IETF
i2nsf@jabber.ietf.org
Tuesday, July 21, 2015< ^ >
Yoav Nir has set the subject to: I2NSF BOF - IETF 91 - http://www.ietf.org/proceedings/91/agenda/agenda-91-i2nsf
Room Configuration
Room Occupants

GMT+0
[08:09:35] tom.cejka joins the room
[09:37:38] tom.cejka joins the room
[09:37:40] tom.cejka leaves the room
[09:42:01] tom.cejka joins the room
[09:43:01] tom.cejka leaves the room
[10:16:05] tom.cejka leaves the room
[10:17:09] tom.cejka joins the room
[10:17:32] tom.cejka joins the room
[10:18:37] tom.cejka leaves the room
[10:21:22] tom.cejka joins the room
[10:22:12] tom.cejka leaves the room
[10:37:51] tom.cejka leaves the room
[10:38:07] tom.cejka joins the room
[10:48:09] tom.cejka joins the room
[10:48:49] tom.cejka leaves the room
[10:54:19] tom.cejka joins the room
[10:55:28] tom.cejka leaves the room
[10:55:30] hartmans joins the room
[10:57:38] Melinda Shore joins the room
[10:58:21] Hosnieh Rafiee joins the room
[10:58:29] Tal Mizrahi joins the room
[10:58:36] Meetecho joins the room
[11:01:58] Yoav Nir joins the room
[11:02:19] Yoav Nir has set the subject to: I2NSF BOF - IETF 93
[11:03:23] <Hosnieh Rafiee> Yes
[11:04:31] <Yoav Nir> Hi, all. I will be your Jabber scribe. If anyone in the Jabber room would like something said on the room microphone, please prefix with "mic:"
[11:04:38] <Yoav Nir> (not Yaron...)
[11:04:43] <Melinda Shore> Thank you.
[11:04:44] <Hosnieh Rafiee> ok thanks Yoav
[11:04:47] Jake Carter joins the room
[11:05:29] Kathleen Moriarty joins the room
[11:05:40] <Yoav Nir> Now looking at the agenda slide
[11:06:01] <Yoav Nir> What is i2nsf
[11:06:14] <Yoav Nir> Reading the "Description" slide
[11:07:58] <Yoav Nir> This *is* a WG-forming BoF, so the usual questions will come at the end.
[11:08:03] Karen O'Donoghue joins the room
[11:08:40] cw-ietf joins the room
[11:08:48] <Yoav Nir> First thing: merged use cases
[11:09:07] <Yoav Nir> Diego Lopez presenting
[11:10:21] Stefan Santesson joins the room
[11:10:33] Amreesh Phokeer joins the room
[11:11:11] <Yoav Nir> For those of you who have just joined, I will be your Jabber scribe. If anyone in the Jabber room would like something said on the room microphone, please prefix with "mic:"
[11:12:24] <Stefan Santesson> mic - We all thank Yoav for being the Jabber scribe :)
[11:13:08] <Yoav Nir> Terminology: A couple of basic definitions
[11:14:06] <tom.cejka> Hi all, excuse me, what room does it take place? Shouldn't it be in Karlin 3?
[11:14:20] <Yoav Nir> Karlin 2
[11:14:21] <Kathleen Moriarty> Karlin I/II
[11:14:24] <Yoav Nir> (and 1)
[11:14:34] <Yoav Nir> Slide: The Scenarios. A Global View
[11:14:39] <tom.cejka> Thanks a lot, moving there...
[11:16:05] <Yoav Nir> Slide: The Scenarios. Common Use Cases
[11:16:59] tom.cejka joins the room
[11:17:05] Carlos Bernardos joins the room
[11:17:18] tom.cejka leaves the room
[11:17:31] Carlos Bernardos leaves the room
[11:17:51] tom.cejka joins the room
[11:18:22] tom.cejka leaves the room
[11:19:45] <Yoav Nir> Slide: The Two Scenarios at Play
[11:20:30] Amreesh Phokeer leaves the room
[11:22:50] <Yoav Nir> Slide: And a Few Essential Requirements
[11:24:53] <Yoav Nir> Stefan Santesson at the mic
[11:25:29] <Yoav Nir> Are y'all hearing the room mic OK?
[11:25:40] <Melinda Shore> Pretty well.
[11:25:47] <Tal Mizrahi> mic: on slide 5 - does the security controller take part in setting up the paths or service chains between the client and NSF?
[11:25:50] Laura Corcoran joins the room
[11:27:45] <Melinda Shore> Okay, can't hear that.
[11:28:45] <Melinda Shore> "I want a new firewall" is one thing, "I want to allow service <x> between <y> and <z>" is a very different thing.
[11:29:36] <Tal Mizrahi> Thanks Yoav!
[11:29:37] <Kathleen Moriarty> I think he means more of the latter
[11:30:11] <Yoav Nir> Next presentation: i2nfs problem statement
[11:30:26] <Yoav Nir> Linda Dunbar presenting
[11:31:01] <Yoav Nir> Slide: Multi-vendor & Multi-Types of NSFs To be managed
[11:31:04] tom.cejka joins the room
[11:31:46] Mike Boyle joins the room
[11:32:08] tom.cejka leaves the room
[11:32:49] <Yoav Nir> Slide: Automation of the NSFs’ control & monitor
[11:34:26] <Yoav Nir> Slide: Different vendor  Different Provisioning Formats
[11:34:40] <Yoav Nir> The weird symbol is an arrow pointing right
[11:35:17] <Yoav Nir> Slide: FW configuration: ports & links based
[11:35:52] <Yoav Nir> Slide: OpenStack FWaaS Rules Configuration
[11:36:08] tom.cejka joins the room
[11:36:55] <Yoav Nir> Slide: Summary of I2NSF Problems
[11:37:12] tom.cejka leaves the room
[11:37:55] <Yoav Nir> Slide: Goal of I2NSF
[11:38:14] deb cooley joins the room
[11:38:24] Kathleen Moriarty leaves the room
[11:38:42] deb cooley leaves the room
[11:39:07] deb cooley joins the room
[11:39:25] <Yoav Nir> (yes, we've apparently skipped a "backup" slide)
[11:39:41] <Yoav Nir> Sue Hares presenting
[11:40:16] <Yoav Nir> Gap Analysis
[11:40:29] <Yoav Nir> Slide 3: Filters
[11:41:46] <Yoav Nir> Slide 4: Security Working Groups
[11:43:18] <Yoav Nir> Slide 5: Other Areas
[11:44:43] Kathleen Moriarty joins the room
[11:50:35] Mike Boyle leaves the room
[11:50:42] <Yoav Nir> New presentation
[11:50:46] <Yoav Nir> (-4)
[11:51:09] <Yoav Nir> Framework
[11:51:14] <Yoav Nir> Ed Lopez
[11:51:23] <Yoav Nir> Slide #2: Problems
[11:51:42] <Yoav Nir> (Ed works for Fortinet)
[11:53:27] <Yoav Nir> Slide #3: Potential For Imposed Constraints
[11:54:59] <Yoav Nir> Slide #4: Packet-Based Paradigm for FlowBased NSF
[11:55:44] tom.cejka joins the room
[11:55:53] <Yoav Nir> Slide #5: Three Sub-Interface Types
[11:56:37] tom.cejka leaves the room
[11:57:37] <Yoav Nir> Slide #6: Suggested Framework - Provisioning
[12:00:41] tom.cejka joins the room
[12:01:30] <Yoav Nir> Slide #8: Interface to vNSFs
[12:01:49] tom.cejka leaves the room
[12:02:47] <Yoav Nir> Slide #9: NSF Provisioning Components Breakdown
[12:03:43] <Yoav Nir> Slide #11: Flow Based NSF Capability Index
[12:04:23] tom.cejka leaves the room
[12:04:39] <Yoav Nir> Slide #12: Security Function Catalog DB
[12:04:53] Kathleen Moriarty joins the room
[12:05:38] Kathleen Moriarty leaves the room
[12:06:18] tom.cejka joins the room
[12:08:09] <Melinda Shore> Could people identify themselves at the mic?
[12:08:37] <Kathleen Moriarty> It was Sam Hartman, then me, now … need to see his name
[12:09:17] <Melinda Shore> Right, both you and Sam identified yourself, but not sure who this is, or who sevral previous people with questions were.
[12:09:30] <Melinda Shore> (yourselves, rather)
[12:09:45] tom.cejka joins the room
[12:09:48] tom.cejka leaves the room
[12:10:40] <Kathleen Moriarty> Hope that helped :-)  I was trying to look to get it, but asked
[12:10:49] tom.cejka leaves the room
[12:10:50] tom.cejka joins the room
[12:10:52] <Melinda Shore> Thanks!
[12:11:11] tom.cejka joins the room
[12:11:30] <Yoav Nir> Now at the mic: Dean Bogdanovic
[12:12:10] tom.cejka leaves the room
[12:13:06] <Yoav Nir> Next: Information Model of Interface to Network Security Functions Capability Interface
[12:13:22] tom.cejka joins the room
[12:13:24] <Yoav Nir> Dacheng Zhang from Alibaba
[12:13:33] <Yoav Nir> Slide #2
[12:13:43] tom.cejka leaves the room
[12:13:49] <Yoav Nir> (Yay! slide numbers)
[12:13:53] <Yoav Nir> Slide #3
[12:13:57] tom.cejka joins the room
[12:14:09] tom.cejka joins the room
[12:14:49] tom.cejka leaves the room
[12:14:54] tom.cejka joins the room
[12:15:03] <Yoav Nir> Slide #4
[12:15:10] tom.cejka leaves the room
[12:15:20] tom.cejka joins the room
[12:15:20] tom.cejka leaves the room
[12:15:47] tom.cejka joins the room
[12:15:58] <Yoav Nir> Slide #5
[12:16:10] <Yoav Nir> Frank Xia presenting
[12:16:26] tom.cejka leaves the room
[12:16:30] tom.cejka leaves the room
[12:16:30] tom.cejka joins the room
[12:17:27] tom.cejka leaves the room
[12:18:06] <Yoav Nir> Slide #6
[12:18:22] <Yoav Nir> Slide #7
[12:18:36] tom.cejka joins the room
[12:18:37] <Yoav Nir> Slide #8
[12:18:55] <Yoav Nir> (we didn't spend a lot of time staring at the grammar and YANG slides)
[12:19:23] tom.cejka leaves the room
[12:19:56] tom.cejka leaves the room
[12:19:58] <hartmans> This information model doesn't really reflect  the framework very well.
[12:20:14] tom.cejka joins the room
[12:20:23] <hartmans> In particular, there is nothing corresponding to security function; the closest is advanced function.
[12:20:35] <hartmans> The subject/object distinction is different than was described in the presentation.
[12:21:10] <Yoav Nir> SDN based Security Services using I2NSF
[12:21:32] tom.cejka leaves the room
[12:21:33] <Yoav Nir> Already up to slide #5
[12:22:46] <Yoav Nir> Slide #6
[12:22:55] tom.cejka joins the room
[12:23:56] <Yoav Nir> Dan at the room mic
[12:24:46] <Yoav Nir> Slide #8
[12:25:38] <Yoav Nir> Slide #9
[12:25:45] <Yoav Nir> Slide #10
[12:26:01] deb cooley leaves the room
[12:26:06] <Yoav Nir> Slide #11
[12:26:17] <Yoav Nir> Slide #12
[12:27:19] <Yoav Nir> How many people (in this room) have read the charter?
[12:27:25] <Melinda Shore> hummmmm
[12:28:05] <Yoav Nir> Sam at the mic
[12:28:47] Stefan Santesson leaves the room: Disconnected: closed
[12:31:00] sftcd joins the room
[12:34:59] Stefan Santesson joins the room
[12:34:59] Stefan Santesson leaves the room: Disconnected: closed
[12:35:19] <Yoav Nir> Bob Moskowitz at the mic
[12:36:24] <Yoav Nir> I think the term modern firewall use is "application"
[12:36:38] <Yoav Nir> Linda Dunbar at the mic
[12:38:31] <Kathleen Moriarty> Sumandra ?
[12:38:34] Stefan Santesson joins the room
[12:38:47] <Kathleen Moriarty> Valee
[12:54:57] tom.cejka joins the room
[12:55:42] tom.cejka leaves the room
[12:55:51] <Yoav Nir> Let's hum
[12:56:04] <Yoav Nir> Is the problem statement clear?
[12:56:15] <Melinda Shore> hummmmm
[12:56:18] <Yoav Nir> Is it not? not well-scoped?
[12:56:23] <Melinda Shore> (to not clear)
[12:56:40] <Yoav Nir> Sam (off-mic) the charter does not fit the PS
[12:56:46] <Yoav Nir> Is the charter acceptable?
[12:56:52] <Yoav Nir> Is it not?
[12:56:58] <Yoav Nir> (mostly Sam humming)
[12:57:13] <Yoav Nir> Dan: rough consensus on the 'yes'
[12:57:25] <Yoav Nir> Who is willing to be editor ?
[12:57:35] <Yoav Nir> Who is willing to review?
[12:57:50] Tal Mizrahi leaves the room
[12:58:09] <Yoav Nir> interested in deploying?
[12:58:21] <Yoav Nir> 7
[12:58:31] <Yoav Nir> Interested in implementing?
[12:58:34] <Yoav Nir> 11
[12:59:03] <Yoav Nir> (although if this happens, it might be something all firewall implementers might be required to do)
[12:59:20] tom.cejka joins the room
[12:59:47] Melinda Shore leaves the room
[12:59:49] tom.cejka leaves the room
[12:59:52] <Yoav Nir> and we're done
[12:59:55] Yoav Nir leaves the room
[13:00:23] Hosnieh Rafiee leaves the room
[13:00:49] Kathleen Moriarty leaves the room
[13:02:01] Meetecho leaves the room
[13:02:11] Stefan Santesson leaves the room: Disconnected: closed
[13:02:28] Karen O'Donoghue leaves the room
[13:04:16] tom.cejka joins the room
[13:05:23] tom.cejka leaves the room
[13:05:28] tom.cejka joins the room
[13:05:39] tom.cejka leaves the room
[13:06:17] tom.cejka joins the room
[13:07:03] tom.cejka leaves the room
[13:07:20] tom.cejka leaves the room
[13:09:36] sftcd leaves the room
[13:12:40] Stefan Santesson joins the room
[13:13:58] Jake Carter leaves the room
[13:15:53] hartmans leaves the room: Disconnected: connection closed
[13:21:41] tom.cejka joins the room
[13:23:41] Stefan Santesson leaves the room
[13:24:19] tom.cejka joins the room
[13:24:20] tom.cejka leaves the room
[13:25:24] tom.cejka leaves the room
[13:27:11] Karen O'Donoghue joins the room
[13:28:40] Karen O'Donoghue leaves the room
[13:30:17] Karen O'Donoghue joins the room
[13:32:16] cw-ietf leaves the room
[13:36:52] sftcd joins the room
[13:40:53] Karen O'Donoghue leaves the room
[13:47:15] Karen O'Donoghue joins the room
[13:50:13] Karen O'Donoghue leaves the room
[13:55:41] Karen O'Donoghue joins the room
[14:01:58] sftcd leaves the room
[14:02:16] Laura Corcoran leaves the room
[14:15:39] Karen O'Donoghue leaves the room
[14:16:26] Kathleen Moriarty joins the room
[14:17:58] Karen O'Donoghue joins the room
[14:19:11] Karen O'Donoghue leaves the room: Replaced by new connection
[14:19:25] Karen O'Donoghue joins the room
[14:24:17] Karen O'Donoghue leaves the room
[14:26:05] Karen O'Donoghue joins the room
[14:27:34] Kathleen Moriarty leaves the room
[14:56:10] Karen O'Donoghue leaves the room: Replaced by new connection
[14:56:24] Karen O'Donoghue joins the room
[15:18:49] Karen O'Donoghue leaves the room: Replaced by new connection
[15:18:59] Karen O'Donoghue joins the room
[15:38:08] Karen O'Donoghue leaves the room
[15:48:37] Kathleen Moriarty joins the room
[15:49:03] Kathleen Moriarty leaves the room
[18:56:51] hartmans joins the room
Powered by ejabberd Powered by Erlang Valid XHTML 1.0 Transitional Valid CSS!