Skip to main content

Last Call Review of draft-ietf-i2nsf-registration-interface-dm-23
review-ietf-i2nsf-registration-interface-dm-23-secdir-lc-kelly-2023-03-10-00

Request Review of draft-ietf-i2nsf-registration-interface-dm
Requested revision No specific revision (document currently at 26)
Type Last Call Review
Team Security Area Directorate (secdir)
Deadline 2023-03-16
Requested 2023-03-02
Authors Sangwon Hyun , Jaehoon Paul Jeong , TaeKyun Roh , Sarang Wi , Park Jung-Soo
I-D last updated 2023-03-10
Completed reviews Yangdoctors Last Call review of -08 by Reshad Rahman (diff)
Secdir Early review of -17 by Scott G. Kelly (diff)
Opsdir Early review of -17 by Gyan Mishra (diff)
Tsvart Last Call review of -23 by Brian Trammell (diff)
Secdir Last Call review of -23 by Scott G. Kelly (diff)
Assignment Reviewer Scott G. Kelly
State Completed
Request Last Call review on draft-ietf-i2nsf-registration-interface-dm by Security Area Directorate Assigned
Posted at https://mailarchive.ietf.org/arch/msg/secdir/gNyZC0MhaT00mZtQQgnF4BnyYmk
Reviewed revision 23 (document currently at 26)
Result Ready
Completed 2023-03-10
review-ietf-i2nsf-registration-interface-dm-23-secdir-lc-kelly-2023-03-10-00
I have reviewed this document as part of the security directorate's ongoing
effort to review all IETF documents being processed by the IESG.  These
comments were written primarily for the benefit of the security area directors.
Document editors and WG chairs should treat these comments just like any other
last call comments.

The summary of the review is Ready.

From the abstract, This document defines an information model and a YANG data
model for the Registration Interface between Security Controller and
Developer's Management System (DMS) in the Interface to Network Security
Functions (I2NSF) framework to register Network Security Functions (NSF) of the
DMS with the Security Controller.  The objective of these information and data
models is to support NSF capability registration and query via I2NSF
Registration Interface.

The security considerations section complies with the requirements set forth in
https://trac.ietf.org/trac/ops/wiki/yang-security-guidelines. I think this
document is ready for publication.