0
eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1
b3Q7c2Fucy1zZXJpZiZxdW90OyI+PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2
Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMC41cHQ7Zm9u
dC1mYW1pbHk6Q29uc29sYXMiPiZndDsgRnJvbTogSm9lbCBIYWxwZXJuIERpcmVjdCBbPGEgaHJl
Zj0ibWFpbHRvOmptaC5kaXJlY3RAam9lbGhhbHBlcm4uY29tIiB0YXJnZXQ9Il9ibGFuayI+bWFp
bHRvOmptaC5kaXJlY3RAam9lbGhhbHBlcm4uY29tPC9hPl08L3NwYW4+PHNwYW4gc3R5bGU9ImZv
bnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5z
LXNlcmlmJnF1b3Q7Ij48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBj
bGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjVwdDtmb250LWZhbWls
eTpDb25zb2xhcyI+Jmd0OyBTZW50OiBGcmlkYXksIEF1Z3VzdCAyMSwgMjAxNSAxMDo1MyBBTTwv
c3Bhbj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxp
YnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDsiPjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4N
CjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNp
emU6MTAuNXB0O2ZvbnQtZmFtaWx5OkNvbnNvbGFzIj4mZ3Q7IFRvOiBMaW5kYSBEdW5iYXI7DQo8
YSBocmVmPSJtYWlsdG86aTJyc0BpZXRmLm9yZyIgdGFyZ2V0PSJfYmxhbmsiPmkycnNAaWV0Zi5v
cmc8L2E+PC9zcGFuPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZx
dW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90OyI+PG86cD48L286cD48L3Nw
YW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9
ImZvbnQtc2l6ZToxMC41cHQ7Zm9udC1mYW1pbHk6Q29uc29sYXMiPiZndDsgQ2M6ICdKZWZmcmV5
IEhhYXMnOw0KPGEgaHJlZj0ibWFpbHRvOmRhbmllbC5taWdhdWx0QGVyaWNzc29uLmNvbSIgdGFy
Z2V0PSJfYmxhbmsiPmRhbmllbC5taWdhdWx0QGVyaWNzc29uLmNvbTwvYT47ICdKb2VsIEhhbHBl
cm4nOyAnQWxpYSBBdGxhcyc8L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9u
dC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij48bzpw
PjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48
c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjVwdDtmb250LWZhbWlseTpDb25zb2xhcyI+Jmd0OyBT
dWJqZWN0OiBSZTogW2kycnNdIGRyYWZ0LW1nbHQtaTJycy1zZWN1cml0eS1yZXF1aXJlbWVudHMt
MDAgMiBXZWVrIFdHDQo8L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1m
YW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij48bzpwPjwv
bzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3Bh
biBzdHlsZT0iZm9udC1zaXplOjEwLjVwdDtmb250LWZhbWlseTpDb25zb2xhcyI+Jmd0OyBhZG9w
dGlvbiBjYWxsICg4LzE3IHRvIDgvMzEpPC9zcGFuPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEu
MHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90
OyI+PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05v
cm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMC41cHQ7Zm9udC1mYW1pbHk6Q29uc29sYXMi
PiZndDs8L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1
b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij48bzpwPiZuYnNwOzwvbzpw
Pjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBz
dHlsZT0iZm9udC1zaXplOjEwLjVwdDtmb250LWZhbWlseTpDb25zb2xhcyI+Jmd0OyBGaXJzdCwg
dGhlcmUgbWF5IGJlIHNvbWUgY29uZnVzaW9uIGJlY2F1c2UgdGhlIGFubm91bmNlbWVudC4mbmJz
cDsgSSBwcmVzdW1lIHRoYXQgeW91IGFyZSB0YWxraW5nIGFib3V0IHRoZSAtZW52aXJvbm1lbnRz
IGRvY3VtZW50cy48L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1p
bHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij48bzpwPjwvbzpw
Pjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBz
dHlsZT0iZm9udC1zaXplOjEwLjVwdDtmb250LWZhbWlseTpDb25zb2xhcyI+Jmd0Ozwvc3Bhbj48
c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1
b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDsiPjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD4N
CjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNp
emU6MTAuNXB0O2ZvbnQtZmFtaWx5OkNvbnNvbGFzIj4mZ3Q7IElmIHRoZSBXRyBjb25jbHVkZXMg
dGhhdCBhIGRpZmZlcmVudCBjaGFwdGVyIHN0cnVjdHVyZSBpcyB1c2VmdWwsIHdlIGNhbiBvZiBj
b3Vyc2UgY2hhbmdlIGl0LiZuYnNwOyBHaXZlbiB0aGF0IHRoZSBnb2FsIGlzIGVudmlyb25tZW50
IGRlc2NyaXB0aW9uLCBJIGFtIG5vdCBzdXJlIHlvdXIgcHJvcG9zZWQgc3RydWN0dXJlIGlzDQog
c2lnbmlmaWNhbnRseSBiZXR0ZXIgdGhhbiB0aGUgZXhpc3Rpbmcgb25lLjwvc3Bhbj48c3BhbiBz
dHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZx
dW90O3NhbnMtc2VyaWYmcXVvdDsiPjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRp
dj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTAuNXB0O2Zv
bnQtZmFtaWx5OkNvbnNvbGFzIj4mZ3Q7PC9zcGFuPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEu
MHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90
OyI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9
Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMC41cHQ7Zm9udC1mYW1pbHk6Q29u
c29sYXMiPiZndDsgSSBiZWxpZXZlIHlvdXIgY29tbWVudCBhYm91dCB0aGUgdGV4dCZuYnNwOyBy
ZWFkaW5nICZxdW90O3doZXJlIHNlY3VyaXR5IGZ1bmN0aW9ucyBtYXkgYmUgaG9zdGVkJnF1b3Q7
IGlzIHdlbGwgdGFrZW4sIGFuZCB3ZSBzaG91bGQgcmVtb3ZlIHRoYXQgdGV4dCB3aGVuIHdlIG5l
eHQgcmV2aXNlIHRoZSBkb2N1bWVudC48L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4w
cHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7
Ij48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9y
bWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjVwdDtmb250LWZhbWlseTpDb25zb2xhcyI+
Jmd0Ozwvc3Bhbj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVv
dDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDsiPjxvOnA+Jm5ic3A7PC9vOnA+
PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0
eWxlPSJmb250LXNpemU6MTAuNXB0O2ZvbnQtZmFtaWx5OkNvbnNvbGFzIj4mZ3Q7IFRoZSBpc29s
YXRpb24gdGV4dCBpcyBhYm91dCB0aGUgbmVlZCB0byBrZWVwIHRoaW5ncyBzZXBhcmF0ZSwgYW5k
IHRoZSB2YXJpb3VzIHBvc3NpYmxlIG1lYW5zIGFyZSBkZWdyZWVzIC8gYXBwcm9hY2hlcyB0byBz
ZXBhcmF0aW9uLjwvc3Bhbj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWls
eTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDsiPjxvOnA+PC9vOnA+
PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0
eWxlPSJmb250LXNpemU6MTAuNXB0O2ZvbnQtZmFtaWx5OkNvbnNvbGFzIj4mZ3Q7IElzb2xhdGlv
biBpcyBub3QgYWJvdXQgdHJlYXRpbmcgdGhpbmdzIGRpZmZlcmVudGx5LCBub3IgaXMgaXQgZXhw
bGljaXRseSBhYm91dCB1c2luZyBkaWZmZXJlbnQgcHJvdG9jb2xzLiZuYnNwOyBTbyB0aGUgcG9p
bnQgb2YgaXNvbGF0aW9uIGlzIG5vdCB0aGF0IHRoZXJlIGFyZSBkaWZmZXJlbnQgc2VjdXJpdHkg
cmVxdWlyZW1lbnRzLA0KIGJ1dCB0aGF0IGluIG9yZGVyIHRvIGF2b2lkIGNvcnNzLWVmZmVjdHMs
IHRoaW5ncyBzaG91bGQgYmUga2VwdCBzZXBhcmF0ZS48L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQt
c2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNl
cmlmJnF1b3Q7Ij48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFz
cz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjVwdDtmb250LWZhbWlseTpD
b25zb2xhcyI+Jmd0Ozwvc3Bhbj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZh
bWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDsiPjxvOnA+Jm5i
c3A7PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwi
PjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTAuNXB0O2ZvbnQtZmFtaWx5OkNvbnNvbGFzIj4mZ3Q7
IFlvdXJzLDwvc3Bhbj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTom
cXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDsiPjxvOnA+PC9vOnA+PC9z
cGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxl
PSJmb250LXNpemU6MTAuNXB0O2ZvbnQtZmFtaWx5OkNvbnNvbGFzIj4mZ3Q7IEpvZWw8L3NwYW4+
PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZx
dW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rp
dj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEw
LjVwdDtmb250LWZhbWlseTpDb25zb2xhcyI+Jmd0Ozwvc3Bhbj48c3BhbiBzdHlsZT0iZm9udC1z
aXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2Vy
aWYmcXVvdDsiPjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxw
IGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTAuNXB0O2ZvbnQtZmFt
aWx5OkNvbnNvbGFzIj4mZ3Q7IE9uIDgvMjAvMTUgNjo0MiBQTSwgTGluZGEgRHVuYmFyIHdyb3Rl
Ojwvc3Bhbj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtD
YWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDsiPjxvOnA+PC9vOnA+PC9zcGFuPjwv
cD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250
LXNpemU6MTAuNXB0O2ZvbnQtZmFtaWx5OkNvbnNvbGFzIj4mZ3Q7Jmd0OyBJIHN1cHBvcnQgdGhl
IFdHIGFkb3B0aW9uIGJlY2F1c2UgSSB0aGluayB0aGUgSTJSUyBXRyBuZWVkcyBpdC48L3NwYW4+
PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZx
dW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rp
dj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEw
LjVwdDtmb250LWZhbWlseTpDb25zb2xhcyI+Jmd0OyZndDsgSG93ZXZlciwgSSBob3BlIHRoZSBh
dXRob3JzIGNhbiBjb25zaWRlci9hZGRyZXNzIHRoZSBmb2xsb3dpbmcgc3VnZ2VzdGlvbnMvY29t
bWVudHM6PC9zcGFuPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZx
dW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90OyI+PG86cD48L286cD48L3Nw
YW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9
ImZvbnQtc2l6ZToxMC41cHQ7Zm9udC1mYW1pbHk6Q29uc29sYXMiPiZndDsmZ3Q7PC9zcGFuPjxz
cGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVv
dDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90OyI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPg0K
PC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6
ZToxMC41cHQ7Zm9udC1mYW1pbHk6Q29uc29sYXMiPiZndDsmZ3Q7IFdoZW4geW91IHRoaW5rIGFi
b3V0IHRoZSBJMlJTIHNlY3VyaXR5LCZuYnNwOyB0aGVyZSBhcmUgZm9sbG93aW5nDQo8L3NwYW4+
PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZx
dW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rp
dj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEw
LjVwdDtmb250LWZhbWlseTpDb25zb2xhcyI+Jmd0OyZndDsgZGlmZmVyZW50PC9zcGFuPjxzcGFu
IHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDss
JnF1b3Q7c2Fucy1zZXJpZiZxdW90OyI+PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8
ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMC41cHQ7
Zm9udC1mYW1pbHk6Q29uc29sYXMiPiZndDsmZ3Q7IGFzcGVjdHM6PC9zcGFuPjxzcGFuIHN0eWxl
PSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7
c2Fucy1zZXJpZiZxdW90OyI+PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0K
PHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMC41cHQ7Zm9udC1m
YW1pbHk6Q29uc29sYXMiPiZndDsmZ3Q7PC9zcGFuPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEu
MHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90
OyI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9
Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMC41cHQ7Zm9udC1mYW1pbHk6Q29u
c29sYXMiPiZndDsmZ3Q7IC1Db21tdW5pY2F0aW9uIGNoYW5uZWwgYmV0d2VlbiBJMlJTIGNsaWVu
dCBhbmQgQWdlbnQgKGFuZCB0aGUgY2hhbm5lbA0KPC9zcGFuPjxzcGFuIHN0eWxlPSJmb250LXNp
emU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJp
ZiZxdW90OyI+PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9
Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMC41cHQ7Zm9udC1mYW1pbHk6Q29u
c29sYXMiPiZndDsmZ3Q7IGJldHdlZW4gSTJSUyBjbGllbnQgYW5kIGFwcGxpY2F0aW9ucyk6PC9z
cGFuPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGli
cmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90OyI+PG86cD48L286cD48L3NwYW4+PC9wPg0K
PC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6
ZToxMC41cHQ7Zm9udC1mYW1pbHk6Q29uc29sYXMiPiZndDsmZ3Q7PC9zcGFuPjxzcGFuIHN0eWxl
PSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7
c2Fucy1zZXJpZiZxdW90OyI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8
ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMC41cHQ7
Zm9udC1mYW1pbHk6Q29uc29sYXMiPiZndDsmZ3Q7IFRoZSBjaGFubmVsIGNhbiBiZTwvc3Bhbj48
c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1
b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDsiPjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2
Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTAu
NXB0O2ZvbnQtZmFtaWx5OkNvbnNvbGFzIj4mZ3Q7Jmd0Ozwvc3Bhbj48c3BhbiBzdHlsZT0iZm9u
dC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMt
c2VyaWYmcXVvdDsiPjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4N
CjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTAuNXB0O2ZvbnQt
ZmFtaWx5OkNvbnNvbGFzIj4mZ3Q7Jmd0OyBvVmlhIHBoeXNpY2FsIFByaXZhdGUgbmV0d29yayAo
ZS5nLiB3aXRoaW4gYSBzZWN1cmVkIGRpcmVjdCBjb25uZWN0DQo8L3NwYW4+PHNwYW4gc3R5bGU9
ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtz
YW5zLXNlcmlmJnF1b3Q7Ij48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8
cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjVwdDtmb250LWZh
bWlseTpDb25zb2xhcyI+Jmd0OyZndDsgd2l0aGluIG9uZSBzaXRlKSw8L3NwYW4+PHNwYW4gc3R5
bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVv
dDtzYW5zLXNlcmlmJnF1b3Q7Ij48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+
DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjVwdDtmb250
LWZhbWlseTpDb25zb2xhcyI+Jmd0OyZndDs8L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZTox
MS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1
b3Q7Ij48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFz
cz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjVwdDtmb250LWZhbWlseTpD
b25zb2xhcyI+Jmd0OyZndDsgb3dpdGhpbiBvbmUgYWRtaW5pc3RyYXRpdmUgZG9tYWluLCZuYnNw
OyB2aWEgdmlydHVhbCBwcml2YXRlIG5ldHdvcms8L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQtc2l6
ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlm
JnF1b3Q7Ij48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0i
TXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjVwdDtmb250LWZhbWlseTpDb25z
b2xhcyI+Jmd0OyZndDs8L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1m
YW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij48bzpwPiZu
YnNwOzwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFs
Ij48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjVwdDtmb250LWZhbWlseTpDb25zb2xhcyI+Jmd0
OyZndDsgb1NlY3VyZWQgY29ubmVjdGlvbiwgc3VjaCBhcyBUTFMgb3IgSVBTZWM8L3NwYW4+PHNw
YW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90
OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4N
CjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjVw
dDtmb250LWZhbWlseTpDb25zb2xhcyI+Jmd0OyZndDs8L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQt
c2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNl
cmlmJnF1b3Q7Ij48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8
cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjVwdDtmb250LWZh
bWlseTpDb25zb2xhcyI+Jmd0OyZndDsgb1B1YmxpYyBpbnRlcm5ldDwvc3Bhbj48c3BhbiBzdHls
ZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90
O3NhbnMtc2VyaWYmcXVvdDsiPjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4N
CjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTAuNXB0O2ZvbnQt
ZmFtaWx5OkNvbnNvbGFzIj4mZ3Q7Jmd0Ozwvc3Bhbj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEx
LjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVv
dDsiPjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNz
PSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTAuNXB0O2ZvbnQtZmFtaWx5OkNv
bnNvbGFzIj4mZ3Q7Jmd0OyBvLi48L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7
Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij48
bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFs
Ij48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjVwdDtmb250LWZhbWlseTpDb25zb2xhcyI+Jmd0
OyZndDs8L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1
b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij48bzpwPiZuYnNwOzwvbzpw
Pjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBz
dHlsZT0iZm9udC1zaXplOjEwLjVwdDtmb250LWZhbWlseTpDb25zb2xhcyI+Jmd0OyZndDsgLUF1
dGhlbnRpY2F0aW9uICZhbXA7IEF1dGhvcml6YXRpb248L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQt
c2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNl
cmlmJnF1b3Q7Ij48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFz
cz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjVwdDtmb250LWZhbWlseTpD
b25zb2xhcyI+Jmd0OyZndDs8L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9u
dC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij48bzpw
PiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9y
bWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjVwdDtmb250LWZhbWlseTpDb25zb2xhcyI+
Jmd0OyZndDsgb3RoZSBhdXRoZW50aWNhdGlvbiAmYW1wOyBhdXRob3JpemF0aW9uIHJlcXVpcmVt
ZW50IGZvciBkaWZmZXJlbnQNCjwvc3Bhbj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtm
b250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDsiPjxv
OnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwi
PjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTAuNXB0O2ZvbnQtZmFtaWx5OkNvbnNvbGFzIj4mZ3Q7
Jmd0OyBjb21tdW5pY2F0aW9uIGNoYW5uZWxzIGNhbiBiZSBkaWZmZXJlbnQuIFRoZXJlZm9yZSwg
c2hvdWxkIGhhdmUNCjwvc3Bhbj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZh
bWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDsiPjxvOnA+PC9v
OnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFu
IHN0eWxlPSJmb250LXNpemU6MTAuNXB0O2ZvbnQtZmFtaWx5OkNvbnNvbGFzIj4mZ3Q7Jmd0OyBz
ZXBhcmF0ZSBzZWN0aW9ucyB0byBhZGRyZXNzIHNwZWNpZmljIHJlcXVpcmVtZW50Jm5ic3A7IGZv
ciBlYWNoDQo8L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6
JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij48bzpwPjwvbzpwPjwv
c3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHls
ZT0iZm9udC1zaXplOjEwLjVwdDtmb250LWZhbWlseTpDb25zb2xhcyI+Jmd0OyZndDsgY29tbXVu
aWNhdGlvbiBjaGFubmVscyBiZXR3ZWVuIEkyUlMgYWdlbnQgJmx0Oy0mZ3Q7IGNsaWVudHMgKGFu
ZCBjbGllbnQgJmx0Oy0mZ3Q7PC9zcGFuPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2Zv
bnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90OyI+PG86
cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+
PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMC41cHQ7Zm9udC1mYW1pbHk6Q29uc29sYXMiPiZndDsm
Z3Q7IGFwcGxpY2F0aW9ucyk8L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9u
dC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij48bzpw
PjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48
c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjVwdDtmb250LWZhbWlseTpDb25zb2xhcyI+Jmd0OyZn
dDs8L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7
Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij48bzpwPiZuYnNwOzwvbzpwPjwv
c3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHls
ZT0iZm9udC1zaXplOjEwLjVwdDtmb250LWZhbWlseTpDb25zb2xhcyI+Jmd0OyZndDsgVGhlIGN1
cnJlbnQgU2VjdGlvbiA0IG9mIHRoZSBkcmFmdCBhbHJlYWR5IGhhcyB2ZXJ5IGdvb2QgZGVzY3Jp
cHRpb24NCjwvc3Bhbj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTom
cXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDsiPjxvOnA+PC9vOnA+PC9z
cGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxl
PSJmb250LXNpemU6MTAuNXB0O2ZvbnQtZmFtaWx5OkNvbnNvbGFzIj4mZ3Q7Jmd0OyBvbiB0aGUg
c3ViamVjdC4gSSB0aGluayA0LjQuMSBhbmQgNC40MiBjYW4gYmUgc2VwYXJhdGVkIG91dCBvZiB0
aGUgc2VjdGlvbi48L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1p
bHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij48bzpwPjwvbzpw
Pjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBz
dHlsZT0iZm9udC1zaXplOjEwLjVwdDtmb250LWZhbWlseTpDb25zb2xhcyI+Jmd0OyZndDs8L3Nw
YW4+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJy
aSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48
L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9u
dC1zaXplOjEwLjVwdDtmb250LWZhbWlseTpDb25zb2xhcyI+Jmd0OyZndDsgLUVuY3J5cHRpb24g
Zm9yIHRoZSBhY3R1YWwgY29udGVudCBiZXR3ZWVuIENsaWVudCBhbmQgQWdlbnQ8L3NwYW4+PHNw
YW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90
OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4N
CjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjVw
dDtmb250LWZhbWlseTpDb25zb2xhcyI+Jmd0OyZndDs8L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQt
c2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNl
cmlmJnF1b3Q7Ij48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8
cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjVwdDtmb250LWZh
bWlseTpDb25zb2xhcyI+Jmd0OyZndDsgLURvUyBEZXNpZ24gcmVxdWlyZW1lbnQgKGN1cnJlbnRs
eSBpbiBTZWN0aW9uIDUuMi4xKTwvc3Bhbj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtm
b250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDsiPjxv
OnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwi
PjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTAuNXB0O2ZvbnQtZmFtaWx5OkNvbnNvbGFzIj4mZ3Q7
Jmd0Ozwvc3Bhbj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVv
dDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDsiPjxvOnA+Jm5ic3A7PC9vOnA+
PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0
eWxlPSJmb250LXNpemU6MTAuNXB0O2ZvbnQtZmFtaWx5OkNvbnNvbGFzIj4mZ3Q7Jmd0OyAtTWFu
YWdlbWVudCBvZiBjb25mbGljdCB3aXRoIG90aGVyIHBsYW5lIChlLmcuIHRoZSBtYW5hZ2VtZW50
IHBsYW5lLA0KPC9zcGFuPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5
OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90OyI+PG86cD48L286cD48
L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5
bGU9ImZvbnQtc2l6ZToxMC41cHQ7Zm9udC1mYW1pbHk6Q29uc29sYXMiPiZndDsmZ3Q7IG11bHRp
LWhlYWRlZCBjb250cm9sLCB3aGljaCBoYXMgYmVlbiBkaXNjdXNzZWQgZXh0ZW5zaXZlbHkgaW4N
Cjwvc3Bhbj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtD
YWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDsiPjxvOnA+PC9vOnA+PC9zcGFuPjwv
cD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250
LXNpemU6MTAuNXB0O2ZvbnQtZmFtaWx5OkNvbnNvbGFzIj4mZ3Q7Jmd0OyBlcGhlbWVyYWw8L3Nw
YW4+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJy
aSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8
L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXpl
OjEwLjVwdDtmb250LWZhbWlseTpDb25zb2xhcyI+Jmd0OyZndDsgZHJhZnQpPC9zcGFuPjxzcGFu
IHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDss
JnF1b3Q7c2Fucy1zZXJpZiZxdW90OyI+PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8
ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMC41cHQ7
Zm9udC1mYW1pbHk6Q29uc29sYXMiPiZndDsmZ3Q7PC9zcGFuPjxzcGFuIHN0eWxlPSJmb250LXNp
emU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJp
ZiZxdW90OyI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAg
Y2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMC41cHQ7Zm9udC1mYW1p
bHk6Q29uc29sYXMiPiZndDsmZ3Q7IEkgdGhpbmsgdGhlIGRyYWZ0IHNob3VsZCBiZSBvcmdhbml6
ZWQgZnJvbSB0aGUgYXNwZWN0cyBvZiB0aGUNCjwvc3Bhbj48c3BhbiBzdHlsZT0iZm9udC1zaXpl
OjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYm
cXVvdDsiPjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJN
c29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTAuNXB0O2ZvbnQtZmFtaWx5OkNvbnNv
bGFzIj4mZ3Q7Jmd0OyBzZWN1cml0eSB0byBJMlJTIGFzIHN1Z2dlc3RlZCBhYm92ZS48L3NwYW4+
PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZx
dW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rp
dj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEw
LjVwdDtmb250LWZhbWlseTpDb25zb2xhcyI+Jmd0OyZndDs8L3NwYW4+PHNwYW4gc3R5bGU9ImZv
bnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5z
LXNlcmlmJnF1b3Q7Ij48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+
DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjVwdDtmb250
LWZhbWlseTpDb25zb2xhcyI+Jmd0OyZndDsgSGVyZSBhcmUgc29tZSBkZXRhaWxlZCBxdWVzdGlv
bnMgYW5kIGNvbW1lbnRzIHRvIHRoZSByZXF1aXJlbWVudHMNCjwvc3Bhbj48c3BhbiBzdHlsZT0i
Zm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3Nh
bnMtc2VyaWYmcXVvdDsiPjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxw
IGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTAuNXB0O2ZvbnQtZmFt
aWx5OkNvbnNvbGFzIj4mZ3Q7Jmd0OyBsaXN0ZWQgaW4gdGhlIGRvY3VtZW50Ojwvc3Bhbj48c3Bh
biBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7
LCZxdW90O3NhbnMtc2VyaWYmcXVvdDsiPjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0K
PGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTAuNXB0
O2ZvbnQtZmFtaWx5OkNvbnNvbGFzIj4mZ3Q7Jmd0Ozwvc3Bhbj48c3BhbiBzdHlsZT0iZm9udC1z
aXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2Vy
aWYmcXVvdDsiPjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxw
IGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTAuNXB0O2ZvbnQtZmFt
aWx5OkNvbnNvbGFzIj4mZ3Q7Jmd0OyBTZWN0aW9uIDE6PC9zcGFuPjxzcGFuIHN0eWxlPSJmb250
LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1z
ZXJpZiZxdW90OyI+PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xh
c3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMC41cHQ7Zm9udC1mYW1pbHk6
Q29uc29sYXMiPiZndDsmZ3Q7PC9zcGFuPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2Zv
bnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90OyI+PG86
cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05v
cm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMC41cHQ7Zm9udC1mYW1pbHk6Q29uc29sYXMi
PiZndDsmZ3Q7IFRoZSBzZWNvbmQgcGFyYWdyYXBoIHN0YXRlZCB0aGUgc2VjdXJpdHkgcmVjb21t
ZW5kYXRpb25zIG11c3QNCjwvc3Bhbj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250
LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDsiPjxvOnA+
PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxz
cGFuIHN0eWxlPSJmb250LXNpemU6MTAuNXB0O2ZvbnQtZmFtaWx5OkNvbnNvbGFzIj4mZ3Q7Jmd0
OyAmcXVvdDtzcGVjaWZ5aW5nIHdoZXJlIHNlY3VyaXR5IGZ1bmN0aW9ucyBtYXkgYmUgaG9zdGVk
JnF1b3Q7LiBGaXJzdCBvZiBhbGwgSTwvc3Bhbj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBw
dDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDsi
PjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3Jt
YWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTAuNXB0O2ZvbnQtZmFtaWx5OkNvbnNvbGFzIj4m
Z3Q7Jmd0OyBkb24ndCBzZWUgdGhlIGRyYWZ0IGFkZHJlc3MgdGhpcyBhc3BlY3QuIFNlY29uZCwg
SSB0aGluayZuYnNwOyZuYnNwOyAmcXVvdDt3aGVyZTwvc3Bhbj48c3BhbiBzdHlsZT0iZm9udC1z
aXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2Vy
aWYmcXVvdDsiPjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNz
PSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTAuNXB0O2ZvbnQtZmFtaWx5OkNv
bnNvbGFzIj4mZ3Q7Jmd0OyBzZWN1cml0eSBmdW5jdGlvbnMgYXJlIGhvc3RlZCZxdW90OyBpcyBv
cnRob2dvbmFsIHRvICZxdW90O0kyUlMgc2VjdXJpdHkmcXVvdDsgLjwvc3Bhbj48c3BhbiBzdHls
ZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90
O3NhbnMtc2VyaWYmcXVvdDsiPjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4N
CjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTAuNXB0O2ZvbnQt
ZmFtaWx5OkNvbnNvbGFzIj4mZ3Q7Jmd0Ozwvc3Bhbj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEx
LjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVv
dDsiPjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNz
PSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTAuNXB0O2ZvbnQtZmFtaWx5OkNv
bnNvbGFzIj4mZ3Q7Jmd0OyBTZWN0aW9uIDM6PC9zcGFuPjxzcGFuIHN0eWxlPSJmb250LXNpemU6
MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZx
dW90OyI+PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1z
b05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMC41cHQ7Zm9udC1mYW1pbHk6Q29uc29s
YXMiPiZndDsmZ3Q7PC9zcGFuPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFt
aWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90OyI+PG86cD4mbmJz
cDs8L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+
PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMC41cHQ7Zm9udC1mYW1pbHk6Q29uc29sYXMiPiZndDsm
Z3Q7IHdoYXQgZG9lcyBpc29sYXRpbmcgdHdvIHBsYW5lcyBtZWFuPyBkb2VzIGl0IG1lYW4gdGhl
eSBoYXZlIGRpZmZlcmVudA0KPC9zcGFuPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2Zv
bnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90OyI+PG86
cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+
PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMC41cHQ7Zm9udC1mYW1pbHk6Q29uc29sYXMiPiZndDsm
Z3Q7IHNlY3VyaXR5IHJlcXVpcmVtZW50L2lzc3Vlcz8gT3IgZG9lcyBpdCBtZWFuIHRoZXkgbmVl
ZCBkaWZmZXJlbnQgcHJvdG9jb2xzPzwvc3Bhbj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBw
dDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDsi
PjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3Jt
YWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTAuNXB0O2ZvbnQtZmFtaWx5OkNvbnNvbGFzIj4m
Z3Q7Jmd0Ozwvc3Bhbj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTom
cXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDsiPjxvOnA+Jm5ic3A7PC9v
OnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFu
IHN0eWxlPSJmb250LXNpemU6MTAuNXB0O2ZvbnQtZmFtaWx5OkNvbnNvbGFzIj4mZ3Q7Jmd0OyBX
aGF0IGFyZSB0aGUga2V5IGRpZmZlcmVuY2VzIHdpdGggcmVnYXJkIHRvIHRoZSBzZWN1cml0eSBy
ZXF1aXJlbWVudHMNCjwvc3Bhbj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZh
bWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDsiPjxvOnA+PC9v
OnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFu
IHN0eWxlPSJmb250LXNpemU6MTAuNXB0O2ZvbnQtZmFtaWx5OkNvbnNvbGFzIj4mZ3Q7Jmd0OyBm
b3ImbmJzcDsgSTJSUyBwbGFuZSBhbmQgZm9yIG1hbmFnZW1lbnQgcGxhbmU/Jm5ic3A7IFNlY3Rp
b24gMy4xIGRlc2NyaWJlcyB0aGUNCjwvc3Bhbj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBw
dDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDsi
PjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3Jt
YWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTAuNXB0O2ZvbnQtZmFtaWx5OkNvbnNvbGFzIj4m
Z3Q7Jmd0OyBpbnRlcmFjdGlvbiBiZXR3ZWVuIEkyUlMgcGxhbmUgYW5kIG1hbmFnZW1lbnQgcGxh
bmUuIEJ1dCBJIHNlZSB0aGUNCjwvc3Bhbj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtm
b250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDsiPjxv
OnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwi
PjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTAuNXB0O2ZvbnQtZmFtaWx5OkNvbnNvbGFzIj4mZ3Q7
Jmd0OyBzZWN1cml0eSByZXF1aXJlbWVudCBmb3IgdGhlIG1hbmFnZW1lbnQgcGxhbmUgaXMgc2lt
aWxhciB0byBJMlJTIHBsYW5lIC48L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7
Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij48
bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFs
Ij48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjVwdDtmb250LWZhbWlseTpDb25zb2xhcyI+Jmd0
OyZndDsgSWYgeW91IHRoaW5rIHRoYXQgdGhleSBhcmUgdmVyeSBkaWZmZXJlbnQsIGNhbiB5b3Ug
ZWxhYm9yYXRlIG1vcmU/PC9zcGFuPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQt
ZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90OyI+PG86cD48
L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNw
YW4gc3R5bGU9ImZvbnQtc2l6ZToxMC41cHQ7Zm9udC1mYW1pbHk6Q29uc29sYXMiPiZndDsmZ3Q7
PC9zcGFuPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0Nh
bGlicmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90OyI+PG86cD4mbmJzcDs8L286cD48L3Nw
YW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9
ImZvbnQtc2l6ZToxMC41cHQ7Zm9udC1mYW1pbHk6Q29uc29sYXMiPiZndDsmZ3Q7IFNlY3Rpb24g
My40IGhhcyB0aXRsZSAmcXVvdDtSZWNvbW1lbmRhdGlvbnMmcXVvdDssIGJ1dCB0aGUgY29udGVu
dCBhcmUgYWxsDQo8L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1p
bHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij48bzpwPjwvbzpw
Pjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBz
dHlsZT0iZm9udC1zaXplOjEwLjVwdDtmb250LWZhbWlseTpDb25zb2xhcyI+Jmd0OyZndDsgcmVx
dWlyZW1lbnRzLiBXaHkgbm90IG5hbWUgdGhlIHNlY3Rpb24gJnF1b3Q7UmVxdWlyZW1lbnQmcXVv
dDs/PC9zcGFuPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90
O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90OyI+PG86cD48L286cD48L3NwYW4+
PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZv
bnQtc2l6ZToxMC41cHQ7Zm9udC1mYW1pbHk6Q29uc29sYXMiPiZndDsmZ3Q7PC9zcGFuPjxzcGFu
IHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDss
JnF1b3Q7c2Fucy1zZXJpZiZxdW90OyI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPg0KPC9k
aXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZTox
MC41cHQ7Zm9udC1mYW1pbHk6Q29uc29sYXMiPiZndDsmZ3Q7IFJFUSAyOiBEb2VzIGl0IHRoYXQg
YSBkaWZmZXJlbnQgSVAgYWRkcmVzcyB0aGFuIHRoZSBvbmUgdXNlZCBieSB0aGUNCjwvc3Bhbj48
c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1
b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDsiPjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2
Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTAu
NXB0O2ZvbnQtZmFtaWx5OkNvbnNvbGFzIj4mZ3Q7Jmd0OyBtYW5hZ2VtZW50IHN5c3RlbT88L3Nw
YW4+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJy
aSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8
L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXpl
OjEwLjVwdDtmb250LWZhbWlseTpDb25zb2xhcyI+Jmd0OyZndDs8L3NwYW4+PHNwYW4gc3R5bGU9
ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtz
YW5zLXNlcmlmJnF1b3Q7Ij48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxk
aXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjVwdDtm
b250LWZhbWlseTpDb25zb2xhcyI+Jmd0OyZndDsgSG93IGlzIFJFUSAyMiBkaWZmZXJlbnQgZnJv
bSBSRVEgMjE/PC9zcGFuPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5
OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90OyI+PG86cD48L286cD48
L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5
bGU9ImZvbnQtc2l6ZToxMC41cHQ7Zm9udC1mYW1pbHk6Q29uc29sYXMiPiZndDsmZ3Q7PC9zcGFu
PjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkm
cXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90OyI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9w
Pg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQt
c2l6ZToxMC41cHQ7Zm9udC1mYW1pbHk6Q29uc29sYXMiPiZndDsmZ3Q7IFJFUSAyNyBpcyBoYXJk
IHRvIGVuZm9yY2UuIEhvdyBhYm91dCBzYXkgc29tZXRoaW5nIGxpa2UgJnF1b3Q7c2hvdWxkbid0
DQo8L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7
Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij48bzpwPjwvbzpwPjwvc3Bhbj48
L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9u
dC1zaXplOjEwLjVwdDtmb250LWZhbWlseTpDb25zb2xhcyI+Jmd0OyZndDsgc2VuZCBhbnkgaW5m
b3JtYXRpb24gYmV5b25kIHdoYXQgaGF2ZSBiZWVuIGRlZmluZWQgYnkgdGhlIEkyUlMgZGF0YSBt
b2RlbCZxdW90Oz88L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1p
bHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij48bzpwPjwvbzpw
Pjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBz
dHlsZT0iZm9udC1zaXplOjEwLjVwdDtmb250LWZhbWlseTpDb25zb2xhcyI+Jmd0OyZndDs8L3Nw
YW4+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJy
aSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48
L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9u
dC1zaXplOjEwLjVwdDtmb250LWZhbWlseTpDb25zb2xhcyI+Jmd0OyZndDsgUkVRIDMwOiBzaW1w
bHkgY29udHJvbGxpbmcgdGhlIHJlc291cmNlIGNhbiBoYXJkbHkgcHJldmVudCBEb1MuPC9zcGFu
PjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkm
cXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90OyI+PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9k
aXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZTox
MC41cHQ7Zm9udC1mYW1pbHk6Q29uc29sYXMiPiZndDsmZ3Q7IE1hbGljaW91cyBjbGllbnQgY2Fu
IG9jY3VweSB0aGUgcmVzb3VyY2Ugd2hpbGUgdGhlIHZhbGlkIG9uZSBjYW4ndCBhY2Nlc3MuPC9z
cGFuPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGli
cmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90OyI+PG86cD48L286cD48L3NwYW4+PC9wPg0K
PC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6
ZToxMC41cHQ7Zm9udC1mYW1pbHk6Q29uc29sYXMiPiZndDsmZ3Q7PC9zcGFuPjxzcGFuIHN0eWxl
PSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7
c2Fucy1zZXJpZiZxdW90OyI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8
ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMC41cHQ7
Zm9udC1mYW1pbHk6Q29uc29sYXMiPiZndDsmZ3Q7IFRoYW5rcyBmb3IgY29uc2lkZXJhdGlvbiw8
L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2Fs
aWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij48bzpwPjwvbzpwPjwvc3Bhbj48L3A+
DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1z
aXplOjEwLjVwdDtmb250LWZhbWlseTpDb25zb2xhcyI+Jmd0OyZndDs8L3NwYW4+PHNwYW4gc3R5
bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVv
dDtzYW5zLXNlcmlmJnF1b3Q7Ij48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4N
CjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjVw
dDtmb250LWZhbWlseTpDb25zb2xhcyI+Jmd0OyZndDsgTGluZGE8L3NwYW4+PHNwYW4gc3R5bGU9
ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtz
YW5zLXNlcmlmJnF1b3Q7Ij48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8
cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjVwdDtmb250LWZh
bWlseTpDb25zb2xhcyI+Jmd0OyZndDs8L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4w
cHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7
Ij48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0i
TXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjVwdDtmb250LWZhbWlseTpDb25z
b2xhcyI+Jmd0OyZndDsgKkZyb206KmkycnMgWzxhIGhyZWY9Im1haWx0bzppMnJzLWJvdW5jZXNA
aWV0Zi5vcmciIHRhcmdldD0iX2JsYW5rIj5tYWlsdG86aTJycy1ib3VuY2VzQGlldGYub3JnPC9h
Pl0gKk9uIEJlaGFsZiBPZiAqU3VzYW4gSGFyZXM8L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQtc2l6
ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlm
JnF1b3Q7Ij48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0i
TXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjVwdDtmb250LWZhbWlseTpDb25z
b2xhcyI+Jmd0OyZndDsgKlNlbnQ6KiBNb25kYXksIEF1Z3VzdCAxNywgMjAxNSAxMjo1MCBQTTwv
c3Bhbj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxp
YnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDsiPjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4N
CjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNp
emU6MTAuNXB0O2ZvbnQtZmFtaWx5OkNvbnNvbGFzIj4mZ3Q7Jmd0OyAqVG86Kg0KPGEgaHJlZj0i
bWFpbHRvOmkycnNAaWV0Zi5vcmciIHRhcmdldD0iX2JsYW5rIj5pMnJzQGlldGYub3JnPC9hPjwv
c3Bhbj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxp
YnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDsiPjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4N
CjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNp
emU6MTAuNXB0O2ZvbnQtZmFtaWx5OkNvbnNvbGFzIj4mZ3Q7Jmd0OyAqQ2M6KiAnSmVmZnJleSBI
YWFzJzsNCjxhIGhyZWY9Im1haWx0bzpkYW5pZWwubWlnYXVsdEBlcmljc3Nvbi5jb20iIHRhcmdl
dD0iX2JsYW5rIj5kYW5pZWwubWlnYXVsdEBlcmljc3Nvbi5jb208L2E+OyAnSm9lbCBIYWxwZXJu
JzsNCjwvc3Bhbj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVv
dDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDsiPjxvOnA+PC9vOnA+PC9zcGFu
PjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJm
b250LXNpemU6MTAuNXB0O2ZvbnQtZmFtaWx5OkNvbnNvbGFzIj4mZ3Q7Jmd0OyA8YSBocmVmPSJt
YWlsdG86c2hhcmVzQG5kemguY29tIiB0YXJnZXQ9Il9ibGFuayI+DQpzaGFyZXNAbmR6aC5jb208
L2E+OyAnQWxpYSBBdGxhcyc8L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9u
dC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij48bzpw
PjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48
c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjVwdDtmb250LWZhbWlseTpDb25zb2xhcyI+Jmd0OyZn
dDsgKlN1YmplY3Q6KiBbaTJyc10gZHJhZnQtbWdsdC1pMnJzLXNlY3VyaXR5LXJlcXVpcmVtZW50
cy0wMCAyIFdlZWsgV0cNCjwvc3Bhbj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250
LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDsiPjxvOnA+
PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxz
cGFuIHN0eWxlPSJmb250LXNpemU6MTAuNXB0O2ZvbnQtZmFtaWx5OkNvbnNvbGFzIj4mZ3Q7Jmd0
OyBhZG9wdGlvbiBjYWxsICg4LzE3IHRvIDgvMzEpPC9zcGFuPjxzcGFuIHN0eWxlPSJmb250LXNp
emU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJp
ZiZxdW90OyI+PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9
Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMC41cHQ7Zm9udC1mYW1pbHk6Q29u
c29sYXMiPiZndDsmZ3Q7PC9zcGFuPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQt
ZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90OyI+PG86cD4m
bmJzcDs8L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1h
bCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMC41cHQ7Zm9udC1mYW1pbHk6Q29uc29sYXMiPiZn
dDsmZ3Q7IFRoaXMgYmVnaW5zIGEgMiB3ZWVrIFdHIGFkb3B0aW9uIGNhbGwgZm9yDQo8L3NwYW4+
PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZx
dW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rp
dj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEw
LjVwdDtmb250LWZhbWlseTpDb25zb2xhcyI+Jmd0OyZndDsgZHJhZnQtbWdsdC1pMnJzLXNlY3Vy
aXR5LXJlcXVpcmVtZW50cy4mbmJzcDsgVGhpcyBkcmFmdCBkaXNjdXNzZXMgdGhlDQo8L3NwYW4+
PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZx
dW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rp
dj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEw
LjVwdDtmb250LWZhbWlseTpDb25zb2xhcyI+Jmd0OyZndDsgc2VjdXJpdHkgcmVxdWlyZW1lbnRz
IGZvciB0aGUgSTJSUyBlbnZpcm9ubWVudC4mbmJzcDsgWW91IGNhbiBmaW5kIHRoZSBkcmFmdCBh
dDo8L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7
Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij48bzpwPjwvbzpwPjwvc3Bhbj48
L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9u
dC1zaXplOjEwLjVwdDtmb250LWZhbWlseTpDb25zb2xhcyI+Jmd0OyZndDs8L3NwYW4+PHNwYW4g
c3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90Oywm
cXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rp
dj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEw
LjVwdDtmb250LWZhbWlseTpDb25zb2xhcyI+Jmd0OyZndDsgPGEgaHJlZj0iaHR0cHM6Ly90b29s
cy5pZXRmLm9yZy9odG1sL2RyYWZ0LW1nbHQtaTJycy1zZWN1cml0eS1lbnZpcm9ubWVudC1yZXFz
IiB0YXJnZXQ9Il9ibGFuayI+DQpodHRwczovL3Rvb2xzLmlldGYub3JnL2h0bWwvZHJhZnQtbWds
dC1pMnJzLXNlY3VyaXR5LWVudmlyb25tZW50LXJlcXM8L2E+PC9zcGFuPjxzcGFuIHN0eWxlPSJm
b250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fu
cy1zZXJpZiZxdW90OyI+PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAg
Y2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMC41cHQ7Zm9udC1mYW1p
bHk6Q29uc29sYXMiPiZndDsmZ3Q7IC08L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4w
cHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7
Ij48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9y
bWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjVwdDtmb250LWZhbWlseTpDb25zb2xhcyI+
Jmd0OyZndDsgMDA8L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1p
bHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij48bzpwPjwvbzpw
Pjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBz
dHlsZT0iZm9udC1zaXplOjEwLjVwdDtmb250LWZhbWlseTpDb25zb2xhcyI+Jmd0OyZndDs8L3Nw
YW4+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJy
aSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48
L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9u
dC1zaXplOjEwLjVwdDtmb250LWZhbWlseTpDb25zb2xhcyI+Jmd0OyZndDsgQSBzZWN1cml0eSBy
ZXZpZXdlciB3aWxsIHJldmlldyB0aGlzIGRyYWZ0IGR1cmluZyB0aGUgdGltZSA4LzIwIHRvPC9z
cGFuPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGli
cmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90OyI+PG86cD48L286cD48L3NwYW4+PC9wPg0K
PC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6
ZToxMC41cHQ7Zm9udC1mYW1pbHk6Q29uc29sYXMiPiZndDsmZ3Q7IDgvMjUuJm5ic3A7Jm5ic3A7
IFdlIHdpbGwgcG9zdCB0aGUgc2VjdXJpdHkgZGlyZWN0b3JhdGUgcmV2aWV3IHRvIHRoaXMgZGlz
Y3Vzc2lvbi48L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6
JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij48bzpwPjwvbzpwPjwv
c3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHls
ZT0iZm9udC1zaXplOjEwLjVwdDtmb250LWZhbWlseTpDb25zb2xhcyI+Jmd0OyZndDs8L3NwYW4+
PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZx
dW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+
DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1z
aXplOjEwLjVwdDtmb250LWZhbWlseTpDb25zb2xhcyI+Jmd0OyZndDsgU3VlIEhhcmVzPC9zcGFu
PjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkm
cXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90OyI+PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9k
aXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZTox
MC41cHQ7Zm9udC1mYW1pbHk6Q29uc29sYXMiPiZndDsmZ3Q7PC9zcGFuPjxzcGFuIHN0eWxlPSJm
b250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fu
cy1zZXJpZiZxdW90OyI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2
Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMC41cHQ7Zm9u
dC1mYW1pbHk6Q29uc29sYXMiPiZndDs8L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4w
cHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7
Ij48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0i
TXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjVwdDtmb250LWZhbWlseTpDb25z
b2xhcyI+Jm5ic3A7PC9zcGFuPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFt
aWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90OyI+PG86cD48L286
cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4g
c3R5bGU9ImZvbnQtc2l6ZToxMC41cHQ7Zm9udC1mYW1pbHk6Q29uc29sYXMiPl9fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fPC9zcGFuPjxzcGFuIHN0eWxlPSJm
b250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fu
cy1zZXJpZiZxdW90OyI+PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAg
Y2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMC41cHQ7Zm9udC1mYW1p
bHk6Q29uc29sYXMiPmkycnMgbWFpbGluZyBsaXN0PC9zcGFuPjxzcGFuIHN0eWxlPSJmb250LXNp
emU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJp
ZiZxdW90OyI+PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9
Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMC41cHQiPjxhIGhyZWY9Im1haWx0
bzppMnJzQGlldGYub3JnIiB0YXJnZXQ9Il9ibGFuayI+PHNwYW4gc3R5bGU9ImZvbnQtZmFtaWx5
OkNvbnNvbGFzIj5pMnJzQGlldGYub3JnPC9zcGFuPjwvYT48L3NwYW4+PHNwYW4gc3R5bGU9ImZv
bnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5z
LXNlcmlmJnF1b3Q7Ij48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBj
bGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjVwdCI+PGEgaHJlZj0i
aHR0cHM6Ly93d3cuaWV0Zi5vcmcvbWFpbG1hbi9saXN0aW5mby9pMnJzIiB0YXJnZXQ9Il9ibGFu
ayI+PHNwYW4gc3R5bGU9ImZvbnQtZmFtaWx5OkNvbnNvbGFzIj5odHRwczovL3d3dy5pZXRmLm9y
Zy9tYWlsbWFuL2xpc3RpbmZvL2kycnM8L3NwYW4+PC9hPjwvc3Bhbj48c3BhbiBzdHlsZT0iZm9u
dC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMt
c2VyaWYmcXVvdDsiPjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNs
YXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTAuNXB0Ij4mbmJzcDs8L3Nw
YW4+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJy
aSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8
L2Rpdj4NCjwvZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdpbi1ib3R0b206
MTIuMHB0Ij48YnI+DQpfX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fXzxicj4NCmkycnMgbWFpbGluZyBsaXN0PGJyPg0KPGEgaHJlZj0ibWFpbHRvOmkycnNAaWV0
Zi5vcmciPmkycnNAaWV0Zi5vcmc8L2E+PGJyPg0KPGEgaHJlZj0iaHR0cHM6Ly93d3cuaWV0Zi5v
cmcvbWFpbG1hbi9saXN0aW5mby9pMnJzIiB0YXJnZXQ9Il9ibGFuayI+aHR0cHM6Ly93d3cuaWV0
Zi5vcmcvbWFpbG1hbi9saXN0aW5mby9pMnJzPC9hPjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8
cCBjbGFzcz0iTXNvTm9ybWFsIj48bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjwvZGl2Pg0KPC9kaXY+
DQo8L2Rpdj4NCjwvYm9keT4NCjwvaHRtbD4NCg==

--_000_4A95BA014132FF49AE685FAB4B9F17F657D1757Edfweml701chm_--

--_004_4A95BA014132FF49AE685FAB4B9F17F657D1757Edfweml701chm_
Content-Type: application/vnd.openxmlformats-officedocument.wordprocessingml.document;
	name="I2RS security requirement for closed enviroment.docx"
Content-Description: I2RS security requirement for closed enviroment.docx
Content-Disposition: attachment;
	filename="I2RS security requirement for closed enviroment.docx"; size=17389;
	creation-date="Mon, 24 Aug 2015 19:50:54 GMT";
	modification-date="Mon, 24 Aug 2015 22:07:48 GMT"
Content-Transfer-Encoding: base64
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--_004_4A95BA014132FF49AE685FAB4B9F17F657D1757Edfweml701chm_--


From nobody Tue Aug 25 09:21:31 2015
Return-Path: <linda.dunbar@huawei.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AE36A1A0078 for <i2rs@ietfa.amsl.com>; Tue, 25 Aug 2015 09:21:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.21
X-Spam-Level: 
X-Spam-Status: No, score=-4.21 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id X6EUgbqCQKEI for <i2rs@ietfa.amsl.com>; Tue, 25 Aug 2015 09:21:23 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 898051A006D for <i2rs@ietf.org>; Tue, 25 Aug 2015 09:21:20 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml405-hub.china.huawei.com) ([172.18.7.190]) by lhrrg02-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id BWT12611; Tue, 25 Aug 2015 16:21:18 +0000 (GMT)
Received: from DFWEML706-CHM.china.huawei.com (10.193.5.225) by lhreml405-hub.china.huawei.com (10.201.5.242) with Microsoft SMTP Server (TLS) id 14.3.235.1; Tue, 25 Aug 2015 17:21:17 +0100
Received: from DFWEML701-CHM.china.huawei.com ([10.193.5.50]) by dfweml706-chm ([10.193.5.225]) with mapi id 14.03.0235.001; Tue, 25 Aug 2015 09:21:05 -0700
From: Linda Dunbar <linda.dunbar@huawei.com>
To: Linda Dunbar <linda.dunbar@huawei.com>, Daniel Migault <daniel.migault@ericsson.com>
Thread-Topic: [i2rs] Suggested section/text to be added to draft-mglt-i2rs-security-environment-reqs-00 to address security threats in Closed Envionment.
Thread-Index: AQHQ3rxzm+gQg6/jUU6oO53mC16Ds54c5ePA
Date: Tue, 25 Aug 2015 16:21:04 +0000
Message-ID: <4A95BA014132FF49AE685FAB4B9F17F657D17BA5@dfweml701-chm>
References: <CADZyTknZ4ZzrxTB_Miud=-xMfckmD4LR7vdz+3uAg9gL7X22-g@mail.gmail.com> <4A95BA014132FF49AE685FAB4B9F17F657D1757E@dfweml701-chm>
In-Reply-To: <4A95BA014132FF49AE685FAB4B9F17F657D1757E@dfweml701-chm>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
x-originating-ip: [10.192.11.236]
Content-Type: multipart/mixed; boundary="_004_4A95BA014132FF49AE685FAB4B9F17F657D17BA5dfweml701chm_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/4LVV0eG8BStMZsLBJKClfahVk9U>
Cc: Jeffrey Haas <jhaas@pfrc.org>, "i2rs@ietf.org" <i2rs@ietf.org>, "Joel M. Halpern" <jmh@joelhalpern.com>, Susan Hares <shares@ndzh.com>, Alia Atlas <akatlas@gmail.com>
Subject: Re: [i2rs] Suggested section/text to be added to draft-mglt-i2rs-security-environment-reqs-00 to address security threats in Closed Envionment.
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 Aug 2015 16:21:29 -0000

--_004_4A95BA014132FF49AE685FAB4B9F17F657D17BA5dfweml701chm_
Content-Type: multipart/alternative;
	boundary="_000_4A95BA014132FF49AE685FAB4B9F17F657D17BA5dfweml701chm_"

--_000_4A95BA014132FF49AE685FAB4B9F17F657D17BA5dfweml701chm_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_4A95BA014132FF49AE685FAB4B9F17F657D17BA5dfweml701chm_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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=

--_000_4A95BA014132FF49AE685FAB4B9F17F657D17BA5dfweml701chm_--

--_004_4A95BA014132FF49AE685FAB4B9F17F657D17BA5dfweml701chm_
Content-Type: application/vnd.openxmlformats-officedocument.wordprocessingml.document;
	name="I2RS security requirement for closed enviroment v1.docx"
Content-Description: I2RS security requirement for closed enviroment v1.docx
Content-Disposition: attachment;
	filename="I2RS security requirement for closed enviroment v1.docx";
	size=18064; creation-date="Mon, 24 Aug 2015 19:50:54 GMT";
	modification-date="Mon, 24 Aug 2015 22:56:48 GMT"
Content-Transfer-Encoding: base64
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==

--_004_4A95BA014132FF49AE685FAB4B9F17F657D17BA5dfweml701chm_--


From nobody Tue Aug 25 10:04:17 2015
Return-Path: <mglt.ietf@gmail.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 707691A90F0 for <i2rs@ietfa.amsl.com>; Tue, 25 Aug 2015 10:04:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.277
X-Spam-Level: 
X-Spam-Status: No, score=-1.277 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FM_FORGED_GMAIL=0.622, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4Ae13fZB2yzK for <i2rs@ietfa.amsl.com>; Tue, 25 Aug 2015 10:04:11 -0700 (PDT)
Received: from mail-io0-x22f.google.com (mail-io0-x22f.google.com [IPv6:2607:f8b0:4001:c06::22f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3F65C1A8913 for <i2rs@ietf.org>; Tue, 25 Aug 2015 10:04:11 -0700 (PDT)
Received: by iods203 with SMTP id s203so194460208iod.0 for <i2rs@ietf.org>; Tue, 25 Aug 2015 10:04:10 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:sender:in-reply-to:references:date:message-id:subject :from:to:cc:content-type; bh=P6TK5j9K017aFgxdkcayB319n3k9sWT/1Mf4MiB2sIo=; b=GrrccDHilz0slLjo210RY/dQXAsZllXL/nvQnXlmaL+5Vah931s/TIb7DwksxNizMZ Wp/5cH7LQk08J85+qilcgYqKbBRwQUE/Gl+iZ546wFpd2fvRu7D/ldPvLyN/kuPlbyFt XsPHwh9yQWXnQCzPHNL8WtO0p3uXhRwnRNbs8RcZuuvHwBPCORRryaBY7N5PWSqLdbFv RbnDuU8p52Df+5fXrMiGyoB7gPHdZ8dbISPWKxvSfcqPvNzjZgk1TbVFPjWvvvyVMqYY wrkujGQBCcIMtKvT0qMWnLNv1Ubr3dTHbb3HXFPUnZPpR/xlbk5WhBfoIco+FlctutUq IWVQ==
MIME-Version: 1.0
X-Received: by 10.107.37.12 with SMTP id l12mr22591672iol.92.1440522250573; Tue, 25 Aug 2015 10:04:10 -0700 (PDT)
Sender: mglt.ietf@gmail.com
Received: by 10.79.21.196 with HTTP; Tue, 25 Aug 2015 10:04:10 -0700 (PDT)
In-Reply-To: <4A95BA014132FF49AE685FAB4B9F17F657D17BA5@dfweml701-chm>
References: <CADZyTknZ4ZzrxTB_Miud=-xMfckmD4LR7vdz+3uAg9gL7X22-g@mail.gmail.com> <4A95BA014132FF49AE685FAB4B9F17F657D1757E@dfweml701-chm> <4A95BA014132FF49AE685FAB4B9F17F657D17BA5@dfweml701-chm>
Date: Tue, 25 Aug 2015 13:04:10 -0400
X-Google-Sender-Auth: ocXw-CTE5p2i933LsFBkIvymIRY
Message-ID: <CADZyTkm3Fj4=XCGkuuCf9UFnEQV0=wQ3s_SXnyn_t8VUkA97sA@mail.gmail.com>
From: Daniel Migault <daniel.migault@ericsson.com>
To: Linda Dunbar <linda.dunbar@huawei.com>
Content-Type: multipart/alternative; boundary=001a1141b24e095bc3051e25b9e8
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/kUTVySHv7nrViW34924UJfcAAsM>
Cc: Jeffrey Haas <jhaas@pfrc.org>, "i2rs@ietf.org" <i2rs@ietf.org>, "Joel M. Halpern" <jmh@joelhalpern.com>, Susan Hares <shares@ndzh.com>, Alia Atlas <akatlas@gmail.com>
Subject: Re: [i2rs] Suggested section/text to be added to draft-mglt-i2rs-security-environment-reqs-00 to address security threats in Closed Envionment.
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 Aug 2015 17:04:16 -0000

--001a1141b24e095bc3051e25b9e8
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Hi Linda,

Thank for the comments. I am currently addressing all comments I received..
I hope I can provide a updated version soon. I will keep you informed as
soon as I have something more or less in shape.

BR,
Daniel

On Tue, Aug 25, 2015 at 12:21 PM, Linda Dunbar <linda.dunbar@huawei.com>
wrote:

> Daniel,
>
>
>
> I added 3 more I2RS security requirements for the =E2=80=9CClosed Environ=
ment=E2=80=9D,
> please use the revised section attached.
>
>
>
> Cheers,
>
> Linda
>
>
>
> *From:* i2rs [mailto:i2rs-bounces@ietf.org] *On Behalf Of *Linda Dunbar
> *Sent:* Monday, August 24, 2015 5:09 PM
> *To:* Daniel Migault
> *Cc:* Jeffrey Haas; i2rs@ietf.org; Joel M. Halpern; Alia Atlas
> *Subject:* [i2rs] Suggested section/text to be added to
> draft-mglt-i2rs-security-environment-reqs-00 to address security threats =
in
> Closed Envionment.
>
>
>
> Daniel,
>
>
>
> Thank you for willing to address my comments. To make it easier for you, =
I
> put together a section to describe the security threats in Closed
> Environment and necessary requirement for I2RS. See the attached.
>
>
>
> Closed environment deployment can easily give people a sense of secure
> because the links between I2RS Client and I2RS Agent are guided by a
> physical =E2=80=9CWall=E2=80=9D.  The false sense of =E2=80=9CSecure=E2=
=80=9D is actually more dangerous
> because it can easily make the deployment miss the crucial security
> procedure.
>
>
>
> Therefore, I think it is important to have a dedicated section on securit=
y
> threats and requirement for the Closed Environment.
>
>
>
> Linda
>
>
>
> *From:* mglt.ietf@gmail.com [mailto:mglt.ietf@gmail.com
> <mglt.ietf@gmail.com>] *On Behalf Of *Daniel Migault
> *Sent:* Monday, August 24, 2015 12:55 PM
> *To:* Linda Dunbar
> *Cc:* Joel M. Halpern; i2rs@ietf.org; Jeffrey Haas; Alia Atlas
> *Subject:* Re: [i2rs] Review comments to
> draft-mglt-i2rs-security-environment-reqs-00 (was RE:
> draft-mglt-i2rs-security-requirements-00 2 Week WG adoption call (8/17 to
> 8/31)
>
>
>
> Hi Linda,
>
> Thank you for your comments. I agree we need to address more specifically
> or explicitly the "most common" use case. I agree with your comments and =
we
> will consider them to improve and clarify the text of the next version.
> Thank you. To me the i2rs plane provides a limited number of
> functionnalities that may be provided to different independant tenants.
>
> BR,
>
> Daniel
>
>
>
>
>
> On Mon, Aug 24, 2015 at 1:37 PM, Linda Dunbar <linda.dunbar@huawei.com>
> wrote:
>
> Joel,
>
>
>
> Agree with you that =E2=80=9Cwe don=E2=80=99t need to build different pro=
tocol stacks for
> the different deployments=E2=80=9D.
>
> But the =E2=80=9Cenvironment-req=E2=80=9D draft is not about =E2=80=9CPro=
tocol=E2=80=9D, but about
> security issues under different =E2=80=9Cenvironment=E2=80=9D.
>
>
>
> Among all our customers who are interested in I2RS, majority of them
> (>90%) will deploy them in a closed environment, i.e. physically secured
> connection between I2RS agent and I2RS client. Therefore, it is important
> to =E2=80=9Cprovides an analysis of the security issues of=E2=80=9D of th=
is commonly
> deployed environment.
>
>
>
> I suggest adding this Figure to Section 1 of the document:
>
>
>
> Closed  (over open Chnl ###>)          Open (over secure Chnl --->)
>
> +---------------------------------+
>
> |      ***********************   |      ***********************  |
>
> |       *    Application A    *   |      *    Application B    *  |
>
> |       *                     *   |      *                     *  |
>
> |       *  +----------------+ *   |      *  +----------------+ *  |
>
> |       *  |   Client A     | *   |      *  |   Client B     | *  |
>
> |       *  +----------------+ *   |      *  +----------------+ *  |
>
> |       ******* ^ *************   |      ***** ^ ****** ^ ******  |
>
> |               #                 |            |        |         |
>
> |               #                 |            |        |   |-----|
>
> |               #               |                     |   |
>
> |  ************ v * * * * ********|   ***************** v * v ********
>
> |  *  +---------------------+     |   *  +---------------------+     *
>
> |  *  |     Agent 1         |     |   *  |    Agent 2          |     *
>
> |  *  +---------------------+     |   *  +---------------------+     *
>
> |  *     ^        ^  ^   ^        |   *     ^        ^  ^   ^        *
>
>
>
>
>
>
>
> Just think about this fact: today=E2=80=99s router configuration in produ=
ction
> environment can only be performed by a few authorized people with EMS/NMS
> physically and securely separated. If the majority of the I2RS environmen=
t
> requirement is about open connection, I2RS WG will spend a lot energy
> developing the very sophisticated protocols which is expensive to develop
> and harder to deploy.
>
>
>
> I am not against this development, but IMHO, to gain wider and quicker
> I2RS deployment in production environment, it is necessary to have a very
> *lean* I2RS solution first, and to have a well documented security
> requirement for the common deployment environment. E.g. a single Controll=
er
> (or the I2RS client) directly connected to their devices via their intern=
al
> network, where the connection is physically isolated from other network a=
nd
> protected by separate mechanisms. Also remember, many operators will use
> I2RS to control a small number of selective routers (mostly routers at
> ingress/egress boundary) for value added services.
>
>
>
>
>
>
>
> Some of my detailed questions and comments to the =E2=80=9Csecurity-requi=
rements=E2=80=9D
> are still applicable to the =E2=80=9Cenvironment-req=E2=80=9D document be=
cause they have
> the same text. Plus a few more for the =E2=80=9Cenvironment-req=E2=80=9D =
document. Hope the
> authors can address them.
>
>
>
>
>
> Section 3:
>
>
>
> What are the key differences with regard to the security requirements for
>  I2RS plane and for management plane?  Section 3.1 describes the
> interaction between I2RS plane and management plane. But I see the securi=
ty
> requirement for the management plane are all applicable to the security
> requirement to I2RS plane . If you think that they are very different, ca=
n
> you elaborate more?
>
>
>
> Section 3.4 has title =E2=80=9CRecommendations=E2=80=9D, but the content =
are all
> requirements. Why not name the section =E2=80=9CRequirement=E2=80=9D?
>
>
>
> REQ 2: Does it that a different IP address than the one used by the
> management system?
>
>
>
> REQ 21: is more about I2RS requirement, less about =E2=80=9CSecurity=E2=
=80=9D requirement.
>
>
>
> REQ 24: isn=E2=80=99t it the general goal of I2RS? Not really security pe=
r se.
> (should be included in the general I2RS requirement or architecture).
>
>
>
>
>
> REQ 26: simply controlling the resource can hardly prevent DoS. Malicious
> client can occupy the resource while the valid one can't access.
>
>
>
> Thanks for your consideration,
>
> Linda
>
>
>
>
>
> -----Original Message-----
> From: i2rs [mailto:i2rs-bounces@ietf.org <i2rs-bounces@ietf.org>] On
> Behalf Of Joel M. Halpern
> Sent: Friday, August 21, 2015 12:20 PM
> To: Linda Dunbar; i2rs@ietf.org
> Cc: 'Jeffrey Haas'; daniel.migault@ericsson.com; 'Alia Atlas'
> Subject: Re: [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG
> adoption call (8/17 to 8/31)
>
>
>
> Yes, one of the two last calls is for the environment document.
>
>
>
> Having a dedicated physical channel is one of the ways identified in the
> draft to provide the required isolation.
>
>
>
> While such an environment is clearly supportable, I do not think we shoul=
d
> reduce the internal protocol requirements (such as MTI security for the
> control channel) just because there are circumstances where such it won't
> be needed.  I don't expect that we will build different protocol stacks f=
or
> the different deployments.
>
>
>
> The purpose of this draft is to describe the environmental assumptions,
> which assumptions can be met in various ways.
>
>
>
> Yours,
>
> Joel
>
>
>
> On 8/21/15 12:56 PM, Linda Dunbar wrote:
>
> > Joel,
>
> >
>
> > If it is the "environmental one", it is more important to differentiate
> the requirements for different environments on how the I2RS client & Agen=
t
> are connected.
>
> >
>
> > One of our customers stated that their environment has a single
> Controller (or the I2RS client) directly connected to their devices via
> their internal network, where the connection is physically isolated from
> other network and protected by separate mechanisms, they don't need all
> those sophisticated authentication procedure.
>
> >
>
> > We need to address this environment, i.e. having a simpler security
> requirement for this environment than the environment where I2RS Client i=
s
> connected via public network.
>
> >
>
> > Linda
>
> >
>
> >
>
> > -----Original Message-----
>
> > From: Joel Halpern Direct [mailto:jmh.direct@joelhalpern.com
> <jmh.direct@joelhalpern.com>]
>
> > Sent: Friday, August 21, 2015 10:53 AM
>
> > To: Linda Dunbar; i2rs@ietf.org
>
> > Cc: 'Jeffrey Haas'; daniel.migault@ericsson.com; 'Joel Halpern'; 'Alia
> Atlas'
>
> > Subject: Re: [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG
>
> > adoption call (8/17 to 8/31)
>
> >
>
> > First, there may be some confusion because the announcement.  I presume
> that you are talking about the -environments documents.
>
> >
>
> > If the WG concludes that a different chapter structure is useful, we ca=
n
> of course change it.  Given that the goal is environment description, I a=
m
> not sure your proposed structure is significantly better than the existin=
g
> one.
>
> >
>
> > I believe your comment about the text  reading "where security function=
s
> may be hosted" is well taken, and we should remove that text when we next
> revise the document.
>
> >
>
> > The isolation text is about the need to keep things separate, and the
> various possible means are degrees / approaches to separation.
>
> > Isolation is not about treating things differently, nor is it explicitl=
y
> about using different protocols.  So the point of isolation is not that
> there are different security requirements, but that in order to avoid
> corss-effects, things should be kept separate.
>
> >
>
> > Yours,
>
> > Joel
>
> >
>
> > On 8/20/15 6:42 PM, Linda Dunbar wrote:
>
> >> I support the WG adoption because I think the I2RS WG needs it.
>
> >> However, I hope the authors can consider/address the following
> suggestions/comments:
>
> >>
>
> >> When you think about the I2RS security,  there are following
>
> >> different
>
> >> aspects:
>
> >>
>
> >> -Communication channel between I2RS client and Agent (and the channel
>
> >> between I2RS client and applications):
>
> >>
>
> >> The channel can be
>
> >>
>
> >> oVia physical Private network (e.g. within a secured direct connect
>
> >> within one site),
>
> >>
>
> >> owithin one administrative domain,  via virtual private network
>
> >>
>
> >> oSecured connection, such as TLS or IPSec
>
> >>
>
> >> oPublic internet
>
> >>
>
> >> o..
>
> >>
>
> >> -Authentication & Authorization
>
> >>
>
> >> othe authentication & authorization requirement for different
>
> >> communication channels can be different. Therefore, should have
>
> >> separate sections to address specific requirement  for each
>
> >> communication channels between I2RS agent <-> clients (and client <->
>
> >> applications)
>
> >>
>
> >> The current Section 4 of the draft already has very good description
>
> >> on the subject. I think 4.4.1 and 4.42 can be separated out of the
> section.
>
> >>
>
> >> -Encryption for the actual content between Client and Agent
>
> >>
>
> >> -DoS Design requirement (currently in Section 5.2.1)
>
> >>
>
> >> -Management of conflict with other plane (e.g. the management plane,
>
> >> multi-headed control, which has been discussed extensively in
>
> >> ephemeral
>
> >> draft)
>
> >>
>
> >> I think the draft should be organized from the aspects of the
>
> >> security to I2RS as suggested above.
>
> >>
>
> >> Here are some detailed questions and comments to the requirements
>
> >> listed in the document:
>
> >>
>
> >> Section 1:
>
> >>
>
> >> The second paragraph stated the security recommendations must
>
> >> "specifying where security functions may be hosted". First of all I
>
> >> don't see the draft address this aspect. Second, I think   "where
>
> >> security functions are hosted" is orthogonal to "I2RS security" .
>
> >>
>
> >> Section 3:
>
> >>
>
> >> what does isolating two planes mean? does it mean they have different
>
> >> security requirement/issues? Or does it mean they need different
> protocols?
>
> >>
>
> >> What are the key differences with regard to the security requirements
>
> >> for  I2RS plane and for management plane?  Section 3.1 describes the
>
> >> interaction between I2RS plane and management plane. But I see the
>
> >> security requirement for the management plane is similar to I2RS plane=
 .
>
> >> If you think that they are very different, can you elaborate more?
>
> >>
>
> >> Section 3.4 has title "Recommendations", but the content are all
>
> >> requirements. Why not name the section "Requirement"?
>
> >>
>
> >> REQ 2: Does it that a different IP address than the one used by the
>
> >> management system?
>
> >>
>
> >> How is REQ 22 different from REQ 21?
>
> >>
>
> >> REQ 27 is hard to enforce. How about say something like "shouldn't
>
> >> send any information beyond what have been defined by the I2RS data
> model"?
>
> >>
>
> >> REQ 30: simply controlling the resource can hardly prevent DoS.
>
> >> Malicious client can occupy the resource while the valid one can't
> access.
>
> >>
>
> >> Thanks for consideration,
>
> >>
>
> >> Linda
>
> >>
>
> >> *From:*i2rs [mailto:i2rs-bounces@ietf.org <i2rs-bounces@ietf.org>] *On
> Behalf Of *Susan Hares
>
> >> *Sent:* Monday, August 17, 2015 12:50 PM
>
> >> *To:* i2rs@ietf.org
>
> >> *Cc:* 'Jeffrey Haas'; daniel.migault@ericsson.com; 'Joel Halpern';
>
> >> shares@ndzh.com; 'Alia Atlas'
>
> >> *Subject:* [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG
>
> >> adoption call (8/17 to 8/31)
>
> >>
>
> >> This begins a 2 week WG adoption call for
>
> >> draft-mglt-i2rs-security-requirements.  This draft discusses the
>
> >> security requirements for the I2RS environment.  You can find the draf=
t
> at:
>
> >>
>
> >> https://tools.ietf.org/html/draft-mglt-i2rs-security-environment-reqs
>
> >> -
>
> >> 00
>
> >>
>
> >> A security reviewer will review this draft during the time 8/20 to
>
> >> 8/25.   We will post the security directorate review to this discussio=
n.
>
> >>
>
> >> Sue Hares
>
> >>
>
> >
>
>
>
> _______________________________________________
>
> i2rs mailing list
>
> i2rs@ietf.org
>
> https://www.ietf.org/mailman/listinfo/i2rs
>
>
>
>
> _______________________________________________
> i2rs mailing list
> i2rs@ietf.org
> https://www.ietf.org/mailman/listinfo/i2rs
>
>
>
> _______________________________________________
> i2rs mailing list
> i2rs@ietf.org
> https://www.ietf.org/mailman/listinfo/i2rs
>
>

--001a1141b24e095bc3051e25b9e8
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div><div>Hi Linda, <br><br>Thank for the comments. I am c=
urrently addressing all comments I received.. I hope I can provide a update=
d version soon. I will keep you informed as soon as I have something more o=
r less in shape.<br><br></div>BR, <br></div>Daniel<br></div><div class=3D"g=
mail_extra"><br><div class=3D"gmail_quote">On Tue, Aug 25, 2015 at 12:21 PM=
, Linda Dunbar <span dir=3D"ltr">&lt;<a href=3D"mailto:linda.dunbar@huawei.=
com" target=3D"_blank">linda.dunbar@huawei.com</a>&gt;</span> wrote:<br><bl=
ockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #=
ccc solid;padding-left:1ex">





<div link=3D"blue" vlink=3D"purple" lang=3D"EN-US">
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">Daniel,
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d"><u></u>=C2=A0<u></u></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">I added 3 more I2RS secur=
ity requirements for the =E2=80=9CClosed Environment=E2=80=9D, please use t=
he revised section attached.
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d"><u></u>=C2=A0<u></u></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">Cheers,
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">Linda<u></u><u></u></span=
></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d"><u></u>=C2=A0<u></u></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #b5c4df 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> i2rs [ma=
ilto:<a href=3D"mailto:i2rs-bounces@ietf.org" target=3D"_blank">i2rs-bounce=
s@ietf.org</a>]
<b>On Behalf Of </b>Linda Dunbar<br>
<b>Sent:</b> Monday, August 24, 2015 5:09 PM<br>
<b>To:</b> Daniel Migault<br>
<b>Cc:</b> Jeffrey Haas; <a href=3D"mailto:i2rs@ietf.org" target=3D"_blank"=
>i2rs@ietf.org</a>; Joel M. Halpern; Alia Atlas<br>
<b>Subject:</b> [i2rs] Suggested section/text to be added to draft-mglt-i2r=
s-security-environment-reqs-00 to address security threats in Closed Envion=
ment.<u></u><u></u></span></p>
</div>
</div><div><div class=3D"h5">
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">Daniel,
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d"><u></u>=C2=A0<u></u></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">Thank you for willing to =
address my comments. To make it easier for you, I put together a section to=
 describe the security threats in Closed Environment and
 necessary requirement for I2RS. See the attached. <u></u><u></u></span></p=
>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d"><u></u>=C2=A0<u></u></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">Closed environment deploy=
ment can easily give people a sense of secure because the links between I2R=
S Client and I2RS Agent are guided by a physical =E2=80=9CWall=E2=80=9D.
 =C2=A0The false sense of =E2=80=9CSecure=E2=80=9D is actually more dangero=
us because it can easily make the deployment miss the crucial security proc=
edure.
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d"><u></u>=C2=A0<u></u></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">Therefore, I think it is =
important to have a dedicated section on security threats and requirement f=
or the Closed Environment.
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d"><u></u>=C2=A0<u></u></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">Linda<u></u><u></u></span=
></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d"><u></u>=C2=A0<u></u></spa=
n></p>
<div style=3D"border:none;border-top:solid #b5c4df 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">
<a href=3D"mailto:mglt.ietf@gmail.com" target=3D"_blank">mglt.ietf@gmail.co=
m</a> [<a href=3D"mailto:mglt.ietf@gmail.com" target=3D"_blank">mailto:mglt=
.ietf@gmail.com</a>]
<b>On Behalf Of </b>Daniel Migault<br>
<b>Sent:</b> Monday, August 24, 2015 12:55 PM<br>
<b>To:</b> Linda Dunbar<br>
<b>Cc:</b> Joel M. Halpern; <a href=3D"mailto:i2rs@ietf.org" target=3D"_bla=
nk">i2rs@ietf.org</a>; Jeffrey Haas; Alia Atlas<br>
<b>Subject:</b> Re: [i2rs] Review comments to draft-mglt-i2rs-security-envi=
ronment-reqs-00 (was RE: draft-mglt-i2rs-security-requirements-00 2 Week WG=
 adoption call (8/17 to 8/31)<u></u><u></u></span></p>
</div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<div>
<div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">Hi Linda, <u></u><u><=
/u></p>
</div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">Thank you for your co=
mments. I agree we need to address more specifically or explicitly the &quo=
t;most common&quot; use case. I agree with your comments and we will consid=
er them to improve and clarify the text of the
 next version. Thank you. To me the i2rs plane provides a limited number of=
 functionnalities that may be provided to different independant tenants.=C2=
=A0
<u></u><u></u></p>
</div>
<p class=3D"MsoNormal">BR, <u></u><u></u></p>
</div>
<p class=3D"MsoNormal">Daniel<u></u><u></u></p>
<div>
<div>
<p class=3D"MsoNormal">=C2=A0<u></u><u></u></p>
</div>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<div>
<p class=3D"MsoNormal">On Mon, Aug 24, 2015 at 1:37 PM, Linda Dunbar &lt;<a=
 href=3D"mailto:linda.dunbar@huawei.com" target=3D"_blank">linda.dunbar@hua=
wei.com</a>&gt; wrote:<u></u><u></u></p>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">Joel,
</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quo=
t;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">=C2=A0</span><span style=
=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;=
"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">Agree with you that =E2=
=80=9C</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot=
;,&quot;sans-serif&quot;;color:black">we don=E2=80=99t need to build differ=
ent protocol stacks for
 the different deployments=E2=80=9D. </span><span style=3D"font-size:11.0pt=
;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;"><u></u><u></u></sp=
an></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">But the =E2=80=9Cenvironm=
ent-req=E2=80=9D draft is not about =E2=80=9CProtocol=E2=80=9D, but about s=
ecurity issues under different =E2=80=9Cenvironment=E2=80=9D.
</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quo=
t;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">=C2=A0</span><span style=
=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;=
"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">Among all our customers w=
ho are interested in I2RS, majority of them (&gt;90%) will deploy them in a=
 closed environment, i.e. physically secured=C2=A0 connection between
 I2RS agent and I2RS client. Therefore, it is important to =E2=80=9C</span>=
<span style=3D"font-size:10.0pt;font-family:Courier;color:black">provides a=
n analysis of the security issues of=E2=80=9D
</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quo=
t;sans-serif&quot;;color:#1f497d">of this commonly deployed environment.
</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quo=
t;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;color:#1f497d">=C2=
=A0</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&=
quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">I suggest adding this Fig=
ure to Section 1 of the document:</span><span style=3D"font-size:11.0pt;fon=
t-family:&quot;Calibri&quot;,&quot;sans-serif&quot;"><u></u><u></u></span><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">=C2=A0</span><span style=
=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;=
"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:#1f497d">Closed=C2=A0 (over open Chnl ###&gt;)=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 Open (over secure Chnl ---=
&gt;)</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;=
,&quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:#1f497d">+---------------------------------+</span><s=
pan style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-se=
rif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:#1f497d">|=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 ************=
***********=C2=A0=C2=A0 |=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 *******************=
****=C2=A0 |</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibr=
i&quot;,&quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:#1f497d">|=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 *=C2=
=A0=C2=A0=C2=A0 Application A=C2=A0=C2=A0=C2=A0 *=C2=A0=C2=A0 |=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0 *=C2=A0=C2=A0=C2=A0 Application B=C2=A0=C2=A0=C2=A0 *=C2=
=A0 |</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;=
,&quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:#1f497d">|=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 *=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 *=C2=A0=C2=A0 |=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0 *=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 *=C2=A0 |</=
span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;=
sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:#1f497d">|=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 *=C2=
=A0 +----------------+ *=C2=A0=C2=A0 |=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 *=C2=
=A0 +----------------+ *=C2=A0 |</span><span style=3D"font-size:11.0pt;font=
-family:&quot;Calibri&quot;,&quot;sans-serif&quot;"><u></u><u></u></span></=
p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:#1f497d">|=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 *=C2=
=A0 |=C2=A0=C2=A0 Client A=C2=A0=C2=A0=C2=A0=C2=A0 | *=C2=A0=C2=A0 |=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0 *=C2=A0 |=C2=A0=C2=A0 Client B=C2=A0=C2=A0=C2=A0=
=C2=A0 | *=C2=A0 |</span><span style=3D"font-size:11.0pt;font-family:&quot;=
Calibri&quot;,&quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:#1f497d">|=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 *=C2=
=A0 +----------------+ *=C2=A0=C2=A0 |=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 *=C2=
=A0 +----------------+ *=C2=A0 |</span><span style=3D"font-size:11.0pt;font=
-family:&quot;Calibri&quot;,&quot;sans-serif&quot;"><u></u><u></u></span></=
p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:#1f497d">|=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 ******=
* ^ *************=C2=A0=C2=A0 |=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 ***** ^ *****=
* ^ ******=C2=A0 |</span><span style=3D"font-size:11.0pt;font-family:&quot;=
Calibri&quot;,&quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:#1f497d">|=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 #=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 |=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 |=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 |=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0 |</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&qu=
ot;,&quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:#1f497d">|=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 #=C2=A0=C2=A0 =C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 |=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 |=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0 |=C2=A0=C2=A0 |-----|</span><span style=3D"font-si=
ze:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;"><u></u><u=
></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:#1f497d">|=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 #=C2=A0=C2=A0 =C2=A0=C2=A0 =C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 |=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0 |=C2=A0=C2=A0 |</span><span style=3D"font-size:11.0pt;fo=
nt-family:&quot;Calibri&quot;,&quot;sans-serif&quot;"><u></u><u></u></span>=
</p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:#1f497d">|=C2=A0 ************ v * * * * ********|=C2=
=A0=C2=A0 ***************** v * v ********</span><span style=3D"font-size:1=
1.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;"><u></u><u></u=
></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:#1f497d">|=C2=A0 *=C2=A0 +---------------------+=C2=
=A0=C2=A0=C2=A0=C2=A0 |=C2=A0=C2=A0 *=C2=A0 +---------------------+=C2=A0=
=C2=A0=C2=A0=C2=A0 *</span><span style=3D"font-size:11.0pt;font-family:&quo=
t;Calibri&quot;,&quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:#1f497d">|=C2=A0 *=C2=A0 |=C2=A0=C2=A0=C2=A0=C2=A0 Ag=
ent 1=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 |=C2=A0=C2=A0=C2=A0=
=C2=A0 |=C2=A0=C2=A0 *=C2=A0 |=C2=A0=C2=A0=C2=A0 Agent 2=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 |=C2=A0=C2=A0=C2=A0=C2=A0 *</span><spa=
n style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-seri=
f&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:#1f497d">|=C2=A0 *=C2=A0 +---------------------+=C2=
=A0=C2=A0=C2=A0=C2=A0 |=C2=A0=C2=A0 *=C2=A0 +---------------------+=C2=A0=
=C2=A0=C2=A0=C2=A0 *</span><span style=3D"font-size:11.0pt;font-family:&quo=
t;Calibri&quot;,&quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:#1f497d">|=C2=A0 *=C2=A0=C2=A0=C2=A0=C2=A0 ^=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 ^=C2=A0 ^=C2=A0=C2=A0 ^=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0 |=C2=A0=C2=A0 *=C2=A0=C2=A0=C2=A0=C2=A0 ^=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 ^=C2=A0 ^=C2=A0=C2=A0 ^=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0 *</span><span style=3D"font-size:11.0pt;font-famil=
y:&quot;Calibri&quot;,&quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;color:#1f497d">=C2=
=A0</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&=
quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;color:#1f497d">=C2=
=A0</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&=
quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;color:#1f497d">=C2=
=A0</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&=
quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">Just think about this fac=
t: today=E2=80=99s router configuration in production environment can only =
be performed by a few authorized people with EMS/NMS physically
 and securely separated. If the majority of the I2RS environment requiremen=
t is about open connection, I2RS WG will spend a lot energy developing the =
very sophisticated protocols which is expensive to develop and harder to de=
ploy.
</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quo=
t;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;color:#1f497d">=C2=
=A0</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&=
quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">I am not against this dev=
elopment, but IMHO, to gain wider and quicker I2RS deployment in production=
 environment, it is necessary to have a very
</span><b><u><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot=
;,&quot;sans-serif&quot;;color:red">lean</span></u></b><span style=3D"font-=
size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1=
f497d"> I2RS solution first, and to have a well documented security require=
ment
 for the common deployment environment. E.g. a single Controller (or the I2=
RS client) directly connected to their devices via their internal network, =
where the connection is physically isolated from other network and protecte=
d by separate mechanisms. Also remember,
 many operators will use I2RS to control a small number of selective router=
s (mostly routers at ingress/egress boundary) for value added services.
</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quo=
t;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;color:#1f497d">=C2=
=A0</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&=
quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;color:#1f497d">=C2=
=A0</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&=
quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;color:#1f497d">=C2=
=A0</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&=
quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">Some of my detailed quest=
ions and comments to the =E2=80=9Csecurity-requirements=E2=80=9D are still =
applicable to the =E2=80=9Cenvironment-req=E2=80=9D document because they h=
ave the same
 text. Plus a few more for the =E2=80=9Cenvironment-req=E2=80=9D document. =
Hope the authors can address them.
</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quo=
t;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;color:#1f497d">=C2=
=A0</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&=
quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;color:#1f497d">=C2=
=A0</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&=
quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">Section 3:
</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quo=
t;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;color:#1f497d">=C2=
=A0</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&=
quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">What are the key differen=
ces with regard to the security requirements for =C2=A0I2RS plane and for m=
anagement plane?=C2=A0 Section 3.1 describes the interaction between
 I2RS plane and management plane. But I see the security requirement for th=
e management plane are all applicable to the security requirement to I2RS p=
lane . If you think that they are very different, can you elaborate more?
</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quo=
t;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;color:#1f497d">=C2=
=A0</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&=
quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">Section 3.4 has title =E2=
=80=9CRecommendations=E2=80=9D, but the content are all requirements. Why n=
ot name the section =E2=80=9CRequirement=E2=80=9D?
</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quo=
t;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">=C2=A0</span><span style=
=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;=
"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">REQ 2: Does it that a dif=
ferent IP address than the one used by the management system?</span><span s=
tyle=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&q=
uot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">=C2=A0</span><span style=
=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;=
"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">REQ 21: is more about I2R=
S requirement, less about =E2=80=9CSecurity=E2=80=9D requirement.
</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quo=
t;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">=C2=A0</span><span style=
=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;=
"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">REQ 24: isn=E2=80=99t it =
the general goal of I2RS? Not really security per se. (should be included i=
n the general I2RS requirement or architecture).
</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quo=
t;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">=C2=A0</span><span style=
=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;=
"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;color:#1f497d">=C2=
=A0</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&=
quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">REQ 26: simply controllin=
g the resource can hardly prevent DoS. Malicious client can occupy the reso=
urce while the valid one can&#39;t access.</span><span style=3D"font-size:1=
1.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;"><u></u><u></u=
></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">=C2=A0</span><span style=
=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;=
"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">Thanks for your considera=
tion,
</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quo=
t;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">Linda</span><span style=
=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;=
"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt">=C2=A0</span><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&=
quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt">=C2=A0</span><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&=
quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">-----Original Message-----<br>
From: i2rs [<a href=3D"mailto:i2rs-bounces@ietf.org" target=3D"_blank">mail=
to:i2rs-bounces@ietf.org</a>] On Behalf Of Joel M. Halpern<br>
Sent: Friday, August 21, 2015 12:20 PM<br>
To: Linda Dunbar; <a href=3D"mailto:i2rs@ietf.org" target=3D"_blank">i2rs@i=
etf.org</a><br>
Cc: &#39;Jeffrey Haas&#39;; <a href=3D"mailto:daniel.migault@ericsson.com" =
target=3D"_blank">
daniel.migault@ericsson.com</a>; &#39;Alia Atlas&#39;<br>
Subject: Re: [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG adop=
tion call (8/17 to 8/31)</span><span style=3D"font-size:11.0pt;font-family:=
&quot;Calibri&quot;,&quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt">=C2=A0</span><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&=
quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">Yes, one of the two last calls is for the environment document.</span><sp=
an style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-ser=
if&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">=C2=A0</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&qu=
ot;,&quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">Having a dedicated physical channel is one of the ways identified in the =
draft to provide the required isolation.</span><span style=3D"font-size:11.=
0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;"><u></u><u></u><=
/span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">=C2=A0</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&qu=
ot;,&quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">While such an environment is clearly supportable, I do not think we shoul=
d reduce the internal protocol requirements (such as MTI security for the c=
ontrol channel) just because there are
 circumstances where such it won&#39;t be needed.=C2=A0 I don&#39;t expect =
that we will build different protocol stacks for the different deployments.=
</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quo=
t;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">=C2=A0</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&qu=
ot;,&quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">The purpose of this draft is to describe the environmental assumptions, w=
hich assumptions can be met in various ways.</span><span style=3D"font-size=
:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;"><u></u><u><=
/u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">=C2=A0</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&qu=
ot;,&quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">Yours,</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&qu=
ot;,&quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">Joel</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot=
;,&quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">=C2=A0</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&qu=
ot;,&quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">On 8/21/15 12:56 PM, Linda Dunbar wrote:</span><span style=3D"font-size:1=
1.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;"><u></u><u></u=
></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt; Joel,</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibr=
i&quot;,&quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot=
;,&quot;sans-serif&quot;"><u></u>=C2=A0<u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt; If it is the &quot;environmental one&quot;, it is more important to =
differentiate the requirements for different environments on how the I2RS c=
lient &amp; Agent are connected.</span><span style=3D"font-size:11.0pt;font=
-family:&quot;Calibri&quot;,&quot;sans-serif&quot;"><u></u><u></u></span></=
p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot=
;,&quot;sans-serif&quot;"><u></u>=C2=A0<u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt; One of our customers stated that their environment has a single Cont=
roller (or the I2RS client) directly connected to their devices via their i=
nternal network, where the connection is
 physically isolated from other network and protected by separate mechanism=
s, they don&#39;t need all those sophisticated authentication procedure.</s=
pan><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;s=
ans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot=
;,&quot;sans-serif&quot;"><u></u>=C2=A0<u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt; We need to address this environment, i.e. having a simpler security =
requirement for this environment than the environment where I2RS Client is =
connected via public network.</span><span style=3D"font-size:11.0pt;font-fa=
mily:&quot;Calibri&quot;,&quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot=
;,&quot;sans-serif&quot;"><u></u>=C2=A0<u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt; Linda</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibr=
i&quot;,&quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot=
;,&quot;sans-serif&quot;"><u></u>=C2=A0<u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot=
;,&quot;sans-serif&quot;"><u></u>=C2=A0<u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt; -----Original Message-----</span><span style=3D"font-size:11.0pt;fon=
t-family:&quot;Calibri&quot;,&quot;sans-serif&quot;"><u></u><u></u></span><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt; From: Joel Halpern Direct [<a href=3D"mailto:jmh.direct@joelhalpern.=
com" target=3D"_blank">mailto:jmh.direct@joelhalpern.com</a>]</span><span s=
tyle=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&q=
uot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt; Sent: Friday, August 21, 2015 10:53 AM</span><span style=3D"font-siz=
e:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;"><u></u><u>=
</u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt; To: Linda Dunbar;
<a href=3D"mailto:i2rs@ietf.org" target=3D"_blank">i2rs@ietf.org</a></span>=
<span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt; Cc: &#39;Jeffrey Haas&#39;;
<a href=3D"mailto:daniel.migault@ericsson.com" target=3D"_blank">daniel.mig=
ault@ericsson.com</a>; &#39;Joel Halpern&#39;; &#39;Alia Atlas&#39;</span><=
span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-s=
erif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt; Subject: Re: [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week =
WG
</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quo=
t;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt; adoption call (8/17 to 8/31)</span><span style=3D"font-size:11.0pt;f=
ont-family:&quot;Calibri&quot;,&quot;sans-serif&quot;"><u></u><u></u></span=
></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot=
;,&quot;sans-serif&quot;"><u></u>=C2=A0<u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt; First, there may be some confusion because the announcement.=C2=A0 I=
 presume that you are talking about the -environments documents.</span><spa=
n style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-seri=
f&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot=
;,&quot;sans-serif&quot;"><u></u>=C2=A0<u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt; If the WG concludes that a different chapter structure is useful, we=
 can of course change it.=C2=A0 Given that the goal is environment descript=
ion, I am not sure your proposed structure is
 significantly better than the existing one.</span><span style=3D"font-size=
:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;"><u></u><u><=
/u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot=
;,&quot;sans-serif&quot;"><u></u>=C2=A0<u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt; I believe your comment about the text=C2=A0 reading &quot;where secu=
rity functions may be hosted&quot; is well taken, and we should remove that=
 text when we next revise the document.</span><span style=3D"font-size:11.0=
pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;"><u></u><u></u></=
span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot=
;,&quot;sans-serif&quot;"><u></u>=C2=A0<u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt; The isolation text is about the need to keep things separate, and th=
e various possible means are degrees / approaches to separation.</span><spa=
n style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-seri=
f&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt; Isolation is not about treating things differently, nor is it explic=
itly about using different protocols.=C2=A0 So the point of isolation is no=
t that there are different security requirements,
 but that in order to avoid corss-effects, things should be kept separate.<=
/span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot=
;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot=
;,&quot;sans-serif&quot;"><u></u>=C2=A0<u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt; Yours,</span><span style=3D"font-size:11.0pt;font-family:&quot;Calib=
ri&quot;,&quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt; Joel</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri=
&quot;,&quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot=
;,&quot;sans-serif&quot;"><u></u>=C2=A0<u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt; On 8/20/15 6:42 PM, Linda Dunbar wrote:</span><span style=3D"font-si=
ze:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;"><u></u><u=
></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; I support the WG adoption because I think the I2RS WG needs it.<=
/span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot=
;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; However, I hope the authors can consider/address the following s=
uggestions/comments:</span><span style=3D"font-size:11.0pt;font-family:&quo=
t;Calibri&quot;,&quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt;</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&=
quot;,&quot;sans-serif&quot;"><u></u>=C2=A0<u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; When you think about the I2RS security,=C2=A0 there are followin=
g
</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quo=
t;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; different</span><span style=3D"font-size:11.0pt;font-family:&quo=
t;Calibri&quot;,&quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; aspects:</span><span style=3D"font-size:11.0pt;font-family:&quot=
;Calibri&quot;,&quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt;</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&=
quot;,&quot;sans-serif&quot;"><u></u>=C2=A0<u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; -Communication channel between I2RS client and Agent (and the ch=
annel
</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quo=
t;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; between I2RS client and applications):</span><span style=3D"font=
-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;"><u></u=
><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt;</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&=
quot;,&quot;sans-serif&quot;"><u></u>=C2=A0<u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; The channel can be</span><span style=3D"font-size:11.0pt;font-fa=
mily:&quot;Calibri&quot;,&quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt;</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&=
quot;,&quot;sans-serif&quot;"><u></u>=C2=A0<u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; oVia physical Private network (e.g. within a secured direct conn=
ect
</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quo=
t;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; within one site),</span><span style=3D"font-size:11.0pt;font-fam=
ily:&quot;Calibri&quot;,&quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt;</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&=
quot;,&quot;sans-serif&quot;"><u></u>=C2=A0<u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; owithin one administrative domain,=C2=A0 via virtual private net=
work</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,=
&quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt;</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&=
quot;,&quot;sans-serif&quot;"><u></u>=C2=A0<u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; oSecured connection, such as TLS or IPSec</span><span style=3D"f=
ont-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;"><u>=
</u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt;</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&=
quot;,&quot;sans-serif&quot;"><u></u>=C2=A0<u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; oPublic internet</span><span style=3D"font-size:11.0pt;font-fami=
ly:&quot;Calibri&quot;,&quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt;</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&=
quot;,&quot;sans-serif&quot;"><u></u>=C2=A0<u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; o..</span><span style=3D"font-size:11.0pt;font-family:&quot;Cali=
bri&quot;,&quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt;</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&=
quot;,&quot;sans-serif&quot;"><u></u>=C2=A0<u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; -Authentication &amp; Authorization</span><span style=3D"font-si=
ze:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;"><u></u><u=
></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt;</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&=
quot;,&quot;sans-serif&quot;"><u></u>=C2=A0<u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; othe authentication &amp; authorization requirement for differen=
t
</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quo=
t;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; communication channels can be different. Therefore, should have
</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quo=
t;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; separate sections to address specific requirement=C2=A0 for each
</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quo=
t;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; communication channels between I2RS agent &lt;-&gt; clients (and=
 client &lt;-&gt;</span><span style=3D"font-size:11.0pt;font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; applications)</span><span style=3D"font-size:11.0pt;font-family:=
&quot;Calibri&quot;,&quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt;</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&=
quot;,&quot;sans-serif&quot;"><u></u>=C2=A0<u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; The current Section 4 of the draft already has very good descrip=
tion
</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quo=
t;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; on the subject. I think 4.4.1 and 4.42 can be separated out of t=
he section.</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri=
&quot;,&quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt;</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&=
quot;,&quot;sans-serif&quot;"><u></u>=C2=A0<u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; -Encryption for the actual content between Client and Agent</spa=
n><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;san=
s-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt;</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&=
quot;,&quot;sans-serif&quot;"><u></u>=C2=A0<u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; -DoS Design requirement (currently in Section 5.2.1)</span><span=
 style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt;</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&=
quot;,&quot;sans-serif&quot;"><u></u>=C2=A0<u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; -Management of conflict with other plane (e.g. the management pl=
ane,
</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quo=
t;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; multi-headed control, which has been discussed extensively in
</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quo=
t;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; ephemeral</span><span style=3D"font-size:11.0pt;font-family:&quo=
t;Calibri&quot;,&quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; draft)</span><span style=3D"font-size:11.0pt;font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt;</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&=
quot;,&quot;sans-serif&quot;"><u></u>=C2=A0<u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; I think the draft should be organized from the aspects of the
</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quo=
t;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; security to I2RS as suggested above.</span><span style=3D"font-s=
ize:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;"><u></u><=
u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt;</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&=
quot;,&quot;sans-serif&quot;"><u></u>=C2=A0<u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; Here are some detailed questions and comments to the requirement=
s
</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quo=
t;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; listed in the document:</span><span style=3D"font-size:11.0pt;fo=
nt-family:&quot;Calibri&quot;,&quot;sans-serif&quot;"><u></u><u></u></span>=
</p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt;</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&=
quot;,&quot;sans-serif&quot;"><u></u>=C2=A0<u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; Section 1:</span><span style=3D"font-size:11.0pt;font-family:&qu=
ot;Calibri&quot;,&quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt;</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&=
quot;,&quot;sans-serif&quot;"><u></u>=C2=A0<u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; The second paragraph stated the security recommendations must
</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quo=
t;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; &quot;specifying where security functions may be hosted&quot;. F=
irst of all I</span><span style=3D"font-size:11.0pt;font-family:&quot;Calib=
ri&quot;,&quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; don&#39;t see the draft address this aspect. Second, I think=C2=
=A0=C2=A0 &quot;where</span><span style=3D"font-size:11.0pt;font-family:&qu=
ot;Calibri&quot;,&quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; security functions are hosted&quot; is orthogonal to &quot;I2RS =
security&quot; .</span><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt;</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&=
quot;,&quot;sans-serif&quot;"><u></u>=C2=A0<u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; Section 3:</span><span style=3D"font-size:11.0pt;font-family:&qu=
ot;Calibri&quot;,&quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt;</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&=
quot;,&quot;sans-serif&quot;"><u></u>=C2=A0<u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; what does isolating two planes mean? does it mean they have diff=
erent
</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quo=
t;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; security requirement/issues? Or does it mean they need different=
 protocols?</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri=
&quot;,&quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt;</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&=
quot;,&quot;sans-serif&quot;"><u></u>=C2=A0<u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; What are the key differences with regard to the security require=
ments
</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quo=
t;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; for=C2=A0 I2RS plane and for management plane?=C2=A0 Section 3.1=
 describes the
</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quo=
t;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; interaction between I2RS plane and management plane. But I see t=
he
</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quo=
t;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; security requirement for the management plane is similar to I2RS=
 plane .</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&qu=
ot;,&quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; If you think that they are very different, can you elaborate mor=
e?</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&q=
uot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt;</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&=
quot;,&quot;sans-serif&quot;"><u></u>=C2=A0<u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; Section 3.4 has title &quot;Recommendations&quot;, but the conte=
nt are all
</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quo=
t;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; requirements. Why not name the section &quot;Requirement&quot;?<=
/span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot=
;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt;</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&=
quot;,&quot;sans-serif&quot;"><u></u>=C2=A0<u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; REQ 2: Does it that a different IP address than the one used by =
the
</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quo=
t;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; management system?</span><span style=3D"font-size:11.0pt;font-fa=
mily:&quot;Calibri&quot;,&quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt;</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&=
quot;,&quot;sans-serif&quot;"><u></u>=C2=A0<u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; How is REQ 22 different from REQ 21?</span><span style=3D"font-s=
ize:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;"><u></u><=
u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt;</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&=
quot;,&quot;sans-serif&quot;"><u></u>=C2=A0<u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; REQ 27 is hard to enforce. How about say something like &quot;sh=
ouldn&#39;t
</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quo=
t;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; send any information beyond what have been defined by the I2RS d=
ata model&quot;?</span><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt;</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&=
quot;,&quot;sans-serif&quot;"><u></u>=C2=A0<u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; REQ 30: simply controlling the resource can hardly prevent DoS.<=
/span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot=
;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; Malicious client can occupy the resource while the valid one can=
&#39;t access.</span><span style=3D"font-size:11.0pt;font-family:&quot;Cali=
bri&quot;,&quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt;</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&=
quot;,&quot;sans-serif&quot;"><u></u>=C2=A0<u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; Thanks for consideration,</span><span style=3D"font-size:11.0pt;=
font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;"><u></u><u></u></spa=
n></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt;</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&=
quot;,&quot;sans-serif&quot;"><u></u>=C2=A0<u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; Linda</span><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt;</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&=
quot;,&quot;sans-serif&quot;"><u></u>=C2=A0<u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; *From:*i2rs [<a href=3D"mailto:i2rs-bounces@ietf.org" target=3D"=
_blank">mailto:i2rs-bounces@ietf.org</a>] *On Behalf Of *Susan Hares</span>=
<span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; *Sent:* Monday, August 17, 2015 12:50 PM</span><span style=3D"fo=
nt-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;"><u><=
/u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; *To:*
<a href=3D"mailto:i2rs@ietf.org" target=3D"_blank">i2rs@ietf.org</a></span>=
<span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; *Cc:* &#39;Jeffrey Haas&#39;;
<a href=3D"mailto:daniel.migault@ericsson.com" target=3D"_blank">daniel.mig=
ault@ericsson.com</a>; &#39;Joel Halpern&#39;;
</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quo=
t;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; <a href=3D"mailto:shares@ndzh.com" target=3D"_blank">
shares@ndzh.com</a>; &#39;Alia Atlas&#39;</span><span style=3D"font-size:11=
.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;"><u></u><u></u>=
</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; *Subject:* [i2rs] draft-mglt-i2rs-security-requirements-00 2 Wee=
k WG
</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quo=
t;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; adoption call (8/17 to 8/31)</span><span style=3D"font-size:11.0=
pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;"><u></u><u></u></=
span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt;</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&=
quot;,&quot;sans-serif&quot;"><u></u>=C2=A0<u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; This begins a 2 week WG adoption call for
</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quo=
t;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; draft-mglt-i2rs-security-requirements.=C2=A0 This draft discusse=
s the
</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quo=
t;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; security requirements for the I2RS environment.=C2=A0 You can fi=
nd the draft at:</span><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt;</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&=
quot;,&quot;sans-serif&quot;"><u></u>=C2=A0<u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; <a href=3D"https://tools.ietf.org/html/draft-mglt-i2rs-security-=
environment-reqs" target=3D"_blank">
https://tools.ietf.org/html/draft-mglt-i2rs-security-environment-reqs</a></=
span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;=
sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; -</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibr=
i&quot;,&quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; 00</span><span style=3D"font-size:11.0pt;font-family:&quot;Calib=
ri&quot;,&quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt;</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&=
quot;,&quot;sans-serif&quot;"><u></u>=C2=A0<u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; A security reviewer will review this draft during the time 8/20 =
to</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&q=
uot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; 8/25.=C2=A0=C2=A0 We will post the security directorate review t=
o this discussion.</span><span style=3D"font-size:11.0pt;font-family:&quot;=
Calibri&quot;,&quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt;</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&=
quot;,&quot;sans-serif&quot;"><u></u>=C2=A0<u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt; Sue Hares</span><span style=3D"font-size:11.0pt;font-family:&quo=
t;Calibri&quot;,&quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;&gt;</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&=
quot;,&quot;sans-serif&quot;"><u></u>=C2=A0<u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">&gt;</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot=
;,&quot;sans-serif&quot;"><u></u>=C2=A0<u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">=C2=A0</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&qu=
ot;,&quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">_______________________________________________</span><span style=3D"font=
-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;"><u></u=
><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:Consolas=
">i2rs mailing list</span><span style=3D"font-size:11.0pt;font-family:&quot=
;Calibri&quot;,&quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt"><a href=3D"mailto:i=
2rs@ietf.org" target=3D"_blank"><span style=3D"font-family:Consolas">i2rs@i=
etf.org</span></a></span><span style=3D"font-size:11.0pt;font-family:&quot;=
Calibri&quot;,&quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt"><a href=3D"https://=
www.ietf.org/mailman/listinfo/i2rs" target=3D"_blank"><span style=3D"font-f=
amily:Consolas">https://www.ietf.org/mailman/listinfo/i2rs</span></a></span=
><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans=
-serif&quot;"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt">=C2=A0</span><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&=
quot;"><u></u><u></u></span></p>
</div>
</div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><br>
_______________________________________________<br>
i2rs mailing list<br>
<a href=3D"mailto:i2rs@ietf.org" target=3D"_blank">i2rs@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/i2rs" target=3D"_blank">ht=
tps://www.ietf.org/mailman/listinfo/i2rs</a><u></u><u></u></p>
</div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
</div>
</div></div></div>
</div>

<br>_______________________________________________<br>
i2rs mailing list<br>
<a href=3D"mailto:i2rs@ietf.org">i2rs@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/i2rs" rel=3D"noreferrer" t=
arget=3D"_blank">https://www.ietf.org/mailman/listinfo/i2rs</a><br>
<br></blockquote></div><br></div>

--001a1141b24e095bc3051e25b9e8--


From nobody Thu Aug 27 09:17:37 2015
Return-Path: <shares@ndzh.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B59701AC3E2; Thu, 27 Aug 2015 09:17:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -96.555
X-Spam-Level: 
X-Spam-Status: No, score=-96.555 tagged_above=-999 required=5 tests=[BAYES_40=-0.001, DOS_OUTLOOK_TO_MX=2.845, HTML_MESSAGE=0.001, J_CHICKENPOX_111=0.6, USER_IN_WHITELIST=-100] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wjcNrZRwrLoQ; Thu, 27 Aug 2015 09:17:29 -0700 (PDT)
Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EEB1B1B2B61; Thu, 27 Aug 2015 09:17:27 -0700 (PDT)
X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=174.124.171.7; 
From: "Susan Hares" <shares@ndzh.com>
To: <i2rs@ietf.org>
Date: Thu, 27 Aug 2015 12:17:23 -0400
Message-ID: <003001d0e0e3$db99eb80$92cdc280$@ndzh.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_0031_01D0E0C2.548B58C0"
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AdDg42cE3NvT5OZVTXW/wutHXrRCrw==
Content-Language: en-us
X-Authenticated-User: skh@ndzh.com 
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/TUwovHLGnh8gJb8EuNujp-n79LE>
Cc: 'Netconf' <netconf@ietf.org>
Subject: Re: [i2rs] WG adoption - draft-hares-i2rs-auth-trans-04 (8/17 to 8/31)
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 27 Aug 2015 16:17:32 -0000

This is a multipart message in MIME format.

------=_NextPart_000_0031_01D0E0C2.548B58C0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit

NETCONF and I2RS mail group: 

 

http://datatracker.ietf.org/doc/draft-hares-i2rs-auth-trans/

 

Russ Housley, a member of the security directorate, kindly provided reviews
for this document, and the document has been changed in response to this
review to a version -05.   I believe these document addresses all of NETCONF
WG questions from IETF 93.  There are three sections below: 

1)      Specific response to NETCONF questions/concerns, 

2)      Why identity has been changed to Identifier in the draft, 

3)      New text for REQ-03, REQ-04, and REQ-10 which Juergen found was
confusing. 

 

I want to thank Juergen and Russ for their excellent reviews. 

 

Sue Hares 

 

==============

NETCONF Concerns at IETF 93  

1)      Requirement 8 - is a security requirement.  

 

>> = Sue  

>> 1) Is REQ-8 a security requirement? 

>> 

>>   o  SEC-REQ-08: Each Identity is associated with one secondary

>>     identity during a particular read/write sequence, but the

>>      secondary identity may vary during the time a connection between

>>      the I2RS client and I2RS agent is active.  The variance of the

>>      secondary identity allows the I2rs client to be associated with

>>      multiple applications and pass along an identifier for these

>>      applications in the secondary identifier.

 

>[Russ] Yes, if that identity is going to be used to make the access control
decision.

 

2)      Requirement 12 is a security requirement for the protocol.

 

>> 2) Is REQ-12 - a security requirement for a protocol?  NETCONF asked 

>> this of I2RS.

> 

>   SEC-REQ-12: The I2RS Client and I2RS Agent protocol SHOULD implement

>   mechanisms that mitigate DoS attacks

>Yes.  For example, the IKE cookie mechanism is only there to make it much
more

> expensive the an attacker to implement DDoS.  They can't fire and forget.
They need to 

> keep state and hang around for at least 1.5 round trips.

 

3)      Multiple message sequences do not belong in protocols [section
2.4.1] 

 

[Russ]: There might be some protocol issues to assist keep things atomic,
but I agree it i not a security issue.

 

4)      Why support an insecure protocol? 

>> [Sue] Are you Ok with REQ-09 specifying a non-secure transport as an
option? 

[Russ]: The security considerations need to be clear what the consequences
are  if this option is selected.

 

Editorial: 

1)      Russ agreed that Requirement 3 and 4 - were unclear, 

2)      Russ agreed that requirement 10 was ambiguous. 

 

These requirement have been rewritten.  (see below).

 

Other changes 

Joel suggested that "identity" is better stated as Identifier, and I agree.
This change has been made through-out the document.

 

 

Changes to requirements 3, 4, and 10 



   o  SEC-REQ-03:An I2RS agent, upon receiving an I2RS message from a

      I2RS client, MUST confirm that the I2RS client has a valid

      identifier.

 

   o  SEC-REQ-04: The I2RS client, upon receiving an I2RS message from

      an I2RS agent, MUST confirm the I2RS agent's identifier .




   SEC-REQ-10: A secure transport MUST be associated with a key
   management solution that can guarantee that only the entities having
   sufficient privileges can get the keys to encrypt/decrypt the
   sensitive data.  Per BCP107 [RFC4107] this key management system
   SHOULD be automatic, but MAY BE manual if the following constraints
   from BCP107:
 
      a)environment has limited bandwidth or high round-trip times,
 
      b)the information being protected has a low value and
 
      c)the total volume over the entire lifetime of the long-term
      session key will be very low,
 
      d)the scale of the deployment is limited.
 
   Most I2RS environments (I2RS Client - I2S Agents) will not have this
   environment, but a few I2RS use case provide limited non-secure
   light-weight telemetry messages that have these requirements.  An
   I2RS data model must indicate which portions can be served by manual
   key management.

 

 


------=_NextPart_000_0031_01D0E0C2.548B58C0
Content-Type: text/html;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><meta =
http-equiv=3DContent-Type content=3D"text/html; =
charset=3Dus-ascii"><meta name=3DGenerator content=3D"Microsoft Word 14 =
(filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoPlainText, li.MsoPlainText, div.MsoPlainText
	{mso-style-priority:99;
	mso-style-link:"Plain Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML Preformatted Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0in;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:.5in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
span.PlainTextChar
	{mso-style-name:"Plain Text Char";
	mso-style-priority:99;
	mso-style-link:"Plain Text";
	font-family:"Calibri","sans-serif";}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:"Courier New";}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri","sans-serif";}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:210728477;
	mso-list-type:hybrid;
	mso-list-template-ids:1535936380 67698705 67698713 67698715 67698703 =
67698713 67698715 67698703 67698713 67698715;}
@list l0:level1
	{mso-level-text:"%1\)";
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level2
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level3
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
@list l0:level4
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level5
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level6
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
@list l0:level7
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level8
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level9
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
@list l1
	{mso-list-id:261961194;
	mso-list-type:hybrid;
	mso-list-template-ids:-556616456 -1166920106 67698691 67698693 67698689 =
67698691 67698693 67698689 67698691 67698693;}
@list l1:level1
	{mso-level-start-at:4;
	mso-level-number-format:bullet;
	mso-level-text:\F0D8;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:.25in;
	text-indent:-.25in;
	font-family:Wingdings;
	mso-fareast-font-family:Calibri;
	mso-bidi-font-family:"Times New Roman";}
@list l1:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:.75in;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l1:level3
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:1.25in;
	text-indent:-.25in;
	font-family:Wingdings;}
@list l1:level4
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:1.75in;
	text-indent:-.25in;
	font-family:Symbol;}
@list l1:level5
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:2.25in;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l1:level6
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:2.75in;
	text-indent:-.25in;
	font-family:Wingdings;}
@list l1:level7
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:3.25in;
	text-indent:-.25in;
	font-family:Symbol;}
@list l1:level8
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:3.75in;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l1:level9
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:4.25in;
	text-indent:-.25in;
	font-family:Wingdings;}
@list l2
	{mso-list-id:402483865;
	mso-list-type:hybrid;
	mso-list-template-ids:-589769230 -1903122424 67698691 67698693 67698689 =
67698691 67698693 67698689 67698691 67698693;}
@list l2:level1
	{mso-level-start-at:4;
	mso-level-number-format:bullet;
	mso-level-text:\F0D8;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Wingdings;
	mso-fareast-font-family:Calibri;
	mso-bidi-font-family:"Times New Roman";}
@list l2:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l2:level3
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Wingdings;}
@list l2:level4
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Symbol;}
@list l2:level5
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l2:level6
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Wingdings;}
@list l2:level7
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Symbol;}
@list l2:level8
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l2:level9
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Wingdings;}
@list l3
	{mso-list-id:1217231804;
	mso-list-type:hybrid;
	mso-list-template-ids:226366024 67698705 67698713 67698715 67698703 =
67698713 67698715 67698703 67698713 67698715;}
@list l3:level1
	{mso-level-text:"%1\)";
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l3:level2
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l3:level3
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
@list l3:level4
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l3:level5
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l3:level6
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
@list l3:level7
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l3:level8
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l3:level9
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
@list l4
	{mso-list-id:1409765534;
	mso-list-type:hybrid;
	mso-list-template-ids:2102981888 67698705 67698713 67698715 67698703 =
67698713 67698715 67698703 67698713 67698715;}
@list l4:level1
	{mso-level-text:"%1\)";
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:.25in;
	text-indent:-.25in;}
@list l4:level2
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:.75in;
	text-indent:-.25in;}
@list l4:level3
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	margin-left:1.25in;
	text-indent:-9.0pt;}
@list l4:level4
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:1.75in;
	text-indent:-.25in;}
@list l4:level5
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:2.25in;
	text-indent:-.25in;}
@list l4:level6
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	margin-left:2.75in;
	text-indent:-9.0pt;}
@list l4:level7
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:3.25in;
	text-indent:-.25in;}
@list l4:level8
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:3.75in;
	text-indent:-.25in;}
@list l4:level9
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	margin-left:4.25in;
	text-indent:-9.0pt;}
@list l5
	{mso-list-id:1491404848;
	mso-list-type:hybrid;
	mso-list-template-ids:295050930 -1361800240 67698691 67698693 67698689 =
67698691 67698693 67698689 67698691 67698693;}
@list l5:level1
	{mso-level-start-at:2;
	mso-level-number-format:bullet;
	mso-level-text:\F0D8;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Wingdings;
	mso-fareast-font-family:Calibri;
	mso-bidi-font-family:"Times New Roman";}
@list l5:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l5:level3
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Wingdings;}
@list l5:level4
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Symbol;}
@list l5:level5
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l5:level6
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Wingdings;}
@list l5:level7
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Symbol;}
@list l5:level8
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l5:level9
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Wingdings;}
@list l6
	{mso-list-id:1588536065;
	mso-list-type:hybrid;
	mso-list-template-ids:61090898 1036394802 67698691 67698693 67698689 =
67698691 67698693 67698689 67698691 67698693;}
@list l6:level1
	{mso-level-start-at:3;
	mso-level-number-format:bullet;
	mso-level-text:\F0D8;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Wingdings;
	mso-fareast-font-family:Calibri;
	mso-bidi-font-family:"Times New Roman";}
@list l6:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l6:level3
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Wingdings;}
@list l6:level4
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Symbol;}
@list l6:level5
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l6:level6
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Wingdings;}
@list l6:level7
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Symbol;}
@list l6:level8
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l6:level9
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Wingdings;}
@list l7
	{mso-list-id:1825923886;
	mso-list-type:hybrid;
	mso-list-template-ids:167157658 67698705 67698713 67698715 67698703 =
67698713 67698715 67698703 67698713 67698715;}
@list l7:level1
	{mso-level-text:"%1\)";
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l7:level2
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l7:level3
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
@list l7:level4
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l7:level5
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l7:level6
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
@list l7:level7
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l7:level8
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l7:level9
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
@list l8
	{mso-list-id:2015835216;
	mso-list-type:hybrid;
	mso-list-template-ids:-173479680 2114247076 67698691 67698693 67698689 =
67698691 67698693 67698689 67698691 67698693;}
@list l8:level1
	{mso-level-start-at:2;
	mso-level-number-format:bullet;
	mso-level-text:\F0D8;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Wingdings;
	mso-fareast-font-family:Calibri;
	mso-bidi-font-family:"Times New Roman";}
@list l8:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l8:level3
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Wingdings;}
@list l8:level4
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Symbol;}
@list l8:level5
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l8:level6
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Wingdings;}
@list l8:level7
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Symbol;}
@list l8:level8
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l8:level9
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Wingdings;}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue =
vlink=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal>NETCONF =
and I2RS mail group: <o:p></o:p></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal><a =
href=3D"http://datatracker.ietf.org/doc/draft-hares-i2rs-auth-trans/">htt=
p://datatracker.ietf.org/doc/draft-hares-i2rs-auth-trans/</a><o:p></o:p><=
/p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>Russ =
Housley, a member of the security directorate, kindly provided reviews =
for this document, and the document has been changed in response to this =
review to a version -05. &nbsp;&nbsp;I believe these document addresses =
all of NETCONF WG questions from IETF 93. &nbsp;There are three sections =
below: <o:p></o:p></p><p class=3DMsoListParagraph =
style=3D'text-indent:-.25in;mso-list:l7 level1 lfo9'><![if =
!supportLists]><span style=3D'mso-list:Ignore'>1)<span =
style=3D'font:7.0pt "Times New Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
</span></span><![endif]>Specific response to NETCONF questions/concerns, =
<o:p></o:p></p><p class=3DMsoListParagraph =
style=3D'text-indent:-.25in;mso-list:l7 level1 lfo9'><![if =
!supportLists]><span style=3D'mso-list:Ignore'>2)<span =
style=3D'font:7.0pt "Times New Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
</span></span><![endif]>Why identity has been changed to Identifier in =
the draft, <o:p></o:p></p><p class=3DMsoListParagraph =
style=3D'text-indent:-.25in;mso-list:l7 level1 lfo9'><![if =
!supportLists]><span style=3D'mso-list:Ignore'>3)<span =
style=3D'font:7.0pt "Times New Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
</span></span><![endif]>New text for REQ-03, REQ-04, and REQ-10 which =
Juergen found was confusing. <o:p></o:p></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>I want to =
thank Juergen and Russ for their excellent reviews. <o:p></o:p></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>Sue Hares =
<o:p></o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p =
class=3DMsoNormal>=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D<o:p></o:p></=
p><p class=3DMsoNormal>NETCONF Concerns at IETF 93 =
&nbsp;<o:p></o:p></p><p class=3DMsoListParagraph =
style=3D'margin-left:.25in;text-indent:-.25in;mso-list:l4 level1 =
lfo2'><![if !supportLists]><span style=3D'mso-list:Ignore'>1)<span =
style=3D'font:7.0pt "Times New Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
</span></span><![endif]>Requirement 8 &#8211; is a security requirement. =
&nbsp;<o:p></o:p></p><p class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText>&gt;&gt; =3D Sue&nbsp; <o:p></o:p></p><p =
class=3DMsoPlainText>&gt;&gt; 1) Is REQ-8 a security requirement? =
<o:p></o:p></p><p class=3DMsoPlainText>&gt;&gt; <o:p></o:p></p><p =
class=3DMsoPlainText>&gt;&gt;&nbsp;&nbsp; o&nbsp; SEC-REQ-08: Each =
Identity is associated with one secondary<o:p></o:p></p><p =
class=3DMsoPlainText>&gt;&gt;&nbsp;&nbsp;&nbsp;&nbsp; identity during a =
particular read/write sequence, but the<o:p></o:p></p><p =
class=3DMsoPlainText>&gt;&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; secondary =
identity may vary during the time a connection between<o:p></o:p></p><p =
class=3DMsoPlainText>&gt;&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; the I2RS =
client and I2RS agent is active.&nbsp; The variance of =
the<o:p></o:p></p><p =
class=3DMsoPlainText>&gt;&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; secondary =
identity allows the I2rs client to be associated with<o:p></o:p></p><p =
class=3DMsoPlainText>&gt;&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; multiple =
applications and pass along an identifier for these<o:p></o:p></p><p =
class=3DMsoPlainText>&gt;&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; applications =
in the secondary identifier.<o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText>&gt;[Russ] Yes, if that identity is going to be =
used to make the access control decision.<o:p></o:p></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoListParagraph =
style=3D'margin-left:.25in;text-indent:-.25in;mso-list:l4 level1 =
lfo2'><![if !supportLists]><span style=3D'mso-list:Ignore'>2)<span =
style=3D'font:7.0pt "Times New Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
</span></span><![endif]>Requirement 12 is a security requirement for the =
protocol.<o:p></o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText>&gt;&gt; 2) Is REQ-12 - a security requirement for =
a protocol?&nbsp; NETCONF asked <o:p></o:p></p><p =
class=3DMsoPlainText>&gt;&gt; this of I2RS.<o:p></o:p></p><p =
class=3DMsoPlainText>&gt; <o:p></o:p></p><p =
class=3DMsoPlainText>&gt;&nbsp;&nbsp; SEC-REQ-12: The I2RS Client and =
I2RS Agent protocol SHOULD implement<o:p></o:p></p><p =
class=3DMsoPlainText>&gt;&nbsp;&nbsp; mechanisms that mitigate DoS =
attacks<o:p></o:p></p><p class=3DMsoPlainText>&gt;Yes.&nbsp; For =
example, the IKE cookie mechanism is only there to make it much =
more<o:p></o:p></p><p class=3DMsoPlainText>&gt; expensive the an =
attacker to implement DDoS.&nbsp; They can't fire and forget.&nbsp; They =
need to <o:p></o:p></p><p class=3DMsoPlainText>&gt; keep state and hang =
around for at least 1.5 round trips.<o:p></o:p></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoListParagraph =
style=3D'margin-left:.25in;text-indent:-.25in;mso-list:l4 level1 =
lfo2'><![if !supportLists]><span style=3D'mso-list:Ignore'>3)<span =
style=3D'font:7.0pt "Times New Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
</span></span><![endif]>Multiple message sequences do not belong in =
protocols [section 2.4.1] <o:p></o:p></p><p class=3DMsoListParagraph =
style=3D'margin-left:.25in'><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText>[Russ]: There might be some protocol issues to =
assist keep things atomic, but I agree it i not a security =
issue.<o:p></o:p></p><p class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText =
style=3D'margin-left:.25in;text-indent:-.25in;mso-list:l4 level1 =
lfo2'><![if !supportLists]><span style=3D'mso-list:Ignore'>4)<span =
style=3D'font:7.0pt "Times New Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
</span></span><![endif]>Why support an insecure protocol? =
<o:p></o:p></p><p class=3DMsoPlainText>&gt;&gt; [Sue] Are you Ok with =
REQ-09 specifying a non-secure transport as an option? <o:p></o:p></p><p =
class=3DMsoPlainText>[Russ]: The security considerations need to be =
clear what the consequences are &nbsp;if this option is =
selected.<o:p></o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p =
class=3DMsoNormal>Editorial: <o:p></o:p></p><p class=3DMsoListParagraph =
style=3D'text-indent:-.25in;mso-list:l3 level1 lfo8'><![if =
!supportLists]><span style=3D'mso-list:Ignore'>1)<span =
style=3D'font:7.0pt "Times New Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
</span></span><![endif]>Russ agreed that Requirement 3 and 4 &#8211; =
were unclear, <o:p></o:p></p><p class=3DMsoListParagraph =
style=3D'text-indent:-.25in;mso-list:l3 level1 lfo8'><![if =
!supportLists]><span style=3D'mso-list:Ignore'>2)<span =
style=3D'font:7.0pt "Times New Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
</span></span><![endif]>Russ agreed that requirement 10 was ambiguous. =
<o:p></o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p =
class=3DMsoNormal>These requirement have been rewritten.&nbsp; (see =
below).<o:p></o:p></p><div =
style=3D'mso-element:para-border-div;border:none;border-bottom:solid =
windowtext 1.0pt;padding:0in 0in 1.0pt 0in'><p class=3DMsoNormal =
style=3D'border:none;padding:0in'><o:p>&nbsp;</o:p></p></div><p =
class=3DMsoNormal>Other changes <o:p></o:p></p><p class=3DMsoNormal>Joel =
suggested that &#8220;identity&#8221; is better stated as Identifier, =
and I agree.&nbsp; This change has been made through-out the =
document.<o:p></o:p></p><div =
style=3D'mso-element:para-border-div;border:none;border-bottom:double =
windowtext 2.25pt;padding:0in 0in 1.0pt 0in'><p class=3DMsoNormal =
style=3D'border:none;padding:0in'><o:p>&nbsp;</o:p></p></div><p =
class=3DMsoNormal><span style=3D'font-size:10.0pt;font-family:"Courier =
New";color:black'><o:p>&nbsp;</o:p></span></p><p =
class=3DMsoNormal><b><span style=3D'font-size:9.0pt;font-family:"Courier =
New";color:black'>Changes to requirements 3, 4, and 10 =
<br><br><o:p></o:p></span></b></p><p class=3DMsoNormal><span =
style=3D'font-size:9.0pt;font-family:"Courier =
New";color:black'>&nbsp;&nbsp;&nbsp;o&nbsp; SEC-REQ-03:An I2RS agent, =
upon receiving an I2RS message from a<o:p></o:p></span></p><p =
class=3DMsoNormal><span style=3D'font-size:9.0pt;font-family:"Courier =
New";color:black'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; I2RS client, MUST =
confirm that the I2RS client has a valid<o:p></o:p></span></p><p =
class=3DMsoNormal><span style=3D'font-size:9.0pt;font-family:"Courier =
New";color:black'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
identifier.<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:9.0pt;font-family:"Courier =
New";color:black'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:9.0pt;font-family:"Courier =
New";color:black'>&nbsp;&nbsp; o&nbsp; SEC-REQ-04: The I2RS client, upon =
receiving an I2RS message from<o:p></o:p></span></p><p =
class=3DMsoNormal><span style=3D'font-size:9.0pt;font-family:"Courier =
New";color:black'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; an I2RS agent, MUST =
confirm the I2RS agent's identifier .<o:p></o:p></span></p><pre><span =
style=3D'font-size:9.0pt;color:black'><br><br><o:p></o:p></span></pre><pr=
e><span style=3D'font-size:9.0pt;color:black'>&nbsp;&nbsp; SEC-REQ-10: A =
secure transport MUST be associated with a =
key<o:p></o:p></span></pre><pre><span =
style=3D'font-size:9.0pt;color:black'>&nbsp;&nbsp; management solution =
that can guarantee that only the entities =
having<o:p></o:p></span></pre><pre><span =
style=3D'font-size:9.0pt;color:black'>&nbsp;&nbsp; sufficient privileges =
can get the keys to encrypt/decrypt =
the<o:p></o:p></span></pre><pre><span =
style=3D'font-size:9.0pt;color:black'>&nbsp;&nbsp; sensitive data.&nbsp; =
Per BCP107 [RFC4107] this key management =
system<o:p></o:p></span></pre><pre><span =
style=3D'font-size:9.0pt;color:black'>&nbsp;&nbsp; SHOULD be automatic, =
but MAY BE manual if the following =
constraints<o:p></o:p></span></pre><pre><span =
style=3D'font-size:9.0pt;color:black'>&nbsp;&nbsp; from =
BCP107:<o:p></o:p></span></pre><pre><span =
style=3D'font-size:9.0pt;color:black'><o:p>&nbsp;</o:p></span></pre><pre>=
<span =
style=3D'font-size:9.0pt;color:black'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
a)environment has limited bandwidth or high round-trip =
times,<o:p></o:p></span></pre><pre><span =
style=3D'font-size:9.0pt;color:black'><o:p>&nbsp;</o:p></span></pre><pre>=
<span =
style=3D'font-size:9.0pt;color:black'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
b)the information being protected has a low value =
and<o:p></o:p></span></pre><pre><span =
style=3D'font-size:9.0pt;color:black'><o:p>&nbsp;</o:p></span></pre><pre>=
<span =
style=3D'font-size:9.0pt;color:black'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
c)the total volume over the entire lifetime of the =
long-term<o:p></o:p></span></pre><pre><span =
style=3D'font-size:9.0pt;color:black'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
session key will be very low,<o:p></o:p></span></pre><pre><span =
style=3D'font-size:9.0pt;color:black'><o:p>&nbsp;</o:p></span></pre><pre>=
<span =
style=3D'font-size:9.0pt;color:black'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
d)the scale of the deployment is =
limited.<o:p></o:p></span></pre><pre><span =
style=3D'font-size:9.0pt;color:black'><o:p>&nbsp;</o:p></span></pre><pre>=
<span style=3D'font-size:9.0pt;color:black'>&nbsp;&nbsp; Most I2RS =
environments (I2RS Client - I2S Agents) will not have =
this<o:p></o:p></span></pre><pre><span =
style=3D'font-size:9.0pt;color:black'>&nbsp;&nbsp; environment, but a =
few I2RS use case provide limited =
non-secure<o:p></o:p></span></pre><pre><span =
style=3D'font-size:9.0pt;color:black'>&nbsp;&nbsp; light-weight =
telemetry messages that have these requirements.&nbsp; =
An<o:p></o:p></span></pre><pre><span =
style=3D'font-size:9.0pt;color:black'>&nbsp;&nbsp; I2RS data model must =
indicate which portions can be served by =
manual<o:p></o:p></span></pre><pre><span =
style=3D'font-size:9.0pt;color:black'>&nbsp;&nbsp; key =
management.<o:p></o:p></span></pre><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoListParagraph =
style=3D'margin-left:.25in'><o:p>&nbsp;</o:p></p></div></body></html>
------=_NextPart_000_0031_01D0E0C2.548B58C0--


From nobody Thu Aug 27 13:16:50 2015
Return-Path: <shares@ndzh.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 46BCB1B29E9; Thu, 27 Aug 2015 10:13:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -79.055
X-Spam-Level: 
X-Spam-Status: No, score=-79.055 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DOS_OUTLOOK_TO_MX=2.845, URIBL_BLACK=20, USER_IN_WHITELIST=-100] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RrWAUxfH66Uu; Thu, 27 Aug 2015 10:13:20 -0700 (PDT)
Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E66621B36F2; Thu, 27 Aug 2015 10:13:19 -0700 (PDT)
X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=174.124.171.7; 
From: "Susan Hares" <shares@ndzh.com>
To: "'Linda Dunbar'" <linda.dunbar@huawei.com>, "'Russ White'" <russw@riw.us>,  "'Andy Bierman'" <andy@yumaworks.com>, "'Jeffrey Haas'" <jhaas@pfrc.org>
References: <20150623165237.12779.22569.idtracker@ietfa.amsl.com> <OF5744358B.3CEE4C66-ON48257E78.0011EC09-48257E78.0012D25E@zte.com.cn> <20150713224652.GB5779@pfrc.org> <CABCOCHQ3uR=gc2qhCTncbUKx18HaAn3xNhCNPU2XnB333A5qYA@mail.gmail.com> <20150713230952.GI13783@pfrc.org> <55A44B12.10201@joelhalpern.com> <20150713234843.GK13783@pfrc.org> <CABCOCHSd+q0wtb9am3MvOoyHG+Y9y+reFpJYdbFTJBE7Co+aGQ@mail.gmail.com> <03cc01d0c398$87f4ff50$97defdf0$@riw.us> <4A95BA014132FF49AE685FAB4B9F17F657D0D688@dfweml701-chm>
In-Reply-To: <4A95BA014132FF49AE685FAB4B9F17F657D0D688@dfweml701-chm>
Date: Thu, 27 Aug 2015 13:12:49 -0400
Message-ID: <00c101d0e0eb$9a503af0$cef0b0d0$@ndzh.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQCQIeJoLHKQ7oAYGCGjY2QIv20pQwNLDm62AgtPHvEBh1wz+wJSZctmAodrX98BVhkhJAEZ0mfaAkZ9v4kB9KaZ3aAOexsg
Content-Language: en-us
X-Authenticated-User: skh@ndzh.com 
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/ZTbvLIDbwklZqUCpOW9zQdI6jcw>
X-Mailman-Approved-At: Thu, 27 Aug 2015 13:16:49 -0700
Cc: i2rs@ietf.org, dai.xianxian@zte.com.cn, 'Jeff Haas' <jhaas@juniper.net>, internet-drafts@ietf.org, 'Alia Atlas' <akatlas@gmail.com>, 'i2rs' <i2rs-bounces@ietf.org>, i-d-announce@ietf.org, "'Joel M. Halpern'" <jmh@joelhalpern.com>
Subject: Re: [i2rs] some doubt about "draft-ietf-i2rs-ephemeral-state-00".// I-D Action: draft-ietf-i2rs-ephemeral-state-00.txt
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 27 Aug 2015 17:13:21 -0000

Linda and Russ: 

I agree that having the broker pretend to be different clients is a good
idea even if it is not optimal. 

Sue 

-----Original Message-----
From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Linda Dunbar
Sent: Friday, August 14, 2015 11:01 AM
To: Russ White; 'Andy Bierman'; 'Jeffrey Haas'
Cc: i2rs@ietf.org; dai.xianxian@zte.com.cn; 'Jeff Haas';
internet-drafts@ietf.org; 'Alia Atlas'; 'i2rs'; i-d-announce@ietf.org; 'Joel
M. Halpern'; 'Susan Hares'
Subject: Re: [i2rs] some doubt about "draft-ietf-i2rs-ephemeral-state-00".//
I-D Action: draft-ietf-i2rs-ephemeral-state-00.txt

+1. 

Linda

-----Original Message-----
From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Russ White
Sent: Tuesday, July 21, 2015 4:34 AM
To: 'Andy Bierman'; 'Jeffrey Haas'
Cc: i2rs@ietf.org; dai.xianxian@zte.com.cn; 'Jeff Haas';
internet-drafts@ietf.org; 'Alia Atlas'; 'i2rs'; i-d-announce@ietf.org; 'Joel
M. Halpern'; 'Susan Hares'
Subject: Re: [i2rs] some doubt about "draft-ietf-i2rs-ephemeral-state-00".//
I-D Action: draft-ietf-i2rs-ephemeral-state-00.txt

 
> The design does not directly support different priorities per broker.
> The broker needs to pretend to be different clients, and each session 
> will have a different client-id and priority.  This is non-optimal but not
broken.

And it's much simpler to implement. It would leave proxies out of scope
while allowing those who want to implement proxies a way to do so. In short
-- this seems like a good solution.

Russ

_______________________________________________
i2rs mailing list
i2rs@ietf.org
https://www.ietf.org/mailman/listinfo/i2rs

_______________________________________________
i2rs mailing list
i2rs@ietf.org
https://www.ietf.org/mailman/listinfo/i2rs


From nobody Thu Aug 27 13:29:15 2015
Return-Path: <jhaas@slice.pfrc.org>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3666B1B323D for <i2rs@ietfa.amsl.com>; Thu, 27 Aug 2015 13:29:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.178
X-Spam-Level: 
X-Spam-Status: No, score=-0.178 tagged_above=-999 required=5 tests=[BAYES_05=-0.5, IP_NOT_FRIENDLY=0.334, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 42JyE6XJCx5S for <i2rs@ietfa.amsl.com>; Thu, 27 Aug 2015 13:29:13 -0700 (PDT)
Received: from slice.pfrc.org (slice.pfrc.org [67.207.130.108]) by ietfa.amsl.com (Postfix) with ESMTP id 9A94F1B31EB for <i2rs@ietf.org>; Thu, 27 Aug 2015 13:29:13 -0700 (PDT)
Received: by slice.pfrc.org (Postfix, from userid 1001) id ACF611E48F; Thu, 27 Aug 2015 16:32:09 -0400 (EDT)
Date: Thu, 27 Aug 2015 16:32:09 -0400
From: Jeffrey Haas <jhaas@pfrc.org>
To: i2rs@ietf.org
Message-ID: <20150827203209.GB19039@pfrc.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.5.21 (2010-09-15)
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/UovmEe411Io2WQVIvqt1Q7dfBss>
Subject: [i2rs] draft-mglt-i2rs-security-environment-reqs, REQ 3
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 27 Aug 2015 20:29:14 -0000

I've been reviewing the environment requirements, thanks for picking up this
work.  Requirement 3 contains the following:

   REQ 3:  The I2RS Agent validates data to ensure injecting the
           information will not create a deadlock with any other system,
           nor will it create a routing loop, nor will it cause the
           control plane to fail to converge.

I2RS has already received feedback from our netconf experts expressing
concern over how validation even at the schema levels may introduce
excessive latency.  This contradicts the I2RS "need for speed".

I have a broader concern that the above requirement may simply be an
intractable problem.  It's a loft goal, but the overhead in validating all
such things is likely not within the goal of speed.

Thoughts?

-- Jeff


From nobody Thu Aug 27 13:32:46 2015
Return-Path: <akatlas@gmail.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2206D1A1B69 for <i2rs@ietfa.amsl.com>; Thu, 27 Aug 2015 13:32:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.999
X-Spam-Level: 
X-Spam-Status: No, score=-101.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001, USER_IN_WHITELIST=-100] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bMITkgM3NQUR for <i2rs@ietfa.amsl.com>; Thu, 27 Aug 2015 13:32:39 -0700 (PDT)
Received: from mail-ob0-x229.google.com (mail-ob0-x229.google.com [IPv6:2607:f8b0:4003:c01::229]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 888161A8F4D for <i2rs@ietf.org>; Thu, 27 Aug 2015 13:32:38 -0700 (PDT)
Received: by obbwr7 with SMTP id wr7so26409730obb.2 for <i2rs@ietf.org>; Thu, 27 Aug 2015 13:32:38 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=+XWxWzsKTA18/WXSutXqSQktkKmxtQoDLU6n/caUuBg=; b=d623Sbic96dG7Oxz2URv9/UJlqKn/ZvepnMlDjxa8fvN2UAaxCdSd/8wyj/+2A1Gjt N1FO7XybXJIaLh66lL2xkubMCc4ZWUoJH9nmtD+z59sPgZ4StMaExV09GpGBOZlhCTdG t3ZBtqhWfhJ8CsbtJX7zIq++XnROej0g0khRUGu4yiJYxcCQaJKz50+aAFphVxtg46Ks hg05upEv6KDfnTNuuWFC378Sy+5IwEyxHYC8Fn06TNxSZbkeiBQlizHpKGV2S24ZRN0j AjoKgIozqjDHM+ecGft1k8Z0ertMVPY/qNOqu0I46kvk6MrMZtBSV1ejjDGM0IFRNEOe teNQ==
MIME-Version: 1.0
X-Received: by 10.182.171.35 with SMTP id ar3mr3604772obc.57.1440707558017; Thu, 27 Aug 2015 13:32:38 -0700 (PDT)
Received: by 10.60.176.138 with HTTP; Thu, 27 Aug 2015 13:32:37 -0700 (PDT)
In-Reply-To: <20150827203209.GB19039@pfrc.org>
References: <20150827203209.GB19039@pfrc.org>
Date: Thu, 27 Aug 2015 16:32:37 -0400
Message-ID: <CAG4d1rco35EtNXuPCR77xqHCgcbPEOu6Atb3SMu5r33XGiZ25g@mail.gmail.com>
From: Alia Atlas <akatlas@gmail.com>
To: Jeffrey Haas <jhaas@pfrc.org>
Content-Type: multipart/alternative; boundary=e89a8ff1cde238a880051e50de93
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/A3uMIeIXObjXwNejxh_pSnq14KE>
Cc: "i2rs@ietf.org" <i2rs@ietf.org>
Subject: Re: [i2rs] draft-mglt-i2rs-security-environment-reqs, REQ 3
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 27 Aug 2015 20:32:44 -0000

--e89a8ff1cde238a880051e50de93
Content-Type: text/plain; charset=UTF-8

<no-hats>

Good catch - this seems to be very aspirational and contradicts
what the architecture says - which is basically that the user may
cause issues.

Regards,
Alia
</no-hats>

On Thu, Aug 27, 2015 at 4:32 PM, Jeffrey Haas <jhaas@pfrc.org> wrote:

> I've been reviewing the environment requirements, thanks for picking up
> this
> work.  Requirement 3 contains the following:
>
>    REQ 3:  The I2RS Agent validates data to ensure injecting the
>            information will not create a deadlock with any other system,
>            nor will it create a routing loop, nor will it cause the
>            control plane to fail to converge.
>
> I2RS has already received feedback from our netconf experts expressing
> concern over how validation even at the schema levels may introduce
> excessive latency.  This contradicts the I2RS "need for speed".
>
> I have a broader concern that the above requirement may simply be an
> intractable problem.  It's a loft goal, but the overhead in validating all
> such things is likely not within the goal of speed.
>
> Thoughts?
>
> -- Jeff
>
> _______________________________________________
> i2rs mailing list
> i2rs@ietf.org
> https://www.ietf.org/mailman/listinfo/i2rs
>

--e89a8ff1cde238a880051e50de93
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">&lt;no-hats&gt;<div><br></div><div>Good catch - this seems=
 to be very aspirational and contradicts</div><div>what the architecture sa=
ys - which is basically that the user may</div><div>cause issues.</div><div=
><br></div><div>Regards,</div><div>Alia</div><div>&lt;/no-hats&gt;</div></d=
iv><div class=3D"gmail_extra"><br><div class=3D"gmail_quote">On Thu, Aug 27=
, 2015 at 4:32 PM, Jeffrey Haas <span dir=3D"ltr">&lt;<a href=3D"mailto:jha=
as@pfrc.org" target=3D"_blank">jhaas@pfrc.org</a>&gt;</span> wrote:<br><blo=
ckquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #c=
cc solid;padding-left:1ex">I&#39;ve been reviewing the environment requirem=
ents, thanks for picking up this<br>
work.=C2=A0 Requirement 3 contains the following:<br>
<br>
=C2=A0 =C2=A0REQ 3:=C2=A0 The I2RS Agent validates data to ensure injecting=
 the<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0information will not create a dead=
lock with any other system,<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0nor will it create a routing loop,=
 nor will it cause the<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0control plane to fail to converge.=
<br>
<br>
I2RS has already received feedback from our netconf experts expressing<br>
concern over how validation even at the schema levels may introduce<br>
excessive latency.=C2=A0 This contradicts the I2RS &quot;need for speed&quo=
t;.<br>
<br>
I have a broader concern that the above requirement may simply be an<br>
intractable problem.=C2=A0 It&#39;s a loft goal, but the overhead in valida=
ting all<br>
such things is likely not within the goal of speed.<br>
<br>
Thoughts?<br>
<br>
-- Jeff<br>
<br>
_______________________________________________<br>
i2rs mailing list<br>
<a href=3D"mailto:i2rs@ietf.org">i2rs@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/i2rs" rel=3D"noreferrer" t=
arget=3D"_blank">https://www.ietf.org/mailman/listinfo/i2rs</a><br>
</blockquote></div><br></div>

--e89a8ff1cde238a880051e50de93--


From nobody Thu Aug 27 13:46:27 2015
Return-Path: <shares@ndzh.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 19A2F1A9234 for <i2rs@ietfa.amsl.com>; Thu, 27 Aug 2015 13:46:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -99.054
X-Spam-Level: 
X-Spam-Status: No, score=-99.054 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DOS_OUTLOOK_TO_MX=2.845, HTML_MESSAGE=0.001, USER_IN_WHITELIST=-100] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 18ApOMeF3Izu for <i2rs@ietfa.amsl.com>; Thu, 27 Aug 2015 13:46:20 -0700 (PDT)
Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D61671A92E0 for <i2rs@ietf.org>; Thu, 27 Aug 2015 13:46:18 -0700 (PDT)
X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=174.124.171.7; 
From: "Susan Hares" <shares@ndzh.com>
To: "'Linda Dunbar'" <linda.dunbar@huawei.com>, "'Daniel Migault'" <daniel.migault@ericsson.com>
References: <CADZyTknZ4ZzrxTB_Miud=-xMfckmD4LR7vdz+3uAg9gL7X22-g@mail.gmail.com> <4A95BA014132FF49AE685FAB4B9F17F657D1757E@dfweml701-chm>
In-Reply-To: <4A95BA014132FF49AE685FAB4B9F17F657D1757E@dfweml701-chm>
Date: Thu, 27 Aug 2015 16:45:58 -0400
Message-ID: <019201d0e109$613e6a20$23bb3e60$@ndzh.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_0193_01D0E0E7.DA377880"
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQG6Lp4YXtGNsC6f02fj2EU/5giwSAHiq012nj6fxZA=
Content-Language: en-us
X-Authenticated-User: skh@ndzh.com 
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/2RBWkTs5Plg0n_jw3KaOJvpWPwA>
Cc: 'Jeffrey Haas' <jhaas@pfrc.org>, i2rs@ietf.org, "'Joel M. Halpern'" <jmh@joelhalpern.com>, 'Alia Atlas' <akatlas@gmail.com>
Subject: Re: [i2rs] Suggested section/text to be added to draft-mglt-i2rs-security-environment-reqs-00 to address security threats in Closed Envionment.
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 27 Aug 2015 20:46:25 -0000

This is a multipart message in MIME format.

------=_NextPart_000_0193_01D0E0E7.DA377880
Content-Type: text/plain;
	charset="utf-8"
Content-Transfer-Encoding: quoted-printable

Linda:=20

=20

I think that addressing the difference between machines in a closed =
system (sometimes called a =E2=80=9Csystems within a garden =
wall=E2=80=9D) is important to address in the environmental draft.=20

=20

I will work with Daniel to insert this in our draft.   I believe the =
draft is a good start for a environmental draft.=20

=20

Sue=20

=20

From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Linda Dunbar
Sent: Monday, August 24, 2015 6:09 PM
To: Daniel Migault
Cc: Jeffrey Haas; i2rs@ietf.org; Joel M. Halpern; Alia Atlas
Subject: [i2rs] Suggested section/text to be added to =
draft-mglt-i2rs-security-environment-reqs-00 to address security threats =
in Closed Envionment.

=20

Daniel,=20

=20

Thank you for willing to address my comments. To make it easier for you, =
I put together a section to describe the security threats in Closed =
Environment and necessary requirement for I2RS. See the attached.=20

=20

Closed environment deployment can easily give people a sense of secure =
because the links between I2RS Client and I2RS Agent are guided by a =
physical =E2=80=9CWall=E2=80=9D.  The false sense of =
=E2=80=9CSecure=E2=80=9D is actually more dangerous because it can =
easily make the deployment miss the crucial security procedure.=20

=20

Therefore, I think it is important to have a dedicated section on =
security threats and requirement for the Closed Environment.=20

=20

Linda

=20

From: mglt.ietf@gmail.com [mailto:mglt.ietf@gmail.com] On Behalf Of =
Daniel Migault
Sent: Monday, August 24, 2015 12:55 PM
To: Linda Dunbar
Cc: Joel M. Halpern; i2rs@ietf.org; Jeffrey Haas; Alia Atlas
Subject: Re: [i2rs] Review comments to =
draft-mglt-i2rs-security-environment-reqs-00 (was RE: =
draft-mglt-i2rs-security-requirements-00 2 Week WG adoption call (8/17 =
to 8/31)

=20

Hi Linda,=20

Thank you for your comments. I agree we need to address more =
specifically or explicitly the "most common" use case. I agree with your =
comments and we will consider them to improve and clarify the text of =
the next version. Thank you. To me the i2rs plane provides a limited =
number of functionnalities that may be provided to different independant =
tenants. =20

BR,=20

Daniel

=20

=20

On Mon, Aug 24, 2015 at 1:37 PM, Linda Dunbar <linda.dunbar@huawei.com> =
wrote:

Joel,=20

=20

Agree with you that =E2=80=9Cwe don=E2=80=99t need to build different =
protocol stacks for the different deployments=E2=80=9D.=20

But the =E2=80=9Cenvironment-req=E2=80=9D draft is not about =
=E2=80=9CProtocol=E2=80=9D, but about security issues under different =
=E2=80=9Cenvironment=E2=80=9D.=20

=20

Among all our customers who are interested in I2RS, majority of them =
(>90%) will deploy them in a closed environment, i.e. physically secured =
 connection between I2RS agent and I2RS client. Therefore, it is =
important to =E2=80=9Cprovides an analysis of the security issues =
of=E2=80=9D of this commonly deployed environment.=20

=20

I suggest adding this Figure to Section 1 of the document:

=20

Closed  (over open Chnl ###>)          Open (over secure Chnl --->)

+---------------------------------+

|      ***********************   |      ***********************  |

|       *    Application A    *   |      *    Application B    *  |

|       *                     *   |      *                     *  |

|       *  +----------------+ *   |      *  +----------------+ *  |

|       *  |   Client A     | *   |      *  |   Client B     | *  |

|       *  +----------------+ *   |      *  +----------------+ *  |

|       ******* ^ *************   |      ***** ^ ****** ^ ******  |

|               #                 |            |        |         |

|               #                 |            |        |   |-----|

|               #               |                     |   |

|  ************ v * * * * ********|   ***************** v * v ********

|  *  +---------------------+     |   *  +---------------------+     *

|  *  |     Agent 1         |     |   *  |    Agent 2          |     *

|  *  +---------------------+     |   *  +---------------------+     *

|  *     ^        ^  ^   ^        |   *     ^        ^  ^   ^        *

=20

=20

=20

Just think about this fact: today=E2=80=99s router configuration in =
production environment can only be performed by a few authorized people =
with EMS/NMS physically and securely separated. If the majority of the =
I2RS environment requirement is about open connection, I2RS WG will =
spend a lot energy developing the very sophisticated protocols which is =
expensive to develop and harder to deploy.=20

=20

I am not against this development, but IMHO, to gain wider and quicker =
I2RS deployment in production environment, it is necessary to have a =
very lean I2RS solution first, and to have a well documented security =
requirement for the common deployment environment. E.g. a single =
Controller (or the I2RS client) directly connected to their devices via =
their internal network, where the connection is physically isolated from =
other network and protected by separate mechanisms. Also remember, many =
operators will use I2RS to control a small number of selective routers =
(mostly routers at ingress/egress boundary) for value added services.=20

=20

=20

=20

Some of my detailed questions and comments to the =
=E2=80=9Csecurity-requirements=E2=80=9D are still applicable to the =
=E2=80=9Cenvironment-req=E2=80=9D document because they have the same =
text. Plus a few more for the =E2=80=9Cenvironment-req=E2=80=9D =
document. Hope the authors can address them.=20

=20

=20

Section 3:=20

=20

What are the key differences with regard to the security requirements =
for  I2RS plane and for management plane?  Section 3.1 describes the =
interaction between I2RS plane and management plane. But I see the =
security requirement for the management plane are all applicable to the =
security requirement to I2RS plane . If you think that they are very =
different, can you elaborate more?=20

=20

Section 3.4 has title =E2=80=9CRecommendations=E2=80=9D, but the content =
are all requirements. Why not name the section =
=E2=80=9CRequirement=E2=80=9D?=20

=20

REQ 2: Does it that a different IP address than the one used by the =
management system?

=20

REQ 21: is more about I2RS requirement, less about =
=E2=80=9CSecurity=E2=80=9D requirement.=20

=20

REQ 24: isn=E2=80=99t it the general goal of I2RS? Not really security =
per se. (should be included in the general I2RS requirement or =
architecture).=20

=20

=20

REQ 26: simply controlling the resource can hardly prevent DoS. =
Malicious client can occupy the resource while the valid one can't =
access.

=20

Thanks for your consideration,=20

Linda

=20

=20

-----Original Message-----
From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Joel M. Halpern
Sent: Friday, August 21, 2015 12:20 PM
To: Linda Dunbar; i2rs@ietf.org
Cc: 'Jeffrey Haas'; daniel.migault@ericsson.com; 'Alia Atlas'
Subject: Re: [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG =
adoption call (8/17 to 8/31)

=20

Yes, one of the two last calls is for the environment document.

=20

Having a dedicated physical channel is one of the ways identified in the =
draft to provide the required isolation.

=20

While such an environment is clearly supportable, I do not think we =
should reduce the internal protocol requirements (such as MTI security =
for the control channel) just because there are circumstances where such =
it won't be needed.  I don't expect that we will build different =
protocol stacks for the different deployments.

=20

The purpose of this draft is to describe the environmental assumptions, =
which assumptions can be met in various ways.

=20

Yours,

Joel

=20

On 8/21/15 12:56 PM, Linda Dunbar wrote:

> Joel,

>=20

> If it is the "environmental one", it is more important to =
differentiate the requirements for different environments on how the =
I2RS client & Agent are connected.

>=20

> One of our customers stated that their environment has a single =
Controller (or the I2RS client) directly connected to their devices via =
their internal network, where the connection is physically isolated from =
other network and protected by separate mechanisms, they don't need all =
those sophisticated authentication procedure.

>=20

> We need to address this environment, i.e. having a simpler security =
requirement for this environment than the environment where I2RS Client =
is connected via public network.

>=20

> Linda

>=20

>=20

> -----Original Message-----

> From: Joel Halpern Direct [mailto:jmh.direct@joelhalpern.com]

> Sent: Friday, August 21, 2015 10:53 AM

> To: Linda Dunbar; i2rs@ietf.org

> Cc: 'Jeffrey Haas'; daniel.migault@ericsson.com; 'Joel Halpern'; 'Alia =
Atlas'

> Subject: Re: [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG =


> adoption call (8/17 to 8/31)

>=20

> First, there may be some confusion because the announcement.  I =
presume that you are talking about the -environments documents.

>=20

> If the WG concludes that a different chapter structure is useful, we =
can of course change it.  Given that the goal is environment =
description, I am not sure your proposed structure is significantly =
better than the existing one.

>=20

> I believe your comment about the text  reading "where security =
functions may be hosted" is well taken, and we should remove that text =
when we next revise the document.

>=20

> The isolation text is about the need to keep things separate, and the =
various possible means are degrees / approaches to separation.

> Isolation is not about treating things differently, nor is it =
explicitly about using different protocols.  So the point of isolation =
is not that there are different security requirements, but that in order =
to avoid corss-effects, things should be kept separate.

>=20

> Yours,

> Joel

>=20

> On 8/20/15 6:42 PM, Linda Dunbar wrote:

>> I support the WG adoption because I think the I2RS WG needs it.

>> However, I hope the authors can consider/address the following =
suggestions/comments:

>>=20

>> When you think about the I2RS security,  there are following=20

>> different

>> aspects:

>>=20

>> -Communication channel between I2RS client and Agent (and the channel =


>> between I2RS client and applications):

>>=20

>> The channel can be

>>=20

>> oVia physical Private network (e.g. within a secured direct connect=20

>> within one site),

>>=20

>> owithin one administrative domain,  via virtual private network

>>=20

>> oSecured connection, such as TLS or IPSec

>>=20

>> oPublic internet

>>=20

>> o..

>>=20

>> -Authentication & Authorization

>>=20

>> othe authentication & authorization requirement for different=20

>> communication channels can be different. Therefore, should have=20

>> separate sections to address specific requirement  for each=20

>> communication channels between I2RS agent <-> clients (and client <->

>> applications)

>>=20

>> The current Section 4 of the draft already has very good description=20

>> on the subject. I think 4.4.1 and 4.42 can be separated out of the =
section.

>>=20

>> -Encryption for the actual content between Client and Agent

>>=20

>> -DoS Design requirement (currently in Section 5.2.1)

>>=20

>> -Management of conflict with other plane (e.g. the management plane,=20

>> multi-headed control, which has been discussed extensively in=20

>> ephemeral

>> draft)

>>=20

>> I think the draft should be organized from the aspects of the=20

>> security to I2RS as suggested above.

>>=20

>> Here are some detailed questions and comments to the requirements=20

>> listed in the document:

>>=20

>> Section 1:

>>=20

>> The second paragraph stated the security recommendations must=20

>> "specifying where security functions may be hosted". First of all I

>> don't see the draft address this aspect. Second, I think   "where

>> security functions are hosted" is orthogonal to "I2RS security" .

>>=20

>> Section 3:

>>=20

>> what does isolating two planes mean? does it mean they have different =


>> security requirement/issues? Or does it mean they need different =
protocols?

>>=20

>> What are the key differences with regard to the security requirements =


>> for  I2RS plane and for management plane?  Section 3.1 describes the=20

>> interaction between I2RS plane and management plane. But I see the=20

>> security requirement for the management plane is similar to I2RS =
plane .

>> If you think that they are very different, can you elaborate more?

>>=20

>> Section 3.4 has title "Recommendations", but the content are all=20

>> requirements. Why not name the section "Requirement"?

>>=20

>> REQ 2: Does it that a different IP address than the one used by the=20

>> management system?

>>=20

>> How is REQ 22 different from REQ 21?

>>=20

>> REQ 27 is hard to enforce. How about say something like "shouldn't=20

>> send any information beyond what have been defined by the I2RS data =
model"?

>>=20

>> REQ 30: simply controlling the resource can hardly prevent DoS.

>> Malicious client can occupy the resource while the valid one can't =
access.

>>=20

>> Thanks for consideration,

>>=20

>> Linda

>>=20

>> *From:*i2rs [mailto:i2rs-bounces@ietf.org] *On Behalf Of *Susan Hares

>> *Sent:* Monday, August 17, 2015 12:50 PM

>> *To:* i2rs@ietf.org

>> *Cc:* 'Jeffrey Haas'; daniel.migault@ericsson.com; 'Joel Halpern';=20

>> shares@ndzh.com; 'Alia Atlas'

>> *Subject:* [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG=20

>> adoption call (8/17 to 8/31)

>>=20

>> This begins a 2 week WG adoption call for=20

>> draft-mglt-i2rs-security-requirements.  This draft discusses the=20

>> security requirements for the I2RS environment.  You can find the =
draft at:

>>=20

>> https://tools.ietf.org/html/draft-mglt-i2rs-security-environment-reqs

>> -

>> 00

>>=20

>> A security reviewer will review this draft during the time 8/20 to

>> 8/25.   We will post the security directorate review to this =
discussion.

>>=20

>> Sue Hares

>>=20

>=20

=20

_______________________________________________

i2rs mailing list

 <mailto:i2rs@ietf.org> i2rs@ietf.org

 <https://www.ietf.org/mailman/listinfo/i2rs> =
https://www.ietf.org/mailman/listinfo/i2rs

=20


_______________________________________________
i2rs mailing list
i2rs@ietf.org
https://www.ietf.org/mailman/listinfo/i2rs

=20


------=_NextPart_000_0193_01D0E0E7.DA377880
Content-Type: text/html;
	charset="utf-8"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><meta =
http-equiv=3DContent-Type content=3D"text/html; charset=3Dutf-8"><meta =
name=3DGenerator content=3D"Microsoft Word 14 (filtered =
medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:Courier;
	panose-1:2 7 4 9 2 2 5 2 4 4;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
span.EmailStyle19
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle20
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue =
vlink=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Linda: <o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>I think that addressing the difference between machines in a closed =
system (sometimes called a =E2=80=9Csystems within a garden =
wall=E2=80=9D) is important to address in the environmental draft. =
<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>I will work with Daniel to insert this in our draft.=C2=A0=C2=A0 I =
believe the draft is a good start for a environmental draft. =
<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Sue <o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><div><div =
style=3D'border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in'><p class=3DMsoNormal><b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>From:</span>=
</b><span style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'> =
i2rs [mailto:i2rs-bounces@ietf.org] <b>On Behalf Of </b>Linda =
Dunbar<br><b>Sent:</b> Monday, August 24, 2015 6:09 PM<br><b>To:</b> =
Daniel Migault<br><b>Cc:</b> Jeffrey Haas; i2rs@ietf.org; Joel M. =
Halpern; Alia Atlas<br><b>Subject:</b> [i2rs] Suggested section/text to =
be added to draft-mglt-i2rs-security-environment-reqs-00 to address =
security threats in Closed =
Envionment.<o:p></o:p></span></p></div></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Daniel, <o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Thank you for willing to address my comments. To make it easier for =
you, I put together a section to describe the security threats in Closed =
Environment and necessary requirement for I2RS. See the attached. =
<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Closed environment deployment can easily give people a sense of =
secure because the links between I2RS Client and I2RS Agent are guided =
by a physical =E2=80=9CWall=E2=80=9D. &nbsp;The false sense of =
=E2=80=9CSecure=E2=80=9D is actually more dangerous because it can =
easily make the deployment miss the crucial security procedure. =
<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Therefore, I think it is important to have a dedicated section on =
security threats and requirement for the Closed Environment. =
<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Linda<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><div =
style=3D'border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in'><p class=3DMsoNormal><b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>From:</span>=
</b><span style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'> =
<a href=3D"mailto:mglt.ietf@gmail.com">mglt.ietf@gmail.com</a> [<a =
href=3D"mailto:mglt.ietf@gmail.com">mailto:mglt.ietf@gmail.com</a>] =
<b>On Behalf Of </b>Daniel Migault<br><b>Sent:</b> Monday, August 24, =
2015 12:55 PM<br><b>To:</b> Linda Dunbar<br><b>Cc:</b> Joel M. Halpern; =
<a href=3D"mailto:i2rs@ietf.org">i2rs@ietf.org</a>; Jeffrey Haas; Alia =
Atlas<br><b>Subject:</b> Re: [i2rs] Review comments to =
draft-mglt-i2rs-security-environment-reqs-00 (was RE: =
draft-mglt-i2rs-security-requirements-00 2 Week WG adoption call (8/17 =
to 8/31)<o:p></o:p></span></p></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><div><div><div><div><p =
class=3DMsoNormal style=3D'margin-bottom:12.0pt'>Hi Linda, =
<o:p></o:p></p></div><p class=3DMsoNormal =
style=3D'margin-bottom:12.0pt'>Thank you for your comments. I agree we =
need to address more specifically or explicitly the &quot;most =
common&quot; use case. I agree with your comments and we will consider =
them to improve and clarify the text of the next version. Thank you. To =
me the i2rs plane provides a limited number of functionnalities that may =
be provided to different independant tenants.&nbsp; =
<o:p></o:p></p></div><p class=3DMsoNormal>BR, <o:p></o:p></p></div><p =
class=3DMsoNormal>Daniel<o:p></o:p></p><div><div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p></div></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><div><p class=3DMsoNormal>On Mon, =
Aug 24, 2015 at 1:37 PM, Linda Dunbar &lt;<a =
href=3D"mailto:linda.dunbar@huawei.com" =
target=3D"_blank">linda.dunbar@huawei.com</a>&gt; =
wrote:<o:p></o:p></p><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Joel, </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Agree with you that =E2=80=9C</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:black'=
>we don=E2=80=99t need to build different protocol stacks for the =
different deployments=E2=80=9D. </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>But the =E2=80=9Cenvironment-req=E2=80=9D draft is not about =
=E2=80=9CProtocol=E2=80=9D, but about security issues under different =
=E2=80=9Cenvironment=E2=80=9D. </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Among all our customers who are interested in I2RS, majority of them =
(&gt;90%) will deploy them in a closed environment, i.e. physically =
secured&nbsp; connection between I2RS agent and I2RS client. Therefore, =
it is important to =E2=80=9C</span><span =
style=3D'font-size:10.0pt;font-family:Courier;color:black'>provides an =
analysis of the security issues of=E2=80=9D </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>of this commonly deployed environment. </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;color:#1F497D'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>I suggest adding this Figure to Section 1 of the =
document:</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:#1F497D'>Closed&nbsp; (over open Chnl =
###&gt;)&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Open =
(over secure Chnl ---&gt;)</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:#1F497D'>+---------------------------------+</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:#1F497D'>|&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
***********************&nbsp;&nbsp; |&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
***********************&nbsp; |</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:#1F497D'>|&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
*&nbsp;&nbsp;&nbsp; Application A&nbsp;&nbsp;&nbsp; *&nbsp;&nbsp; =
|&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *&nbsp;&nbsp;&nbsp; Application =
B&nbsp;&nbsp;&nbsp; *&nbsp; |</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:#1F497D'>|&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
*&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *&nbsp;&nbsp; =
|&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
*&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *&nbsp; |</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:#1F497D'>|&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *&nbsp; =
+----------------+ *&nbsp;&nbsp; |&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *&nbsp; =
+----------------+ *&nbsp; |</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:#1F497D'>|&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *&nbsp; =
|&nbsp;&nbsp; Client A&nbsp;&nbsp;&nbsp;&nbsp; | *&nbsp;&nbsp; =
|&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *&nbsp; |&nbsp;&nbsp; Client =
B&nbsp;&nbsp;&nbsp;&nbsp; | *&nbsp; |</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:#1F497D'>|&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *&nbsp; =
+----------------+ *&nbsp;&nbsp; |&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *&nbsp; =
+----------------+ *&nbsp; |</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:#1F497D'>|&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ******* ^ =
*************&nbsp;&nbsp; |&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ***** ^ ****** =
^ ******&nbsp; |</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:#1F497D'>|&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
#&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp; =
|&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
|&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
|&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; |</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:#1F497D'>|&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; #&nbsp;&nbsp; =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp; =
|&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
|&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; |&nbsp;&nbsp; =
|-----|</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:#1F497D'>|&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; #&nbsp;&nbsp; &nbsp;&nbsp; =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
|&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; |&nbsp;&nbsp; =
|</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:#1F497D'>|&nbsp; ************ v * * * * ********|&nbsp;&nbsp; =
***************** v * v ********</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:#1F497D'>|&nbsp; *&nbsp; =
+---------------------+&nbsp;&nbsp;&nbsp;&nbsp; |&nbsp;&nbsp; *&nbsp; =
+---------------------+&nbsp;&nbsp;&nbsp;&nbsp; *</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:#1F497D'>|&nbsp; *&nbsp; |&nbsp;&nbsp;&nbsp;&nbsp; Agent =
1&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
|&nbsp;&nbsp;&nbsp;&nbsp; |&nbsp;&nbsp; *&nbsp; |&nbsp;&nbsp;&nbsp; =
Agent 2&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
|&nbsp;&nbsp;&nbsp;&nbsp; *</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:#1F497D'>|&nbsp; *&nbsp; =
+---------------------+&nbsp;&nbsp;&nbsp;&nbsp; |&nbsp;&nbsp; *&nbsp; =
+---------------------+&nbsp;&nbsp;&nbsp;&nbsp; *</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:#1F497D'>|&nbsp; *&nbsp;&nbsp;&nbsp;&nbsp; =
^&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ^&nbsp; ^&nbsp;&nbsp; =
^&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; |&nbsp;&nbsp; =
*&nbsp;&nbsp;&nbsp;&nbsp; ^&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
^&nbsp; ^&nbsp;&nbsp; ^&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
*</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;color:#1F497D'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;color:#1F497D'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;color:#1F497D'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Just think about this fact: today=E2=80=99s router configuration in =
production environment can only be performed by a few authorized people =
with EMS/NMS physically and securely separated. If the majority of the =
I2RS environment requirement is about open connection, I2RS WG will =
spend a lot energy developing the very sophisticated protocols which is =
expensive to develop and harder to deploy. </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;color:#1F497D'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>I am not against this development, but IMHO, to gain wider and =
quicker I2RS deployment in production environment, it is necessary to =
have a very </span><b><u><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:red'>l=
ean</span></u></b><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'> I2RS solution first, and to have a well documented security =
requirement for the common deployment environment. E.g. a single =
Controller (or the I2RS client) directly connected to their devices via =
their internal network, where the connection is physically isolated from =
other network and protected by separate mechanisms. Also remember, many =
operators will use I2RS to control a small number of selective routers =
(mostly routers at ingress/egress boundary) for value added services. =
</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;color:#1F497D'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;color:#1F497D'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;color:#1F497D'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Some of my detailed questions and comments to the =
=E2=80=9Csecurity-requirements=E2=80=9D are still applicable to the =
=E2=80=9Cenvironment-req=E2=80=9D document because they have the same =
text. Plus a few more for the =E2=80=9Cenvironment-req=E2=80=9D =
document. Hope the authors can address them. </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;color:#1F497D'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;color:#1F497D'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Section 3: </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;color:#1F497D'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>What are the key differences with regard to the security requirements =
for &nbsp;I2RS plane and for management plane?&nbsp; Section 3.1 =
describes the interaction between I2RS plane and management plane. But I =
see the security requirement for the management plane are all applicable =
to the security requirement to I2RS plane . If you think that they are =
very different, can you elaborate more? </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;color:#1F497D'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Section 3.4 has title =E2=80=9CRecommendations=E2=80=9D, but the =
content are all requirements. Why not name the section =
=E2=80=9CRequirement=E2=80=9D? </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>REQ 2: Does it that a different IP address than the one used by the =
management system?</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>REQ 21: is more about I2RS requirement, less about =
=E2=80=9CSecurity=E2=80=9D requirement. </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>REQ 24: isn=E2=80=99t it the general goal of I2RS? Not really =
security per se. (should be included in the general I2RS requirement or =
architecture). </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;color:#1F497D'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>REQ 26: simply controlling the resource can hardly prevent DoS. =
Malicious client can occupy the resource while the valid one can't =
access.</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Thanks for your consideration, </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Linda</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>-----Original =
Message-----<br>From: i2rs [<a href=3D"mailto:i2rs-bounces@ietf.org" =
target=3D"_blank">mailto:i2rs-bounces@ietf.org</a>] On Behalf Of Joel M. =
Halpern<br>Sent: Friday, August 21, 2015 12:20 PM<br>To: Linda Dunbar; =
<a href=3D"mailto:i2rs@ietf.org" =
target=3D"_blank">i2rs@ietf.org</a><br>Cc: 'Jeffrey Haas'; <a =
href=3D"mailto:daniel.migault@ericsson.com" =
target=3D"_blank">daniel.migault@ericsson.com</a>; 'Alia =
Atlas'<br>Subject: Re: [i2rs] draft-mglt-i2rs-security-requirements-00 2 =
Week WG adoption call (8/17 to 8/31)</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>Yes, one of the two last =
calls is for the environment document.</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>Having a dedicated =
physical channel is one of the ways identified in the draft to provide =
the required isolation.</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>While such an =
environment is clearly supportable, I do not think we should reduce the =
internal protocol requirements (such as MTI security for the control =
channel) just because there are circumstances where such it won't be =
needed.&nbsp; I don't expect that we will build different protocol =
stacks for the different deployments.</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>The purpose of this =
draft is to describe the environmental assumptions, which assumptions =
can be met in various ways.</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>Yours,</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>Joel</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>On 8/21/15 12:56 PM, =
Linda Dunbar wrote:</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt; Joel,</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt; If it is the =
&quot;environmental one&quot;, it is more important to differentiate the =
requirements for different environments on how the I2RS client &amp; =
Agent are connected.</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt; One of our =
customers stated that their environment has a single Controller (or the =
I2RS client) directly connected to their devices via their internal =
network, where the connection is physically isolated from other network =
and protected by separate mechanisms, they don't need all those =
sophisticated authentication procedure.</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt; We need to address =
this environment, i.e. having a simpler security requirement for this =
environment than the environment where I2RS Client is connected via =
public network.</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt; Linda</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt; -----Original =
Message-----</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt; From: Joel Halpern =
Direct [<a href=3D"mailto:jmh.direct@joelhalpern.com" =
target=3D"_blank">mailto:jmh.direct@joelhalpern.com</a>]</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt; Sent: Friday, =
August 21, 2015 10:53 AM</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt; To: Linda Dunbar; =
<a href=3D"mailto:i2rs@ietf.org" =
target=3D"_blank">i2rs@ietf.org</a></span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt; Cc: 'Jeffrey Haas'; =
<a href=3D"mailto:daniel.migault@ericsson.com" =
target=3D"_blank">daniel.migault@ericsson.com</a>; 'Joel Halpern'; 'Alia =
Atlas'</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt; Subject: Re: [i2rs] =
draft-mglt-i2rs-security-requirements-00 2 Week WG </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt; adoption call (8/17 =
to 8/31)</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt; First, there may be =
some confusion because the announcement.&nbsp; I presume that you are =
talking about the -environments documents.</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt; If the WG concludes =
that a different chapter structure is useful, we can of course change =
it.&nbsp; Given that the goal is environment description, I am not sure =
your proposed structure is significantly better than the existing =
one.</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt; I believe your =
comment about the text&nbsp; reading &quot;where security functions may =
be hosted&quot; is well taken, and we should remove that text when we =
next revise the document.</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt; The isolation text =
is about the need to keep things separate, and the various possible =
means are degrees / approaches to separation.</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt; Isolation is not =
about treating things differently, nor is it explicitly about using =
different protocols.&nbsp; So the point of isolation is not that there =
are different security requirements, but that in order to avoid =
corss-effects, things should be kept separate.</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt; Yours,</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt; Joel</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt; On 8/20/15 6:42 PM, =
Linda Dunbar wrote:</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; I support the =
WG adoption because I think the I2RS WG needs it.</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; However, I hope =
the authors can consider/address the following =
suggestions/comments:</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; When you think =
about the I2RS security,&nbsp; there are following </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; =
different</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; =
aspects:</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; -Communication =
channel between I2RS client and Agent (and the channel </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; between I2RS =
client and applications):</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; The channel can =
be</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; oVia physical =
Private network (e.g. within a secured direct connect </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; within one =
site),</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; owithin one =
administrative domain,&nbsp; via virtual private network</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; oSecured =
connection, such as TLS or IPSec</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; oPublic =
internet</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; o..</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; -Authentication =
&amp; Authorization</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; othe =
authentication &amp; authorization requirement for different =
</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; communication =
channels can be different. Therefore, should have </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; separate =
sections to address specific requirement&nbsp; for each </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; communication =
channels between I2RS agent &lt;-&gt; clients (and client =
&lt;-&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; =
applications)</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; The current =
Section 4 of the draft already has very good description </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; on the subject. =
I think 4.4.1 and 4.42 can be separated out of the section.</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; -Encryption for =
the actual content between Client and Agent</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; -DoS Design =
requirement (currently in Section 5.2.1)</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; -Management of =
conflict with other plane (e.g. the management plane, </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; multi-headed =
control, which has been discussed extensively in </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; =
ephemeral</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; =
draft)</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; I think the =
draft should be organized from the aspects of the </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; security to =
I2RS as suggested above.</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; Here are some =
detailed questions and comments to the requirements </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; listed in the =
document:</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; Section =
1:</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; The second =
paragraph stated the security recommendations must </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; =
&quot;specifying where security functions may be hosted&quot;. First of =
all I</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; don't see the =
draft address this aspect. Second, I think&nbsp;&nbsp; =
&quot;where</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; security =
functions are hosted&quot; is orthogonal to &quot;I2RS security&quot; =
.</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; Section =
3:</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; what does =
isolating two planes mean? does it mean they have different </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; security =
requirement/issues? Or does it mean they need different =
protocols?</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; What are the =
key differences with regard to the security requirements </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; for&nbsp; I2RS =
plane and for management plane?&nbsp; Section 3.1 describes the =
</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; interaction =
between I2RS plane and management plane. But I see the </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; security =
requirement for the management plane is similar to I2RS plane =
.</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; If you think =
that they are very different, can you elaborate more?</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; Section 3.4 has =
title &quot;Recommendations&quot;, but the content are all </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; requirements. =
Why not name the section &quot;Requirement&quot;?</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; REQ 2: Does it =
that a different IP address than the one used by the </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; management =
system?</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; How is REQ 22 =
different from REQ 21?</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; REQ 27 is hard =
to enforce. How about say something like &quot;shouldn't </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; send any =
information beyond what have been defined by the I2RS data =
model&quot;?</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; REQ 30: simply =
controlling the resource can hardly prevent DoS.</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; Malicious =
client can occupy the resource while the valid one can't =
access.</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; Thanks for =
consideration,</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; =
Linda</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; *From:*i2rs [<a =
href=3D"mailto:i2rs-bounces@ietf.org" =
target=3D"_blank">mailto:i2rs-bounces@ietf.org</a>] *On Behalf Of *Susan =
Hares</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; *Sent:* Monday, =
August 17, 2015 12:50 PM</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; *To:* <a =
href=3D"mailto:i2rs@ietf.org" =
target=3D"_blank">i2rs@ietf.org</a></span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; *Cc:* 'Jeffrey =
Haas'; <a href=3D"mailto:daniel.migault@ericsson.com" =
target=3D"_blank">daniel.migault@ericsson.com</a>; 'Joel Halpern'; =
</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; <a =
href=3D"mailto:shares@ndzh.com" target=3D"_blank">shares@ndzh.com</a>; =
'Alia Atlas'</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; *Subject:* =
[i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; adoption call =
(8/17 to 8/31)</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; This begins a 2 =
week WG adoption call for </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; =
draft-mglt-i2rs-security-requirements.&nbsp; This draft discusses the =
</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; security =
requirements for the I2RS environment.&nbsp; You can find the draft =
at:</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; <a =
href=3D"https://tools.ietf.org/html/draft-mglt-i2rs-security-environment-=
reqs" =
target=3D"_blank">https://tools.ietf.org/html/draft-mglt-i2rs-security-en=
vironment-reqs</a></span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; -</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; 00</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; A security =
reviewer will review this draft during the time 8/20 to</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; =
8/25.&nbsp;&nbsp; We will post the security directorate review to this =
discussion.</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; Sue =
Hares</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>_________________________=
______________________</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>i2rs mailing =
list</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt'><a href=3D"mailto:i2rs@ietf.org" =
target=3D"_blank"><span =
style=3D'font-family:Consolas'>i2rs@ietf.org</span></a></span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt'><a =
href=3D"https://www.ietf.org/mailman/listinfo/i2rs" =
target=3D"_blank"><span =
style=3D'font-family:Consolas'>https://www.ietf.org/mailman/listinfo/i2rs=
</span></a></span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div></div><p class=3DMsoNormal =
style=3D'margin-bottom:12.0pt'><br>______________________________________=
_________<br>i2rs mailing list<br><a =
href=3D"mailto:i2rs@ietf.org">i2rs@ietf.org</a><br><a =
href=3D"https://www.ietf.org/mailman/listinfo/i2rs" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/i2rs</a><o:p></o:=
p></p></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div></div></div></body></html>
------=_NextPart_000_0193_01D0E0E7.DA377880--


From nobody Thu Aug 27 13:49:02 2015
Return-Path: <shares@ndzh.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C2A9E1A6FF0 for <i2rs@ietfa.amsl.com>; Thu, 27 Aug 2015 13:49:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -99.054
X-Spam-Level: 
X-Spam-Status: No, score=-99.054 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DOS_OUTLOOK_TO_MX=2.845, HTML_MESSAGE=0.001, USER_IN_WHITELIST=-100] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3o37EhsKMVrW for <i2rs@ietfa.amsl.com>; Thu, 27 Aug 2015 13:48:57 -0700 (PDT)
Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 80C101A1AC2 for <i2rs@ietf.org>; Thu, 27 Aug 2015 13:48:56 -0700 (PDT)
X-Default-Received-SPF: pass (skip=forwardok (res=PASS)) x-ip-name=174.124.171.7; 
From: "Susan Hares" <shares@ndzh.com>
To: "'Linda Dunbar'" <linda.dunbar@huawei.com>, "'Daniel Migault'" <daniel.migault@ericsson.com>
References: <CADZyTknZ4ZzrxTB_Miud=-xMfckmD4LR7vdz+3uAg9gL7X22-g@mail.gmail.com> <4A95BA014132FF49AE685FAB4B9F17F657D1757E@dfweml701-chm> <4A95BA014132FF49AE685FAB4B9F17F657D17BA5@dfweml701-chm>
In-Reply-To: <4A95BA014132FF49AE685FAB4B9F17F657D17BA5@dfweml701-chm>
Date: Thu, 27 Aug 2015 16:48:37 -0400
Message-ID: <01bf01d0e109$bff45340$3fdcf9c0$@ndzh.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_01C0_01D0E0E8.38ED61A0"
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQG6Lp4YXtGNsC6f02fj2EU/5giwSAHiq012AYKryNeeMor74A==
Content-Language: en-us
X-Authenticated-User: skh@ndzh.com 
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/CoXT0rrVevTNd5DZEcGcTptoIu8>
Cc: 'Jeffrey Haas' <jhaas@pfrc.org>, i2rs@ietf.org, "'Joel M. Halpern'" <jmh@joelhalpern.com>, 'Alia Atlas' <akatlas@gmail.com>
Subject: Re: [i2rs] Suggested section/text to be added to draft-mglt-i2rs-security-environment-reqs-00 to address security threats in Closed Envionment.
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 27 Aug 2015 20:49:01 -0000

This is a multipart message in MIME format.

------=_NextPart_000_01C0_01D0E0E8.38ED61A0
Content-Type: text/plain;
	charset="utf-8"
Content-Transfer-Encoding: quoted-printable

Linda:=20

=20

Thank you for your additional thoughts on the closed system (garden wall =
system) vs. open system.=20

=20

=20

REQ c+2: The I2RS Client should have preconfigured threshold for each =
category that can be requested or changed by its allowed applications. =
When the prefigured threshold is crossed, alarms should be generated.=20

=20

By pre-configured threshold category =E2=80=93 I suspect you category of =
security errors or warnings.=20

=20

Sue=20

=20

From: Linda Dunbar [mailto:linda.dunbar@huawei.com]=20
Sent: Tuesday, August 25, 2015 12:21 PM
To: Linda Dunbar; Daniel Migault
Cc: Jeffrey Haas; i2rs@ietf.org; Joel M. Halpern; Alia Atlas; Susan =
Hares
Subject: RE: [i2rs] Suggested section/text to be added to =
draft-mglt-i2rs-security-environment-reqs-00 to address security threats =
in Closed Envionment.

=20

Daniel,=20

=20

I added 3 more I2RS security requirements for the =E2=80=9CClosed =
Environment=E2=80=9D, please use the revised section attached.=20

=20

Cheers,=20

Linda

=20

From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Linda Dunbar
Sent: Monday, August 24, 2015 5:09 PM
To: Daniel Migault
Cc: Jeffrey Haas; i2rs@ietf.org; Joel M. Halpern; Alia Atlas
Subject: [i2rs] Suggested section/text to be added to =
draft-mglt-i2rs-security-environment-reqs-00 to address security threats =
in Closed Envionment.

=20

Daniel,=20

=20

Thank you for willing to address my comments. To make it easier for you, =
I put together a section to describe the security threats in Closed =
Environment and necessary requirement for I2RS. See the attached.=20

=20

Closed environment deployment can easily give people a sense of secure =
because the links between I2RS Client and I2RS Agent are guided by a =
physical =E2=80=9CWall=E2=80=9D.  The false sense of =
=E2=80=9CSecure=E2=80=9D is actually more dangerous because it can =
easily make the deployment miss the crucial security procedure.=20

=20

Therefore, I think it is important to have a dedicated section on =
security threats and requirement for the Closed Environment.=20

=20

Linda

=20

From: mglt.ietf@gmail.com [mailto:mglt.ietf@gmail.com] On Behalf Of =
Daniel Migault
Sent: Monday, August 24, 2015 12:55 PM
To: Linda Dunbar
Cc: Joel M. Halpern; i2rs@ietf.org; Jeffrey Haas; Alia Atlas
Subject: Re: [i2rs] Review comments to =
draft-mglt-i2rs-security-environment-reqs-00 (was RE: =
draft-mglt-i2rs-security-requirements-00 2 Week WG adoption call (8/17 =
to 8/31)

=20

Hi Linda,=20

Thank you for your comments. I agree we need to address more =
specifically or explicitly the "most common" use case. I agree with your =
comments and we will consider them to improve and clarify the text of =
the next version. Thank you. To me the i2rs plane provides a limited =
number of functionnalities that may be provided to different independant =
tenants. =20

BR,=20

Daniel

=20

=20

On Mon, Aug 24, 2015 at 1:37 PM, Linda Dunbar <linda.dunbar@huawei.com> =
wrote:

Joel,=20

=20

Agree with you that =E2=80=9Cwe don=E2=80=99t need to build different =
protocol stacks for the different deployments=E2=80=9D.=20

But the =E2=80=9Cenvironment-req=E2=80=9D draft is not about =
=E2=80=9CProtocol=E2=80=9D, but about security issues under different =
=E2=80=9Cenvironment=E2=80=9D.=20

=20

Among all our customers who are interested in I2RS, majority of them =
(>90%) will deploy them in a closed environment, i.e. physically secured =
 connection between I2RS agent and I2RS client. Therefore, it is =
important to =E2=80=9Cprovides an analysis of the security issues =
of=E2=80=9D of this commonly deployed environment.=20

=20

I suggest adding this Figure to Section 1 of the document:

=20

Closed  (over open Chnl ###>)          Open (over secure Chnl --->)

+---------------------------------+

|      ***********************   |      ***********************  |

|       *    Application A    *   |      *    Application B    *  |

|       *                     *   |      *                     *  |

|       *  +----------------+ *   |      *  +----------------+ *  |

|       *  |   Client A     | *   |      *  |   Client B     | *  |

|       *  +----------------+ *   |      *  +----------------+ *  |

|       ******* ^ *************   |      ***** ^ ****** ^ ******  |

|               #                 |            |        |         |

|               #                 |            |        |   |-----|

|               #               |                     |   |

|  ************ v * * * * ********|   ***************** v * v ********

|  *  +---------------------+     |   *  +---------------------+     *

|  *  |     Agent 1         |     |   *  |    Agent 2          |     *

|  *  +---------------------+     |   *  +---------------------+     *

|  *     ^        ^  ^   ^        |   *     ^        ^  ^   ^        *

=20

=20

=20

Just think about this fact: today=E2=80=99s router configuration in =
production environment can only be performed by a few authorized people =
with EMS/NMS physically and securely separated. If the majority of the =
I2RS environment requirement is about open connection, I2RS WG will =
spend a lot energy developing the very sophisticated protocols which is =
expensive to develop and harder to deploy.=20

=20

I am not against this development, but IMHO, to gain wider and quicker =
I2RS deployment in production environment, it is necessary to have a =
very lean I2RS solution first, and to have a well documented security =
requirement for the common deployment environment. E.g. a single =
Controller (or the I2RS client) directly connected to their devices via =
their internal network, where the connection is physically isolated from =
other network and protected by separate mechanisms. Also remember, many =
operators will use I2RS to control a small number of selective routers =
(mostly routers at ingress/egress boundary) for value added services.=20

=20

=20

=20

Some of my detailed questions and comments to the =
=E2=80=9Csecurity-requirements=E2=80=9D are still applicable to the =
=E2=80=9Cenvironment-req=E2=80=9D document because they have the same =
text. Plus a few more for the =E2=80=9Cenvironment-req=E2=80=9D =
document. Hope the authors can address them.=20

=20

=20

Section 3:=20

=20

What are the key differences with regard to the security requirements =
for  I2RS plane and for management plane?  Section 3.1 describes the =
interaction between I2RS plane and management plane. But I see the =
security requirement for the management plane are all applicable to the =
security requirement to I2RS plane . If you think that they are very =
different, can you elaborate more?=20

=20

Section 3.4 has title =E2=80=9CRecommendations=E2=80=9D, but the content =
are all requirements. Why not name the section =
=E2=80=9CRequirement=E2=80=9D?=20

=20

REQ 2: Does it that a different IP address than the one used by the =
management system?

=20

REQ 21: is more about I2RS requirement, less about =
=E2=80=9CSecurity=E2=80=9D requirement.=20

=20

REQ 24: isn=E2=80=99t it the general goal of I2RS? Not really security =
per se. (should be included in the general I2RS requirement or =
architecture).=20

=20

=20

REQ 26: simply controlling the resource can hardly prevent DoS. =
Malicious client can occupy the resource while the valid one can't =
access.

=20

Thanks for your consideration,=20

Linda

=20

=20

-----Original Message-----
From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Joel M. Halpern
Sent: Friday, August 21, 2015 12:20 PM
To: Linda Dunbar; i2rs@ietf.org
Cc: 'Jeffrey Haas'; daniel.migault@ericsson.com; 'Alia Atlas'
Subject: Re: [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG =
adoption call (8/17 to 8/31)

=20

Yes, one of the two last calls is for the environment document.

=20

Having a dedicated physical channel is one of the ways identified in the =
draft to provide the required isolation.

=20

While such an environment is clearly supportable, I do not think we =
should reduce the internal protocol requirements (such as MTI security =
for the control channel) just because there are circumstances where such =
it won't be needed.  I don't expect that we will build different =
protocol stacks for the different deployments.

=20

The purpose of this draft is to describe the environmental assumptions, =
which assumptions can be met in various ways.

=20

Yours,

Joel

=20

On 8/21/15 12:56 PM, Linda Dunbar wrote:

> Joel,

>=20

> If it is the "environmental one", it is more important to =
differentiate the requirements for different environments on how the =
I2RS client & Agent are connected.

>=20

> One of our customers stated that their environment has a single =
Controller (or the I2RS client) directly connected to their devices via =
their internal network, where the connection is physically isolated from =
other network and protected by separate mechanisms, they don't need all =
those sophisticated authentication procedure.

>=20

> We need to address this environment, i.e. having a simpler security =
requirement for this environment than the environment where I2RS Client =
is connected via public network.

>=20

> Linda

>=20

>=20

> -----Original Message-----

> From: Joel Halpern Direct [mailto:jmh.direct@joelhalpern.com]

> Sent: Friday, August 21, 2015 10:53 AM

> To: Linda Dunbar; i2rs@ietf.org

> Cc: 'Jeffrey Haas'; daniel.migault@ericsson.com; 'Joel Halpern'; 'Alia =
Atlas'

> Subject: Re: [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG =


> adoption call (8/17 to 8/31)

>=20

> First, there may be some confusion because the announcement.  I =
presume that you are talking about the -environments documents.

>=20

> If the WG concludes that a different chapter structure is useful, we =
can of course change it.  Given that the goal is environment =
description, I am not sure your proposed structure is significantly =
better than the existing one.

>=20

> I believe your comment about the text  reading "where security =
functions may be hosted" is well taken, and we should remove that text =
when we next revise the document.

>=20

> The isolation text is about the need to keep things separate, and the =
various possible means are degrees / approaches to separation.

> Isolation is not about treating things differently, nor is it =
explicitly about using different protocols.  So the point of isolation =
is not that there are different security requirements, but that in order =
to avoid corss-effects, things should be kept separate.

>=20

> Yours,

> Joel

>=20

> On 8/20/15 6:42 PM, Linda Dunbar wrote:

>> I support the WG adoption because I think the I2RS WG needs it.

>> However, I hope the authors can consider/address the following =
suggestions/comments:

>>=20

>> When you think about the I2RS security,  there are following=20

>> different

>> aspects:

>>=20

>> -Communication channel between I2RS client and Agent (and the channel =


>> between I2RS client and applications):

>>=20

>> The channel can be

>>=20

>> oVia physical Private network (e.g. within a secured direct connect=20

>> within one site),

>>=20

>> owithin one administrative domain,  via virtual private network

>>=20

>> oSecured connection, such as TLS or IPSec

>>=20

>> oPublic internet

>>=20

>> o..

>>=20

>> -Authentication & Authorization

>>=20

>> othe authentication & authorization requirement for different=20

>> communication channels can be different. Therefore, should have=20

>> separate sections to address specific requirement  for each=20

>> communication channels between I2RS agent <-> clients (and client <->

>> applications)

>>=20

>> The current Section 4 of the draft already has very good description=20

>> on the subject. I think 4.4.1 and 4.42 can be separated out of the =
section.

>>=20

>> -Encryption for the actual content between Client and Agent

>>=20

>> -DoS Design requirement (currently in Section 5.2.1)

>>=20

>> -Management of conflict with other plane (e.g. the management plane,=20

>> multi-headed control, which has been discussed extensively in=20

>> ephemeral

>> draft)

>>=20

>> I think the draft should be organized from the aspects of the=20

>> security to I2RS as suggested above.

>>=20

>> Here are some detailed questions and comments to the requirements=20

>> listed in the document:

>>=20

>> Section 1:

>>=20

>> The second paragraph stated the security recommendations must=20

>> "specifying where security functions may be hosted". First of all I

>> don't see the draft address this aspect. Second, I think   "where

>> security functions are hosted" is orthogonal to "I2RS security" .

>>=20

>> Section 3:

>>=20

>> what does isolating two planes mean? does it mean they have different =


>> security requirement/issues? Or does it mean they need different =
protocols?

>>=20

>> What are the key differences with regard to the security requirements =


>> for  I2RS plane and for management plane?  Section 3.1 describes the=20

>> interaction between I2RS plane and management plane. But I see the=20

>> security requirement for the management plane is similar to I2RS =
plane .

>> If you think that they are very different, can you elaborate more?

>>=20

>> Section 3.4 has title "Recommendations", but the content are all=20

>> requirements. Why not name the section "Requirement"?

>>=20

>> REQ 2: Does it that a different IP address than the one used by the=20

>> management system?

>>=20

>> How is REQ 22 different from REQ 21?

>>=20

>> REQ 27 is hard to enforce. How about say something like "shouldn't=20

>> send any information beyond what have been defined by the I2RS data =
model"?

>>=20

>> REQ 30: simply controlling the resource can hardly prevent DoS.

>> Malicious client can occupy the resource while the valid one can't =
access.

>>=20

>> Thanks for consideration,

>>=20

>> Linda

>>=20

>> *From:*i2rs [mailto:i2rs-bounces@ietf.org] *On Behalf Of *Susan Hares

>> *Sent:* Monday, August 17, 2015 12:50 PM

>> *To:* i2rs@ietf.org

>> *Cc:* 'Jeffrey Haas'; daniel.migault@ericsson.com; 'Joel Halpern';=20

>> shares@ndzh.com; 'Alia Atlas'

>> *Subject:* [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG=20

>> adoption call (8/17 to 8/31)

>>=20

>> This begins a 2 week WG adoption call for=20

>> draft-mglt-i2rs-security-requirements.  This draft discusses the=20

>> security requirements for the I2RS environment.  You can find the =
draft at:

>>=20

>> https://tools.ietf.org/html/draft-mglt-i2rs-security-environment-reqs

>> -

>> 00

>>=20

>> A security reviewer will review this draft during the time 8/20 to

>> 8/25.   We will post the security directorate review to this =
discussion.

>>=20

>> Sue Hares

>>=20

>=20

=20

_______________________________________________

i2rs mailing list

 <mailto:i2rs@ietf.org> i2rs@ietf.org

 <https://www.ietf.org/mailman/listinfo/i2rs> =
https://www.ietf.org/mailman/listinfo/i2rs

=20


_______________________________________________
i2rs mailing list
i2rs@ietf.org
https://www.ietf.org/mailman/listinfo/i2rs

=20


------=_NextPart_000_01C0_01D0E0E8.38ED61A0
Content-Type: text/html;
	charset="utf-8"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><meta =
http-equiv=3DContent-Type content=3D"text/html; charset=3Dutf-8"><meta =
name=3DGenerator content=3D"Microsoft Word 14 (filtered =
medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:Courier;
	panose-1:2 7 4 9 2 2 5 2 4 4;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
span.EmailStyle19
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle20
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle21
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue =
vlink=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Linda: <o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Thank you for your additional thoughts on the closed system (garden =
wall system) vs. open system. <o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal =
style=3D'margin-left:6.0pt'><span =
style=3D'font-size:10.0pt;font-family:"Courier =
New"'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal =
style=3D'margin-left:6.0pt'><span =
style=3D'font-size:10.0pt;font-family:"Courier New"'>REQ c+2: The I2RS =
Client should have preconfigured threshold for each category that can be =
requested or changed by its allowed applications. When the prefigured =
threshold is crossed, alarms should be generated. =
<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>By pre-configured threshold category =E2=80=93 I suspect you category =
of security errors or warnings. <o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Sue <o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><div><div =
style=3D'border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in'><p class=3DMsoNormal><b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>From:</span>=
</b><span style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'> =
Linda Dunbar [mailto:linda.dunbar@huawei.com] <br><b>Sent:</b> Tuesday, =
August 25, 2015 12:21 PM<br><b>To:</b> Linda Dunbar; Daniel =
Migault<br><b>Cc:</b> Jeffrey Haas; i2rs@ietf.org; Joel M. Halpern; Alia =
Atlas; Susan Hares<br><b>Subject:</b> RE: [i2rs] Suggested section/text =
to be added to draft-mglt-i2rs-security-environment-reqs-00 to address =
security threats in Closed =
Envionment.<o:p></o:p></span></p></div></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Daniel, <o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>I added 3 more I2RS security requirements for the =E2=80=9CClosed =
Environment=E2=80=9D, please use the revised section attached. =
<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Cheers, <o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Linda<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><div><div =
style=3D'border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in'><p class=3DMsoNormal><b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>From:</span>=
</b><span style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'> =
i2rs [<a =
href=3D"mailto:i2rs-bounces@ietf.org">mailto:i2rs-bounces@ietf.org</a>] =
<b>On Behalf Of </b>Linda Dunbar<br><b>Sent:</b> Monday, August 24, 2015 =
5:09 PM<br><b>To:</b> Daniel Migault<br><b>Cc:</b> Jeffrey Haas; <a =
href=3D"mailto:i2rs@ietf.org">i2rs@ietf.org</a>; Joel M. Halpern; Alia =
Atlas<br><b>Subject:</b> [i2rs] Suggested section/text to be added to =
draft-mglt-i2rs-security-environment-reqs-00 to address security threats =
in Closed Envionment.<o:p></o:p></span></p></div></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Daniel, <o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Thank you for willing to address my comments. To make it easier for =
you, I put together a section to describe the security threats in Closed =
Environment and necessary requirement for I2RS. See the attached. =
<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Closed environment deployment can easily give people a sense of =
secure because the links between I2RS Client and I2RS Agent are guided =
by a physical =E2=80=9CWall=E2=80=9D. &nbsp;The false sense of =
=E2=80=9CSecure=E2=80=9D is actually more dangerous because it can =
easily make the deployment miss the crucial security procedure. =
<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Therefore, I think it is important to have a dedicated section on =
security threats and requirement for the Closed Environment. =
<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Linda<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><div =
style=3D'border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in'><p class=3DMsoNormal><b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>From:</span>=
</b><span style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'> =
<a href=3D"mailto:mglt.ietf@gmail.com">mglt.ietf@gmail.com</a> [<a =
href=3D"mailto:mglt.ietf@gmail.com">mailto:mglt.ietf@gmail.com</a>] =
<b>On Behalf Of </b>Daniel Migault<br><b>Sent:</b> Monday, August 24, =
2015 12:55 PM<br><b>To:</b> Linda Dunbar<br><b>Cc:</b> Joel M. Halpern; =
<a href=3D"mailto:i2rs@ietf.org">i2rs@ietf.org</a>; Jeffrey Haas; Alia =
Atlas<br><b>Subject:</b> Re: [i2rs] Review comments to =
draft-mglt-i2rs-security-environment-reqs-00 (was RE: =
draft-mglt-i2rs-security-requirements-00 2 Week WG adoption call (8/17 =
to 8/31)<o:p></o:p></span></p></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><div><div><div><div><p =
class=3DMsoNormal style=3D'margin-bottom:12.0pt'>Hi Linda, =
<o:p></o:p></p></div><p class=3DMsoNormal =
style=3D'margin-bottom:12.0pt'>Thank you for your comments. I agree we =
need to address more specifically or explicitly the &quot;most =
common&quot; use case. I agree with your comments and we will consider =
them to improve and clarify the text of the next version. Thank you. To =
me the i2rs plane provides a limited number of functionnalities that may =
be provided to different independant tenants.&nbsp; =
<o:p></o:p></p></div><p class=3DMsoNormal>BR, <o:p></o:p></p></div><p =
class=3DMsoNormal>Daniel<o:p></o:p></p><div><div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p></div></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><div><p class=3DMsoNormal>On Mon, =
Aug 24, 2015 at 1:37 PM, Linda Dunbar &lt;<a =
href=3D"mailto:linda.dunbar@huawei.com" =
target=3D"_blank">linda.dunbar@huawei.com</a>&gt; =
wrote:<o:p></o:p></p><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Joel, </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Agree with you that =E2=80=9C</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:black'=
>we don=E2=80=99t need to build different protocol stacks for the =
different deployments=E2=80=9D. </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>But the =E2=80=9Cenvironment-req=E2=80=9D draft is not about =
=E2=80=9CProtocol=E2=80=9D, but about security issues under different =
=E2=80=9Cenvironment=E2=80=9D. </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Among all our customers who are interested in I2RS, majority of them =
(&gt;90%) will deploy them in a closed environment, i.e. physically =
secured&nbsp; connection between I2RS agent and I2RS client. Therefore, =
it is important to =E2=80=9C</span><span =
style=3D'font-size:10.0pt;font-family:Courier;color:black'>provides an =
analysis of the security issues of=E2=80=9D </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>of this commonly deployed environment. </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;color:#1F497D'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>I suggest adding this Figure to Section 1 of the =
document:</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:#1F497D'>Closed&nbsp; (over open Chnl =
###&gt;)&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Open =
(over secure Chnl ---&gt;)</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:#1F497D'>+---------------------------------+</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:#1F497D'>|&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
***********************&nbsp;&nbsp; |&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
***********************&nbsp; |</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:#1F497D'>|&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
*&nbsp;&nbsp;&nbsp; Application A&nbsp;&nbsp;&nbsp; *&nbsp;&nbsp; =
|&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *&nbsp;&nbsp;&nbsp; Application =
B&nbsp;&nbsp;&nbsp; *&nbsp; |</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:#1F497D'>|&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
*&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *&nbsp;&nbsp; =
|&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
*&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *&nbsp; |</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:#1F497D'>|&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *&nbsp; =
+----------------+ *&nbsp;&nbsp; |&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *&nbsp; =
+----------------+ *&nbsp; |</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:#1F497D'>|&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *&nbsp; =
|&nbsp;&nbsp; Client A&nbsp;&nbsp;&nbsp;&nbsp; | *&nbsp;&nbsp; =
|&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *&nbsp; |&nbsp;&nbsp; Client =
B&nbsp;&nbsp;&nbsp;&nbsp; | *&nbsp; |</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:#1F497D'>|&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *&nbsp; =
+----------------+ *&nbsp;&nbsp; |&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *&nbsp; =
+----------------+ *&nbsp; |</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:#1F497D'>|&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ******* ^ =
*************&nbsp;&nbsp; |&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ***** ^ ****** =
^ ******&nbsp; |</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:#1F497D'>|&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
#&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp; =
|&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
|&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
|&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; |</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:#1F497D'>|&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; #&nbsp;&nbsp; =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp; =
|&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
|&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; |&nbsp;&nbsp; =
|-----|</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:#1F497D'>|&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; #&nbsp;&nbsp; &nbsp;&nbsp; =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
|&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; |&nbsp;&nbsp; =
|</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:#1F497D'>|&nbsp; ************ v * * * * ********|&nbsp;&nbsp; =
***************** v * v ********</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:#1F497D'>|&nbsp; *&nbsp; =
+---------------------+&nbsp;&nbsp;&nbsp;&nbsp; |&nbsp;&nbsp; *&nbsp; =
+---------------------+&nbsp;&nbsp;&nbsp;&nbsp; *</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:#1F497D'>|&nbsp; *&nbsp; |&nbsp;&nbsp;&nbsp;&nbsp; Agent =
1&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
|&nbsp;&nbsp;&nbsp;&nbsp; |&nbsp;&nbsp; *&nbsp; |&nbsp;&nbsp;&nbsp; =
Agent 2&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
|&nbsp;&nbsp;&nbsp;&nbsp; *</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:#1F497D'>|&nbsp; *&nbsp; =
+---------------------+&nbsp;&nbsp;&nbsp;&nbsp; |&nbsp;&nbsp; *&nbsp; =
+---------------------+&nbsp;&nbsp;&nbsp;&nbsp; *</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:#1F497D'>|&nbsp; *&nbsp;&nbsp;&nbsp;&nbsp; =
^&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ^&nbsp; ^&nbsp;&nbsp; =
^&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; |&nbsp;&nbsp; =
*&nbsp;&nbsp;&nbsp;&nbsp; ^&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
^&nbsp; ^&nbsp;&nbsp; ^&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
*</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;color:#1F497D'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;color:#1F497D'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;color:#1F497D'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Just think about this fact: today=E2=80=99s router configuration in =
production environment can only be performed by a few authorized people =
with EMS/NMS physically and securely separated. If the majority of the =
I2RS environment requirement is about open connection, I2RS WG will =
spend a lot energy developing the very sophisticated protocols which is =
expensive to develop and harder to deploy. </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;color:#1F497D'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>I am not against this development, but IMHO, to gain wider and =
quicker I2RS deployment in production environment, it is necessary to =
have a very </span><b><u><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:red'>l=
ean</span></u></b><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'> I2RS solution first, and to have a well documented security =
requirement for the common deployment environment. E.g. a single =
Controller (or the I2RS client) directly connected to their devices via =
their internal network, where the connection is physically isolated from =
other network and protected by separate mechanisms. Also remember, many =
operators will use I2RS to control a small number of selective routers =
(mostly routers at ingress/egress boundary) for value added services. =
</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;color:#1F497D'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;color:#1F497D'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;color:#1F497D'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Some of my detailed questions and comments to the =
=E2=80=9Csecurity-requirements=E2=80=9D are still applicable to the =
=E2=80=9Cenvironment-req=E2=80=9D document because they have the same =
text. Plus a few more for the =E2=80=9Cenvironment-req=E2=80=9D =
document. Hope the authors can address them. </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;color:#1F497D'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;color:#1F497D'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Section 3: </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;color:#1F497D'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>What are the key differences with regard to the security requirements =
for &nbsp;I2RS plane and for management plane?&nbsp; Section 3.1 =
describes the interaction between I2RS plane and management plane. But I =
see the security requirement for the management plane are all applicable =
to the security requirement to I2RS plane . If you think that they are =
very different, can you elaborate more? </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;color:#1F497D'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Section 3.4 has title =E2=80=9CRecommendations=E2=80=9D, but the =
content are all requirements. Why not name the section =
=E2=80=9CRequirement=E2=80=9D? </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>REQ 2: Does it that a different IP address than the one used by the =
management system?</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>REQ 21: is more about I2RS requirement, less about =
=E2=80=9CSecurity=E2=80=9D requirement. </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>REQ 24: isn=E2=80=99t it the general goal of I2RS? Not really =
security per se. (should be included in the general I2RS requirement or =
architecture). </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;color:#1F497D'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>REQ 26: simply controlling the resource can hardly prevent DoS. =
Malicious client can occupy the resource while the valid one can't =
access.</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Thanks for your consideration, </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Linda</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>-----Original =
Message-----<br>From: i2rs [<a href=3D"mailto:i2rs-bounces@ietf.org" =
target=3D"_blank">mailto:i2rs-bounces@ietf.org</a>] On Behalf Of Joel M. =
Halpern<br>Sent: Friday, August 21, 2015 12:20 PM<br>To: Linda Dunbar; =
<a href=3D"mailto:i2rs@ietf.org" =
target=3D"_blank">i2rs@ietf.org</a><br>Cc: 'Jeffrey Haas'; <a =
href=3D"mailto:daniel.migault@ericsson.com" =
target=3D"_blank">daniel.migault@ericsson.com</a>; 'Alia =
Atlas'<br>Subject: Re: [i2rs] draft-mglt-i2rs-security-requirements-00 2 =
Week WG adoption call (8/17 to 8/31)</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>Yes, one of the two last =
calls is for the environment document.</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>Having a dedicated =
physical channel is one of the ways identified in the draft to provide =
the required isolation.</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>While such an =
environment is clearly supportable, I do not think we should reduce the =
internal protocol requirements (such as MTI security for the control =
channel) just because there are circumstances where such it won't be =
needed.&nbsp; I don't expect that we will build different protocol =
stacks for the different deployments.</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>The purpose of this =
draft is to describe the environmental assumptions, which assumptions =
can be met in various ways.</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>Yours,</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>Joel</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>On 8/21/15 12:56 PM, =
Linda Dunbar wrote:</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt; Joel,</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt; If it is the =
&quot;environmental one&quot;, it is more important to differentiate the =
requirements for different environments on how the I2RS client &amp; =
Agent are connected.</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt; One of our =
customers stated that their environment has a single Controller (or the =
I2RS client) directly connected to their devices via their internal =
network, where the connection is physically isolated from other network =
and protected by separate mechanisms, they don't need all those =
sophisticated authentication procedure.</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt; We need to address =
this environment, i.e. having a simpler security requirement for this =
environment than the environment where I2RS Client is connected via =
public network.</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt; Linda</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt; -----Original =
Message-----</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt; From: Joel Halpern =
Direct [<a href=3D"mailto:jmh.direct@joelhalpern.com" =
target=3D"_blank">mailto:jmh.direct@joelhalpern.com</a>]</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt; Sent: Friday, =
August 21, 2015 10:53 AM</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt; To: Linda Dunbar; =
<a href=3D"mailto:i2rs@ietf.org" =
target=3D"_blank">i2rs@ietf.org</a></span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt; Cc: 'Jeffrey Haas'; =
<a href=3D"mailto:daniel.migault@ericsson.com" =
target=3D"_blank">daniel.migault@ericsson.com</a>; 'Joel Halpern'; 'Alia =
Atlas'</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt; Subject: Re: [i2rs] =
draft-mglt-i2rs-security-requirements-00 2 Week WG </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt; adoption call (8/17 =
to 8/31)</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt; First, there may be =
some confusion because the announcement.&nbsp; I presume that you are =
talking about the -environments documents.</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt; If the WG concludes =
that a different chapter structure is useful, we can of course change =
it.&nbsp; Given that the goal is environment description, I am not sure =
your proposed structure is significantly better than the existing =
one.</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt; I believe your =
comment about the text&nbsp; reading &quot;where security functions may =
be hosted&quot; is well taken, and we should remove that text when we =
next revise the document.</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt; The isolation text =
is about the need to keep things separate, and the various possible =
means are degrees / approaches to separation.</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt; Isolation is not =
about treating things differently, nor is it explicitly about using =
different protocols.&nbsp; So the point of isolation is not that there =
are different security requirements, but that in order to avoid =
corss-effects, things should be kept separate.</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt; Yours,</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt; Joel</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt; On 8/20/15 6:42 PM, =
Linda Dunbar wrote:</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; I support the =
WG adoption because I think the I2RS WG needs it.</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; However, I hope =
the authors can consider/address the following =
suggestions/comments:</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; When you think =
about the I2RS security,&nbsp; there are following </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; =
different</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; =
aspects:</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; -Communication =
channel between I2RS client and Agent (and the channel </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; between I2RS =
client and applications):</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; The channel can =
be</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; oVia physical =
Private network (e.g. within a secured direct connect </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; within one =
site),</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; owithin one =
administrative domain,&nbsp; via virtual private network</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; oSecured =
connection, such as TLS or IPSec</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; oPublic =
internet</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; o..</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; -Authentication =
&amp; Authorization</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; othe =
authentication &amp; authorization requirement for different =
</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; communication =
channels can be different. Therefore, should have </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; separate =
sections to address specific requirement&nbsp; for each </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; communication =
channels between I2RS agent &lt;-&gt; clients (and client =
&lt;-&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; =
applications)</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; The current =
Section 4 of the draft already has very good description </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; on the subject. =
I think 4.4.1 and 4.42 can be separated out of the section.</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; -Encryption for =
the actual content between Client and Agent</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; -DoS Design =
requirement (currently in Section 5.2.1)</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; -Management of =
conflict with other plane (e.g. the management plane, </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; multi-headed =
control, which has been discussed extensively in </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; =
ephemeral</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; =
draft)</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; I think the =
draft should be organized from the aspects of the </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; security to =
I2RS as suggested above.</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; Here are some =
detailed questions and comments to the requirements </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; listed in the =
document:</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; Section =
1:</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; The second =
paragraph stated the security recommendations must </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; =
&quot;specifying where security functions may be hosted&quot;. First of =
all I</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; don't see the =
draft address this aspect. Second, I think&nbsp;&nbsp; =
&quot;where</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; security =
functions are hosted&quot; is orthogonal to &quot;I2RS security&quot; =
.</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; Section =
3:</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; what does =
isolating two planes mean? does it mean they have different </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; security =
requirement/issues? Or does it mean they need different =
protocols?</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; What are the =
key differences with regard to the security requirements </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; for&nbsp; I2RS =
plane and for management plane?&nbsp; Section 3.1 describes the =
</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; interaction =
between I2RS plane and management plane. But I see the </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; security =
requirement for the management plane is similar to I2RS plane =
.</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; If you think =
that they are very different, can you elaborate more?</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; Section 3.4 has =
title &quot;Recommendations&quot;, but the content are all </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; requirements. =
Why not name the section &quot;Requirement&quot;?</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; REQ 2: Does it =
that a different IP address than the one used by the </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; management =
system?</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; How is REQ 22 =
different from REQ 21?</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; REQ 27 is hard =
to enforce. How about say something like &quot;shouldn't </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; send any =
information beyond what have been defined by the I2RS data =
model&quot;?</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; REQ 30: simply =
controlling the resource can hardly prevent DoS.</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; Malicious =
client can occupy the resource while the valid one can't =
access.</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; Thanks for =
consideration,</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; =
Linda</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; *From:*i2rs [<a =
href=3D"mailto:i2rs-bounces@ietf.org" =
target=3D"_blank">mailto:i2rs-bounces@ietf.org</a>] *On Behalf Of *Susan =
Hares</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; *Sent:* Monday, =
August 17, 2015 12:50 PM</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; *To:* <a =
href=3D"mailto:i2rs@ietf.org" =
target=3D"_blank">i2rs@ietf.org</a></span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; *Cc:* 'Jeffrey =
Haas'; <a href=3D"mailto:daniel.migault@ericsson.com" =
target=3D"_blank">daniel.migault@ericsson.com</a>; 'Joel Halpern'; =
</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; <a =
href=3D"mailto:shares@ndzh.com" target=3D"_blank">shares@ndzh.com</a>; =
'Alia Atlas'</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; *Subject:* =
[i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; adoption call =
(8/17 to 8/31)</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; This begins a 2 =
week WG adoption call for </span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; =
draft-mglt-i2rs-security-requirements.&nbsp; This draft discusses the =
</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; security =
requirements for the I2RS environment.&nbsp; You can find the draft =
at:</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; <a =
href=3D"https://tools.ietf.org/html/draft-mglt-i2rs-security-environment-=
reqs" =
target=3D"_blank">https://tools.ietf.org/html/draft-mglt-i2rs-security-en=
vironment-reqs</a></span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; -</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; 00</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; A security =
reviewer will review this draft during the time 8/20 to</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; =
8/25.&nbsp;&nbsp; We will post the security directorate review to this =
discussion.</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt; Sue =
Hares</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&gt;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p>&nbsp;=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>_________________________=
______________________</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:Consolas'>i2rs mailing =
list</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt'><a href=3D"mailto:i2rs@ietf.org" =
target=3D"_blank"><span =
style=3D'font-family:Consolas'>i2rs@ietf.org</span></a></span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt'><a =
href=3D"https://www.ietf.org/mailman/listinfo/i2rs" =
target=3D"_blank"><span =
style=3D'font-family:Consolas'>https://www.ietf.org/mailman/listinfo/i2rs=
</span></a></span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div></div><p class=3DMsoNormal =
style=3D'margin-bottom:12.0pt'><br>______________________________________=
_________<br>i2rs mailing list<br><a =
href=3D"mailto:i2rs@ietf.org">i2rs@ietf.org</a><br><a =
href=3D"https://www.ietf.org/mailman/listinfo/i2rs" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/i2rs</a><o:p></o:=
p></p></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div></div></div></body></html>
------=_NextPart_000_01C0_01D0E0E8.38ED61A0--


From nobody Thu Aug 27 13:53:57 2015
Return-Path: <shares@ndzh.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 096051A88C3 for <i2rs@ietfa.amsl.com>; Thu, 27 Aug 2015 13:53:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -99.055
X-Spam-Level: 
X-Spam-Status: No, score=-99.055 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DOS_OUTLOOK_TO_MX=2.845, USER_IN_WHITELIST=-100] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sxFlXQgSwZA1 for <i2rs@ietfa.amsl.com>; Thu, 27 Aug 2015 13:53:55 -0700 (PDT)
Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 889261A6FCF for <i2rs@ietf.org>; Thu, 27 Aug 2015 13:53:54 -0700 (PDT)
X-Default-Received-SPF: pass (skip=forwardok (res=PASS)) x-ip-name=174.124.171.7; 
From: "Susan Hares" <shares@ndzh.com>
To: "'Jeffrey Haas'" <jhaas@pfrc.org>, <i2rs@ietf.org>
References: <20150827203209.GB19039@pfrc.org>
In-Reply-To: <20150827203209.GB19039@pfrc.org>
Date: Thu, 27 Aug 2015 16:53:50 -0400
Message-ID: <01cc01d0e10a$7a0d29f0$6e277dd0$@ndzh.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQMiEqvQycR8/UINrY0rHW3Rm89T2Zt97l3w
Content-Language: en-us
X-Authenticated-User: skh@ndzh.com 
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/qo87wT_CC84H_rrfsYdDTKxLmOs>
Subject: Re: [i2rs] draft-mglt-i2rs-security-environment-reqs, REQ 3
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 27 Aug 2015 20:53:56 -0000

Jeff: 

I agree it is a goal rather than an absolute.  My first discussions with
Daniel pointed this out.  Do you think moving it back to 


   REQ 3:  The I2RS Agent validates data to try to insure that
         injecting the Information does not create a deadlock with any other
system
        or a routing loop or prevent the control plane from converging.
       (This is a goal for the system, and it should keep track of when
        Injecting information does cause deadlocks, routing loops, or 
        retards the routing convergence process.). 

Or is it better to suggest it as a recommendation?  Any thoughts? 

Sue 

-----Original Message-----
From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Jeffrey Haas
Sent: Thursday, August 27, 2015 4:32 PM
To: i2rs@ietf.org
Subject: [i2rs] draft-mglt-i2rs-security-environment-reqs, REQ 3

I've been reviewing the environment requirements, thanks for picking up this
work.  Requirement 3 contains the following:

   REQ 3:  The I2RS Agent validates data to ensure injecting the
           information will not create a deadlock with any other system,
           nor will it create a routing loop, nor will it cause the
           control plane to fail to converge.

I2RS has already received feedback from our netconf experts expressing
concern over how validation even at the schema levels may introduce
excessive latency.  This contradicts the I2RS "need for speed".

I have a broader concern that the above requirement may simply be an
intractable problem.  It's a loft goal, but the overhead in validating all
such things is likely not within the goal of speed.

Thoughts?

-- Jeff

_______________________________________________
i2rs mailing list
i2rs@ietf.org
https://www.ietf.org/mailman/listinfo/i2rs


From nobody Thu Aug 27 13:54:42 2015
Return-Path: <shares@ndzh.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9779E1A0099 for <i2rs@ietfa.amsl.com>; Thu, 27 Aug 2015 13:54:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -99.054
X-Spam-Level: 
X-Spam-Status: No, score=-99.054 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DOS_OUTLOOK_TO_MX=2.845, HTML_MESSAGE=0.001, USER_IN_WHITELIST=-100] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VR_l5Rj1_3DJ for <i2rs@ietfa.amsl.com>; Thu, 27 Aug 2015 13:54:40 -0700 (PDT)
Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6F3F21A9149 for <i2rs@ietf.org>; Thu, 27 Aug 2015 13:54:38 -0700 (PDT)
X-Default-Received-SPF: pass (skip=forwardok (res=PASS)) x-ip-name=174.124.171.7; 
From: "Susan Hares" <shares@ndzh.com>
To: "'Alia Atlas'" <akatlas@gmail.com>, "'Jeffrey Haas'" <jhaas@pfrc.org>
References: <20150827203209.GB19039@pfrc.org> <CAG4d1rco35EtNXuPCR77xqHCgcbPEOu6Atb3SMu5r33XGiZ25g@mail.gmail.com>
In-Reply-To: <CAG4d1rco35EtNXuPCR77xqHCgcbPEOu6Atb3SMu5r33XGiZ25g@mail.gmail.com>
Date: Thu, 27 Aug 2015 16:54:33 -0400
Message-ID: <01d101d0e10a$93d92af0$bb8b80d0$@ndzh.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_01D2_01D0E0E9.0CC91190"
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQMiEqvQycR8/UINrY0rHW3Rm89T2QKXX5dfm2k0v/A=
Content-Language: en-us
X-Authenticated-User: skh@ndzh.com 
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/0GEZKbQ8zjjBtNrLgzlVCCxM0OY>
Cc: i2rs@ietf.org
Subject: Re: [i2rs] draft-mglt-i2rs-security-environment-reqs, REQ 3
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 27 Aug 2015 20:54:41 -0000

This is a multipart message in MIME format.

------=_NextPart_000_01D2_01D0E0E9.0CC91190
Content-Type: text/plain;
	charset="utf-8"
Content-Transfer-Encoding: 7bit

Alia and Jeff:

 

Should we just drop this requirement? 

 

Sue 

 

From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Alia Atlas
Sent: Thursday, August 27, 2015 4:33 PM
To: Jeffrey Haas
Cc: i2rs@ietf.org
Subject: Re: [i2rs] draft-mglt-i2rs-security-environment-reqs, REQ 3

 

<no-hats>

 

Good catch - this seems to be very aspirational and contradicts

what the architecture says - which is basically that the user may

cause issues.

 

Regards,

Alia

</no-hats>

 

On Thu, Aug 27, 2015 at 4:32 PM, Jeffrey Haas <jhaas@pfrc.org> wrote:

I've been reviewing the environment requirements, thanks for picking up this
work.  Requirement 3 contains the following:

   REQ 3:  The I2RS Agent validates data to ensure injecting the
           information will not create a deadlock with any other system,
           nor will it create a routing loop, nor will it cause the
           control plane to fail to converge.

I2RS has already received feedback from our netconf experts expressing
concern over how validation even at the schema levels may introduce
excessive latency.  This contradicts the I2RS "need for speed".

I have a broader concern that the above requirement may simply be an
intractable problem.  It's a loft goal, but the overhead in validating all
such things is likely not within the goal of speed.

Thoughts?

-- Jeff

_______________________________________________
i2rs mailing list
i2rs@ietf.org
https://www.ietf.org/mailman/listinfo/i2rs

 


------=_NextPart_000_01D2_01D0E0E9.0CC91190
Content-Type: text/html;
	charset="utf-8"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><meta =
http-equiv=3DContent-Type content=3D"text/html; charset=3Dutf-8"><meta =
name=3DGenerator content=3D"Microsoft Word 14 (filtered =
medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri","sans-serif";}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue =
vlink=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Alia and Jeff:<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Should we just drop this requirement? <o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Sue <o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>From:</span>=
</b><span style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'> =
i2rs [mailto:i2rs-bounces@ietf.org] <b>On Behalf Of </b>Alia =
Atlas<br><b>Sent:</b> Thursday, August 27, 2015 4:33 PM<br><b>To:</b> =
Jeffrey Haas<br><b>Cc:</b> i2rs@ietf.org<br><b>Subject:</b> Re: [i2rs] =
draft-mglt-i2rs-security-environment-reqs, REQ 3<o:p></o:p></span></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><div><p =
class=3DMsoNormal>&lt;no-hats&gt;<o:p></o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>Good catch - this seems to be very aspirational and =
contradicts<o:p></o:p></p></div><div><p class=3DMsoNormal>what the =
architecture says - which is basically that the user =
may<o:p></o:p></p></div><div><p class=3DMsoNormal>cause =
issues.<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>Regards,<o:p></o:p></p></div><div><p =
class=3DMsoNormal>Alia<o:p></o:p></p></div><div><p =
class=3DMsoNormal>&lt;/no-hats&gt;<o:p></o:p></p></div></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><div><p class=3DMsoNormal>On Thu, =
Aug 27, 2015 at 4:32 PM, Jeffrey Haas &lt;<a =
href=3D"mailto:jhaas@pfrc.org" target=3D"_blank">jhaas@pfrc.org</a>&gt; =
wrote:<o:p></o:p></p><p class=3DMsoNormal>I've been reviewing the =
environment requirements, thanks for picking up this<br>work.&nbsp; =
Requirement 3 contains the following:<br><br>&nbsp; &nbsp;REQ 3:&nbsp; =
The I2RS Agent validates data to ensure injecting the<br>&nbsp; &nbsp; =
&nbsp; &nbsp; &nbsp; &nbsp;information will not create a deadlock with =
any other system,<br>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;nor will =
it create a routing loop, nor will it cause the<br>&nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp; &nbsp;control plane to fail to converge.<br><br>I2RS has =
already received feedback from our netconf experts expressing<br>concern =
over how validation even at the schema levels may introduce<br>excessive =
latency.&nbsp; This contradicts the I2RS &quot;need for =
speed&quot;.<br><br>I have a broader concern that the above requirement =
may simply be an<br>intractable problem.&nbsp; It's a loft goal, but the =
overhead in validating all<br>such things is likely not within the goal =
of speed.<br><br>Thoughts?<br><br>-- =
Jeff<br><br>_______________________________________________<br>i2rs =
mailing list<br><a href=3D"mailto:i2rs@ietf.org">i2rs@ietf.org</a><br><a =
href=3D"https://www.ietf.org/mailman/listinfo/i2rs" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/i2rs</a><o:p></o:=
p></p></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div></div></body></html>
------=_NextPart_000_01D2_01D0E0E9.0CC91190--


From nobody Thu Aug 27 13:58:23 2015
Return-Path: <jhaas@slice.pfrc.org>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7F99C1AC3D6 for <i2rs@ietfa.amsl.com>; Thu, 27 Aug 2015 13:58:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.578
X-Spam-Level: 
X-Spam-Status: No, score=-1.578 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, IP_NOT_FRIENDLY=0.334, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lATW_vhHrypQ for <i2rs@ietfa.amsl.com>; Thu, 27 Aug 2015 13:58:20 -0700 (PDT)
Received: from slice.pfrc.org (slice.pfrc.org [67.207.130.108]) by ietfa.amsl.com (Postfix) with ESMTP id E010F1A21BC for <i2rs@ietf.org>; Thu, 27 Aug 2015 13:58:20 -0700 (PDT)
Received: by slice.pfrc.org (Postfix, from userid 1001) id 06BC01E48F; Thu, 27 Aug 2015 17:01:17 -0400 (EDT)
Date: Thu, 27 Aug 2015 17:01:16 -0400
From: Jeffrey Haas <jhaas@pfrc.org>
To: Susan Hares <shares@ndzh.com>
Message-ID: <20150827210116.GD19039@pfrc.org>
References: <20150827203209.GB19039@pfrc.org> <CAG4d1rco35EtNXuPCR77xqHCgcbPEOu6Atb3SMu5r33XGiZ25g@mail.gmail.com> <01d101d0e10a$93d92af0$bb8b80d0$@ndzh.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <01d101d0e10a$93d92af0$bb8b80d0$@ndzh.com>
User-Agent: Mutt/1.5.21 (2010-09-15)
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/43V_fYOHM8i1CMnZPBAjv9Ttv6w>
Cc: i2rs@ietf.org, 'Alia Atlas' <akatlas@gmail.com>
Subject: Re: [i2rs] draft-mglt-i2rs-security-environment-reqs, REQ 3
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 27 Aug 2015 20:58:21 -0000

[Answering in this response]

On Thu, Aug 27, 2015 at 04:54:33PM -0400, Susan Hares wrote:
> Alia and Jeff:
> 
>  
> 
> Should we just drop this requirement? 

I think that may be the right thing to do.  Even if it's aspirational,
including it as a "requirement" may set the bar so high that it sabotages
our other goals for I2RS.

The aspiration, "Don't mess up your system", is rather hard to enforce.
Vendors are too often in the position of selling ropes to their customers to
hang themselves with - or do macrame.  But it's still rope.

-- Jeff


From nobody Thu Aug 27 13:58:51 2015
Return-Path: <shares@ndzh.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6D43F1ACD2F for <i2rs@ietfa.amsl.com>; Thu, 27 Aug 2015 13:58:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -99.054
X-Spam-Level: 
X-Spam-Status: No, score=-99.054 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DOS_OUTLOOK_TO_MX=2.845, HTML_MESSAGE=0.001, USER_IN_WHITELIST=-100] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Q8NYPc2fqJ2U for <i2rs@ietfa.amsl.com>; Thu, 27 Aug 2015 13:58:49 -0700 (PDT)
Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2FBE41AC3C5 for <i2rs@ietf.org>; Thu, 27 Aug 2015 13:58:49 -0700 (PDT)
X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=174.124.171.7; 
From: "Susan Hares" <shares@ndzh.com>
To: "'Daniel Migault'" <daniel.migault@ericsson.com>
References: <01a801d0d915$1558b4e0$400a1ea0$@ndzh.com> <CADZyTkkGDj82fiRqP5m9nG3uhLzRNmoPJC_k7xOrX9mLEBVJVg@mail.gmail.com>
In-Reply-To: <CADZyTkkGDj82fiRqP5m9nG3uhLzRNmoPJC_k7xOrX9mLEBVJVg@mail.gmail.com>
Date: Thu, 27 Aug 2015 16:58:41 -0400
Message-ID: <01e601d0e10b$280a5500$781eff00$@ndzh.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_01E7_01D0E0E9.A0FA3BA0"
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQGnzkX7E0ureH0U9OjgTsVHj87UVwFXD/5Enme71IA=
Content-Language: en-us
X-Authenticated-User: skh@ndzh.com 
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/U7Kf2D1hKHarCGDpglkeSOqAu4k>
Cc: 'Jeffrey Haas' <jhaas@pfrc.org>, i2rs@ietf.org, 'Joel Halpern' <jmh@joelhalpern.com>, 'Alia Atlas' <akatlas@gmail.com>
Subject: Re: [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG adoption call (8/17 to 8/31)
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 27 Aug 2015 20:58:50 -0000

This is a multipart message in MIME format.

------=_NextPart_000_01E7_01D0E0E9.A0FA3BA0
Content-Type: text/plain;
	charset="utf-8"
Content-Transfer-Encoding: quoted-printable

Daniel:

=20

I apologize for the confusion.  I plan to adopt the draft.  If you know =
of anyone who has strong opinions against, please let me know.=20

=20

Sue =20

=20

From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Daniel Migault
Sent: Friday, August 21, 2015 11:27 AM
To: Susan Hares
Cc: Jeffrey Haas; i2rs@ietf.org; Joel Halpern; Alia Atlas
Subject: Re: [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG =
adoption call (8/17 to 8/31)

=20

Hi,=20

=20

Please note that the subject of the email may be misleading as it =
indicates a different draft name from the one indicated in the link. For =
clarification, the draft we consider is the one indicated by the link.=20

=20

BR,=20

Daniel

=20

On Mon, Aug 17, 2015 at 1:49 PM, Susan Hares <shares@ndzh.com> wrote:

This begins a 2 week WG adoption call for =
draft-mglt-i2rs-security-requirements.  This draft discusses the =
security requirements for the I2RS environment.  You can find the draft =
at:

=20

https://tools.ietf.org/html/draft-mglt-i2rs-security-environment-reqs-00

=20

A security reviewer will review this draft during the time 8/20 to 8/25. =
  We will post the security directorate review to this discussion.=20

=20

Sue Hares=20

=20


_______________________________________________
i2rs mailing list
i2rs@ietf.org
https://www.ietf.org/mailman/listinfo/i2rs

=20


------=_NextPart_000_01E7_01D0E0E9.A0FA3BA0
Content-Type: text/html;
	charset="utf-8"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><meta =
http-equiv=3DContent-Type content=3D"text/html; charset=3Dutf-8"><meta =
name=3DGenerator content=3D"Microsoft Word 14 (filtered =
medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri","sans-serif";}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue =
vlink=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Daniel:<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>I apologize for the confusion.=C2=A0 I plan to adopt the draft.=C2=A0 =
If you know of anyone who has strong opinions against, please let me =
know. <o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Sue =C2=A0<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>From:</span>=
</b><span style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'> =
i2rs [mailto:i2rs-bounces@ietf.org] <b>On Behalf Of </b>Daniel =
Migault<br><b>Sent:</b> Friday, August 21, 2015 11:27 AM<br><b>To:</b> =
Susan Hares<br><b>Cc:</b> Jeffrey Haas; i2rs@ietf.org; Joel Halpern; =
Alia Atlas<br><b>Subject:</b> Re: [i2rs] =
draft-mglt-i2rs-security-requirements-00 2 Week WG adoption call (8/17 =
to 8/31)<o:p></o:p></span></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><div><p =
class=3DMsoNormal>Hi,&nbsp;<o:p></o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>Please note that the subject of the email may be =
misleading as it indicates a different draft name from the one indicated =
in the link. For clarification, the draft we consider is the one =
indicated by the link.&nbsp;<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>BR,&nbsp;<o:p></o:p></p></div><div><p =
class=3DMsoNormal>Daniel<o:p></o:p></p></div></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><div><p class=3DMsoNormal>On Mon, =
Aug 17, 2015 at 1:49 PM, Susan Hares &lt;<a =
href=3D"mailto:shares@ndzh.com" =
target=3D"_blank">shares@ndzh.com</a>&gt; =
wrote:<o:p></o:p></p><div><div><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'>This begins =
a 2 week WG adoption call for =
draft-mglt-i2rs-security-requirements.&nbsp; This draft discusses the =
security requirements for the I2RS environment.&nbsp; You can find the =
draft at:<o:p></o:p></p><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'>&nbsp;<o:p><=
/o:p></p><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><a =
href=3D"https://tools.ietf.org/html/draft-mglt-i2rs-security-environment-=
reqs-00" =
target=3D"_blank">https://tools.ietf.org/html/draft-mglt-i2rs-security-en=
vironment-reqs-00</a><o:p></o:p></p><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'>&nbsp;<o:p><=
/o:p></p><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'>A security =
reviewer will review this draft during the time 8/20 to =
8/25.&nbsp;&nbsp; We will post the security directorate review to this =
discussion. <o:p></o:p></p><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'>&nbsp;<o:p><=
/o:p></p><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'>Sue Hares =
<o:p></o:p></p><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'>&nbsp;<o:p><=
/o:p></p></div></div><p class=3DMsoNormal =
style=3D'margin-bottom:12.0pt'><br>______________________________________=
_________<br>i2rs mailing list<br><a =
href=3D"mailto:i2rs@ietf.org">i2rs@ietf.org</a><br><a =
href=3D"https://www.ietf.org/mailman/listinfo/i2rs" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/i2rs</a><o:p></o:=
p></p></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div></div></body></html>
------=_NextPart_000_01E7_01D0E0E9.A0FA3BA0--


From nobody Thu Aug 27 13:59:25 2015
Return-Path: <shares@ndzh.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BBA091AD0C8 for <i2rs@ietfa.amsl.com>; Thu, 27 Aug 2015 13:59:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -99.055
X-Spam-Level: 
X-Spam-Status: No, score=-99.055 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DOS_OUTLOOK_TO_MX=2.845, USER_IN_WHITELIST=-100] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vp0IOsFo2SfX for <i2rs@ietfa.amsl.com>; Thu, 27 Aug 2015 13:59:23 -0700 (PDT)
Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F29A91AD0AF for <i2rs@ietf.org>; Thu, 27 Aug 2015 13:59:22 -0700 (PDT)
X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=174.124.171.7; 
From: "Susan Hares" <shares@ndzh.com>
To: "'Jeffrey Haas'" <jhaas@pfrc.org>
References: <20150827203209.GB19039@pfrc.org> <CAG4d1rco35EtNXuPCR77xqHCgcbPEOu6Atb3SMu5r33XGiZ25g@mail.gmail.com> <01d101d0e10a$93d92af0$bb8b80d0$@ndzh.com> <20150827210116.GD19039@pfrc.org>
In-Reply-To: <20150827210116.GD19039@pfrc.org>
Date: Thu, 27 Aug 2015 16:59:16 -0400
Message-ID: <01f301d0e10b$3c655c70$b5301550$@ndzh.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQMiEqvQycR8/UINrY0rHW3Rm89T2QKXX5dfAlFTIQABcKPZ5ptLJlEQ
Content-Language: en-us
X-Authenticated-User: skh@ndzh.com 
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/ZWdfPnA8g2gusXI3nSb0M9mnqPc>
Cc: i2rs@ietf.org, 'Daniel Migault' <daniel.migault@ericsson.com>, 'Joel Halpern' <jmh@joelhalpern.com>, 'Alia Atlas' <akatlas@gmail.com>
Subject: Re: [i2rs] draft-mglt-i2rs-security-environment-reqs, REQ 3
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 27 Aug 2015 20:59:24 -0000

Jeff:

That sounds like the best idea. 

Sue 

-----Original Message-----
From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Jeffrey Haas
Sent: Thursday, August 27, 2015 5:01 PM
To: Susan Hares
Cc: i2rs@ietf.org; 'Alia Atlas'
Subject: Re: [i2rs] draft-mglt-i2rs-security-environment-reqs, REQ 3

[Answering in this response]

On Thu, Aug 27, 2015 at 04:54:33PM -0400, Susan Hares wrote:
> Alia and Jeff:
> 
>  
> 
> Should we just drop this requirement? 

I think that may be the right thing to do.  Even if it's aspirational,
including it as a "requirement" may set the bar so high that it sabotages
our other goals for I2RS.

The aspiration, "Don't mess up your system", is rather hard to enforce.
Vendors are too often in the position of selling ropes to their customers to
hang themselves with - or do macrame.  But it's still rope.

-- Jeff

_______________________________________________
i2rs mailing list
i2rs@ietf.org
https://www.ietf.org/mailman/listinfo/i2rs


From nobody Thu Aug 27 14:05:57 2015
Return-Path: <shares@ndzh.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 415CF1B2A4D for <i2rs@ietfa.amsl.com>; Thu, 27 Aug 2015 14:05:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -99.054
X-Spam-Level: 
X-Spam-Status: No, score=-99.054 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DOS_OUTLOOK_TO_MX=2.845, HTML_MESSAGE=0.001, USER_IN_WHITELIST=-100] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Do02VGtzhDu8 for <i2rs@ietfa.amsl.com>; Thu, 27 Aug 2015 14:05:54 -0700 (PDT)
Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 47A0C1B2A4B for <i2rs@ietf.org>; Thu, 27 Aug 2015 14:05:54 -0700 (PDT)
X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=174.124.171.7; 
From: "Susan Hares" <shares@ndzh.com>
To: "'Daniel Migault'" <daniel.migault@ericsson.com>
References: <01a801d0d915$1558b4e0$400a1ea0$@ndzh.com> <CADZyTkkGDj82fiRqP5m9nG3uhLzRNmoPJC_k7xOrX9mLEBVJVg@mail.gmail.com> <01e601d0e10b$280a5500$781eff00$@ndzh.com>
In-Reply-To: <01e601d0e10b$280a5500$781eff00$@ndzh.com>
Date: Thu, 27 Aug 2015 17:05:46 -0400
Message-ID: <01fb01d0e10c$255355e0$6ffa01a0$@ndzh.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_01FC_01D0E0EA.9E44C320"
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQGnzkX7E0ureH0U9OjgTsVHj87UVwFXD/5EAf1OYrKeV9cj0A==
Content-Language: en-us
X-Authenticated-User: skh@ndzh.com 
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/5-vaIb31w28VUmaCWkuHzKbmU5s>
Cc: 'Jeffrey Haas' <jhaas@pfrc.org>, i2rs@ietf.org, 'Joel Halpern' <jmh@joelhalpern.com>, 'Alia Atlas' <akatlas@gmail.com>
Subject: Re: [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG adoption call (8/17 to 8/31)
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 27 Aug 2015 21:05:56 -0000

This is a multipart message in MIME format.

------=_NextPart_000_01FC_01D0E0EA.9E44C320
Content-Type: text/plain;
	charset="utf-8"
Content-Transfer-Encoding: quoted-printable

Daniel:=20

=20

The last message was not clear.  Let me try again as it might be =
confusing as to which hat I was wearing.=20

=20

[2nd attempt]=20

<co-chair hat on>=20

I apologize for the confusion on the draft.  At this point, =
we=E2=80=99ve had lots of feedback from people on the list.  No-one has =
indicated we should not adopt this draft as the beginning of this work =
on security environments.=20

=20

Linda, Jeff, Russ and others are making great suggestions for fixing =
this draft.   At this point unless we get lots of complaints between now =
and 8/31, it appears we should adopt the draft.=20

=20

Juergen suggests we make one draft.  This might be the right long term =
solution, but as we work on the drafts I think we should refine the =
documents as two document.   In September, I will call for an opinion on =
whether we could converge the drafts into 1 draft.=20

<co-chair hat off>=20

=20

Sue=20

=20

From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Susan Hares
Sent: Thursday, August 27, 2015 4:59 PM
To: 'Daniel Migault'
Cc: 'Jeffrey Haas'; i2rs@ietf.org; 'Joel Halpern'; 'Alia Atlas'
Subject: Re: [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG =
adoption call (8/17 to 8/31)

=20

Daniel:

=20

I apologize for the confusion.  I plan to adopt the draft.  If you know =
of anyone who has strong opinions against, please let me know.=20

=20

Sue =20

=20

From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Daniel Migault
Sent: Friday, August 21, 2015 11:27 AM
To: Susan Hares
Cc: Jeffrey Haas; i2rs@ietf.org; Joel Halpern; Alia Atlas
Subject: Re: [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG =
adoption call (8/17 to 8/31)

=20

Hi,=20

=20

Please note that the subject of the email may be misleading as it =
indicates a different draft name from the one indicated in the link. For =
clarification, the draft we consider is the one indicated by the link.=20

=20

BR,=20

Daniel

=20

On Mon, Aug 17, 2015 at 1:49 PM, Susan Hares <shares@ndzh.com> wrote:

This begins a 2 week WG adoption call for =
draft-mglt-i2rs-security-requirements.  This draft discusses the =
security requirements for the I2RS environment.  You can find the draft =
at:

=20

https://tools.ietf.org/html/draft-mglt-i2rs-security-environment-reqs-00

=20

A security reviewer will review this draft during the time 8/20 to 8/25. =
  We will post the security directorate review to this discussion.=20

=20

Sue Hares=20

=20


_______________________________________________
i2rs mailing list
i2rs@ietf.org
https://www.ietf.org/mailman/listinfo/i2rs

=20


------=_NextPart_000_01FC_01D0E0EA.9E44C320
Content-Type: text/html;
	charset="utf-8"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><meta =
http-equiv=3DContent-Type content=3D"text/html; charset=3Dutf-8"><meta =
name=3DGenerator content=3D"Microsoft Word 14 (filtered =
medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
span.EmailStyle17
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
span.EmailStyle20
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue =
vlink=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Daniel: <o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>The last message was not clear.=C2=A0 Let me try again as it might be =
confusing as to which hat I was wearing. <o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>[2<sup>nd</sup> attempt] <o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&lt;co-chair hat on&gt; <o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>I apologize for the confusion on the draft.=C2=A0 At this point, =
we=E2=80=99ve had lots of feedback from people on the list.=C2=A0 No-one =
has indicated we should not adopt this draft as the beginning of this =
work on security environments. <o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Linda, Jeff, Russ and others are making great suggestions for fixing =
this draft. =C2=A0=C2=A0At this point unless we get lots of complaints =
between now and 8/31, it appears we should adopt the draft. =
<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Juergen suggests we make one draft.=C2=A0 This might be the right =
long term solution, but as we work on the drafts I think we should =
refine the documents as two document.=C2=A0=C2=A0 In September, I will =
call for an opinion on whether we could converge the drafts into 1 =
draft. <o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&lt;co-chair hat off&gt; <o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Sue <o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><div><div =
style=3D'border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in'><p class=3DMsoNormal><b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>From:</span>=
</b><span style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'> =
i2rs [mailto:i2rs-bounces@ietf.org] <b>On Behalf Of </b>Susan =
Hares<br><b>Sent:</b> Thursday, August 27, 2015 4:59 PM<br><b>To:</b> =
'Daniel Migault'<br><b>Cc:</b> 'Jeffrey Haas'; i2rs@ietf.org; 'Joel =
Halpern'; 'Alia Atlas'<br><b>Subject:</b> Re: [i2rs] =
draft-mglt-i2rs-security-requirements-00 2 Week WG adoption call (8/17 =
to 8/31)<o:p></o:p></span></p></div></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Daniel:<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>I apologize for the confusion.&nbsp; I plan to adopt the draft.&nbsp; =
If you know of anyone who has strong opinions against, please let me =
know. <o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Sue &nbsp;<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>From:</span>=
</b><span style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'> =
i2rs [<a =
href=3D"mailto:i2rs-bounces@ietf.org">mailto:i2rs-bounces@ietf.org</a>] =
<b>On Behalf Of </b>Daniel Migault<br><b>Sent:</b> Friday, August 21, =
2015 11:27 AM<br><b>To:</b> Susan Hares<br><b>Cc:</b> Jeffrey Haas; <a =
href=3D"mailto:i2rs@ietf.org">i2rs@ietf.org</a>; Joel Halpern; Alia =
Atlas<br><b>Subject:</b> Re: [i2rs] =
draft-mglt-i2rs-security-requirements-00 2 Week WG adoption call (8/17 =
to 8/31)<o:p></o:p></span></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><div><p =
class=3DMsoNormal>Hi,&nbsp;<o:p></o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>Please note that the subject of the email may be =
misleading as it indicates a different draft name from the one indicated =
in the link. For clarification, the draft we consider is the one =
indicated by the link.&nbsp;<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>BR,&nbsp;<o:p></o:p></p></div><div><p =
class=3DMsoNormal>Daniel<o:p></o:p></p></div></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><div><p class=3DMsoNormal>On Mon, =
Aug 17, 2015 at 1:49 PM, Susan Hares &lt;<a =
href=3D"mailto:shares@ndzh.com" =
target=3D"_blank">shares@ndzh.com</a>&gt; =
wrote:<o:p></o:p></p><div><div><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'>This begins =
a 2 week WG adoption call for =
draft-mglt-i2rs-security-requirements.&nbsp; This draft discusses the =
security requirements for the I2RS environment.&nbsp; You can find the =
draft at:<o:p></o:p></p><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'>&nbsp;<o:p><=
/o:p></p><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><a =
href=3D"https://tools.ietf.org/html/draft-mglt-i2rs-security-environment-=
reqs-00" =
target=3D"_blank">https://tools.ietf.org/html/draft-mglt-i2rs-security-en=
vironment-reqs-00</a><o:p></o:p></p><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'>&nbsp;<o:p><=
/o:p></p><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'>A security =
reviewer will review this draft during the time 8/20 to =
8/25.&nbsp;&nbsp; We will post the security directorate review to this =
discussion. <o:p></o:p></p><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'>&nbsp;<o:p><=
/o:p></p><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'>Sue Hares =
<o:p></o:p></p><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'>&nbsp;<o:p><=
/o:p></p></div></div><p class=3DMsoNormal =
style=3D'margin-bottom:12.0pt'><br>______________________________________=
_________<br>i2rs mailing list<br><a =
href=3D"mailto:i2rs@ietf.org">i2rs@ietf.org</a><br><a =
href=3D"https://www.ietf.org/mailman/listinfo/i2rs" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/i2rs</a><o:p></o:=
p></p></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div></div></body></html>
------=_NextPart_000_01FC_01D0E0EA.9E44C320--


From nobody Thu Aug 27 14:30:49 2015
Return-Path: <jhaas@slice.pfrc.org>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0F2661B2C94 for <i2rs@ietfa.amsl.com>; Thu, 27 Aug 2015 14:30:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.178
X-Spam-Level: 
X-Spam-Status: No, score=-0.178 tagged_above=-999 required=5 tests=[BAYES_05=-0.5, IP_NOT_FRIENDLY=0.334, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id btoJ5hzIJOdj for <i2rs@ietfa.amsl.com>; Thu, 27 Aug 2015 14:30:48 -0700 (PDT)
Received: from slice.pfrc.org (slice.pfrc.org [67.207.130.108]) by ietfa.amsl.com (Postfix) with ESMTP id 592791B2C7B for <i2rs@ietf.org>; Thu, 27 Aug 2015 14:30:48 -0700 (PDT)
Received: by slice.pfrc.org (Postfix, from userid 1001) id A94EB1E48F; Thu, 27 Aug 2015 17:33:44 -0400 (EDT)
Date: Thu, 27 Aug 2015 17:33:44 -0400
From: Jeffrey Haas <jhaas@pfrc.org>
To: i2rs@ietf.org
Message-ID: <20150827213344.GF19039@pfrc.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.5.21 (2010-09-15)
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/lKfGnCY0ycL91z71TMJTjbcnabw>
Subject: [i2rs] draft-mglt-i2rs-security-environment-reqs-00 Thoughts on AAA
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 27 Aug 2015 21:30:49 -0000

I have some contrary thoughts on the AAA section of this document.

Section 4.1 tries to describe requirements wherein the I2RS Clients may
request for subsets of AAA policy to be exported to the Client so that the
client may enforce them.  While this seems like a nice way to scale the
operations, in some cases disclosing those policies (even if we find a good
way to encode the AAA validation in a generic enough way to distribute) may
accidentally disclose information that is otherwise intended to be secure.

I would seek comment from the security directorate, but I suspect we don't
want to do this.

But in section 4.4, we try to discuss availability.  The first sentence
immediately says "enforcement should not remain local", while one way to
enable security in some environments is to distribute and synchronize policy
to be enforced locally.  

It then goes on to talk about general availability mechanisms and then we
further dive into security against DoS.

I believe we may be boiling the ocean a bit to try to go into too many
details about the design of secure AAA systems.  It seems a bit out of scope
for I2RS to do such work; we should defer to work done elsewhere on the
topic, if it exists.  If it doesn't exist, I'm not sure we should do it.

What is right for us to point out is, "If we use a remote AAA mechanism, it
must be robust in hostile environments".  Expand that as you will, but being
too proscriptive is not our job.

-- Jeff


From nobody Fri Aug 28 00:08:00 2015
Return-Path: <j.schoenwaelder@jacobs-university.de>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3DE821A0378 for <i2rs@ietfa.amsl.com>; Fri, 28 Aug 2015 00:07:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.86
X-Spam-Level: 
X-Spam-Status: No, score=-3.86 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_EQ_DE=0.35, RCVD_IN_DNSWL_MED=-2.3, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gBnPvSi59LPR for <i2rs@ietfa.amsl.com>; Fri, 28 Aug 2015 00:07:56 -0700 (PDT)
Received: from atlas3.jacobs-university.de (atlas3.jacobs-university.de [212.201.44.18]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2403B1A00EA for <i2rs@ietf.org>; Fri, 28 Aug 2015 00:07:56 -0700 (PDT)
Received: from localhost (demetrius5.irc-it.jacobs-university.de [10.70.0.222]) by atlas3.jacobs-university.de (Postfix) with ESMTP id BC757187E; Fri, 28 Aug 2015 09:07:54 +0200 (CEST)
X-Virus-Scanned: amavisd-new at jacobs-university.de
Received: from atlas3.jacobs-university.de ([10.70.0.220]) by localhost (demetrius5.jacobs-university.de [10.70.0.222]) (amavisd-new, port 10030) with ESMTP id NhTCTg0s8fNd; Fri, 28 Aug 2015 09:07:54 +0200 (CEST)
Received: from hermes.jacobs-university.de (hermes.jacobs-university.de [212.201.44.23]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "hermes.jacobs-university.de", Issuer "Jacobs University CA - G01" (verified OK)) by atlas3.jacobs-university.de (Postfix) with ESMTPS; Fri, 28 Aug 2015 09:07:54 +0200 (CEST)
Received: from localhost (demetrius3.jacobs-university.de [212.201.44.48]) by hermes.jacobs-university.de (Postfix) with ESMTP id E5EE620053; Fri, 28 Aug 2015 09:07:53 +0200 (CEST)
X-Virus-Scanned: amavisd-new at jacobs-university.de
Received: from hermes.jacobs-university.de ([212.201.44.23]) by localhost (demetrius3.jacobs-university.de [212.201.44.32]) (amavisd-new, port 10024) with ESMTP id X5hHhbt21nrb; Fri, 28 Aug 2015 09:07:53 +0200 (CEST)
Received: from elstar.local (elstar.jacobs.jacobs-university.de [10.50.231.133]) by hermes.jacobs-university.de (Postfix) with ESMTP id F0BE62004E; Fri, 28 Aug 2015 09:07:51 +0200 (CEST)
Received: by elstar.local (Postfix, from userid 501) id EBC88365A94C; Fri, 28 Aug 2015 09:07:48 +0200 (CEST)
Date: Fri, 28 Aug 2015 09:07:48 +0200
From: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
To: Susan Hares <shares@ndzh.com>
Message-ID: <20150828070748.GB89759@elstar.local>
Mail-Followup-To: Susan Hares <shares@ndzh.com>, 'Jeffrey Haas' <jhaas@pfrc.org>, i2rs@ietf.org
References: <20150827203209.GB19039@pfrc.org> <01cc01d0e10a$7a0d29f0$6e277dd0$@ndzh.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <01cc01d0e10a$7a0d29f0$6e277dd0$@ndzh.com>
User-Agent: Mutt/1.4.2.3i
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/Mvgf5BpsVutAKquVhBIek9wzIwQ>
Cc: 'Jeffrey Haas' <jhaas@pfrc.org>, i2rs@ietf.org
Subject: Re: [i2rs] draft-mglt-i2rs-security-environment-reqs, REQ 3
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 28 Aug 2015 07:07:58 -0000

On Thu, Aug 27, 2015 at 04:53:50PM -0400, Susan Hares wrote:
> Jeff: 
> 
> I agree it is a goal rather than an absolute.  My first discussions with
> Daniel pointed this out.  Do you think moving it back to 
> 
> 
>    REQ 3:  The I2RS Agent validates data to try to insure that
>          injecting the Information does not create a deadlock with any other
> system
>         or a routing loop or prevent the control plane from converging.
>        (This is a goal for the system, and it should keep track of when
>         Injecting information does cause deadlocks, routing loops, or 
>         retards the routing convergence process.). 
>

I already pointed out on July 21 that this requirement is not
implementable. Adding hand-waving text to it does not help, so
I am in favour of removing it.

/js

-- 
Juergen Schoenwaelder           Jacobs University Bremen gGmbH
Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
Fax:   +49 421 200 3103         <http://www.jacobs-university.de/>


From nobody Fri Aug 28 05:26:52 2015
Return-Path: <shares@ndzh.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3F88C1B2F8A for <i2rs@ietfa.amsl.com>; Fri, 28 Aug 2015 05:26:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -99.055
X-Spam-Level: 
X-Spam-Status: No, score=-99.055 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DOS_OUTLOOK_TO_MX=2.845, USER_IN_WHITELIST=-100] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 34Sjm07sIN0G for <i2rs@ietfa.amsl.com>; Fri, 28 Aug 2015 05:26:48 -0700 (PDT)
Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 57D2B1B2E47 for <i2rs@ietf.org>; Fri, 28 Aug 2015 05:26:29 -0700 (PDT)
X-Default-Received-SPF: pass (skip=forwardok (res=PASS)) x-ip-name=174.124.171.7; 
From: "Susan Hares" <shares@ndzh.com>
To: "'Juergen Schoenwaelder'" <j.schoenwaelder@jacobs-university.de>
References: <20150827203209.GB19039@pfrc.org> <01cc01d0e10a$7a0d29f0$6e277dd0$@ndzh.com> <20150828070748.GB89759@elstar.local>
In-Reply-To: <20150828070748.GB89759@elstar.local>
Date: Fri, 28 Aug 2015 08:26:18 -0400
Message-ID: <005701d0e18c$bdb26300$39172900$@ndzh.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQMiEqvQycR8/UINrY0rHW3Rm89T2QIpDlarAthBr3ybVumKEA==
Content-Language: en-us
X-Authenticated-User: skh@ndzh.com 
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/hV41k2O4mEvjnToa48OtChFRiDs>
Cc: 'Jeffrey Haas' <jhaas@pfrc.org>, i2rs@ietf.org
Subject: Re: [i2rs] draft-mglt-i2rs-security-environment-reqs, REQ 3
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 28 Aug 2015 12:26:49 -0000

Juergen:

Thank you for you input and your reference to your previous message.

Sue 

-----Original Message-----
From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Juergen Schoenwaelder
Sent: Friday, August 28, 2015 3:08 AM
To: Susan Hares
Cc: 'Jeffrey Haas'; i2rs@ietf.org
Subject: Re: [i2rs] draft-mglt-i2rs-security-environment-reqs, REQ 3

On Thu, Aug 27, 2015 at 04:53:50PM -0400, Susan Hares wrote:
> Jeff: 
> 
> I agree it is a goal rather than an absolute.  My first discussions 
> with Daniel pointed this out.  Do you think moving it back to
> 
> 
>    REQ 3:  The I2RS Agent validates data to try to insure that
>          injecting the Information does not create a deadlock with any 
> other system
>         or a routing loop or prevent the control plane from converging.
>        (This is a goal for the system, and it should keep track of when
>         Injecting information does cause deadlocks, routing loops, or 
>         retards the routing convergence process.). 
>

I already pointed out on July 21 that this requirement is not implementable.
Adding hand-waving text to it does not help, so I am in favour of removing
it.

/js

-- 
Juergen Schoenwaelder           Jacobs University Bremen gGmbH
Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
Fax:   +49 421 200 3103         <http://www.jacobs-university.de/>

_______________________________________________
i2rs mailing list
i2rs@ietf.org
https://www.ietf.org/mailman/listinfo/i2rs


From nobody Fri Aug 28 06:11:16 2015
Return-Path: <internet-drafts@ietf.org>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5EF151B31AA; Fri, 28 Aug 2015 06:11:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PyjdIa8nbiXI; Fri, 28 Aug 2015 06:11:14 -0700 (PDT)
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 7FF3F1B31EA; Fri, 28 Aug 2015 06:11:13 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 6.4.1
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <20150828131113.6605.71274.idtracker@ietfa.amsl.com>
Date: Fri, 28 Aug 2015 06:11:13 -0700
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/tmc3uuhADFLglN4EwlVrFuhsRhg>
Cc: i2rs@ietf.org
Subject: [i2rs] I-D Action: draft-ietf-i2rs-ephemeral-state-01.txt
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 28 Aug 2015 13:11:15 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
 This draft is a work item of the Interface to the Routing System Working Group of the IETF.

        Title           : I2RS Ephemeral State Requirements
        Authors         : Jeff Haas
                          Susan Hares
	Filename        : draft-ietf-i2rs-ephemeral-state-01.txt
	Pages           : 11
	Date            : 2015-08-28

Abstract:
   This document covers requests to the netmod and netconf Working
   Groups for functionality to support the ephemeral state requirements
   to implement the I2RS architecture.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-i2rs-ephemeral-state/

There's also a htmlized version available at:
https://tools.ietf.org/html/draft-ietf-i2rs-ephemeral-state-01

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-i2rs-ephemeral-state-01


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Fri Aug 28 06:42:46 2015
Return-Path: <tnadeau@lucidvision.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 638C71B2A52 for <i2rs@ietfa.amsl.com>; Fri, 28 Aug 2015 06:42:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.012
X-Spam-Level: 
X-Spam-Status: No, score=-2.012 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 343VKZCVn2UJ for <i2rs@ietfa.amsl.com>; Fri, 28 Aug 2015 06:42:44 -0700 (PDT)
Received: from lucidvision.com (lucidvision.com [64.71.170.115]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2AA201A897F for <i2rs@ietf.org>; Fri, 28 Aug 2015 06:42:44 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=lucidvision.com; s=default; t=1440769299; bh=Jf49GkFqxZwmKJKb9+VwUHgBQkzx0qYvXIUj5M7k29Q=; h=Subject:From:In-Reply-To:Date:Cc:References:To; b=t6yn3ic9SbxLkY8L6ioL8+SA/NfMOc5Qf++ylWyCX4NCsysPuVO/K5QcLxkK75nxC fSDmKorw3WhbGmluGX+m+4jXBZ8oespYDoG1AWsKiKZHvSHFDu+eF0aRabOFk2dS0W jfAUiz5aLoeA3mkRsPXCELUqM8JnCulTTJ+yiRYQ=
X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=50.255.148.181; 
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 8.2 \(2104\))
From: Nadeau Thomas <tnadeau@lucidvision.com>
In-Reply-To: <20150828070748.GB89759@elstar.local>
Date: Fri, 28 Aug 2015 09:42:00 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <1896B2E9-4E6B-4575-B589-C640C549E7FF@lucidvision.com>
References: <20150827203209.GB19039@pfrc.org> <01cc01d0e10a$7a0d29f0$6e277dd0$@ndzh.com> <20150828070748.GB89759@elstar.local>
To: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
X-Mailer: Apple Mail (2.2104)
X-Authenticated-User: tnadeau@lucidvision.com 
X-Info: aspam skipped due to (g_smite_skip_relay)
X-Encryption: SSL encrypted
X-ShareWhite: 50.255.148.181
X-MyRbl: Color=Yellow Age=0 Spam=0 Notspam=21 Stars=0 Good=0 Friend=0 Surbl=0 Catch=0 r=0 ip=50.255.148.181
X-IP-stats: Notspam Incoming Last 0, First 105, in=1246, out=0, spam=0 Known=true ip=50.255.148.181
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/OkB48WKM_KQcVaIHTAdJLib_lxs>
Cc: Jeffrey Haas <jhaas@pfrc.org>, i2rs@ietf.org, Susan Hares <shares@ndzh.com>
Subject: Re: [i2rs] draft-mglt-i2rs-security-environment-reqs, REQ 3
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 28 Aug 2015 13:42:45 -0000

+1

> On Aug 28, 2015:3:07 AM, at 3:07 AM, Juergen Schoenwaelder =
<j.schoenwaelder@jacobs-university.de> wrote:
>=20
> On Thu, Aug 27, 2015 at 04:53:50PM -0400, Susan Hares wrote:
>> Jeff:=20
>>=20
>> I agree it is a goal rather than an absolute.  My first discussions =
with
>> Daniel pointed this out.  Do you think moving it back to=20
>>=20
>>=20
>>   REQ 3:  The I2RS Agent validates data to try to insure that
>>         injecting the Information does not create a deadlock with any =
other
>> system
>>        or a routing loop or prevent the control plane from =
converging.
>>       (This is a goal for the system, and it should keep track of =
when
>>        Injecting information does cause deadlocks, routing loops, or=20=

>>        retards the routing convergence process.).=20
>>=20
>=20
> I already pointed out on July 21 that this requirement is not
> implementable. Adding hand-waving text to it does not help, so
> I am in favour of removing it.
>=20
> /js
>=20
> --=20
> Juergen Schoenwaelder           Jacobs University Bremen gGmbH
> Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
> Fax:   +49 421 200 3103         <http://www.jacobs-university.de/>
>=20
> _______________________________________________
> i2rs mailing list
> i2rs@ietf.org
> https://www.ietf.org/mailman/listinfo/i2rs


From nobody Fri Aug 28 18:58:25 2015
Return-Path: <mglt.ietf@gmail.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6D3A51A879B for <i2rs@ietfa.amsl.com>; Fri, 28 Aug 2015 18:58:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.277
X-Spam-Level: 
X-Spam-Status: No, score=-1.277 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FM_FORGED_GMAIL=0.622, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZNNQ5bja1ZfP for <i2rs@ietfa.amsl.com>; Fri, 28 Aug 2015 18:58:20 -0700 (PDT)
Received: from mail-ig0-x22e.google.com (mail-ig0-x22e.google.com [IPv6:2607:f8b0:4001:c05::22e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A74BE1AD0C0 for <i2rs@ietf.org>; Fri, 28 Aug 2015 18:58:19 -0700 (PDT)
Received: by igui7 with SMTP id i7so28390583igu.0 for <i2rs@ietf.org>; Fri, 28 Aug 2015 18:58:19 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:sender:in-reply-to:references:date:message-id:subject :from:to:cc:content-type; bh=7ejAcMkEGP93v9W7HJTYNle+y4eSIov6acRSk+eNC5Y=; b=LrTER9JWLJODdlHQcdaGS96/eKlU19wQlAxaUUd6qwm+HtXkzzEvHyLfkRDCZwTd5U RN2DlieGraDeIHTFQvqjcbxcP7hhF6pZ10tuIw6PCRiACJZRwAfsuCi5U2MPBWNby3TA cvcjCNjH7FDZC2daQvMJlgnhKhivHFdNkZLecKGCTyvIYhCaaqhmp1fHWOO+9vCq/0DW AmaUSN00CaozHD523QcVxOkjBDdC6m1FiGvQ6KZhcMVab/OKUZHwht5SSElWu+xZruqn AUX5wKll4Y0MAeK5srVgnX53ZVE7WgWt2u0TT35YUbq3Q/DCVDvXkNflnegJs5QnK444 0mDA==
MIME-Version: 1.0
X-Received: by 10.50.13.10 with SMTP id d10mr6442707igc.20.1440813499120; Fri, 28 Aug 2015 18:58:19 -0700 (PDT)
Sender: mglt.ietf@gmail.com
Received: by 10.79.21.196 with HTTP; Fri, 28 Aug 2015 18:58:19 -0700 (PDT)
In-Reply-To: <1896B2E9-4E6B-4575-B589-C640C549E7FF@lucidvision.com>
References: <20150827203209.GB19039@pfrc.org> <01cc01d0e10a$7a0d29f0$6e277dd0$@ndzh.com> <20150828070748.GB89759@elstar.local> <1896B2E9-4E6B-4575-B589-C640C549E7FF@lucidvision.com>
Date: Fri, 28 Aug 2015 21:58:19 -0400
X-Google-Sender-Auth: ZkRVxuET6qMBgZTdZv7O3_qnzSc
Message-ID: <CADZyTkkV_=Bwi9vS4Yc0Oc0Mr2-gCbEg10_vHc3sa+E=WeY8Qw@mail.gmail.com>
From: Daniel Migault <daniel.migault@ericsson.com>
To: Nadeau Thomas <tnadeau@lucidvision.com>
Content-Type: multipart/alternative; boundary=089e01184874cd8491051e698884
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/FctxfjV5SscVhJxYCEyJ6tOwDnE>
Cc: Jeffrey Haas <jhaas@pfrc.org>, i2rs@ietf.org, Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>, Susan Hares <shares@ndzh.com>
Subject: Re: [i2rs] draft-mglt-i2rs-security-environment-reqs, REQ 3
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 29 Aug 2015 01:58:21 -0000

--089e01184874cd8491051e698884
Content-Type: text/plain; charset=UTF-8

Hi,

This has been removed. I agree that if that if it is not implementable, we
should not have it (even as a recommendation), Thanks for the feed back. I
am catching up with all received comments.

BR,
Daniel

On Fri, Aug 28, 2015 at 9:42 AM, Nadeau Thomas <tnadeau@lucidvision.com>
wrote:

> +1
>
> > On Aug 28, 2015:3:07 AM, at 3:07 AM, Juergen Schoenwaelder <
> j.schoenwaelder@jacobs-university.de> wrote:
> >
> > On Thu, Aug 27, 2015 at 04:53:50PM -0400, Susan Hares wrote:
> >> Jeff:
> >>
> >> I agree it is a goal rather than an absolute.  My first discussions with
> >> Daniel pointed this out.  Do you think moving it back to
> >>
> >>
> >>   REQ 3:  The I2RS Agent validates data to try to insure that
> >>         injecting the Information does not create a deadlock with any
> other
> >> system
> >>        or a routing loop or prevent the control plane from converging.
> >>       (This is a goal for the system, and it should keep track of when
> >>        Injecting information does cause deadlocks, routing loops, or
> >>        retards the routing convergence process.).
> >>
> >
> > I already pointed out on July 21 that this requirement is not
> > implementable. Adding hand-waving text to it does not help, so
> > I am in favour of removing it.
> >
> > /js
> >
> > --
> > Juergen Schoenwaelder           Jacobs University Bremen gGmbH
> > Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
> > Fax:   +49 421 200 3103         <http://www.jacobs-university.de/>
> >
> > _______________________________________________
> > i2rs mailing list
> > i2rs@ietf.org
> > https://www.ietf.org/mailman/listinfo/i2rs
>
> _______________________________________________
> i2rs mailing list
> i2rs@ietf.org
> https://www.ietf.org/mailman/listinfo/i2rs
>

--089e01184874cd8491051e698884
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div><div>Hi, <br><br>This has been removed. I agree that =
if that if it is not implementable, we should not have it (even as a recomm=
endation), Thanks for the feed back. I am catching up with all received com=
ments.<br><br></div>BR, <br></div>Daniel<br></div><div class=3D"gmail_extra=
"><br><div class=3D"gmail_quote">On Fri, Aug 28, 2015 at 9:42 AM, Nadeau Th=
omas <span dir=3D"ltr">&lt;<a href=3D"mailto:tnadeau@lucidvision.com" targe=
t=3D"_blank">tnadeau@lucidvision.com</a>&gt;</span> wrote:<br><blockquote c=
lass=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;=
padding-left:1ex">+1<br>
<div class=3D"HOEnZb"><div class=3D"h5"><br>
&gt; On Aug 28, 2015:3:07 AM, at 3:07 AM, Juergen Schoenwaelder &lt;<a href=
=3D"mailto:j.schoenwaelder@jacobs-university.de">j.schoenwaelder@jacobs-uni=
versity.de</a>&gt; wrote:<br>
&gt;<br>
&gt; On Thu, Aug 27, 2015 at 04:53:50PM -0400, Susan Hares wrote:<br>
&gt;&gt; Jeff:<br>
&gt;&gt;<br>
&gt;&gt; I agree it is a goal rather than an absolute.=C2=A0 My first discu=
ssions with<br>
&gt;&gt; Daniel pointed this out.=C2=A0 Do you think moving it back to<br>
&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt;=C2=A0 =C2=A0REQ 3:=C2=A0 The I2RS Agent validates data to try to i=
nsure that<br>
&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0injecting the Information does no=
t create a deadlock with any other<br>
&gt;&gt; system<br>
&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 or a routing loop or prevent the contro=
l plane from converging.<br>
&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0(This is a goal for the system, and it s=
hould keep track of when<br>
&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 Injecting information does cause deadlo=
cks, routing loops, or<br>
&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 retards the routing convergence process=
.).<br>
&gt;&gt;<br>
&gt;<br>
&gt; I already pointed out on July 21 that this requirement is not<br>
&gt; implementable. Adding hand-waving text to it does not help, so<br>
&gt; I am in favour of removing it.<br>
&gt;<br>
&gt; /js<br>
&gt;<br>
&gt; --<br>
&gt; Juergen Schoenwaelder=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0Jacobs U=
niversity Bremen gGmbH<br>
&gt; Phone: <a href=3D"tel:%2B49%20421%20200%203587" value=3D"+494212003587=
">+49 421 200 3587</a>=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0Campus Ring 1 | 287=
59 Bremen | Germany<br>
&gt; Fax:=C2=A0 =C2=A0+49 421 200 3103=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0&lt=
;<a href=3D"http://www.jacobs-university.de/" rel=3D"noreferrer" target=3D"=
_blank">http://www.jacobs-university.de/</a>&gt;<br>
&gt;<br>
&gt; _______________________________________________<br>
&gt; i2rs mailing list<br>
&gt; <a href=3D"mailto:i2rs@ietf.org">i2rs@ietf.org</a><br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/i2rs" rel=3D"noreferr=
er" target=3D"_blank">https://www.ietf.org/mailman/listinfo/i2rs</a><br>
<br>
_______________________________________________<br>
i2rs mailing list<br>
<a href=3D"mailto:i2rs@ietf.org">i2rs@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/i2rs" rel=3D"noreferrer" t=
arget=3D"_blank">https://www.ietf.org/mailman/listinfo/i2rs</a><br>
</div></div></blockquote></div><br></div>

--089e01184874cd8491051e698884--

