
From nobody Wed May  1 01:55:46 2019
Return-Path: <swmike@swm.pp.se>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 33CB6120074 for <netmod@ietfa.amsl.com>; Wed,  1 May 2019 01:55:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.301
X-Spam-Level: 
X-Spam-Status: No, score=-4.301 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=swm.pp.se
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZtYtgmq06OVq for <netmod@ietfa.amsl.com>; Wed,  1 May 2019 01:55:42 -0700 (PDT)
Received: from uplift.swm.pp.se (ipv6.swm.pp.se [IPv6:2a00:801::f]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 49179120041 for <netmod@ietf.org>; Wed,  1 May 2019 01:55:41 -0700 (PDT)
Received: by uplift.swm.pp.se (Postfix, from userid 501) id 809D8AF; Wed,  1 May 2019 10:55:38 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=swm.pp.se; s=mail; t=1556700938; bh=vdKZoq6fhvu+5YBvKHaBm8PbA+MqVBiR9XzAR4HclqA=; h=Date:From:To:cc:Subject:In-Reply-To:References:From; b=LZSOTG2r98r9w+5QnS/eNJ5cXQWX7p05QZeRbmmuhFudq91dPaV+dCjgcw6fJTHcV iQm0+NzT14lyDdYM3Gjy9831hWpG9ltmSyzY8Ut4AlHZ6IwYcpwwJd8FkFLt+nhJLi VNaGlC/ETCewYuKQ5XpmEAsgoqrGx3e4A4wE8jTU=
Received: from localhost (localhost [127.0.0.1]) by uplift.swm.pp.se (Postfix) with ESMTP id 7D66C9F; Wed,  1 May 2019 10:55:38 +0200 (CEST)
Date: Wed, 1 May 2019 10:55:38 +0200 (CEST)
From: Mikael Abrahamsson <swmike@swm.pp.se>
To: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
cc: "Rob Wilton (rwilton)" <rwilton@cisco.com>,  "netmod@ietf.org" <netmod@ietf.org>
In-Reply-To: <20190430090905.qsa3r4dwauilsxur@anna.jacobs.jacobs-university.de>
Message-ID: <alpine.DEB.2.20.1905011051160.1824@uplift.swm.pp.se>
References: <20190429103451.yink4bdvvmlh7ohe@anna.jacobs.jacobs-university.de> <c03aa9a27ed544c5be88fd0750d782e3@XCH-RCD-007.cisco.com> <20190429134615.f32zkbia6fqwk3to@anna.jacobs.jacobs-university.de> <b404565930694fd8af93326b5e754a2b@XCH-RCD-007.cisco.com> <0c4265d31adbf208a680f76216cc4bc42c766eae.camel@nic.cz> <959ed1a8092f4798ac0b923384962049@XCH-RCD-007.cisco.com> <20190429153643.oxfcq7ze6ttdihb4@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1904300713100.3490@uplift.swm.pp.se> <20190430061737.vvxghxyacd57k73i@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1904301038570.3490@uplift.swm.pp.se> <20190430090905.qsa3r4dwauilsxur@anna.jacobs.jacobs-university.de>
User-Agent: Alpine 2.20 (DEB 67 2015-01-07)
Organization: People's Front Against WWW
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII; format=flowed
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/6o_W5-I4_DMrERwTf61iY6wwhPo>
Subject: Re: [netmod] 6021 ipv4-prefix
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 01 May 2019 08:55:45 -0000

On Tue, 30 Apr 2019, Juergen Schoenwaelder wrote:

> On Tue, Apr 30, 2019 at 10:46:34AM +0200, Mikael Abrahamsson wrote:
>> On Tue, 30 Apr 2019, Juergen Schoenwaelder wrote:
>>
>>> I think we go in circles in this thread and I will stop explaining
>>> things again and again. I suggest people look at the next revision
>>> and if anything remains unclear, people can send concrete edit
>>> proposals.
>>
>> You don't have to explain it. Let me try in a different way.
>>
>> https://tools.ietf.org/html/rfc7950#section-9.1
>>
>> "For most types, there is a single canonical representation of the
>>    type's values."
>>
>> Is it generally ok that the canonical value potentially represents a
>> different bit field/value than what the client sent?
>
> Yes. I explained that the canonicalization of IPv6 addresses is much
> more involved than clearing some unused bits in an IPv6 prefix.

The canonicalization of IPv6 addresses doesn't change the resulting 128 
bit pattern. Canonicalization of IPv6-prefix *does* change the bit 
pattern. Also, it doesn't say in 
https://tools.ietf.org/html/rfc7950#section-9.1 whether the server should 
accept bit-fields that do not adhere to the canonical representation or 
not.

So while you seem to think I am not reading your text, it seems to me 
you're not reading what I am saying either. You're not responding to the 
points I am trying to make anyway.

https://tools.ietf.org/html/rfc7950#section-9.1

This talks about *values*. If you drop bits in IPv6-prefix, then it's not 
the same *value* anymore.

So https://tools.ietf.org/html/rfc7950#section-9.1 should be changed 
in future revisions to avoid confusion.

> We are not 'fixing' anything. The canonical format is nothing new. The
> text aims at explaining things better. Yes, there are many more types
> that have a canonical representation. Read the other email messages in
> this thread or simply search for 'canonical' in the type definitions.
>
> I think the descriptions are actually all quite clear (but then I am
> biased of course).

There are lots of implications that are *not* clear in 
https://tools.ietf.org/html/rfc7950#section-9.1.

-- 
Mikael Abrahamsson    email: swmike@swm.pp.se


From nobody Wed May  1 01:58:51 2019
Return-Path: <swmike@swm.pp.se>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D7C841200B2 for <netmod@ietfa.amsl.com>; Wed,  1 May 2019 01:58:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.3
X-Spam-Level: 
X-Spam-Status: No, score=-4.3 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, LOTS_OF_MONEY=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=swm.pp.se
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KGxMxNyCRsk8 for <netmod@ietfa.amsl.com>; Wed,  1 May 2019 01:58:48 -0700 (PDT)
Received: from uplift.swm.pp.se (swm.pp.se [212.247.200.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2EF12120041 for <netmod@ietf.org>; Wed,  1 May 2019 01:58:48 -0700 (PDT)
Received: by uplift.swm.pp.se (Postfix, from userid 501) id 1D8DBAF; Wed,  1 May 2019 10:58:46 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=swm.pp.se; s=mail; t=1556701126; bh=+zwLdaS1vU676v6OZS2o3zQnx11iTbG3v+R09eeQX7I=; h=Date:From:To:cc:Subject:In-Reply-To:References:From; b=fM/Y/hp6DuRGslaR6tEZb+HRapNzkOVlqP3u9UTlupuwsbD4hYbzRjOn3ds2RcerM M5rt9ERfCBtuoshZ5sp3VQpt5LdI5ZqyhTrroCiy36vIL4AHEK4Ciut0p6cWTp9E2E KU7igE7WAb9Y9mlzeLEkBjs05UFf5ugZnYyWvbvk=
Received: from localhost (localhost [127.0.0.1]) by uplift.swm.pp.se (Postfix) with ESMTP id 1A3999F; Wed,  1 May 2019 10:58:46 +0200 (CEST)
Date: Wed, 1 May 2019 10:58:46 +0200 (CEST)
From: Mikael Abrahamsson <swmike@swm.pp.se>
To: Randy Presuhn <randy_presuhn@alumni.stanford.edu>
cc: netmod@ietf.org
In-Reply-To: <18711798-25e6-f4f2-8a41-a003c18037c6@alumni.stanford.edu>
Message-ID: <alpine.DEB.2.20.1905011056161.1824@uplift.swm.pp.se>
References: <20190429100213.vukmmbdsz5zlw6w5@anna.jacobs.jacobs-university.de> <bbf252aaca86418ca80b3bf04a910aff@XCH-RCD-007.cisco.com> <20190429103451.yink4bdvvmlh7ohe@anna.jacobs.jacobs-university.de> <c03aa9a27ed544c5be88fd0750d782e3@XCH-RCD-007.cisco.com> <20190429134615.f32zkbia6fqwk3to@anna.jacobs.jacobs-university.de> <b404565930694fd8af93326b5e754a2b@XCH-RCD-007.cisco.com> <0c4265d31adbf208a680f76216cc4bc42c766eae.camel@nic.cz> <959ed1a8092f4798ac0b923384962049@XCH-RCD-007.cisco.com> <20190429153643.oxfcq7ze6ttdihb4@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1904300713100.3490@uplift.swm.pp.se> <20190430061737.vvxghxyacd57k73i@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1904301038570.3490@uplift.swm.pp.se> <18711798-25e6-f4f2-8a41-a003c18037c6@alumni.stanford.edu>
User-Agent: Alpine 2.20 (DEB 67 2015-01-07)
Organization: People's Front Against WWW
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII; format=flowed
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/tmhtrID03awDj5Vg0T94N30DRsg>
Subject: Re: [netmod] 6021 ipv4-prefix
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 01 May 2019 08:58:50 -0000

On Tue, 30 Apr 2019, Randy Presuhn wrote:

> Hi -
>
> On 4/30/2019 1:46 AM, Mikael Abrahamsson wrote:
> ....
>> Is it generally ok that the canonical value potentially represents a
>> different bit field/value than what the client sent?
> ....
>
> The *value* represented is the same.  The sequences of bytes used
> to represent that value may be different.  Some information sent

No. 2001:db8::/64 and 2001:db8::1/64 isn't the same *value*. These are not 
the same bits set.

> by the client may be extraneous to the *value*.  Consider the case
> of currency values entered into some application.  A robust application
> won't care whether I enter $1,234,567.89 or 1234567.89 and if it
> subsequently chooses to display it as "1.234.567,89 USD" I can't
> complain that the value is different, even though several bytes of
> my input have clearly been discarded.

That's a completely different example. In your example the value is the 
same, in mine (ipv6-prefix) it isn't.

> This situation is hardly unique to netconf. I recall coding for such 
> situations forty years ago.  It has been a fact of life throughout the 
> history of ASN.1 and especially BER. It will continue to be a 
> consideration at least as long as folks feel the need to support "human 
> readable" representations on input.  Frankly, I was surprised that 
> anyone was surprised by this.

I have no problem understanding the canonicalization of IPv6 address, 
because the underlying value doesn't change by canonicalizating it. This 
is not the case with canonicalizating IPv6-prefix, where the resulting 128 
bit field *changes* when you canonicalize it.

-- 
Mikael Abrahamsson    email: swmike@swm.pp.se


From nobody Wed May  1 04:17:23 2019
Return-Path: <j.schoenwaelder@jacobs-university.de>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 13693120103 for <netmod@ietfa.amsl.com>; Wed,  1 May 2019 04:17:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id O4xSZr50NSy1 for <netmod@ietfa.amsl.com>; Wed,  1 May 2019 04:17:19 -0700 (PDT)
Received: from atlas5.jacobs-university.de (atlas5.jacobs-university.de [212.201.44.20]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 894131200E3 for <netmod@ietf.org>; Wed,  1 May 2019 04:17:19 -0700 (PDT)
Received: from localhost (demetrius5.irc-it.jacobs-university.de [10.70.0.222]) by atlas5.jacobs-university.de (Postfix) with ESMTP id 3CF8D6B6; Wed,  1 May 2019 13:17:17 +0200 (CEST)
X-Virus-Scanned: amavisd-new at jacobs-university.de
Received: from atlas5.jacobs-university.de ([10.70.0.217]) by localhost (demetrius5.jacobs-university.de [10.70.0.222]) (amavisd-new, port 10032) with ESMTP id d4XSdWpXHjfb; Wed,  1 May 2019 13:17:17 +0200 (CEST)
Received: from hermes.jacobs-university.de (hermes.jacobs-university.de [212.201.44.23]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "hermes.jacobs-university.de", Issuer "Jacobs University CA - G01" (verified OK)) by atlas5.jacobs-university.de (Postfix) with ESMTPS; Wed,  1 May 2019 13:17:17 +0200 (CEST)
Received: from localhost (demetrius5.irc-it.jacobs-university.de [10.70.0.222]) by hermes.jacobs-university.de (Postfix) with ESMTP id 26882200E0; Wed,  1 May 2019 13:17:17 +0200 (CEST)
X-Virus-Scanned: amavisd-new at jacobs-university.de
Received: from hermes.jacobs-university.de ([212.201.44.23]) by localhost (demetrius5.jacobs-university.de [10.70.0.222]) (amavisd-new, port 10028) with ESMTP id BqS1bqRbsNZa; Wed,  1 May 2019 13:17:16 +0200 (CEST)
Received: from exchange.jacobs-university.de (sxchmb03.jacobs.jacobs-university.de [10.70.0.155]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "exchange.jacobs-university.de", Issuer "DFN-Verein Global Issuing CA" (verified OK)) by hermes.jacobs-university.de (Postfix) with ESMTPS id 882F4200DE; Wed,  1 May 2019 13:17:16 +0200 (CEST)
Received: from anna.localdomain (10.50.218.117) by sxchmb03.jacobs.jacobs-university.de (10.70.0.155) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.1713.5; Wed, 1 May 2019 13:17:15 +0200
Received: by anna.localdomain (Postfix, from userid 501) id 123993008B781E; Wed,  1 May 2019 13:17:14 +0200 (CEST)
Date: Wed, 1 May 2019 13:17:12 +0200
From: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
To: Mikael Abrahamsson <swmike@swm.pp.se>
CC: "Rob Wilton (rwilton)" <rwilton@cisco.com>, "netmod@ietf.org" <netmod@ietf.org>
Message-ID: <20190501111712.347bpz26br6ox3jp@anna.jacobs.jacobs-university.de>
Reply-To: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
Mail-Followup-To: Mikael Abrahamsson <swmike@swm.pp.se>, "Rob Wilton (rwilton)" <rwilton@cisco.com>, "netmod@ietf.org" <netmod@ietf.org>
References: <20190429134615.f32zkbia6fqwk3to@anna.jacobs.jacobs-university.de> <b404565930694fd8af93326b5e754a2b@XCH-RCD-007.cisco.com> <0c4265d31adbf208a680f76216cc4bc42c766eae.camel@nic.cz> <959ed1a8092f4798ac0b923384962049@XCH-RCD-007.cisco.com> <20190429153643.oxfcq7ze6ttdihb4@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1904300713100.3490@uplift.swm.pp.se> <20190430061737.vvxghxyacd57k73i@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1904301038570.3490@uplift.swm.pp.se> <20190430090905.qsa3r4dwauilsxur@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1905011051160.1824@uplift.swm.pp.se>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <alpine.DEB.2.20.1905011051160.1824@uplift.swm.pp.se>
User-Agent: NeoMutt/20180716
X-ClientProxiedBy: SXCHMB01.jacobs.jacobs-university.de (10.70.0.120) To sxchmb03.jacobs.jacobs-university.de (10.70.0.155)
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/0jMdmEK_-zUoFwf6McXGeDb8xW4>
Subject: Re: [netmod] 6021 ipv4-prefix
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 01 May 2019 11:17:22 -0000

On Wed, May 01, 2019 at 10:55:38AM +0200, Mikael Abrahamsson wrote:
> 
> So while you seem to think I am not reading your text, it seems to me you're
> not reading what I am saying either. You're not responding to the points I
> am trying to make anyway.
> 
> https://tools.ietf.org/html/rfc7950#section-9.1
> 
> This talks about *values*. If you drop bits in IPv6-prefix, then it's not
> the same *value* anymore.

I personally do take the standpoint that irrelevant bits do not matter
for the value of a prefix, i.e., 192.168.0.1/24 and 192.168.0.0/24 are
two different representations for the same prefix. You seem to take
the standpoint that 192.168.0.1/24 and 192.168.0.0/24 are different
prefixes since bits that are irrelevant do differ.

Apparently there are different views that people have concerning
prefixes. I think I have seen the following three alternatives:

a) non-prefix bits that are set to one are illegal in a prefix
b) non-prefix bits are irrelevant but they need to be preserved
c) non-prefix bits are irrelevant, ignore them and the canonical
   representation has non-prefix bits set to zero

The RFC 6991 definitions do c). If there is consensus that c) is
wrong, we need to deprecate the definitions and create new ones after
finding consensus on either b) or a).

System/kernel interfaces seem to show different behaviours. My Linux
box seems to do a), my MacOS box seems to do c). The system/kernel
interfaces likely all do the same if all non-prefix bits are zero,
i.e., when the system receives data in the canonical format.

Option b) seems to be the most expensive to implement (your server may
have to clear non-prefix bits before pushing the prefix into the
kernel and it needs to map data received from the kernel back to a
prefix that has unused bits preserved in the datastore). Hence, for me
the choice is between a) and c) and given that we have c) already
defined for years, my first preference is to just keep things as they
are.

/js

-- 
Juergen Schoenwaelder           Jacobs University Bremen gGmbH
Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
Fax:   +49 421 200 3103         <https://www.jacobs-university.de/>


From nobody Wed May  1 06:12:55 2019
Return-Path: <swmike@swm.pp.se>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0E27A120128 for <netmod@ietfa.amsl.com>; Wed,  1 May 2019 06:12:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.301
X-Spam-Level: 
X-Spam-Status: No, score=-4.301 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=swm.pp.se
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XL3lXybrwysw for <netmod@ietfa.amsl.com>; Wed,  1 May 2019 06:12:50 -0700 (PDT)
Received: from uplift.swm.pp.se (ipv6.swm.pp.se [IPv6:2a00:801::f]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 335461200E3 for <netmod@ietf.org>; Wed,  1 May 2019 06:12:50 -0700 (PDT)
Received: by uplift.swm.pp.se (Postfix, from userid 501) id 57CE7AF; Wed,  1 May 2019 15:12:47 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=swm.pp.se; s=mail; t=1556716367; bh=p4hZuR5uCT05xv3t7szuo8BWgbYhHdTU2lMbHIv9S9I=; h=Date:From:To:cc:Subject:In-Reply-To:References:From; b=yfxHfKGnkL2F9XmrrdPO599OiGm8MKZJDWNGLsD3ThG/uNU0j/FLEZDL2wHKQdqQS wHTHPAEbPCxnI/pZr5YkyAJse09Rj1dLyfmUq3ajNq0emPgPqg4ztwPcE394XCGIUi a+zNuwP8CA2U6wSE4lhSfLC2N+rRH/oS6kuTk+/c=
Received: from localhost (localhost [127.0.0.1]) by uplift.swm.pp.se (Postfix) with ESMTP id 55A059F; Wed,  1 May 2019 15:12:47 +0200 (CEST)
Date: Wed, 1 May 2019 15:12:47 +0200 (CEST)
From: Mikael Abrahamsson <swmike@swm.pp.se>
To: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
cc: "Rob Wilton (rwilton)" <rwilton@cisco.com>,  "netmod@ietf.org" <netmod@ietf.org>
In-Reply-To: <20190501111712.347bpz26br6ox3jp@anna.jacobs.jacobs-university.de>
Message-ID: <alpine.DEB.2.20.1905011456580.1824@uplift.swm.pp.se>
References: <20190429134615.f32zkbia6fqwk3to@anna.jacobs.jacobs-university.de> <b404565930694fd8af93326b5e754a2b@XCH-RCD-007.cisco.com> <0c4265d31adbf208a680f76216cc4bc42c766eae.camel@nic.cz> <959ed1a8092f4798ac0b923384962049@XCH-RCD-007.cisco.com> <20190429153643.oxfcq7ze6ttdihb4@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1904300713100.3490@uplift.swm.pp.se> <20190430061737.vvxghxyacd57k73i@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1904301038570.3490@uplift.swm.pp.se> <20190430090905.qsa3r4dwauilsxur@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1905011051160.1824@uplift.swm.pp.se> <20190501111712.347bpz26br6ox3jp@anna.jacobs.jacobs-university.de>
User-Agent: Alpine 2.20 (DEB 67 2015-01-07)
Organization: People's Front Against WWW
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII; format=flowed
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/0Zi0Uint2JFe1PEOCbZAUUow54o>
Subject: Re: [netmod] 6021 ipv4-prefix
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 01 May 2019 13:12:53 -0000

On Wed, 1 May 2019, Juergen Schoenwaelder wrote:

> I personally do take the standpoint that irrelevant bits do not matter
> for the value of a prefix, i.e., 192.168.0.1/24 and 192.168.0.0/24 are
> two different representations for the same prefix. You seem to take
> the standpoint that 192.168.0.1/24 and 192.168.0.0/24 are different
> prefixes since bits that are irrelevant do differ.

No, I am saying this is underspecified or actually wrongly specified in 
the current documents + proposed text regarding what canonical format is 
and isn't, and how the server and clients handle this.

I am fine with the current proposed text to specify this for ipv6-prefix, 
but I am also pointing out that I think when YANG 1.2 is specced, the 
definition for "canonical format" needs more/changed text.

> Apparently there are different views that people have concerning
> prefixes. I think I have seen the following three alternatives:
>
> a) non-prefix bits that are set to one are illegal in a prefix
> b) non-prefix bits are irrelevant but they need to be preserved
> c) non-prefix bits are irrelevant, ignore them and the canonical
>   representation has non-prefix bits set to zero
>
> The RFC 6991 definitions do c). If there is consensus that c) is
> wrong, we need to deprecate the definitions and create new ones after
> finding consensus on either b) or a).

I am fine with c), but I am also saying I disagree with your view that 
this this behaviour has been specified "since the beginning". This might 
have been obvious to you from the beginning, but it's not wrotten down 
properly (at least I haven't seen text that makes me clearly understand 
the expected behaviour). I think the text specifying what "canonical 
format is" referring to "same *value*" is wrong. +17 and 17 is the same 
integer, 192.168.0.1/24 and 192.168.0.0/24 are not the same *value*. It's 
misleading to refer to the canonical form having the *same* *value* when 
we're throwing away information.

If you write 2001:db8:0:1 as 2001:db8::1 then you're compressing the text 
form without throwing away actual information. It's the *same value* buth 
*different text representation*. 2001:db8::/64 and 2001:db8::1/64 is *not 
the same value*.

I am fine with us continuing with c) above, I have long stopped arguing 
for anything else. What I am though saying is that I want 
https://tools.ietf.org/html/rfc7950#section-9.1 (or elsewhere) to have 
better text on this matter when the documents are revved next time.

-- 
Mikael Abrahamsson    email: swmike@swm.pp.se


From nobody Wed May  1 06:18:29 2019
Return-Path: <rwilton@cisco.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9702912012F for <netmod@ietfa.amsl.com>; Wed,  1 May 2019 06:18:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.502
X-Spam-Level: 
X-Spam-Status: No, score=-14.502 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YaUDPpV6fwfb for <netmod@ietfa.amsl.com>; Wed,  1 May 2019 06:18:25 -0700 (PDT)
Received: from rcdn-iport-6.cisco.com (rcdn-iport-6.cisco.com [173.37.86.77]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 532D9120128 for <netmod@ietf.org>; Wed,  1 May 2019 06:18:25 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=1625; q=dns/txt; s=iport; t=1556716705; x=1557926305; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=lEkAl6/uvnDw3UNSJ5/7Qxl1jGWx7pKDiZraHhWx+6Y=; b=ReMwm1tnmIH67r1ytOkVjlExoesC3cWCLwfgm4prwobJmjeY4ORipPnF V8ivO1zDm4mOyFNKjPQrMxgMouEYYMaR0GoNSZNHhdz+UmKiV6W1ULkZS oE7tgxrFy/swR9b+BHjC6E395cKzd/OVQn1WBLOWwwauD/C43FN4ha8+7 I=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AHAABZm8lc/51dJa1mGQEBAQEBAQE?= =?us-ascii?q?BAQEBAQcBAQEBAQGBUwIBAQEBAQsBghBpgQQoCpk1mFCBew4BASOESgKGMiM?= =?us-ascii?q?2Bw4BAwEBBAEBAgECbRwMhUoBAQEBAzo/DAQCAQgOAgEEAQEBHhAyHQgCBAE?= =?us-ascii?q?NBQiDG4IKD658ii8GgTIBi0sXgUA/hCM+gmECgUuFeASLB5wMCQKCCYYXjCA?= =?us-ascii?q?jlTWMEYZGjhYCERWBMCYCL4FWcBWDJ4V+ilNBMZJLgSEBAQ?=
X-IronPort-AV: E=Sophos;i="5.60,417,1549929600"; d="scan'208";a="553930648"
Received: from rcdn-core-6.cisco.com ([173.37.93.157]) by rcdn-iport-6.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 01 May 2019 13:18:24 +0000
Received: from XCH-RCD-010.cisco.com (xch-rcd-010.cisco.com [173.37.102.20]) by rcdn-core-6.cisco.com (8.15.2/8.15.2) with ESMTPS id x41DINsA018987 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 1 May 2019 13:18:24 GMT
Received: from xch-rcd-007.cisco.com (173.37.102.17) by XCH-RCD-010.cisco.com (173.37.102.20) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Wed, 1 May 2019 08:18:22 -0500
Received: from xch-rcd-007.cisco.com ([173.37.102.17]) by XCH-RCD-007.cisco.com ([173.37.102.17]) with mapi id 15.00.1473.003; Wed, 1 May 2019 08:18:23 -0500
From: "Rob Wilton (rwilton)" <rwilton@cisco.com>
To: Mikael Abrahamsson <swmike@swm.pp.se>, Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
CC: "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] 6021 ipv4-prefix
Thread-Index: AdT0l4zGpLjvUofYRmmSWqlDWwoAHABSPgGAAAHDNYAAA12WgAABgE0AAAD0FQAAAKy0gAF1SI2AAAERvAAAFIrFgAAG4xuAAADAhYAACALZAAAA/vaAAAK/LwAAATq3AAB768IgAAtOeIAACmVD4P//tfSAgABTU/D//+IngIAAUdRQ//+41wCAAFEEMP//wy6AABznDYAAAdzWgAAFM7gAAADJUIAAMdJaAAAE8bQAAAQJZoAACnCAQA==
Date: Wed, 1 May 2019 13:18:23 +0000
Message-ID: <7865fdb6ecd14d3db76be98e70d4e8f7@XCH-RCD-007.cisco.com>
References: <20190429134615.f32zkbia6fqwk3to@anna.jacobs.jacobs-university.de> <b404565930694fd8af93326b5e754a2b@XCH-RCD-007.cisco.com> <0c4265d31adbf208a680f76216cc4bc42c766eae.camel@nic.cz> <959ed1a8092f4798ac0b923384962049@XCH-RCD-007.cisco.com> <20190429153643.oxfcq7ze6ttdihb4@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1904300713100.3490@uplift.swm.pp.se> <20190430061737.vvxghxyacd57k73i@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1904301038570.3490@uplift.swm.pp.se> <20190430090905.qsa3r4dwauilsxur@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1905011051160.1824@uplift.swm.pp.se> <20190501111712.347bpz26br6ox3jp@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1905011456580.1824@uplift.swm.pp.se>
In-Reply-To: <alpine.DEB.2.20.1905011456580.1824@uplift.swm.pp.se>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.63.23.60]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Outbound-SMTP-Client: 173.37.102.20, xch-rcd-010.cisco.com
X-Outbound-Node: rcdn-core-6.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/G3XI0FYvrMzHIryyPk5n17-twXU>
Subject: Re: [netmod] 6021 ipv4-prefix
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 01 May 2019 13:18:28 -0000

Hi Mikael,

> -----Original Message-----
> From: Mikael Abrahamsson <swmike@swm.pp.se>
> Sent: 01 May 2019 14:13
> To: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
> Cc: Rob Wilton (rwilton) <rwilton@cisco.com>; netmod@ietf.org
> Subject: Re: [netmod] 6021 ipv4-prefix
>=20
> On Wed, 1 May 2019, Juergen Schoenwaelder wrote:
>=20
> > I personally do take the standpoint that irrelevant bits do not matter
> > for the value of a prefix, i.e., 192.168.0.1/24 and 192.168.0.0/24 are
> > two different representations for the same prefix. You seem to take
> > the standpoint that 192.168.0.1/24 and 192.168.0.0/24 are different
> > prefixes since bits that are irrelevant do differ.
>=20
> No, I am saying this is underspecified or actually wrongly specified in t=
he current
> documents + proposed text regarding what canonical format is and isn't, a=
nd
> how the server and clients handle this.
>=20
> I am fine with the current proposed text to specify this for ipv6-prefix,=
 but I am
> also pointing out that I think when YANG 1.2 is specced, the definition f=
or
> "canonical format" needs more/changed text.

I think that it is quite likely that this will get fixed in YANG 1.2.

It is being tracked as a potential issue for YANG 1.2 here, https://github.=
com/netmod-wg/yang-next/issues/83, which means that this issue should at le=
ast be discussed/considered for the next version of YANG.

If there are particular points of clarification that you think are importan=
t/required then adding them as comments to that github issue would be helpf=
ul.

Thanks,
Rob


From nobody Wed May  1 08:53:34 2019
Return-Path: <j.schoenwaelder@jacobs-university.de>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CBB9E12008A for <netmod@ietfa.amsl.com>; Wed,  1 May 2019 08:53:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WRl5NWFHjq6K for <netmod@ietfa.amsl.com>; Wed,  1 May 2019 08:53:30 -0700 (PDT)
Received: from atlas5.jacobs-university.de (atlas5.jacobs-university.de [212.201.44.20]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4F9D112006E for <netmod@ietf.org>; Wed,  1 May 2019 08:53:30 -0700 (PDT)
Received: from localhost (demetrius5.irc-it.jacobs-university.de [10.70.0.222]) by atlas5.jacobs-university.de (Postfix) with ESMTP id EA788DA9; Wed,  1 May 2019 17:53:28 +0200 (CEST)
X-Virus-Scanned: amavisd-new at jacobs-university.de
Received: from atlas5.jacobs-university.de ([10.70.0.217]) by localhost (demetrius5.jacobs-university.de [10.70.0.222]) (amavisd-new, port 10032) with ESMTP id yJRJ7X7jKHMJ; Wed,  1 May 2019 17:53:28 +0200 (CEST)
Received: from hermes.jacobs-university.de (hermes.jacobs-university.de [212.201.44.23]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "hermes.jacobs-university.de", Issuer "Jacobs University CA - G01" (verified OK)) by atlas5.jacobs-university.de (Postfix) with ESMTPS; Wed,  1 May 2019 17:53:28 +0200 (CEST)
Received: from localhost (demetrius5.irc-it.jacobs-university.de [10.70.0.222]) by hermes.jacobs-university.de (Postfix) with ESMTP id AA2E9200E0; Wed,  1 May 2019 17:53:28 +0200 (CEST)
X-Virus-Scanned: amavisd-new at jacobs-university.de
Received: from hermes.jacobs-university.de ([212.201.44.23]) by localhost (demetrius5.jacobs-university.de [10.70.0.222]) (amavisd-new, port 10028) with ESMTP id PLylnt3Tm1bh; Wed,  1 May 2019 17:53:28 +0200 (CEST)
Received: from exchange.jacobs-university.de (SXCHMB01.jacobs.jacobs-university.de [10.70.0.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "exchange.jacobs-university.de", Issuer "DFN-Verein Global Issuing CA" (verified OK)) by hermes.jacobs-university.de (Postfix) with ESMTPS id 20049200DE; Wed,  1 May 2019 17:53:28 +0200 (CEST)
Received: from anna.localdomain (10.50.218.117) by sxchmb03.jacobs.jacobs-university.de (10.70.0.155) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.1713.5; Wed, 1 May 2019 17:53:27 +0200
Received: by anna.localdomain (Postfix, from userid 501) id 6530A3008B81DA; Wed,  1 May 2019 17:53:24 +0200 (CEST)
Date: Wed, 1 May 2019 17:53:21 +0200
From: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
To: Mikael Abrahamsson <swmike@swm.pp.se>
CC: "Rob Wilton (rwilton)" <rwilton@cisco.com>, "netmod@ietf.org" <netmod@ietf.org>
Message-ID: <20190501155321.v4qz6twsom45y62f@anna.jacobs.jacobs-university.de>
Reply-To: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
Mail-Followup-To: Mikael Abrahamsson <swmike@swm.pp.se>, "Rob Wilton (rwilton)" <rwilton@cisco.com>, "netmod@ietf.org" <netmod@ietf.org>
References: <0c4265d31adbf208a680f76216cc4bc42c766eae.camel@nic.cz> <959ed1a8092f4798ac0b923384962049@XCH-RCD-007.cisco.com> <20190429153643.oxfcq7ze6ttdihb4@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1904300713100.3490@uplift.swm.pp.se> <20190430061737.vvxghxyacd57k73i@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1904301038570.3490@uplift.swm.pp.se> <20190430090905.qsa3r4dwauilsxur@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1905011051160.1824@uplift.swm.pp.se> <20190501111712.347bpz26br6ox3jp@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1905011456580.1824@uplift.swm.pp.se>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <alpine.DEB.2.20.1905011456580.1824@uplift.swm.pp.se>
User-Agent: NeoMutt/20180716
X-ClientProxiedBy: SXCHMB03.jacobs.jacobs-university.de (10.70.0.155) To sxchmb03.jacobs.jacobs-university.de (10.70.0.155)
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/A-N4Y4n1gGPx1n5xOCKzJI0mBKE>
Subject: Re: [netmod] 6021 ipv4-prefix
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 01 May 2019 15:53:33 -0000

On Wed, May 01, 2019 at 03:12:47PM +0200, Mikael Abrahamsson wrote:
> 
> I am fine with c), but I am also saying I disagree with your view that this
> this behaviour has been specified "since the beginning". This might have
> been obvious to you from the beginning, but it's not wrotten down properly
> (at least I haven't seen text that makes me clearly understand the expected
> behaviour). I think the text specifying what "canonical format is" referring
> to "same *value*" is wrong. +17 and 17 is the same integer, 192.168.0.1/24
> and 192.168.0.0/24 are not the same *value*. It's misleading to refer to the
> canonical form having the *same* *value* when we're throwing away
> information.
>

The basic disconnect here may be that for me the prefix is the value
while for you the value is the prefix plus the unused bits.

> If you write 2001:db8:0:1 as 2001:db8::1 then you're compressing the text
> form without throwing away actual information. It's the *same value* buth
> *different text representation*. 2001:db8::/64 and 2001:db8::1/64 is *not
> the same value*.

With your definition of 'value' it is not the same, with my definition
of 'value' it is the same.

For me, the value space of the ipv6-prefix type is the set of all
possible ipv6-prefixes. And with this, 2001:db8::/64 and
2001:db8::1/64 are two different textual representations that resolve
to the same prefix, i.e., the same value in the value space. I would
go even further and make the following distinction between

- textual representations of values of a type
- the value space of a type
- internal representations of values of a type

I think we have this discussion because you likely map the textual
representations of a prefix into an internal representation that can
capture details that are (in my model) not relevant for the value
space itself.

(Even for the case of simple signed integers, it depends on my internal
number representation whether normalizing +7 to 7 causes a change of
the internal representation or not.)

Once we add support to YANG for binary encodings, we will get
additional complexity since we will map the value space to multiple
'external' representations and for the same type (=value space), there
may be differences how 'external' representations map to the value
space. A binary representation of an IPv6 address may have a 1:1
mapping to the value space while our textual representation already
has a n:1 relationship. Or we go into the direction to require that
all 'external' representations must only have 1:1 relationships, i.e.,
only textual representations in canonical format will be legal. We
will see...

/js

-- 
Juergen Schoenwaelder           Jacobs University Bremen gGmbH
Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
Fax:   +49 421 200 3103         <https://www.jacobs-university.de/>


From nobody Wed May  1 09:21:41 2019
Return-Path: <rwilton@cisco.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8EC881200D5 for <netmod@ietfa.amsl.com>; Wed,  1 May 2019 09:21:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.502
X-Spam-Level: 
X-Spam-Status: No, score=-14.502 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0v_oLPhGbO7j for <netmod@ietfa.amsl.com>; Wed,  1 May 2019 09:21:39 -0700 (PDT)
Received: from alln-iport-7.cisco.com (alln-iport-7.cisco.com [173.37.142.94]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D0CE612011A for <netmod@ietf.org>; Wed,  1 May 2019 09:21:38 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=2217; q=dns/txt; s=iport; t=1556727698; x=1557937298; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=6ojzKe04Wmm6wlOiOcFcCMMzMXz28DBUo/sgKR4m6i0=; b=aFsGw+iH7/JpiepVUrIhYrwlVCypbJaUanj5GyzXTUI8YhdoLCzrOl+Y 2wmNs09DiYznEe6aeC9NVYK0fJ56XkFtSGiVsj7IvK+QcCVbQwSXYVg8h KylcsumQN1zz/N0XCccY0mn00d5CJWabQPvPciipohewvRRzXQVc9Ziwg A=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AHAADExslc/5BdJa1mGQEBAQEBAQE?= =?us-ascii?q?BAQEBAQcBAQEBAQGBUwIBAQEBAQsBghCBbSgKmTWYUIF7DgEBhG0ChjIjNgc?= =?us-ascii?q?OAQMBAQQBAQIBAm0ohUoBAQEBAzo/DAQCAQgOAgEEAQEBHhAyHQgCBAENBQg?= =?us-ascii?q?ThRKvOYo1gTIBi0sXgUA/hCM+hC6FeASnEwkCggmSNyOVNYwRlFwCERWBMCU?= =?us-ascii?q?BMYFWcBWDJ5BRQTGSU4EhAQE?=
X-IronPort-AV: E=Sophos;i="5.60,418,1549929600"; d="scan'208";a="265386165"
Received: from rcdn-core-8.cisco.com ([173.37.93.144]) by alln-iport-7.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 01 May 2019 16:21:38 +0000
Received: from XCH-ALN-006.cisco.com (xch-aln-006.cisco.com [173.36.7.16]) by rcdn-core-8.cisco.com (8.15.2/8.15.2) with ESMTPS id x41GLcei029233 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 1 May 2019 16:21:38 GMT
Received: from xch-rcd-007.cisco.com (173.37.102.17) by XCH-ALN-006.cisco.com (173.36.7.16) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Wed, 1 May 2019 11:21:37 -0500
Received: from xch-rcd-007.cisco.com ([173.37.102.17]) by XCH-RCD-007.cisco.com ([173.37.102.17]) with mapi id 15.00.1473.003; Wed, 1 May 2019 11:21:37 -0500
From: "Rob Wilton (rwilton)" <rwilton@cisco.com>
To: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>, "Mikael Abrahamsson" <swmike@swm.pp.se>
CC: "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] 6021 ipv4-prefix
Thread-Index: AdT0l4zGpLjvUofYRmmSWqlDWwoAHABSPgGAAAHDNYAAA12WgAABgE0AAAD0FQAAAKy0gAF1SI2AAAERvAAAFIrFgAAG4xuAAADAhYAACALZAAAA/vaAAAK/LwAAATq3AAB768IgAAtOeIAACmVD4P//tfSAgABTU/D//+IngIAAUdRQ//+41wCAAFEEMP//wy6AABznDYAAAdzWgAAFM7gAAADJUIAAMdJaAAAE8bQAAAQJZoAABZuUgAAKXFbA
Date: Wed, 1 May 2019 16:21:37 +0000
Message-ID: <c57787c046cd4e94a8d27413dbe79a12@XCH-RCD-007.cisco.com>
References: <0c4265d31adbf208a680f76216cc4bc42c766eae.camel@nic.cz> <959ed1a8092f4798ac0b923384962049@XCH-RCD-007.cisco.com> <20190429153643.oxfcq7ze6ttdihb4@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1904300713100.3490@uplift.swm.pp.se> <20190430061737.vvxghxyacd57k73i@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1904301038570.3490@uplift.swm.pp.se> <20190430090905.qsa3r4dwauilsxur@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1905011051160.1824@uplift.swm.pp.se> <20190501111712.347bpz26br6ox3jp@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1905011456580.1824@uplift.swm.pp.se> <20190501155321.v4qz6twsom45y62f@anna.jacobs.jacobs-university.de>
In-Reply-To: <20190501155321.v4qz6twsom45y62f@anna.jacobs.jacobs-university.de>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.63.23.60]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Outbound-SMTP-Client: 173.36.7.16, xch-aln-006.cisco.com
X-Outbound-Node: rcdn-core-8.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/OeXqzmjkGDdi4igaell2qMtWzeo>
Subject: Re: [netmod] 6021 ipv4-prefix
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 01 May 2019 16:21:41 -0000

> -----Original Message-----
> From: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
> Sent: 01 May 2019 16:53
> To: Mikael Abrahamsson <swmike@swm.pp.se>
> Cc: Rob Wilton (rwilton) <rwilton@cisco.com>; netmod@ietf.org
> Subject: Re: [netmod] 6021 ipv4-prefix
>=20
> On Wed, May 01, 2019 at 03:12:47PM +0200, Mikael Abrahamsson wrote:
> >
> > I am fine with c), but I am also saying I disagree with your view that
> > this this behaviour has been specified "since the beginning". This
> > might have been obvious to you from the beginning, but it's not
> > wrotten down properly (at least I haven't seen text that makes me
> > clearly understand the expected behaviour). I think the text
> > specifying what "canonical format is" referring to "same *value*" is
> > wrong. +17 and 17 is the same integer, 192.168.0.1/24 and
> > 192.168.0.0/24 are not the same *value*. It's misleading to refer to
> > the canonical form having the *same* *value* when we're throwing away
> information.
> >
>=20
> The basic disconnect here may be that for me the prefix is the value whil=
e for
> you the value is the prefix plus the unused bits.

[To frame this comment, I don't object to your currently proposed solution]

I consider the extra bits after the valid part of the prefix to be unwanted=
 noise.

For me, one hypothetical question I have is whether the potential convenien=
ce of allowing 192.168.0.1/24 (for some use cases) outweighs the risk that =
the wrong value has been provided but cannot be checked (e.g. 192.168.0.1/2=
).

Similarly, if you consider strings with a max length, I would expect a serv=
er to reject a configured string that was too long rather that treat the ex=
cessive characters as noise and silently truncate the input.

If it was down to me, and I was defining this now, then I would choose the =
stricter input (as per the should currently in the ipv6-prefix definition).=
  But no longer care if the consensus is in the other direction.

Whichever way we change the definitions, I believe that they are being chan=
ged in a non-backwards-compatible way that will impact some clients or serv=
er implementations.

Thanks,
Rob


From nobody Wed May  1 12:46:50 2019
Return-Path: <swmike@swm.pp.se>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C67C61201B8 for <netmod@ietfa.amsl.com>; Wed,  1 May 2019 12:46:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.301
X-Spam-Level: 
X-Spam-Status: No, score=-4.301 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=swm.pp.se
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5fEWt5LnKfkK for <netmod@ietfa.amsl.com>; Wed,  1 May 2019 12:46:46 -0700 (PDT)
Received: from uplift.swm.pp.se (ipv6.swm.pp.se [IPv6:2a00:801::f]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3575B12020A for <netmod@ietf.org>; Wed,  1 May 2019 12:46:46 -0700 (PDT)
Received: by uplift.swm.pp.se (Postfix, from userid 501) id 1125DAF; Wed,  1 May 2019 21:46:44 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=swm.pp.se; s=mail; t=1556740004; bh=QmqOVSzPwEjeRK/oAc/lBoa4Cs4UmxW2+aDeWm/kk5s=; h=Date:From:To:cc:Subject:In-Reply-To:References:From; b=bNiQaOsaG3U4+1pL9sCISdyn9tpKhwVtykjr/2/nglbZqLbnburWEXfRYXl8dvdyK p9USR7xYbiPndj1NCiW4KDO2QK07dLrqu7UYzXn2ErdSvjEgLZpTjAgj4PM1SkUGc+ KTU++jezMUVIv9XeeIaeFHvy7BwHuqPgpO1Ogl/Y=
Received: from localhost (localhost [127.0.0.1]) by uplift.swm.pp.se (Postfix) with ESMTP id 0D68D9F; Wed,  1 May 2019 21:46:44 +0200 (CEST)
Date: Wed, 1 May 2019 21:46:44 +0200 (CEST)
From: Mikael Abrahamsson <swmike@swm.pp.se>
To: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
cc: "Rob Wilton (rwilton)" <rwilton@cisco.com>,  "netmod@ietf.org" <netmod@ietf.org>
In-Reply-To: <20190501155321.v4qz6twsom45y62f@anna.jacobs.jacobs-university.de>
Message-ID: <alpine.DEB.2.20.1905012137310.1824@uplift.swm.pp.se>
References: <0c4265d31adbf208a680f76216cc4bc42c766eae.camel@nic.cz> <959ed1a8092f4798ac0b923384962049@XCH-RCD-007.cisco.com> <20190429153643.oxfcq7ze6ttdihb4@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1904300713100.3490@uplift.swm.pp.se> <20190430061737.vvxghxyacd57k73i@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1904301038570.3490@uplift.swm.pp.se> <20190430090905.qsa3r4dwauilsxur@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1905011051160.1824@uplift.swm.pp.se> <20190501111712.347bpz26br6ox3jp@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1905011456580.1824@uplift.swm.pp.se> <20190501155321.v4qz6twsom45y62f@anna.jacobs.jacobs-university.de>
User-Agent: Alpine 2.20 (DEB 67 2015-01-07)
Organization: People's Front Against WWW
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII; format=flowed
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/WdUXc9PRxHo2ZCUuwHAs8xd61_o>
Subject: Re: [netmod] 6021 ipv4-prefix
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 01 May 2019 19:46:49 -0000

On Wed, 1 May 2019, Juergen Schoenwaelder wrote:

> The basic disconnect here may be that for me the prefix is the value
> while for you the value is the prefix plus the unused bits.

My disconnect is what the server should do when it encounters a value 
where the bits are non-zero.

Where is the text that tells the server implementor whether to throw an 
error when client commits non-zero bits, or to just throw the bits away 
and store the value in the canonical format?

> (Even for the case of simple signed integers, it depends on my internal
> number representation whether normalizing +7 to 7 causes a change of
> the internal representation or not.)

I think this example is not relevant to this discussion. +7 and 7 doesn't 
change any integer backend representation. It's the same value.

Again, I have no problem with the server throwing away the bits at commit 
time, I just want it to be clear from the specs that this is the correct 
behaviour and what the server should do when the above text is not true:

"The IPv6 address should have all bits that do not belong
       to the prefix set to zero."

Throw an error or "fix it"? It seems it should "fix it", so we should have 
text that reflects this. I have no idea where this text should go, though.

-- 
Mikael Abrahamsson    email: swmike@swm.pp.se


From nobody Wed May  1 19:41:37 2019
Return-Path: <randy_presuhn@alumni.stanford.edu>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C38BD1202CE for <netmod@ietfa.amsl.com>; Wed,  1 May 2019 19:41:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level: 
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id J9YmilXbrCzo for <netmod@ietfa.amsl.com>; Wed,  1 May 2019 19:41:34 -0700 (PDT)
Received: from mail-pl1-f182.google.com (mail-pl1-f182.google.com [209.85.214.182]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 05B7B1202D1 for <netmod@ietf.org>; Wed,  1 May 2019 19:41:33 -0700 (PDT)
Received: by mail-pl1-f182.google.com with SMTP id l2so305740plt.11 for <netmod@ietf.org>; Wed, 01 May 2019 19:41:33 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-transfer-encoding; bh=SEkfgxeawLl5zRDG0/6PqgJbeY67cYwNiZElKjZCu7U=; b=XbC0mRXQzsul0/5ajwy7lzfRjGaHpnLQjLfk+JFYc/bvachrzloxy7BHIbW/eMKynO VEA8+zday2ZcgS4KBB9q0igT9bdRlD94b595rJaQk2+U7KEWdFNgKbfpa07eTsjkbTk+ LPDRitUPKAZhvXib2QQ7jxmiphjm8ErRjhY+xuYrYFqio0QS+1pbLPXmDRMCIPWdSrmT jTH0+OGGjwZTX+14DxGXU94sQpa9cj1zLinIsf09TVLbQgMCe1u+0wmGuqau9By8+Bq0 EfRZJnjL6UfnxXxKaAswakmwafb0rOiAEf0hNcRrJb+PKByc0FnoGJ/yHeFP+qmZ39y7 3HmA==
X-Gm-Message-State: APjAAAVJiF96eMA6/Yy+km/yq54g9KarrlnGj5PEZHpl9wmQg6escdkw R/0yfqbXfGvDRDJyJeuT6SRRsUSrM3g=
X-Google-Smtp-Source: APXvYqyfJOc8fvy9QMi7lZmzP7OiiEVW7eRcgQuNwurFp/RmzrvI66Y1bLS4VfqkjVdJaQA5bQ+EHQ==
X-Received: by 2002:a17:902:b589:: with SMTP id a9mr1065578pls.66.1556764892670;  Wed, 01 May 2019 19:41:32 -0700 (PDT)
Received: from [192.168.1.101] (c-69-181-241-121.hsd1.ca.comcast.net. [69.181.241.121]) by smtp.gmail.com with ESMTPSA id j10sm12604087pfa.37.2019.05.01.19.41.31 for <netmod@ietf.org> (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 01 May 2019 19:41:32 -0700 (PDT)
To: netmod@ietf.org
References: <0c4265d31adbf208a680f76216cc4bc42c766eae.camel@nic.cz> <959ed1a8092f4798ac0b923384962049@XCH-RCD-007.cisco.com> <20190429153643.oxfcq7ze6ttdihb4@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1904300713100.3490@uplift.swm.pp.se> <20190430061737.vvxghxyacd57k73i@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1904301038570.3490@uplift.swm.pp.se> <20190430090905.qsa3r4dwauilsxur@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1905011051160.1824@uplift.swm.pp.se> <20190501111712.347bpz26br6ox3jp@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1905011456580.1824@uplift.swm.pp.se> <20190501155321.v4qz6twsom45y62f@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1905012137310.1824@uplift.swm.pp.se>
From: Randy Presuhn <randy_presuhn@alumni.stanford.edu>
Message-ID: <5CCA58DA.3030801@alumni.stanford.edu>
Date: Wed, 1 May 2019 19:41:30 -0700
User-Agent: Mozilla/5.0 (Windows NT 6.0; rv:38.0) Gecko/20100101 Thunderbird/38.5.0
MIME-Version: 1.0
In-Reply-To: <alpine.DEB.2.20.1905012137310.1824@uplift.swm.pp.se>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/Ii7WuUoCq8fQTrj6wBI1fLr4aQ0>
Subject: Re: [netmod] 6021 ipv4-prefix
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 02 May 2019 02:41:36 -0000

Hi -

On 5/1/2019 12:46 PM, Mikael Abrahamsson wrote:
...
> Where is the text that tells the server implementor whether to throw an
> error when client commits non-zero bits, or to just throw the bits away
> and store the value in the canonical format?

Such text would be an inappropriate constraint the server's
internal representation.  We should only specify
the externally-visible behaviour: that the reported value
will be in the canonical format.  Whether an implementation
preserves extraneous cruft in its internal representation is
purely an implementation decision, and not subject to standardization.

>> (Even for the case of simple signed integers, it depends on my internal
>> number representation whether normalizing +7 to 7 causes a change of
>> the internal representation or not.)
>
> I think this example is not relevant to this discussion. +7 and 7
> doesn't change any integer backend representation. It's the same value.

You don't know whether it does or does not affect the internal
representation used by the backend.  If the backend is a textual
configuration file virtualized through netconf, the "+" might
very well be preserved in the file, even though it would disappear
in response to a query.  We only know that for purposes
of the protocol's operation, the server needs to behave as though
it is in the canonical form.

> Again, I have no problem with the server throwing away the bits at
> commit time, I just want it to be clear from the specs that this is the
> correct behaviour and what the server should do when the above text is
> not true:
>
> "The IPv6 address should have all bits that do not belong
>        to the prefix set to zero."
>
> Throw an error or "fix it"?

Since the language is "should" an error seems inappropriate.

> It seems it should "fix it", so we should
> have text that reflects this.

False dichotomy.  An implementation might actually preserve
those bits, though of course they'd never be seen again (at
least not on a netconf interface) since the netconf server
will always behave as though the value were in its canonical
form, regardless of the internal representation.

> I have no idea where this text should go,
> though.

I agree with the earlier sentiment that anything addressing
this really belongs in whatever further clarification of
canonicalization goes into the update.

Randy


From nobody Thu May  2 02:06:56 2019
Return-Path: <ietfc@btconnect.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C9A6C120159 for <netmod@ietfa.amsl.com>; Thu,  2 May 2019 02:06:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.249
X-Spam-Level: 
X-Spam-Status: No, score=0.249 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, LOTS_OF_MONEY=0.001, RATWARE_MS_HASH=2.148, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=btconnect.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xCBE3PBLGUvb for <netmod@ietfa.amsl.com>; Thu,  2 May 2019 02:06:52 -0700 (PDT)
Received: from EUR03-AM5-obe.outbound.protection.outlook.com (mail-eopbgr30102.outbound.protection.outlook.com [40.107.3.102]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 881B112001E for <netmod@ietf.org>; Thu,  2 May 2019 02:06:52 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=btconnect.onmicrosoft.com; s=selector1-btconnect-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=mF1G13dBwhYY/CsRpkIVjKMeWQHTta/omDqX95zkNb0=; b=XS+mMdBmC8sXmCaOuWY9OGXf945+DqWMEtETdRvkOocbQ5t1yuoXp5KMtixxWIe09DibFg1GDRAXR8Km0Rh6Rp15NCuC4HsDMD4WW+lMnVJEROOaieRZXDEV7FuXoVeqsqv0lVH1Zu3vfmUVpNLpg5LHV5yJt2G03DlE0AQ8hak=
Received: from VI1PR07MB3118.eurprd07.prod.outlook.com (10.175.242.156) by VI1PR07MB6079.eurprd07.prod.outlook.com (20.178.124.90) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1856.7; Thu, 2 May 2019 09:06:49 +0000
Received: from VI1PR07MB3118.eurprd07.prod.outlook.com ([fe80::41a4:68a9:d620:d42b]) by VI1PR07MB3118.eurprd07.prod.outlook.com ([fe80::41a4:68a9:d620:d42b%3]) with mapi id 15.20.1878.004; Thu, 2 May 2019 09:06:49 +0000
From: tom petch <ietfc@btconnect.com>
To: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>, Mikael Abrahamsson <swmike@swm.pp.se>
CC: "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] 6021 ipv4-prefix
Thread-Index: AQHVAMZf50mA7zDduEuOBh3Lqw5YqA==
Date: Thu, 2 May 2019 09:06:49 +0000
Message-ID: <031e01d500c5$e41a8c00$4001a8c0@gateway.2wire.net>
References: <20190429134615.f32zkbia6fqwk3to@anna.jacobs.jacobs-university.de> <b404565930694fd8af93326b5e754a2b@XCH-RCD-007.cisco.com> <0c4265d31adbf208a680f76216cc4bc42c766eae.camel@nic.cz> <959ed1a8092f4798ac0b923384962049@XCH-RCD-007.cisco.com> <20190429153643.oxfcq7ze6ttdihb4@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1904300713100.3490@uplift.swm.pp.se> <20190430061737.vvxghxyacd57k73i@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1904301038570.3490@uplift.swm.pp.se> <20190430090905.qsa3r4dwauilsxur@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1905011051160.1824@uplift.swm.pp.se> <20190501111712.347bpz26br6ox3jp@anna.jacobs.jacobs-university.de>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-clientproxiedby: LO2P265CA0011.GBRP265.PROD.OUTLOOK.COM (2603:10a6:600:62::23) To VI1PR07MB3118.eurprd07.prod.outlook.com (2603:10a6:802:20::28)
authentication-results: spf=none (sender IP is ) smtp.mailfrom=ietfc@btconnect.com; 
x-ms-exchange-messagesentrepresentingtype: 1
x-mailer: Microsoft Outlook Express 6.00.2800.1106
x-originating-ip: [86.139.215.234]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 16aa6986-79c6-429e-9611-08d6cedd820f
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600141)(711020)(4605104)(2017052603328)(7193020); SRVR:VI1PR07MB6079; 
x-ms-traffictypediagnostic: VI1PR07MB6079:
x-ms-exchange-purlcount: 3
x-microsoft-antispam-prvs: <VI1PR07MB607999B9AFB8B1CFE2123893A0340@VI1PR07MB6079.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:6790;
x-forefront-prvs: 0025434D2D
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(366004)(346002)(376002)(39860400002)(136003)(396003)(51444003)(13464003)(189003)(199004)(386003)(84392002)(3846002)(86362001)(61296003)(68736007)(6506007)(25786009)(4326008)(5660300002)(2906002)(44716002)(62236002)(66066001)(6436002)(6116002)(6486002)(966005)(6512007)(86152003)(9686003)(6306002)(44736005)(50226002)(476003)(26005)(71190400001)(52116002)(486006)(81816011)(81686011)(8936002)(316002)(6246003)(76176011)(110136005)(446003)(478600001)(71200400001)(305945005)(64756008)(66446008)(81166006)(14454004)(8676002)(81156014)(73956011)(1556002)(66556008)(66476007)(66946007)(256004)(53936002)(102836004)(99286004)(7736002)(4720700003)(186003)(14496001)(229853002)(74416001)(7726001); DIR:OUT; SFP:1102; SCL:1; SRVR:VI1PR07MB6079; H:VI1PR07MB3118.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:0; 
received-spf: None (protection.outlook.com: btconnect.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: mTsI3p5rCYIZ0cmz4Git+4cMr8IMYxnI2yp5e3hByRnmpp0dTEeVt7JoFc9cY3JxDLVv7jE/xqW4/slU9jF/otidRCghuWeTeWYENnpiE0kqw2ZfgY6AL/v+i5zVD39GeiAZwc99UhNJHsYNkeaIn6LlyChNni5Yi+n8tiY/6OoFCIKdo+TdLpFdXR8Eo9dokltUFHKwXr7+q12THfZU3OqfFIGzgjBd3ok2FMF8ocrwLoZhMYO/8vl49W9AmYZEAfeN7hjxb8wdkDk7AWbZMVnWpPTMRe9KcjIydOM3mdfWtIgia7VZbMBxK/UDRdJNKC2TBDeMYZQnzWjRbYoKGvCRB3zJ1Bw4crMOh82DV1xkJCbVbeCAhQ7tKZyw3KxrytRG/cE9/tUW3zyIFMvl6lFdxxIpW2ZtF3awGK7azeM=
Content-Type: text/plain; charset="iso-8859-1"
Content-ID: <699CA5BD506D5744819643FE669B421D@eurprd07.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: btconnect.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 16aa6986-79c6-429e-9611-08d6cedd820f
X-MS-Exchange-CrossTenant-originalarrivaltime: 02 May 2019 09:06:49.4761 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: cf8853ed-96e5-465b-9185-806bfe185e30
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR07MB6079
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/jAhr_t9iCGRBD9Xc7Ys4n0YgtVQ>
Subject: Re: [netmod] 6021 ipv4-prefix
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 02 May 2019 09:06:56 -0000

----- Original Message -----
From: "Juergen Schoenwaelder" <j.schoenwaelder@jacobs-university.de>
Sent: Wednesday, May 01, 2019 12:17 PM

> On Wed, May 01, 2019 at 10:55:38AM +0200, Mikael Abrahamsson wrote:
> >
> > So while you seem to think I am not reading your text, it seems to
me you're
> > not reading what I am saying either. You're not responding to the
points I
> > am trying to make anyway.
> >
> > https://tools.ietf.org/html/rfc7950#section-9.1
> >
> > This talks about *values*. If you drop bits in IPv6-prefix, then
it's not
> > the same *value* anymore.
>
> I personally do take the standpoint that irrelevant bits do not matter
> for the value of a prefix, i.e., 192.168.0.1/24 and 192.168.0.0/24 are
> two different representations for the same prefix. You seem to take
> the standpoint that 192.168.0.1/24 and 192.168.0.0/24 are different
> prefixes since bits that are irrelevant do differ.
>
> Apparently there are different views that people have concerning
> prefixes. I think I have seen the following three alternatives:
>
> a) non-prefix bits that are set to one are illegal in a prefix
> b) non-prefix bits are irrelevant but they need to be preserved
> c) non-prefix bits are irrelevant, ignore them and the canonical
>    representation has non-prefix bits set to zero
>
> The RFC 6991 definitions do c). If there is consensus that c) is
> wrong, we need to deprecate the definitions and create new ones after
> finding consensus on either b) or a).

And I think that c) is the correct answer (and would be for those not
involved in netmod but who have experience of the IETF - did I hear 'be
liberal in what you accept'?)

I have worked with systems that made every effort to find a reason not
to accept something that had been input, and I have worked with systems
that bend over backwards to accept something a bit flaky; different
developers have different cultures but I have always found the culture
of the IETF to be very clear on this point.  Mac, Linux and Windows have
different cultures.

There is a caveat and it is that the context must be clear.  Randy cited
' ... 1234567.89 and if it
subsequently chooses to display it as "1.234.567,89 USD" '
Well, where he is, may be, but not here where it could be

1.234.567,89 Euro
1,234,567.89 Euro
123456789 Yen
or ...
depending on the locale.

Going back to
192.168.0.1/24
then the meaning is clear as long as it is unambiguous that it is a
prefix and not more; as has been commented on (a lot of messages ago),
this could be a compound object, specifying
address+ mask
address + prefix + prefix length
etc
so it matters that the context is clear, both for the object instance
and for the organisation doing the specification.

Tom Petch

> System/kernel interfaces seem to show different behaviours. My Linux
> box seems to do a), my MacOS box seems to do c). The system/kernel
> interfaces likely all do the same if all non-prefix bits are zero,
> i.e., when the system receives data in the canonical format.
>
> Option b) seems to be the most expensive to implement (your server may
> have to clear non-prefix bits before pushing the prefix into the
> kernel and it needs to map data received from the kernel back to a
> prefix that has unused bits preserved in the datastore). Hence, for me
> the choice is between a) and c) and given that we have c) already
> defined for years, my first preference is to just keep things as they
> are.
>
> /js
>
> --
> Juergen Schoenwaelder           Jacobs University Bremen gGmbH
> Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
> Fax:   +49 421 200 3103         <https://www.jacobs-university.de/>
>
> _______________________________________________
> netmod mailing list
> netmod@ietf.org
> https://www.ietf.org/mailman/listinfo/netmod


From nobody Thu May  2 04:35:52 2019
Return-Path: <swmike@swm.pp.se>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 145FC120112 for <netmod@ietfa.amsl.com>; Thu,  2 May 2019 04:35:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.3
X-Spam-Level: 
X-Spam-Status: No, score=-4.3 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=swm.pp.se
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id m95eHtWasJig for <netmod@ietfa.amsl.com>; Thu,  2 May 2019 04:35:47 -0700 (PDT)
Received: from uplift.swm.pp.se (swm.pp.se [212.247.200.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 641571200B9 for <netmod@ietf.org>; Thu,  2 May 2019 04:35:47 -0700 (PDT)
Received: by uplift.swm.pp.se (Postfix, from userid 501) id AABBEB0; Thu,  2 May 2019 13:35:43 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=swm.pp.se; s=mail; t=1556796943; bh=/gxpuwQZkrpDLkK35ByIQiolxS3HJpUd+lRWu5k0a30=; h=Date:From:To:cc:Subject:In-Reply-To:References:From; b=Zk/VZQCBBFaHqlJNR9+o4osumu2xzcfyrEY1rMp63qfOQXtdi4rUrJmtvdOtjyswq GK+OTPBqxfRkRNR2vb0rjUUCdpfjsGnY5W9ugGdU1q1N3l8u5/dOadVIThg8VKj+YH eLO+7CMeqVAiueTWqvo8sjZwyYn3KAlrr/F83Zf8=
Received: from localhost (localhost [127.0.0.1]) by uplift.swm.pp.se (Postfix) with ESMTP id A8E3FAF; Thu,  2 May 2019 13:35:43 +0200 (CEST)
Date: Thu, 2 May 2019 13:35:43 +0200 (CEST)
From: Mikael Abrahamsson <swmike@swm.pp.se>
To: Randy Presuhn <randy_presuhn@alumni.stanford.edu>
cc: netmod@ietf.org
In-Reply-To: <5CCA58DA.3030801@alumni.stanford.edu>
Message-ID: <alpine.DEB.2.20.1905021330140.1824@uplift.swm.pp.se>
References: <0c4265d31adbf208a680f76216cc4bc42c766eae.camel@nic.cz> <959ed1a8092f4798ac0b923384962049@XCH-RCD-007.cisco.com> <20190429153643.oxfcq7ze6ttdihb4@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1904300713100.3490@uplift.swm.pp.se> <20190430061737.vvxghxyacd57k73i@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1904301038570.3490@uplift.swm.pp.se> <20190430090905.qsa3r4dwauilsxur@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1905011051160.1824@uplift.swm.pp.se> <20190501111712.347bpz26br6ox3jp@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1905011456580.1824@uplift.swm.pp.se> <20190501155321.v4qz6twsom45y62f@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1905012137310.1824@uplift.swm.pp.se> <5CCA58DA.3030801@alumni.stanford.edu>
User-Agent: Alpine 2.20 (DEB 67 2015-01-07)
Organization: People's Front Against WWW
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII; format=flowed
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/5YM7BjTNOZ6P0QWCSFqToqU7q90>
Subject: Re: [netmod] 6021 ipv4-prefix
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 02 May 2019 11:35:50 -0000

On Wed, 1 May 2019, Randy Presuhn wrote:

> Hi -
>
> On 5/1/2019 12:46 PM, Mikael Abrahamsson wrote:
> ....
>> Where is the text that tells the server implementor whether to throw an
>> error when client commits non-zero bits, or to just throw the bits away
>> and store the value in the canonical format?
>
> Such text would be an inappropriate constraint the server's
> internal representation.  We should only specify
> the externally-visible behaviour: that the reported value
> will be in the canonical format.  Whether an implementation
> preserves extraneous cruft in its internal representation is
> purely an implementation decision, and not subject to standardization.

I am talking about what goes on the wire. If the client does an 
edit-config with ipv6-prefix 2001:db8::1/64, should the server convert 
this into 2001:db8::/64 or throw an error on the edit-config operation.

Jurgen seems to say it should convert it and not throw an error, and I'd 
like text to say that indeed, this is proper behaviour. Nobody has so far 
been able to tell me where this text currently is, so that's why I'm 
asking for it to be added. Either this should go into an update to 
https://tools.ietf.org/html/rfc7950#section-9.1 or it should go into each 
and every definition of types (or both of them).

>> It seems it should "fix it", so we should
>> have text that reflects this.
>
> False dichotomy.  An implementation might actually preserve
> those bits, though of course they'd never be seen again (at
> least not on a netconf interface) since the netconf server
> will always behave as though the value were in its canonical
> form, regardless of the internal representation.

Again, I am talking about what goes on the wire, what is seen when issuing 
"get" or "edit-config" etc.

-- 
Mikael Abrahamsson    email: swmike@swm.pp.se


From nobody Thu May  2 05:39:07 2019
Return-Path: <lhotka@nic.cz>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 982211203A0 for <netmod@ietfa.amsl.com>; Thu,  2 May 2019 05:38:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level: 
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 20x_MvS35r9m for <netmod@ietfa.amsl.com>; Thu,  2 May 2019 05:38:54 -0700 (PDT)
Received: from trail.lhotka.name (trail.lhotka.name [77.48.224.143]) by ietfa.amsl.com (Postfix) with ESMTP id B150212038A for <netmod@ietf.org>; Thu,  2 May 2019 05:38:46 -0700 (PDT)
Received: by trail.lhotka.name (Postfix, from userid 109) id BB8021820449; Thu,  2 May 2019 14:38:23 +0200 (CEST)
Received: from localhost (nat-1.nic.cz [217.31.205.1]) by trail.lhotka.name (Postfix) with ESMTPSA id 1E338182004F; Thu,  2 May 2019 14:38:20 +0200 (CEST)
From: Ladislav Lhotka <lhotka@nic.cz>
To: Mikael Abrahamsson <swmike@swm.pp.se>, Randy Presuhn <randy_presuhn@alumni.stanford.edu>
Cc: netmod@ietf.org
In-Reply-To: <alpine.DEB.2.20.1905021330140.1824@uplift.swm.pp.se>
References: <0c4265d31adbf208a680f76216cc4bc42c766eae.camel@nic.cz> <959ed1a8092f4798ac0b923384962049@XCH-RCD-007.cisco.com> <20190429153643.oxfcq7ze6ttdihb4@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1904300713100.3490@uplift.swm.pp.se> <20190430061737.vvxghxyacd57k73i@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1904301038570.3490@uplift.swm.pp.se> <20190430090905.qsa3r4dwauilsxur@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1905011051160.1824@uplift.swm.pp.se> <20190501111712.347bpz26br6ox3jp@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1905011456580.1824@uplift.swm.pp.se> <20190501155321.v4qz6twsom45y62f@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1905012137310.1824@uplift.swm.pp.se> <5CCA58DA.3030801@alumni.stanford.edu> <alpine.DEB.2.20.1905021330140.1824@uplift.swm.pp.se>
Mail-Followup-To: Mikael Abrahamsson <swmike@swm.pp.se>, Randy Presuhn <randy_presuhn@alumni.stanford.edu>, netmod@ietf.org
Date: Thu, 02 May 2019 14:38:41 +0200
Message-ID: <87v9yt58vi.fsf@nic.cz>
MIME-Version: 1.0
Content-Type: text/plain
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/S0h7CkwLJSGjbp7QtQog1l9Rga8>
Subject: Re: [netmod] 6021 ipv4-prefix
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 02 May 2019 12:39:05 -0000

Mikael Abrahamsson <swmike@swm.pp.se> writes:

> On Wed, 1 May 2019, Randy Presuhn wrote:
>
>> Hi -
>>
>> On 5/1/2019 12:46 PM, Mikael Abrahamsson wrote:
>> ....
>>> Where is the text that tells the server implementor whether to throw an
>>> error when client commits non-zero bits, or to just throw the bits away
>>> and store the value in the canonical format?
>>
>> Such text would be an inappropriate constraint the server's
>> internal representation.  We should only specify
>> the externally-visible behaviour: that the reported value
>> will be in the canonical format.  Whether an implementation
>> preserves extraneous cruft in its internal representation is
>> purely an implementation decision, and not subject to standardization.
>
> I am talking about what goes on the wire. If the client does an 
> edit-config with ipv6-prefix 2001:db8::1/64, should the server convert 
> this into 2001:db8::/64 or throw an error on the edit-config operation.
>
> Jurgen seems to say it should convert it and not throw an error, and I'd 
> like text to say that indeed, this is proper behaviour. Nobody has so far 
> been able to tell me where this text currently is, so that's why I'm

If we agree that a type defines the set of legal on-the-wire values
(possibly modulo representation - JSON/XML/...), then section 4.2.2.1 in
RFC 7950 says:

[A leaf instance] has exactly one value of a particular type ...

So why should a server throw an error if this is satisfied?

Lada

> asking for it to be added. Either this should go into an update to 
> https://tools.ietf.org/html/rfc7950#section-9.1 or it should go into each 
> and every definition of types (or both of them).
>
>>> It seems it should "fix it", so we should
>>> have text that reflects this.
>>
>> False dichotomy.  An implementation might actually preserve
>> those bits, though of course they'd never be seen again (at
>> least not on a netconf interface) since the netconf server
>> will always behave as though the value were in its canonical
>> form, regardless of the internal representation.
>
> Again, I am talking about what goes on the wire, what is seen when issuing 
> "get" or "edit-config" etc.
>
> -- 
> Mikael Abrahamsson    email: swmike@swm.pp.se
>
> _______________________________________________
> netmod mailing list
> netmod@ietf.org
> https://www.ietf.org/mailman/listinfo/netmod

-- 
Ladislav Lhotka
Head, CZ.NIC Labs
PGP Key ID: 0xB8F92B08A9F76C67


From nobody Thu May  2 06:13:09 2019
Return-Path: <lhotka@nic.cz>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7D1721200C5 for <netmod@ietfa.amsl.com>; Thu,  2 May 2019 06:13:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level: 
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OVX4yyangAjT for <netmod@ietfa.amsl.com>; Thu,  2 May 2019 06:13:05 -0700 (PDT)
Received: from trail.lhotka.name (trail.lhotka.name [77.48.224.143]) by ietfa.amsl.com (Postfix) with ESMTP id AB9AE12036D for <netmod@ietf.org>; Thu,  2 May 2019 06:13:03 -0700 (PDT)
Received: by trail.lhotka.name (Postfix, from userid 109) id 929F4182044E; Thu,  2 May 2019 15:12:40 +0200 (CEST)
Received: from localhost (nat-1.nic.cz [217.31.205.1]) by trail.lhotka.name (Postfix) with ESMTPSA id 1FD72182004F; Thu,  2 May 2019 15:12:37 +0200 (CEST)
From: Ladislav Lhotka <lhotka@nic.cz>
To: "Rob Wilton \(rwilton\)" <rwilton@cisco.com>, Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
Cc: NETMOD WG <netmod@ietf.org>
In-Reply-To: <5ccb99db35514088986ff3a396746c7c@XCH-RCD-007.cisco.com>
References: <5ccb99db35514088986ff3a396746c7c@XCH-RCD-007.cisco.com>
Mail-Followup-To: "Rob Wilton \(rwilton\)" <rwilton@cisco.com>, Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>, NETMOD WG <netmod@ietf.org>
Date: Thu, 02 May 2019 15:12:58 +0200
Message-ID: <87sgtx57ad.fsf@nic.cz>
MIME-Version: 1.0
Content-Type: text/plain
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/BZvywPM2OyZ0T-XJ9bjQjjyt3og>
Subject: Re: [netmod] Canonical value representations in typedefs [was RE: 6021 ipv4-prefix]
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 02 May 2019 13:13:08 -0000

"Rob Wilton (rwilton)" <rwilton@cisco.com> writes:

> Forking the thread title to avoid further polluting the original issue, and because these comments really apply to YANG.Next.
>
>> -----Original Message-----
>> From: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
>> Sent: 29 April 2019 18:26
>> To: Rob Wilton (rwilton) <rwilton@cisco.com>
>> Cc: Ladislav Lhotka <lhotka@nic.cz>; NETMOD WG <netmod@ietf.org>
>> Subject: Re: [netmod] 6021 ipv4-prefix
>> 
>> On Mon, Apr 29, 2019 at 05:08:41PM +0000, Rob Wilton (rwilton) wrote:
>> >
>> > If YANG allows a typedef to refine the canonical definition of a base
>> > type, then I think that the YANG RFC should be explicit on this (e.g.
>> > in YANG Next).  Particularly, because this requires a server
>> > implementation to read/understand the description associated with a
>> > leaf/typedef in case they have to add specific canonicalization code
>> > to implement the leaf/typedef.
>> 
>> Description statements in general are expected to be read and understood and
>> implemented where necessary. But I now see that the fact that this section 9.1 is
>> under section 9 which is titled built-in types is causing the confusion. This is,
>> indeed, unfortunate.
>
> Yes, OK.
>
> But this really means that YANG has two sorts of typedefs:
>
> (i) A regular typedef which is just an alias for a base type, perhaps with some additional refinements that can all be handled automatically (e.g. pattern statements, etc).  In this scenario, I think that a compiler can ignore the description, and process the typedef automatically.
> (ii) An enhanced typedef that has additional semantics embedded into the description statement that requires custom implementation of the typedef.
>
> Being able to distinguish these two cases in a programmatic way seems
> useful to me, but perhaps it is just unnecessary noise.

YANG assumes "powerful" descriptions in general. An option would be to find a way for specifying the canonical
format in a machine-readable form.

>
> For the second case, I do wonder whether this is much closer to adding new concrete type to the language, just in a slightly backdoor way.  There have been discussions about adding binary representations for some of these types (e.g IPv4 address, IPv6 address ,etc).  Perhaps that would be easier if they were somewhat closer to base types than derived types, and maybe this class of type definitions shouldn't be using typedef at all.
>
>> 
>> > I'm not sure that we have really got a simple solution for either clients or
>> servers:
>> >  1) Clients may use non canonical format on configuration input
>> >  2) But clients must still use canonical format for xpath expressions
>> >  3) Clients must also handle canonical format being returned on any get
>> requests.
>> >  4) Servers must perform normalization of any type to a canonical format, as
>> defined in the type/typedef/leaf description.
>> 
>> Exactly. Note that clients only send xpath for filtering (if they want to filter via
>> xpath). What is more important is that module authors can predict the format of
>> values when they write when or must expressions. And as Lada points out,
>> having predictable key values also is kind of desirable.
>
> I wasn't suggesting that we lose uniqueness of list keys, but instead
> don't allow typedefs to define their own canonical format.  I.e. that
> would always require IPv6 addresses to be provided in the canonical
> form.  However, the benefits of this are probably marginal given that

This just shifts the burden to the client side, with pretty much the same
issues. I think that the client should be allowed to send IPv6
addresses in any form permitted by RFC 4291.

Lada

> a robust server would want to check that the type is in the canonical
> form anyway, and hence the server still has to write very similar
> canonicalization code regardless.

>
>
>> 
>> The reality is that there are many different ways to write an IPv6 address and the
>> idea was to accept them on input but to subsequently work with the normalized
>> canonical representation. And this is in ietf-yang-types and ietf-inet-types since
>> day one. But yes, the text in section 9.1 seems to be misplaced.
>
> I've raised https://github.com/netmod-wg/yang-next/issues/83 to clarify the expected YANG behaviour here, and perhaps to also consider whether an extra statement would be beneficial.
>
> Thanks,
> Rob
>
>
>> 
>> /js
>> 
>> --
>> Juergen Schoenwaelder           Jacobs University Bremen gGmbH
>> Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
>> Fax:   +49 421 200 3103         <https://www.jacobs-university.de/>

-- 
Ladislav Lhotka
Head, CZ.NIC Labs
PGP Key ID: 0xB8F92B08A9F76C67


From nobody Thu May  2 08:42:56 2019
Return-Path: <nite@hq.sk>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BB3E8120417 for <netmod@ietfa.amsl.com>; Thu,  2 May 2019 08:42:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level: 
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,  DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=hq.sk
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yqc2FZ1Xda2Y for <netmod@ietfa.amsl.com>; Thu,  2 May 2019 08:42:52 -0700 (PDT)
Received: from mail.hq.sk (hq.sk [81.89.59.181]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3213012042D for <netmod@ietf.org>; Thu,  2 May 2019 08:42:37 -0700 (PDT)
Received: from nitebug.nitenet.local (46.229.239.158.host.vnet.sk [46.229.239.158]) by mail.hq.sk (Postfix) with ESMTPSA id 9466E240363; Thu,  2 May 2019 17:42:34 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=hq.sk; s=mail; t=1556811754; bh=0JFf3y4DUZe5VgYeCH6PonbBbK7cxuTg0GNpEyHkONE=; h=Subject:To:References:From:Date:In-Reply-To; b=tgbqaUeLrEm0992nztP2OpfGf1XmTUV2ZNx30d/+t9ty9G1lkRfaiW99CX0rKEXld gEr7CQPvygWY9WP+DtGYCCuVI87vs4Y4nm0tGqI+yIoXOYVu1d6jxlyEDf1ITOEyR9 vXhipnXcOcyWpWmjudA85dwho3RajhAIxwI2Q+0E=
To: "Rob Wilton (rwilton)" <rwilton@cisco.com>, Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>, NETMOD WG <netmod@ietf.org>
References: <5ccb99db35514088986ff3a396746c7c@XCH-RCD-007.cisco.com> <87sgtx57ad.fsf@nic.cz>
From: Robert Varga <nite@hq.sk>
Openpgp: preference=signencrypt
Message-ID: <a593b53e-6bb4-c3ce-2fe0-ec5421d2c2f3@hq.sk>
Date: Thu, 2 May 2019 17:42:34 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.6.1
MIME-Version: 1.0
In-Reply-To: <87sgtx57ad.fsf@nic.cz>
Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="v0TEOIcBj1huRvMXagMrLlYCGaM9V9m0N"
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/kUU9QLfYOuugp8V2JUpJtmfUgO8>
Subject: Re: [netmod] Canonical value representations in typedefs [was RE: 6021 ipv4-prefix]
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 02 May 2019 15:42:55 -0000

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--v0TEOIcBj1huRvMXagMrLlYCGaM9V9m0N
Content-Type: multipart/mixed; boundary="6lrTihzPLlV8aZcSsh4ZGAbiXq1eJtqBL";
 protected-headers="v1"
From: Robert Varga <nite@hq.sk>
To: "Rob Wilton (rwilton)" <rwilton@cisco.com>,
 Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>,
 NETMOD WG <netmod@ietf.org>
Message-ID: <a593b53e-6bb4-c3ce-2fe0-ec5421d2c2f3@hq.sk>
Subject: Re: [netmod] Canonical value representations in typedefs [was RE:
 6021 ipv4-prefix]
References: <5ccb99db35514088986ff3a396746c7c@XCH-RCD-007.cisco.com>
 <87sgtx57ad.fsf@nic.cz>
In-Reply-To: <87sgtx57ad.fsf@nic.cz>

--6lrTihzPLlV8aZcSsh4ZGAbiXq1eJtqBL
Content-Type: text/plain; charset=utf-8
Content-Language: en-US
Content-Transfer-Encoding: quoted-printable

On 02/05/2019 15:12, Ladislav Lhotka wrote:
>> But this really means that YANG has two sorts of typedefs:
>>
>> (i) A regular typedef which is just an alias for a base type, perhaps =
with some additional refinements that can all be handled automatically (e=
=2Eg. pattern statements, etc).  In this scenario, I think that a compile=
r can ignore the description, and process the typedef automatically.
>> (ii) An enhanced typedef that has additional semantics embedded into t=
he description statement that requires custom implementation of the typed=
ef.
>>
>> Being able to distinguish these two cases in a programmatic way seems
>> useful to me, but perhaps it is just unnecessary noise.
> YANG assumes "powerful" descriptions in general. An option would be to =
find a way for specifying the canonical
> format in a machine-readable form.

The way I understand typedefs (and use of restricted types in
leaf/leaf-list) as that the first such use defines a value domain and
any further references must strictly refer to a subset of that domain.

Notably it does not seem to be sane to redefine the canonical format
once it has been set.

I think the entire canonical format problem comes from the fact
ipv4-address is, unlike case (i), only a representation of a value
domain which is semantically 32 bits.

That value domain has two functions that are different from plain old
string:
- equality
- total ordering

Canonical representation deals with the first one, while also providing
interoperability with XPath. There is no current mechanism to address
the second one.

I find having a machine-readable marker (such as an extension) that a
value domain is being defined immediately useful -- it allows the
compiler to warn that a specific typedef needs additional work to get it
working as intended. This one's really easy.

Having some (other) machine-readable marker of how a canonical value
looks like (i.e. similar to pattern) is also useful: it allows the
runtime to check if an incoming value is in canonical format and accept
it irrespective whether specific value domain support (from above) is
present or not. This one is moderately hard.

Finally, some third marker, which would describe how to transform a
non-canonical string into a canonical string would obviously be awesome,
as now the runtime can work automatically. This one is really hard,
especially since the operations probably involve operating not on a
string, but some other representation.

As in implementer, I really care about the first two -- they are easy to
do and provide immense value in making things work 'out of the box' and
automatically catching cases when they do not.

Regards,
Robert


--6lrTihzPLlV8aZcSsh4ZGAbiXq1eJtqBL--

--v0TEOIcBj1huRvMXagMrLlYCGaM9V9m0N
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
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=w1mP
-----END PGP SIGNATURE-----

--v0TEOIcBj1huRvMXagMrLlYCGaM9V9m0N--


From nobody Thu May  2 09:32:56 2019
Return-Path: <rwilton@cisco.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9466D120424 for <netmod@ietfa.amsl.com>; Thu,  2 May 2019 09:32:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.501
X-Spam-Level: 
X-Spam-Status: No, score=-14.501 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id k-j1VvSzq5uW for <netmod@ietfa.amsl.com>; Thu,  2 May 2019 09:32:53 -0700 (PDT)
Received: from alln-iport-7.cisco.com (alln-iport-7.cisco.com [173.37.142.94]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 61C9F120437 for <netmod@ietf.org>; Thu,  2 May 2019 09:32:42 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=2477; q=dns/txt; s=iport; t=1556814762; x=1558024362; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=4Tz0cSnGSwQWGOrouhSrNyKYYcNevW0YDVhJiOvwxu4=; b=SRf4ID8c+2w8hybDult0GVzs7hrkBM8ycfVioqidgthH8wWaYLOFM7wq bENQlHPBxNeKnxBkYQea6p4kvTSlFggaM4NOFyjST7PwR/0Z6knCHKMKl oMTESRhwH2lRnqGKX2Zy1ODzA9HBM+fH6Zw7e75nQDiVtqcalzYm1Zrye I=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AHAAABG8tc/4MNJK1lDgsBAQEBAQE?= =?us-ascii?q?BAQEBAQEHAQEBAQEBgVMCAQEBAQELAYIQgW0oCpkpmFCBew4BAYRtAoYzIzY?= =?us-ascii?q?HDgEDAQEEAQECAQJtKIVKAQEBBDo/DAQCAQgRBAEBAR4QMh0IAgQBDQUIhSW?= =?us-ascii?q?vWIovgTIBi0sXgUA/hCM+hC6FeASLDAqcDgkCggmSOCOVQYwWlGMCERWBMCY?= =?us-ascii?q?NJIFWcBWDJ5AWO0ExkzyBIQEB?=
X-IronPort-AV: E=Sophos;i="5.60,422,1549929600"; d="scan'208";a="265906797"
Received: from alln-core-1.cisco.com ([173.36.13.131]) by alln-iport-7.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 02 May 2019 16:32:41 +0000
Received: from XCH-RCD-009.cisco.com (xch-rcd-009.cisco.com [173.37.102.19]) by alln-core-1.cisco.com (8.15.2/8.15.2) with ESMTPS id x42GWftC017486 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 2 May 2019 16:32:41 GMT
Received: from xch-rcd-007.cisco.com (173.37.102.17) by XCH-RCD-009.cisco.com (173.37.102.19) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Thu, 2 May 2019 11:32:40 -0500
Received: from xch-rcd-007.cisco.com ([173.37.102.17]) by XCH-RCD-007.cisco.com ([173.37.102.17]) with mapi id 15.00.1473.003; Thu, 2 May 2019 11:32:40 -0500
From: "Rob Wilton (rwilton)" <rwilton@cisco.com>
To: Ladislav Lhotka <lhotka@nic.cz>, Mikael Abrahamsson <swmike@swm.pp.se>, Randy Presuhn <randy_presuhn@alumni.stanford.edu>
CC: "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] 6021 ipv4-prefix
Thread-Index: AdT0l4zGpLjvUofYRmmSWqlDWwoAHABSPgGAAAHDNYAAA12WgAABgE0AAAD0FQAAAKy0gAF1SI2AAAERvAAAFIrFgAAG4xuAAADAhYAACALZAAAA/vaAAAK/LwAAATq3AAB768IgAAtOeIAACmVD4P//tfSAgABTU/D//+IngIAAUdRQ//+41wCAAFEEMP//wy6AABznDYAAAdzWgAAFM7gAAADJUIAAMdJaAAAE8bQAAAQJZoAABZuUgAAIJpwAAA58TQAAEqhFgAACMveAAALl7LA=
Date: Thu, 2 May 2019 16:32:40 +0000
Message-ID: <76a384e8d3f7487e865e7dd6ad0e4c4f@XCH-RCD-007.cisco.com>
References: <0c4265d31adbf208a680f76216cc4bc42c766eae.camel@nic.cz> <959ed1a8092f4798ac0b923384962049@XCH-RCD-007.cisco.com> <20190429153643.oxfcq7ze6ttdihb4@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1904300713100.3490@uplift.swm.pp.se> <20190430061737.vvxghxyacd57k73i@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1904301038570.3490@uplift.swm.pp.se> <20190430090905.qsa3r4dwauilsxur@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1905011051160.1824@uplift.swm.pp.se> <20190501111712.347bpz26br6ox3jp@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1905011456580.1824@uplift.swm.pp.se> <20190501155321.v4qz6twsom45y62f@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1905012137310.1824@uplift.swm.pp.se> <5CCA58DA.3030801@alumni.stanford.edu> <alpine.DEB.2.20.1905021330140.1824@uplift.swm.pp.se> <87v9yt58vi.fsf@nic.cz>
In-Reply-To: <87v9yt58vi.fsf@nic.cz>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.63.23.60]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Outbound-SMTP-Client: 173.37.102.19, xch-rcd-009.cisco.com
X-Outbound-Node: alln-core-1.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/-C4N3ZrMwTcYOLdrIJsCVWz9fMQ>
Subject: Re: [netmod] 6021 ipv4-prefix
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 02 May 2019 16:32:55 -0000

> -----Original Message-----
> From: netmod <netmod-bounces@ietf.org> On Behalf Of Ladislav Lhotka
> Sent: 02 May 2019 13:39
> To: Mikael Abrahamsson <swmike@swm.pp.se>; Randy Presuhn
> <randy_presuhn@alumni.stanford.edu>
> Cc: netmod@ietf.org
> Subject: Re: [netmod] 6021 ipv4-prefix
>=20
> Mikael Abrahamsson <swmike@swm.pp.se> writes:
>=20
> > On Wed, 1 May 2019, Randy Presuhn wrote:
> >
> >> Hi -
> >>
> >> On 5/1/2019 12:46 PM, Mikael Abrahamsson wrote:
> >> ....
> >>> Where is the text that tells the server implementor whether to throw
> >>> an error when client commits non-zero bits, or to just throw the
> >>> bits away and store the value in the canonical format?
> >>
> >> Such text would be an inappropriate constraint the server's internal
> >> representation.  We should only specify the externally-visible
> >> behaviour: that the reported value will be in the canonical format.
> >> Whether an implementation preserves extraneous cruft in its internal
> >> representation is purely an implementation decision, and not subject
> >> to standardization.
> >
> > I am talking about what goes on the wire. If the client does an
> > edit-config with ipv6-prefix 2001:db8::1/64, should the server convert
> > this into 2001:db8::/64 or throw an error on the edit-config operation.
> >
> > Jurgen seems to say it should convert it and not throw an error, and
> > I'd like text to say that indeed, this is proper behaviour. Nobody has
> > so far been able to tell me where this text currently is, so that's
> > why I'm
>=20
> If we agree that a type defines the set of legal on-the-wire values (poss=
ibly
> modulo representation - JSON/XML/...), then section 4.2.2.1 in RFC 7950 s=
ays:
>=20
> [A leaf instance] has exactly one value of a particular type ...
>=20
> So why should a server throw an error if this is satisfied?

I don't think that there is text for a derived type that defines a canonica=
l representation that:
(i) The server must internally treat the data as if it were in the canonica=
l form
(ii) If the data is returned then it must be in the canonical form.

We should fix this in YANG 1.2 so this is clearer, but YANG 1.2 isn't going=
 to be here for a while.  I don't think that we can do this as an erratum, =
but perhaps the 6991bis could, for each type state that the it is handled e=
quivalently to RFC 7950 section 9.1.  Or would that just end up being noise=
?

Thanks,
Rob


From nobody Thu May  2 16:15:45 2019
Return-Path: <andy@yumaworks.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3EE4C120640 for <netmod@ietfa.amsl.com>; Thu,  2 May 2019 16:15:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=yumaworks-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ciI66CxBc3ES for <netmod@ietfa.amsl.com>; Thu,  2 May 2019 16:15:41 -0700 (PDT)
Received: from mail-lj1-x234.google.com (mail-lj1-x234.google.com [IPv6:2a00:1450:4864:20::234]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 397C012064A for <netmod@ietf.org>; Thu,  2 May 2019 16:15:41 -0700 (PDT)
Received: by mail-lj1-x234.google.com with SMTP id z26so3755660ljj.2 for <netmod@ietf.org>; Thu, 02 May 2019 16:15:41 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yumaworks-com.20150623.gappssmtp.com; s=20150623; h=mime-version:from:date:message-id:subject:to; bh=lYkG28xq2QthLLiGvJuW0vPe6ju6CGkyZgN1Fs23WD0=; b=1SVGwmjDtCgi45W8O0L5P5kCQoKvAmIAXUMStufMcNVg5+KRdqJGyjLokg+xeGeYwN moYPTLSJL9anNvZ81FzZU0XIBlELWuQAZ8fNcb29CrbRvDDJ0GArPkZZQoz05NkMBrlk o5c+7Bio8AU4a235fbhVFLn1bEjwyNsOvWMOn3+irDFsPOngMKVSEqoloOCNBH9lcf10 EdEz9GvWEDi/RGXorRx78uZ/4rkwipbizX/99tiQsfIXdCfejhiTzdLpAZ5GzENTgaCj mLkqqGN8131JKNzW7YJ4vPuRVWkAnn5zgIMtF4qIzX9ovltl1uf5setnN+txQr6CO62e QdUA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=lYkG28xq2QthLLiGvJuW0vPe6ju6CGkyZgN1Fs23WD0=; b=BWulX9b45uBvUwlFicKsLCv4+kugTHAHjAQlQ6HaTvnLerqYqSB+LMOAUEa/wPYoQq FVya/6qc+Op/CI4nt1hmXIT5gt0LJHmSPHjAydw1rQE5aiuIIT4y7k7SXtTX3A/bTe2b 6AjNJUCs0QVuSL46l6uGrkPAqBw7IMzt4ZbB0gKD3l//di0L6lEa7bbK+45iS+ih3sMA utCqsZkb3iejAnCAUHjaYQDyI3n8HT8G/E9eYk3DWV5EeIdiiE95lxXwv6+rYROELIlP W8BUkHf9cVSCXWG+rZn4RhbHB65/IRb0wCxh5AKXNCsqIVJrPnxqvuOBnGXZrId7uFr7 aO4A==
X-Gm-Message-State: APjAAAWotcmoLw4rjrO1fs7L6yyNymfPMGNXLDNpq5CMNRvoBe8VvatW 6Res8igC+ywxhZxyAodE6/3mXvgUr5U03UP87Ue57T1l7mbAlg==
X-Google-Smtp-Source: APXvYqyyjYv4S4sgNc9vqiLtmq+nDFmRK5WonfJHQwjSCR1nA51HyAfsHPkLKoReE8PhZS3bBuV9XJf9g1HplstMQ0Y=
X-Received: by 2002:a2e:9e9a:: with SMTP id f26mr910855ljk.170.1556838938845;  Thu, 02 May 2019 16:15:38 -0700 (PDT)
MIME-Version: 1.0
From: Andy Bierman <andy@yumaworks.com>
Date: Thu, 2 May 2019 16:15:28 -0700
Message-ID: <CABCOCHS-nwPfgF-NCNqp5tdS=G3Fz_9s7RkvGNvHbLVq=jYCsg@mail.gmail.com>
To: NetMod WG <netmod@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000ec39a60587efcff9"
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/icVmgSPi8E9kBAVxHtj5GrKleoM>
Subject: [netmod] validating a YANG action
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 02 May 2019 23:15:43 -0000

--000000000000ec39a60587efcff9
Content-Type: text/plain; charset="UTF-8"

Hi,

The text about invoking actions in RFC 7950, sec. 7.15 is not clear
about whether the ancestor data nodes have to exist.

sec 7.15.2, para 2:

   The <action> element contains a hierarchy of nodes that identifies
the node in the datastore.


The RFC does not say anything about if the data node is required to
exist or not.  There is no distinction between NP-container, P-container,
or list which are ancestors of the action node. It does not specify
which datastore, and that is not supplied in the <action> RPC.
The text specifies what must be in the <rpc> request, not in any datastore
or state data.

It seems like the intent is that no instance test is specified at all and
the corresponding ancestor nodes to the action node do not have to
exist for the action to be invoked. (The action may succeed or fail).
The issue is whether there is an existence-test before invoking the action.

Andy

--000000000000ec39a60587efcff9
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Hi,<div><br></div><div>The text about invoking actions in =
RFC 7950, sec. 7.15 is not clear</div><div>about whether the ancestor data =
nodes have to exist.</div><div><br></div><div>sec 7.15.2, para 2:</div><div=
><pre style=3D"color:rgb(0,0,0);white-space:pre-wrap">   The &lt;action&gt;=
 element contains a hierarchy of nodes that identifies the node in the data=
store. </pre><pre style=3D"color:rgb(0,0,0);white-space:pre-wrap"><br></pre=
>The RFC does not say anything about if the data node is required to</div><=
div>exist or not.=C2=A0 There is no distinction between NP-container, P-con=
tainer,</div><div>or list which are ancestors of the action node. It does n=
ot specify</div><div>which datastore, and that is not supplied in the &lt;a=
ction&gt; RPC.</div><div>The text specifies what must be in the &lt;rpc&gt;=
 request, not in any datastore or state data.</div><div><br></div><div>It s=
eems like the intent is that no instance test is specified at all and</div>=
<div>the corresponding ancestor nodes to the action node do not have to</di=
v><div>exist for the action to be invoked. (The action may succeed or fail)=
.</div><div>The issue is whether there is an existence-test before invoking=
 the action.</div><div><br></div><div>Andy</div><div><br></div><div><br></d=
iv></div>

--000000000000ec39a60587efcff9--


From nobody Thu May  2 22:57:33 2019
Return-Path: <j.schoenwaelder@jacobs-university.de>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AD05312006D for <netmod@ietfa.amsl.com>; Thu,  2 May 2019 22:57:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id v8jS1FukSiFz for <netmod@ietfa.amsl.com>; Thu,  2 May 2019 22:57:29 -0700 (PDT)
Received: from atlas5.jacobs-university.de (atlas5.jacobs-university.de [212.201.44.20]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D7AB1120059 for <netmod@ietf.org>; Thu,  2 May 2019 22:57:28 -0700 (PDT)
Received: from localhost (demetrius5.irc-it.jacobs-university.de [10.70.0.222]) by atlas5.jacobs-university.de (Postfix) with ESMTP id AC311DA9; Fri,  3 May 2019 07:57:26 +0200 (CEST)
X-Virus-Scanned: amavisd-new at jacobs-university.de
Received: from atlas5.jacobs-university.de ([10.70.0.217]) by localhost (demetrius5.jacobs-university.de [10.70.0.222]) (amavisd-new, port 10032) with ESMTP id CzjmgSwlY4Wr; Fri,  3 May 2019 07:57:26 +0200 (CEST)
Received: from hermes.jacobs-university.de (hermes.jacobs-university.de [212.201.44.23]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "hermes.jacobs-university.de", Issuer "Jacobs University CA - G01" (verified OK)) by atlas5.jacobs-university.de (Postfix) with ESMTPS; Fri,  3 May 2019 07:57:26 +0200 (CEST)
Received: from localhost (demetrius5.irc-it.jacobs-university.de [10.70.0.222]) by hermes.jacobs-university.de (Postfix) with ESMTP id 6C808200E3; Fri,  3 May 2019 07:57:26 +0200 (CEST)
X-Virus-Scanned: amavisd-new at jacobs-university.de
Received: from hermes.jacobs-university.de ([212.201.44.23]) by localhost (demetrius5.jacobs-university.de [10.70.0.222]) (amavisd-new, port 10028) with ESMTP id ZdAJq0IhQOrK; Fri,  3 May 2019 07:57:26 +0200 (CEST)
Received: from exchange.jacobs-university.de (SXCHMB01.jacobs.jacobs-university.de [10.70.0.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "exchange.jacobs-university.de", Issuer "DFN-Verein Global Issuing CA" (verified OK)) by hermes.jacobs-university.de (Postfix) with ESMTPS id 2954D200E1; Fri,  3 May 2019 07:57:26 +0200 (CEST)
Received: from anna.localdomain (10.50.218.117) by sxchmb03.jacobs.jacobs-university.de (10.70.0.155) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.1713.5; Fri, 3 May 2019 07:57:25 +0200
Received: by anna.localdomain (Postfix, from userid 501) id 2FAAC3008BC30F; Fri,  3 May 2019 07:57:24 +0200 (CEST)
Date: Fri, 3 May 2019 07:57:24 +0200
From: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
To: Andy Bierman <andy@yumaworks.com>
CC: NetMod WG <netmod@ietf.org>
Message-ID: <20190503055724.723voy7swdito3bv@anna.jacobs.jacobs-university.de>
Reply-To: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
Mail-Followup-To: Andy Bierman <andy@yumaworks.com>, NetMod WG <netmod@ietf.org>
References: <CABCOCHS-nwPfgF-NCNqp5tdS=G3Fz_9s7RkvGNvHbLVq=jYCsg@mail.gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <CABCOCHS-nwPfgF-NCNqp5tdS=G3Fz_9s7RkvGNvHbLVq=jYCsg@mail.gmail.com>
User-Agent: NeoMutt/20180716
X-ClientProxiedBy: SXCHMB01.jacobs.jacobs-university.de (10.70.0.120) To sxchmb03.jacobs.jacobs-university.de (10.70.0.155)
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/jRDTMeiqRl30iqWkahKNxhlMciU>
Subject: Re: [netmod] validating a YANG action
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 May 2019 05:57:32 -0000

On Thu, May 02, 2019 at 04:15:28PM -0700, Andy Bierman wrote:
> Hi,
> 
> The text about invoking actions in RFC 7950, sec. 7.15 is not clear
> about whether the ancestor data nodes have to exist.
> 
> sec 7.15.2, para 2:
> 
>    The <action> element contains a hierarchy of nodes that identifies
> the node in the datastore.
> 
> 
> The RFC does not say anything about if the data node is required to
> exist or not.  There is no distinction between NP-container, P-container,
> or list which are ancestors of the action node. It does not specify
> which datastore, and that is not supplied in the <action> RPC.
> The text specifies what must be in the <rpc> request, not in any datastore
> or state data.
> 
> It seems like the intent is that no instance test is specified at all and
> the corresponding ancestor nodes to the action node do not have to
> exist for the action to be invoked. (The action may succeed or fail).
> The issue is whether there is an existence-test before invoking the action.

We discussed actions during the work on NMDA. RFC 8342 has this text
in section 6, in particular 6.1 says:

   Actions are always invoked in the context of the operational state
   datastore.  The node for which the action is invoked MUST exist in
   the operational state datastore.

/js
 
-- 
Juergen Schoenwaelder           Jacobs University Bremen gGmbH
Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
Fax:   +49 421 200 3103         <https://www.jacobs-university.de/>


From nobody Fri May  3 01:02:44 2019
Return-Path: <lhotka@nic.cz>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D10A8120052 for <netmod@ietfa.amsl.com>; Fri,  3 May 2019 01:02:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oSy7rlxWonT9 for <netmod@ietfa.amsl.com>; Fri,  3 May 2019 01:02:39 -0700 (PDT)
Received: from trail.lhotka.name (trail.lhotka.name [77.48.224.143]) by ietfa.amsl.com (Postfix) with ESMTP id E812E1200C4 for <netmod@ietf.org>; Fri,  3 May 2019 01:02:37 -0700 (PDT)
Received: by trail.lhotka.name (Postfix, from userid 109) id D519A182044E; Fri,  3 May 2019 10:02:09 +0200 (CEST)
Received: from localhost (nat-1.nic.cz [217.31.205.1]) by trail.lhotka.name (Postfix) with ESMTPSA id C63F11820045; Fri,  3 May 2019 10:02:06 +0200 (CEST)
From: Ladislav Lhotka <lhotka@nic.cz>
To: Robert Varga <nite@hq.sk>, "Rob Wilton \(rwilton\)" <rwilton@cisco.com>, Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>, NETMOD WG <netmod@ietf.org>
In-Reply-To: <a593b53e-6bb4-c3ce-2fe0-ec5421d2c2f3@hq.sk>
References: <5ccb99db35514088986ff3a396746c7c@XCH-RCD-007.cisco.com> <87sgtx57ad.fsf@nic.cz> <a593b53e-6bb4-c3ce-2fe0-ec5421d2c2f3@hq.sk>
Mail-Followup-To: Robert Varga <nite@hq.sk>, "Rob Wilton \(rwilton\)" <rwilton@cisco.com>, Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>, NETMOD WG <netmod@ietf.org>
Date: Fri, 03 May 2019 10:02:32 +0200
Message-ID: <87sgtwq82v.fsf@nic.cz>
MIME-Version: 1.0
Content-Type: text/plain
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/-caNykWc5A-lvEDXIJ6eWclkO-0>
Subject: Re: [netmod] Canonical value representations in typedefs [was RE: 6021 ipv4-prefix]
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 May 2019 08:02:43 -0000

Robert Varga <nite@hq.sk> writes:

> On 02/05/2019 15:12, Ladislav Lhotka wrote:
>>> But this really means that YANG has two sorts of typedefs:
>>>
>>> (i) A regular typedef which is just an alias for a base type, perhaps with some additional refinements that can all be handled automatically (e.g. pattern statements, etc).  In this scenario, I think that a compiler can ignore the description, and process the typedef automatically.
>>> (ii) An enhanced typedef that has additional semantics embedded into the description statement that requires custom implementation of the typedef.
>>>
>>> Being able to distinguish these two cases in a programmatic way seems
>>> useful to me, but perhaps it is just unnecessary noise.
>> YANG assumes "powerful" descriptions in general. An option would be to find a way for specifying the canonical
>> format in a machine-readable form.
>
> The way I understand typedefs (and use of restricted types in
> leaf/leaf-list) as that the first such use defines a value domain and
> any further references must strictly refer to a subset of that domain.
>
> Notably it does not seem to be sane to redefine the canonical format
> once it has been set.
>
> I think the entire canonical format problem comes from the fact
> ipv4-address is, unlike case (i), only a representation of a value
> domain which is semantically 32 bits.
>
> That value domain has two functions that are different from plain old
> string:
> - equality
> - total ordering
>
> Canonical representation deals with the first one, while also providing
> interoperability with XPath. There is no current mechanism to address
> the second one.

Yes. XML schema languages use the concept of lexical vs. value space,
it is more general and more robust that the concept of canonical
format.

>
> I find having a machine-readable marker (such as an extension) that a
> value domain is being defined immediately useful -- it allows the
> compiler to warn that a specific typedef needs additional work to get it
> working as intended. This one's really easy.
>
> Having some (other) machine-readable marker of how a canonical value
> looks like (i.e. similar to pattern) is also useful: it allows the
> runtime to check if an incoming value is in canonical format and accept
> it irrespective whether specific value domain support (from above) is
> present or not. This one is moderately hard.
>
> Finally, some third marker, which would describe how to transform a
> non-canonical string into a canonical string would obviously be awesome,
> as now the runtime can work automatically. This one is really hard,
> especially since the operations probably involve operating not on a
> string, but some other representation.

I liked the idea developed by Jeni Tennison for DSDL:

https://slideplayer.com/slide/15172219/

(tl;dr: see slide 33). It seems though that this idea didn't materialize.

Lada

>
> As in implementer, I really care about the first two -- they are easy to
> do and provide immense value in making things work 'out of the box' and
> automatically catching cases when they do not.
>
> Regards,
> Robert
>
> _______________________________________________
> netmod mailing list
> netmod@ietf.org
> https://www.ietf.org/mailman/listinfo/netmod

-- 
Ladislav Lhotka
Head, CZ.NIC Labs
PGP Key ID: 0xB8F92B08A9F76C67


From nobody Fri May  3 01:11:15 2019
Return-Path: <andy@yumaworks.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AD3631200A0 for <netmod@ietfa.amsl.com>; Fri,  3 May 2019 01:11:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=yumaworks-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gS8ZvnzgCZRn for <netmod@ietfa.amsl.com>; Fri,  3 May 2019 01:11:12 -0700 (PDT)
Received: from mail-lj1-x232.google.com (mail-lj1-x232.google.com [IPv6:2a00:1450:4864:20::232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 93D5A12004D for <netmod@ietf.org>; Fri,  3 May 2019 01:11:11 -0700 (PDT)
Received: by mail-lj1-x232.google.com with SMTP id t1so4479067lje.10 for <netmod@ietf.org>; Fri, 03 May 2019 01:11:11 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yumaworks-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to; bh=dlaniv00kTfOjlb4YWTSYQTOJyQ6h4qe1yRs4VjzYl0=; b=MnKmyKF3VUN5Fr2eXMyEXK1cqJJ6KcXJHIezqvv6ANq+tEgSN9i4WOD/Sh3dQfwrZ8 0kQ75GaCFzhje+IoSddJpM6lyQ5WpFToATAaq4Rb8B9zQdcHtX/7CqSMElZ6NM1Q5A8k aPIaNB/MX0KlQLxAcbFmQTieIdJBMBNiksmyezghx1SYOy6xxayisGyAHNRiFGco2NJB LBrF8nTNcJlN2wcohDCdRBL5Q/2DdKnZ0bHveWqxBXsioOg0rKYin0w/6MHbc4BIGMVR LI5fyFJdmHdgPFLIPjwzhjUpH/de81JHWNcoaUuw6sb06Eh854b6vYnaKRbLbY+hgXC7 /hJQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to; bh=dlaniv00kTfOjlb4YWTSYQTOJyQ6h4qe1yRs4VjzYl0=; b=bNhG3fp2v1alSYR2mpkW/tCdZ4Viwo5KkYhVmL98duVpJceQ/1KEq0ZtN68NKnf6gD +YRVfeRS6DFzk08du/CeVLACsHbNYJtWc9ujmk/uRHfqHKYWmmpQ3dyMEsH8YwXB17V0 SJrhJIjpHexhNJ6oQSdT9Ou98u0dwTKarhCOzq9wuf7A0/oHRiUW30JO3mTaHMkM+mT+ ER1Lt69qLSDAF4azwDk184cwvpolrcxXKsWReeuI/razyqBd1kb00cADoB+3XnYVhYvL xTjNbHnUDTK+PRnwwhTuX9eY+fFK7pdtpT9NAAGbQV7Gj5bqwGOfztJp495a10yQ0eVm PFdg==
X-Gm-Message-State: APjAAAUoqutB7Y7Ad+ZSDl3jEPyCtNTnb1B6PRMcclbWGQiAkjzVKCEt X7Zni2vjuZU/gSZgeTfyB8wL8b3myyaHlPnH2GbOuA==
X-Google-Smtp-Source: APXvYqzMuhKUVc3zqleD3/9HOjUbUmdhbqu+S/DKntWRSml1ITS3W7eh7ipPqPq5Bht3WFWWhtXV59JvN1S1MhEwxwU=
X-Received: by 2002:a2e:9e4d:: with SMTP id g13mr4345160ljk.12.1556871069575;  Fri, 03 May 2019 01:11:09 -0700 (PDT)
MIME-Version: 1.0
References: <CABCOCHS-nwPfgF-NCNqp5tdS=G3Fz_9s7RkvGNvHbLVq=jYCsg@mail.gmail.com> <20190503055724.723voy7swdito3bv@anna.jacobs.jacobs-university.de>
In-Reply-To: <20190503055724.723voy7swdito3bv@anna.jacobs.jacobs-university.de>
From: Andy Bierman <andy@yumaworks.com>
Date: Fri, 3 May 2019 01:10:58 -0700
Message-ID: <CABCOCHThV5=re8-Mv8S0aLnFDrUoXvr_9nOgB2-zGoED+H2=oQ@mail.gmail.com>
To: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>, Andy Bierman <andy@yumaworks.com>, NetMod WG <netmod@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000001044310587f74bd1"
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/3wesZ3tyj6Z5m2yxxdDgSsARK8s>
Subject: Re: [netmod] validating a YANG action
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 May 2019 08:11:14 -0000

--0000000000001044310587f74bd1
Content-Type: text/plain; charset="UTF-8"

On Thu, May 2, 2019 at 10:57 PM Juergen Schoenwaelder <
j.schoenwaelder@jacobs-university.de> wrote:

> On Thu, May 02, 2019 at 04:15:28PM -0700, Andy Bierman wrote:
> > Hi,
> >
> > The text about invoking actions in RFC 7950, sec. 7.15 is not clear
> > about whether the ancestor data nodes have to exist.
> >
> > sec 7.15.2, para 2:
> >
> >    The <action> element contains a hierarchy of nodes that identifies
> > the node in the datastore.
> >
> >
> > The RFC does not say anything about if the data node is required to
> > exist or not.  There is no distinction between NP-container, P-container,
> > or list which are ancestors of the action node. It does not specify
> > which datastore, and that is not supplied in the <action> RPC.
> > The text specifies what must be in the <rpc> request, not in any
> datastore
> > or state data.
> >
> > It seems like the intent is that no instance test is specified at all and
> > the corresponding ancestor nodes to the action node do not have to
> > exist for the action to be invoked. (The action may succeed or fail).
> > The issue is whether there is an existence-test before invoking the
> action.
>
> We discussed actions during the work on NMDA. RFC 8342 has this text
> in section 6, in particular 6.1 says:
>
>    Actions are always invoked in the context of the operational state
>    datastore.  The node for which the action is invoked MUST exist in
>    the operational state datastore.
>
>
This only applies to a server implementing NMDA.
There is no requirement for a server implementing RFC 7950 to make this
test.


> /js
>
>
Andy


> --
> Juergen Schoenwaelder           Jacobs University Bremen gGmbH
> Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
> Fax:   +49 421 200 3103         <https://www.jacobs-university.de/>
>

--0000000000001044310587f74bd1
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div dir=3D"ltr"><br></div><br><div class=3D"gmail_quote">=
<div dir=3D"ltr" class=3D"gmail_attr">On Thu, May 2, 2019 at 10:57 PM Juerg=
en Schoenwaelder &lt;<a href=3D"mailto:j.schoenwaelder@jacobs-university.de=
">j.schoenwaelder@jacobs-university.de</a>&gt; wrote:<br></div><blockquote =
class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px sol=
id rgb(204,204,204);padding-left:1ex">On Thu, May 02, 2019 at 04:15:28PM -0=
700, Andy Bierman wrote:<br>
&gt; Hi,<br>
&gt; <br>
&gt; The text about invoking actions in RFC 7950, sec. 7.15 is not clear<br=
>
&gt; about whether the ancestor data nodes have to exist.<br>
&gt; <br>
&gt; sec 7.15.2, para 2:<br>
&gt; <br>
&gt;=C2=A0 =C2=A0 The &lt;action&gt; element contains a hierarchy of nodes =
that identifies<br>
&gt; the node in the datastore.<br>
&gt; <br>
&gt; <br>
&gt; The RFC does not say anything about if the data node is required to<br=
>
&gt; exist or not.=C2=A0 There is no distinction between NP-container, P-co=
ntainer,<br>
&gt; or list which are ancestors of the action node. It does not specify<br=
>
&gt; which datastore, and that is not supplied in the &lt;action&gt; RPC.<b=
r>
&gt; The text specifies what must be in the &lt;rpc&gt; request, not in any=
 datastore<br>
&gt; or state data.<br>
&gt; <br>
&gt; It seems like the intent is that no instance test is specified at all =
and<br>
&gt; the corresponding ancestor nodes to the action node do not have to<br>
&gt; exist for the action to be invoked. (The action may succeed or fail).<=
br>
&gt; The issue is whether there is an existence-test before invoking the ac=
tion.<br>
<br>
We discussed actions during the work on NMDA. RFC 8342 has this text<br>
in section 6, in particular 6.1 says:<br>
<br>
=C2=A0 =C2=A0Actions are always invoked in the context of the operational s=
tate<br>
=C2=A0 =C2=A0datastore.=C2=A0 The node for which the action is invoked MUST=
 exist in<br>
=C2=A0 =C2=A0the operational state datastore.<br>
<br></blockquote><div><br></div><div>This only applies to a server implemen=
ting NMDA.</div><div>There is no requirement for a server implementing RFC =
7950 to make this test.</div><div>=C2=A0</div><blockquote class=3D"gmail_qu=
ote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,20=
4);padding-left:1ex">
/js<br>
<br></blockquote><div><br></div><div>Andy</div><div>=C2=A0</div><blockquote=
 class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px so=
lid rgb(204,204,204);padding-left:1ex">
-- <br>
Juergen Schoenwaelder=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0Jacobs Univer=
sity Bremen gGmbH<br>
Phone: +49 421 200 3587=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0Campus Ring 1 | 28=
759 Bremen | Germany<br>
Fax:=C2=A0 =C2=A0+49 421 200 3103=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0&lt;<a h=
ref=3D"https://www.jacobs-university.de/" rel=3D"noreferrer" target=3D"_bla=
nk">https://www.jacobs-university.de/</a>&gt;<br>
</blockquote></div></div>

--0000000000001044310587f74bd1--


From nobody Fri May  3 01:23:15 2019
Return-Path: <lhotka@nic.cz>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4C3171200C4 for <netmod@ietfa.amsl.com>; Fri,  3 May 2019 01:23:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JSKATq8iv-vm for <netmod@ietfa.amsl.com>; Fri,  3 May 2019 01:23:11 -0700 (PDT)
Received: from trail.lhotka.name (trail.lhotka.name [77.48.224.143]) by ietfa.amsl.com (Postfix) with ESMTP id 3F5EC12004D for <netmod@ietf.org>; Fri,  3 May 2019 01:23:11 -0700 (PDT)
Received: by trail.lhotka.name (Postfix, from userid 109) id 8DD26182044A; Fri,  3 May 2019 10:22:43 +0200 (CEST)
Received: from localhost (nat-1.nic.cz [217.31.205.1]) by trail.lhotka.name (Postfix) with ESMTPSA id 4AABE1820045; Fri,  3 May 2019 10:22:40 +0200 (CEST)
From: Ladislav Lhotka <lhotka@nic.cz>
To: "Rob Wilton \(rwilton\)" <rwilton@cisco.com>, Mikael Abrahamsson <swmike@swm.pp.se>, Randy Presuhn <randy_presuhn@alumni.stanford.edu>
Cc: "netmod\@ietf.org" <netmod@ietf.org>
In-Reply-To: <76a384e8d3f7487e865e7dd6ad0e4c4f@XCH-RCD-007.cisco.com>
References: <0c4265d31adbf208a680f76216cc4bc42c766eae.camel@nic.cz> <959ed1a8092f4798ac0b923384962049@XCH-RCD-007.cisco.com> <20190429153643.oxfcq7ze6ttdihb4@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1904300713100.3490@uplift.swm.pp.se> <20190430061737.vvxghxyacd57k73i@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1904301038570.3490@uplift.swm.pp.se> <20190430090905.qsa3r4dwauilsxur@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1905011051160.1824@uplift.swm.pp.se> <20190501111712.347bpz26br6ox3jp@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1905011456580.1824@uplift.swm.pp.se> <20190501155321.v4qz6twsom45y62f@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1905012137310.1824@uplift.swm.pp.se> <5CCA58DA.3030801@alumni.stanford.edu> <alpine.DEB.2.20.1905021330140.1824@uplift.swm.pp.se> <87v9yt58vi.fsf@nic.cz> <76a384e8d3f7487e865e7dd6ad0e4c4f@XCH-RCD-007.cisco.com>
Mail-Followup-To: "Rob Wilton \(rwilton\)" <rwilton@cisco.com>, Mikael Abrahamsson <swmike@swm.pp.se>, Randy Presuhn <randy_presuhn@alumni.stanford.edu>, "netmod\@ietf.org" <netmod@ietf.org>
Date: Fri, 03 May 2019 10:23:01 +0200
Message-ID: <87pnp0q74q.fsf@nic.cz>
MIME-Version: 1.0
Content-Type: text/plain
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/giNP49odNRUP-FXIs1xULG2S5gI>
Subject: Re: [netmod] 6021 ipv4-prefix
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 May 2019 08:23:13 -0000

"Rob Wilton (rwilton)" <rwilton@cisco.com> writes:

>> -----Original Message-----
>> From: netmod <netmod-bounces@ietf.org> On Behalf Of Ladislav Lhotka
>> Sent: 02 May 2019 13:39
>> To: Mikael Abrahamsson <swmike@swm.pp.se>; Randy Presuhn
>> <randy_presuhn@alumni.stanford.edu>
>> Cc: netmod@ietf.org
>> Subject: Re: [netmod] 6021 ipv4-prefix
>> 
>> Mikael Abrahamsson <swmike@swm.pp.se> writes:
>> 
>> > On Wed, 1 May 2019, Randy Presuhn wrote:
>> >
>> >> Hi -
>> >>
>> >> On 5/1/2019 12:46 PM, Mikael Abrahamsson wrote:
>> >> ....
>> >>> Where is the text that tells the server implementor whether to throw
>> >>> an error when client commits non-zero bits, or to just throw the
>> >>> bits away and store the value in the canonical format?
>> >>
>> >> Such text would be an inappropriate constraint the server's internal
>> >> representation.  We should only specify the externally-visible
>> >> behaviour: that the reported value will be in the canonical format.
>> >> Whether an implementation preserves extraneous cruft in its internal
>> >> representation is purely an implementation decision, and not subject
>> >> to standardization.
>> >
>> > I am talking about what goes on the wire. If the client does an
>> > edit-config with ipv6-prefix 2001:db8::1/64, should the server convert
>> > this into 2001:db8::/64 or throw an error on the edit-config operation.
>> >
>> > Jurgen seems to say it should convert it and not throw an error, and
>> > I'd like text to say that indeed, this is proper behaviour. Nobody has
>> > so far been able to tell me where this text currently is, so that's
>> > why I'm
>> 
>> If we agree that a type defines the set of legal on-the-wire values (possibly
>> modulo representation - JSON/XML/...), then section 4.2.2.1 in RFC 7950 says:
>> 
>> [A leaf instance] has exactly one value of a particular type ...
>> 
>> So why should a server throw an error if this is satisfied?
>
> I don't think that there is text for a derived type that defines a canonical representation that:
> (i) The server must internally treat the data as if it were in the canonical form
> (ii) If the data is returned then it must be in the canonical form.

The text is in subsection 9.1, which really should have been outside
sec. 9 (Built-In Types), and applicable to derived types as well. 

But anyway, Mikael wrote about the case when the client sends a value
(specifically, belonging to the ipv6-prefix type) that is NOT in the
canonical format.

Lada

>
> We should fix this in YANG 1.2 so this is clearer, but YANG 1.2 isn't going to be here for a while.  I don't think that we can do this as an erratum, but perhaps the 6991bis could, for each type state that the it is handled equivalently to RFC 7950 section 9.1.  Or would that just end up being noise?
>
> Thanks,
> Rob
>

-- 
Ladislav Lhotka
Head, CZ.NIC Labs
PGP Key ID: 0xB8F92B08A9F76C67


From nobody Fri May  3 02:20:20 2019
Return-Path: <j.schoenwaelder@jacobs-university.de>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 83E0B1200D7 for <netmod@ietfa.amsl.com>; Fri,  3 May 2019 02:20:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4ff0EncIGWHe for <netmod@ietfa.amsl.com>; Fri,  3 May 2019 02:20:16 -0700 (PDT)
Received: from atlas5.jacobs-university.de (atlas5.jacobs-university.de [212.201.44.20]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A895E12006D for <netmod@ietf.org>; Fri,  3 May 2019 02:20:15 -0700 (PDT)
Received: from localhost (demetrius5.irc-it.jacobs-university.de [10.70.0.222]) by atlas5.jacobs-university.de (Postfix) with ESMTP id 7190A4C7; Fri,  3 May 2019 11:20:14 +0200 (CEST)
X-Virus-Scanned: amavisd-new at jacobs-university.de
Received: from atlas5.jacobs-university.de ([10.70.0.217]) by localhost (demetrius5.jacobs-university.de [10.70.0.222]) (amavisd-new, port 10032) with ESMTP id Pp9pxagwSP37; Fri,  3 May 2019 11:20:14 +0200 (CEST)
Received: from hermes.jacobs-university.de (hermes.jacobs-university.de [212.201.44.23]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "hermes.jacobs-university.de", Issuer "Jacobs University CA - G01" (verified OK)) by atlas5.jacobs-university.de (Postfix) with ESMTPS; Fri,  3 May 2019 11:20:14 +0200 (CEST)
Received: from localhost (demetrius5.irc-it.jacobs-university.de [10.70.0.222]) by hermes.jacobs-university.de (Postfix) with ESMTP id 5C85E200E8; Fri,  3 May 2019 11:20:14 +0200 (CEST)
X-Virus-Scanned: amavisd-new at jacobs-university.de
Received: from hermes.jacobs-university.de ([212.201.44.23]) by localhost (demetrius5.jacobs-university.de [10.70.0.222]) (amavisd-new, port 10028) with ESMTP id kgP2qFGki33q; Fri,  3 May 2019 11:20:14 +0200 (CEST)
Received: from exchange.jacobs-university.de (SXCHMB01.jacobs.jacobs-university.de [10.70.0.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "exchange.jacobs-university.de", Issuer "DFN-Verein Global Issuing CA" (verified OK)) by hermes.jacobs-university.de (Postfix) with ESMTPS id 091F2200E1; Fri,  3 May 2019 11:20:14 +0200 (CEST)
Received: from anna.localdomain (10.50.218.117) by sxchmb03.jacobs.jacobs-university.de (10.70.0.155) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.1713.5; Fri, 3 May 2019 11:20:13 +0200
Received: by anna.localdomain (Postfix, from userid 501) id 301193008BC9AD; Fri,  3 May 2019 11:20:12 +0200 (CEST)
Date: Fri, 3 May 2019 11:20:12 +0200
From: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
To: Andy Bierman <andy@yumaworks.com>
CC: NetMod WG <netmod@ietf.org>
Message-ID: <20190503092012.gb2zzqggb2igzs37@anna.jacobs.jacobs-university.de>
Reply-To: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
Mail-Followup-To: Andy Bierman <andy@yumaworks.com>, NetMod WG <netmod@ietf.org>
References: <CABCOCHS-nwPfgF-NCNqp5tdS=G3Fz_9s7RkvGNvHbLVq=jYCsg@mail.gmail.com> <20190503055724.723voy7swdito3bv@anna.jacobs.jacobs-university.de> <CABCOCHThV5=re8-Mv8S0aLnFDrUoXvr_9nOgB2-zGoED+H2=oQ@mail.gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <CABCOCHThV5=re8-Mv8S0aLnFDrUoXvr_9nOgB2-zGoED+H2=oQ@mail.gmail.com>
User-Agent: NeoMutt/20180716
X-ClientProxiedBy: SXCHMB04.jacobs.jacobs-university.de (10.70.0.156) To sxchmb03.jacobs.jacobs-university.de (10.70.0.155)
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/-tT5bFP0w2w2sr4TXSMmybha3qk>
Subject: Re: [netmod] validating a YANG action
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 May 2019 09:20:19 -0000

On Fri, May 03, 2019 at 01:10:58AM -0700, Andy Bierman wrote:
> On Thu, May 2, 2019 at 10:57 PM Juergen Schoenwaelder <
> j.schoenwaelder@jacobs-university.de> wrote:
> 
> > On Thu, May 02, 2019 at 04:15:28PM -0700, Andy Bierman wrote:
> > > Hi,
> > >
> > > The text about invoking actions in RFC 7950, sec. 7.15 is not clear
> > > about whether the ancestor data nodes have to exist.
> > >
> > > sec 7.15.2, para 2:
> > >
> > >    The <action> element contains a hierarchy of nodes that identifies
> > > the node in the datastore.
> > >
> > >
> > > The RFC does not say anything about if the data node is required to
> > > exist or not.  There is no distinction between NP-container, P-container,
> > > or list which are ancestors of the action node. It does not specify
> > > which datastore, and that is not supplied in the <action> RPC.
> > > The text specifies what must be in the <rpc> request, not in any
> > datastore
> > > or state data.
> > >
> > > It seems like the intent is that no instance test is specified at all and
> > > the corresponding ancestor nodes to the action node do not have to
> > > exist for the action to be invoked. (The action may succeed or fail).
> > > The issue is whether there is an existence-test before invoking the
> > action.
> >
> > We discussed actions during the work on NMDA. RFC 8342 has this text
> > in section 6, in particular 6.1 says:
> >
> >    Actions are always invoked in the context of the operational state
> >    datastore.  The node for which the action is invoked MUST exist in
> >    the operational state datastore.
> >
> >
> This only applies to a server implementing NMDA.
> There is no requirement for a server implementing RFC 7950 to make this
> test.
>

Yes, the behavior is unspecified in RFC 7950. However, note that RFC
8342 formally updates RFC 7950 and the Introduction section says:

   This document updates RFC 7950 by refining the definition of the
   accessible tree for some XML Path Language (XPath) context (see
   Section 6.1) and the invocation context of operations (see
   Section 6.2).

This update may not affect your implementation but since you asked
whether there is an existence-test before invoking the action, I
thought a pointer to RFC 8342 is perhaps relevant.

/js

-- 
Juergen Schoenwaelder           Jacobs University Bremen gGmbH
Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
Fax:   +49 421 200 3103         <https://www.jacobs-university.de/>


From nobody Fri May  3 03:44:00 2019
Return-Path: <Albrecht.Schwarz@etas.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4509B12009A for <netmod@ietfa.amsl.com>; Fri,  3 May 2019 03:43:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level: 
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HPd9T7jl-JiU for <netmod@ietfa.amsl.com>; Fri,  3 May 2019 03:43:54 -0700 (PDT)
Received: from de-out1.bosch-org.com (de-out1.bosch-org.com [139.15.230.186]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 45944120026 for <netmod@ietf.org>; Fri,  3 May 2019 03:43:53 -0700 (PDT)
Received: from fe0vm1650.rbesz01.com (unknown [139.15.230.188]) by fe0vms0187.rbdmz01.com (Postfix) with ESMTPS id 44wTJR18bSz1XLDR3; Fri,  3 May 2019 12:43:51 +0200 (CEST)
Received: from si0vm4642.rbesz01.com (unknown [10.58.172.176]) by fe0vm1650.rbesz01.com (Postfix) with ESMTPS id 44wTJR0trQz1CW; Fri,  3 May 2019 12:43:51 +0200 (CEST)
X-AuditID: 0a3aad12-be3ff70000006e39-c8-5ccc1b66cf72
Received: from si0vm1950.rbesz01.com ( [10.58.173.29]) (using TLS with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by si0vm4642.rbesz01.com (SMG Outbound) with SMTP id 86.74.28217.66B1CCC5; Fri,  3 May 2019 12:43:50 +0200 (CEST)
Received: from SI-MBX2054.de.bosch.com (unknown [10.3.230.148]) by si0vm1950.rbesz01.com (Postfix) with ESMTPS id 44wTJQ69lcz52c; Fri,  3 May 2019 12:43:50 +0200 (CEST)
Received: from SI-MBX2054.de.bosch.com (10.3.230.148) by SI-MBX2054.de.bosch.com (10.3.230.148) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.1713.5; Fri, 3 May 2019 12:43:50 +0200
Received: from SI-MBX2054.de.bosch.com ([fe80::187:74e0:f8c8:c9b1]) by SI-MBX2054.de.bosch.com ([fe80::187:74e0:f8c8:c9b1%4]) with mapi id 15.01.1713.006; Fri, 3 May 2019 12:43:50 +0200
From: "Schwarz Albrecht (ETAS/ESY1)" <Albrecht.Schwarz@etas.com>
To: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>, Andy Bierman <andy@yumaworks.com>
CC: NetMod WG <netmod@ietf.org>
Thread-Topic: Management Protocol Roles: Client/Server vs Manager/Agent
Thread-Index: AdUBk3PTS+EcD5D1QwG4flUjTOYwHw==
Date: Fri, 3 May 2019 10:43:50 +0000
Message-ID: <941c9e23c3274dcdbca21c22348ca04f@etas.com>
Accept-Language: de-DE, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.1.129.237]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA21TfUwbdRjur9ePo/bYcVD6rh3B1BnjVynYKZHFbCZmIG4zTmeijXqMo+3W D9IrDIgmUDZlhI2FsQ2rG37AJHOODw1hphuskCik4oaudnXZ5mRDGCMShK0DwTuurP3Df355 3ud9nuf93fvL4Rh1FNfgVoebcTlom06mkCie/ybt6SJtwGToOJeTfX3AK8++1BlB2c0Xq6Qb sNyWlog4t6MvL3dP/UXJq9hbivWFjM1ayrgyXnhPYQmEfVjx4mNlcw3t8ko0k16LcBxII/SO v16LFDhFNonh6O0vpUJxCsHBuT0yoZhCMBcORYuzCMavtYtrUQIuIzfAYLBaxuMUkoE7V05g PMbIdDh0b3pZk0y+CN/3d0kFzSb4p64yqtfDQl3rsl5CrgVfzz7EY4J8DoJt1XIeIzINOjp+ jmaqITzavJwJJAktPoEHUgXjfy5KBfwwjPV0iwW9HkKHG2UCfhJOfH4bE/KTYPDjUclBpPLG xXrjLN44izfO8hmSnEQq1mootRufNWbpXQUMW2HI1O9w2ruQ8DxUD+oMFvkRiSOdkvhBETBR UrqULbf70TpcrFMRBhVHJRY4C8stNGt511ViY1idhlhz4WUTlfyAZksK7FaWtTodfgQ4pksh 3pkeMlFEIV1ewbicgs2PtLhEpybM+FYTRZppN7OLYYoZ10o3B8d1QNzScAOTXIyZKSuy2twr bV0agUQiEZUa34kfK8YT/OgZXMnNFvERBFtM21mrOWpfLdipFTZmHUJb8b4v/jiG4YN3+fNA 561jGCVxOB2MRk3k8Fkk77KUOB7cRrOGGFZyDVVcI5Y4gUKI22cyoV3NaZTcHxG7BxBafnVJ UTJmymrhPORIKnx6YzNEProghoVr8xJoOrtXCg1Nx+Wwd/a6HGbDwzicHmlNgHuTVxOgfanm IfhxoJ47Qn1KqAr3K6GhdUgJkflzBLS13yRgwPNJIlw+6U+E3sihVdD93cgqmPV0J0HN/UsU HPeNJUNosl8Fo/9OquDq1N8q+HV/bypcmbmZCkuN+9QwsXReDW3jw2qo8fpggtuxmNvxWAP/ vqybdv/PjqNs7OM0lciyQ4m17TzwPum4m7jwZr4+ZbF/S8Bi83i2zVRPBXb+/tdTj//y4SPh 4JmZgteYrKAhQzxnyv8p89v7Y7uGK37b+IqITd9Y17jbeEdk7godmd+d5z3c6nET2x49M51e q15b9UbeB287m8u+rl+foV1XeoOt237q/H7ndnjpNFw2bsr/SidhLXTmE5iLpf8DpE/7M6oE AAA=
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/GsqEKBgSxDQWv7cmpcMEpHHKHKw>
Subject: [netmod] Management Protocol Roles: Client/Server vs Manager/Agent
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 May 2019 10:43:58 -0000

Hello Andy, Juergen,

I got a side question for clarification (which was perhaps already discusse=
d years ago on the list, but I'm just starting to follow NETCONF & NETMOD a=
ctivities):

The management paradigm and management association is related to roles (Man=
agement) Manager (or Master) and (Management) Agents, in an hierarchical re=
lationship of 1:N concerning the ratio of Manager to Agents.
That's the usual case, being aware of the exceptional cases with e.g. M:N (=
or additional, interim Management Broker, Gateway, etc entities).

I would have expected that=20
- the Management Data Modeling language (YANG),
- the Management Datastore Architecture (RFC 8342),
- a Network Configuration Access Control Model (RFC 8341) and even
- Network Management Protocols for YANG data (such as NETCONF, RESTCONF)
use the role model of Manager and Agent.
However, I do see only the role relationship Client/Server (in that RFCs), =
hm?

Leading (for me) to a principle dilemma from (management) protocol engineer=
ing perspective due to
a) Manager-to-Agent =3D 1:N
b) Client-to-Server =3D N:1
c) and the mapping approach in NETCONF/NETMOD of Manager-to-Client and Agen=
t-to-Server in my understanding.

I'm being aware that a distributed management solution needs to resolve the=
 various role assignments in a layered management communication architectur=
e at the various levels, e.g.,
for Management Application MA-over-RESTCONF-over-HTTP-over-TCP-over- ... as
1) Application level (MA): Manager to Agent(s)
2) Application layer management protocol =3D RESTCONF: Manager to Agent(s)
3) Session layer =3D HTTP: Client(s) to Server
4) Transport layer =3D TCP: Client(s) to Server

I fail to see, or do miss the background/justification why the notion of cl=
ient/server is used in RFCs about YANG, NMDA, NETCONF? Instead of manager/a=
gent.

Does anyone know the motivation, background?

Thanks,
Albrecht



Mit freundlichen Gr=FC=DFen / Best regards

Dr. Albrecht Schwarz

Systems Engineering (ETAS/ESY1)=20
Tel. +49 711 3423-2380 | Mobil +49 173 9792 632 | Albrecht.Schwarz@etas.com


-----Original Message-----
From: netmod <netmod-bounces@ietf.org> On Behalf Of Juergen Schoenwaelder
Sent: 03 May 2019 11:20
To: Andy Bierman <andy@yumaworks.com>
Cc: NetMod WG <netmod@ietf.org>
Subject: Re: [netmod] validating a YANG action

On Fri, May 03, 2019 at 01:10:58AM -0700, Andy Bierman wrote:
> On Thu, May 2, 2019 at 10:57 PM Juergen Schoenwaelder <=20
> j.schoenwaelder@jacobs-university.de> wrote:
>=20
> > On Thu, May 02, 2019 at 04:15:28PM -0700, Andy Bierman wrote:
> > > Hi,
> > >
> > > The text about invoking actions in RFC 7950, sec. 7.15 is not=20
> > > clear about whether the ancestor data nodes have to exist.
> > >
> > > sec 7.15.2, para 2:
> > >
> > >    The <action> element contains a hierarchy of nodes that=20
> > > identifies the node in the datastore.
> > >
> > >
> > > The RFC does not say anything about if the data node is required=20
> > > to exist or not.  There is no distinction between NP-container,=20
> > > P-container, or list which are ancestors of the action node. It=20
> > > does not specify which datastore, and that is not supplied in the <ac=
tion> RPC.
> > > The text specifies what must be in the <rpc> request, not in any
> > datastore
> > > or state data.
> > >
> > > It seems like the intent is that no instance test is specified at=20
> > > all and the corresponding ancestor nodes to the action node do not=20
> > > have to exist for the action to be invoked. (The action may succeed o=
r fail).
> > > The issue is whether there is an existence-test before invoking=20
> > > the
> > action.
> >
> > We discussed actions during the work on NMDA. RFC 8342 has this text=20
> > in section 6, in particular 6.1 says:
> >
> >    Actions are always invoked in the context of the operational state
> >    datastore.  The node for which the action is invoked MUST exist in
> >    the operational state datastore.
> >
> >
> This only applies to a server implementing NMDA.
> There is no requirement for a server implementing RFC 7950 to make=20
> this test.
>

Yes, the behavior is unspecified in RFC 7950. However, note that RFC
8342 formally updates RFC 7950 and the Introduction section says:

   This document updates RFC 7950 by refining the definition of the
   accessible tree for some XML Path Language (XPath) context (see
   Section 6.1) and the invocation context of operations (see
   Section 6.2).

This update may not affect your implementation but since you asked whether =
there is an existence-test before invoking the action, I thought a pointer =
to RFC 8342 is perhaps relevant.

/js

--=20
Juergen Schoenwaelder           Jacobs University Bremen gGmbH
Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
Fax:   +49 421 200 3103         <https://www.jacobs-university.de/>

_______________________________________________
netmod mailing list
netmod@ietf.org
https://www.ietf.org/mailman/listinfo/netmod


From nobody Fri May  3 05:08:17 2019
Return-Path: <ietfc@btconnect.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 752B61200B7 for <netmod@ietfa.amsl.com>; Fri,  3 May 2019 05:08:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.247
X-Spam-Level: 
X-Spam-Status: No, score=0.247 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RATWARE_MS_HASH=2.148, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=btconnect.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jWNl3GD7YbCI for <netmod@ietfa.amsl.com>; Fri,  3 May 2019 05:08:13 -0700 (PDT)
Received: from EUR03-DB5-obe.outbound.protection.outlook.com (mail-eopbgr40133.outbound.protection.outlook.com [40.107.4.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8154D12004A for <netmod@ietf.org>; Fri,  3 May 2019 05:08:13 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=btconnect.onmicrosoft.com; s=selector1-btconnect-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=AXEqT50yp/wgK1Q1OijDVUhtGUjurpPw7DKXmYMKBjU=; b=XuHB6Rt0ry/THVRFX4EQk849EpRVzzOMGxlE8U6w9BnPM4ktD0UrEaL0IfRmTeeXJqTKh7G0t6qjq4g7eOt9Q8F4ZDSbiRyjTHN4dtgal8mXqie9hKS+H9vv63nYqGjitPXQEOD7KK/A3lJAO7sbLq7yhRKQPSnQrAMQw6Ld5fs=
Received: from VI1PR07MB3118.eurprd07.prod.outlook.com (10.175.242.156) by VI1PR07MB3901.eurprd07.prod.outlook.com (52.134.27.25) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1878.11; Fri, 3 May 2019 12:08:10 +0000
Received: from VI1PR07MB3118.eurprd07.prod.outlook.com ([fe80::41a4:68a9:d620:d42b]) by VI1PR07MB3118.eurprd07.prod.outlook.com ([fe80::41a4:68a9:d620:d42b%3]) with mapi id 15.20.1878.004; Fri, 3 May 2019 12:08:10 +0000
From: tom petch <ietfc@btconnect.com>
To: Mikael Abrahamsson <swmike@swm.pp.se>, Randy Presuhn <randy_presuhn@alumni.stanford.edu>
CC: "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: convert it and not throw an error was Re: [netmod] 6021 ipv4-prefix
Thread-Index: AQHVAajglgU0hqJTFEKnXu5M24LNog==
Date: Fri, 3 May 2019 12:08:10 +0000
Message-ID: <001201d501a8$63839940$4001a8c0@gateway.2wire.net>
References: <0c4265d31adbf208a680f76216cc4bc42c766eae.camel@nic.cz> <959ed1a8092f4798ac0b923384962049@XCH-RCD-007.cisco.com> <20190429153643.oxfcq7ze6ttdihb4@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1904300713100.3490@uplift.swm.pp.se> <20190430061737.vvxghxyacd57k73i@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1904301038570.3490@uplift.swm.pp.se> <20190430090905.qsa3r4dwauilsxur@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1905011051160.1824@uplift.swm.pp.se> <20190501111712.347bpz26br6ox3jp@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1905011456580.1824@uplift.swm.pp.se> <20190501155321.v4qz6twsom45y62f@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1905012137310.1824@uplift.swm.pp.se> <5CCA58DA.3030801@alumni.stanford.edu> <alpine.DEB.2.20.1905021330140.1824@uplift.swm.pp.se>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-clientproxiedby: LO2P265CA0125.GBRP265.PROD.OUTLOOK.COM (2603:10a6:600:9f::17) To VI1PR07MB3118.eurprd07.prod.outlook.com (2603:10a6:802:20::28)
authentication-results: spf=none (sender IP is ) smtp.mailfrom=ietfc@btconnect.com; 
x-ms-exchange-messagesentrepresentingtype: 1
x-mailer: Microsoft Outlook Express 6.00.2800.1106
x-originating-ip: [86.139.215.234]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: a40fc8e5-1172-4be7-323c-08d6cfc00259
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600141)(711020)(4605104)(2017052603328)(7193020); SRVR:VI1PR07MB3901; 
x-ms-traffictypediagnostic: VI1PR07MB3901:
x-ms-exchange-purlcount: 2
x-microsoft-antispam-prvs: <VI1PR07MB39012D1BEFAA163F287C4748A0350@VI1PR07MB3901.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0026334A56
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(136003)(366004)(396003)(39860400002)(376002)(346002)(13464003)(199004)(189003)(66446008)(486006)(64756008)(81156014)(8676002)(81166006)(73956011)(50226002)(476003)(186003)(66476007)(53546011)(386003)(102836004)(6506007)(68736007)(7736002)(6486002)(2171002)(256004)(6436002)(966005)(52116002)(76176011)(81816011)(81686011)(14444005)(6306002)(4326008)(14454004)(26005)(53936002)(478600001)(9686003)(44736005)(99286004)(4720700003)(6512007)(5660300002)(14496001)(2906002)(8936002)(66556008)(71190400001)(61296003)(66946007)(84392002)(71200400001)(316002)(3846002)(6116002)(110136005)(86362001)(44716002)(66066001)(446003)(25786009)(305945005)(86152003)(1556002)(62236002)(74416001)(7726001); DIR:OUT; SFP:1102; SCL:1; SRVR:VI1PR07MB3901; H:VI1PR07MB3118.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:0; MX:1; 
received-spf: None (protection.outlook.com: btconnect.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: ADwmPyhS0TINLoyE88CGy2p5++2kJc8CFEY56IzfZaUW4/ksRILv18JWYBMMOaD1qK5CNV5MfFLyLZIboSsUAdSG0+VouFyZvRx/PLxILINcSOBSiCa4pKX6uxzmGZdsoLfKoBTcq6a8lf+POIsbg4e+q2CJ/WnvwB9/+DUFoI+07ARxr7oPfqv3NoSUB0wpBYozyRYXhqAP0dwuPg7J6SY1Jthnw0iUEsCmBYnZ2BzGNAbvodxWYJRqSHKnJZ9hR4LMdo+Rf6xlsax+glMU5+AHkW+rrECKcRfGyq0U3ZPt4HOzg9BjkdKRVukYettlcinnIIaZzw4KHN/KolE2wSaQ+rFoS9DjNlHFd7AZnYjPuTsxrQzG6cCZXRCbgRMY6HwyB9m+jG1mvJK3rxXSOSw0sXRtnwnHWo2M+pvRxgE=
Content-Type: text/plain; charset="iso-8859-1"
Content-ID: <5B958DE30598D944A1E69CCFCB0D28C8@eurprd07.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: btconnect.com
X-MS-Exchange-CrossTenant-Network-Message-Id: a40fc8e5-1172-4be7-323c-08d6cfc00259
X-MS-Exchange-CrossTenant-originalarrivaltime: 03 May 2019 12:08:10.1893 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: cf8853ed-96e5-465b-9185-806bfe185e30
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR07MB3901
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/ENVp5rtkhsUa1Yq9GkU4MeT_FrY>
Subject: [netmod] convert it and not throw an error was Re: 6021 ipv4-prefix
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 May 2019 12:08:16 -0000

----- Original Message -----
From: "Mikael Abrahamsson" <swmike@swm.pp.se>
To: "Randy Presuhn" <randy_presuhn@alumni.stanford.edu>
Cc: <netmod@ietf.org>
Sent: Thursday, May 02, 2019 12:35 PM

> On Wed, 1 May 2019, Randy Presuhn wrote:
>
> > Hi -
> >
> > On 5/1/2019 12:46 PM, Mikael Abrahamsson wrote:
> > ....
> >> Where is the text that tells the server implementor whether to
throw an
> >> error when client commits non-zero bits, or to just throw the bits
away
> >> and store the value in the canonical format?
> >
> > Such text would be an inappropriate constraint the server's
> > internal representation.  We should only specify
> > the externally-visible behaviour: that the reported value
> > will be in the canonical format.  Whether an implementation
> > preserves extraneous cruft in its internal representation is
> > purely an implementation decision, and not subject to
standardization.
>
> I am talking about what goes on the wire. If the client does an
> edit-config with ipv6-prefix 2001:db8::1/64, should the server convert
> this into 2001:db8::/64 or throw an error on the edit-config
operation.
>
> Jurgen seems to say it should convert it and not throw an error, and
I'd
> like text to say that indeed, this is proper behaviour. Nobody has so
far
> been able to tell me where this text currently is, so that's why I'm
> asking for it to be added. Either this should go into an update to
> https://tools.ietf.org/html/rfc7950#section-9.1 or it should go into
each
> and every definition of types (or both of them).

Mikael

How about RFC791, still much quoted in all aspects of the work of the
IETF?

" In general, an implementation must be conservative
  in its sending behavior, and liberal in its receiving behavior.  That
  is, it must be careful to send well-formed datagrams, but must accept
  any datagram that it can interpret (e.g., not object to technical
  errors where the meaning is still clear)."

We did not have MUST in those days, but had we, this would have been one
IMHO.

Tom Petch

> >> It seems it should "fix it", so we should
> >> have text that reflects this.
> >
> > False dichotomy.  An implementation might actually preserve
> > those bits, though of course they'd never be seen again (at
> > least not on a netconf interface) since the netconf server
> > will always behave as though the value were in its canonical
> > form, regardless of the internal representation.
>
> Again, I am talking about what goes on the wire, what is seen when
issuing
> "get" or "edit-config" etc.
>
> --
> Mikael Abrahamsson    email: swmike@swm.pp.se
>
> _______________________________________________
> netmod mailing list
> netmod@ietf.org
> https://www.ietf.org/mailman/listinfo/netmod


From nobody Fri May  3 09:14:57 2019
Return-Path: <j.schoenwaelder@jacobs-university.de>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3C3251200EF for <netmod@ietfa.amsl.com>; Fri,  3 May 2019 09:14:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JOTIo3I0NaVW for <netmod@ietfa.amsl.com>; Fri,  3 May 2019 09:14:54 -0700 (PDT)
Received: from atlas5.jacobs-university.de (atlas5.jacobs-university.de [212.201.44.20]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 956511200E3 for <netmod@ietf.org>; Fri,  3 May 2019 09:14:53 -0700 (PDT)
Received: from localhost (demetrius5.irc-it.jacobs-university.de [10.70.0.222]) by atlas5.jacobs-university.de (Postfix) with ESMTP id 4CDBA7B8; Fri,  3 May 2019 18:14:52 +0200 (CEST)
X-Virus-Scanned: amavisd-new at jacobs-university.de
Received: from atlas5.jacobs-university.de ([10.70.0.217]) by localhost (demetrius5.jacobs-university.de [10.70.0.222]) (amavisd-new, port 10032) with ESMTP id 0oRuuNGCESBs; Fri,  3 May 2019 18:14:52 +0200 (CEST)
Received: from hermes.jacobs-university.de (hermes.jacobs-university.de [212.201.44.23]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "hermes.jacobs-university.de", Issuer "Jacobs University CA - G01" (verified OK)) by atlas5.jacobs-university.de (Postfix) with ESMTPS; Fri,  3 May 2019 18:14:52 +0200 (CEST)
Received: from localhost (demetrius5.irc-it.jacobs-university.de [10.70.0.222]) by hermes.jacobs-university.de (Postfix) with ESMTP id 0CF2F200E8; Fri,  3 May 2019 18:14:52 +0200 (CEST)
X-Virus-Scanned: amavisd-new at jacobs-university.de
Received: from hermes.jacobs-university.de ([212.201.44.23]) by localhost (demetrius5.jacobs-university.de [10.70.0.222]) (amavisd-new, port 10028) with ESMTP id 3QtHnHsbu467; Fri,  3 May 2019 18:14:51 +0200 (CEST)
Received: from exchange.jacobs-university.de (SXCHMB02.jacobs.jacobs-university.de [10.70.0.121]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "exchange.jacobs-university.de", Issuer "DFN-Verein Global Issuing CA" (verified OK)) by hermes.jacobs-university.de (Postfix) with ESMTPS id B8CEA200E9; Fri,  3 May 2019 18:14:51 +0200 (CEST)
Received: from anna.localdomain (10.50.218.117) by sxchmb03.jacobs.jacobs-university.de (10.70.0.155) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.1713.5; Fri, 3 May 2019 18:14:51 +0200
Received: by anna.localdomain (Postfix, from userid 501) id DEF623008BDF29; Fri,  3 May 2019 18:14:50 +0200 (CEST)
Date: Fri, 3 May 2019 18:14:50 +0200
From: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
To: "Schwarz Albrecht (ETAS/ESY1)" <Albrecht.Schwarz@etas.com>
CC: Andy Bierman <andy@yumaworks.com>, NetMod WG <netmod@ietf.org>
Message-ID: <20190503161450.p44lkz6cxzuwjc3d@anna.jacobs.jacobs-university.de>
Reply-To: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
Mail-Followup-To: "Schwarz Albrecht (ETAS/ESY1)" <Albrecht.Schwarz@etas.com>,  Andy Bierman <andy@yumaworks.com>, NetMod WG <netmod@ietf.org>
References: <941c9e23c3274dcdbca21c22348ca04f@etas.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <941c9e23c3274dcdbca21c22348ca04f@etas.com>
User-Agent: NeoMutt/20180716
X-ClientProxiedBy: SXCHMB04.jacobs.jacobs-university.de (10.70.0.156) To sxchmb03.jacobs.jacobs-university.de (10.70.0.155)
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/QckJbmDtkTCqOwl2FSsBKQPdt8g>
Subject: Re: [netmod] Management Protocol Roles: Client/Server vs Manager/Agent
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 May 2019 16:14:56 -0000

On Fri, May 03, 2019 at 10:43:50AM +0000, Schwarz Albrecht (ETAS/ESY1) wrote:

> Leading (for me) to a principle dilemma from (management) protocol engineering perspective due to
> a) Manager-to-Agent = 1:N
> b) Client-to-Server = N:1
> c) and the mapping approach in NETCONF/NETMOD of Manager-to-Client and Agent-to-Server in my understanding.

The problem is that you leave the plural 's' out. ;-)

Client-to-Server  is 1:1 (= Manager-to-Agent)
Client-to-Servers is 1:N (= Manager-to-Agents)
Clients-to-Server is N:1 (= Managers-to-Agent)

> I'm being aware that a distributed management solution needs to resolve the various role assignments in a layered management communication architecture at the various levels, e.g.,
> for Management Application MA-over-RESTCONF-over-HTTP-over-TCP-over- ... as
> 1) Application level (MA): Manager to Agent(s)
> 2) Application layer management protocol = RESTCONF: Manager to Agent(s)
> 3) Session layer = HTTP: Client(s) to Server
> 4) Transport layer = TCP: Client(s) to Server
> 
> I fail to see, or do miss the background/justification why the notion of client/server is used in RFCs about YANG, NMDA, NETCONF? Instead of manager/agent.
>

It all boils down how you define the terms Manager and Agent. With
NETCONF/RESTCONF and YANG, the initial focus was on the interaction
between the server maintaining configuration datastores and the client
manipulating configuration datastores (leaving out notifications for
now, they actually came later).

/js

-- 
Juergen Schoenwaelder           Jacobs University Bremen gGmbH
Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
Fax:   +49 421 200 3103         <https://www.jacobs-university.de/>


From nobody Fri May  3 09:44:00 2019
Return-Path: <andy@yumaworks.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C42571200F9 for <netmod@ietfa.amsl.com>; Fri,  3 May 2019 09:43:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=yumaworks-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XiPuLjmq_evE for <netmod@ietfa.amsl.com>; Fri,  3 May 2019 09:43:57 -0700 (PDT)
Received: from mail-lj1-x243.google.com (mail-lj1-x243.google.com [IPv6:2a00:1450:4864:20::243]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 312581200D6 for <netmod@ietf.org>; Fri,  3 May 2019 09:43:57 -0700 (PDT)
Received: by mail-lj1-x243.google.com with SMTP id e18so5780203lja.5 for <netmod@ietf.org>; Fri, 03 May 2019 09:43:57 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yumaworks-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to; bh=IP6CM2Rz9CGC/3LuDEFyscpacB9vCmJSW2gmH9mi8Cc=; b=KQ9uaXXpVG0Pk3bklIErcZnDmN3XRNSR7BVV6v1RW+O17t/UQCe6nDbYTqwEErMtoE dG2TgC/XxXyNRk1d4X72xXfPRwIQvb0IynuchXyGpJcNAZ0+JmwKYA6ApH/Y6uaGO+Cg Hf6Dbd4Q0yHl5uq/H4hqQMNq4wEk9BquElQc+kCK/EgQub6HcE8pxi6vL9UhjM5tpqRH Xg4TrXTPlO/TrAdU28BQnUk9gVgulqcwsbfzowS4a1qEMySYi7yvH2KdjM5mxJTC5YE3 xAX/I+9FfgQl4PFQPw2lXp51q96MpOaPcC5OItmAMCUOiFLC/zG5DTjmuEYjy8ZcxSP0 dHjw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to; bh=IP6CM2Rz9CGC/3LuDEFyscpacB9vCmJSW2gmH9mi8Cc=; b=k5MxtRmpLOUuZYS1qTMH4bPKw813OcSVqXi+Vj5UIcfFHVliba0QRAiN030PA9PSrM XV1EodP1XfXMmYF07c/DDZR84V0xovqeAzRn+YknbGLWKDAptaNKRMBYXHPqKXXx1DdR EUECsF5ytwnb3p5ZF72EVOzCLT9kpjYF0+CGUp5ywmJQ5FQiHNVNDh7Ca4ujgJXJzoO3 R/Ej/94QSxtNk2ROJtDqevhWFV9ejkrMolE2m7mGchK653yeJ9pZrECWdZwUXjZqTcBh 1r1v4QZ7Q3eBaFRSo18kUoWFjoe648k3/UFS0Awa0i8B7EA1KlEN7cz0X/wj3lsm9F9R nBVA==
X-Gm-Message-State: APjAAAVs0EES0yc2TqeaeX6kahYbAL5u4mKZ0usA24/ln6DYd52mqdBL Ih0XeABm9B0Vdder/pU9fNk5zFFZ5zbFHhvm21idwg==
X-Google-Smtp-Source: APXvYqyWX4XkJOrNJYOCwyu2SWGSHu7R8P+A/fKRWvKedjW8w8bNqRTn92zHhTg0cXaAMnUGgDfS0wljuct3/32NPaw=
X-Received: by 2002:a2e:9e4d:: with SMTP id g13mr5632889ljk.12.1556901835246;  Fri, 03 May 2019 09:43:55 -0700 (PDT)
MIME-Version: 1.0
References: <CABCOCHS-nwPfgF-NCNqp5tdS=G3Fz_9s7RkvGNvHbLVq=jYCsg@mail.gmail.com> <20190503055724.723voy7swdito3bv@anna.jacobs.jacobs-university.de> <CABCOCHThV5=re8-Mv8S0aLnFDrUoXvr_9nOgB2-zGoED+H2=oQ@mail.gmail.com> <20190503092012.gb2zzqggb2igzs37@anna.jacobs.jacobs-university.de>
In-Reply-To: <20190503092012.gb2zzqggb2igzs37@anna.jacobs.jacobs-university.de>
From: Andy Bierman <andy@yumaworks.com>
Date: Fri, 3 May 2019 09:43:44 -0700
Message-ID: <CABCOCHQQDQMvphaxDmqjBvg3znhk-_7z2eGxU+qrfg8bL9eU1Q@mail.gmail.com>
To: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>, Andy Bierman <andy@yumaworks.com>, NetMod WG <netmod@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000d7238e0587fe749b"
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/CVhTlz3HXFe-Mdpzda1ctk66pJY>
Subject: Re: [netmod] validating a YANG action
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 May 2019 16:44:00 -0000

--000000000000d7238e0587fe749b
Content-Type: text/plain; charset="UTF-8"

On Fri, May 3, 2019 at 2:20 AM Juergen Schoenwaelder <
j.schoenwaelder@jacobs-university.de> wrote:

> On Fri, May 03, 2019 at 01:10:58AM -0700, Andy Bierman wrote:
> > On Thu, May 2, 2019 at 10:57 PM Juergen Schoenwaelder <
> > j.schoenwaelder@jacobs-university.de> wrote:
> >
> > > On Thu, May 02, 2019 at 04:15:28PM -0700, Andy Bierman wrote:
> > > > Hi,
> > > >
> > > > The text about invoking actions in RFC 7950, sec. 7.15 is not clear
> > > > about whether the ancestor data nodes have to exist.
> > > >
> > > > sec 7.15.2, para 2:
> > > >
> > > >    The <action> element contains a hierarchy of nodes that identifies
> > > > the node in the datastore.
> > > >
> > > >
> > > > The RFC does not say anything about if the data node is required to
> > > > exist or not.  There is no distinction between NP-container,
> P-container,
> > > > or list which are ancestors of the action node. It does not specify
> > > > which datastore, and that is not supplied in the <action> RPC.
> > > > The text specifies what must be in the <rpc> request, not in any
> > > datastore
> > > > or state data.
> > > >
> > > > It seems like the intent is that no instance test is specified at
> all and
> > > > the corresponding ancestor nodes to the action node do not have to
> > > > exist for the action to be invoked. (The action may succeed or fail).
> > > > The issue is whether there is an existence-test before invoking the
> > > action.
> > >
> > > We discussed actions during the work on NMDA. RFC 8342 has this text
> > > in section 6, in particular 6.1 says:
> > >
> > >    Actions are always invoked in the context of the operational state
> > >    datastore.  The node for which the action is invoked MUST exist in
> > >    the operational state datastore.
> > >
> > >
> > This only applies to a server implementing NMDA.
> > There is no requirement for a server implementing RFC 7950 to make this
> > test.
> >
>
> Yes, the behavior is unspecified in RFC 7950. However, note that RFC
> 8342 formally updates RFC 7950 and the Introduction section says:
>
>    This document updates RFC 7950 by refining the definition of the
>    accessible tree for some XML Path Language (XPath) context (see
>    Section 6.1) and the invocation context of operations (see
>    Section 6.2).
>
> This update may not affect your implementation but since you asked
> whether there is an existence-test before invoking the action, I
> thought a pointer to RFC 8342 is perhaps relevant.
>
>
OK, but the update wrt/ action invocation is irrelevant unless the server
implements the <operational> datastore.

This NMDA requirement means that a server MUST implement the
operational values of config=true ancestor data nodes in order to
implement an action nested within configuration.

If the server does not implement these operational values,
and follows YANG library guidelines by omitting
these ancestor schema nodes from the schema for <operational>,
then the YANG action is not accessible on the server.

I don't think the YANG Library RFC makes it clear that an action must exist
in the schema for <operational> in order for it to be accessible. This
should
be confirmed and an errata posted if needed.

This also means that any mechanism which disables configuration and
therefore
removes the corresponding data nodes from <operational>, also disables any
actions within that configuration.

The keystore thread has already discussed the rather awkward procedures
for waiting and confirming that <operational> has synched with <running>
before being able to invoke an action.

Maybe YANG 1.2 can fix this mess, or maybe new protocol operations are
needed.


/js
>
>
Andy


> --
> Juergen Schoenwaelder           Jacobs University Bremen gGmbH
> Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
> Fax:   +49 421 200 3103         <https://www.jacobs-university.de/>
>

--000000000000d7238e0587fe749b
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div dir=3D"ltr"><br></div><br><div class=3D"gmail_quote">=
<div dir=3D"ltr" class=3D"gmail_attr">On Fri, May 3, 2019 at 2:20 AM Juerge=
n Schoenwaelder &lt;<a href=3D"mailto:j.schoenwaelder@jacobs-university.de"=
>j.schoenwaelder@jacobs-university.de</a>&gt; wrote:<br></div><blockquote c=
lass=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px soli=
d rgb(204,204,204);padding-left:1ex">On Fri, May 03, 2019 at 01:10:58AM -07=
00, Andy Bierman wrote:<br>
&gt; On Thu, May 2, 2019 at 10:57 PM Juergen Schoenwaelder &lt;<br>
&gt; <a href=3D"mailto:j.schoenwaelder@jacobs-university.de" target=3D"_bla=
nk">j.schoenwaelder@jacobs-university.de</a>&gt; wrote:<br>
&gt; <br>
&gt; &gt; On Thu, May 02, 2019 at 04:15:28PM -0700, Andy Bierman wrote:<br>
&gt; &gt; &gt; Hi,<br>
&gt; &gt; &gt;<br>
&gt; &gt; &gt; The text about invoking actions in RFC 7950, sec. 7.15 is no=
t clear<br>
&gt; &gt; &gt; about whether the ancestor data nodes have to exist.<br>
&gt; &gt; &gt;<br>
&gt; &gt; &gt; sec 7.15.2, para 2:<br>
&gt; &gt; &gt;<br>
&gt; &gt; &gt;=C2=A0 =C2=A0 The &lt;action&gt; element contains a hierarchy=
 of nodes that identifies<br>
&gt; &gt; &gt; the node in the datastore.<br>
&gt; &gt; &gt;<br>
&gt; &gt; &gt;<br>
&gt; &gt; &gt; The RFC does not say anything about if the data node is requ=
ired to<br>
&gt; &gt; &gt; exist or not.=C2=A0 There is no distinction between NP-conta=
iner, P-container,<br>
&gt; &gt; &gt; or list which are ancestors of the action node. It does not =
specify<br>
&gt; &gt; &gt; which datastore, and that is not supplied in the &lt;action&=
gt; RPC.<br>
&gt; &gt; &gt; The text specifies what must be in the &lt;rpc&gt; request, =
not in any<br>
&gt; &gt; datastore<br>
&gt; &gt; &gt; or state data.<br>
&gt; &gt; &gt;<br>
&gt; &gt; &gt; It seems like the intent is that no instance test is specifi=
ed at all and<br>
&gt; &gt; &gt; the corresponding ancestor nodes to the action node do not h=
ave to<br>
&gt; &gt; &gt; exist for the action to be invoked. (The action may succeed =
or fail).<br>
&gt; &gt; &gt; The issue is whether there is an existence-test before invok=
ing the<br>
&gt; &gt; action.<br>
&gt; &gt;<br>
&gt; &gt; We discussed actions during the work on NMDA. RFC 8342 has this t=
ext<br>
&gt; &gt; in section 6, in particular 6.1 says:<br>
&gt; &gt;<br>
&gt; &gt;=C2=A0 =C2=A0 Actions are always invoked in the context of the ope=
rational state<br>
&gt; &gt;=C2=A0 =C2=A0 datastore.=C2=A0 The node for which the action is in=
voked MUST exist in<br>
&gt; &gt;=C2=A0 =C2=A0 the operational state datastore.<br>
&gt; &gt;<br>
&gt; &gt;<br>
&gt; This only applies to a server implementing NMDA.<br>
&gt; There is no requirement for a server implementing RFC 7950 to make thi=
s<br>
&gt; test.<br>
&gt;<br>
<br>
Yes, the behavior is unspecified in RFC 7950. However, note that RFC<br>
8342 formally updates RFC 7950 and the Introduction section says:<br>
<br>
=C2=A0 =C2=A0This document updates RFC 7950 by refining the definition of t=
he<br>
=C2=A0 =C2=A0accessible tree for some XML Path Language (XPath) context (se=
e<br>
=C2=A0 =C2=A0Section 6.1) and the invocation context of operations (see<br>
=C2=A0 =C2=A0Section 6.2).<br>
<br>
This update may not affect your implementation but since you asked<br>
whether there is an existence-test before invoking the action, I<br>
thought a pointer to RFC 8342 is perhaps relevant.<br>
<br></blockquote><div><br></div><div>OK, but the update wrt/ action invocat=
ion is irrelevant unless the server</div><div>implements the &lt;operationa=
l&gt; datastore.</div><div><br></div><div>This NMDA requirement means that =
a server MUST implement the</div><div>operational values of config=3Dtrue a=
ncestor data nodes in order to</div><div>implement an action nested within =
configuration.</div><div><br></div><div>If the server does not implement th=
ese operational values,</div><div>and follows YANG library guidelines by om=
itting</div><div>these ancestor schema nodes from the schema for &lt;operat=
ional&gt;,</div><div>then the YANG action is not accessible on the server.<=
/div><div><br></div><div>I don&#39;t think the YANG Library RFC makes it cl=
ear that an action must exist</div><div>in the schema for &lt;operational&g=
t; in order for it to be accessible. This should</div><div>be confirmed and=
 an errata posted if needed.</div><div><br></div><div>This also means that =
any mechanism which disables configuration and therefore</div><div>removes =
the corresponding data nodes from &lt;operational&gt;, also disables any</d=
iv><div>actions within that configuration.</div><div><br></div><div>The key=
store thread has already discussed the rather awkward procedures</div><div>=
for waiting and confirming that &lt;operational&gt; has synched with &lt;ru=
nning&gt;</div><div>before being able to invoke an action.</div><div><br></=
div><div>Maybe YANG 1.2 can fix this mess, or maybe new protocol operations=
 are needed.</div><div><br></div><div><br></div><blockquote class=3D"gmail_=
quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,=
204);padding-left:1ex">
/js<br>
<br></blockquote><div><br></div><div>Andy</div><div>=C2=A0</div><blockquote=
 class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px so=
lid rgb(204,204,204);padding-left:1ex">
-- <br>
Juergen Schoenwaelder=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0Jacobs Univer=
sity Bremen gGmbH<br>
Phone: +49 421 200 3587=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0Campus Ring 1 | 28=
759 Bremen | Germany<br>
Fax:=C2=A0 =C2=A0+49 421 200 3103=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0&lt;<a h=
ref=3D"https://www.jacobs-university.de/" rel=3D"noreferrer" target=3D"_bla=
nk">https://www.jacobs-university.de/</a>&gt;<br>
</blockquote></div></div>

--000000000000d7238e0587fe749b--


From nobody Fri May  3 09:54:06 2019
Return-Path: <j.schoenwaelder@jacobs-university.de>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BA3E412022B for <netmod@ietfa.amsl.com>; Fri,  3 May 2019 09:53:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id URgyRyg9u3wT for <netmod@ietfa.amsl.com>; Fri,  3 May 2019 09:53:50 -0700 (PDT)
Received: from atlas5.jacobs-university.de (atlas5.jacobs-university.de [212.201.44.20]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D865A12021B for <netmod@ietf.org>; Fri,  3 May 2019 09:53:49 -0700 (PDT)
Received: from localhost (demetrius5.irc-it.jacobs-university.de [10.70.0.222]) by atlas5.jacobs-university.de (Postfix) with ESMTP id B725DB23; Fri,  3 May 2019 18:53:47 +0200 (CEST)
X-Virus-Scanned: amavisd-new at jacobs-university.de
Received: from atlas5.jacobs-university.de ([10.70.0.217]) by localhost (demetrius5.jacobs-university.de [10.70.0.222]) (amavisd-new, port 10032) with ESMTP id JRXGlTGjyqUL; Fri,  3 May 2019 18:53:47 +0200 (CEST)
Received: from hermes.jacobs-university.de (hermes.jacobs-university.de [212.201.44.23]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "hermes.jacobs-university.de", Issuer "Jacobs University CA - G01" (verified OK)) by atlas5.jacobs-university.de (Postfix) with ESMTPS; Fri,  3 May 2019 18:53:47 +0200 (CEST)
Received: from localhost (demetrius5.irc-it.jacobs-university.de [10.70.0.222]) by hermes.jacobs-university.de (Postfix) with ESMTP id 783D6200E9; Fri,  3 May 2019 18:53:47 +0200 (CEST)
X-Virus-Scanned: amavisd-new at jacobs-university.de
Received: from hermes.jacobs-university.de ([212.201.44.23]) by localhost (demetrius5.jacobs-university.de [10.70.0.222]) (amavisd-new, port 10028) with ESMTP id 4CjT1cPIJXIQ; Fri,  3 May 2019 18:53:47 +0200 (CEST)
Received: from exchange.jacobs-university.de (sxchmb04.jacobs.jacobs-university.de [10.70.0.156]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "exchange.jacobs-university.de", Issuer "DFN-Verein Global Issuing CA" (verified OK)) by hermes.jacobs-university.de (Postfix) with ESMTPS id 10785200E8; Fri,  3 May 2019 18:53:47 +0200 (CEST)
Received: from anna.localdomain (10.50.218.117) by sxchmb03.jacobs.jacobs-university.de (10.70.0.155) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.1713.5; Fri, 3 May 2019 18:53:46 +0200
Received: by anna.localdomain (Postfix, from userid 501) id 31BBB3008BE2C0; Fri,  3 May 2019 18:53:45 +0200 (CEST)
Date: Fri, 3 May 2019 18:53:45 +0200
From: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
To: Andy Bierman <andy@yumaworks.com>
CC: NetMod WG <netmod@ietf.org>
Message-ID: <20190503165345.spvrfu4zkin7er4y@anna.jacobs.jacobs-university.de>
Reply-To: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
Mail-Followup-To: Andy Bierman <andy@yumaworks.com>, NetMod WG <netmod@ietf.org>
References: <CABCOCHS-nwPfgF-NCNqp5tdS=G3Fz_9s7RkvGNvHbLVq=jYCsg@mail.gmail.com> <20190503055724.723voy7swdito3bv@anna.jacobs.jacobs-university.de> <CABCOCHThV5=re8-Mv8S0aLnFDrUoXvr_9nOgB2-zGoED+H2=oQ@mail.gmail.com> <20190503092012.gb2zzqggb2igzs37@anna.jacobs.jacobs-university.de> <CABCOCHQQDQMvphaxDmqjBvg3znhk-_7z2eGxU+qrfg8bL9eU1Q@mail.gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <CABCOCHQQDQMvphaxDmqjBvg3znhk-_7z2eGxU+qrfg8bL9eU1Q@mail.gmail.com>
User-Agent: NeoMutt/20180716
X-ClientProxiedBy: SXCHMB03.jacobs.jacobs-university.de (10.70.0.155) To sxchmb03.jacobs.jacobs-university.de (10.70.0.155)
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/FQcugtSrByMVvUIFP3bMrAMhujE>
Subject: Re: [netmod] validating a YANG action
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 May 2019 16:53:54 -0000

On Fri, May 03, 2019 at 09:43:44AM -0700, Andy Bierman wrote:
> On Fri, May 3, 2019 at 2:20 AM Juergen Schoenwaelder <
> j.schoenwaelder@jacobs-university.de> wrote:
> 
> > On Fri, May 03, 2019 at 01:10:58AM -0700, Andy Bierman wrote:
> > > On Thu, May 2, 2019 at 10:57 PM Juergen Schoenwaelder <
> > > j.schoenwaelder@jacobs-university.de> wrote:
> > >
> > > > On Thu, May 02, 2019 at 04:15:28PM -0700, Andy Bierman wrote:
> > > > > Hi,
> > > > >
> > > > > The text about invoking actions in RFC 7950, sec. 7.15 is not clear
> > > > > about whether the ancestor data nodes have to exist.
> > > > >
> > > > > sec 7.15.2, para 2:
> > > > >
> > > > >    The <action> element contains a hierarchy of nodes that identifies
> > > > > the node in the datastore.
> > > > >
> > > > >
> > > > > The RFC does not say anything about if the data node is required to
> > > > > exist or not.  There is no distinction between NP-container,
> > P-container,
> > > > > or list which are ancestors of the action node. It does not specify
> > > > > which datastore, and that is not supplied in the <action> RPC.
> > > > > The text specifies what must be in the <rpc> request, not in any
> > > > datastore
> > > > > or state data.
> > > > >
> > > > > It seems like the intent is that no instance test is specified at
> > all and
> > > > > the corresponding ancestor nodes to the action node do not have to
> > > > > exist for the action to be invoked. (The action may succeed or fail).
> > > > > The issue is whether there is an existence-test before invoking the
> > > > action.
> > > >
> > > > We discussed actions during the work on NMDA. RFC 8342 has this text
> > > > in section 6, in particular 6.1 says:
> > > >
> > > >    Actions are always invoked in the context of the operational state
> > > >    datastore.  The node for which the action is invoked MUST exist in
> > > >    the operational state datastore.
> > > >
> > > >
> > > This only applies to a server implementing NMDA.
> > > There is no requirement for a server implementing RFC 7950 to make this
> > > test.
> > >
> >
> > Yes, the behavior is unspecified in RFC 7950. However, note that RFC
> > 8342 formally updates RFC 7950 and the Introduction section says:
> >
> >    This document updates RFC 7950 by refining the definition of the
> >    accessible tree for some XML Path Language (XPath) context (see
> >    Section 6.1) and the invocation context of operations (see
> >    Section 6.2).
> >
> > This update may not affect your implementation but since you asked
> > whether there is an existence-test before invoking the action, I
> > thought a pointer to RFC 8342 is perhaps relevant.
> >
> >
> OK, but the update wrt/ action invocation is irrelevant unless the server
> implements the <operational> datastore.
> 
> This NMDA requirement means that a server MUST implement the
> operational values of config=true ancestor data nodes in order to
> implement an action nested within configuration.
> 
> If the server does not implement these operational values,
> and follows YANG library guidelines by omitting
> these ancestor schema nodes from the schema for <operational>,
> then the YANG action is not accessible on the server.
> 
> I don't think the YANG Library RFC makes it clear that an action must exist
> in the schema for <operational> in order for it to be accessible. This
> should be confirmed and an errata posted if needed.

I am not sure which text you propose or why YANG Library should say
something specific.

> This also means that any mechanism which disables configuration and
> therefore removes the corresponding data nodes from <operational>,
> also disables any actions within that configuration.

I think the model is that you invoke an action on an existing
resource.

> The keystore thread has already discussed the rather awkward procedures
> for waiting and confirming that <operational> has synched with <running>
> before being able to invoke an action.

Lets see what comes out of the discussion.

> Maybe YANG 1.2 can fix this mess, or maybe new protocol operations are
> needed.

It is not clear yet to me what 'this mess' is and hence what needs fixing.

/js

-- 
Juergen Schoenwaelder           Jacobs University Bremen gGmbH
Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
Fax:   +49 421 200 3103         <https://www.jacobs-university.de/>


From nobody Fri May  3 10:17:38 2019
Return-Path: <andy@yumaworks.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 85C231202DC for <netmod@ietfa.amsl.com>; Fri,  3 May 2019 10:17:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=yumaworks-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Zb7CQrWV_FWK for <netmod@ietfa.amsl.com>; Fri,  3 May 2019 10:17:34 -0700 (PDT)
Received: from mail-lj1-x244.google.com (mail-lj1-x244.google.com [IPv6:2a00:1450:4864:20::244]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7223D1202CD for <netmod@ietf.org>; Fri,  3 May 2019 10:17:33 -0700 (PDT)
Received: by mail-lj1-x244.google.com with SMTP id s7so436231ljh.1 for <netmod@ietf.org>; Fri, 03 May 2019 10:17:33 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yumaworks-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to; bh=9yOU/slM8/lx9nstbfno0aCvlD/9MvHBT5TXitmhfqM=; b=wuiwRj+waU6yvvKG/X9XOEJIcZESY/Fjh6auKW9LA3PxePeO4c8zelJ/GZhrlJ8Rop mD/qgJV+5JNGK36fBNF81Jid+QUb9BpOAvRHaEcQyMii2Ga9tQGuBT4n2b8d/1K59iqG VuLsVokLFMiONrlCOAkgkAgB1sCfGwz6E/pZ90tIWv4+U9qjF/+/l4QoIad/2lZxK2cu eRjBAp6DxK0Ve0HlqSb5FsF1uXtLP4GB6jFXv0DeNa+p13994YgBideid44envLXGuOb VeR7RzK0lO5SjWmOfpnavx+vJq2aqR4L1+5cWoGwEusd1ewVT5EoKYPs5k1p9rukpTRu xNDw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to; bh=9yOU/slM8/lx9nstbfno0aCvlD/9MvHBT5TXitmhfqM=; b=rVyufxrfG6YUp7yr7BMmfoy44StP8JQ6Qh5scRy2bktrAsI4b2OwYiNi86pEFzjlhi OQMwLpVOatB13AmrjD+V+9fBfUPpljX3kTs1btaBuFmHOsG13Fr7uGTyPNyguNUFXVir ni1vIOMIWDbcM63BZPY78sQ1ZrQp09KHO8P/QkfNeWLk1yRBGOYxOUwarbf11QyLRd9Y JRlWI/i1YbmTjykAdnFxZUbTInJg5/htPl+or/SpEB7UY323H9nwhFLYQ4vQH7jGAQEb 0F48q+ZlQvMSi9NwyNZPygEzH5/YS1KXmnhFq9YpabSW7WaNUF2CaOVdoUiJwZXTzWFR 1jUQ==
X-Gm-Message-State: APjAAAXnOf6UNWFYW1l7hwyOoRyHaGHG7UWlso7hquNeTCYpBLoR7yh8 ZK6HHbDAUS8NKMq3sI5+JwPJd4ak/oYLoL75kCccAw==
X-Google-Smtp-Source: APXvYqwzdzlRd4vd/6RT2nD0TsY8k7PkBrV8Or4R1xzmeannXZzHwzTnSs2D1b8J/7zlz74shQx/9EiZ2GraTNS27vA=
X-Received: by 2002:a2e:9855:: with SMTP id e21mr983768ljj.180.1556903851514;  Fri, 03 May 2019 10:17:31 -0700 (PDT)
MIME-Version: 1.0
References: <CABCOCHS-nwPfgF-NCNqp5tdS=G3Fz_9s7RkvGNvHbLVq=jYCsg@mail.gmail.com> <20190503055724.723voy7swdito3bv@anna.jacobs.jacobs-university.de> <CABCOCHThV5=re8-Mv8S0aLnFDrUoXvr_9nOgB2-zGoED+H2=oQ@mail.gmail.com> <20190503092012.gb2zzqggb2igzs37@anna.jacobs.jacobs-university.de> <CABCOCHQQDQMvphaxDmqjBvg3znhk-_7z2eGxU+qrfg8bL9eU1Q@mail.gmail.com> <20190503165345.spvrfu4zkin7er4y@anna.jacobs.jacobs-university.de>
In-Reply-To: <20190503165345.spvrfu4zkin7er4y@anna.jacobs.jacobs-university.de>
From: Andy Bierman <andy@yumaworks.com>
Date: Fri, 3 May 2019 10:17:20 -0700
Message-ID: <CABCOCHQtymQN_ZoQFC19U2S=5BX_1WrPXRrNni7nv+owAVxw_A@mail.gmail.com>
To: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>, Andy Bierman <andy@yumaworks.com>, NetMod WG <netmod@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000004f5b50587feedf3"
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/q_bNvZ_apzYSLTHAOsuuZGc_Tks>
Subject: Re: [netmod] validating a YANG action
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 May 2019 17:17:36 -0000

--00000000000004f5b50587feedf3
Content-Type: text/plain; charset="UTF-8"

On Fri, May 3, 2019 at 9:53 AM Juergen Schoenwaelder <
j.schoenwaelder@jacobs-university.de> wrote:

> On Fri, May 03, 2019 at 09:43:44AM -0700, Andy Bierman wrote:
> > On Fri, May 3, 2019 at 2:20 AM Juergen Schoenwaelder <
> > j.schoenwaelder@jacobs-university.de> wrote:
> >
> > > On Fri, May 03, 2019 at 01:10:58AM -0700, Andy Bierman wrote:
> > > > On Thu, May 2, 2019 at 10:57 PM Juergen Schoenwaelder <
> > > > j.schoenwaelder@jacobs-university.de> wrote:
> > > >
> > > > > On Thu, May 02, 2019 at 04:15:28PM -0700, Andy Bierman wrote:
> > > > > > Hi,
> > > > > >
> > > > > > The text about invoking actions in RFC 7950, sec. 7.15 is not
> clear
> > > > > > about whether the ancestor data nodes have to exist.
> > > > > >
> > > > > > sec 7.15.2, para 2:
> > > > > >
> > > > > >    The <action> element contains a hierarchy of nodes that
> identifies
> > > > > > the node in the datastore.
> > > > > >
> > > > > >
> > > > > > The RFC does not say anything about if the data node is required
> to
> > > > > > exist or not.  There is no distinction between NP-container,
> > > P-container,
> > > > > > or list which are ancestors of the action node. It does not
> specify
> > > > > > which datastore, and that is not supplied in the <action> RPC.
> > > > > > The text specifies what must be in the <rpc> request, not in any
> > > > > datastore
> > > > > > or state data.
> > > > > >
> > > > > > It seems like the intent is that no instance test is specified at
> > > all and
> > > > > > the corresponding ancestor nodes to the action node do not have
> to
> > > > > > exist for the action to be invoked. (The action may succeed or
> fail).
> > > > > > The issue is whether there is an existence-test before invoking
> the
> > > > > action.
> > > > >
> > > > > We discussed actions during the work on NMDA. RFC 8342 has this
> text
> > > > > in section 6, in particular 6.1 says:
> > > > >
> > > > >    Actions are always invoked in the context of the operational
> state
> > > > >    datastore.  The node for which the action is invoked MUST exist
> in
> > > > >    the operational state datastore.
> > > > >
> > > > >
> > > > This only applies to a server implementing NMDA.
> > > > There is no requirement for a server implementing RFC 7950 to make
> this
> > > > test.
> > > >
> > >
> > > Yes, the behavior is unspecified in RFC 7950. However, note that RFC
> > > 8342 formally updates RFC 7950 and the Introduction section says:
> > >
> > >    This document updates RFC 7950 by refining the definition of the
> > >    accessible tree for some XML Path Language (XPath) context (see
> > >    Section 6.1) and the invocation context of operations (see
> > >    Section 6.2).
> > >
> > > This update may not affect your implementation but since you asked
> > > whether there is an existence-test before invoking the action, I
> > > thought a pointer to RFC 8342 is perhaps relevant.
> > >
> > >
> > OK, but the update wrt/ action invocation is irrelevant unless the server
> > implements the <operational> datastore.
> >
> > This NMDA requirement means that a server MUST implement the
> > operational values of config=true ancestor data nodes in order to
> > implement an action nested within configuration.
> >
> > If the server does not implement these operational values,
> > and follows YANG library guidelines by omitting
> > these ancestor schema nodes from the schema for <operational>,
> > then the YANG action is not accessible on the server.
> >
> > I don't think the YANG Library RFC makes it clear that an action must
> exist
> > in the schema for <operational> in order for it to be accessible. This
> > should be confirmed and an errata posted if needed.
>
> I am not sure which text you propose or why YANG Library should say
> something specific.
>
> > This also means that any mechanism which disables configuration and
> > therefore removes the corresponding data nodes from <operational>,
> > also disables any actions within that configuration.
>
> I think the model is that you invoke an action on an existing
> resource.
>
> > The keystore thread has already discussed the rather awkward procedures
> > for waiting and confirming that <operational> has synched with <running>
> > before being able to invoke an action.
>
> Lets see what comes out of the discussion.
>
> > Maybe YANG 1.2 can fix this mess, or maybe new protocol operations are
> > needed.
>
> It is not clear yet to me what 'this mess' is and hence what needs fixing.
>
>
The "mess" is that NMDA declared an action is always invoked in
<operational>
and this creates extra implementation burdens and complexity for clients
and servers.


> /js
>
>
Andy


> --
> Juergen Schoenwaelder           Jacobs University Bremen gGmbH
> Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
> Fax:   +49 421 200 3103         <https://www.jacobs-university.de/>
>

--00000000000004f5b50587feedf3
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div dir=3D"ltr"><br></div><br><div class=3D"gmail_quote">=
<div dir=3D"ltr" class=3D"gmail_attr">On Fri, May 3, 2019 at 9:53 AM Juerge=
n Schoenwaelder &lt;<a href=3D"mailto:j.schoenwaelder@jacobs-university.de"=
>j.schoenwaelder@jacobs-university.de</a>&gt; wrote:<br></div><blockquote c=
lass=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px soli=
d rgb(204,204,204);padding-left:1ex">On Fri, May 03, 2019 at 09:43:44AM -07=
00, Andy Bierman wrote:<br>
&gt; On Fri, May 3, 2019 at 2:20 AM Juergen Schoenwaelder &lt;<br>
&gt; <a href=3D"mailto:j.schoenwaelder@jacobs-university.de" target=3D"_bla=
nk">j.schoenwaelder@jacobs-university.de</a>&gt; wrote:<br>
&gt; <br>
&gt; &gt; On Fri, May 03, 2019 at 01:10:58AM -0700, Andy Bierman wrote:<br>
&gt; &gt; &gt; On Thu, May 2, 2019 at 10:57 PM Juergen Schoenwaelder &lt;<b=
r>
&gt; &gt; &gt; <a href=3D"mailto:j.schoenwaelder@jacobs-university.de" targ=
et=3D"_blank">j.schoenwaelder@jacobs-university.de</a>&gt; wrote:<br>
&gt; &gt; &gt;<br>
&gt; &gt; &gt; &gt; On Thu, May 02, 2019 at 04:15:28PM -0700, Andy Bierman =
wrote:<br>
&gt; &gt; &gt; &gt; &gt; Hi,<br>
&gt; &gt; &gt; &gt; &gt;<br>
&gt; &gt; &gt; &gt; &gt; The text about invoking actions in RFC 7950, sec. =
7.15 is not clear<br>
&gt; &gt; &gt; &gt; &gt; about whether the ancestor data nodes have to exis=
t.<br>
&gt; &gt; &gt; &gt; &gt;<br>
&gt; &gt; &gt; &gt; &gt; sec 7.15.2, para 2:<br>
&gt; &gt; &gt; &gt; &gt;<br>
&gt; &gt; &gt; &gt; &gt;=C2=A0 =C2=A0 The &lt;action&gt; element contains a=
 hierarchy of nodes that identifies<br>
&gt; &gt; &gt; &gt; &gt; the node in the datastore.<br>
&gt; &gt; &gt; &gt; &gt;<br>
&gt; &gt; &gt; &gt; &gt;<br>
&gt; &gt; &gt; &gt; &gt; The RFC does not say anything about if the data no=
de is required to<br>
&gt; &gt; &gt; &gt; &gt; exist or not.=C2=A0 There is no distinction betwee=
n NP-container,<br>
&gt; &gt; P-container,<br>
&gt; &gt; &gt; &gt; &gt; or list which are ancestors of the action node. It=
 does not specify<br>
&gt; &gt; &gt; &gt; &gt; which datastore, and that is not supplied in the &=
lt;action&gt; RPC.<br>
&gt; &gt; &gt; &gt; &gt; The text specifies what must be in the &lt;rpc&gt;=
 request, not in any<br>
&gt; &gt; &gt; &gt; datastore<br>
&gt; &gt; &gt; &gt; &gt; or state data.<br>
&gt; &gt; &gt; &gt; &gt;<br>
&gt; &gt; &gt; &gt; &gt; It seems like the intent is that no instance test =
is specified at<br>
&gt; &gt; all and<br>
&gt; &gt; &gt; &gt; &gt; the corresponding ancestor nodes to the action nod=
e do not have to<br>
&gt; &gt; &gt; &gt; &gt; exist for the action to be invoked. (The action ma=
y succeed or fail).<br>
&gt; &gt; &gt; &gt; &gt; The issue is whether there is an existence-test be=
fore invoking the<br>
&gt; &gt; &gt; &gt; action.<br>
&gt; &gt; &gt; &gt;<br>
&gt; &gt; &gt; &gt; We discussed actions during the work on NMDA. RFC 8342 =
has this text<br>
&gt; &gt; &gt; &gt; in section 6, in particular 6.1 says:<br>
&gt; &gt; &gt; &gt;<br>
&gt; &gt; &gt; &gt;=C2=A0 =C2=A0 Actions are always invoked in the context =
of the operational state<br>
&gt; &gt; &gt; &gt;=C2=A0 =C2=A0 datastore.=C2=A0 The node for which the ac=
tion is invoked MUST exist in<br>
&gt; &gt; &gt; &gt;=C2=A0 =C2=A0 the operational state datastore.<br>
&gt; &gt; &gt; &gt;<br>
&gt; &gt; &gt; &gt;<br>
&gt; &gt; &gt; This only applies to a server implementing NMDA.<br>
&gt; &gt; &gt; There is no requirement for a server implementing RFC 7950 t=
o make this<br>
&gt; &gt; &gt; test.<br>
&gt; &gt; &gt;<br>
&gt; &gt;<br>
&gt; &gt; Yes, the behavior is unspecified in RFC 7950. However, note that =
RFC<br>
&gt; &gt; 8342 formally updates RFC 7950 and the Introduction section says:=
<br>
&gt; &gt;<br>
&gt; &gt;=C2=A0 =C2=A0 This document updates RFC 7950 by refining the defin=
ition of the<br>
&gt; &gt;=C2=A0 =C2=A0 accessible tree for some XML Path Language (XPath) c=
ontext (see<br>
&gt; &gt;=C2=A0 =C2=A0 Section 6.1) and the invocation context of operation=
s (see<br>
&gt; &gt;=C2=A0 =C2=A0 Section 6.2).<br>
&gt; &gt;<br>
&gt; &gt; This update may not affect your implementation but since you aske=
d<br>
&gt; &gt; whether there is an existence-test before invoking the action, I<=
br>
&gt; &gt; thought a pointer to RFC 8342 is perhaps relevant.<br>
&gt; &gt;<br>
&gt; &gt;<br>
&gt; OK, but the update wrt/ action invocation is irrelevant unless the ser=
ver<br>
&gt; implements the &lt;operational&gt; datastore.<br>
&gt; <br>
&gt; This NMDA requirement means that a server MUST implement the<br>
&gt; operational values of config=3Dtrue ancestor data nodes in order to<br=
>
&gt; implement an action nested within configuration.<br>
&gt; <br>
&gt; If the server does not implement these operational values,<br>
&gt; and follows YANG library guidelines by omitting<br>
&gt; these ancestor schema nodes from the schema for &lt;operational&gt;,<b=
r>
&gt; then the YANG action is not accessible on the server.<br>
&gt; <br>
&gt; I don&#39;t think the YANG Library RFC makes it clear that an action m=
ust exist<br>
&gt; in the schema for &lt;operational&gt; in order for it to be accessible=
. This<br>
&gt; should be confirmed and an errata posted if needed.<br>
<br>
I am not sure which text you propose or why YANG Library should say<br>
something specific.<br>
<br>
&gt; This also means that any mechanism which disables configuration and<br=
>
&gt; therefore removes the corresponding data nodes from &lt;operational&gt=
;,<br>
&gt; also disables any actions within that configuration.<br>
<br>
I think the model is that you invoke an action on an existing<br>
resource.<br>
<br>
&gt; The keystore thread has already discussed the rather awkward procedure=
s<br>
&gt; for waiting and confirming that &lt;operational&gt; has synched with &=
lt;running&gt;<br>
&gt; before being able to invoke an action.<br>
<br>
Lets see what comes out of the discussion.<br>
<br>
&gt; Maybe YANG 1.2 can fix this mess, or maybe new protocol operations are=
<br>
&gt; needed.<br>
<br>
It is not clear yet to me what &#39;this mess&#39; is and hence what needs =
fixing.<br>
<br></blockquote><div><br></div><div>The &quot;mess&quot; is that NMDA decl=
ared an action is always invoked in &lt;operational&gt;</div><div>and this =
creates extra implementation burdens and complexity for clients and servers=
.</div><div>=C2=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0=
px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
/js<br>
<br></blockquote><div><br></div><div>Andy</div><div>=C2=A0</div><blockquote=
 class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px so=
lid rgb(204,204,204);padding-left:1ex">
-- <br>
Juergen Schoenwaelder=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0Jacobs Univer=
sity Bremen gGmbH<br>
Phone: +49 421 200 3587=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0Campus Ring 1 | 28=
759 Bremen | Germany<br>
Fax:=C2=A0 =C2=A0+49 421 200 3103=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0&lt;<a h=
ref=3D"https://www.jacobs-university.de/" rel=3D"noreferrer" target=3D"_bla=
nk">https://www.jacobs-university.de/</a>&gt;<br>
</blockquote></div></div>

--00000000000004f5b50587feedf3--


From nobody Fri May  3 10:48:59 2019
Return-Path: <chopps@chopps.org>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F411D120077; Fri,  3 May 2019 10:48:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id R0vs1qZ-Qb5m; Fri,  3 May 2019 10:48:48 -0700 (PDT)
Received: from smtp.chopps.org (smtp.chopps.org [54.88.81.56]) by ietfa.amsl.com (Postfix) with ESMTP id DDEB0120020; Fri,  3 May 2019 10:48:47 -0700 (PDT)
Received: from stubbs.int.chopps.org (047-050-069-038.biz.spectrum.com [47.50.69.38]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by smtp.chopps.org (Postfix) with ESMTPSA id 0C3E16019B; Fri,  3 May 2019 13:48:46 -0400 (EDT)
From: Christian Hopps <chopps@chopps.org>
Message-Id: <F31D9718-4D27-4400-A99E-A2BF8E1BF636@chopps.org>
Content-Type: multipart/signed; boundary="Apple-Mail=_52A404BE-FDA3-4D8A-86E4-A072146EB09C"; protocol="application/pgp-signature"; micalg=pgp-sha512
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.8\))
Date: Fri, 3 May 2019 13:48:45 -0400
In-Reply-To: <155499058804.22746.2191211977799773380.idtracker@ietfa.amsl.com>
Cc: Christian Hopps <chopps@chopps.org>, The IESG <iesg@ietf.org>, netmod-chairs@ietf.org, joelja@gmail.com, draft-ietf-netmod-module-tags@ietf.org, netmod@ietf.org
To: Benjamin Kaduk <kaduk@mit.edu>
References: <155499058804.22746.2191211977799773380.idtracker@ietfa.amsl.com>
X-Mailer: Apple Mail (2.3445.104.8)
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/66CS6xn6AsvW4inA-xplPYP1C_k>
Subject: Re: [netmod] Benjamin Kaduk's Discuss on draft-ietf-netmod-module-tags-07: (with DISCUSS and COMMENT)
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 May 2019 17:48:50 -0000

--Apple-Mail=_52A404BE-FDA3-4D8A-86E4-A072146EB09C
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii



> On Apr 11, 2019, at 9:49 AM, Benjamin Kaduk via Datatracker =
<noreply@ietf.org> wrote:
>=20
> ----------------------------------------------------------------------
> DISCUSS:
> ----------------------------------------------------------------------
>=20
> I think this document does introduce new security considerations,
> specifically the ability for one user to remove ("mask") tags from =
being
> visible to other users.  A malicious user could interfere with the
> operations of other users/entities, especially in the case mentioned =
in
> an example where multiple semi-independent clients use tags to =
indicate
> modules to avoid that may be broken.

So here was the thinking on this, since this document doesn't define any =
actions or behaviors based on tags (or the lack of them) it's hard to =
talk about what the security considerations would be. However, it is =
expected that to be useful users (or future specifications) *will* =
define behaviors based on tag use. The security section does talk about =
this case:

"
   Users of the tag-meta data may define various actions to be taken
   based on the tag meta-data.  These actions and their definitions are
   outside the scope of this document.  Users will need to consider the
   security implications of any actions they choose to define.
"

Which I believe covered this. For example, if an RFC were to define a =
behavior based on the tag presence then it would need to talk about the =
security concerns with that behavior.

If this doesn't adequately cover your concern though, do you have a bit =
of suggested text we could add?

> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------

>=20
> Section 2
>=20
> Similarly to Alissa's DISCUSS, perhaps "registered prefix" is better
> than "standard prefix".
>=20
> Section 2.4
>=20
> Similarly, "future registration" or "future use" seem to be better =
fits
> for the intended sentiment.
>=20
> Section 3.2
>=20
> I may be misreading, but this seems to be encouraging implementations =
to
> add new ietf:-prefixed tags that are not necessarily registered or
> specified in IETF-consensus documents.
>=20
> Section 7.2
>=20
>   This registry allocates prefixes that have the standard prefix
>   "ietf:".  [...]
>=20
> The registry name just talks about "tags"; are we really allocating
> *prefix*es?
>=20

Fixed these, thanks.

Chris.



>=20
> _______________________________________________
> netmod mailing list
> netmod@ietf.org
> https://www.ietf.org/mailman/listinfo/netmod
>=20


--Apple-Mail=_52A404BE-FDA3-4D8A-86E4-A072146EB09C
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment;
	filename=signature.asc
Content-Type: application/pgp-signature;
	name=signature.asc
Content-Description: Message signed with OpenPGP

-----BEGIN PGP SIGNATURE-----
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=3gpn
-----END PGP SIGNATURE-----

--Apple-Mail=_52A404BE-FDA3-4D8A-86E4-A072146EB09C--


From nobody Fri May  3 11:48:51 2019
Return-Path: <chopps@chopps.org>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 610B61202DB; Fri,  3 May 2019 11:48:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fTOmqg_i0s2D; Fri,  3 May 2019 11:48:39 -0700 (PDT)
Received: from smtp.chopps.org (smtp.chopps.org [54.88.81.56]) by ietfa.amsl.com (Postfix) with ESMTP id EA92E1202D9; Fri,  3 May 2019 11:48:33 -0700 (PDT)
Received: from stubbs.int.chopps.org (047-050-069-038.biz.spectrum.com [47.50.69.38]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by smtp.chopps.org (Postfix) with ESMTPSA id 31F396019B; Fri,  3 May 2019 14:48:33 -0400 (EDT)
From: Christian Hopps <chopps@chopps.org>
Message-Id: <564CFD6F-4540-4AF4-B2CA-0F119E3EA115@chopps.org>
Content-Type: multipart/signed; boundary="Apple-Mail=_7D383906-6D8E-4253-863D-0D47465AD531"; protocol="application/pgp-signature"; micalg=pgp-sha512
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.8\))
Date: Fri, 3 May 2019 14:48:31 -0400
In-Reply-To: <155498943168.25264.4759466648827930694.idtracker@ietfa.amsl.com>
Cc: Christian Hopps <chopps@chopps.org>, The IESG <iesg@ietf.org>, draft-ietf-netmod-module-tags@ietf.org, Joel Jaeggli <joelja@gmail.com>, NetMod WG Chairs <netmod-chairs@ietf.org>, netmod@ietf.org
To: Alvaro Retana <aretana.ietf@gmail.com>
References: <155498943168.25264.4759466648827930694.idtracker@ietfa.amsl.com>
X-Mailer: Apple Mail (2.3445.104.8)
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/RvBc2gHW3cDnERWBuHP671yktZ8>
Subject: Re: [netmod] Alvaro Retana's No Objection on draft-ietf-netmod-module-tags-07: (with COMMENT)
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 May 2019 18:48:42 -0000

--Apple-Mail=_7D383906-6D8E-4253-863D-0D47465AD531
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8



> On Apr 11, 2019, at 9:30 AM, Alvaro Retana via Datatracker =
<noreply@ietf.org> wrote:
>=20
> Alvaro Retana has entered the following ballot position for
> draft-ietf-netmod-module-tags-07: No Objection
>=20
> When responding, please keep the subject line intact and reply to all
> email addresses included in the To and CC lines. (Feel free to cut =
this
> introductory paragraph, however.)
>=20
>=20
> Please refer to =
https://www.ietf.org/iesg/statement/discuss-criteria.html
> for more information about IESG DISCUSS and COMMENT positions.
>=20
>=20
> The document, along with other ballot positions, can be found here:
> https://datatracker.ietf.org/doc/draft-ietf-netmod-module-tags/
>=20
>=20
>=20
> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
>=20
> (1) Along the same lines of Alissa's DISCUSS, which I support.
>=20
> =C2=A76.1: "For standardized modules new tags MUST be assigned in the =
IANA registry
> defined below, see Section 7.2."  What is a "standardized module"?  It =
sounds
> like a Standards Track document, but (as Alissa pointed out) the =
registration
> policy is only IETF Review.

In addressing the other DISCUSS/COMMENTs almost all (but not all) use of =
the word "standard tag"/"standardized tag" has switched to some variant =
of "registered tag". That said, the intention here is what you read: =
it's saying if you are defining a module in a standard's track document =
then any new tags you create MUST be added to the IANA registry. This =
doesn't contradict the IANA registry policy of IETF review (i.e., it's =
not talking about or trying to constrain the registration policy). =
Consider a case of a info doc that is documenting some odd or misuse of =
tags, we don't want to require that this doc register the "odd" or =
misused case in the registry -- it could, but it's not required.

>=20
> (2) =C2=A77.1: "All YANG module tags SHOULD begin with one of the =
prefixes in this
> registry."  That statement along with the text in =C2=A72.4:
>=20
>   Any tag not starting with the prefix "ietf:", "vendor:" or "user:" =
is
>   reserved for future standardization.  These tag values are not
>   invalid, but simply reserved in the context of standardization.
>=20
> ...seem to indicate that a tag with any format can be used.  Is that =
true?  Is
> that the intent?  If so, then it seems to me that vendor/user tags =
could simply
> forgo the standardized prefix.  I guess this is ok...it just makes me =
wonder
> about the need to even define those prefixes.

The document goes to some length to make sure that users can do whatever =
they want as they should be the final arbiter (that philosophy). The =
need for the standard prefixes is to provide a stable framework so that =
if users choose to follow the prefix rules (i.e., use "user:") then they =
won't get stepped on by upstream (design and vendor) uses.

> (3) I'm not sure what, but I think it may be wise to give the would-be =
DEs for
> the new registry in =C2=A77.1 some more guidance on the allocation of =
new prefixes.
> The only current guidance is this: "Prefix entries in this registry =
should be
> short strings consisting of lowercase ASCII alpha-numeric characters =
and a
> final ":" character."

The expected use case (and thus the "guidance"):

"
   Other standards organizations (SDOs) wishing to allocate their own
   set of tags should allocate a prefix from this registry.
"

Perhaps you think this needs wordsmithing though?

Thanks,
Chris.


--Apple-Mail=_7D383906-6D8E-4253-863D-0D47465AD531
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment;
	filename=signature.asc
Content-Type: application/pgp-signature;
	name=signature.asc
Content-Description: Message signed with OpenPGP

-----BEGIN PGP SIGNATURE-----
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=F2xL
-----END PGP SIGNATURE-----

--Apple-Mail=_7D383906-6D8E-4253-863D-0D47465AD531--


From nobody Fri May  3 11:57:09 2019
Return-Path: <internet-drafts@ietf.org>
X-Original-To: netmod@ietf.org
Delivered-To: netmod@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id EFA711201E0; Fri,  3 May 2019 11:57:06 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: netmod@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.95.1
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: netmod@ietf.org
Message-ID: <155690982689.7257.3394557372081477520@ietfa.amsl.com>
Date: Fri, 03 May 2019 11:57:06 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/ze0Aul2NEI4N8my87OIHjLAlkQE>
Subject: [netmod] I-D Action: draft-ietf-netmod-module-tags-08.txt
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 May 2019 18:57:07 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Network Modeling WG of the IETF.

        Title           : YANG Module Tags
        Authors         : Christian Hopps
                          Lou Berger
                          Dean Bogdanovic
	Filename        : draft-ietf-netmod-module-tags-08.txt
	Pages           : 16
	Date            : 2019-05-03

Abstract:
   This document provides for the association of tags with YANG modules.
   The expectation is for such tags to be used to help classify and
   organize modules.  A method for defining, reading and writing a
   modules tags is provided.  Tags may be registered and assigned during
   module definition; assigned by implementations; or dynamically
   defined and set by users.  This document also provides guidance to
   future model writers; as such, this document updates RFC8407.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-netmod-module-tags/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-netmod-module-tags-08
https://datatracker.ietf.org/doc/html/draft-ietf-netmod-module-tags-08

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-netmod-module-tags-08


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Fri May  3 12:25:04 2019
Return-Path: <chopps@chopps.org>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A78681202EA for <netmod@ietfa.amsl.com>; Fri,  3 May 2019 12:24:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lzFp-gT0NiAn for <netmod@ietfa.amsl.com>; Fri,  3 May 2019 12:24:54 -0700 (PDT)
Received: from smtp.chopps.org (smtp.chopps.org [54.88.81.56]) by ietfa.amsl.com (Postfix) with ESMTP id 16F261202DA for <netmod@ietf.org>; Fri,  3 May 2019 12:24:54 -0700 (PDT)
Received: from stubbs.int.chopps.org (047-050-069-038.biz.spectrum.com [47.50.69.38]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by smtp.chopps.org (Postfix) with ESMTPSA id ACFD26019B; Fri,  3 May 2019 15:24:52 -0400 (EDT)
From: Christian Hopps <chopps@chopps.org>
Message-Id: <5DD64859-91A0-4B28-9FA9-F641AC130F3E@chopps.org>
Content-Type: multipart/signed; boundary="Apple-Mail=_B2BE1C70-C824-420E-8809-89F47EBC2BE2"; protocol="application/pgp-signature"; micalg=pgp-sha512
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.8\))
Date: Fri, 3 May 2019 15:24:51 -0400
In-Reply-To: <001201d501a8$63839940$4001a8c0@gateway.2wire.net>
Cc: Christian Hopps <chopps@chopps.org>, Mikael Abrahamsson <swmike@swm.pp.se>, Randy Presuhn <randy_presuhn@alumni.stanford.edu>, "netmod@ietf.org" <netmod@ietf.org>
To: tom petch <ietfc@btconnect.com>
References: <0c4265d31adbf208a680f76216cc4bc42c766eae.camel@nic.cz> <959ed1a8092f4798ac0b923384962049@XCH-RCD-007.cisco.com> <20190429153643.oxfcq7ze6ttdihb4@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1904300713100.3490@uplift.swm.pp.se> <20190430061737.vvxghxyacd57k73i@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1904301038570.3490@uplift.swm.pp.se> <20190430090905.qsa3r4dwauilsxur@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1905011051160.1824@uplift.swm.pp.se> <20190501111712.347bpz26br6ox3jp@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1905011456580.1824@uplift.swm.pp.se> <20190501155321.v4qz6twsom45y62f@anna.jacobs.jacobs-university.de> <alpine.DEB.2.20.1905012137310.1824@uplift.swm.pp.se> <5CCA58DA.3030801@alumni.stanford.edu> <alpine.DEB.2.20.1905021330140.1824@uplift.swm.pp.se> <001201d501a8$63839940$4001a8c0@gateway.2wire.net>
X-Mailer: Apple Mail (2.3445.104.8)
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/b1uptZifuirRSf9lc-W9dhs2Fgc>
Subject: Re: [netmod] convert it and not throw an error was Re: 6021 ipv4-prefix
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 May 2019 19:25:02 -0000

--Apple-Mail=_B2BE1C70-C824-420E-8809-89F47EBC2BE2
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii



> On May 3, 2019, at 8:08 AM, tom petch <ietfc@btconnect.com> wrote:
>=20
> ----- Original Message -----
> From: "Mikael Abrahamsson" <swmike@swm.pp.se>
> To: "Randy Presuhn" <randy_presuhn@alumni.stanford.edu>
> Cc: <netmod@ietf.org>
> Sent: Thursday, May 02, 2019 12:35 PM
>=20
>> On Wed, 1 May 2019, Randy Presuhn wrote:
>>=20
>>> Hi -
>>>=20
>>> On 5/1/2019 12:46 PM, Mikael Abrahamsson wrote:
>>> ....
>>>> Where is the text that tells the server implementor whether to
> throw an
>>>> error when client commits non-zero bits, or to just throw the bits
> away
>>>> and store the value in the canonical format?
>>>=20
>>> Such text would be an inappropriate constraint the server's
>>> internal representation.  We should only specify
>>> the externally-visible behaviour: that the reported value
>>> will be in the canonical format.  Whether an implementation
>>> preserves extraneous cruft in its internal representation is
>>> purely an implementation decision, and not subject to
> standardization.
>>=20
>> I am talking about what goes on the wire. If the client does an
>> edit-config with ipv6-prefix 2001:db8::1/64, should the server =
convert
>> this into 2001:db8::/64 or throw an error on the edit-config
> operation.
>>=20
>> Jurgen seems to say it should convert it and not throw an error, and
> I'd
>> like text to say that indeed, this is proper behaviour. Nobody has so
> far
>> been able to tell me where this text currently is, so that's why I'm
>> asking for it to be added. Either this should go into an update to
>> https://tools.ietf.org/html/rfc7950#section-9.1 or it should go into
> each
>> and every definition of types (or both of them).
>=20
> Mikael
>=20
> How about RFC791, still much quoted in all aspects of the work of the
> IETF?
>=20
> " In general, an implementation must be conservative
>  in its sending behavior, and liberal in its receiving behavior.  That
>  is, it must be careful to send well-formed datagrams, but must accept
>  any datagram that it can interpret (e.g., not object to technical
>  errors where the meaning is still clear)."
>=20
> We did not have MUST in those days, but had we, this would have been =
one
> IMHO.


So, this is a good opportunity to mention what has bothered me during =
this discussion.

Let's for a moment leave aside the "standards language" etc part, and =
instead consider "What's actually useful for people who try and run =
networks."

NETCONF and YANG have the concept of validating configuration, this is =
very useful for users. In a previous job I incorrectly started out to =
use ipv4-prefix in a model where I really wanted an =
ipv4-address-and-prefix (i.e., an interface context). Now consider the =
reverse case then where the model really expects a prefix only, and the =
user for some reason thinks it will accept and can make use of an =
"address-and-prefix". The most obvious indication that the user has got =
this wrong is that they have host bits set. So if the server accepts the =
value but silently discards the host bits the error is not caught and =
the user and server probably have different ideas about what's going to =
happen.

IOW, I don't think "where the meaning is still clear" applies to =
stripping host bits from a value, in fact I think it's more clear that =
stripping the host bits is actually ignoring (getting wrong) the user =
intent.

Thanks,
Chris.

>=20
> Tom Petch


--Apple-Mail=_B2BE1C70-C824-420E-8809-89F47EBC2BE2
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment;
	filename=signature.asc
Content-Type: application/pgp-signature;
	name=signature.asc
Content-Description: Message signed with OpenPGP

-----BEGIN PGP SIGNATURE-----
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=dRZQ
-----END PGP SIGNATURE-----

--Apple-Mail=_B2BE1C70-C824-420E-8809-89F47EBC2BE2--


From nobody Mon May  6 05:06:49 2019
Return-Path: <bill.wu@huawei.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 70661120144 for <netmod@ietfa.amsl.com>; Mon,  6 May 2019 05:06:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.199
X-Spam-Level: 
X-Spam-Status: No, score=-4.199 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YuEmXyfhUgLR for <netmod@ietfa.amsl.com>; Mon,  6 May 2019 05:06:46 -0700 (PDT)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 723F212006B for <netmod@ietf.org>; Mon,  6 May 2019 05:06:46 -0700 (PDT)
Received: from LHREML713-CAH.china.huawei.com (unknown [172.18.7.106]) by Forcepoint Email with ESMTP id 8CC226E567805C6DCE87 for <netmod@ietf.org>; Mon,  6 May 2019 13:06:44 +0100 (IST)
Received: from NKGEML411-HUB.china.huawei.com (10.98.56.70) by LHREML713-CAH.china.huawei.com (10.201.108.36) with Microsoft SMTP Server (TLS) id 14.3.408.0; Mon, 6 May 2019 13:06:44 +0100
Received: from NKGEML513-MBX.china.huawei.com ([169.254.1.144]) by nkgeml411-hub.china.huawei.com ([10.98.56.70]) with mapi id 14.03.0415.000; Mon, 6 May 2019 20:06:38 +0800
From: Qin Wu <bill.wu@huawei.com>
To: Kent Watsen <kent+ietf@watsen.net>, "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] Adoption poll for draft-wu-netmod-factory-default-02
Thread-Index: AdUEA2FRIxalS4tFStC28aN3YVk9+A==
Date: Mon, 6 May 2019 12:06:37 +0000
Message-ID: <B8F9A780D330094D99AF023C5877DABAA4909DE4@nkgeml513-mbx.china.huawei.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.134.31.203]
Content-Type: multipart/alternative; boundary="_000_B8F9A780D330094D99AF023C5877DABAA4909DE4nkgeml513mbxchi_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/Yj2aRKTqPVlna9Nc96EtvCf_8aE>
Subject: Re: [netmod] Adoption poll for draft-wu-netmod-factory-default-02
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 06 May 2019 12:06:49 -0000

--_000_B8F9A780D330094D99AF023C5877DABAA4909DE4nkgeml513mbxchi_
Content-Type: text/plain; charset="gb2312"
Content-Transfer-Encoding: base64

SGksIENoYWlyczoNClNvcnJ5IGZvciBsYXRlIGZvbGxvdyB1cCwgdGhhbmtzIEp1cmdlbiwgQW5k
eSxKb2UsIEpvZWwgYW5kIGFsbCBvdGhlcnMgZm9yIGdvb2QgY29tbWVudHMsIGhlcmUgaXMgdGhl
IHVwZGF0ZSBiYXNlZCBvbiBkaXNjdXNzaW9uIGFuZCBzdWdnZXN0aW9uIG9uIHRoZSBtYWlsaW5n
IGxpc3QNClRoZSBkaWZmIGlzOg0KaHR0cHM6Ly93d3cuaWV0Zi5vcmcvcmZjZGlmZj91cmwyPWRy
YWZ0LXd1LW5ldG1vZC1mYWN0b3J5LWRlZmF1bHQtMDMNCldlIGJlbGlldmUgaXQgaXMgcmVhZHkg
Zm9yIHNlY29uZCBhZG9wdGlvbiBwb2xsLiBUaGFua3MhDQoNCi1RaW4gKG9uIGJlaGFsZiBvZiBh
dXRob3JzKQ0Kt6K8/sjLOiBuZXRtb2QgW21haWx0bzpuZXRtb2QtYm91bmNlc0BpZXRmLm9yZ10g
tPqx7SBLZW50IFdhdHNlbg0Kt6LLzcqxvOQ6IDIwMTnE6jTUwjnI1SAyOjM2DQrK1bz+yMs6IG5l
dG1vZEBpZXRmLm9yZw0K1vfM4jogUmU6IFtuZXRtb2RdIEFkb3B0aW9uIHBvbGwgZm9yIGRyYWZ0
LXd1LW5ldG1vZC1mYWN0b3J5LWRlZmF1bHQtMDINCg0KVGhpcyBtZXNzYWdlIGNvbmNsdWRlcyB0
aGUgYWRvcHRpb24gcG9sbCBmb3IgZHJhZnQtd3UtbmV0bW9kLWZhY3RvcnktZGVmYXVsdC0wMiAg
IFRoZSB3b3JraW5nIGdyb3VwIGNvbnNlbnN1cyBzdXBwb3J0cyB3b3JraW5nIG9uIHRoZSBwcm9i
bGVtLCBidXQgZnVuZGFtZW50YWwgY29uY2VybnMgd2VyZSByYWlzZWQgcmVnYXJkaW5nIHRoZSBz
b2x1dGlvbiwgc3BlY2lmaWNhbGx5IGFyb3VuZCByZXNldGluZyBkYXRhc3RvcmVzIHZlcnN1cyBy
ZXNldHRpbmcgZGV2aWNlcy4gIFRoZSBjaGFpcnMgZmVlbCB0aGF0IHRoZXNlIGlzc3VlcyBzaG91
bGQgYmUgYWRkcmVzc2VkIGJlZm9yZSBwcm9jZWVkaW5nIHdpdGggdGhlIGFkb3B0aW9uLg0KDQpB
dXRob3JzLCBwbGVhc2UgdXBkYXRlIGFuZCByZXN1Ym1pdCB0aGUgZHJhZnQgYWRkcmVzc2luZyB0
aGUgY29tbWVudHMgcmVjZWl2ZWQgZHVyaW5nIHRoZSBhZG9wdGlvbiBwb2xsLiAgQW5vdGhlciBh
ZG9wdGlvbiBwb2xsIHdpbGwgYmUgaXNzdWVkIHdoZW4gcmVhZHkuDQpUaGFuayB5b3UsDQpLZW50
IChhbmQgTG91IGFuZCBKb2VsKQ0KDQoNCg0KT24gTWFyIDI1LCAyMDE5LCBhdCA0OjM0IFBNLCBL
ZW50IFdhdHNlbiA8a2VudCtpZXRmQHdhdHNlbi5uZXQ8bWFpbHRvOmtlbnQraWV0ZkB3YXRzZW4u
bmV0Pj4gd3JvdGU6DQoNClRoaXMgZW1haWwgYmVnaW5zIGEgMi13ZWVrIGFkb3B0aW9uIHBvbGwg
Zm9yOg0KDQoNCiAgICBodHRwczovL3Rvb2xzLmlldGYub3JnL2h0bWwvZHJhZnQtd3UtbmV0bW9k
LWZhY3RvcnktZGVmYXVsdC0wMg0KDQoNClBsZWFzZSB2b2ljZSB5b3VyIHN1cHBvcnQgb3Igb2Jq
ZWN0aW9ucyBiZWZvcmUgQXByaWwgOC48eC1hcHBsZS1kYXRhLWRldGVjdG9yczovLzE+DQoNCg0K
S2VudCAoYW5kIExvdSkNCl9fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fX19fDQpuZXRtb2QgbWFpbGluZyBsaXN0DQpuZXRtb2RAaWV0Zi5vcmc8bWFpbHRvOm5ldG1v
ZEBpZXRmLm9yZz4NCmh0dHBzOi8vd3d3LmlldGYub3JnL21haWxtYW4vbGlzdGluZm8vbmV0bW9k
DQoNCg==

--_000_B8F9A780D330094D99AF023C5877DABAA4909DE4nkgeml513mbxchi_
Content-Type: text/html; charset="gb2312"
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dgb2312">
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:SimSun;
	panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:"Microsoft YaHei";
	panose-1:2 11 5 3 2 2 4 2 2 4;}
@font-face
	{font-family:SimSun;
	panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
	{font-family:"Microsoft YaHei";
	panose-1:2 11 5 3 2 2 4 2 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman",serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-reply;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 90.0pt 72.0pt 90.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"ZH-CN" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,sans-serif;color:#1F497D">Hi, Chairs:<o:p></o:p>=
</span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,sans-serif;color:#1F497D">Sorry for late follow =
up, thanks Jurgen, Andy,Joe, Joel and all others for good comments, here is=
 the update based on discussion and suggestion on
 the mailing list<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,sans-serif;color:#1F497D">The diff is:<o:p></o:p=
></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><a href=3D"https://www.ietf.org=
/rfcdiff?url2=3Ddraft-wu-netmod-factory-default-03">https://www.ietf.org/rf=
cdiff?url2=3Ddraft-wu-netmod-factory-default-03</a></span><span lang=3D"EN-=
US" style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,sans-serif;co=
lor:#1F497D"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,sans-serif;color:#1F497D">We believe it is ready=
 for second adoption poll. Thanks!<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,sans-serif;color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,sans-serif;color:#1F497D">-Qin (on behalf of aut=
hors)<o:p></o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span style=3D"font-size:11.0pt;font-family:&quot=
;=CE=A2=C8=ED=D1=C5=BA=DA&quot;,sans-serif">=B7=A2=BC=FE=C8=CB<span lang=3D=
"EN-US">:</span></span></b><span lang=3D"EN-US" style=3D"font-size:11.0pt;f=
ont-family:&quot;=CE=A2=C8=ED=D1=C5=BA=DA&quot;,sans-serif"> netmod [mailto=
:netmod-bounces@ietf.org]
</span><b><span style=3D"font-size:11.0pt;font-family:&quot;=CE=A2=C8=ED=D1=
=C5=BA=DA&quot;,sans-serif">=B4=FA=B1=ED </span>
</b><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-family:&quot;=CE=A2=
=C8=ED=D1=C5=BA=DA&quot;,sans-serif">Kent Watsen<br>
</span><b><span style=3D"font-size:11.0pt;font-family:&quot;=CE=A2=C8=ED=D1=
=C5=BA=DA&quot;,sans-serif">=B7=A2=CB=CD=CA=B1=BC=E4<span lang=3D"EN-US">:<=
/span></span></b><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-family=
:&quot;=CE=A2=C8=ED=D1=C5=BA=DA&quot;,sans-serif"> 2019</span><span style=
=3D"font-size:11.0pt;font-family:&quot;=CE=A2=C8=ED=D1=C5=BA=DA&quot;,sans-=
serif">=C4=EA<span lang=3D"EN-US">4</span>=D4=C2<span lang=3D"EN-US">9</spa=
n>=C8=D5<span lang=3D"EN-US">
 2:36<br>
</span><b>=CA=D5=BC=FE=C8=CB<span lang=3D"EN-US">:</span></b><span lang=3D"=
EN-US"> netmod@ietf.org<br>
</span><b>=D6=F7=CC=E2<span lang=3D"EN-US">:</span></b><span lang=3D"EN-US"=
> Re: [netmod] Adoption poll for draft-wu-netmod-factory-default-02<o:p></o=
:p></span></span></p>
</div>
</div>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">This message concludes the adop=
tion poll for draft-wu-netmod-factory-default-02 &nbsp; The working group c=
onsensus supports working on the problem, but fundamental concerns were rai=
sed regarding the solution, specifically
 around reseting datastores versus resetting devices. &nbsp;The chairs feel=
 that these issues should be addressed before proceeding with the adoption.=
<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><span lang=3D"EN-US">=
Authors, please update and resubmit the draft addressing the comments recei=
ved during the adoption poll. &nbsp;Another adoption poll will be issued wh=
en ready.<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Thank you,<br>
Kent (and Lou and Joel)<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><br>
<br>
<o:p></o:p></span></p>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">On Mar 25, 2019, at 4:34 PM, Ke=
nt Watsen &lt;<a href=3D"mailto:kent&#43;ietf@watsen.net">kent&#43;ietf@wat=
sen.net</a>&gt; wrote:<o:p></o:p></span></p>
</div>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<div>
<div>
<div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">This email begins a 2-week adop=
tion poll for:<o:p></o:p></span></p>
<div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><br>
<br>
<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">&nbsp; &nbsp;&nbsp;<a href=3D"h=
ttps://tools.ietf.org/html/draft-wu-netmod-factory-default-02">https://tool=
s.ietf.org/html/draft-wu-netmod-factory-default-02</a><o:p></o:p></span></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><br>
<br>
<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Please voice your support or ob=
jections&nbsp;<a href=3D"x-apple-data-detectors://1">before April 8.</a><o:=
p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><br>
<br>
<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Kent (and Lou)<o:p></o:p></span=
></p>
</div>
</div>
</div>
</div>
</div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">_______________________________=
________________<br>
netmod mailing list<br>
<a href=3D"mailto:netmod@ietf.org">netmod@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/netmod">https://www.ietf.o=
rg/mailman/listinfo/netmod</a><o:p></o:p></span></p>
</div>
</blockquote>
</div>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
</div>
</body>
</html>

--_000_B8F9A780D330094D99AF023C5877DABAA4909DE4nkgeml513mbxchi_--


From nobody Mon May  6 08:11:55 2019
Return-Path: <jclarke@cisco.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B89A31200E0 for <netmod@ietfa.amsl.com>; Mon,  6 May 2019 08:11:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.509
X-Spam-Level: 
X-Spam-Status: No, score=-14.509 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wj1lTUMgtoxm for <netmod@ietfa.amsl.com>; Mon,  6 May 2019 08:11:50 -0700 (PDT)
Received: from rcdn-iport-1.cisco.com (rcdn-iport-1.cisco.com [173.37.86.72]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D3D281201D9 for <netmod@ietf.org>; Mon,  6 May 2019 08:11:34 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=25188; q=dns/txt; s=iport; t=1557155494; x=1558365094; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=GEDSQWxooYUat376mvoi7DsZPiBzt7rPfCcssN+Ls94=; b=KA8S1LQISB/gfK9sE4BxaxER7TNI0h4rDJLyvEdl458tpEthFSkL4Iq3 ttg/XMMpXh9DjyokVZLwYod8UiSzRys0VrOAn0He1cSQ3/dd1OzgUfTnH raBii/Uxykv7GidQMT9ZOIUeefh4qSEics2jQqz1fN7zBNo6lx/2xJUBJ o=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AEAACGTdBc/4kNJK1mGgEBAQEBAgE?= =?us-ascii?q?BAQEHAgEBAQGBUQUBAQEBCwGBDoECaYEEKAqEBogcpVgUgWcOAQEYAQqEBEY?= =?us-ascii?q?CF4F8IzQJDgEDAQEEAQECAQJtHAyFSwIBAwEBIUsLEAIBBgIOKgcDAgICJQs?= =?us-ascii?q?UEQEBBA4FG4MHAYEdbQ+QKZtlgS+ENgKBD4RdBoEyAYtNF4FAP4E4H4JMPoJ?= =?us-ascii?q?hAQECAReBFAESAQgBTIJUMoImBIsUgj2ETJUVCQKCCYYYjC0UB4IOhj+DbIk?= =?us-ascii?q?PjTuFLI4dAhEVgTAfOGVxcBU7KgGCQYsShT9BMY58gSKBIQEB?=
X-IronPort-AV: E=Sophos;i="5.60,438,1549929600";  d="scan'208,217";a="554396640"
Received: from alln-core-4.cisco.com ([173.36.13.137]) by rcdn-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 06 May 2019 15:11:33 +0000
Received: from XCH-ALN-013.cisco.com (xch-aln-013.cisco.com [173.36.7.23]) by alln-core-4.cisco.com (8.15.2/8.15.2) with ESMTPS id x46FBXQm011877 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Mon, 6 May 2019 15:11:33 GMT
Received: from xch-rcd-015.cisco.com (173.37.102.25) by XCH-ALN-013.cisco.com (173.36.7.23) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Mon, 6 May 2019 10:11:33 -0500
Received: from xch-rcd-015.cisco.com ([173.37.102.25]) by XCH-RCD-015.cisco.com ([173.37.102.25]) with mapi id 15.00.1473.003; Mon, 6 May 2019 10:11:32 -0500
From: "Joe Clarke (jclarke)" <jclarke@cisco.com>
To: Qin Wu <bill.wu@huawei.com>
CC: Kent Watsen <kent+ietf@watsen.net>, "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] Adoption poll for draft-wu-netmod-factory-default-02
Thread-Index: AdUEA2FRIxalS4tFStC28aN3YVk9+AARHyeA
Date: Mon, 6 May 2019 15:11:32 +0000
Message-ID: <EB363D33-307A-48E7-B886-08395356BA86@cisco.com>
References: <B8F9A780D330094D99AF023C5877DABAA4909DE4@nkgeml513-mbx.china.huawei.com>
In-Reply-To: <B8F9A780D330094D99AF023C5877DABAA4909DE4@nkgeml513-mbx.china.huawei.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.118.87.86]
Content-Type: multipart/alternative; boundary="_000_EB363D33307A48E7B88608395356BA86ciscocom_"
MIME-Version: 1.0
X-Outbound-SMTP-Client: 173.36.7.23, xch-aln-013.cisco.com
X-Outbound-Node: alln-core-4.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/KE5_wg-RiQSb1fD8obi0n5vvK9M>
Subject: Re: [netmod] Adoption poll for draft-wu-netmod-factory-default-02
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 06 May 2019 15:11:53 -0000

--_000_EB363D33307A48E7B88608395356BA86ciscocom_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64

DQoNCk9uIE1heSA2LCAyMDE5LCBhdCAwODowNiwgUWluIFd1IDxiaWxsLnd1QGh1YXdlaS5jb208
bWFpbHRvOmJpbGwud3VAaHVhd2VpLmNvbT4+IHdyb3RlOg0KDQpIaSwgQ2hhaXJzOg0KU29ycnkg
Zm9yIGxhdGUgZm9sbG93IHVwLCB0aGFua3MgSnVyZ2VuLCBBbmR5LEpvZSwgSm9lbCBhbmQgYWxs
IG90aGVycyBmb3IgZ29vZCBjb21tZW50cywgaGVyZSBpcyB0aGUgdXBkYXRlIGJhc2VkIG9uIGRp
c2N1c3Npb24gYW5kIHN1Z2dlc3Rpb24gb24gdGhlIG1haWxpbmcgbGlzdA0KVGhlIGRpZmYgaXM6
DQpodHRwczovL3d3dy5pZXRmLm9yZy9yZmNkaWZmP3VybDI9ZHJhZnQtd3UtbmV0bW9kLWZhY3Rv
cnktZGVmYXVsdC0wMw0KDQpIZXksIFFpbi4gIEkgcmVhZCB0aHJvdWdoIHRoZSBjaGFuZ2VzLCBh
bmQgSSBoYXZlIGEgY291cGxlIG9mIGFkZGl0aW9uYWwgY29tbWVudHMuDQoNCkZpcnN0LCB0aGUg
dGVybSDigJxZQU5HIHNlcnZlcuKAnSBzb3VuZHMgb2RkIHRvIG1lLiAgSSBrbm93IHdoYXQgeW91
IG1lYW4sIGJ1dCBJIGhhdmVu4oCZdCBzZWVuIHRoaXMgZGVmaW5lZCBiZWZvcmUuICBNYXliZSBq
dXN0IHNheWluZyBhIGRldmljZSBvciBob3N0IGlzIHN1ZmZpY2llbnQ/DQoNCldoZW4geW91IHRh
bGsgYWJvdXQgdGhlIGRhdGFzdG9yZSB0byBiZSByZXNldCwgeW91IGxpc3QgPHJ1bm5pbmc+LCA8
c3RhcnR1cD4sIGFuZCA8Y2FuZGlkYXRlPi4gIFlvdSBzdGF0ZSB0aGF0IGVhY2ggd2lsbCByZWNl
aXZlIHRoZSBjb250ZW50cyBvZiA8ZmFjdG9yeS1kZWZhdWx0Pi4gIFRoZSA8Y2FuZGlkYXRlPiBE
UyB3b3VsZG7igJl0IG5lZWQgdGhhdC4gIEkgdGhpbmsgaXQgd291bGQganVzdCBiZSB6ZXJvZWQg
b3V0Lg0KDQpJIHRoaW5rIHRoZSBSUEMgc2hvdWxkIHJlc2V0IGFueSBhbmQgYWxsIG5vbi1kZXJp
dmVkIHJlYWQtd3JpdGUgZGF0YXN0b3JlcyBhbmQgbm90IGltcGx5IHRoYXQgYSBzcGVjaWZpYyBE
U+KAmXMgY29udGVudHMgKGkuZS4sIHRoZSBmYWN0b3J5LWRlZmF1bHQgRFMpIGlzIGNvcGllZCB0
byB0aGVtLiAgVGhpcyB3YXksIG90aGVyIERTZXMgd291bGQganVzdCBiZSBoYW5kbGVkIGJ5IHRo
aXMgUlBDIGJhc2VkIG9uIGltcGxlbWVudGF0aW9uLiAgVGhlIDxmYWN0b3J5LWRlZmF1bHQ+IGNh
biBleGlzdCBhcyB0aGUgZmFjdG9yeSBkZWZhdWx0IGNvbnRlbnRzIGZvciA8c3RhcnR1cD4uDQoN
CkpvZQ0KDQpXZSBiZWxpZXZlIGl0IGlzIHJlYWR5IGZvciBzZWNvbmQgYWRvcHRpb24gcG9sbC4g
VGhhbmtzIQ0KDQotUWluIChvbiBiZWhhbGYgb2YgYXV0aG9ycykNCuWPkeS7tuS6ujogbmV0bW9k
IFttYWlsdG86bmV0bW9kLWJvdW5jZXNAaWV0Zi5vcmddIOS7o+ihqCBLZW50IFdhdHNlbg0K5Y+R
6YCB5pe26Ze0OiAyMDE55bm0NOaciDnml6UgMjozNg0K5pS25Lu25Lq6OiBuZXRtb2RAaWV0Zi5v
cmc8bWFpbHRvOm5ldG1vZEBpZXRmLm9yZz4NCuS4u+mimDogUmU6IFtuZXRtb2RdIEFkb3B0aW9u
IHBvbGwgZm9yIGRyYWZ0LXd1LW5ldG1vZC1mYWN0b3J5LWRlZmF1bHQtMDINCg0KVGhpcyBtZXNz
YWdlIGNvbmNsdWRlcyB0aGUgYWRvcHRpb24gcG9sbCBmb3IgZHJhZnQtd3UtbmV0bW9kLWZhY3Rv
cnktZGVmYXVsdC0wMiAgIFRoZSB3b3JraW5nIGdyb3VwIGNvbnNlbnN1cyBzdXBwb3J0cyB3b3Jr
aW5nIG9uIHRoZSBwcm9ibGVtLCBidXQgZnVuZGFtZW50YWwgY29uY2VybnMgd2VyZSByYWlzZWQg
cmVnYXJkaW5nIHRoZSBzb2x1dGlvbiwgc3BlY2lmaWNhbGx5IGFyb3VuZCByZXNldGluZyBkYXRh
c3RvcmVzIHZlcnN1cyByZXNldHRpbmcgZGV2aWNlcy4gIFRoZSBjaGFpcnMgZmVlbCB0aGF0IHRo
ZXNlIGlzc3VlcyBzaG91bGQgYmUgYWRkcmVzc2VkIGJlZm9yZSBwcm9jZWVkaW5nIHdpdGggdGhl
IGFkb3B0aW9uLg0KDQpBdXRob3JzLCBwbGVhc2UgdXBkYXRlIGFuZCByZXN1Ym1pdCB0aGUgZHJh
ZnQgYWRkcmVzc2luZyB0aGUgY29tbWVudHMgcmVjZWl2ZWQgZHVyaW5nIHRoZSBhZG9wdGlvbiBw
b2xsLiAgQW5vdGhlciBhZG9wdGlvbiBwb2xsIHdpbGwgYmUgaXNzdWVkIHdoZW4gcmVhZHkuDQpU
aGFuayB5b3UsDQpLZW50IChhbmQgTG91IGFuZCBKb2VsKQ0KDQoNCg0KT24gTWFyIDI1LCAyMDE5
LCBhdCA0OjM0IFBNLCBLZW50IFdhdHNlbiA8a2VudCtpZXRmQHdhdHNlbi5uZXQ8bWFpbHRvOmtl
bnQraWV0ZkB3YXRzZW4ubmV0Pj4gd3JvdGU6DQoNClRoaXMgZW1haWwgYmVnaW5zIGEgMi13ZWVr
IGFkb3B0aW9uIHBvbGwgZm9yOg0KDQoNCiAgICBodHRwczovL3Rvb2xzLmlldGYub3JnL2h0bWwv
ZHJhZnQtd3UtbmV0bW9kLWZhY3RvcnktZGVmYXVsdC0wMg0KDQoNClBsZWFzZSB2b2ljZSB5b3Vy
IHN1cHBvcnQgb3Igb2JqZWN0aW9ucyBiZWZvcmUgQXByaWwgOC48eC1hcHBsZS1kYXRhLWRldGVj
dG9yczovLzE+DQoNCg0KS2VudCAoYW5kIExvdSkNCl9fX19fX19fX19fX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fDQpuZXRtb2QgbWFpbGluZyBsaXN0DQpuZXRtb2RAaWV0Zi5v
cmc8bWFpbHRvOm5ldG1vZEBpZXRmLm9yZz4NCmh0dHBzOi8vd3d3LmlldGYub3JnL21haWxtYW4v
bGlzdGluZm8vbmV0bW9kDQoNCl9fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fX19fX19fDQpuZXRtb2QgbWFpbGluZyBsaXN0DQpuZXRtb2RAaWV0Zi5vcmc8bWFpbHRvOm5l
dG1vZEBpZXRmLm9yZz4NCmh0dHBzOi8vd3d3LmlldGYub3JnL21haWxtYW4vbGlzdGluZm8vbmV0
bW9kDQoNCg==

--_000_EB363D33307A48E7B88608395356BA86ciscocom_
Content-Type: text/html; charset="utf-8"
Content-ID: <261E6A980C7A9C4BA97144FF3BDDF6FA@emea.cisco.com>
Content-Transfer-Encoding: base64
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==

--_000_EB363D33307A48E7B88608395356BA86ciscocom_--


From nobody Mon May  6 08:24:37 2019
Return-Path: <Albrecht.Schwarz@etas.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6F002120091 for <netmod@ietfa.amsl.com>; Mon,  6 May 2019 08:24:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2k5ivJbRAt35 for <netmod@ietfa.amsl.com>; Mon,  6 May 2019 08:24:32 -0700 (PDT)
Received: from de-out1.bosch-org.com (de-out1.bosch-org.com [139.15.230.186]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 961AC12006D for <netmod@ietf.org>; Mon,  6 May 2019 08:24:32 -0700 (PDT)
Received: from fe0vm1649.rbesz01.com (unknown [139.15.230.188]) by si0vms0216.rbdmz01.com (Postfix) with ESMTPS id 44yRNs1S8Rz1XLG78; Mon,  6 May 2019 17:24:29 +0200 (CEST)
Received: from fe0vm02900.rbesz01.com (unknown [10.58.172.176]) by fe0vm1649.rbesz01.com (Postfix) with ESMTPS id 44yRNs0XHmz2H; Mon,  6 May 2019 17:24:29 +0200 (CEST)
X-AuditID: 0a3aad0c-d01ff700000039d6-24-5cd051acea33
Received: from si0vm1950.rbesz01.com ( [10.58.173.29]) (using TLS with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by fe0vm02900.rbesz01.com (SMG Outbound) with SMTP id 71.59.14806.CA150DC5; Mon,  6 May 2019 17:24:28 +0200 (CEST)
Received: from SI-MBX2054.de.bosch.com (unknown [10.3.230.148]) by si0vm1950.rbesz01.com (Postfix) with ESMTPS id 44yRNr4ndHz523; Mon,  6 May 2019 17:24:28 +0200 (CEST)
Received: from SI-MBX2054.de.bosch.com (10.3.230.148) by SI-MBX2054.de.bosch.com (10.3.230.148) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.1713.5; Mon, 6 May 2019 17:24:28 +0200
Received: from SI-MBX2054.de.bosch.com ([fe80::187:74e0:f8c8:c9b1]) by SI-MBX2054.de.bosch.com ([fe80::187:74e0:f8c8:c9b1%4]) with mapi id 15.01.1713.006; Mon, 6 May 2019 17:24:28 +0200
From: "Schwarz Albrecht (ETAS/ESY1)" <Albrecht.Schwarz@etas.com>
To: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
CC: NetMod WG <netmod@ietf.org>
Thread-Topic: Management Protocol Roles: Client/Server vs Manager/Agent
Thread-Index: AdUBk3PTS+EcD5D1QwG4flUjTOYwHwAJx4IAAJhVqNA=
Date: Mon, 6 May 2019 15:24:28 +0000
Message-ID: <341a6f3f0dd642f5b2231ac046c40e53@etas.com>
References: <941c9e23c3274dcdbca21c22348ca04f@etas.com> <20190503161450.p44lkz6cxzuwjc3d@anna.jacobs.jacobs-university.de>
In-Reply-To: <20190503161450.p44lkz6cxzuwjc3d@anna.jacobs.jacobs-university.de>
Accept-Language: de-DE, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.35.83.170]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA22Tf0wbZRjHea/XcpTedhwrfcaomsv8RzMs6DZER/hnODUKm44Y08Rd5Wgr tCW9QlbQWGFmyHTFsUVogPFrxiCMHwpbDNtICyo4RrfAqBhZRWS4kZnFIRsqeMeVtX/4z5vv +zzP5/n15iVkdDuRSJitDs5uZQsZhRJXpndqd3Ts9+t11Z/q0iZ7HqC001c/kGdi+9raHmD7 ugdfzMHeVD6fxxWaSzj7UxmHlKbAqhsvCjCHg4vDmAv5kqpQDAHUM9DbtawQNU3VYdDki6tC SkF3IPjNO6GQLncQLPuP4dLlAoLFH3xyEVFQmTByvWId3yJod/+xdS2jHoWa+3exKkQQ8VQW HFl7VQp5Ae597AqFp4N7rCda1Di1HZqrb8tETVK7IbjQLpc6ehfGjnSvx8RQ2fDjahCJGlFa 6O4el0mlNDA9dxqTpqGgbUCyA6WG339dlUv6MZgavYlL8ckQOHUy1OaT8HnzRt04GKmbw6uR xhOR1hOBeCIQTwTShPB2lJDP6UosutRndbpku4HjS3UpyW/bLL1IeizVeTTcZvQiikCMityV 4tfTcraEd1q8aCeBMWryteZxPb3JYMtzmlje9Ja9uJDjmUQyyf+Sno5/aOaLDRYzz5ttVi8C QsZsIdn5K3qazGOdpZzdJmFetI3AGQ1pJLL1NGVkHVwBxxVx9g3vcwTBAFmfLfQQZ+eM3OF8 c6Fjw81oSRQVFUUnRHoiy2JEjBc9TaiE2kfFFCRfxFp4szGEb5VwesMaRkfRQWKw5ZcGGTGy LJ73js4K5/Ge+QYZjVttVi5RQ2bmCBkpkTUVWx/2lJhE+jDBoY5whPPeQlNI2Go8SYiwSvgl 4W6A3CYuMC5kDEOprQJD/RkP9bOvwN/nnNC4GsSh/NSCHIbn/5BDx+VpBZyobYyG84H2aPhw KRgNgYsBAgLzfymha60yFr4fcsfCzMV+FZw4M6qC2r4lEvq/vrYZLle7aGj0l9Nwv+MLGi6N fUtD5cokDTPjrWqY+3dRDRPDTQkw8cmlBGhp+Aqg0jMAMNQ/BDC9dHcrDLq6kuCjFvcjt4RF Y8KiGyvFR+YdrON/Fh2yhmdLdCGmzNIZayBnnD5Nc8zLN8renyueuuaeTc9v3VPHtBxyYKW5 aQetTWMnz03VZryzY/Mbm/quZ3dWeX66kJOhvs1f0X5X01Nf3nnT8PPxlb17e2FP1oD2LGSd Lei78V6FfvafLx13DqRe3b/g2709paZsRfnZgqFiV27uN49TBTmvT67tZHDexKY8IbPz7H+/ vfzTvQQAAA==
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/uTK1Pu_TGyfDIDe9GUkN1WsjjOg>
Subject: Re: [netmod] Management Protocol Roles: Client/Server vs Manager/Agent
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 06 May 2019 15:24:37 -0000

Hello Juergen,

thanks for feedback!

> It all boils down how you define the terms Manager and Agent. With NETCON=
F/RESTCONF and YANG, the initial focus was on the interaction between the s=
erver maintaining configuration datastores and the client manipulating conf=
iguration datastores (leaving out notifications for now, they actually came=
 later).

The relevant role semantics originate at application level (and not at lowe=
r levels such as specific protocol layers), i.e., management applications (=
=3D the primary scope of NETCONF/RESTCONF).
That (native) roles are defined in ITU-T Recommendations X.701, M.3010, M.3=
700, and others, and in RFCs 3411, 3413, 3512, and others (in case of SNMP)=
.
Crucial, underlying concept is the Management Application Context (often si=
mply "context" in SNMP RFCs).
A manager gots normally exclusive access to a specific management applicati=
on context. Multiple manager usually don't share the same application conte=
xt (due to access conflicts, synchronization issues, etc).
That's why the 1:N ratio of management manager to management agent(s).

(I'm aware that these high-level management roles are further refined by e.=
g. considering the sub-roles of command generator, command responder, notif=
ication originator, notification receiver), see RFC 3413 or ITU-T X.703.)

Now, I had in mind that in client/server applications an application contex=
t is normally not distributed over multiple servers (but I might be wrong).

Anyway, looks like that I found in the meanwhile a hint to my question in R=
FC 6632, clause 1.3, stating the equation of:
(Management) Agent =3D NETCONF Management Server
(Management) Manager =3D NETCONF Management Client

Thanks again!
Albrecht

PS
An interesting exercise (for students?:-) might be the attempt to map NETCO=
NF management roles on the distributed management architecture of ITU-T X.7=
03, which differentiates the four roles of
- Managing client
- Managing server
- Managed client
- Managed server
with "Managing" =3D "Manager" and "Managed" =3D "Agent". :-)



Mit freundlichen Gr=FC=DFen / Best regards

Dr. Albrecht Schwarz

Systems Engineering (ETAS/ESY1)=20
Tel. +49 711 3423-2380 | Mobil +49 173 9792 632 | Albrecht.Schwarz@etas.com


-----Original Message-----
From: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>=20
Sent: 03 May 2019 18:15
To: Schwarz Albrecht (ETAS/ESY1) <Albrecht.Schwarz@etas.com>
Cc: Andy Bierman <andy@yumaworks.com>; NetMod WG <netmod@ietf.org>
Subject: Re: Management Protocol Roles: Client/Server vs Manager/Agent

On Fri, May 03, 2019 at 10:43:50AM +0000, Schwarz Albrecht (ETAS/ESY1) wrot=
e:

> Leading (for me) to a principle dilemma from (management) protocol=20
> engineering perspective due to
> a) Manager-to-Agent =3D 1:N
> b) Client-to-Server =3D N:1
> c) and the mapping approach in NETCONF/NETMOD of Manager-to-Client and Ag=
ent-to-Server in my understanding.

The problem is that you leave the plural 's' out. ;-)

Client-to-Server  is 1:1 (=3D Manager-to-Agent) Client-to-Servers is 1:N (=
=3D Manager-to-Agents) Clients-to-Server is N:1 (=3D Managers-to-Agent)

> I'm being aware that a distributed management solution needs to=20
> resolve the various role assignments in a layered management=20
> communication architecture at the various levels, e.g., for Management=20
> Application MA-over-RESTCONF-over-HTTP-over-TCP-over- ... as
> 1) Application level (MA): Manager to Agent(s)
> 2) Application layer management protocol =3D RESTCONF: Manager to=20
> Agent(s)
> 3) Session layer =3D HTTP: Client(s) to Server
> 4) Transport layer =3D TCP: Client(s) to Server
>=20
> I fail to see, or do miss the background/justification why the notion of =
client/server is used in RFCs about YANG, NMDA, NETCONF? Instead of manager=
/agent.
>

It all boils down how you define the terms Manager and Agent. With NETCONF/=
RESTCONF and YANG, the initial focus was on the interaction between the ser=
ver maintaining configuration datastores and the client manipulating config=
uration datastores (leaving out notifications for now, they actually came l=
ater).

/js

--=20
Juergen Schoenwaelder           Jacobs University Bremen gGmbH
Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
Fax:   +49 421 200 3103         <https://www.jacobs-university.de/>


From nobody Mon May  6 18:57:37 2019
Return-Path: <bill.wu@huawei.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 08E1612004F for <netmod@ietfa.amsl.com>; Mon,  6 May 2019 18:57:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.199
X-Spam-Level: 
X-Spam-Status: No, score=-4.199 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xwsXE9jftZ4k for <netmod@ietfa.amsl.com>; Mon,  6 May 2019 18:57:33 -0700 (PDT)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F03C3120043 for <netmod@ietf.org>; Mon,  6 May 2019 18:57:32 -0700 (PDT)
Received: from lhreml709-cah.china.huawei.com (unknown [172.18.7.107]) by Forcepoint Email with ESMTP id E79A2DCA3E83A637D104 for <netmod@ietf.org>; Tue,  7 May 2019 02:57:30 +0100 (IST)
Received: from lhreml709-chm.china.huawei.com (10.201.108.58) by lhreml709-cah.china.huawei.com (10.201.108.32) with Microsoft SMTP Server (TLS) id 14.3.408.0; Tue, 7 May 2019 02:57:30 +0100
Received: from lhreml709-chm.china.huawei.com (10.201.108.58) by lhreml709-chm.china.huawei.com (10.201.108.58) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1713.5; Tue, 7 May 2019 02:57:30 +0100
Received: from NKGEML412-HUB.china.huawei.com (10.98.56.73) by lhreml709-chm.china.huawei.com (10.201.108.58) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA_P256) id 15.1.1713.5 via Frontend Transport; Tue, 7 May 2019 02:57:29 +0100
Received: from NKGEML513-MBX.china.huawei.com ([169.254.1.144]) by nkgeml412-hub.china.huawei.com ([10.98.56.73]) with mapi id 14.03.0415.000; Tue, 7 May 2019 09:57:27 +0800
From: Qin Wu <bill.wu@huawei.com>
To: "Joe Clarke (jclarke)" <jclarke@cisco.com>
CC: Kent Watsen <kent+ietf@watsen.net>, "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] Adoption poll for draft-wu-netmod-factory-default-02
Thread-Index: AdUEdfEQ8DeKcdlbRhmFXoyRN25SkQ==
Date: Tue, 7 May 2019 01:57:26 +0000
Message-ID: <B8F9A780D330094D99AF023C5877DABAA490A523@nkgeml513-mbx.china.huawei.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.134.31.203]
Content-Type: multipart/alternative; boundary="_000_B8F9A780D330094D99AF023C5877DABAA490A523nkgeml513mbxchi_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/eQKmEk_KVTzIRMnN1WWzR_W_Ozg>
Subject: Re: [netmod] Adoption poll for draft-wu-netmod-factory-default-02
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 07 May 2019 01:57:36 -0000

--_000_B8F9A780D330094D99AF023C5877DABAA490A523nkgeml513mbxchi_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_B8F9A780D330094D99AF023C5877DABAA490A523nkgeml513mbxchi_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_B8F9A780D330094D99AF023C5877DABAA490A523nkgeml513mbxchi_--


From nobody Mon May  6 20:36:37 2019
Return-Path: <randy_presuhn@alumni.stanford.edu>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5EB4E120020 for <netmod@ietfa.amsl.com>; Mon,  6 May 2019 20:36:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level: 
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RyEmQGVY6N9t for <netmod@ietfa.amsl.com>; Mon,  6 May 2019 20:36:33 -0700 (PDT)
Received: from mail-pg1-f195.google.com (mail-pg1-f195.google.com [209.85.215.195]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 79181120006 for <netmod@ietf.org>; Mon,  6 May 2019 20:36:33 -0700 (PDT)
Received: by mail-pg1-f195.google.com with SMTP id h17so1554720pgv.0 for <netmod@ietf.org>; Mon, 06 May 2019 20:36:33 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-transfer-encoding; bh=Aapn8+q/lSXTcd/BIYJDAxk9pWzjem0Uwpgh40cgHTU=; b=lB8ZmeAUF4Pkhkc91KIrMuYgvW57m+Z8Kra7OGjQjES2NZloa7zSw4S8AqekA9Ekfh m7k7TBMbZ1w3s+Z+s3bzkYV6g2AJzNCXjtG+IU5nmWiXfJJlydrbjd3413on2N2K8bC2 nSNyOiuqskSlAzisn/J4e1D4cvcGVcS9/JiJZxcY+OkFuVwH3+PtKIQoodUNbX+Wg8Xs +6lJ53h9j6ixCiOQJpBRrm5/byPQpro5q2l7LC/qbjpHkCjq8qiEQMJfIDrcFDefEyhK J/GqYA97A1B9Idc+bWw2cPYW2eEBiNAh/gx/x2ksd7W3xuQE9aCIBzFcJ5Szd8RQ7m/U jRxQ==
X-Gm-Message-State: APjAAAUyMxYBdxn9txYq1gAGoEXZUCL6BqSpTjS96qgFBfnCGGP+xblY /vNQ9oweZQLZMpxl2FxKfIXf1VU0r70=
X-Google-Smtp-Source: APXvYqxj1+HOgP9n17vbDaOZmpqetQvpIQ7DHZkyED865LXdfQuz6p8VcYYttZbt4PrM0Q6ka+od1A==
X-Received: by 2002:a63:42:: with SMTP id 63mr37109675pga.337.1557200192544; Mon, 06 May 2019 20:36:32 -0700 (PDT)
Received: from [192.168.1.101] (c-69-181-241-121.hsd1.ca.comcast.net. [69.181.241.121]) by smtp.gmail.com with ESMTPSA id a26sm20054127pfl.177.2019.05.06.20.36.31 for <netmod@ietf.org> (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 06 May 2019 20:36:31 -0700 (PDT)
To: netmod@ietf.org
References: <941c9e23c3274dcdbca21c22348ca04f@etas.com> <20190503161450.p44lkz6cxzuwjc3d@anna.jacobs.jacobs-university.de> <341a6f3f0dd642f5b2231ac046c40e53@etas.com>
From: Randy Presuhn <randy_presuhn@alumni.stanford.edu>
Message-ID: <5CD0FD41.2080001@alumni.stanford.edu>
Date: Mon, 6 May 2019 20:36:33 -0700
User-Agent: Mozilla/5.0 (Windows NT 6.0; rv:38.0) Gecko/20100101 Thunderbird/38.5.0
MIME-Version: 1.0
In-Reply-To: <341a6f3f0dd642f5b2231ac046c40e53@etas.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/SSvLSA-cZny7Nz9OkTFjgSNVWVI>
Subject: Re: [netmod] Management Protocol Roles: Client/Server vs Manager/Agent
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 07 May 2019 03:36:36 -0000

Hi -

On 5/6/2019 8:24 AM, Schwarz Albrecht (ETAS/ESY1) wrote:
...
> The relevant role semantics originate at application level (and not
> at lower levels such as specific protocol layers), i.e., management
> applications (= the primary scope of NETCONF/RESTCONF).
> That (native) roles are defined in ITU-T Recommendations X.701, M.3010, M.3700,
> and others, and in RFCs 3411, 3413, 3512, and others (in case of SNMP).
> Crucial, underlying concept is the Management Application Context
> (often simply "context" in SNMP RFCs).

No.  The concept of "application context" as used in X.701 has no
equivalent in the SNMP universe.  It's needed in X.701 because of
the decision to permit the negotiation of roles upon establishment
of an association.  In fundamentally connectionless SNMP, such
negotiation would make no sense.

When the word  "context" is used in the SNMP universe, it refers
to a completely different concept, one introduced primarily in
order to work around deficiencies in the naming architecture resulting
from MIB modules using the SMI.  See, for example, RFC 3415.

> A manager gots normally exclusive access to a specific management
> application context.

Not true in either the CMIP nor in the SNMP universes.

> Multiple manager usually don't share the same application context

Not true in either the CMIP nor in the SNMP universes, and not
true for either meaning of the word "context".

> (due to access conflicts, synchronization issues, etc).

No, that's why, for example, things like VACM and the
the TestAndIncr textual convention are used in the SNMP
world, and why a rudimentary locking facility has been
present in Netconf since the early days.

> That's why the 1:N ratio of management manager to management agent(s).

That's not a realistic assumption for any kind of
"industrial-strength" management architecture.

> (I'm aware that these high-level management roles are further refined
> by e.g. considering the sub-roles of command generator, command responder,
> notification originator, notification receiver), see RFC 3413 or ITU-T X.703.)

I would not rely on X.703 as a source of terminological clarity in
this forum.  As an attempt to re-frame CMIP in terms of CORBA-speak,
it long post-dates the split between the IETF and ISO/ITU communities.
As for RFC 3413, I think we were abundantly clear that the use of the
"sub-roles" was fore purely expository purposes, and that whether
there might be any corresponding division within an implementation
would be, well, an implementation matter.

> Now, I had in mind that in client/server applications an application
> context is normally not distributed over multiple servers (but I might
> be wrong).
...

Consider, for example, aggregating management proxies.
The "disman" MIBS should provide ample examples.

Randy


From nobody Tue May  7 11:37:55 2019
Return-Path: <scott.mansfield@ericsson.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C502E120233 for <netmod@ietfa.amsl.com>; Tue,  7 May 2019 11:37:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.01
X-Spam-Level: 
X-Spam-Status: No, score=-2.01 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fG6LDSE7uet9 for <netmod@ietfa.amsl.com>; Tue,  7 May 2019 11:37:51 -0700 (PDT)
Received: from NAM01-BN3-obe.outbound.protection.outlook.com (mail-eopbgr740054.outbound.protection.outlook.com [40.107.74.54]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C56E4120235 for <netmod@ietf.org>; Tue,  7 May 2019 11:37:50 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=3bCKaIW62IgXP72gAToSszyqYJextW4K09TwhA5Gd9M=; b=aZ9/HGsWoyEN05DygsoYgOzpyOJ1fqtclawuy8g0/bI4Gf0MgtrFKSBuB0Eu+hZ7eKd9gxnnedHxbxswMJfkSvX/YXGy0KxNjO6qsbVxi+0WBlXtroGflKz+CRIuy365Q3FXPIxxn2QTBGMPpIyLydwxmUPhePJ7NqnKmwQ9DdA=
Received: from BL0PR1501MB2179.namprd15.prod.outlook.com (52.132.22.29) by BL0PR1501MB2148.namprd15.prod.outlook.com (52.132.22.22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1856.11; Tue, 7 May 2019 18:37:44 +0000
Received: from BL0PR1501MB2179.namprd15.prod.outlook.com ([fe80::d971:8501:e989:5594]) by BL0PR1501MB2179.namprd15.prod.outlook.com ([fe80::d971:8501:e989:5594%7]) with mapi id 15.20.1856.012; Tue, 7 May 2019 18:37:44 +0000
From: Scott Mansfield <scott.mansfield@ericsson.com>
To: "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: YANG and TimeFilter
Thread-Index: AdUFArGkIXE5dDFXTYi2/g4C6GSKgg==
Date: Tue, 7 May 2019 18:37:43 +0000
Message-ID: <BL0PR1501MB2179425D41EC49F3ECA15C558B310@BL0PR1501MB2179.namprd15.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=scott.mansfield@ericsson.com; 
x-originating-ip: [72.23.221.187]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 5a14f193-2b00-4b42-7382-08d6d31b180f
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600141)(711020)(4605104)(2017052603328)(49563074)(7193020); SRVR:BL0PR1501MB2148; 
x-ms-traffictypediagnostic: BL0PR1501MB2148:
x-microsoft-antispam-prvs: <BL0PR1501MB2148B0E9A26087BB1ADEFAB28B310@BL0PR1501MB2148.namprd15.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0030839EEE
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(376002)(366004)(136003)(396003)(39860400002)(346002)(189003)(199004)(68736007)(71200400001)(74316002)(9326002)(476003)(4744005)(55016002)(54896002)(790700001)(6436002)(6306002)(7116003)(236005)(2906002)(5640700003)(9686003)(3480700005)(64756008)(76116006)(73956011)(486006)(66946007)(6116002)(3846002)(256004)(66616009)(66556008)(66446008)(2501003)(478600001)(44832011)(316002)(66476007)(66066001)(53936002)(8936002)(86362001)(102836004)(6506007)(7696005)(5660300002)(2351001)(99286004)(606006)(26005)(186003)(71190400001)(33656002)(8676002)(6916009)(1730700003)(81156014)(81166006)(7736002)(25786009)(14454004)(99936001)(52536014); DIR:OUT; SFP:1101; SCL:1; SRVR:BL0PR1501MB2148; H:BL0PR1501MB2179.namprd15.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: Rx/riseGkawluONYSEMd9DUEm0XUtCLRWlu015GU3jYimj9SSEL7qSkKlDbk4fMiTCODphRc3Qx3dLN12shxUJ3YJDmrA2QrswEZiKnTTOda539DaUnAGTfGqqbU7cu/6zQWqc0M7aU0szqkTc9OSCa9z7vyYzZS55BHtkbjxFVjLATYfAhTxT6gv3sldfRnVXbf/ijPHyZRqPG0DfHxzP4t4VOSoBSIvS5bgqrapF1Gilu35GJr26p+iWyopDp5FAxaiITEgFnoLpr3CyRpY/ZLAYIoOBy/zngbbLumpvzBvpSl8FANCAg7cruSTJEH3CfiuAqHZrxeNg+YqFb2fTqJ9Y2AnyAq4frX48VJRX+mLd+9Ekg1LkwdMP/czXpYGDi9BvuldKbUb5n/Lpftg1jQsTWYhaV8ue81YVEo+mk=
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg=SHA1; boundary="----=_NextPart_000_0F15_01D504E2.6CEC1970"
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 5a14f193-2b00-4b42-7382-08d6d31b180f
X-MS-Exchange-CrossTenant-originalarrivaltime: 07 May 2019 18:37:43.9548 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL0PR1501MB2148
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/JKgXUURzpy6StEmC25rb4LR5oFs>
Subject: [netmod] YANG and TimeFilter
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 07 May 2019 18:37:54 -0000

------=_NextPart_000_0F15_01D504E2.6CEC1970
Content-Type: multipart/alternative;
	boundary="----=_NextPart_001_0F16_01D504E2.6CEC1970"


------=_NextPart_001_0F16_01D504E2.6CEC1970
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit

Hello Netmod,

 

I'm looking at using a feature like the TimeFilter textual convention
(RFC2021 -> RFC 4502) found for RMON2 MIB in a NETCONF/YANG context.  I
searched the YangCatalog for such a thing and didn't find anything like
TimeFilter.  Has there been any work related to this type of filter?  I am
working on a YANG module that would like to return a subset of remote system
data filtered by time.

 

Any thoughts?  Apologies if this has been asked before. I did look through
the netmod list archive and grepped the modules here
(https://github.com/YangModels/yang/tree/master/experimental/ietf-extracted-
YANG-modules) and here
(https://github.com/YangModels/yang/tree/master/standard/ietf/RFC).

 

Thanks,

-scott.


------=_NextPart_001_0F16_01D504E2.6CEC1970
Content-Type: text/html;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:x=3D"urn:schemas-microsoft-com:office:excel" =
xmlns:dt=3D"uuid:C2F41010-65B3-11d1-A29F-00AA00C14882" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><META =
HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Dus-ascii"><meta name=3DGenerator content=3D"Microsoft Word 15 =
(filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:#0563C1;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:#954F72;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri",sans-serif;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US =
link=3D"#0563C1" vlink=3D"#954F72"><div class=3DWordSection1><p =
class=3DMsoNormal>Hello Netmod,<o:p></o:p></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>I&#8217;m =
looking at using a feature like the TimeFilter textual convention =
(RFC2021 -&gt; RFC 4502) found for RMON2 MIB in a NETCONF/YANG =
context.&nbsp; I searched the YangCatalog for such a thing and =
didn&#8217;t find anything like TimeFilter.&nbsp; Has there been any =
work related to this type of filter?&nbsp; I am working on a YANG module =
that would like to return a subset of remote system data filtered by =
time.<o:p></o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p =
class=3DMsoNormal>Any thoughts?&nbsp; Apologies if this has been asked =
before&#8230; I did look through the netmod list archive and grepped the =
modules here (<a =
href=3D"https://github.com/YangModels/yang/tree/master/experimental/ietf-=
extracted-YANG-modules">https://github.com/YangModels/yang/tree/master/ex=
perimental/ietf-extracted-YANG-modules</a>) and here (<a =
href=3D"https://github.com/YangModels/yang/tree/master/standard/ietf/RFC"=
>https://github.com/YangModels/yang/tree/master/standard/ietf/RFC</a>).<o=
:p></o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p =
class=3DMsoNormal>Thanks,<o:p></o:p></p><p =
class=3DMsoNormal>-scott.<o:p></o:p></p></div></body></html>
------=_NextPart_001_0F16_01D504E2.6CEC1970--

------=_NextPart_000_0F15_01D504E2.6CEC1970
Content-Type: application/pkcs7-signature;
	name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment;
	filename="smime.p7s"
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------=_NextPart_000_0F15_01D504E2.6CEC1970--


From nobody Wed May  8 02:34:32 2019
Return-Path: <Albrecht.Schwarz@etas.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 029351200C7 for <netmod@ietfa.amsl.com>; Wed,  8 May 2019 02:34:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SXqvfI0JGcma for <netmod@ietfa.amsl.com>; Wed,  8 May 2019 02:34:27 -0700 (PDT)
Received: from de-out1.bosch-org.com (de-out1.bosch-org.com [139.15.230.186]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 92D881200B4 for <netmod@ietf.org>; Wed,  8 May 2019 02:34:26 -0700 (PDT)
Received: from si0vm1948.rbesz01.com (unknown [139.15.230.188]) by si0vms0217.rbdmz01.com (Postfix) with ESMTPS id 44zWX06Mjvz4f3kZR; Wed,  8 May 2019 11:34:24 +0200 (CEST)
Received: from si0vm02576.rbesz01.com (unknown [10.58.172.176]) by si0vm1948.rbesz01.com (Postfix) with ESMTPS id 44zWX061TSz1Tm; Wed,  8 May 2019 11:34:24 +0200 (CEST)
X-AuditID: 0a3aad0d-15bff700000036fe-75-5cd2a2a08fed
Received: from si0vm1950.rbesz01.com ( [10.58.173.29]) (using TLS with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by si0vm02576.rbesz01.com (SMG Outbound) with SMTP id E2.C6.14078.0A2A2DC5; Wed,  8 May 2019 11:34:24 +0200 (CEST)
Received: from SI-MBX2054.de.bosch.com (unknown [10.3.230.148]) by si0vm1950.rbesz01.com (Postfix) with ESMTPS id 44zWX04DKDz5fJ; Wed,  8 May 2019 11:34:24 +0200 (CEST)
Received: from SI-MBX2054.de.bosch.com (10.3.230.148) by SI-MBX2054.de.bosch.com (10.3.230.148) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.1713.5; Wed, 8 May 2019 11:34:24 +0200
Received: from SI-MBX2054.de.bosch.com ([fe80::187:74e0:f8c8:c9b1]) by SI-MBX2054.de.bosch.com ([fe80::187:74e0:f8c8:c9b1%4]) with mapi id 15.01.1713.006; Wed, 8 May 2019 11:34:24 +0200
From: "Schwarz Albrecht (ETAS/ESY1)" <Albrecht.Schwarz@etas.com>
To: Randy Presuhn <randy_presuhn@alumni.stanford.edu>, "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] Management Protocol Roles: Client/Server vs Manager/Agent
Thread-Index: AdUBk3PTS+EcD5D1QwG4flUjTOYwHwAJx4IAAJhVqNAAFlktgABC8CqQ
Date: Wed, 8 May 2019 09:34:24 +0000
Message-ID: <481f9c0c703c40b79a02a99c73b9be43@etas.com>
References: <941c9e23c3274dcdbca21c22348ca04f@etas.com> <20190503161450.p44lkz6cxzuwjc3d@anna.jacobs.jacobs-university.de> <341a6f3f0dd642f5b2231ac046c40e53@etas.com> <5CD0FD41.2080001@alumni.stanford.edu>
In-Reply-To: <5CD0FD41.2080001@alumni.stanford.edu>
Accept-Language: de-DE, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.35.83.170]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA22Tb0wTdxjH+fXuylF7eD1o+6zAXBqXbOgcylQyzOaLZRpfTFwWY0wTd5WD NtCW9Fq0xhjsRAgqKoHNFhGEatjmBhrpCOpwrfsDmxaLWmZip04nFqMMHYJb1t15YPtiby7f 3/e5z/d57rk7EmM8pI40Wx2c3cqW6+UKXPH2VzlvtLWHDXme9tyC1ss7iYL60NepK2Wr/wyG 8dU+37SsSLZRsaKYKzdXcvY33/lYYaqefL1iXLf1UV8HUYV2auoQSQL9FnTUbqxDCpKhPTI4 F4lh0uEEgsunf8Klw0MEfwV/lEuHcwgO9T5FdSiNlNMrYeDaJ3IxKpM2wNDoZtHOoNfB+T1u magz6Q+h4UwDkvT7cGPAnypqnJ4Pw4cDhKgpejl8OrZ/ptkwgos9h+ViIY3Oh/F46/MgROdA d3cIEzVGa+H6HckHmgbfWckHWg33f/+XkPQrEBm8h0v3L4S2MxNySS+A40fHMKmxCgY8d/AD SONNivUmId4kxJuEtCH8C6ThzXmVlrwlS5cvW2Q3cvy2vMWLNtssp5D0hqhedGmyJIBoEumV 1M+rwgaGYCt5lyWAlpIyvZpS1wtWutFW7DKxvGmT3VnO8XodlT20xsBkvLB5p9Fi5nmzzRpA QGL6TCpyUOCoYta1jbPbJCyAskhcr6VKybUGhi5lHVwZx1Vw9tlqIUnqgWpsE0CVnSvltpaY yx2zZX0OhVJSUhhNciW5rYxMC6B8Uin07hEjKL6CtfDm0hn8JQlnZt0EOojWkufbb7Vg5MBT 8fqk5nYLxuBWm5XTaSnVUSGLFimT0/piGl02FZQNGRh1UiGRGEMRJOwzgwqJgyiFnyIxB1BZ 4upUM2YCWtIhMHR1JsQ/t8Hf37ig+cZeBP2/Ct+aZ2QaA3fTKAEn/eMEVDdNEDA64lNAw56b CuiK186B6Ld+JTQcG1RCZ9ddCi64m9PhmadpLvhPh+dCfMKvgl8OVDFwZMjNwNSJTgZqn11l YP8/YwwEu5vVEA11qGHkQVANV/b1ayAW/04LnfcvaSHc91kWjE79kQOP66Mvx4QVy4QVMzue r9jBOv5nxTNu4tl0VUjZ+15q4ckvWyPXC8qqXuvqX7BJ870zO4LKhm9Vr9/REvzg+Kp034WS 39gr7ifR+a8qby5MKYge2k4dObWr73H3vfzQhq6i3OyPcufUWxorDsonixunll09u9sQu/jw 9hhROF0zb/3uoi3r7rpW7Ntwzblrb2/N9ncfeY3HjLEHRM+8LT/ocd7ELs7F7Dz7H8LA/nKs BAAA
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/0Bz2so8-wBqlBoC2XrO-zE--0uE>
Subject: Re: [netmod] Management Protocol Roles: Client/Server vs Manager/Agent
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 08 May 2019 09:34:31 -0000

Thanks Randy for your comments and insights in the history of that manageme=
nt technologies!
Helpful, appreciated!
Albrecht


-----Original Message-----
From: netmod <netmod-bounces@ietf.org> On Behalf Of Randy Presuhn
Sent: 07 May 2019 05:37
To: netmod@ietf.org
Subject: Re: [netmod] Management Protocol Roles: Client/Server vs Manager/A=
gent

Hi -

On 5/6/2019 8:24 AM, Schwarz Albrecht (ETAS/ESY1) wrote:
....
> The relevant role semantics originate at application level (and not at=20
> lower levels such as specific protocol layers), i.e., management=20
> applications (=3D the primary scope of NETCONF/RESTCONF).
> That (native) roles are defined in ITU-T Recommendations X.701,=20
> M.3010, M.3700, and others, and in RFCs 3411, 3413, 3512, and others (in =
case of SNMP).
> Crucial, underlying concept is the Management Application Context=20
> (often simply "context" in SNMP RFCs).

No.  The concept of "application context" as used in X.701 has no equivalen=
t in the SNMP universe.  It's needed in X.701 because of the decision to pe=
rmit the negotiation of roles upon establishment of an association.  In fun=
damentally connectionless SNMP, such negotiation would make no sense.

When the word  "context" is used in the SNMP universe, it refers to a compl=
etely different concept, one introduced primarily in order to work around d=
eficiencies in the naming architecture resulting from MIB modules using the=
 SMI.  See, for example, RFC 3415.

> A manager gots normally exclusive access to a specific management=20
> application context.

Not true in either the CMIP nor in the SNMP universes.

> Multiple manager usually don't share the same application context

Not true in either the CMIP nor in the SNMP universes, and not true for eit=
her meaning of the word "context".

> (due to access conflicts, synchronization issues, etc).

No, that's why, for example, things like VACM and the the TestAndIncr textu=
al convention are used in the SNMP world, and why a rudimentary locking fac=
ility has been present in Netconf since the early days.

> That's why the 1:N ratio of management manager to management agent(s).

That's not a realistic assumption for any kind of "industrial-strength" man=
agement architecture.

> (I'm aware that these high-level management roles are further refined=20
> by e.g. considering the sub-roles of command generator, command=20
> responder, notification originator, notification receiver), see RFC=20
> 3413 or ITU-T X.703.)

I would not rely on X.703 as a source of terminological clarity in this for=
um.  As an attempt to re-frame CMIP in terms of CORBA-speak, it long post-d=
ates the split between the IETF and ISO/ITU communities.
As for RFC 3413, I think we were abundantly clear that the use of the "sub-=
roles" was fore purely expository purposes, and that whether there might be=
 any corresponding division within an implementation would be, well, an imp=
lementation matter.

> Now, I had in mind that in client/server applications an application=20
> context is normally not distributed over multiple servers (but I might=20
> be wrong).
....

Consider, for example, aggregating management proxies.
The "disman" MIBS should provide ample examples.

Randy

_______________________________________________
netmod mailing list
netmod@ietf.org
https://www.ietf.org/mailman/listinfo/netmod


From nobody Wed May  8 04:31:43 2019
Return-Path: <ietfc@btconnect.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6211E1200EC for <netmod@ietfa.amsl.com>; Wed,  8 May 2019 04:31:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.248
X-Spam-Level: 
X-Spam-Status: No, score=0.248 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RATWARE_MS_HASH=2.148, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=btconnect.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rjEbVYG3kSHs for <netmod@ietfa.amsl.com>; Wed,  8 May 2019 04:31:40 -0700 (PDT)
Received: from EUR01-DB5-obe.outbound.protection.outlook.com (mail-eopbgr150122.outbound.protection.outlook.com [40.107.15.122]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 193831200EA for <netmod@ietf.org>; Wed,  8 May 2019 04:31:39 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=btconnect.onmicrosoft.com; s=selector1-btconnect-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=DuS5UZL/wMfEPGqurfMU7XZ3DZUVyOU4r/3Hzu3lpMI=; b=AzHR5LQfNdS1bSHtofvCb6fFFDdT1/hg+eiTwapGzvtgXI80IDGcyip+6spXENiyGsxiwCYwf1+/2mBbbV3PlgeYgqeniZv523p/sfc/0Gd85X4f5I8diWfm8NxIwiBefhEMeUdRX1HVMUnJ3gs8B9WotW1hNC6dnzvYoSRkoUo=
Received: from VI1PR07MB3118.eurprd07.prod.outlook.com (10.175.242.156) by VI1PR07MB6159.eurprd07.prod.outlook.com (20.178.124.160) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1878.13; Wed, 8 May 2019 11:31:36 +0000
Received: from VI1PR07MB3118.eurprd07.prod.outlook.com ([fe80::41a4:68a9:d620:d42b]) by VI1PR07MB3118.eurprd07.prod.outlook.com ([fe80::41a4:68a9:d620:d42b%3]) with mapi id 15.20.1878.019; Wed, 8 May 2019 11:31:36 +0000
From: tom petch <ietfc@btconnect.com>
To: "Joe Clarke (jclarke)" <jclarke@cisco.com>, Qin Wu <bill.wu@huawei.com>
CC: "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] Adoption poll for draft-wu-netmod-factory-default-02
Thread-Index: AQHVBZGYZ1YLmj+D6UqmZXjpVYKlQw==
Date: Wed, 8 May 2019 11:31:35 +0000
Message-ID: <065d01d50591$173d7c80$4001a8c0@gateway.2wire.net>
References: <B8F9A780D330094D99AF023C5877DABAA4909DE4@nkgeml513-mbx.china.huawei.com> <EB363D33-307A-48E7-B886-08395356BA86@cisco.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-clientproxiedby: LO2P265CA0316.GBRP265.PROD.OUTLOOK.COM (2603:10a6:600:a4::16) To VI1PR07MB3118.eurprd07.prod.outlook.com (2603:10a6:802:20::28)
authentication-results: spf=none (sender IP is ) smtp.mailfrom=ietfc@btconnect.com; 
x-ms-exchange-messagesentrepresentingtype: 1
x-mailer: Microsoft Outlook Express 6.00.2800.1106
x-originating-ip: [86.139.215.234]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 66ee25c8-f8a4-45ab-0542-08d6d3a8ba89
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600141)(711020)(4605104)(2017052603328)(7193020); SRVR:VI1PR07MB6159; 
x-ms-traffictypediagnostic: VI1PR07MB6159:
x-ms-exchange-purlcount: 3
x-microsoft-antispam-prvs: <VI1PR07MB6159E57CE933CE40EE4882B3A0320@VI1PR07MB6159.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0031A0FFAF
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(396003)(39860400002)(346002)(136003)(366004)(376002)(189003)(199004)(13464003)(44736005)(81816011)(81686011)(76176011)(6486002)(68736007)(478600001)(229853002)(61296003)(71200400001)(52116002)(99286004)(71190400001)(305945005)(6116002)(14454004)(5660300002)(86152003)(3846002)(316002)(966005)(7736002)(6436002)(110136005)(25786009)(2906002)(6306002)(6512007)(9686003)(8676002)(53936002)(256004)(50226002)(8936002)(4720700003)(14444005)(386003)(86362001)(6506007)(1556002)(102836004)(84392002)(4326008)(446003)(81156014)(81166006)(53546011)(26005)(64756008)(14496001)(66476007)(62236002)(66556008)(6246003)(186003)(66446008)(66946007)(486006)(476003)(44716002)(73956011)(66066001)(74416001)(7726001); DIR:OUT; SFP:1102; SCL:1; SRVR:VI1PR07MB6159; H:VI1PR07MB3118.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:0; 
received-spf: None (protection.outlook.com: btconnect.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: DyydZ/8/ODNtB5t+5lsEk7jf4oCvwePJ1Lvj++K/rw0TdIHUfEtEu8C3dEmeJCpQ72/3kCGoEW664hA+RVxaCu02w2D1CTASESFhsBPSYD0DeknfWhjWEwsrt61Sr3lwUp+oavrU0+cGyNCT/inArgkysdIhbgGtaEfY3utjXfsfccG/Zg6YkS1ybjdn0kt8SWOjWPZ6/cAhNzh51kiTOUZj/C+ZtRqd9Ig/2QakuIWhl5ZiGvl1So2hQz1He1zjdr+uWNLocrm5cEczp//SzThkgxhQ44dTq0TgJg5KNOCygZZg9AoSgAWOZA61QQTdl9aFjf0XM2s8LmodsLvmt1XRiJO/qRJ0fuTFhojs4cUSIRhrWlLjd4Oo7HTBEyGQiAdrgio9pXW9GebLg9bqTTsblC1xqKv3PDaIqGvUYmE=
Content-Type: text/plain; charset="utf-8"
Content-ID: <6670F02153896848A0293FCAFE257B61@eurprd07.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: btconnect.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 66ee25c8-f8a4-45ab-0542-08d6d3a8ba89
X-MS-Exchange-CrossTenant-originalarrivaltime: 08 May 2019 11:31:35.9720 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: cf8853ed-96e5-465b-9185-806bfe185e30
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR07MB6159
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/ZvpA2bkw6bFaX-uTnSH_-orAnv0>
Subject: Re: [netmod] Adoption poll for draft-wu-netmod-factory-default-02
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 08 May 2019 11:31:42 -0000
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From nobody Wed May  8 04:53:31 2019
Return-Path: <mbj@tail-f.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 42EBB12006A for <netmod@ietfa.amsl.com>; Wed,  8 May 2019 04:53:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cIu_EXXrPWgY for <netmod@ietfa.amsl.com>; Wed,  8 May 2019 04:53:27 -0700 (PDT)
Received: from mail.tail-f.com (mail.tail-f.com [46.21.102.45]) by ietfa.amsl.com (Postfix) with ESMTP id 7672C12003F for <netmod@ietf.org>; Wed,  8 May 2019 04:53:27 -0700 (PDT)
Received: from localhost (unknown [173.38.220.61]) by mail.tail-f.com (Postfix) with ESMTPSA id A529F1AE049C; Wed,  8 May 2019 13:53:24 +0200 (CEST)
Date: Wed, 08 May 2019 13:53:27 +0200 (CEST)
Message-Id: <20190508.135327.825252846107256677.mbj@tail-f.com>
To: ietfc@btconnect.com
Cc: jclarke@cisco.com, bill.wu@huawei.com, netmod@ietf.org
From: Martin Bjorklund <mbj@tail-f.com>
In-Reply-To: <065d01d50591$173d7c80$4001a8c0@gateway.2wire.net>
References: <B8F9A780D330094D99AF023C5877DABAA4909DE4@nkgeml513-mbx.china.huawei.com> <EB363D33-307A-48E7-B886-08395356BA86@cisco.com> <065d01d50591$173d7c80$4001a8c0@gateway.2wire.net>
X-Mailer: Mew version 6.7 on Emacs 25.2 / Mule 6.0 (HANACHIRUSATO)
Mime-Version: 1.0
Content-Type: Text/Plain; charset=utf-8
Content-Transfer-Encoding: base64
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/WFczApovhyM-El38WiwES3vG3Mg>
Subject: Re: [netmod] Adoption poll for draft-wu-netmod-factory-default-02
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 08 May 2019 11:53:30 -0000

dG9tIHBldGNoIDxpZXRmY0BidGNvbm5lY3QuY29tPiB3cm90ZToNCj4gLS0tLS0gT3JpZ2luYWwg
TWVzc2FnZSAtLS0tLQ0KPiBGcm9tOiAiSm9lIENsYXJrZSAoamNsYXJrZSkiIDxqY2xhcmtlQGNp
c2NvLmNvbT4NCj4gU2VudDogTW9uZGF5LCBNYXkgMDYsIDIwMTkgNDoxMSBQTQ0KPiA+DQo+ID4g
T24gTWF5IDYsIDIwMTksIGF0IDA4OjA2LCBRaW4gV3UNCj4gPGJpbGwud3VAaHVhd2VpLmNvbTxt
YWlsdG86YmlsbC53dUBodWF3ZWkuY29tPj4gd3JvdGU6DQo+ID4NCj4gPiBIaSwgQ2hhaXJzOg0K
PiA+IFNvcnJ5IGZvciBsYXRlIGZvbGxvdyB1cCwgdGhhbmtzIEp1cmdlbiwgQW5keSxKb2UsIEpv
ZWwgYW5kIGFsbCBvdGhlcnMNCj4gZm9yIGdvb2QgY29tbWVudHMsIGhlcmUgaXMgdGhlIHVwZGF0
ZSBiYXNlZCBvbiBkaXNjdXNzaW9uIGFuZCBzdWdnZXN0aW9uDQo+IG9uIHRoZSBtYWlsaW5nIGxp
c3QNCj4gPiBUaGUgZGlmZiBpczoNCj4gPiBodHRwczovL3d3dy5pZXRmLm9yZy9yZmNkaWZmP3Vy
bDI9ZHJhZnQtd3UtbmV0bW9kLWZhY3RvcnktZGVmYXVsdC0wMw0KPiA+DQo+ID4gSGV5LCBRaW4u
ICBJIHJlYWQgdGhyb3VnaCB0aGUgY2hhbmdlcywgYW5kIEkgaGF2ZSBhIGNvdXBsZSBvZg0KPiBh
ZGRpdGlvbmFsIGNvbW1lbnRzLg0KPiA+DQo+ID4gRmlyc3QsIHRoZSB0ZXJtIOKAnFlBTkcgc2Vy
dmVy4oCdIHNvdW5kcyBvZGQgdG8gbWUuICBJIGtub3cgd2hhdCB5b3UgbWVhbiwNCj4gYnV0IEkg
aGF2ZW7igJl0IHNlZW4gdGhpcyBkZWZpbmVkIGJlZm9yZS4gIE1heWJlIGp1c3Qgc2F5aW5nIGEg
ZGV2aWNlIG9yDQo+IGhvc3QgaXMgc3VmZmljaWVudD8NCj4gDQo+IEpvZQ0KPiANCj4gSWYgeW91
IGxvb2sgYXQgdGhlIHZhcmlvdXMgUkZDIC0gWUFORywgTmV0Y29uZiwgTk1EQSAtIHRoZXkgYWxs
IGRlZmluZQ0KPiB0aGUgdGVybXMgJ2NsaWVudCcgYW5kICdzZXJ2ZXInOyBpbiB0aGUgY29udGV4
dCwgJ1lBTkcgc2VydmVyJyBzZWVtcw0KPiBhcHByb3ByaWF0ZS4NCg0KSSBhZ3JlZSB3LyBKb2Uu
ICBJIGhhZCB0aGUgc2FtZSBjb21tZW50IHdoZW4gSSByZWFkDQpkcmFmdC1pZXRmLW5ldG1vZC15
YW5nLWluc3RhbmNlLWZpbGUtZm9ybWF0OyBpdCB1c2VzIHRoZSB0ZXJtICJZQU5HDQpzZXJ2ZXIi
Lg0KDQpJIHRoaW5rIHRoZXNlIGRvY3VtZW50cyBzaG91bGQgaW1wb3J0IGFuZCB1c2UgdGhlIHRl
cm0gInNlcnZlciIgZnJvbQ0KUkZDIDgzNDIgd2hlcmUgaXQgaXMgZGVmaW5lZCBhczoNCg0KICAg
byAgc2VydmVyOiBBbiBlbnRpdHkgdGhhdCBwcm92aWRlcyBhY2Nlc3MgdG8gWUFORy1kZWZpbmVk
IGRhdGEgdG8gYQ0KICAgICAgY2xpZW50LCBvdmVyIHNvbWUgbmV0d29yayBtYW5hZ2VtZW50IHBy
b3RvY29sLg0KDQpQZXJoYXBzIHdlIHNob3VsZCBoYXZlIGEgdGVybSAiWUFORy1iYXNlZCBzZXJ2
ZXIiIG9yIHNvbWV0aGluZyBhcyBhbg0KYWxpYXMgdG8gInNlcnZlciIgYXMgZGVmaW5lZCBhYm92
ZS4gIEluIHNvbWUgZG9jdW1lbnRzIHRoZSBzaG9ydCB3b3JkDQoic2VydmVyIiBtYXkgc291bmQg
dG9vIGdlbmVyaWMuICBCdXQgIllBTkcgc2VydmVyIiBkb2Vzbid0IHNvdW5kIHJpZ2h0DQp0byBt
ZS4NCg0KDQovbWFydGluDQoNCg0KDQoNCj4gDQo+IFRvbSBQZXRjaA0KPiANCj4gDQo+IA0KPiAN
Cj4gDQo+ID4NCj4gPiBXaGVuIHlvdSB0YWxrIGFib3V0IHRoZSBkYXRhc3RvcmUgdG8gYmUgcmVz
ZXQsIHlvdSBsaXN0IDxydW5uaW5nPiwNCj4gPHN0YXJ0dXA+LCBhbmQgPGNhbmRpZGF0ZT4uICBZ
b3Ugc3RhdGUgdGhhdCBlYWNoIHdpbGwgcmVjZWl2ZSB0aGUNCj4gY29udGVudHMgb2YgPGZhY3Rv
cnktZGVmYXVsdD4uICBUaGUgPGNhbmRpZGF0ZT4gRFMgd291bGRu4oCZdCBuZWVkIHRoYXQuDQo+
IEkgdGhpbmsgaXQgd291bGQganVzdCBiZSB6ZXJvZWQgb3V0Lg0KPiA+DQo+ID4gSSB0aGluayB0
aGUgUlBDIHNob3VsZCByZXNldCBhbnkgYW5kIGFsbCBub24tZGVyaXZlZCByZWFkLXdyaXRlDQo+
IGRhdGFzdG9yZXMgYW5kIG5vdCBpbXBseSB0aGF0IGEgc3BlY2lmaWMgRFPigJlzIGNvbnRlbnRz
IChpLmUuLCB0aGUNCj4gZmFjdG9yeS1kZWZhdWx0IERTKSBpcyBjb3BpZWQgdG8gdGhlbS4gIFRo
aXMgd2F5LCBvdGhlciBEU2VzIHdvdWxkIGp1c3QNCj4gYmUgaGFuZGxlZCBieSB0aGlzIFJQQyBi
YXNlZCBvbiBpbXBsZW1lbnRhdGlvbi4gIFRoZSA8ZmFjdG9yeS1kZWZhdWx0Pg0KPiBjYW4gZXhp
c3QgYXMgdGhlIGZhY3RvcnkgZGVmYXVsdCBjb250ZW50cyBmb3IgPHN0YXJ0dXA+Lg0KPiA+DQo+
ID4gSm9lDQo+ID4NCj4gPiBXZSBiZWxpZXZlIGl0IGlzIHJlYWR5IGZvciBzZWNvbmQgYWRvcHRp
b24gcG9sbC4gVGhhbmtzIQ0KPiA+DQo+ID4gLVFpbiAob24gYmVoYWxmIG9mIGF1dGhvcnMpDQo+
ID4g5Y+R5Lu25Lq6OiBuZXRtb2QgW21haWx0bzpuZXRtb2QtYm91bmNlc0BpZXRmLm9yZ10g5Luj
6KGoIEtlbnQgV2F0c2VuDQo+ID4g5Y+R6YCB5pe26Ze0OiAyMDE55bm0NOaciDnml6UgMjozNg0K
PiA+IOaUtuS7tuS6ujogbmV0bW9kQGlldGYub3JnPG1haWx0bzpuZXRtb2RAaWV0Zi5vcmc+DQo+
ID4g5Li76aKYOiBSZTogW25ldG1vZF0gQWRvcHRpb24gcG9sbCBmb3IgZHJhZnQtd3UtbmV0bW9k
LWZhY3RvcnktZGVmYXVsdC0wMg0KPiA+DQo+ID4gVGhpcyBtZXNzYWdlIGNvbmNsdWRlcyB0aGUg
YWRvcHRpb24gcG9sbCBmb3INCj4gZHJhZnQtd3UtbmV0bW9kLWZhY3RvcnktZGVmYXVsdC0wMiAg
IFRoZSB3b3JraW5nIGdyb3VwIGNvbnNlbnN1cw0KPiBzdXBwb3J0cyB3b3JraW5nIG9uIHRoZSBw
cm9ibGVtLCBidXQgZnVuZGFtZW50YWwgY29uY2VybnMgd2VyZSByYWlzZWQNCj4gcmVnYXJkaW5n
IHRoZSBzb2x1dGlvbiwgc3BlY2lmaWNhbGx5IGFyb3VuZCByZXNldGluZyBkYXRhc3RvcmVzIHZl
cnN1cw0KPiByZXNldHRpbmcgZGV2aWNlcy4gIFRoZSBjaGFpcnMgZmVlbCB0aGF0IHRoZXNlIGlz
c3VlcyBzaG91bGQgYmUNCj4gYWRkcmVzc2VkIGJlZm9yZSBwcm9jZWVkaW5nIHdpdGggdGhlIGFk
b3B0aW9uLg0KPiA+DQo+ID4gQXV0aG9ycywgcGxlYXNlIHVwZGF0ZSBhbmQgcmVzdWJtaXQgdGhl
IGRyYWZ0IGFkZHJlc3NpbmcgdGhlIGNvbW1lbnRzDQo+IHJlY2VpdmVkIGR1cmluZyB0aGUgYWRv
cHRpb24gcG9sbC4gIEFub3RoZXIgYWRvcHRpb24gcG9sbCB3aWxsIGJlIGlzc3VlZA0KPiB3aGVu
IHJlYWR5Lg0KPiA+IFRoYW5rIHlvdSwNCj4gPiBLZW50IChhbmQgTG91IGFuZCBKb2VsKQ0KPiA+
DQo+ID4NCj4gPg0KPiA+IE9uIE1hciAyNSwgMjAxOSwgYXQgNDozNCBQTSwgS2VudCBXYXRzZW4N
Cj4gPGtlbnQraWV0ZkB3YXRzZW4ubmV0PG1haWx0bzprZW50K2lldGZAd2F0c2VuLm5ldD4+IHdy
b3RlOg0KPiA+DQo+ID4gVGhpcyBlbWFpbCBiZWdpbnMgYSAyLXdlZWsgYWRvcHRpb24gcG9sbCBm
b3I6DQo+ID4NCj4gPg0KPiA+ICAgICBodHRwczovL3Rvb2xzLmlldGYub3JnL2h0bWwvZHJhZnQt
d3UtbmV0bW9kLWZhY3RvcnktZGVmYXVsdC0wMg0KPiA+DQo+ID4NCj4gPiBQbGVhc2Ugdm9pY2Ug
eW91ciBzdXBwb3J0IG9yIG9iamVjdGlvbnMgYmVmb3JlIEFwcmlsDQo+IDguPHgtYXBwbGUtZGF0
YS1kZXRlY3RvcnM6Ly8xPg0KPiA+DQo+ID4NCj4gPiBLZW50IChhbmQgTG91KQ0KPiA+IF9fX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fDQo+ID4gbmV0bW9kIG1h
aWxpbmcgbGlzdA0KPiA+IG5ldG1vZEBpZXRmLm9yZzxtYWlsdG86bmV0bW9kQGlldGYub3JnPg0K
PiA+IGh0dHBzOi8vd3d3LmlldGYub3JnL21haWxtYW4vbGlzdGluZm8vbmV0bW9kDQo+ID4NCj4g
PiBfX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fXw0KPiA+IG5l
dG1vZCBtYWlsaW5nIGxpc3QNCj4gPiBuZXRtb2RAaWV0Zi5vcmc8bWFpbHRvOm5ldG1vZEBpZXRm
Lm9yZz4NCj4gPiBodHRwczovL3d3dy5pZXRmLm9yZy9tYWlsbWFuL2xpc3RpbmZvL25ldG1vZA0K
PiA+DQo+ID4NCj4gDQo+IA0KPiAtLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0NCj4gLS0tLS0tLS0NCj4gDQo+IA0K
PiA+IF9fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fDQo+ID4g
bmV0bW9kIG1haWxpbmcgbGlzdA0KPiA+IG5ldG1vZEBpZXRmLm9yZw0KPiA+IGh0dHBzOi8vd3d3
LmlldGYub3JnL21haWxtYW4vbGlzdGluZm8vbmV0bW9kDQo+ID4NCj4gDQo+IF9fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fDQo+IG5ldG1vZCBtYWlsaW5nIGxp
c3QNCj4gbmV0bW9kQGlldGYub3JnDQo+IGh0dHBzOi8vd3d3LmlldGYub3JnL21haWxtYW4vbGlz
dGluZm8vbmV0bW9kDQo=


From nobody Wed May  8 05:08:14 2019
Return-Path: <j.schoenwaelder@jacobs-university.de>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3CFDC12004C for <netmod@ietfa.amsl.com>; Wed,  8 May 2019 05:08:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level: 
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WQI0Wita6fWl for <netmod@ietfa.amsl.com>; Wed,  8 May 2019 05:08:10 -0700 (PDT)
Received: from atlas5.jacobs-university.de (atlas5.jacobs-university.de [212.201.44.20]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 88C3012003F for <netmod@ietf.org>; Wed,  8 May 2019 05:08:10 -0700 (PDT)
Received: from localhost (demetrius5.irc-it.jacobs-university.de [10.70.0.222]) by atlas5.jacobs-university.de (Postfix) with ESMTP id 2BD4CBBC; Wed,  8 May 2019 14:08:09 +0200 (CEST)
X-Virus-Scanned: amavisd-new at jacobs-university.de
Received: from atlas5.jacobs-university.de ([10.70.0.217]) by localhost (demetrius5.jacobs-university.de [10.70.0.222]) (amavisd-new, port 10032) with ESMTP id xEPoFn_EHUBa; Wed,  8 May 2019 14:08:09 +0200 (CEST)
Received: from hermes.jacobs-university.de (hermes.jacobs-university.de [212.201.44.23]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "hermes.jacobs-university.de", Issuer "Jacobs University CA - G01" (verified OK)) by atlas5.jacobs-university.de (Postfix) with ESMTPS; Wed,  8 May 2019 14:08:09 +0200 (CEST)
Received: from localhost (demetrius5.irc-it.jacobs-university.de [10.70.0.222]) by hermes.jacobs-university.de (Postfix) with ESMTP id 15ABA200F0; Wed,  8 May 2019 14:08:09 +0200 (CEST)
X-Virus-Scanned: amavisd-new at jacobs-university.de
Received: from hermes.jacobs-university.de ([212.201.44.23]) by localhost (demetrius5.jacobs-university.de [10.70.0.222]) (amavisd-new, port 10028) with ESMTP id YXtili2cdXib; Wed,  8 May 2019 14:08:08 +0200 (CEST)
Received: from exchange.jacobs-university.de (sxchmb03.jacobs.jacobs-university.de [10.70.0.155]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "exchange.jacobs-university.de", Issuer "DFN-Verein Global Issuing CA" (verified OK)) by hermes.jacobs-university.de (Postfix) with ESMTPS id BD2FE200EC; Wed,  8 May 2019 14:08:08 +0200 (CEST)
Received: from anna.localdomain (10.50.218.117) by sxchmb03.jacobs.jacobs-university.de (10.70.0.155) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.1713.5; Wed, 8 May 2019 14:08:08 +0200
Received: by anna.localdomain (Postfix, from userid 501) id B72E03008E59EA; Wed,  8 May 2019 14:08:07 +0200 (CEST)
Date: Wed, 8 May 2019 14:08:07 +0200
From: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
To: Martin Bjorklund <mbj@tail-f.com>
CC: <ietfc@btconnect.com>, <netmod@ietf.org>
Message-ID: <20190508120807.czpzkct6tkxafduc@anna.jacobs.jacobs-university.de>
Reply-To: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
Mail-Followup-To: Martin Bjorklund <mbj@tail-f.com>, ietfc@btconnect.com, netmod@ietf.org
References: <B8F9A780D330094D99AF023C5877DABAA4909DE4@nkgeml513-mbx.china.huawei.com> <EB363D33-307A-48E7-B886-08395356BA86@cisco.com> <065d01d50591$173d7c80$4001a8c0@gateway.2wire.net> <20190508.135327.825252846107256677.mbj@tail-f.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <20190508.135327.825252846107256677.mbj@tail-f.com>
User-Agent: NeoMutt/20180716
X-ClientProxiedBy: SXCHMB03.jacobs.jacobs-university.de (10.70.0.155) To sxchmb03.jacobs.jacobs-university.de (10.70.0.155)
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/dWVsvNjotBr8f8QpeSJTPnGoSNU>
Subject: Re: [netmod] Adoption poll for draft-wu-netmod-factory-default-02
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 08 May 2019 12:08:13 -0000

On Wed, May 08, 2019 at 01:53:27PM +0200, Martin Bjorklund wrote:
> > 
> > Joe
> > 
> > If you look at the various RFC - YANG, Netconf, NMDA - they all define
> > the terms 'client' and 'server'; in the context, 'YANG server' seems
> > appropriate.
> 
> I agree w/ Joe.  I had the same comment when I read
> draft-ietf-netmod-yang-instance-file-format; it uses the term "YANG
> server".
> 
> I think these documents should import and use the term "server" from
> RFC 8342 where it is defined as:
> 
>    o  server: An entity that provides access to YANG-defined data to a
>       client, over some network management protocol.
> 
> Perhaps we should have a term "YANG-based server" or something as an
> alias to "server" as defined above.  In some documents the short word
> "server" may sound too generic.  But "YANG server" doesn't sound right
> to me.
>

I find terms like 'YANG server' or 'YANG-based server' a bit confusing
since the server is not talking YANG (there is no YANG protocol) and
the server is also not sending/receiving YANG but YANG-defined data.

Unless there is a possibility of confusion, importing the 'server'
definition from RFC 8342 and using the terms 'server' is perhaps good
enough.

/js

-- 
Juergen Schoenwaelder           Jacobs University Bremen gGmbH
Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
Fax:   +49 421 200 3103         <https://www.jacobs-university.de/>


From nobody Wed May  8 14:51:58 2019
Return-Path: <0100016a996e6b55-6274d956-7a6e-4d56-b88b-524723053cdb-000000@amazonses.watsen.net>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5D795120194 for <netmod@ietfa.amsl.com>; Wed,  8 May 2019 14:51:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level: 
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=amazonses.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ESdvo5pidz1i for <netmod@ietfa.amsl.com>; Wed,  8 May 2019 14:51:53 -0700 (PDT)
Received: from a8-32.smtp-out.amazonses.com (a8-32.smtp-out.amazonses.com [54.240.8.32]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1600C120199 for <netmod@ietf.org>; Wed,  8 May 2019 14:51:52 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=6gbrjpgwjskckoa6a5zn6fwqkn67xbtw; d=amazonses.com; t=1557352311; h=From:Content-Type:Mime-Version:Subject:Message-Id:Date:To:Feedback-ID; bh=6qBYyyurpKlJve1aVEv1iEc2ZCk0Ov1Eix5GQ8UuMH0=; b=L71ZfH2ihDYAJvpRBSlnurEa4P1eJFTgSFFZgYp6dC7kt651DqE4YU2XAiP+lxPI hFU8h3ZcUlBtoP6pDimUcdZMNs993yj4vsCq404m/C6gVGd4wUqdBT0AvyNGr7BIJeA krwiE/ZM8yR1WgnBKcHP/vmj9O1j0eSuGX3sx8OM=
From: Kent Watsen <kent+ietf@watsen.net>
Content-Type: multipart/alternative; boundary="Apple-Mail=_8058A881-0FC3-4348-B131-9265FC851B4F"
Mime-Version: 1.0 (Mac OS X Mail 12.2 \(3445.102.3\))
Message-ID: <0100016a996e6b55-6274d956-7a6e-4d56-b88b-524723053cdb-000000@email.amazonses.com>
Date: Wed, 8 May 2019 21:51:51 +0000
To: "netmod@ietf.org" <netmod@ietf.org>
X-Mailer: Apple Mail (2.3445.102.3)
X-SES-Outgoing: 2019.05.08-54.240.8.32
Feedback-ID: 1.us-east-1.DKmIRZFhhsBhtmFMNikgwZUWVrODEw9qVcPhqJEI2DA=:AmazonSES
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/OWFNBPulX-RwWkQD5alZ17cH0gU>
Subject: [netmod] Adoption poll for draft-wu-netmod-factory-default-03
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 08 May 2019 21:51:56 -0000

--Apple-Mail=_8058A881-0FC3-4348-B131-9265FC851B4F
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

This email begins a 1-week adoption poll for:

    https://tools.ietf.org/html/draft-wu-netmod-factory-default-03

As we already have consensus from the previous poll to work on the =
problem, this poll primarily seeks for objections for using -03 as a =
basis for WG adoption (the document will be adopted if no objections are =
raised).  Of course, a show of support is also always encouraged.   All, =
please voice your support or objections before May 15.  =20

Authors, already there have been good comments for how to improve the =
document.  However, please refrain from posting an update incorporating =
these comments until after this adoption poll closes, at which time the =
instruction will be to post a -00 with minimal changes, followed by a =
-01 incorporating the comments.

PS: the IPR poll conducted on Mar 25 is still considered valid.

Kent  // co-chair



--Apple-Mail=_8058A881-0FC3-4348-B131-9265FC851B4F
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=us-ascii

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Dus-ascii"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" class=3D""><div =
class=3D""><span style=3D"font-family: Helvetica-Light;" class=3D"">This =
email begins a 1-week adoption poll for:</span></div><div class=3D""><br =
class=3D""></div><font face=3D"Helvetica-Light" class=3D"">&nbsp; =
&nbsp;&nbsp;<a =
href=3D"https://tools.ietf.org/html/draft-wu-netmod-factory-default-03" =
class=3D"">https://tools.ietf.org/html/draft-wu-netmod-factory-default-03<=
/a><br class=3D""><br class=3D""></font><div class=3D""><font =
face=3D"Helvetica-Light" class=3D"">As we&nbsp;already =
have&nbsp;consensus from the previous poll to work on the problem, this =
poll&nbsp;primarily seeks for objections for using -03 as a basis for WG =
adoption (the&nbsp;</font><font face=3D"Helvetica-Light" =
class=3D"">document will be adopted i</font><span style=3D"font-family: =
Helvetica-Light;" class=3D"">f no objections are raised)</span><font =
face=3D"Helvetica-Light" class=3D"">. &nbsp;Of course, a show of support =
is also always encouraged. &nbsp; All, p</font><font =
face=3D"Helvetica-Light" class=3D"">lease voice your support or =
objections&nbsp;before&nbsp;May 15.</font><font face=3D"Helvetica-Light" =
class=3D"">&nbsp; &nbsp;</font><div class=3D""><font =
face=3D"Helvetica-Light" class=3D""><br class=3D""></font></div><div =
class=3D""><span style=3D"font-family: Helvetica-Light;" =
class=3D"">Authors, already there have been good comments for how to =
improve the document. &nbsp;However, please refrain from posting an =
update&nbsp;incorporating&nbsp;these comments until after this adoption =
poll closes, at which time the instruction will be to post a -00 with =
minimal changes, followed by a -01&nbsp;</span><span style=3D"font-family:=
 Helvetica-Light;" class=3D"">incorporating the =
comments.</span></div><div class=3D""><font face=3D"Helvetica-Light" =
class=3D""><br class=3D""></font></div><div class=3D""><font =
face=3D"Helvetica-Light" class=3D"">PS: the IPR poll conducted on Mar 25 =
is still considered valid.</font></div><div class=3D""><font =
face=3D"Helvetica-Light" class=3D""><br class=3D"">Kent &nbsp;// =
co-chair</font></div><div class=3D""><font face=3D"Helvetica-Light" =
class=3D""><br class=3D""></font></div><div class=3D""><font =
face=3D"Helvetica-Light" class=3D""><br =
class=3D""></font></div></div></body></html>=

--Apple-Mail=_8058A881-0FC3-4348-B131-9265FC851B4F--


From nobody Wed May  8 20:12:04 2019
Return-Path: <lana.wubo@huawei.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4A557120103 for <netmod@ietfa.amsl.com>; Wed,  8 May 2019 20:12:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ip1bL1DJ72_u for <netmod@ietfa.amsl.com>; Wed,  8 May 2019 20:12:01 -0700 (PDT)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9540412004D for <netmod@ietf.org>; Wed,  8 May 2019 20:12:01 -0700 (PDT)
Received: from lhreml706-cah.china.huawei.com (unknown [172.18.7.107]) by Forcepoint Email with ESMTP id 350FE2AD08F5261AC1D8 for <netmod@ietf.org>; Thu,  9 May 2019 04:12:00 +0100 (IST)
Received: from dggeme704-chm.china.huawei.com (10.1.199.100) by lhreml706-cah.china.huawei.com (10.201.108.47) with Microsoft SMTP Server (TLS) id 14.3.408.0; Thu, 9 May 2019 04:11:59 +0100
Received: from dggeme752-chm.china.huawei.com (10.3.19.98) by dggeme704-chm.china.huawei.com (10.1.199.100) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1591.10; Thu, 9 May 2019 11:11:57 +0800
Received: from dggeme752-chm.china.huawei.com ([10.6.80.76]) by dggeme752-chm.china.huawei.com ([10.6.80.76]) with mapi id 15.01.1591.008; Thu, 9 May 2019 11:11:57 +0800
From: "Wubo (lana)" <lana.wubo@huawei.com>
To: Kent Watsen <kent+ietf@watsen.net>, "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] Adoption poll for draft-wu-netmod-factory-default-03
Thread-Index: AdUGFGH6hAbOkfIE4kipvqEgGTTVQw==
Date: Thu, 9 May 2019 03:11:57 +0000
Message-ID: <63fdbc1dd84049e0a0f48fff6476c3da@huawei.com>
Accept-Language: en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.134.189.23]
Content-Type: multipart/alternative; boundary="_000_63fdbc1dd84049e0a0f48fff6476c3dahuaweicom_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/SJx5xNhwUJJMRcRNRuN-P7-VrMI>
Subject: Re: [netmod] Adoption poll for draft-wu-netmod-factory-default-03
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 May 2019 03:12:03 -0000

--_000_63fdbc1dd84049e0a0f48fff6476c3dahuaweicom_
Content-Type: text/plain; charset="gb2312"
Content-Transfer-Encoding: base64
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=

--_000_63fdbc1dd84049e0a0f48fff6476c3dahuaweicom_
Content-Type: text/html; charset="gb2312"
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dgb2312">
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:SimSun;
	panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:SimSun;
	panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
	{font-family:"Microsoft YaHei";
	panose-1:2 11 5 3 2 2 4 2 2 4;}
@font-face
	{font-family:"Microsoft YaHei";
	panose-1:2 11 5 3 2 2 4 2 2 4;}
@font-face
	{font-family:Helvetica-Light;
	panose-1:0 0 0 0 0 0 0 0 0 0;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman",serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-reply;
	font-family:"Calibri",sans-serif;
	color:#1F497D;
	font-weight:normal;
	font-style:normal;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 90.0pt 72.0pt 90.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D">I support WG adoption.<o:p></o:p></sp=
an></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D">I have read the draft and think it he=
lps network auto-configuration and interoperability.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D">Thanks,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D">Bo<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span lang=3D"ZH-CN" style=3D"font-size:11.0pt;fo=
nt-family:&quot;=CE=A2=C8=ED=D1=C5=BA=DA&quot;,sans-serif">=B7=A2=BC=FE=C8=
=CB</span></b><b><span style=3D"font-size:11.0pt;font-family:&quot;=CE=A2=
=C8=ED=D1=C5=BA=DA&quot;,sans-serif">:</span></b><span style=3D"font-size:1=
1.0pt;font-family:&quot;=CE=A2=C8=ED=D1=C5=BA=DA&quot;,sans-serif"> netmod
 [mailto:netmod-bounces@ietf.org] <b><span lang=3D"ZH-CN">=B4=FA=B1=ED </sp=
an></b>Kent Watsen<br>
<b><span lang=3D"ZH-CN">=B7=A2=CB=CD=CA=B1=BC=E4</span>:</b> 2019<span lang=
=3D"ZH-CN">=C4=EA</span>5<span lang=3D"ZH-CN">=D4=C2</span>9<span lang=3D"Z=
H-CN">=C8=D5</span> 5:52<br>
<b><span lang=3D"ZH-CN">=CA=D5=BC=FE=C8=CB</span>:</b> netmod@ietf.org<br>
<b><span lang=3D"ZH-CN">=D6=F7=CC=E2</span>:</b> [netmod] Adoption poll for=
 draft-wu-netmod-factory-default-03<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Helvetica-Light&quo=
t;,serif">This email begins a 1-week adoption poll for:</span><o:p></o:p></=
p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><span style=3D"font-f=
amily:&quot;Helvetica-Light&quot;,serif">&nbsp; &nbsp;&nbsp;<a href=3D"http=
s://tools.ietf.org/html/draft-wu-netmod-factory-default-03">https://tools.i=
etf.org/html/draft-wu-netmod-factory-default-03</a></span><o:p></o:p></p>
<div>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Helvetica-Light&quo=
t;,serif">As we&nbsp;already have&nbsp;consensus from the previous poll to =
work on the problem, this poll&nbsp;primarily seeks for objections for usin=
g -03 as a basis for WG adoption (the&nbsp;document will be adopted
 if no objections are raised). &nbsp;Of course, a show of support is also a=
lways encouraged. &nbsp; All, please voice your support or objections&nbsp;=
before&nbsp;May 15.&nbsp; &nbsp;</span><o:p></o:p></p>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Helvetica-Light&quo=
t;,serif">Authors, already there have been good comments for how to improve=
 the document. &nbsp;However, please refrain from posting an update&nbsp;in=
corporating&nbsp;these comments until after this adoption poll
 closes, at which time the instruction will be to post a -00 with minimal c=
hanges, followed by a -01&nbsp;incorporating the comments.</span><o:p></o:p=
></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Helvetica-Light&quo=
t;,serif">PS: the IPR poll conducted on Mar 25 is still considered valid.</=
span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Helvetica-Light&quo=
t;,serif"><br>
Kent &nbsp;// co-chair</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</div>
</div>
</body>
</html>

--_000_63fdbc1dd84049e0a0f48fff6476c3dahuaweicom_--


From nobody Thu May  9 06:51:37 2019
Return-Path: <bill.wu@huawei.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 61D651202A7 for <netmod@ietfa.amsl.com>; Thu,  9 May 2019 06:51:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id m2NOxTwDbBcN for <netmod@ietfa.amsl.com>; Thu,  9 May 2019 06:51:27 -0700 (PDT)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3ED9812016C for <netmod@ietf.org>; Thu,  9 May 2019 06:51:27 -0700 (PDT)
Received: from lhreml704-cah.china.huawei.com (unknown [172.18.7.106]) by Forcepoint Email with ESMTP id 9FFA0A2E1A4BC8A4B3F7; Thu,  9 May 2019 14:51:25 +0100 (IST)
Received: from lhreml702-chm.china.huawei.com (10.201.108.51) by lhreml704-cah.china.huawei.com (10.201.108.45) with Microsoft SMTP Server (TLS) id 14.3.408.0; Thu, 9 May 2019 14:51:25 +0100
Received: from lhreml702-chm.china.huawei.com (10.201.108.51) by lhreml702-chm.china.huawei.com (10.201.108.51) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1713.5; Thu, 9 May 2019 14:51:25 +0100
Received: from NKGEML411-HUB.china.huawei.com (10.98.56.70) by lhreml702-chm.china.huawei.com (10.201.108.51) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA_P256) id 15.1.1713.5 via Frontend Transport; Thu, 9 May 2019 14:51:24 +0100
Received: from NKGEML513-MBX.china.huawei.com ([169.254.1.144]) by nkgeml411-hub.china.huawei.com ([10.98.56.70]) with mapi id 14.03.0415.000; Thu, 9 May 2019 21:51:22 +0800
From: Qin Wu <bill.wu@huawei.com>
To: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>, "Martin Bjorklund" <mbj@tail-f.com>
CC: netmod <netmod@ietf.org>
Thread-Topic: [netmod] Adoption poll for draft-wu-netmod-factory-default-02
Thread-Index: AdUEA2FRIxalS4tFStC28aN3YVk9+ABTjY2AAACDIYAARqk4TQ==
Date: Thu, 9 May 2019 13:51:21 +0000
Message-ID: <B8F9A780D330094D99AF023C5877DABAA490E148@nkgeml513-mbx.china.huawei.com>
References: <B8F9A780D330094D99AF023C5877DABAA4909DE4@nkgeml513-mbx.china.huawei.com> <EB363D33-307A-48E7-B886-08395356BA86@cisco.com> <065d01d50591$173d7c80$4001a8c0@gateway.2wire.net> <20190508.135327.825252846107256677.mbj@tail-f.com>, <20190508120807.czpzkct6tkxafduc@anna.jacobs.jacobs-university.de>
In-Reply-To: <20190508120807.czpzkct6tkxafduc@anna.jacobs.jacobs-university.de>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Content-Type: multipart/alternative; boundary="_000_B8F9A780D330094D99AF023C5877DABAA490E148nkgeml513mbxchi_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/duetRk_aBfmkffEeAuTCwiYANq8>
Subject: Re: [netmod] Adoption poll for draft-wu-netmod-factory-default-02
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 May 2019 13:51:35 -0000

--_000_B8F9A780D330094D99AF023C5877DABAA490E148nkgeml513mbxchi_
Content-Type: text/plain; charset="gb2312"
Content-Transfer-Encoding: base64
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--_000_B8F9A780D330094D99AF023C5877DABAA490E148nkgeml513mbxchi_
Content-Type: text/html; charset="gb2312"
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dgb2312">
<meta name=3D"Generator" content=3D"Microsoft Exchange Server">
<!-- converted from text --><style><!-- .EmailQuote { margin-left: 1pt; pad=
ding-left: 4pt; border-left: #800000 2px solid; } --></style>
</head>
<body>
<div>
<div style=3D"font-family:Calibri,Helvetica!important">Thank Juergen, Marti=
n and Tom for good suggestions, will address your comments in the update af=
ter adoption.<br>
<br>
<br>
<hr style=3D"border-top:dotted 1px">
Qin Wu<br>
Mobile=A3=BA<a href=3D"tel:&#43;86-13914734360">&#43;86-13914734360</a>(Mob=
ile Number) <br>
Email=A3=BA<a href=3D"mailto:bill.wu@huawei.com">bill.wu@huawei.com</a><br>
<br>
<br>
<br>
</div>
<div name=3D"x_AnyOffice-Background-Image" style=3D"border-top:1px solid #B=
5C4DF; padding:8px">
<div><b>=B7=A2=BC=FE=C8=CB=A3=BA </b>Juergen Schoenwaelder&lt;<a href=3D"ma=
ilto:j.schoenwaelder@jacobs-university.de">j.schoenwaelder@jacobs-universit=
y.de</a>&gt;</div>
<div><b>=CA=D5=BC=FE=C8=CB=A3=BA </b>Martin Bjorklund&lt;<a href=3D"mailto:=
mbj@tail-f.com">mbj@tail-f.com</a>&gt;</div>
<div><b>=B3=AD=CB=CD=A3=BA </b>netmod&lt;<a href=3D"mailto:netmod@ietf.org"=
>netmod@ietf.org</a>&gt;</div>
<div><b>=D6=F7=CC=E2=A3=BA </b>Re: [netmod] Adoption poll for draft-wu-netm=
od-factory-default-02</div>
<div><b>=CA=B1=BC=E4=A3=BA </b>2019-05-08 20:08:40</div>
<br>
</div>
</div>
<font size=3D"2"><span style=3D"font-size:10pt;">
<div class=3D"PlainText">On Wed, May 08, 2019 at 01:53:27PM &#43;0200, Mart=
in Bjorklund wrote:<br>
&gt; &gt; <br>
&gt; &gt; Joe<br>
&gt; &gt; <br>
&gt; &gt; If you look at the various RFC - YANG, Netconf, NMDA - they all d=
efine<br>
&gt; &gt; the terms 'client' and 'server'; in the context, 'YANG server' se=
ems<br>
&gt; &gt; appropriate.<br>
&gt; <br>
&gt; I agree w/ Joe.&nbsp; I had the same comment when I read<br>
&gt; draft-ietf-netmod-yang-instance-file-format; it uses the term &quot;YA=
NG<br>
&gt; server&quot;.<br>
&gt; <br>
&gt; I think these documents should import and use the term &quot;server&qu=
ot; from<br>
&gt; RFC 8342 where it is defined as:<br>
&gt; <br>
&gt;&nbsp;&nbsp;&nbsp; o&nbsp; server: An entity that provides access to YA=
NG-defined data to a<br>
&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; client, over some network manageme=
nt protocol.<br>
&gt; <br>
&gt; Perhaps we should have a term &quot;YANG-based server&quot; or somethi=
ng as an<br>
&gt; alias to &quot;server&quot; as defined above.&nbsp; In some documents =
the short word<br>
&gt; &quot;server&quot; may sound too generic.&nbsp; But &quot;YANG server&=
quot; doesn't sound right<br>
&gt; to me.<br>
&gt;<br>
<br>
I find terms like 'YANG server' or 'YANG-based server' a bit confusing<br>
since the server is not talking YANG (there is no YANG protocol) and<br>
the server is also not sending/receiving YANG but YANG-defined data.<br>
<br>
Unless there is a possibility of confusion, importing the 'server'<br>
definition from RFC 8342 and using the terms 'server' is perhaps good<br>
enough.<br>
<br>
/js<br>
<br>
-- <br>
Juergen Schoenwaelder&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp; Jacobs University Bremen gGmbH<br>
Phone: &#43;49 421 200 3587&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
 Campus Ring 1 | 28759 Bremen | Germany<br>
Fax:&nbsp;&nbsp; &#43;49 421 200 3103&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp; &lt;<a href=3D"https://www.jacobs-university.de/">https://www.ja=
cobs-university.de/</a>&gt;<br>
<br>
_______________________________________________<br>
netmod mailing list<br>
netmod@ietf.org<br>
<a href=3D"https://www.ietf.org/mailman/listinfo/netmod">https://www.ietf.o=
rg/mailman/listinfo/netmod</a><br>
</div>
</span></font>
</body>
</html>

--_000_B8F9A780D330094D99AF023C5877DABAA490E148nkgeml513mbxchi_--


From nobody Thu May  9 07:27:36 2019
Return-Path: <jclarke@cisco.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 93ED0120116 for <netmod@ietfa.amsl.com>; Thu,  9 May 2019 07:27:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.51
X-Spam-Level: 
X-Spam-Status: No, score=-14.51 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_DKIMWL_WL_MED=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0GHXq8gS00rc for <netmod@ietfa.amsl.com>; Thu,  9 May 2019 07:27:33 -0700 (PDT)
Received: from rcdn-iport-3.cisco.com (rcdn-iport-3.cisco.com [173.37.86.74]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1025E12016C for <netmod@ietf.org>; Thu,  9 May 2019 07:27:25 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=12634; q=dns/txt; s=iport; t=1557412045; x=1558621645; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=w8jKxENVpYGxxI3GJuwKss1t9Tf3Fy3T2jTA9X/IvMI=; b=TmXR6HhuQb5tHFk2ad4mffB5iCSdlRt/A5swKPjOdh2pyRKnfx0etiJH XGakebdh6VgnmTZbv1pT1MiTXky6j0+fAzgG+4q5M88ikiSFLsJAf9E11 RdqPdtr1PYJUih1r2AI3wsDqu0v4txc5BuuGk4p+1K8zC9LKfAx8i28fn 4=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0ALAADYN9Rc/51dJa1kGgEBAQEBAgE?= =?us-ascii?q?BAQEHAgEBAQGBUwMBAQEBCwGBDoECgT0wMoQHp24IhXsUgWcJAQEBDAEBLwE?= =?us-ascii?q?BhEACF4FxIzYHDgEDAQEEAQECAQRtKIVLBiNWEAIBCA40AgICMCUBAQQOgye?= =?us-ascii?q?BHm2tOYEvgk+CeIRtgTIBi04XgUA/gTgfgkw+hB0QAYMgMoImBIsZgj6ETZU?= =?us-ascii?q?hCQKCCZJUG4IQijWJFKEcAhEVgTAlATGBV3AVOyoBgkKQUEGNa4ExgSEBAQ?=
X-IronPort-AV: E=Sophos;i="5.60,450,1549929600";  d="scan'208,217";a="545630415"
Received: from rcdn-core-6.cisco.com ([173.37.93.157]) by rcdn-iport-3.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 09 May 2019 14:27:24 +0000
Received: from XCH-RCD-012.cisco.com (xch-rcd-012.cisco.com [173.37.102.22]) by rcdn-core-6.cisco.com (8.15.2/8.15.2) with ESMTPS id x49EROUR021036 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 9 May 2019 14:27:24 GMT
Received: from xch-rcd-015.cisco.com (173.37.102.25) by XCH-RCD-012.cisco.com (173.37.102.22) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Thu, 9 May 2019 09:27:23 -0500
Received: from xch-rcd-015.cisco.com ([173.37.102.25]) by XCH-RCD-015.cisco.com ([173.37.102.25]) with mapi id 15.00.1473.003; Thu, 9 May 2019 09:27:23 -0500
From: "Joe Clarke (jclarke)" <jclarke@cisco.com>
To: Qin Wu <bill.wu@huawei.com>
CC: Kent Watsen <kent+ietf@watsen.net>, "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] Adoption poll for draft-wu-netmod-factory-default-02
Thread-Index: AdUEdfEQIxalS4tFStC28aN3YVk9+ACJ0juA
Date: Thu, 9 May 2019 14:27:23 +0000
Message-ID: <44CC722E-8CCC-4FFC-99BB-5412A0C03964@cisco.com>
References: <B8F9A780D330094D99AF023C5877DABAA490A523@nkgeml513-mbx.china.huawei.com>
In-Reply-To: <B8F9A780D330094D99AF023C5877DABAA490A523@nkgeml513-mbx.china.huawei.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.154.88.116]
Content-Type: multipart/alternative; boundary="_000_44CC722E8CCC4FFC99BB5412A0C03964ciscocom_"
MIME-Version: 1.0
X-Outbound-SMTP-Client: 173.37.102.22, xch-rcd-012.cisco.com
X-Outbound-Node: rcdn-core-6.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/_lGpCsrGoDVgFmLKr38f0Wb12ps>
Subject: Re: [netmod] Adoption poll for draft-wu-netmod-factory-default-02
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 May 2019 14:27:35 -0000

--_000_44CC722E8CCC4FFC99BB5412A0C03964ciscocom_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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=

--_000_44CC722E8CCC4FFC99BB5412A0C03964ciscocom_
Content-Type: text/html; charset="utf-8"
Content-ID: <F762E68224068C469AC270C17878872F@emea.cisco.com>
Content-Transfer-Encoding: base64
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--_000_44CC722E8CCC4FFC99BB5412A0C03964ciscocom_--


From nobody Thu May  9 07:29:00 2019
Return-Path: <jclarke@cisco.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0FEAD12006A for <netmod@ietfa.amsl.com>; Thu,  9 May 2019 07:28:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.511
X-Spam-Level: 
X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_DKIMWL_WL_MED=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ABnZrTO6xMYy for <netmod@ietfa.amsl.com>; Thu,  9 May 2019 07:28:55 -0700 (PDT)
Received: from rcdn-iport-3.cisco.com (rcdn-iport-3.cisco.com [173.37.86.74]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 22ABD120122 for <netmod@ietf.org>; Thu,  9 May 2019 07:28:51 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=1774; q=dns/txt; s=iport; t=1557412131; x=1558621731; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=Ig/tSQZwm2Tf8/Cnfwcddk8qgn2AE8GC+E/6zIggs1s=; b=hc8s4y3AykEub1Ji8unDcW4trldeepiBEST2I6JEDnOq/ntBbcZoqGyz SuoZnnTtx+0We1K5rjQRpF+B+MndySCPbovSZ29A3OhbVlehJkS5+rPVz IPbICjzNlXjpsxRvbC8TcO8WMHl6QsYk9yY7+Fmnr/Uj8NstSO2AX/GBB w=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AFAADYN9Rc/5pdJa1kGQEBAQEBAQE?= =?us-ascii?q?BAQEBAQcBAQEBAQGBUgMBAQEBAQsBghBpVDAoCoQHlR6YU4F7CQEBAQwBASM?= =?us-ascii?q?MAQGEQAIXgXEjNQgOAQMBAQQBAQIBBG0cDIVKAQEBAwEjEToLBQcEAgEIFQE?= =?us-ascii?q?CAgIjAwICAjAUARABAQQOBRuDBwGBew8PrSqBL4Q2AoEPhGcGgQsnAYtOF4F?= =?us-ascii?q?AP4ERJx+CTD6CYQICGIExgyAygiYEjVeZbgkCggmSVBuCEIo1iRSNRpNWAhE?= =?us-ascii?q?VgTAhAzOBV3AVOyoBgkGLEoU/QTGOa4EhAQE?=
X-IronPort-AV: E=Sophos;i="5.60,450,1549929600"; d="scan'208";a="545631277"
Received: from rcdn-core-3.cisco.com ([173.37.93.154]) by rcdn-iport-3.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 09 May 2019 14:28:49 +0000
Received: from XCH-RCD-013.cisco.com (xch-rcd-013.cisco.com [173.37.102.23]) by rcdn-core-3.cisco.com (8.15.2/8.15.2) with ESMTPS id x49ESniM031418 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 9 May 2019 14:28:50 GMT
Received: from xch-rcd-015.cisco.com (173.37.102.25) by XCH-RCD-013.cisco.com (173.37.102.23) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Thu, 9 May 2019 09:28:48 -0500
Received: from xch-rcd-015.cisco.com ([173.37.102.25]) by XCH-RCD-015.cisco.com ([173.37.102.25]) with mapi id 15.00.1473.003; Thu, 9 May 2019 09:28:49 -0500
From: "Joe Clarke (jclarke)" <jclarke@cisco.com>
To: tom petch <ietfc@btconnect.com>
CC: Qin Wu <bill.wu@huawei.com>, "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] Adoption poll for draft-wu-netmod-factory-default-02
Thread-Index: AdUEA2FRIxalS4tFStC28aN3YVk9+ACmgtYA
Date: Thu, 9 May 2019 14:28:49 +0000
Message-ID: <64FF5C9D-8BA4-4E36-92AA-EECD8B3BE035@cisco.com>
References: <B8F9A780D330094D99AF023C5877DABAA4909DE4@nkgeml513-mbx.china.huawei.com> <EB363D33-307A-48E7-B886-08395356BA86@cisco.com> <065d01d50591$173d7c80$4001a8c0@gateway.2wire.net>
In-Reply-To: <065d01d50591$173d7c80$4001a8c0@gateway.2wire.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.154.88.116]
Content-Type: text/plain; charset="utf-8"
Content-ID: <86070EA9F499114DB0EB940B86EBD4EA@emea.cisco.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-Outbound-SMTP-Client: 173.37.102.23, xch-rcd-013.cisco.com
X-Outbound-Node: rcdn-core-3.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/j1c_FCKpiEvQtOWE1f1HhtEfQfU>
Subject: Re: [netmod] Adoption poll for draft-wu-netmod-factory-default-02
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 May 2019 14:28:59 -0000

DQoNCj4gT24gTWF5IDgsIDIwMTksIGF0IDA3OjMxLCB0b20gcGV0Y2ggPGlldGZjQGJ0Y29ubmVj
dC5jb20+IHdyb3RlOg0KPiANCj4gLS0tLS0gT3JpZ2luYWwgTWVzc2FnZSAtLS0tLQ0KPiBGcm9t
OiAiSm9lIENsYXJrZSAoamNsYXJrZSkiIDxqY2xhcmtlQGNpc2NvLmNvbT4NCj4gU2VudDogTW9u
ZGF5LCBNYXkgMDYsIDIwMTkgNDoxMSBQTQ0KPj4gDQo+PiBPbiBNYXkgNiwgMjAxOSwgYXQgMDg6
MDYsIFFpbiBXdQ0KPiA8YmlsbC53dUBodWF3ZWkuY29tPG1haWx0bzpiaWxsLnd1QGh1YXdlaS5j
b20+PiB3cm90ZToNCj4+IA0KPj4gSGksIENoYWlyczoNCj4+IFNvcnJ5IGZvciBsYXRlIGZvbGxv
dyB1cCwgdGhhbmtzIEp1cmdlbiwgQW5keSxKb2UsIEpvZWwgYW5kIGFsbCBvdGhlcnMNCj4gZm9y
IGdvb2QgY29tbWVudHMsIGhlcmUgaXMgdGhlIHVwZGF0ZSBiYXNlZCBvbiBkaXNjdXNzaW9uIGFu
ZCBzdWdnZXN0aW9uDQo+IG9uIHRoZSBtYWlsaW5nIGxpc3QNCj4+IFRoZSBkaWZmIGlzOg0KPj4g
aHR0cHM6Ly93d3cuaWV0Zi5vcmcvcmZjZGlmZj91cmwyPWRyYWZ0LXd1LW5ldG1vZC1mYWN0b3J5
LWRlZmF1bHQtMDMNCj4+IA0KPj4gSGV5LCBRaW4uICBJIHJlYWQgdGhyb3VnaCB0aGUgY2hhbmdl
cywgYW5kIEkgaGF2ZSBhIGNvdXBsZSBvZg0KPiBhZGRpdGlvbmFsIGNvbW1lbnRzLg0KPj4gDQo+
PiBGaXJzdCwgdGhlIHRlcm0g4oCcWUFORyBzZXJ2ZXLigJ0gc291bmRzIG9kZCB0byBtZS4gIEkg
a25vdyB3aGF0IHlvdSBtZWFuLA0KPiBidXQgSSBoYXZlbuKAmXQgc2VlbiB0aGlzIGRlZmluZWQg
YmVmb3JlLiAgTWF5YmUganVzdCBzYXlpbmcgYSBkZXZpY2Ugb3INCj4gaG9zdCBpcyBzdWZmaWNp
ZW50Pw0KPiANCj4gSm9lDQo+IA0KPiBJZiB5b3UgbG9vayBhdCB0aGUgdmFyaW91cyBSRkMgLSBZ
QU5HLCBOZXRjb25mLCBOTURBIC0gdGhleSBhbGwgZGVmaW5lDQo+IHRoZSB0ZXJtcyAnY2xpZW50
JyBhbmQgJ3NlcnZlcic7IGluIHRoZSBjb250ZXh0LCAnWUFORyBzZXJ2ZXInIHNlZW1zDQo+IGFw
cHJvcHJpYXRlLg0KDQpJdCB3YXMgdGhlIGNvbWJpbmF0aW9uIG9mIHRoZSB0d28gd29yZHMgYXMg
4oCcWUFORyBzZXJ2ZXLigJ0gd2hpY2ggdGhyb3dzIG1lLiAgWW914oCZcmUgc2VydmluZyBkYXRh
IG1vZGVsZWQgdXNpbmcgWUFORy4gIEFueXdheSwgaXQgc291bmRzIGxpa2UgdGhlcmXigJlzIGEg
Z29vZCByZWZlcmVudGlhbCBzb2x1dGlvbiB0byB0aGlzIGZyb20gSsO8cmdlbiBhbmQgTWFydGlu
LCBzbyB0aGF0IHNob3VsZCBzb3J0IHRoaXMgb3V0Lg0KDQpKb2UNCg0K


From nobody Thu May  9 13:48:02 2019
Return-Path: <session-request@ietf.org>
X-Original-To: netmod@ietf.org
Delivered-To: netmod@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 4509E120145; Thu,  9 May 2019 13:48:00 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: IETF Meeting Session Request Tool <session-request@ietf.org>
To: <session-request@ietf.org>
Cc: netmod-chairs@ietf.org, ibagdona@gmail.com, lberger@labn.net, netmod@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.96.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <155743488027.24588.3517404777218968638.idtracker@ietfa.amsl.com>
Date: Thu, 09 May 2019 13:48:00 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/ULq78qK9QuaJzhfWDtrxjxZpg8w>
Subject: [netmod] netmod - New Meeting Session Request for IETF 105
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 May 2019 20:48:00 -0000

A new meeting session request has just been submitted by Lou Berger, a Chair of the netmod working group.


---------------------------------------------------------
Working Group Name: Network Modeling
Area Name: Operations and Management Area
Session Requester: Lou Berger

Number of Sessions: 2
Length of Session(s):  2 Hours, 2 Hours
Number of Attendees: 100
Conflicts to Avoid: 
 First Priority: netconf
 Second Priority: rtgwg i2rs teas
 Third Priority: saag


People who must be present:
  Lou Berger
  Joel Jaeggli
  Kent Watsen
  Ignas Bagdonas

Resources Requested:

Special Requests:
  
---------------------------------------------------------


From nobody Thu May  9 23:38:45 2019
Return-Path: <swmike@swm.pp.se>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 90A58120169 for <netmod@ietfa.amsl.com>; Thu,  9 May 2019 23:38:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.3
X-Spam-Level: 
X-Spam-Status: No, score=-4.3 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=swm.pp.se
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cxp0cCmth91b for <netmod@ietfa.amsl.com>; Thu,  9 May 2019 23:38:40 -0700 (PDT)
Received: from uplift.swm.pp.se (swm.pp.se [212.247.200.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A055E12019B for <netmod@ietf.org>; Thu,  9 May 2019 23:38:37 -0700 (PDT)
Received: by uplift.swm.pp.se (Postfix, from userid 501) id 561E6B2; Fri, 10 May 2019 08:38:34 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=swm.pp.se; s=mail; t=1557470314; bh=XgSPn5KxQZzAzpwI4fByGUkcC3ALAJkytShrMpKI8Dc=; h=Date:From:To:cc:Subject:In-Reply-To:References:From; b=pA4Fo1njPfNyglepbQZFjAg6Cs+9Vt3OyjJ4ktTc0eu6+Ym7NmDBi8qIcgFFLd1o2 8mW73UDVvWRSJh+vPwGmCcJvWMiYVkvfQDk6ZAkS/mB9ceSNJ8m9CXNERyldyQ1PXD Khf0r86ZEnTOrV22rQlHjmU7uCICSzhhpjvIhDqU=
Received: from localhost (localhost [127.0.0.1]) by uplift.swm.pp.se (Postfix) with ESMTP id 542BEB1; Fri, 10 May 2019 08:38:34 +0200 (CEST)
Date: Fri, 10 May 2019 08:38:34 +0200 (CEST)
From: Mikael Abrahamsson <swmike@swm.pp.se>
To: Kent Watsen <kent+ietf@watsen.net>
cc: "netmod@ietf.org" <netmod@ietf.org>
In-Reply-To: <0100016a996e6b55-6274d956-7a6e-4d56-b88b-524723053cdb-000000@email.amazonses.com>
Message-ID: <alpine.DEB.2.20.1905100833170.1824@uplift.swm.pp.se>
References: <0100016a996e6b55-6274d956-7a6e-4d56-b88b-524723053cdb-000000@email.amazonses.com>
User-Agent: Alpine 2.20 (DEB 67 2015-01-07)
Organization: People's Front Against WWW
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII; format=flowed
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/BkswUHzX8XS9QMLBFev3KoD9ZUU>
Subject: Re: [netmod] Adoption poll for draft-wu-netmod-factory-default-03
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 10 May 2019 06:38:44 -0000

On Wed, 8 May 2019, Kent Watsen wrote:

> This email begins a 1-week adoption poll for:
>
>    https://tools.ietf.org/html/draft-wu-netmod-factory-default-03
>
> As we already have consensus from the previous poll to work on the 
> problem, this poll primarily seeks for objections for using -03 as a 
> basis for WG adoption (the document will be adopted if no objections are 
> raised).  Of course, a show of support is also always encouraged.  All, 
> please voice your support or objections before May 15.

I support working on this problem and the draft seems to provide a 
feasible approach to the problem space.

We had to create our own factory-default RPC augmentation but we put it 
into our software management module instead. I'd prefer to use a 
standards-based one and this approach seems viable.

-- 
Mikael Abrahamsson    email: swmike@swm.pp.se


From nobody Fri May 10 03:50:53 2019
Return-Path: <ietfc@btconnect.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9EF22120072 for <netmod@ietfa.amsl.com>; Fri, 10 May 2019 03:50:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.248
X-Spam-Level: 
X-Spam-Status: No, score=0.248 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RATWARE_MS_HASH=2.148, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=btconnect.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bIQDInBiT8PT for <netmod@ietfa.amsl.com>; Fri, 10 May 2019 03:50:49 -0700 (PDT)
Received: from EUR04-VI1-obe.outbound.protection.outlook.com (mail-eopbgr80094.outbound.protection.outlook.com [40.107.8.94]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3611B120026 for <netmod@ietf.org>; Fri, 10 May 2019 03:50:48 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=btconnect.onmicrosoft.com; s=selector1-btconnect-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=tDEViCWLcaIqnvsMQZx7aXlyIG5XpBDYMIjPc9puk+U=; b=iqF1ybHM02rO6yKGJ1jN5C9V7jxNe2TEoGEGYU3eZEzYS0Jh1QzzBakKsLHmhTSjT/4pHDEiiPwp21wAk2SfQv2tWasptNsQ0e0p29B3jkAkMgpfA9H90j/ODs3RgEXPDARfFJxKj2kH4t1uMK/oQ8x75utD2fnhrXKBvkAhHdk=
Received: from VI1PR07MB3118.eurprd07.prod.outlook.com (10.175.242.156) by VI1PR07MB4192.eurprd07.prod.outlook.com (20.176.6.29) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1900.7; Fri, 10 May 2019 10:50:46 +0000
Received: from VI1PR07MB3118.eurprd07.prod.outlook.com ([fe80::41a4:68a9:d620:d42b]) by VI1PR07MB3118.eurprd07.prod.outlook.com ([fe80::41a4:68a9:d620:d42b%3]) with mapi id 15.20.1900.006; Fri, 10 May 2019 10:50:46 +0000
From: tom petch <ietfc@btconnect.com>
To: "Joe Clarke (jclarke)" <jclarke@cisco.com>
CC: Qin Wu <bill.wu@huawei.com>, "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] Adoption poll for draft-wu-netmod-factory-default-02
Thread-Index: AQHVBZGYZ1YLmj+D6UqmZXjpVYKlQw==
Date: Fri, 10 May 2019 10:50:46 +0000
Message-ID: <02b901d5071d$b61d09a0$4001a8c0@gateway.2wire.net>
References: <B8F9A780D330094D99AF023C5877DABAA4909DE4@nkgeml513-mbx.china.huawei.com> <EB363D33-307A-48E7-B886-08395356BA86@cisco.com> <065d01d50591$173d7c80$4001a8c0@gateway.2wire.net> <64FF5C9D-8BA4-4E36-92AA-EECD8B3BE035@cisco.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-clientproxiedby: LO2P265CA0029.GBRP265.PROD.OUTLOOK.COM (2603:10a6:600:61::17) To VI1PR07MB3118.eurprd07.prod.outlook.com (2603:10a6:802:20::28)
authentication-results: spf=none (sender IP is ) smtp.mailfrom=ietfc@btconnect.com; 
x-ms-exchange-messagesentrepresentingtype: 1
x-mailer: Microsoft Outlook Express 6.00.2800.1106
x-originating-ip: [86.139.215.234]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 7216f800-1b5c-4009-8f07-08d6d5355b4a
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600141)(711020)(4605104)(2017052603328)(7193020); SRVR:VI1PR07MB4192; 
x-ms-traffictypediagnostic: VI1PR07MB4192:
x-ms-exchange-purlcount: 1
x-microsoft-antispam-prvs: <VI1PR07MB419245B8AE57B79A6FF69895A00C0@VI1PR07MB4192.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-forefront-prvs: 0033AAD26D
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(366004)(39860400002)(346002)(136003)(376002)(396003)(13464003)(199004)(189003)(52314003)(6436002)(6486002)(446003)(14496001)(14454004)(7736002)(66066001)(71200400001)(81686011)(81816011)(229853002)(44736005)(66446008)(64756008)(66556008)(66476007)(316002)(73956011)(66946007)(71190400001)(256004)(14444005)(1556002)(76176011)(5660300002)(25786009)(486006)(86362001)(476003)(478600001)(44716002)(186003)(62236002)(66574012)(26005)(50226002)(386003)(6506007)(8936002)(53546011)(99286004)(8676002)(81166006)(81156014)(966005)(305945005)(86152003)(61296003)(6916009)(102836004)(6246003)(84392002)(3846002)(52116002)(68736007)(6116002)(6306002)(53936002)(4720700003)(6512007)(9686003)(4326008)(2906002)(54906003)(74416001)(7726001); DIR:OUT; SFP:1102; SCL:1; SRVR:VI1PR07MB4192; H:VI1PR07MB3118.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:0; MX:1; 
received-spf: None (protection.outlook.com: btconnect.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: MSSbcd19NzKlzXQWNbOoDlFKR/v4/fsGGhjJt8sTV5VyAIKfLz3UxCUp6jRDNoKGMk9bGWHrYM5U47RU/fQtTQh0ekKXjQnbqkoePD/883gfu8tamaByiQcQNPnSvraZmhcyguUsuklUns64fc62QO0RatWAbGf6FeoF13CEQupizHWpax0M87OubTuPfJ52ChIf9pGkXiWq5hKm/gyPN4vIF08M2KOoKGy49898Ue0sKs4cFB1mVaZPV6XRSrnSLKbnp/WrauegUl40ZH34aYge3uMSMN5UHbbS09/q+SBYNllBPK7TZqA0iap51TjPL7ZLAVuEr5avry4ZXxCmF15aKMCpqm4qFnfo03DDEf3mei6Ko2BV+nbieNFlPs+gnHHKgWcK/plb8uyPds+C7gaCGi4sE/dJdaHcCa1Bfiw=
Content-Type: text/plain; charset="utf-8"
Content-ID: <C3B78A658DE44C4B9C4E30C8E01AF7DB@eurprd07.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: btconnect.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 7216f800-1b5c-4009-8f07-08d6d5355b4a
X-MS-Exchange-CrossTenant-originalarrivaltime: 10 May 2019 10:50:46.2978 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: cf8853ed-96e5-465b-9185-806bfe185e30
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR07MB4192
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/G1o4UP8b9suWvAcfj2xrA4aBAe0>
Subject: Re: [netmod] Adoption poll for draft-wu-netmod-factory-default-02
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 10 May 2019 10:50:52 -0000
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From nobody Sun May 12 14:19:51 2019
Return-Path: <lberger@labn.net>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1C013120163 for <netmod@ietfa.amsl.com>; Sun, 12 May 2019 14:19:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.501
X-Spam-Level: 
X-Spam-Status: No, score=-0.501 tagged_above=-999 required=5 tests=[BAYES_05=-0.5, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (768-bit key) header.d=labn.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uNNoNqI0Y5cx for <netmod@ietfa.amsl.com>; Sun, 12 May 2019 14:19:48 -0700 (PDT)
Received: from gproxy9-pub.mail.unifiedlayer.com (gproxy9-pub.mail.unifiedlayer.com [69.89.20.122]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B58D5120130 for <netmod@ietf.org>; Sun, 12 May 2019 14:19:48 -0700 (PDT)
Received: from CMGW (unknown [10.9.0.13]) by gproxy9.mail.unifiedlayer.com (Postfix) with ESMTP id A49031E0721 for <netmod@ietf.org>; Sun, 12 May 2019 15:19:45 -0600 (MDT)
Received: from box313.bluehost.com ([69.89.31.113]) by cmsmtp with ESMTP id PvsnhOodeeyBxPvsnhnIVF; Sun, 12 May 2019 15:19:45 -0600
X-Authority-Reason: nr=8
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=labn.net; s=default; h=Content-Transfer-Encoding:Content-Type:MIME-Version:Date: Message-ID:Cc:To:Subject:From:Sender:Reply-To:Content-ID:Content-Description: Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID: In-Reply-To:References:List-Id:List-Help:List-Unsubscribe:List-Subscribe: List-Post:List-Owner:List-Archive; bh=HrqFPzxVZ562C/XXU+TooepFgS6fe3kCFojLQZIfegY=; b=XBL3WvrqlQfAOmw2IwRofw2dGT BGhMNyf670aeBZoi2jXxv8o3x/f43GL1aH+Bf43EQ+v12QiKu5mWRgs+FgWX3FbQxKA5J4872+F49 jw91c4Gk3mOhMoLbVWsbUPkvB;
Received: from pool-72-66-11-201.washdc.fios.verizon.net ([72.66.11.201]:51920 helo=[IPv6:::1]) by box313.bluehost.com with esmtpsa (TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128) (Exim 4.91) (envelope-from <lberger@labn.net>) id 1hPvsn-000zFk-80; Sun, 12 May 2019 15:19:45 -0600
From: Lou Berger <lberger@labn.net>
To: NetMod WG <netmod@ietf.org>
Cc: NetMod WG Chairs <netmod-chairs@ietf.org>
Message-ID: <e6fc4541-891a-60cb-e956-86f238d09f14@labn.net>
Date: Sun, 12 May 2019 17:19:44 -0400
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.6.1
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
Content-Language: en-US
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - box313.bluehost.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - labn.net
X-BWhitelist: no
X-Source-IP: 72.66.11.201
X-Source-L: No
X-Exim-ID: 1hPvsn-000zFk-80
X-Source: 
X-Source-Args: 
X-Source-Dir: 
X-Source-Sender: pool-72-66-11-201.washdc.fios.verizon.net ([IPv6:::1]) [72.66.11.201]:51920
X-Source-Auth: lberger@labn.net
X-Email-Count: 7
X-Source-Cap: bGFibm1vYmk7bGFibm1vYmk7Ym94MzEzLmJsdWVob3N0LmNvbQ==
X-Local-Domain: yes
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/iMlFptzf5IMd5nUdBzNfHb6u9PQ>
Subject: [netmod] WG Last Call: draft-ietf-netmod-artwork-folding-02
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 12 May 2019 21:19:50 -0000

All,

This starts a two-week working group last call for
draft-ietf-netmod-artwork-folding-02

The working group last call ends on May 27.
Please send your comments to the working group mailing list.

Positive comments, e.g., "I've reviewed this document
and believe it is ready for publication", are welcome!
This is useful and important, even from authors.

Thank you,
NetMod Chairs




From nobody Sun May 12 14:22:03 2019
Return-Path: <lberger@labn.net>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 21261120157 for <netmod@ietfa.amsl.com>; Sun, 12 May 2019 14:22:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level: 
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (768-bit key) header.d=labn.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NdWPgNmvQ-9V for <netmod@ietfa.amsl.com>; Sun, 12 May 2019 14:21:59 -0700 (PDT)
Received: from gproxy1-pub.mail.unifiedlayer.com (gproxy1-pub.mail.unifiedlayer.com [69.89.25.95]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1FC71120129 for <netmod@ietf.org>; Sun, 12 May 2019 14:21:59 -0700 (PDT)
Received: from cmgw10.unifiedlayer.com (unknown [10.9.0.10]) by gproxy1.mail.unifiedlayer.com (Postfix) with ESMTP id 0798BA7332D8E for <netmod@ietf.org>; Sun, 12 May 2019 15:17:42 -0600 (MDT)
Received: from box313.bluehost.com ([69.89.31.113]) by cmsmtp with ESMTP id PvqnhuWsCsFwgPvqnhu1Wi; Sun, 12 May 2019 15:17:41 -0600
X-Authority-Reason: nr=8
X-Authority-Analysis: v=2.3 cv=PIYhB8iC c=1 sm=1 tr=0 a=h1BC+oY+fLhyFmnTBx92Jg==:117 a=h1BC+oY+fLhyFmnTBx92Jg==:17 a=IkcTkHD0fZMA:10:nop_charset_1 a=xqWC_Br6kY4A:10:nop_ipv6 a=E5NmQfObTbMA:10:nop_rcvd_month_year a=Vy_oeq2dmq0A:10:endurance_base64_authed_username_1 a=48vgC7mUAAAA:8 a=-tsAPJKn6S7ax0J5AdsA:9 a=QEXdDO2ut3YA:10:nop_charset_2 a=Ig16_jW4bggA:10:nop_malware_emotet_link_5 a=w1C3t2QeGrPiZgrLijVG:22 a=pHzHmUro8NiASowvMSCR:22 a=Ew2E2A-JSTLzCXPT_086:22
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=labn.net; s=default; h=Content-Transfer-Encoding:Content-Type:MIME-Version:Date: Message-ID:Cc:To:Subject:From:Sender:Reply-To:Content-ID:Content-Description: Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID: In-Reply-To:References:List-Id:List-Help:List-Unsubscribe:List-Subscribe: List-Post:List-Owner:List-Archive; bh=QmHrF4+KxpYx/pxNL42m0qG0YeZvE4M+IBodrKhIXMU=; b=srIfqtiutbfREP5UNk9fFrQm/D cPVnClTx5XnBbmyxYR9LpI0ykNlbV52sCTDwdIa5BMiKwsEP5f/GLCRLJQd1iOZmDdvVB9cV+IUiy xNhgc7mWxN5fD1SvS3z4lP2iL;
Received: from pool-72-66-11-201.washdc.fios.verizon.net ([72.66.11.201]:51742 helo=[IPv6:::1]) by box313.bluehost.com with esmtpsa (TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128) (Exim 4.91) (envelope-from <lberger@labn.net>) id 1hPvqn-000yqa-K6; Sun, 12 May 2019 15:17:41 -0600
From: Lou Berger <lberger@labn.net>
To: Kent Watsen <kent+ietf@watsen.net>, "adrian@olddog.co.uk" <adrian@olddog.co.uk>, bill.wu@huawei.com, afarrel@juniper.net
Cc: NetMod WG Chairs <netmod-chairs@ietf.org>, NetMod WG <netmod@ietf.org>
Message-ID: <c33d2e55-3ecf-0686-99c6-f88a4f0c1014@labn.net>
Date: Sun, 12 May 2019 17:17:40 -0400
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.6.1
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
Content-Language: en-US
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - box313.bluehost.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - labn.net
X-BWhitelist: no
X-Source-IP: 72.66.11.201
X-Source-L: No
X-Exim-ID: 1hPvqn-000yqa-K6
X-Source: 
X-Source-Args: 
X-Source-Dir: 
X-Source-Sender: pool-72-66-11-201.washdc.fios.verizon.net ([IPv6:::1]) [72.66.11.201]:51742
X-Source-Auth: lberger@labn.net
X-Email-Count: 6
X-Source-Cap: bGFibm1vYmk7bGFibm1vYmk7Ym94MzEzLmJsdWVob3N0LmNvbQ==
X-Local-Domain: yes
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/s1TKbSLXvlJG8Q9MgqFm4197r88>
Subject: [netmod] Regarding IPR on draft-ietf-netmod-artwork-folding-02
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 12 May 2019 21:22:01 -0000

Authors, Contributors, WG,

As part of WG Last Call

Are you aware of any IPR that applies to drafts identified above?

Please state either:

"No, I'm not aware of any IPR that applies to this draft"
or
"Yes, I'm aware of IPR that applies to this draft"

If so, has this IPR been disclosed in compliance with IETF IPR rules
(see RFCs 3669, 5378 and 8179 for more details)?

If yes to the above, please state either:

"Yes, the IPR has been disclosed in compliance with IETF IPR rules"
or
"No, the IPR has not been disclosed"

If you answer no, please provide any additional details you think
appropriate.

If you are listed as a document author or contributor please answer the
above by responding to this email regardless of whether or not you are
aware of any relevant IPR. This document will not advance to the next
stage until a response has been received from each author and listed
contributor. NOTE: THIS APPLIES TO ALL OF YOU LISTED IN THIS MESSAGE'S
TO LINES.

If you are on the WG email list or attend WG meetings but are not listed
as an author or contributor, we remind you of your obligations under
the IETF IPR rules which encourages you to notify the IETF if you are
aware of IPR of others on an IETF contribution, or to refrain from
participating in any contribution or discussion related to your
undisclosed IPR. For more information, please see the RFCs listed above
and
http://trac.tools.ietf.org/group/iesg/trac/wiki/IntellectualProperty.

Thank you,
NetMod WG Chairs

PS Please include all listed in the headers of this message in your
response.





From nobody Sun May 12 14:30:24 2019
Return-Path: <adrian@olddog.co.uk>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DF798120163; Sun, 12 May 2019 14:30:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Rb-ti9_9nW10; Sun, 12 May 2019 14:30:21 -0700 (PDT)
Received: from mta7.iomartmail.com (mta7.iomartmail.com [62.128.193.157]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DA34012000E; Sun, 12 May 2019 14:30:20 -0700 (PDT)
Received: from vs3.iomartmail.com (vs3.iomartmail.com [10.12.10.124]) by mta7.iomartmail.com (8.14.4/8.14.4) with ESMTP id x4CLUBTf002037; Sun, 12 May 2019 22:30:11 +0100
Received: from vs3.iomartmail.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id A33822203A; Sun, 12 May 2019 22:30:10 +0100 (BST)
Received: from asmtp3.iomartmail.com (unknown [10.12.10.224]) by vs3.iomartmail.com (Postfix) with ESMTPS id 8DEC122032; Sun, 12 May 2019 22:30:10 +0100 (BST)
Received: from LAPTOPK7AS653V (4.196.bbplus.pte-ag1.dyn.plus.net [81.174.196.4] (may be forged)) (authenticated bits=0) by asmtp3.iomartmail.com (8.14.4/8.14.4) with ESMTP id x4CLU7Am026650 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Sun, 12 May 2019 22:30:08 +0100
Reply-To: <adrian@olddog.co.uk>
From: "Adrian Farrel" <adrian@olddog.co.uk>
To: "'Lou Berger'" <lberger@labn.net>, "'Kent Watsen'" <kent+ietf@watsen.net>,  <bill.wu@huawei.com>
Cc: "'NetMod WG Chairs'" <netmod-chairs@ietf.org>, "'NetMod WG'" <netmod@ietf.org>
References: <c33d2e55-3ecf-0686-99c6-f88a4f0c1014@labn.net>
In-Reply-To: <c33d2e55-3ecf-0686-99c6-f88a4f0c1014@labn.net>
Date: Sun, 12 May 2019 22:30:05 +0100
Organization: Old Dog Consulting
Message-ID: <009201d50909$e0362c60$a0a28520$@olddog.co.uk>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQJEJ2GBUWIK1gETndIxgvHGZ9MBjqWJwvVA
Content-Language: en-gb
X-Originating-IP: 81.174.196.4
X-Thinkmail-Auth: adrian@olddog.co.uk
X-TM-AS-GCONF: 00
X-TM-AS-Product-Ver: IMSVA-9.0.0.1623-8.2.0.1013-24610.002
X-TM-AS-Result: No--4.239-10.0-31-10
X-imss-scan-details: No--4.239-10.0-31-10
X-TMASE-Version: IMSVA-9.0.0.1623-8.2.1013-24610.002
X-TMASE-Result: 10--4.238700-10.000000
X-TMASE-MatchedRID: UuaOI1zLN1jxIbpQ8BhdbLvDCO1MjiwQqnabhLgnhmjEDKpuLqDeoCZK RIFpXA+BMXEn4M+GcWtkRjKJ4WcSvMt+2Xe+MgKzdXu122+iJtpZBUTVqP/d0rV5fSMRD1zqPk7 szcK45eD1SzhmuM96r29iKGLgMHiUXBtzGjIuBpm8coKUcaOOvSH2Y0Xxk8nYlNU3cWIuTKjMAN AT2oeJJGjBhqXjBGJgLEh2rosnnTddpLkh5p97g3uzDvI75j0saXmdXF2Ym8elyfbzMrA/wvpGc UVZJmzP9ogJ7z2I9NqP9uLyz1kjdJya2tEru0x7cTwOmq5GKdAfXzVgO0hVquSXcP3D9BzPkpCW zIXhzQERnrkKGK4/PF+24nCsUSFNVAADMmTH9KgrN8z0HohG3voLR4+zsDTthUfR2rvBju5Z7lU nGQaMTAeuyf83ctuC+4FLTR7HIMQpACmR032UXWBVGD4iGCmAKeyNcavskCncHO3jNE4aIykZT1 1IHfBCmalIsRMV2vZtmS0aXb567KfItuohgjfnw/3NmPJsa4pNWfnUnboMLyBJEZlhLWrQQwymt xuJ6y0=
X-TMASE-SNAP-Result: 1.821001.0001-0-1-12:0,22:0,33:0,34:0-0
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/LanI-ttzn_B6tkQHfFWvhN-VB4E>
Subject: Re: [netmod] Regarding IPR on draft-ietf-netmod-artwork-folding-02
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 12 May 2019 21:30:24 -0000

Hi,

Noting that the draft (and hence the draft alias) has my email address =
correct.

No, I'm not aware of any IPR that applies to this draft.

Thanks,
Adrian

-----Original Message-----
From: Lou Berger <lberger@labn.net>=20
Sent: 12 May 2019 22:18
To: Kent Watsen <kent+ietf@watsen.net>; adrian@olddog.co.uk; =
bill.wu@huawei.com; afarrel@juniper.net
Cc: NetMod WG Chairs <netmod-chairs@ietf.org>; NetMod WG =
<netmod@ietf.org>
Subject: Regarding IPR on draft-ietf-netmod-artwork-folding-02

Authors, Contributors, WG,

As part of WG Last Call

Are you aware of any IPR that applies to drafts identified above?

Please state either:

"No, I'm not aware of any IPR that applies to this draft"
or
"Yes, I'm aware of IPR that applies to this draft"

If so, has this IPR been disclosed in compliance with IETF IPR rules
(see RFCs 3669, 5378 and 8179 for more details)?

If yes to the above, please state either:

"Yes, the IPR has been disclosed in compliance with IETF IPR rules"
or
"No, the IPR has not been disclosed"

If you answer no, please provide any additional details you think
appropriate.

If you are listed as a document author or contributor please answer the
above by responding to this email regardless of whether or not you are
aware of any relevant IPR. This document will not advance to the next
stage until a response has been received from each author and listed
contributor. NOTE: THIS APPLIES TO ALL OF YOU LISTED IN THIS MESSAGE'S
TO LINES.

If you are on the WG email list or attend WG meetings but are not listed
as an author or contributor, we remind you of your obligations under
the IETF IPR rules which encourages you to notify the IETF if you are
aware of IPR of others on an IETF contribution, or to refrain from
participating in any contribution or discussion related to your
undisclosed IPR. For more information, please see the RFCs listed above
and
http://trac.tools.ietf.org/group/iesg/trac/wiki/IntellectualProperty.

Thank you,
NetMod WG Chairs

PS Please include all listed in the headers of this message in your
response.





From nobody Sun May 12 14:41:47 2019
Return-Path: <adrian@olddog.co.uk>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9DEF412019D; Sun, 12 May 2019 14:41:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0UicPg75JOy2; Sun, 12 May 2019 14:41:43 -0700 (PDT)
Received: from mta6.iomartmail.com (mta6.iomartmail.com [62.128.193.156]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7D165120173; Sun, 12 May 2019 14:41:42 -0700 (PDT)
Received: from vs3.iomartmail.com (vs3.iomartmail.com [10.12.10.124]) by mta6.iomartmail.com (8.14.4/8.14.4) with ESMTP id x4CLffch020276; Sun, 12 May 2019 22:41:41 +0100
Received: from vs3.iomartmail.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id C46EB2203A; Sun, 12 May 2019 22:41:40 +0100 (BST)
Received: from asmtp1.iomartmail.com (unknown [10.12.10.248]) by vs3.iomartmail.com (Postfix) with ESMTPS id AF90822032; Sun, 12 May 2019 22:41:40 +0100 (BST)
Received: from LAPTOPK7AS653V (4.196.bbplus.pte-ag1.dyn.plus.net [81.174.196.4] (may be forged)) (authenticated bits=0) by asmtp1.iomartmail.com (8.14.4/8.14.4) with ESMTP id x4CLfdwM031104 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Sun, 12 May 2019 22:41:40 +0100
Reply-To: <adrian@olddog.co.uk>
From: "Adrian Farrel" <adrian@olddog.co.uk>
To: "'Lou Berger'" <lberger@labn.net>, "'NetMod WG'" <netmod@ietf.org>
Cc: "'NetMod WG Chairs'" <netmod-chairs@ietf.org>
References: <e6fc4541-891a-60cb-e956-86f238d09f14@labn.net>
In-Reply-To: <e6fc4541-891a-60cb-e956-86f238d09f14@labn.net>
Date: Sun, 12 May 2019 22:41:39 +0100
Organization: Old Dog Consulting
Message-ID: <009301d5090b$7bd95ab0$738c1010$@olddog.co.uk>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQI92vgELy7hkafOr9a7V0966haG5KWWXvKQ
Content-Language: en-gb
X-Originating-IP: 81.174.196.4
X-Thinkmail-Auth: adrian@olddog.co.uk
X-TM-AS-GCONF: 00
X-TM-AS-Product-Ver: IMSVA-9.0.0.1623-8.2.0.1013-24610.002
X-TM-AS-Result: No--8.538-10.0-31-10
X-imss-scan-details: No--8.538-10.0-31-10
X-TMASE-Version: IMSVA-9.0.0.1623-8.2.1013-24610.002
X-TMASE-Result: 10--8.538400-10.000000
X-TMASE-MatchedRID: hls5oAVArl9fsB4HYR80ZnFPUrVDm6jtEtdrY/Wb3fOabNoYojBQdhn6 1/JmBe6HqOyY/u7ajs3d4VjvtZC1+l2kuSHmn3uDF0vYDRID+co026H7nOZLr8A5YKm8dwM6ZJK RlY/MqloUDvrYtrNj72RGMonhZxK8zCsOCBxDp3UXrP0cYcrA291UTzC0dgdFROSPFoR0c3yU62 zvc1Dlo3xcUE1HkchRHrZazVLXn07Ubyut0lXeoPv+//lqU1h6snx5eF6NfYhPkajTRZCnxu8ke 9FM2hzh9RMMteM9sxseYZj+jjPzyU1+zyfzlN7y/sToY2qzpx4rN8z0HohG3voLR4+zsDTtFAQv QYa7pINRGqbqBFW+/Jf4eMbEbQ4jVeILJGZqzhZG9dA8qdhhdw==
X-TMASE-SNAP-Result: 1.821001.0001-0-1-12:0,22:0,33:0,34:0-0
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/fmJryyZmFFBv_kCIC40inhcywKE>
Subject: Re: [netmod] WG Last Call: draft-ietf-netmod-artwork-folding-02
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 12 May 2019 21:41:46 -0000

Thanks Lou,

[speaking as an author]

This draft represents the coming together of two different approaches to the
same problem. The authors worked hard to merge and reach consensus, and the
current revision contains the product.

This document certainly addresses my personal requirement which is to
provide a common human-readable notation for use in XML examples in drafts
and RFCs so that artificial line-wraps can be disambiguated. And so I
support its publication.

Best,
Adrian

-----Original Message-----
From: netmod <netmod-bounces@ietf.org> On Behalf Of Lou Berger
Sent: 12 May 2019 22:20
To: NetMod WG <netmod@ietf.org>
Cc: NetMod WG Chairs <netmod-chairs@ietf.org>
Subject: [netmod] WG Last Call: draft-ietf-netmod-artwork-folding-02


All,

This starts a two-week working group last call for
draft-ietf-netmod-artwork-folding-02

The working group last call ends on May 27.
Please send your comments to the working group mailing list.

Positive comments, e.g., "I've reviewed this document
and believe it is ready for publication", are welcome!
This is useful and important, even from authors.

Thank you,
NetMod Chairs



_______________________________________________
netmod mailing list
netmod@ietf.org
https://www.ietf.org/mailman/listinfo/netmod


From nobody Sun May 12 15:40:19 2019
Return-Path: <jefftant.ietf@gmail.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 98BB5120156; Sun, 12 May 2019 15:40:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FponjnBlSU6c; Sun, 12 May 2019 15:40:15 -0700 (PDT)
Received: from mail-pf1-x42f.google.com (mail-pf1-x42f.google.com [IPv6:2607:f8b0:4864:20::42f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3879C12013E; Sun, 12 May 2019 15:40:15 -0700 (PDT)
Received: by mail-pf1-x42f.google.com with SMTP id v80so6118065pfa.3; Sun, 12 May 2019 15:40:15 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=J7rkIcmYE4+4y+VdhxbX3dpBNcPpLA+J+I7GvMq14mA=; b=H3iBzpZn0cVJNBc/jMmYc/hfi29AG9n4hFeKXYqyuFISCts/OsWG1XaGHqDCrtZi5L z3vmOgTSMpu96GAm4h+A43FzMjnraqlmwhmgx2WGo8DEwSpIwUaGq3/6gLuEQHsEYQ7D bX6tbzJqruXDMfYTi4amtnzpgEYypRIWUqt3BMz2PNBMi9PnLSpQXXEIRCGE/MVrz851 8WsJqKGntShYYCfOShLINT0KKx8iA9E2gVevJvSJBfqvNAH5pSyXofMjnus46wpHu7G7 +m7IdKYP89uViRcQSQLDdQ2Zz5P8mRLrRosrZW/85BRljeiqIRv9PQ93MTdB2dUA3+aG ghOA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=J7rkIcmYE4+4y+VdhxbX3dpBNcPpLA+J+I7GvMq14mA=; b=S3dyD2U3cUN4Mma8Lb2WIkb3BVK+ZL0656s0z2kP9KrhXcIksSLK2xDdEOOVl+r7A7 RojWBQBzw5x+RWNGWPL1PnNz4oL5SI2O+V9uomzDTdEw4Y4GMbJGoscToJ/tF6KuFEPC txbggBngAtMDv55x2+VPoUqPDIGC88q9poVy3hjvGfuUsEHREw1mxT+dvYkFnM3tRYq8 Gayh0xs9YsHqgKd/krM2Q+53/IO0kkBpj4jstkapUjyogH/plU6yg96jCZY7pTfCdtOj 12zn7Rkt0aCVv8vNZDJTsHkXbY5utaJRY0wAvnEJtGmy2E5eF53I3wrTkyC4YQYIw5Hn uL3g==
X-Gm-Message-State: APjAAAXMStw7djHu0oHV033iXlEI0d29dSjWe72bM0hrUROzXcE1uTHV 1fx7dWV5jC5cqXIdi/s5uSxwajWH
X-Google-Smtp-Source: APXvYqwotgKgOR42e1jK/OoBYLuTojltjKvR8mO64E4RpjH3X/ZccSKxNWXvCWVtU4bsZhOu+VVjrg==
X-Received: by 2002:a62:30c2:: with SMTP id w185mr29543077pfw.175.1557700814424;  Sun, 12 May 2019 15:40:14 -0700 (PDT)
Received: from [192.168.1.5] (c-73-189-13-44.hsd1.ca.comcast.net. [73.189.13.44]) by smtp.gmail.com with ESMTPSA id f4sm538418pfn.118.2019.05.12.15.40.13 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Sun, 12 May 2019 15:40:13 -0700 (PDT)
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (1.0)
From: Jeff Tantsura <jefftant.ietf@gmail.com>
X-Mailer: iPhone Mail (16E227)
In-Reply-To: <e6fc4541-891a-60cb-e956-86f238d09f14@labn.net>
Date: Sun, 12 May 2019 15:40:13 -0700
Cc: NetMod WG <netmod@ietf.org>, NetMod WG Chairs <netmod-chairs@ietf.org>
Content-Transfer-Encoding: 7bit
Message-Id: <D4483568-E046-485C-8F98-599CE2CFA5D7@gmail.com>
References: <e6fc4541-891a-60cb-e956-86f238d09f14@labn.net>
To: Lou Berger <lberger@labn.net>
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/WGGDymcgCOXnA3s5aYe-c_qiYFY>
Subject: Re: [netmod] WG Last Call: draft-ietf-netmod-artwork-folding-02
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 12 May 2019 22:40:18 -0000

Lou,

I support the progress of the draft and it is ready for the publication.

Regards,
Jeff

> On May 12, 2019, at 14:19, Lou Berger <lberger@labn.net> wrote:
> 
> 
> All,
> 
> This starts a two-week working group last call for
> draft-ietf-netmod-artwork-folding-02
> 
> The working group last call ends on May 27.
> Please send your comments to the working group mailing list.
> 
> Positive comments, e.g., "I've reviewed this document
> and believe it is ready for publication", are welcome!
> This is useful and important, even from authors.
> 
> Thank you,
> NetMod Chairs
> 
> 
> 
> _______________________________________________
> netmod mailing list
> netmod@ietf.org
> https://www.ietf.org/mailman/listinfo/netmod


From nobody Sun May 12 17:55:25 2019
Return-Path: <0100016aaeafd64c-15be6043-bde9-49a8-980a-0ca0f27a1447-000000@amazonses.watsen.net>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 20A6A120041; Sun, 12 May 2019 17:55:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=amazonses.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kLnsH6wOrDgg; Sun, 12 May 2019 17:55:22 -0700 (PDT)
Received: from a8-33.smtp-out.amazonses.com (a8-33.smtp-out.amazonses.com [54.240.8.33]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BDF6B120033; Sun, 12 May 2019 17:55:21 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=6gbrjpgwjskckoa6a5zn6fwqkn67xbtw; d=amazonses.com; t=1557708920; h=Content-Type:Mime-Version:Subject:From:In-Reply-To:Date:Cc:Content-Transfer-Encoding:Message-Id:References:To:Feedback-ID; bh=QPPGqVnt4vNp8Niw95Nql07/FEq5yVcaNjbVUerZ/C0=; b=V1gZaT2Hlth/uNl2j40WU9haBafYneaCQLtJTha+y9PnukSjfzXSqR5RHmhAH77t ZoFmTjWwoPrBic7qRGTZzW7n+vByBFVEJjTYLkpotUGC0S+2ckZR84CtYtC9BG2uh8M JGxbCiKiXahvQscrCnV4d1HnWvJxEPnQnbiWcl6Q=
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (1.0)
From: Kent Watsen <kent+ietf@watsen.net>
X-Mailer: iPhone Mail (16E227)
In-Reply-To: <c33d2e55-3ecf-0686-99c6-f88a4f0c1014@labn.net>
Date: Mon, 13 May 2019 00:55:20 +0000
Cc: "adrian@olddog.co.uk" <adrian@olddog.co.uk>, bill.wu@huawei.com, afarrel@juniper.net, NetMod WG Chairs <netmod-chairs@ietf.org>, NetMod WG <netmod@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-ID: <0100016aaeafd64c-15be6043-bde9-49a8-980a-0ca0f27a1447-000000@email.amazonses.com>
References: <c33d2e55-3ecf-0686-99c6-f88a4f0c1014@labn.net>
To: Lou Berger <lberger@labn.net>
X-SES-Outgoing: 2019.05.13-54.240.8.33
Feedback-ID: 1.us-east-1.DKmIRZFhhsBhtmFMNikgwZUWVrODEw9qVcPhqJEI2DA=:AmazonSES
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/Mh-KnbpZYJr0FtAMJSccqI3OU_k>
Subject: Re: [netmod] Regarding IPR on draft-ietf-netmod-artwork-folding-02
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 13 May 2019 00:55:24 -0000

No, I=E2=80=99m not aware of any IPR that applies to this draft.=20

Kent=20


> On May 12, 2019, at 5:17 PM, Lou Berger <lberger@labn.net> wrote:
>=20
> Authors, Contributors, WG,
>=20
> As part of WG Last Call
>=20
> Are you aware of any IPR that applies to drafts identified above?
>=20
> Please state either:
>=20
> "No, I'm not aware of any IPR that applies to this draft"
> or
> "Yes, I'm aware of IPR that applies to this draft"
>=20
> If so, has this IPR been disclosed in compliance with IETF IPR rules
> (see RFCs 3669, 5378 and 8179 for more details)?
>=20
> If yes to the above, please state either:
>=20
> "Yes, the IPR has been disclosed in compliance with IETF IPR rules"
> or
> "No, the IPR has not been disclosed"
>=20
> If you answer no, please provide any additional details you think
> appropriate.
>=20
> If you are listed as a document author or contributor please answer the
> above by responding to this email regardless of whether or not you are
> aware of any relevant IPR. This document will not advance to the next
> stage until a response has been received from each author and listed
> contributor. NOTE: THIS APPLIES TO ALL OF YOU LISTED IN THIS MESSAGE'S
> TO LINES.
>=20
> If you are on the WG email list or attend WG meetings but are not listed
> as an author or contributor, we remind you of your obligations under
> the IETF IPR rules which encourages you to notify the IETF if you are
> aware of IPR of others on an IETF contribution, or to refrain from
> participating in any contribution or discussion related to your
> undisclosed IPR. For more information, please see the RFCs listed above
> and
> http://trac.tools.ietf.org/group/iesg/trac/wiki/IntellectualProperty.
>=20
> Thank you,
> NetMod WG Chairs
>=20
> PS Please include all listed in the headers of this message in your
> response.
>=20
>=20
>=20
>=20


From nobody Sun May 12 18:14:47 2019
Return-Path: <bill.wu@huawei.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5E90F1200C5; Sun, 12 May 2019 18:14:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level: 
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GzNFieh_0m-Z; Sun, 12 May 2019 18:14:44 -0700 (PDT)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 75F241200CC; Sun, 12 May 2019 18:14:44 -0700 (PDT)
Received: from lhreml704-cah.china.huawei.com (unknown [172.18.7.106]) by Forcepoint Email with ESMTP id 5FFD9D0F80B67069E8B7; Mon, 13 May 2019 02:14:42 +0100 (IST)
Received: from NKGEML413-HUB.china.huawei.com (10.98.56.74) by lhreml704-cah.china.huawei.com (10.201.108.45) with Microsoft SMTP Server (TLS) id 14.3.408.0; Mon, 13 May 2019 02:14:42 +0100
Received: from NKGEML513-MBX.china.huawei.com ([169.254.1.144]) by NKGEML413-HUB.china.huawei.com ([10.98.56.74]) with mapi id 14.03.0415.000; Mon, 13 May 2019 09:14:29 +0800
From: Qin Wu <bill.wu@huawei.com>
To: Kent Watsen <kent+ietf@watsen.net>, Lou Berger <lberger@labn.net>
CC: "adrian@olddog.co.uk" <adrian@olddog.co.uk>, "afarrel@juniper.net" <afarrel@juniper.net>, NetMod WG Chairs <netmod-chairs@ietf.org>, NetMod WG <netmod@ietf.org>
Thread-Topic: Regarding IPR on draft-ietf-netmod-artwork-folding-02
Thread-Index: AdUJKSkoJ0I/XvmBQRyfaY9eQKOzQQ==
Date: Mon, 13 May 2019 01:14:28 +0000
Message-ID: <B8F9A780D330094D99AF023C5877DABAA4910823@nkgeml513-mbx.china.huawei.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.134.31.203]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/vOc-JOjWLTTlWfuLvWt9y41lfDU>
Subject: Re: [netmod] Regarding IPR on draft-ietf-netmod-artwork-folding-02
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 13 May 2019 01:14:46 -0000
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From nobody Sun May 12 20:02:58 2019
Return-Path: <bill.wu@huawei.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 555D812016A; Sun, 12 May 2019 20:02:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level: 
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2pTnMG9UaFhu; Sun, 12 May 2019 20:02:54 -0700 (PDT)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 77BA7120049; Sun, 12 May 2019 20:02:54 -0700 (PDT)
Received: from lhreml703-cah.china.huawei.com (unknown [172.18.7.108]) by Forcepoint Email with ESMTP id AE957F1899310FDFDCFD; Mon, 13 May 2019 04:02:52 +0100 (IST)
Received: from NKGEML413-HUB.china.huawei.com (10.98.56.74) by lhreml703-cah.china.huawei.com (10.201.108.44) with Microsoft SMTP Server (TLS) id 14.3.408.0; Mon, 13 May 2019 04:02:52 +0100
Received: from NKGEML513-MBX.china.huawei.com ([169.254.1.144]) by NKGEML413-HUB.china.huawei.com ([10.98.56.74]) with mapi id 14.03.0415.000; Mon, 13 May 2019 11:02:49 +0800
From: Qin Wu <bill.wu@huawei.com>
To: Lou Berger <lberger@labn.net>
CC: NetMod WG Chairs <netmod-chairs@ietf.org>, NetMod WG <netmod@ietf.org>
Thread-Topic: [netmod] WG Last Call: draft-ietf-netmod-artwork-folding-02
Thread-Index: AdUJN77yFfDTKXTmQ9qCLgdKdYlhXw==
Date: Mon, 13 May 2019 03:02:48 +0000
Message-ID: <B8F9A780D330094D99AF023C5877DABAA49108E5@nkgeml513-mbx.china.huawei.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.134.31.203]
Content-Type: text/plain; charset="gb2312"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/do24hfy5F0eOJcvKdBIhrJevVb4>
Subject: Re: [netmod] WG Last Call: draft-ietf-netmod-artwork-folding-02
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 13 May 2019 03:02:56 -0000
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From nobody Sun May 12 20:25:57 2019
Return-Path: <bill.wu@huawei.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 62350120049 for <netmod@ietfa.amsl.com>; Sun, 12 May 2019 20:25:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.94
X-Spam-Level: 
X-Spam-Status: No, score=-3.94 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, HTML_OBFUSCATE_05_10=0.26, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id I0SsO-o9tYLC for <netmod@ietfa.amsl.com>; Sun, 12 May 2019 20:25:54 -0700 (PDT)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DC2E912015C for <netmod@ietf.org>; Sun, 12 May 2019 20:25:53 -0700 (PDT)
Received: from lhreml707-cah.china.huawei.com (unknown [172.18.7.106]) by Forcepoint Email with ESMTP id F0860407AD45BAB4B7CB for <netmod@ietf.org>; Mon, 13 May 2019 04:25:51 +0100 (IST)
Received: from lhreml704-chm.china.huawei.com (10.201.108.53) by lhreml707-cah.china.huawei.com (10.201.108.48) with Microsoft SMTP Server (TLS) id 14.3.408.0; Mon, 13 May 2019 04:25:51 +0100
Received: from lhreml704-chm.china.huawei.com (10.201.108.53) by lhreml704-chm.china.huawei.com (10.201.108.53) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1713.5; Mon, 13 May 2019 04:25:51 +0100
Received: from NKGEML412-HUB.china.huawei.com (10.98.56.73) by lhreml704-chm.china.huawei.com (10.201.108.53) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA_P256) id 15.1.1713.5 via Frontend Transport; Mon, 13 May 2019 04:25:50 +0100
Received: from NKGEML513-MBX.china.huawei.com ([169.254.1.144]) by nkgeml412-hub.china.huawei.com ([10.98.56.73]) with mapi id 14.03.0415.000; Mon, 13 May 2019 11:25:43 +0800
From: Qin Wu <bill.wu@huawei.com>
To: "Joe Clarke (jclarke)" <jclarke@cisco.com>
CC: Kent Watsen <kent+ietf@watsen.net>, "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] Adoption poll for draft-wu-netmod-factory-default-02
Thread-Index: AdUJOv5diBJKwEvESayhrM+gAUAW3Q==
Date: Mon, 13 May 2019 03:25:43 +0000
Message-ID: <B8F9A780D330094D99AF023C5877DABAA491092B@nkgeml513-mbx.china.huawei.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.134.31.203]
Content-Type: multipart/alternative; boundary="_000_B8F9A780D330094D99AF023C5877DABAA491092Bnkgeml513mbxchi_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/Ms6tA0svxU9ctJenXjRVkpMgTzs>
Subject: Re: [netmod] Adoption poll for draft-wu-netmod-factory-default-02
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 13 May 2019 03:25:56 -0000

--_000_B8F9A780D330094D99AF023C5877DABAA491092Bnkgeml513mbxchi_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_B8F9A780D330094D99AF023C5877DABAA491092Bnkgeml513mbxchi_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_B8F9A780D330094D99AF023C5877DABAA491092Bnkgeml513mbxchi_--


From nobody Thu May 16 08:42:23 2019
Return-Path: <0100016ac14ef537-e835ef2c-df5a-453a-bf82-0ebbdd8dee28-000000@amazonses.watsen.net>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D9D1612024D for <netmod@ietfa.amsl.com>; Thu, 16 May 2019 08:42:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level: 
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=amazonses.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id acGcDZbSlTvk for <netmod@ietfa.amsl.com>; Thu, 16 May 2019 08:42:20 -0700 (PDT)
Received: from a8-88.smtp-out.amazonses.com (a8-88.smtp-out.amazonses.com [54.240.8.88]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D5D93120240 for <netmod@ietf.org>; Thu, 16 May 2019 08:42:19 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=6gbrjpgwjskckoa6a5zn6fwqkn67xbtw; d=amazonses.com; t=1558021338; h=From:Content-Type:Mime-Version:Subject:Date:References:To:In-Reply-To:Message-Id:Feedback-ID; bh=2cckyvvkEBIBVLyEPYQyB9O88QlwdBKV9OfXfkchreI=; b=Hk/9zvBmFx45wwnEeVb2+44NwmL6IY2yeuTFc3suB1c9BbEDeae+opYtpHP+fGSO V2/8IsaEhFFzbd9vUonGkMhAGRfim+sIn1GuDIu1nn+38EGljWZYMtx3aN1nOqYEFXd 2zYpbi20yNEXoStcTrVPgci9HmF8tWnFak21laao=
From: Kent Watsen <kent+ietf@watsen.net>
Content-Type: multipart/alternative; boundary="Apple-Mail=_ED1411A3-4CE3-48E8-934D-B26366DC7096"
Mime-Version: 1.0 (Mac OS X Mail 12.2 \(3445.102.3\))
Date: Thu, 16 May 2019 15:42:18 +0000
References: <0100016a996e6b55-6274d956-7a6e-4d56-b88b-524723053cdb-000000@email.amazonses.com>
To: "netmod@ietf.org" <netmod@ietf.org>
In-Reply-To: <0100016a996e6b55-6274d956-7a6e-4d56-b88b-524723053cdb-000000@email.amazonses.com>
Message-ID: <0100016ac14ef537-e835ef2c-df5a-453a-bf82-0ebbdd8dee28-000000@email.amazonses.com>
X-Mailer: Apple Mail (2.3445.102.3)
X-SES-Outgoing: 2019.05.16-54.240.8.88
Feedback-ID: 1.us-east-1.DKmIRZFhhsBhtmFMNikgwZUWVrODEw9qVcPhqJEI2DA=:AmazonSES
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/DWUMp75fK4dfF3FIVFqScEmMsso>
Subject: Re: [netmod] Adoption poll for draft-wu-netmod-factory-default-03
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 16 May 2019 15:42:22 -0000

--Apple-Mail=_ED1411A3-4CE3-48E8-934D-B26366DC7096
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

This message concludes the adoption poll for =
draft-wu-netmod-factory-default-03.   Thank you to all those that =
expressed support.  As no objections were raised, this draft is no =
adopted as a WG document.

Authors, please post a "ietf" -00 version of the draft being the same as =
the -02 I-D (that which was adopted), and then post a -01 follow-up =
addressing the comments received.

Thank you,
Kent (and Lou and Joel)



> On May 8, 2019, at 5:51 PM, Kent Watsen <kent+ietf@watsen.net> wrote:
>=20
> This email begins a 1-week adoption poll for:
>=20
>     https://tools.ietf.org/html/draft-wu-netmod-factory-default-03 =
<https://tools.ietf.org/html/draft-wu-netmod-factory-default-03>
>=20
> As we already have consensus from the previous poll to work on the =
problem, this poll primarily seeks for objections for using -03 as a =
basis for WG adoption (the document will be adopted if no objections are =
raised).  Of course, a show of support is also always encouraged.   All, =
please voice your support or objections before May 15.  =20
>=20
> Authors, already there have been good comments for how to improve the =
document.  However, please refrain from posting an update incorporating =
these comments until after this adoption poll closes, at which time the =
instruction will be to post a -00 with minimal changes, followed by a =
-01 incorporating the comments.
>=20
> PS: the IPR poll conducted on Mar 25 is still considered valid.
>=20
> Kent  // co-chair
>=20
>=20
> _______________________________________________
> netmod mailing list
> netmod@ietf.org
> https://www.ietf.org/mailman/listinfo/netmod


--Apple-Mail=_ED1411A3-4CE3-48E8-934D-B26366DC7096
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=us-ascii

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Dus-ascii"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" class=3D""><div =
class=3D"" style=3D"font-family: Helvetica-Light;">This message =
concludes the adoption poll for draft-wu-netmod-factory-default-03. =
&nbsp; Thank you to all those that expressed support. &nbsp;As no =
objections were raised, this draft is no adopted as a WG =
document.</div><div class=3D"" style=3D"font-family: =
Helvetica-Light;"><br class=3D""></div><div class=3D"" =
style=3D"font-family: Helvetica-Light;">Authors, please post a "ietf" =
-00 version of the draft being the same as the -02 I-D (that which was =
adopted), and then post a -01 follow-up addressing the comments =
received.<br class=3D""><br class=3D""></div><div class=3D"" =
style=3D"font-family: Helvetica-Light;">Thank you,<br class=3D"">Kent =
(and Lou and Joel)</div><div class=3D"" style=3D"font-family: =
Helvetica-Light;"><br class=3D""></div><div class=3D"" =
style=3D"font-family: Helvetica-Light;"><br class=3D""></div><div><br =
class=3D""><blockquote type=3D"cite" class=3D""><div class=3D"">On May =
8, 2019, at 5:51 PM, Kent Watsen &lt;<a =
href=3D"mailto:kent+ietf@watsen.net" =
class=3D"">kent+ietf@watsen.net</a>&gt; wrote:</div><br =
class=3D"Apple-interchange-newline"><div class=3D""><meta =
http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii" =
class=3D""><div style=3D"word-wrap: break-word; -webkit-nbsp-mode: =
space; line-break: after-white-space;" class=3D""><div class=3D""><span =
style=3D"font-family: Helvetica-Light;" class=3D"">This email begins a =
1-week adoption poll for:</span></div><div class=3D""><br =
class=3D""></div><font face=3D"Helvetica-Light" class=3D"">&nbsp; =
&nbsp;&nbsp;<a =
href=3D"https://tools.ietf.org/html/draft-wu-netmod-factory-default-03" =
class=3D"">https://tools.ietf.org/html/draft-wu-netmod-factory-default-03<=
/a><br class=3D""><br class=3D""></font><div class=3D""><font =
face=3D"Helvetica-Light" class=3D"">As we&nbsp;already =
have&nbsp;consensus from the previous poll to work on the problem, this =
poll&nbsp;primarily seeks for objections for using -03 as a basis for WG =
adoption (the&nbsp;</font><font face=3D"Helvetica-Light" =
class=3D"">document will be adopted i</font><span style=3D"font-family: =
Helvetica-Light;" class=3D"">f no objections are raised)</span><font =
face=3D"Helvetica-Light" class=3D"">. &nbsp;Of course, a show of support =
is also always encouraged. &nbsp; All, p</font><font =
face=3D"Helvetica-Light" class=3D"">lease voice your support or =
objections&nbsp;before&nbsp;May 15.</font><font face=3D"Helvetica-Light" =
class=3D"">&nbsp; &nbsp;</font><div class=3D""><font =
face=3D"Helvetica-Light" class=3D""><br class=3D""></font></div><div =
class=3D""><span style=3D"font-family: Helvetica-Light;" =
class=3D"">Authors, already there have been good comments for how to =
improve the document. &nbsp;However, please refrain from posting an =
update&nbsp;incorporating&nbsp;these comments until after this adoption =
poll closes, at which time the instruction will be to post a -00 with =
minimal changes, followed by a -01&nbsp;</span><span style=3D"font-family:=
 Helvetica-Light;" class=3D"">incorporating the =
comments.</span></div><div class=3D""><font face=3D"Helvetica-Light" =
class=3D""><br class=3D""></font></div><div class=3D""><font =
face=3D"Helvetica-Light" class=3D"">PS: the IPR poll conducted on Mar 25 =
is still considered valid.</font></div><div class=3D""><font =
face=3D"Helvetica-Light" class=3D""><br class=3D"">Kent &nbsp;// =
co-chair</font></div><div class=3D""><font face=3D"Helvetica-Light" =
class=3D""><br class=3D""></font></div><div class=3D""><font =
face=3D"Helvetica-Light" class=3D""><br =
class=3D""></font></div></div></div>______________________________________=
_________<br class=3D"">netmod mailing list<br class=3D""><a =
href=3D"mailto:netmod@ietf.org" class=3D"">netmod@ietf.org</a><br =
class=3D"">https://www.ietf.org/mailman/listinfo/netmod<br =
class=3D""></div></blockquote></div><br class=3D""></body></html>=

--Apple-Mail=_ED1411A3-4CE3-48E8-934D-B26366DC7096--


From nobody Thu May 16 08:45:40 2019
Return-Path: <internet-drafts@ietf.org>
X-Original-To: netmod@ietf.org
Delivered-To: netmod@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 31741120074; Thu, 16 May 2019 08:45:38 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: netmod@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.96.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: netmod@ietf.org
Message-ID: <155802153810.19776.14913168979341880181@ietfa.amsl.com>
Date: Thu, 16 May 2019 08:45:38 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/yOxnv5M83IdXihlNGpthZXhfIQI>
Subject: [netmod] I-D Action: draft-ietf-netmod-factory-default-00.txt
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 16 May 2019 15:45:38 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Network Modeling WG of the IETF.

        Title           : Factory default Setting
        Authors         : Qin Wu
                          Balazs Lengyel
                          Ye Niu
	Filename        : draft-ietf-netmod-factory-default-00.txt
	Pages           : 10
	Date            : 2019-05-16

Abstract:
   This document defines a method to reset a YANG server to its factory-
   default content.  The reset operation may be used e.g. during initial
   zero-touch configuration or when the existing configuration has major
   errors, so re-starting the configuration process from scratch is the
   best option.

   A new factory-reset RPC is defined.  Several methods of documenting
   the factory-default content are specified.

   Optionally a new "factory-default" read-only datastore is defined,
   that contains the data that will be copied over to the running
   datastore at reset.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-netmod-factory-default/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-netmod-factory-default-00
https://datatracker.ietf.org/doc/html/draft-ietf-netmod-factory-default-00


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Thu May 16 22:05:36 2019
Return-Path: <xiechf.bri@chinatelecom.cn>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D521A1200F4 for <netmod@ietfa.amsl.com>; Thu, 16 May 2019 22:05:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.89
X-Spam-Level: 
X-Spam-Status: No, score=-1.89 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Wcv5QRJ6-48o for <netmod@ietfa.amsl.com>; Thu, 16 May 2019 22:05:31 -0700 (PDT)
Received: from chinatelecom.cn (prt-mail.chinatelecom.cn [42.123.76.223]) by ietfa.amsl.com (Postfix) with ESMTP id CD38D120041 for <netmod@ietf.org>; Thu, 16 May 2019 22:05:29 -0700 (PDT)
HMM_SOURCE_IP: 172.18.0.92:1170.881144876
HMM_ATTACHE_NUM: 0000
HMM_SOURCE_TYPE: SMTP
Received: from clientip-219.142.69.78 (unknown [172.18.0.92]) by chinatelecom.cn (HERMES) with SMTP id E0D1B28008E for <netmod@ietf.org>; Fri, 17 May 2019 13:05:24 +0800 (CST)
X-189-SAVE-TO-SEND: xiechf.bri@chinatelecom.cn
Received: from EHLO ip<219.142.69.78> ([172.18.0.92]) by App0021 with ESMTP id 85aa2513-a4ed-44c7-9d11-92732e567bac for netmod@ietf.org; Fri May 17 13:05:24 2019
X-filter-score: filter<0>
X-Real-From: xiechf.bri@chinatelecom.cn
X-Receive-IP: 172.18.0.92
X-MEDUSA-Status: 0
Date: Fri, 17 May 2019 13:05:23 +0800
From: "Chongfeng Xie" <xiechf.bri@chinatelecom.cn>
To: netmod <netmod@ietf.org>
X-Priority: 3
X-Has-Attach: no
X-Mailer: Foxmail 7, 2, 8, 379[cn]
Mime-Version: 1.0
Message-ID: <2019051419342276839822@chinatelecom.cn>
Content-Type: multipart/alternative; boundary="----=_001_NextPart162788057837_=----"
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/xQMEuk3-KqWETljvV_lhtk9_aB4>
Subject: Re: [netmod] Adoption poll for draft-wu-netmod-factory-default-03
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 17 May 2019 05:05:35 -0000

This is a multi-part message in MIME format.

------=_001_NextPart162788057837_=----
Content-Type: text/plain;
	charset="GB2312"
Content-Transfer-Encoding: base64
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------=_001_NextPart162788057837_=----
Content-Type: text/html;
	charset="GB2312"
Content-Transfer-Encoding: quoted-printable

<html><head><meta http-equiv=3D"content-type" content=3D"text/html; charse=
t=3DGB2312"><style>body { line-height: 1.5; }blockquote { margin-top: 0px;=
 margin-bottom: 0px; margin-left: 0.5em; }p { margin-top: 0px; margin-bott=
om: 0px; }body { font-size: 10.5pt; font-family: 'Microsoft YaHei UI'; col=
or: rgb(0, 0, 0); line-height: 1.5; }body { font-size: 10.5pt; font-family=
: 'Microsoft YaHei UI'; color: rgb(0, 0, 0); line-height: 1.5; }</style></=
head><body>=0A<!--[if gte mso 9]><xml>=0A<o:shapedefaults v:ext=3D"edit" s=
pidmax=3D"1026" ></o:shapedefaults>=0A</xml><![endif]--><!--[if gte mso 9]=
><xml>=0A<o:shapelayout v:ext=3D"edit">=0A<o:idmap v:ext=3D"edit" data=3D"=
1" ></o:idmap>=0A</o:shapelayout></xml><![endif]-->=0A<div><span style=3D"=
font-family: &quot;" microsoft=3D"" yahei=3D"" ui'";=3D"" font-size:=3D"" =
14px;=3D"" color:=3D"" rgb(0,=3D"" 0,=3D"" 0);=3D"" background-color:=3D""=
 rgba(0,=3D"" font-weight:=3D"" normal;=3D"" font-style:=3D"" normal;text-=
decoration:=3D"" none;'=3D""><br></span></div><div><span></span><span styl=
e=3D"font-family: &quot;" microsoft=3D"" yahei=3D"" ui'";=3D"" font-size:=
=3D"" 14px;=3D"" color:=3D"" rgb(0,=3D"" 0,=3D"" 0);=3D"" background-color=
:=3D"" rgba(0,=3D"" font-weight:=3D"" normal;=3D"" font-style:=3D"" normal=
;text-decoration:=3D"" none;'=3D"">I </span><span style=3D"font-family: ''=
; font-size: 10.5pt; line-height: 1.5; background-color: window;">have&nbs=
p;read&nbsp;the&nbsp;latest&nbsp;version&nbsp;of&nbsp;draft-wu&nbsp;and&nb=
sp;believe&nbsp;the&nbsp;mechanism&nbsp;proposed&nbsp;in&nbsp;this&nbsp;dr=
aft&nbsp;in&nbsp;very&nbsp;useful&nbsp;in&nbsp;SDWAN&nbsp;ZTP&nbsp;scenari=
o,&nbsp;I&nbsp;fully&nbsp;support&nbsp;to&nbsp;standardize&nbsp;this&nbsp;=
work.</span></div><div><span style=3D"font-family: &quot;" microsoft=3D"" =
yahei=3D"" ui'";=3D"" font-size:=3D"" 14px;=3D"" color:=3D"" rgb(0,=3D"" 0=
,=3D"" 0);=3D"" background-color:=3D"" rgba(0,=3D"" font-weight:=3D"" norm=
al;=3D"" font-style:=3D"" normal;text-decoration:=3D"" none;'=3D"">Chongfe=
ng&nbsp;</span></div>=0A<div><br></div><div><br></div><blockquote style=3D=
"margin-top: 0px; margin-bottom: 0px; margin-left: 0.5em;"><div><div class=
=3D"FoxDiv20190514132053522093"><div class=3D"WordSection1" style=3D"page:=
 WordSection1;">=0A<p class=3D"MsoNormal" style=3D"margin: 0px 0cm; font-s=
ize: 12pt; font-family: 'Times New Roman', serif;"><span lang=3D"EN-US" st=
yle=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,sans-serif;color:#=
1F497D"><o:p>&nbsp;</o:p></span></p>=0A<div>=0A<div style=3D"border:none;b=
order-top:solid #E1E1E1 1.0pt;padding:3.0pt 0cm 0cm 0cm">=0A<p class=3D"Ms=
oNormal" style=3D"margin: 0px 0cm; font-size: 12pt; font-family: 'Times Ne=
w Roman', serif;"><b><span style=3D"font-size:11.0pt;font-family:&quot;=CE=
=A2=C8=ED=D1=C5=BA=DA&quot;,sans-serif">=B7=A2=BC=FE=C8=CB<span lang=3D"EN=
-US">:</span></span></b><span lang=3D"EN-US" style=3D"font-size:11.0pt;fon=
t-family:&quot;=CE=A2=C8=ED=D1=C5=BA=DA&quot;,sans-serif"> netmod [mailto:=
netmod-bounces@ietf.org]=0A</span><b><span style=3D"font-size:11.0pt;font-=
family:&quot;=CE=A2=C8=ED=D1=C5=BA=DA&quot;,sans-serif">=B4=FA=B1=ED </spa=
n>=0A</b><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-family:&quot;=
=CE=A2=C8=ED=D1=C5=BA=DA&quot;,sans-serif">Kent Watsen<br>=0A</span><b><sp=
an style=3D"font-size:11.0pt;font-family:&quot;=CE=A2=C8=ED=D1=C5=BA=DA&qu=
ot;,sans-serif">=B7=A2=CB=CD=CA=B1=BC=E4<span lang=3D"EN-US">:</span></spa=
n></b><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-family:&quot;=CE=
=A2=C8=ED=D1=C5=BA=DA&quot;,sans-serif"> 2019</span><span style=3D"font-si=
ze:11.0pt;font-family:&quot;=CE=A2=C8=ED=D1=C5=BA=DA&quot;,sans-serif">=C4=
=EA<span lang=3D"EN-US">5</span>=D4=C2<span lang=3D"EN-US">9</span>=C8=D5<=
span lang=3D"EN-US">=0A 5:52<br>=0A</span><b>=CA=D5=BC=FE=C8=CB<span lang=
=3D"EN-US">:</span></b><span lang=3D"EN-US"> netmod@ietf.org<br>=0A</span>=
<b>=D6=F7=CC=E2<span lang=3D"EN-US">:</span></b><span lang=3D"EN-US"> [net=
mod] Adoption poll for draft-wu-netmod-factory-default-03<o:p></o:p></span=
></span></p>=0A</div>=0A</div>=0A<p class=3D"MsoNormal" style=3D"margin: 0=
px 0cm; font-size: 12pt; font-family: 'Times New Roman', serif;"><span lan=
g=3D"EN-US"><o:p>&nbsp;</o:p></span></p>=0A<div>=0A<p class=3D"MsoNormal" =
style=3D"margin: 0px 0cm; font-size: 12pt; font-family: 'Times New Roman',=
 serif;"><span lang=3D"EN-US" style=3D"font-family:&quot;Helvetica-Light&q=
uot;,serif">This email begins a 1-week adoption poll for:</span><span lang=
=3D"EN-US"><o:p></o:p></span></p>=0A</div>=0A<div>=0A<p class=3D"MsoNormal=
" style=3D"margin: 0px 0cm; font-size: 12pt; font-family: 'Times New Roman=
', serif;"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>=0A</div>=0A<p=
 class=3D"MsoNormal" style=3D"margin: 0px 0cm; font-size: 12pt; font-famil=
y: 'Times New Roman', serif;"><span lang=3D"EN-US" style=3D"font-family:&q=
uot;Helvetica-Light&quot;,serif">&nbsp; &nbsp;&nbsp;<a href=3D"https://too=
ls.ietf.org/html/draft-wu-netmod-factory-default-03" style=3D"color: blue;=
 text-decoration: underline;">https://tools.ietf.org/html/draft-wu-netmod-=
factory-default-03</a></span><span lang=3D"EN-US"><o:p></o:p></span></p>=
=0A<div>=0A<p class=3D"MsoNormal" style=3D"margin: 0px 0cm; font-size: 12p=
t; font-family: 'Times New Roman', serif;"><span lang=3D"EN-US" style=3D"f=
ont-family:&quot;Helvetica-Light&quot;,serif">As we&nbsp;already have&nbsp=
;consensus from the previous poll to work on the problem, this poll&nbsp;p=
rimarily seeks for objections for using -03 as a basis for WG adoption (th=
e&nbsp;document will=0A be adopted if no objections are raised). &nbsp;Of =
course, a show of support is also always encouraged. &nbsp; All, please vo=
ice your support or objections&nbsp;before&nbsp;May 15.&nbsp; &nbsp;</span=
><span lang=3D"EN-US"><o:p></o:p></span></p>=0A<div>=0A<p class=3D"MsoNorm=
al" style=3D"margin: 0px 0cm; font-size: 12pt; font-family: 'Times New Rom=
an', serif;"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>=0A</div>=0A=
<div>=0A<p class=3D"MsoNormal" style=3D"margin: 0px 0cm; font-size: 12pt; =
font-family: 'Times New Roman', serif;"><span lang=3D"EN-US" style=3D"font=
-family:&quot;Helvetica-Light&quot;,serif">Authors, already there have bee=
n good comments for how to improve the document. &nbsp;However, please ref=
rain from posting an update&nbsp;incorporating&nbsp;these comments until a=
fter this=0A adoption poll closes, at which time the instruction will be t=
o post a -00 with minimal changes, followed by a -01&nbsp;incorporating th=
e comments.</span><span lang=3D"EN-US"><o:p></o:p></span></p>=0A</div>=0A<=
div>=0A<p class=3D"MsoNormal" style=3D"margin: 0px 0cm; font-size: 12pt; f=
ont-family: 'Times New Roman', serif;"><span lang=3D"EN-US"><o:p>&nbsp;</o=
:p></span></p>=0A</div>=0A<div>=0A<p class=3D"MsoNormal" style=3D"margin: =
0px 0cm; font-size: 12pt; font-family: 'Times New Roman', serif;"><span la=
ng=3D"EN-US" style=3D"font-family:&quot;Helvetica-Light&quot;,serif">PS: t=
he IPR poll conducted on Mar 25 is still considered valid.</span><span lan=
g=3D"EN-US"><o:p></o:p></span></p>=0A</div>=0A<div>=0A<p class=3D"MsoNorma=
l" style=3D"margin: 0px 0cm; font-size: 12pt; font-family: 'Times New Roma=
n', serif;"><span lang=3D"EN-US" style=3D"font-family:&quot;Helvetica-Ligh=
t&quot;,serif"><br>=0AKent &nbsp;// co-chair</span><span lang=3D"EN-US"><o=
:p></o:p></span></p>=0A</div>=0A<div>=0A<p class=3D"MsoNormal" style=3D"ma=
rgin: 0px 0cm; font-size: 12pt; font-family: 'Times New Roman', serif;"><s=
pan lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>=0A</div>=0A<div>=0A<p clas=
s=3D"MsoNormal" style=3D"margin: 0px 0cm; font-size: 12pt; font-family: 'T=
imes New Roman', serif;"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>=
=0A</div>=0A</div>=0A</div>=0A</div></div></blockquote>=0A</body></html>
------=_001_NextPart162788057837_=------


From nobody Fri May 17 03:49:04 2019
Return-Path: <internet-drafts@ietf.org>
X-Original-To: netmod@ietf.org
Delivered-To: netmod@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 3D5DE120088; Fri, 17 May 2019 03:48:57 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: netmod@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.96.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: netmod@ietf.org
Message-ID: <155809013716.14854.13875111014961840796@ietfa.amsl.com>
Date: Fri, 17 May 2019 03:48:57 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/NOb7_xSpyHCY1VOlHr3GlaGPBY0>
Subject: [netmod] I-D Action: draft-ietf-netmod-factory-default-01.txt
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 17 May 2019 10:48:57 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Network Modeling WG of the IETF.

        Title           : Factory Default Setting
        Authors         : Qin Wu
                          Balazs Lengyel
                          Ye Niu
	Filename        : draft-ietf-netmod-factory-default-01.txt
	Pages           : 11
	Date            : 2019-05-17

Abstract:
   This document defines a method to reset a server to its factory-
   default content.  The reset operation may be used e.g. during initial
   zero-touch configuration or when the existing configuration has major
   errors, so re-starting the configuration process from scratch is the
   best option.

   A new factory-reset RPC is defined.  Several methods of documenting
   the factory-default content are specified.

   Optionally a new "factory-default" read-only datastore is defined,
   that contains the data that will be copied over to the running
   datastore at reset.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-netmod-factory-default/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-netmod-factory-default-01
https://datatracker.ietf.org/doc/html/draft-ietf-netmod-factory-default-01

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-netmod-factory-default-01


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Fri May 17 03:54:16 2019
Return-Path: <bill.wu@huawei.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6FBA0120247 for <netmod@ietfa.amsl.com>; Fri, 17 May 2019 03:54:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level: 
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kQrzW5FvxWCW for <netmod@ietfa.amsl.com>; Fri, 17 May 2019 03:54:12 -0700 (PDT)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 36B45120088 for <netmod@ietf.org>; Fri, 17 May 2019 03:54:12 -0700 (PDT)
Received: from LHREML713-CAH.china.huawei.com (unknown [172.18.7.106]) by Forcepoint Email with ESMTP id 1B7E12444C446B777CEA for <netmod@ietf.org>; Fri, 17 May 2019 11:54:10 +0100 (IST)
Received: from NKGEML414-HUB.china.huawei.com (10.98.56.75) by LHREML713-CAH.china.huawei.com (10.201.108.36) with Microsoft SMTP Server (TLS) id 14.3.408.0; Fri, 17 May 2019 11:54:09 +0100
Received: from NKGEML513-MBX.china.huawei.com ([169.254.1.144]) by nkgeml414-hub.china.huawei.com ([10.98.56.75]) with mapi id 14.03.0415.000; Fri, 17 May 2019 18:54:06 +0800
From: Qin Wu <bill.wu@huawei.com>
To: "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: I-D Action: draft-ietf-netmod-factory-default-01.txt
Thread-Index: AdUMnk3yD7F0M/IFTUyxQbsB8V0yEQ==
Date: Fri, 17 May 2019 10:54:05 +0000
Message-ID: <B8F9A780D330094D99AF023C5877DABAA4914C7F@nkgeml513-mbx.china.huawei.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.134.31.203]
Content-Type: text/plain; charset="gb2312"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/EGj3DSvwj0k1wXy5HA6C7sX_LJs>
Subject: Re: [netmod] I-D Action: draft-ietf-netmod-factory-default-01.txt
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 17 May 2019 10:54:15 -0000
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From nobody Fri May 17 04:15:05 2019
Return-Path: <j.schoenwaelder@jacobs-university.de>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CC0A612006F for <netmod@ietfa.amsl.com>; Fri, 17 May 2019 04:15:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lSP4yprKzkGt for <netmod@ietfa.amsl.com>; Fri, 17 May 2019 04:15:01 -0700 (PDT)
Received: from atlas5.jacobs-university.de (atlas5.jacobs-university.de [212.201.44.20]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 48FCF120282 for <netmod@ietf.org>; Fri, 17 May 2019 04:15:01 -0700 (PDT)
Received: from localhost (demetrius5.irc-it.jacobs-university.de [10.70.0.222]) by atlas5.jacobs-university.de (Postfix) with ESMTP id 6BD106B7; Fri, 17 May 2019 13:14:59 +0200 (CEST)
X-Virus-Scanned: amavisd-new at jacobs-university.de
Received: from atlas5.jacobs-university.de ([10.70.0.217]) by localhost (demetrius5.jacobs-university.de [10.70.0.222]) (amavisd-new, port 10032) with ESMTP id ClhocgCLCIYK; Fri, 17 May 2019 13:14:59 +0200 (CEST)
Received: from hermes.jacobs-university.de (hermes.jacobs-university.de [212.201.44.23]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "hermes.jacobs-university.de", Issuer "DFN-Verein Global Issuing CA" (verified OK)) by atlas5.jacobs-university.de (Postfix) with ESMTPS; Fri, 17 May 2019 13:14:59 +0200 (CEST)
Received: from localhost (demetrius5.irc-it.jacobs-university.de [10.70.0.222]) by hermes.jacobs-university.de (Postfix) with ESMTP id 7D43A2011D; Fri, 17 May 2019 13:14:59 +0200 (CEST)
X-Virus-Scanned: amavisd-new at jacobs-university.de
Received: from hermes.jacobs-university.de ([212.201.44.23]) by localhost (demetrius5.jacobs-university.de [10.70.0.222]) (amavisd-new, port 10028) with ESMTP id Ic_yJsRPT0AP; Fri, 17 May 2019 13:14:58 +0200 (CEST)
Received: from exchange.jacobs-university.de (SXCHMB02.jacobs.jacobs-university.de [10.70.0.121]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "exchange.jacobs-university.de", Issuer "DFN-Verein Global Issuing CA" (verified OK)) by hermes.jacobs-university.de (Postfix) with ESMTPS id 3D38D2011B; Fri, 17 May 2019 13:14:59 +0200 (CEST)
Received: from anna.localdomain (10.50.218.117) by sxchmb03.jacobs.jacobs-university.de (10.70.0.155) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.1713.5; Fri, 17 May 2019 13:14:58 +0200
Received: by anna.localdomain (Postfix, from userid 501) id 3B03C300924E98; Fri, 17 May 2019 13:14:57 +0200 (CEST)
Date: Fri, 17 May 2019 13:14:57 +0200
From: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
To: Qin Wu <bill.wu@huawei.com>
CC: "netmod@ietf.org" <netmod@ietf.org>
Message-ID: <20190517111457.otxjxtit3a4gwz73@anna.jacobs.jacobs-university.de>
Reply-To: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
Mail-Followup-To: Qin Wu <bill.wu@huawei.com>, "netmod@ietf.org" <netmod@ietf.org>
References: <B8F9A780D330094D99AF023C5877DABAA4914C7F@nkgeml513-mbx.china.huawei.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <B8F9A780D330094D99AF023C5877DABAA4914C7F@nkgeml513-mbx.china.huawei.com>
User-Agent: NeoMutt/20180716
X-ClientProxiedBy: SXCHMB04.jacobs.jacobs-university.de (10.70.0.156) To sxchmb03.jacobs.jacobs-university.de (10.70.0.155)
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/gcYxnyRZQmMSfmGtdjeZmcrm-bw>
Subject: Re: [netmod] I-D Action: draft-ietf-netmod-factory-default-01.txt
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 17 May 2019 11:15:04 -0000

I think this does not work:

      [...]  For <copy-config> operation,it can be used to copy
      the factory default content to another datastore, however the
      content of the datastore is not propagated automatically to any
      other datastores.

You can't change the way things work. If something is committed to
lets say <running>, then this triggers the propagation to <intended>
and eventually <operational>. You can't come along and say that
copy-config from a particular source stops this.

Is it really useful to expose factory default to copy config? Or said
differenlty, would it not make sense to fix copy-config (at some other
place) so that it can generically work with new datastores?

   The content of the factory-default datastore is usually not security
   sensitive as it is the same on any device of a certain type.

I am not sure this is true.

For non-trivial devices, the default is likely not static but
something that takes into account device features available and the
specific hardware configuration present. It is actually somewhat
unclear what the factory-default datastore contains; the stuff I can
expect to see in <running> after the reset or some static stuff that
may be tweaked during the boot process to yield the initial <running>.
Or are we pretending these two are always the same?

The copyright year needs adjustment. Indentation of the YANG
statements should be fixed.

/js

-- 
Juergen Schoenwaelder           Jacobs University Bremen gGmbH
Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
Fax:   +49 421 200 3103         <https://www.jacobs-university.de/>


From nobody Fri May 17 10:37:34 2019
Return-Path: <andy@yumaworks.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B035812013E for <netmod@ietfa.amsl.com>; Fri, 17 May 2019 10:37:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=yumaworks-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iwvHR2fkyIwR for <netmod@ietfa.amsl.com>; Fri, 17 May 2019 10:37:30 -0700 (PDT)
Received: from mail-lf1-x12d.google.com (mail-lf1-x12d.google.com [IPv6:2a00:1450:4864:20::12d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A73C91200F3 for <netmod@ietf.org>; Fri, 17 May 2019 10:37:29 -0700 (PDT)
Received: by mail-lf1-x12d.google.com with SMTP id q17so5918929lfo.4 for <netmod@ietf.org>; Fri, 17 May 2019 10:37:29 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yumaworks-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to; bh=vcY6be8PtnMngQ/MBRIX4SvxaARwJvNilYNLD3AVPA8=; b=twAwviN/L3aRDOgOvfOPvQF75I2F8KZ5YgQz/DHGbalbMNr3qCxwEZHk/4gOD0N/XE BhWJDogtfOWH+WmkJgVWzcMTYpCfeN/uJkhV6pCSQVlY2oW2bHA8XNg+pxfeH7y0nFS/ 7syXLZ7KOyLgv2m186a4pX2Wg8qnngfb4Q3DwePpUa47CPgjacytTGKYPZBYvB4R8mMg ybCJh0eIanO2l1ckN6IVAs4FfJep6gDTuzEH8lAVhdqdV3U/xiEEFFZK/Hgb4Z4LNVib tTIUA3LnkD6PMhq9Ih+O4XTm4pcN9qfsAdi8N+O4xPD8qbeUv+0pB/ZRk5mY6Y+2zOTx Zveg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to; bh=vcY6be8PtnMngQ/MBRIX4SvxaARwJvNilYNLD3AVPA8=; b=WZF6pUvGJlY5y5gBV0kmlqVrylCDqPGWXxigfV7ecsdmk15e0EsBWJhmTHmQnb+/He OxzrCVsd5Po+O16Hbvr8ntapHZQ14tOlNTM37Hn/xZG0IyKXVH+PPFPqqUc/gOVR6FZT FuHk6YZpAcB3nHNDyNu17OFY75z+qCI2fL4z4hdyWmzoU0pFmOY/mTLh/RHLf7C99zx+ kRxv/k4+//JUu9jwlSTpwueAFmnV5C5uWU0aeDZgrDTOwRpm3H4Kd+hJkvgIezKwTLOx Lc87I/W2+MuyJJXMmRLz1eR9ELFX1UKges74qMeXJpKuAfqGt6g8GlH6fIk49ov9y0cn MUwQ==
X-Gm-Message-State: APjAAAWZf98T+OesAIQscWQvRyRjjhd4vlHsUGbS3Rz87e+BmXtBsyzj 70QSmUvqJ8KFHrQzF9DHtEdheCB51XJgPsLcsxFCwg==
X-Google-Smtp-Source: APXvYqzsxxuMYMFcA+FdA/Ipsh5sTcbaTmjBReTPD2DEuhe8usdUA8F/B+CUYWZsDwFY4PYexifeRqTVClD/pD9r4vc=
X-Received: by 2002:a19:6b04:: with SMTP id d4mr39648lfa.57.1558114647711; Fri, 17 May 2019 10:37:27 -0700 (PDT)
MIME-Version: 1.0
References: <B8F9A780D330094D99AF023C5877DABAA4914C7F@nkgeml513-mbx.china.huawei.com> <20190517111457.otxjxtit3a4gwz73@anna.jacobs.jacobs-university.de>
In-Reply-To: <20190517111457.otxjxtit3a4gwz73@anna.jacobs.jacobs-university.de>
From: Andy Bierman <andy@yumaworks.com>
Date: Fri, 17 May 2019 10:37:16 -0700
Message-ID: <CABCOCHTdYxFubC+N81NZFfvbqgMbHjVsn=8JeVzqMRaS0teRxw@mail.gmail.com>
To: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>, Qin Wu <bill.wu@huawei.com>, "netmod@ietf.org" <netmod@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000018c192058918d607"
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/IS9kpIswocp_MOckEHpN9LIqzzM>
Subject: Re: [netmod] I-D Action: draft-ietf-netmod-factory-default-01.txt
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 17 May 2019 17:37:33 -0000

--00000000000018c192058918d607
Content-Type: text/plain; charset="UTF-8"

On Fri, May 17, 2019 at 4:15 AM Juergen Schoenwaelder <
j.schoenwaelder@jacobs-university.de> wrote:

> I think this does not work:
>
>       [...]  For <copy-config> operation,it can be used to copy
>       the factory default content to another datastore, however the
>       content of the datastore is not propagated automatically to any
>       other datastores.
>
> You can't change the way things work. If something is committed to
> lets say <running>, then this triggers the propagation to <intended>
> and eventually <operational>. You can't come along and say that
> copy-config from a particular source stops this.
>
>
Agreed. I have been objecting to the client-controlled datastore-specific
factory reset.
I do not know of any devices which support such a thing.  I would like to
understand the use-cases that make this so useful and common practice that
it
should be standardized.



> Is it really useful to expose factory default to copy config? Or said
> differenlty, would it not make sense to fix copy-config (at some other
> place) so that it can generically work with new datastores?
>
>    The content of the factory-default datastore is usually not security
>    sensitive as it is the same on any device of a certain type.
>
> I am not sure this is true.
>
> For non-trivial devices, the default is likely not static but
> something that takes into account device features available and the
> specific hardware configuration present. It is actually somewhat
> unclear what the factory-default datastore contains; the stuff I can
> expect to see in <running> after the reset or some static stuff that
> may be tweaked during the boot process to yield the initial <running>.
> Or are we pretending these two are always the same?
>
>
The startup procedure within a server is very proprietary and can be
very different, even for vendors using the same server code.

There are no standard procedures today that allow a client to inject
configuration
into this process. The client is allowed to alter configuration only after
the saved or factory configuration is loaded.  IMO it should stay this way.

e.g, : do not want to standardize:

   copy-config source=factory target=candidate
   edit-config target=candidate ...
   commit

This is the only use-case I can imagine for copy-config from factory,
but IMO it is not very important. (get-config(factory) + edit-config
already supports it.)


The copyright year needs adjustment. Indentation of the YANG
> statements should be fixed.
>
> /js
>
>
Andy


> --
> Juergen Schoenwaelder           Jacobs University Bremen gGmbH
> Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
> Fax:   +49 421 200 3103         <https://www.jacobs-university.de/>
>
> _______________________________________________
> netmod mailing list
> netmod@ietf.org
> https://www.ietf.org/mailman/listinfo/netmod
>

--00000000000018c192058918d607
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div dir=3D"ltr"><br></div><br><div class=3D"gmail_quote">=
<div dir=3D"ltr" class=3D"gmail_attr">On Fri, May 17, 2019 at 4:15 AM Juerg=
en Schoenwaelder &lt;<a href=3D"mailto:j.schoenwaelder@jacobs-university.de=
">j.schoenwaelder@jacobs-university.de</a>&gt; wrote:<br></div><blockquote =
class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px sol=
id rgb(204,204,204);padding-left:1ex">I think this does not work:<br>
<br>
=C2=A0 =C2=A0 =C2=A0 [...]=C2=A0 For &lt;copy-config&gt; operation,it can b=
e used to copy<br>
=C2=A0 =C2=A0 =C2=A0 the factory default content to another datastore, howe=
ver the<br>
=C2=A0 =C2=A0 =C2=A0 content of the datastore is not propagated automatical=
ly to any<br>
=C2=A0 =C2=A0 =C2=A0 other datastores.<br>
<br>
You can&#39;t change the way things work. If something is committed to<br>
lets say &lt;running&gt;, then this triggers the propagation to &lt;intende=
d&gt;<br>
and eventually &lt;operational&gt;. You can&#39;t come along and say that<b=
r>
copy-config from a particular source stops this.<br>
<br></blockquote><div><br></div><div>Agreed. I have been objecting to the c=
lient-controlled datastore-specific factory reset.</div><div>I do not know =
of any devices which support such a thing.=C2=A0 I would like to</div><div>=
understand the use-cases that make this so useful and common practice that =
it</div><div>should be standardized.</div><div><br></div><div>=C2=A0</div><=
blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-l=
eft:1px solid rgb(204,204,204);padding-left:1ex">
Is it really useful to expose factory default to copy config? Or said<br>
differenlty, would it not make sense to fix copy-config (at some other<br>
place) so that it can generically work with new datastores?<br>
<br>
=C2=A0 =C2=A0The content of the factory-default datastore is usually not se=
curity<br>
=C2=A0 =C2=A0sensitive as it is the same on any device of a certain type.<b=
r>
<br>
I am not sure this is true.<br>
<br>
For non-trivial devices, the default is likely not static but<br>
something that takes into account device features available and the<br>
specific hardware configuration present. It is actually somewhat<br>
unclear what the factory-default datastore contains; the stuff I can<br>
expect to see in &lt;running&gt; after the reset or some static stuff that<=
br>
may be tweaked during the boot process to yield the initial &lt;running&gt;=
.<br>
Or are we pretending these two are always the same?<br>
<br></blockquote><div><br></div><div>The startup procedure within a server =
is very proprietary and can be</div><div>very different, even for vendors u=
sing the same server code.</div><div><br></div><div>There are no standard p=
rocedures today that allow a client to inject configuration</div><div>into =
this process. The client is allowed to alter configuration only after</div>=
<div>the saved or factory configuration is loaded.=C2=A0 IMO it should stay=
 this way.</div><div><br></div><div>e.g, : do not want to standardize:</div=
><div><br></div><div>=C2=A0 =C2=A0copy-config source=3Dfactory target=3Dcan=
didate</div><div>=C2=A0 =C2=A0edit-config target=3Dcandidate ...</div><div>=
=C2=A0 =C2=A0commit</div><div><br></div><div>This is the only use-case I ca=
n imagine for copy-config from factory,</div><div>but IMO it is not very im=
portant. (get-config(factory)=C2=A0+ edit-config</div><div>already supports=
 it.)</div><div><br></div><div><br></div><blockquote class=3D"gmail_quote" =
style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);pa=
dding-left:1ex">
The copyright year needs adjustment. Indentation of the YANG<br>
statements should be fixed.<br>
<br>
/js<br>
<br></blockquote><div><br></div><div>Andy</div><div>=C2=A0</div><blockquote=
 class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px so=
lid rgb(204,204,204);padding-left:1ex">
-- <br>
Juergen Schoenwaelder=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0Jacobs Univer=
sity Bremen gGmbH<br>
Phone: +49 421 200 3587=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0Campus Ring 1 | 28=
759 Bremen | Germany<br>
Fax:=C2=A0 =C2=A0+49 421 200 3103=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0&lt;<a h=
ref=3D"https://www.jacobs-university.de/" rel=3D"noreferrer" target=3D"_bla=
nk">https://www.jacobs-university.de/</a>&gt;<br>
<br>
_______________________________________________<br>
netmod mailing list<br>
<a href=3D"mailto:netmod@ietf.org" target=3D"_blank">netmod@ietf.org</a><br=
>
<a href=3D"https://www.ietf.org/mailman/listinfo/netmod" rel=3D"noreferrer"=
 target=3D"_blank">https://www.ietf.org/mailman/listinfo/netmod</a><br>
</blockquote></div></div>

--00000000000018c192058918d607--


From nobody Fri May 17 12:52:56 2019
Return-Path: <0100016ac75aaed8-31a9e97f-4419-49ad-ab8c-700a83d5f19e-000000@amazonses.watsen.net>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0D09712013E for <netmod@ietfa.amsl.com>; Fri, 17 May 2019 12:52:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level: 
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=amazonses.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bKkiYQxXNiWg for <netmod@ietfa.amsl.com>; Fri, 17 May 2019 12:52:52 -0700 (PDT)
Received: from a8-96.smtp-out.amazonses.com (a8-96.smtp-out.amazonses.com [54.240.8.96]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A8D8612016D for <netmod@ietf.org>; Fri, 17 May 2019 12:52:51 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=6gbrjpgwjskckoa6a5zn6fwqkn67xbtw; d=amazonses.com; t=1558122770; h=From:Content-Type:Mime-Version:Subject:Message-Id:Date:To:Feedback-ID; bh=vBrWKd1wL3Ru6tdA0mP7MDe9EiQIUYMTp9eCNW4ybm8=; b=ZA1FpZQvUAs9P6ACuDRkK28oQLT/0+gBUn4J7HY3adr48DchmSKBfsCx2/qCGTwy pTmruuiOhlo3GVpUlta4jQwMyKSgrKGAU6ZL24dhmd2YQVXUaRTDHu3RUv6gPyXfG4O JBJGjMScOqTy2IQODBcILiFJ4wQU08u5WB0pg79I=
From: Kent Watsen <kent+ietf@watsen.net>
Content-Type: multipart/alternative; boundary="Apple-Mail=_2836BD01-6E00-4EC9-ACDE-C34A66257DD1"
Mime-Version: 1.0 (Mac OS X Mail 12.2 \(3445.102.3\))
Message-ID: <0100016ac75aaed8-31a9e97f-4419-49ad-ab8c-700a83d5f19e-000000@email.amazonses.com>
Date: Fri, 17 May 2019 19:52:50 +0000
To: "netmod@ietf.org" <netmod@ietf.org>
X-Mailer: Apple Mail (2.3445.102.3)
X-SES-Outgoing: 2019.05.17-54.240.8.96
Feedback-ID: 1.us-east-1.DKmIRZFhhsBhtmFMNikgwZUWVrODEw9qVcPhqJEI2DA=:AmazonSES
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/9PbMShh4PpndVaC6z1lD2tcdsUE>
Subject: [netmod] can a leaf of type "empty" have a "default" value?
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 17 May 2019 19:52:55 -0000

--Apple-Mail=_2836BD01-6E00-4EC9-ACDE-C34A66257DD1
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii


A leaf with type "empty" is often times used to represent a boolean: =
present =3D=3D set, not present =3D=3D not set.  Is there a way in YANG =
to specify that the "empty" type leaf is "set" by default?  Perhaps like =
this:

    leaf flag {
        type empty;
        default "";
    }

Kent // contributor


--Apple-Mail=_2836BD01-6E00-4EC9-ACDE-C34A66257DD1
Content-Transfer-Encoding: 7bit
Content-Type: text/html;
	charset=us-ascii

<html><head><meta http-equiv="Content-Type" content="text/html; charset=us-ascii"></head><body style="word-wrap: break-word; -webkit-nbsp-mode: space; line-break: after-white-space;" class=""><div class=""><br class=""></div><div class="">A leaf with type "empty" is often times used to represent a boolean: present == set, not present == not set. &nbsp;Is there a way in YANG to specify that the "empty" type leaf is "set" by default? &nbsp;Perhaps like this:</div><div class=""><br class=""></div><div class="">&nbsp; &nbsp; leaf flag {</div><div class="">&nbsp; &nbsp; &nbsp; &nbsp; type empty;</div><div class="">&nbsp; &nbsp; &nbsp; &nbsp; default "";</div><div class="">&nbsp; &nbsp; }</div><div class=""><br class=""></div><div class="">Kent // contributor</div><div class=""><br class=""></div></body></html>
--Apple-Mail=_2836BD01-6E00-4EC9-ACDE-C34A66257DD1--


From nobody Fri May 17 12:59:49 2019
Return-Path: <rrahman@cisco.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B2A7E120164 for <netmod@ietfa.amsl.com>; Fri, 17 May 2019 12:59:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.5
X-Spam-Level: 
X-Spam-Status: No, score=-14.5 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=AsJ9Ny6e; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=BRZxx2lx
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Z3bNWaNbIZXb for <netmod@ietfa.amsl.com>; Fri, 17 May 2019 12:59:45 -0700 (PDT)
Received: from alln-iport-4.cisco.com (alln-iport-4.cisco.com [173.37.142.91]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 807A71200A4 for <netmod@ietf.org>; Fri, 17 May 2019 12:59:45 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=7337; q=dns/txt; s=iport; t=1558123185; x=1559332785; h=from:to:subject:date:message-id:references:in-reply-to: mime-version; bh=HxfXGKf/VhfU05zmNG6ln0eTCe3ItZBcYULHulNuSJ8=; b=AsJ9Ny6evLbdS4E1mQZm9rHKK7iHbSPw8dPOAXpcpWIw1eHH3fL3Xdb/ 1/AcTQsHCQrOV1Xuh/nAxEJOVQH987KBS9bZV5V+42/BDBUUzTJ4o3WUQ 8r3kDVm47RUYHm4VzQh5N/Bb60yUMtO6BnfuclZoFDdx/Szt/0I6Wo1Jn U=;
IronPort-PHdr: =?us-ascii?q?9a23=3AuF70hBeFap5E70F/vS1fdbKAlGMj4e+mNxMJ6p?= =?us-ascii?q?chl7NFe7ii+JKnJkHE+PFxlwGRD57D5adCjOzb++D7VGoM7IzJkUhKcYcEFn?= =?us-ascii?q?pnwd4TgxRmBceEDUPhK/u/dTYzHMFLUndu/mqwNg5eH8OtL1A=3D?=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0ByAADcEd9c/5RdJa1kHAEBAQQBAQc?= =?us-ascii?q?EAQGBUgYBAQsBgQ4vUANpVSAECyiEEoNHA453SoFoJZJZhE6BLoEkA1QJAQE?= =?us-ascii?q?BDAEBIwoCAQGEQAIXgh0jNQgOAQMBAQQBAQIBBG0cDIVKAQEBBBIRChMBATg?= =?us-ascii?q?PAgEIEQMBAisCAgIwHQgCBAESIoMAAYEdTQMdAQ6fcAKBNYhfcYEvgnkBAQW?= =?us-ascii?q?CSII8GIIPAwaBNAGLUBeBQD+BOAwTgkw+gmEBAQIBgX4Ngl0ygiaNdYRdiBq?= =?us-ascii?q?NLgkCgguGLoxNG5YYjFGGaY5OAgQCBAUCDgEBBYFQATaBV3AVZQGCQYIPg2+?= =?us-ascii?q?FFIU/cgGBKI88AQE?=
X-IronPort-AV: E=Sophos;i="5.60,481,1549929600";  d="scan'208,217";a="272900746"
Received: from rcdn-core-12.cisco.com ([173.37.93.148]) by alln-iport-4.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 17 May 2019 19:59:44 +0000
Received: from XCH-ALN-016.cisco.com (xch-aln-016.cisco.com [173.36.7.26]) by rcdn-core-12.cisco.com (8.15.2/8.15.2) with ESMTPS id x4HJxhm2006205 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Fri, 17 May 2019 19:59:44 GMT
Received: from xhs-aln-002.cisco.com (173.37.135.119) by XCH-ALN-016.cisco.com (173.36.7.26) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Fri, 17 May 2019 14:59:43 -0500
Received: from xhs-rtp-001.cisco.com (64.101.210.228) by xhs-aln-002.cisco.com (173.37.135.119) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Fri, 17 May 2019 14:59:42 -0500
Received: from NAM05-CO1-obe.outbound.protection.outlook.com (64.101.32.56) by xhs-rtp-001.cisco.com (64.101.210.228) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Fri, 17 May 2019 15:59:42 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com;  s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=HxfXGKf/VhfU05zmNG6ln0eTCe3ItZBcYULHulNuSJ8=; b=BRZxx2lxbidPiFvmD8PG5WImk7RQpSQveuhREd8bUR669s372VozcB249o0i2Va4LyFBrj4cmPsrpjOoqdFqJlQpDaBqkc2O1hgN7PAabq4byecqDYJqkYYeh/9PuHSyfc+fnp063TDbyPMAKjjvxr4q0Ci4o3apK9nmjBxT4lw=
Received: from DM5PR1101MB2105.namprd11.prod.outlook.com (10.174.104.151) by DM5PR1101MB2250.namprd11.prod.outlook.com (10.174.246.139) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1900.17; Fri, 17 May 2019 19:59:41 +0000
Received: from DM5PR1101MB2105.namprd11.prod.outlook.com ([fe80::6ce2:350d:6bed:7dde]) by DM5PR1101MB2105.namprd11.prod.outlook.com ([fe80::6ce2:350d:6bed:7dde%2]) with mapi id 15.20.1900.010; Fri, 17 May 2019 19:59:41 +0000
From: "Reshad Rahman (rrahman)" <rrahman@cisco.com>
To: Kent Watsen <kent+ietf@watsen.net>, "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] can a leaf of type "empty" have a "default" value?
Thread-Index: AQHVDOoo+hLRcZGMo0G6G25K8dQfVKZveT0A
Date: Fri, 17 May 2019 19:59:41 +0000
Message-ID: <4D3B1530-A671-4A3E-8461-77BE91507D7B@cisco.com>
References: <0100016ac75aaed8-31a9e97f-4419-49ad-ab8c-700a83d5f19e-000000@email.amazonses.com>
In-Reply-To: <0100016ac75aaed8-31a9e97f-4419-49ad-ab8c-700a83d5f19e-000000@email.amazonses.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/10.10.6.190114
authentication-results: spf=none (sender IP is ) smtp.mailfrom=rrahman@cisco.com; 
x-originating-ip: [2001:420:2840:1250:2421:2f0a:1dbc:638e]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 94384ab3-153a-4160-3aed-08d6db023300
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600141)(711020)(4605104)(2017052603328)(7193020); SRVR:DM5PR1101MB2250; 
x-ms-traffictypediagnostic: DM5PR1101MB2250:
x-ms-exchange-purlcount: 3
x-microsoft-antispam-prvs: <DM5PR1101MB22508651DDDA416B52BD1993AB0B0@DM5PR1101MB2250.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:8273;
x-forefront-prvs: 0040126723
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(136003)(39860400002)(366004)(376002)(396003)(346002)(189003)(199004)(2906002)(58126008)(5660300002)(53936002)(110136005)(8676002)(71200400001)(6486002)(6436002)(7736002)(6306002)(54896002)(2501003)(316002)(81166006)(4744005)(8936002)(68736007)(71190400001)(83716004)(229853002)(81156014)(6512007)(236005)(256004)(86362001)(9326002)(66556008)(6116002)(66946007)(33656002)(76116006)(66446008)(73956011)(11346002)(2616005)(486006)(476003)(64756008)(6246003)(6506007)(66476007)(99286004)(53546011)(790700001)(25786009)(46003)(186003)(478600001)(446003)(91956017)(606006)(966005)(14454004)(76176011)(36756003)(82746002)(102836004); DIR:OUT; SFP:1101; SCL:1; SRVR:DM5PR1101MB2250; H:DM5PR1101MB2105.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: aosCN+9TQbtEWbK2F/riQNME929S8gNNWhvjOf78U1FFBJXgDEQ/oy5NQI2774pTSIMRVWOQt43jcxkrUdYay9Z40qqrOX1SARKR5L4SUNs06Pn5Oq8WZcIQSg6CdzBszH/KnV5aHhoNHb3Of8EQEPH9x/Gz5/Neb36jJ64A5pHYY+EDnl/5/YaglsqfiUWDg9gIEruGQj0m84zcykeiKSOFJc1wqbHEsix2mvRdwVlDi/iM+jMBzEr8mx76i3ifSQe8V27CViELiHSKP8TzPsojHC6lKIIMBAAZJg3nDPI/W3XhG27JEHD5Kyj/F6uF6e1oEM+v8388fP+S2quqGw/TBO+H+CFTVZfaTAZzRJ3nSzOYatEAtuvXpyVwYjmyRDCV7H012wGoekyGQ9x16PjKAopOkIk6E8h8Oj3Ly3w=
Content-Type: multipart/alternative; boundary="_000_4D3B1530A6714A3E846177BE91507D7Bciscocom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 94384ab3-153a-4160-3aed-08d6db023300
X-MS-Exchange-CrossTenant-originalarrivaltime: 17 May 2019 19:59:41.0503 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR1101MB2250
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.26, xch-aln-016.cisco.com
X-Outbound-Node: rcdn-core-12.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/wd3jX1tJy2JX185PBASmuLZcIfQ>
Subject: Re: [netmod] can a leaf of type "empty" have a "default" value?
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 17 May 2019 19:59:48 -0000

--_000_4D3B1530A6714A3E846177BE91507D7Bciscocom_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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==

--_000_4D3B1530A6714A3E846177BE91507D7Bciscocom_
Content-Type: text/html; charset="utf-8"
Content-ID: <91A7BF60F27C8A4287432A8D476C8836@namprd11.prod.outlook.com>
Content-Transfer-Encoding: base64
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--_000_4D3B1530A6714A3E846177BE91507D7Bciscocom_--


From nobody Fri May 17 14:44:47 2019
Return-Path: <0100016ac7c11b7d-054d8d19-87cf-4379-8038-634c99bc492b-000000@amazonses.watsen.net>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BDAE81200B5 for <netmod@ietfa.amsl.com>; Fri, 17 May 2019 14:44:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level: 
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=amazonses.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CovyZMdBrkGK for <netmod@ietfa.amsl.com>; Fri, 17 May 2019 14:44:44 -0700 (PDT)
Received: from a8-33.smtp-out.amazonses.com (a8-33.smtp-out.amazonses.com [54.240.8.33]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1000E120073 for <netmod@ietf.org>; Fri, 17 May 2019 14:44:43 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=6gbrjpgwjskckoa6a5zn6fwqkn67xbtw; d=amazonses.com; t=1558129482; h=From:Message-Id:Content-Type:Mime-Version:Subject:Date:In-Reply-To:Cc:To:References:Feedback-ID; bh=561KYiJbB85K2t73ja3/7epSp6fR+MG2/2m8dAYYZYA=; b=A/0blakg3r+MkqJz8PA8IdtiyXkY0CiebVPVFH9pXhdkG7g79cKkNaqcNg0QumLg aAF0Ozpx8pIFc+4PhFmwgSuXSjaa1cVR7BJkOvqRSD67IubkB7BA0XH2FD+8iBmKEAQ HFi4v9sYGANnzGyuUp/uM9dBReqgieC1wKzg+Hvw=
From: Kent Watsen <kent+ietf@watsen.net>
Message-ID: <0100016ac7c11b7d-054d8d19-87cf-4379-8038-634c99bc492b-000000@email.amazonses.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_54DE03EE-0978-4B04-94A7-AF683B6853F6"
Mime-Version: 1.0 (Mac OS X Mail 12.2 \(3445.102.3\))
Date: Fri, 17 May 2019 21:44:42 +0000
In-Reply-To: <4D3B1530-A671-4A3E-8461-77BE91507D7B@cisco.com>
Cc: "netmod@ietf.org" <netmod@ietf.org>
To: "Reshad Rahman (rrahman)" <rrahman@cisco.com>
References: <0100016ac75aaed8-31a9e97f-4419-49ad-ab8c-700a83d5f19e-000000@email.amazonses.com> <4D3B1530-A671-4A3E-8461-77BE91507D7B@cisco.com>
X-Mailer: Apple Mail (2.3445.102.3)
X-SES-Outgoing: 2019.05.17-54.240.8.33
Feedback-ID: 1.us-east-1.DKmIRZFhhsBhtmFMNikgwZUWVrODEw9qVcPhqJEI2DA=:AmazonSES
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/5sQQLgzMojLQTisdY58ce9naxuA>
Subject: Re: [netmod] can a leaf of type "empty" have a "default" value?
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 17 May 2019 21:44:46 -0000

--Apple-Mail=_54DE03EE-0978-4B04-94A7-AF683B6853F6
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

Oh bother, my eyes glossed right over that.  Thanks for spotting it!

K.



> On May 17, 2019, at 3:59 PM, Reshad Rahman (rrahman) =
<rrahman@cisco.com> wrote:
>=20
> Hi Kent,
> =20
> =46rom https://tools.ietf.org/html/rfc7950#section-9.11 =
<https://tools.ietf.org/html/rfc7950#section-9.11>
> An empty type cannot have a default value.
> =20
> Regards,
> Reshad.
> =20
> From: netmod <netmod-bounces@ietf.org> on behalf of Kent Watsen =
<kent+ietf@watsen.net>
> Date: Friday, May 17, 2019 at 3:53 PM
> To: "netmod@ietf.org" <netmod@ietf.org>
> Subject: [netmod] can a leaf of type "empty" have a "default" value?
> =20
> =20
> A leaf with type "empty" is often times used to represent a boolean: =
present =3D=3D set, not present =3D=3D not set.  Is there a way in YANG =
to specify that the "empty" type leaf is "set" by default?  Perhaps like =
this:
> =20
>     leaf flag {
>         type empty;
>         default "";
>     }
> =20
> Kent // contributor
> =20


--Apple-Mail=_54DE03EE-0978-4B04-94A7-AF683B6853F6
Content-Transfer-Encoding: 7bit
Content-Type: text/html;
	charset=us-ascii

<html><head><meta http-equiv="Content-Type" content="text/html; charset=us-ascii"></head><body style="word-wrap: break-word; -webkit-nbsp-mode: space; line-break: after-white-space;" class="">Oh bother, my eyes glossed right over that. &nbsp;Thanks for spotting it!<div class=""><br class=""></div><div class="">K.</div><div class=""><br class=""></div><div class=""><br class=""><div><br class=""><blockquote type="cite" class=""><div class="">On May 17, 2019, at 3:59 PM, Reshad Rahman (rrahman) &lt;<a href="mailto:rrahman@cisco.com" class="">rrahman@cisco.com</a>&gt; wrote:</div><br class="Apple-interchange-newline"><div class="">

<meta http-equiv="Content-Type" content="text/html; charset=utf-8" class="">
<meta name="Generator" content="Microsoft Word 15 (filtered medium)" class="">
<style class=""><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:#0563C1;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:#954F72;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML Preformatted Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";}
p.msonormal0, li.msonormal0, div.msonormal0
	{mso-style-name:msonormal;
	mso-margin-top-alt:auto;
	margin-right:0cm;
	mso-margin-bottom-alt:auto;
	margin-left:0cm;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:"Courier New";}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->

<div lang="EN-CA" link="#0563C1" vlink="#954F72" class="">
<div class="WordSection1"><div class="MsoNormal">Hi Kent,<o:p class=""></o:p></div><div class="MsoNormal"><o:p class="">&nbsp;</o:p></div><div class="MsoNormal">From <a href="https://tools.ietf.org/html/rfc7950#section-9.11" class="">
https://tools.ietf.org/html/rfc7950#section-9.11</a><o:p class=""></o:p></div><div class="MsoNormal"><span style="font-size: 10pt; font-family: &quot;Courier New&quot;;" class="">An empty type cannot have a default value.<o:p class=""></o:p></span></div><div class="MsoNormal"><o:p class="">&nbsp;</o:p></div><div class="MsoNormal"><span lang="EN-US" class="">Regards,<o:p class=""></o:p></span></div><div class="MsoNormal"><span lang="EN-US" class="">Reshad.<o:p class=""></o:p></span></div><div class="MsoNormal"><span lang="EN-US" class=""><o:p class="">&nbsp;</o:p></span></div>
<div style="border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm 0cm 0cm" class=""><div class="MsoNormal"><b class=""><span style="font-size: 12pt;" class="">From: </span></b><span style="font-size: 12pt;" class="">netmod &lt;<a href="mailto:netmod-bounces@ietf.org" class="">netmod-bounces@ietf.org</a>&gt; on behalf of Kent Watsen &lt;<a href="mailto:kent+ietf@watsen.net" class="">kent+ietf@watsen.net</a>&gt;<br class="">
<b class="">Date: </b>Friday, May 17, 2019 at 3:53 PM<br class="">
<b class="">To: </b>"<a href="mailto:netmod@ietf.org" class="">netmod@ietf.org</a>" &lt;<a href="mailto:netmod@ietf.org" class="">netmod@ietf.org</a>&gt;<br class="">
<b class="">Subject: </b>[netmod] can a leaf of type "empty" have a "default" value?<o:p class=""></o:p></span></div>
</div>
<div class=""><div class="MsoNormal"><o:p class="">&nbsp;</o:p></div>
</div>
<div class=""><div class="MsoNormal"><o:p class="">&nbsp;</o:p></div>
</div>
<div class=""><div class="MsoNormal">A leaf with type "empty" is often times used to represent a boolean: present == set, not present == not set. &nbsp;Is there a way in YANG to specify that the "empty" type leaf is "set" by default? &nbsp;Perhaps like this:<o:p class=""></o:p></div>
</div>
<div class=""><div class="MsoNormal"><o:p class="">&nbsp;</o:p></div>
</div>
<div class=""><div class="MsoNormal">&nbsp; &nbsp; leaf flag {<o:p class=""></o:p></div>
</div>
<div class=""><div class="MsoNormal">&nbsp; &nbsp; &nbsp; &nbsp; type empty;<o:p class=""></o:p></div>
</div>
<div class=""><div class="MsoNormal">&nbsp; &nbsp; &nbsp; &nbsp; default "";<o:p class=""></o:p></div>
</div>
<div class=""><div class="MsoNormal">&nbsp; &nbsp; }<o:p class=""></o:p></div>
</div>
<div class=""><div class="MsoNormal"><o:p class="">&nbsp;</o:p></div>
</div>
<div class=""><div class="MsoNormal">Kent // contributor<o:p class=""></o:p></div>
</div>
<div class=""><div class="MsoNormal"><o:p class="">&nbsp;</o:p></div>
</div>
</div>
</div>

</div></blockquote></div><br class=""></div></body></html>
--Apple-Mail=_54DE03EE-0978-4B04-94A7-AF683B6853F6--


From nobody Sun May 19 22:57:14 2019
Return-Path: <bill.wu@huawei.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2837C120090 for <netmod@ietfa.amsl.com>; Sun, 19 May 2019 22:57:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 32am9Kd8gZVM for <netmod@ietfa.amsl.com>; Sun, 19 May 2019 22:57:11 -0700 (PDT)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D2549120041 for <netmod@ietf.org>; Sun, 19 May 2019 22:57:10 -0700 (PDT)
Received: from lhreml704-cah.china.huawei.com (unknown [172.18.7.106]) by Forcepoint Email with ESMTP id 5137E7E2FF6564300A9E; Mon, 20 May 2019 06:57:08 +0100 (IST)
Received: from NKGEML411-HUB.china.huawei.com (10.98.56.70) by lhreml704-cah.china.huawei.com (10.201.108.45) with Microsoft SMTP Server (TLS) id 14.3.408.0; Mon, 20 May 2019 06:57:07 +0100
Received: from NKGEML513-MBX.china.huawei.com ([169.254.1.182]) by nkgeml411-hub.china.huawei.com ([10.98.56.70]) with mapi id 14.03.0415.000; Mon, 20 May 2019 13:57:01 +0800
From: Qin Wu <bill.wu@huawei.com>
To: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
CC: "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] I-D Action: draft-ietf-netmod-factory-default-01.txt
Thread-Index: AdUOwKSkoNULWGbCSDC9QJu82XvZFw==
Date: Mon, 20 May 2019 05:57:02 +0000
Message-ID: <B8F9A780D330094D99AF023C5877DABAA4935F8C@nkgeml513-mbx.china.huawei.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.134.31.203]
Content-Type: text/plain; charset="gb2312"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/p5INDE1KN4TQSqQtshfrytUsrp8>
Subject: Re: [netmod] I-D Action: draft-ietf-netmod-factory-default-01.txt
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 20 May 2019 05:57:13 -0000
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From nobody Sun May 19 23:20:13 2019
Return-Path: <j.schoenwaelder@jacobs-university.de>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3D1411200CC for <netmod@ietfa.amsl.com>; Sun, 19 May 2019 23:20:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level: 
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id B-kktIpqyKJs for <netmod@ietfa.amsl.com>; Sun, 19 May 2019 23:20:08 -0700 (PDT)
Received: from atlas5.jacobs-university.de (atlas5.jacobs-university.de [212.201.44.20]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6A19E120041 for <netmod@ietf.org>; Sun, 19 May 2019 23:20:06 -0700 (PDT)
Received: from localhost (demetrius5.irc-it.jacobs-university.de [10.70.0.222]) by atlas5.jacobs-university.de (Postfix) with ESMTP id BDE4E64A; Mon, 20 May 2019 08:20:04 +0200 (CEST)
X-Virus-Scanned: amavisd-new at jacobs-university.de
Received: from atlas5.jacobs-university.de ([10.70.0.217]) by localhost (demetrius5.jacobs-university.de [10.70.0.222]) (amavisd-new, port 10032) with ESMTP id YxkmSb5Of8kq; Mon, 20 May 2019 08:20:04 +0200 (CEST)
Received: from hermes.jacobs-university.de (hermes.jacobs-university.de [212.201.44.23]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "hermes.jacobs-university.de", Issuer "DFN-Verein Global Issuing CA" (verified OK)) by atlas5.jacobs-university.de (Postfix) with ESMTPS; Mon, 20 May 2019 08:20:04 +0200 (CEST)
Received: from localhost (demetrius5.irc-it.jacobs-university.de [10.70.0.222]) by hermes.jacobs-university.de (Postfix) with ESMTP id A81502011D; Mon, 20 May 2019 08:20:04 +0200 (CEST)
X-Virus-Scanned: amavisd-new at jacobs-university.de
Received: from hermes.jacobs-university.de ([212.201.44.23]) by localhost (demetrius5.jacobs-university.de [10.70.0.222]) (amavisd-new, port 10028) with ESMTP id aVoLlfmYfpVR; Mon, 20 May 2019 08:20:04 +0200 (CEST)
Received: from exchange.jacobs-university.de (SXCHMB01.jacobs.jacobs-university.de [10.70.0.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "exchange.jacobs-university.de", Issuer "DFN-Verein Global Issuing CA" (verified OK)) by hermes.jacobs-university.de (Postfix) with ESMTPS id 467912011B; Mon, 20 May 2019 08:20:04 +0200 (CEST)
Received: from anna.localdomain (10.50.218.117) by sxchmb03.jacobs.jacobs-university.de (10.70.0.155) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.1713.5; Mon, 20 May 2019 08:20:03 +0200
Received: by anna.localdomain (Postfix, from userid 501) id 5832E300927AEF; Mon, 20 May 2019 08:20:03 +0200 (CEST)
Date: Mon, 20 May 2019 08:20:03 +0200
From: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
To: Qin Wu <bill.wu@huawei.com>
CC: "netmod@ietf.org" <netmod@ietf.org>
Message-ID: <20190520062003.i4wl2f7ekx34lctn@anna.jacobs.jacobs-university.de>
Reply-To: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
Mail-Followup-To: Qin Wu <bill.wu@huawei.com>, "netmod@ietf.org" <netmod@ietf.org>
References: <B8F9A780D330094D99AF023C5877DABAA4935F8C@nkgeml513-mbx.china.huawei.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
In-Reply-To: <B8F9A780D330094D99AF023C5877DABAA4935F8C@nkgeml513-mbx.china.huawei.com>
User-Agent: NeoMutt/20180716
X-ClientProxiedBy: SXCHMB03.jacobs.jacobs-university.de (10.70.0.155) To sxchmb03.jacobs.jacobs-university.de (10.70.0.155)
X-Clacks-Overhead: GNU Terry Pratchett
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/6-47easGa8zFpwP-IqvV-fUkufM>
Subject: Re: [netmod] I-D Action: draft-ietf-netmod-factory-default-01.txt
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 20 May 2019 06:20:11 -0000

On Mon, May 20, 2019 at 05:57:02AM +0000, Qin Wu wrote:
> -----=E9=82=AE=E4=BB=B6=E5=8E=9F=E4=BB=B6-----
> =E5=8F=91=E4=BB=B6=E4=BA=BA: Juergen Schoenwaelder [mailto:j.schoenwael=
der@jacobs-university.de]=20
> =E5=8F=91=E9=80=81=E6=97=B6=E9=97=B4: 2019=E5=B9=B45=E6=9C=8817=E6=97=A5=
 19:15
> =E6=94=B6=E4=BB=B6=E4=BA=BA: Qin Wu <bill.wu@huawei.com>
> =E6=8A=84=E9=80=81: netmod@ietf.org
> =E4=B8=BB=E9=A2=98: Re: [netmod] I-D Action: draft-ietf-netmod-factory-=
default-01.txt
>=20
> I think this does not work:
>=20
>       [...]  For <copy-config> operation,it can be used to copy
>       the factory default content to another datastore, however the
>       content of the datastore is not propagated automatically to any
>       other datastores.
>=20
> You can't change the way things work. If something is committed to lets=
 say <running>, then this triggers the propagation to <intended> and even=
tually <operational>. You can't come along and say that copy-config from =
a particular source stops this.
> [Qin]:Automatic propagation we were referred to is that when we have th=
ree datastores, let's say datastore A, datastore B, datastore C, one time=
 <copy-config> operation can not copy content of datastore A to datstore =
B and datastore C at the same time,
> But you are right, content of <running> will be automatically propagate=
d to <intended> and <operational>, we will see how to tweak the text.

This is not what the text says. And given the parameters of
copy-config, it is obvious that you can't copy to multiple datastores.
=20
> Is it really useful to expose factory default to copy config? Or said d=
ifferenlty, would it not make sense to fix copy-config (at some other
> place) so that it can generically work with new datastores?
> [Qin]: Note that this is just an option feature to <copy-config> to ass=
ign one single target datastore with factory default content, I am wonder=
ing why it can not be defined in this draft in a more generic way?
> Even in RFC6241bis or a separate draft, if you add this feature support=
 to <copy-config>, you will augment <copy-config> in the same way, if my =
understanding is correct.

No. You would allow any datastore, not a specific one.

>    The content of the factory-default datastore is usually not security
>    sensitive as it is the same on any device of a certain type.
>=20
> I am not sure this is true.
>=20
> For non-trivial devices, the default is likely not static but something=
 that takes into account device features available and the specific hardw=
are configuration present. It is actually somewhat unclear what the facto=
ry-default datastore contains; the stuff I can expect to see in <running>=
 after the reset or some static stuff that may be tweaked during the boot=
 process to yield the initial <running>.
> Or are we pretending these two are always the same?
> [Qin]: We emphasize "usually not", to address your comments, we could a=
dd:
> "
> When its contents are considered sensitive, It is RECOMMENDED that the =
factory default=20
> Data is encrypted."

You propose to invent another layer of encryption???

/js

--=20
Juergen Schoenwaelder           Jacobs University Bremen gGmbH
Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
Fax:   +49 421 200 3103         <https://www.jacobs-university.de/>


From nobody Sun May 19 23:27:50 2019
Return-Path: <bill.wu@huawei.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 72BD51200C4 for <netmod@ietfa.amsl.com>; Sun, 19 May 2019 23:27:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.199
X-Spam-Level: 
X-Spam-Status: No, score=-4.199 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ev3U4G1eEFYN for <netmod@ietfa.amsl.com>; Sun, 19 May 2019 23:27:47 -0700 (PDT)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E6BF81200CC for <netmod@ietf.org>; Sun, 19 May 2019 23:27:46 -0700 (PDT)
Received: from LHREML711-CAH.china.huawei.com (unknown [172.18.7.108]) by Forcepoint Email with ESMTP id AFAF33DC737FA85FB8CE; Mon, 20 May 2019 07:27:44 +0100 (IST)
Received: from lhreml705-chm.china.huawei.com (10.201.108.54) by LHREML711-CAH.china.huawei.com (10.201.108.34) with Microsoft SMTP Server (TLS) id 14.3.408.0; Mon, 20 May 2019 07:27:44 +0100
Received: from lhreml705-chm.china.huawei.com (10.201.108.54) by lhreml705-chm.china.huawei.com (10.201.108.54) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1713.5; Mon, 20 May 2019 07:27:44 +0100
Received: from NKGEML413-HUB.china.huawei.com (10.98.56.74) by lhreml705-chm.china.huawei.com (10.201.108.54) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA_P256) id 15.1.1713.5 via Frontend Transport; Mon, 20 May 2019 07:27:43 +0100
Received: from NKGEML513-MBX.china.huawei.com ([169.254.1.182]) by NKGEML413-HUB.china.huawei.com ([10.98.56.74]) with mapi id 14.03.0415.000; Mon, 20 May 2019 14:27:36 +0800
From: Qin Wu <bill.wu@huawei.com>
To: Andy Bierman <andy@yumaworks.com>, Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>, "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] I-D Action: draft-ietf-netmod-factory-default-01.txt
Thread-Index: AdUO1Fx01b7LzXPxS2GKTL6ITxiMkg==
Date: Mon, 20 May 2019 06:27:36 +0000
Message-ID: <B8F9A780D330094D99AF023C5877DABAA4938FC5@nkgeml513-mbx.china.huawei.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.134.31.203]
Content-Type: multipart/alternative; boundary="_000_B8F9A780D330094D99AF023C5877DABAA4938FC5nkgeml513mbxchi_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/wfiBGpvMZHQ0xtjmF100R8ieOlY>
Subject: Re: [netmod] I-D Action: draft-ietf-netmod-factory-default-01.txt
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 20 May 2019 06:27:49 -0000

--_000_B8F9A780D330094D99AF023C5877DABAA4938FC5nkgeml513mbxchi_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64

5Y+R5Lu25Lq6OiBBbmR5IEJpZXJtYW4gW21haWx0bzphbmR5QHl1bWF3b3Jrcy5jb21dDQrlj5Hp
gIHml7bpl7Q6IDIwMTnlubQ15pyIMTjml6UgMTozNw0K5pS25Lu25Lq6OiBKdWVyZ2VuIFNjaG9l
bndhZWxkZXIgPGouc2Nob2Vud2FlbGRlckBqYWNvYnMtdW5pdmVyc2l0eS5kZT47IFFpbiBXdSA8
YmlsbC53dUBodWF3ZWkuY29tPjsgbmV0bW9kQGlldGYub3JnDQrkuLvpopg6IFJlOiBbbmV0bW9k
XSBJLUQgQWN0aW9uOiBkcmFmdC1pZXRmLW5ldG1vZC1mYWN0b3J5LWRlZmF1bHQtMDEudHh0DQoN
Cg0KDQpPbiBGcmksIE1heSAxNywgMjAxOSBhdCA0OjE1IEFNIEp1ZXJnZW4gU2Nob2Vud2FlbGRl
ciA8ai5zY2hvZW53YWVsZGVyQGphY29icy11bml2ZXJzaXR5LmRlPG1haWx0bzpqLnNjaG9lbndh
ZWxkZXJAamFjb2JzLXVuaXZlcnNpdHkuZGU+PiB3cm90ZToNCkkgdGhpbmsgdGhpcyBkb2VzIG5v
dCB3b3JrOg0KDQogICAgICBbLi4uXSAgRm9yIDxjb3B5LWNvbmZpZz4gb3BlcmF0aW9uLGl0IGNh
biBiZSB1c2VkIHRvIGNvcHkNCiAgICAgIHRoZSBmYWN0b3J5IGRlZmF1bHQgY29udGVudCB0byBh
bm90aGVyIGRhdGFzdG9yZSwgaG93ZXZlciB0aGUNCiAgICAgIGNvbnRlbnQgb2YgdGhlIGRhdGFz
dG9yZSBpcyBub3QgcHJvcGFnYXRlZCBhdXRvbWF0aWNhbGx5IHRvIGFueQ0KICAgICAgb3RoZXIg
ZGF0YXN0b3Jlcy4NCg0KWW91IGNhbid0IGNoYW5nZSB0aGUgd2F5IHRoaW5ncyB3b3JrLiBJZiBz
b21ldGhpbmcgaXMgY29tbWl0dGVkIHRvDQpsZXRzIHNheSA8cnVubmluZz4sIHRoZW4gdGhpcyB0
cmlnZ2VycyB0aGUgcHJvcGFnYXRpb24gdG8gPGludGVuZGVkPg0KYW5kIGV2ZW50dWFsbHkgPG9w
ZXJhdGlvbmFsPi4gWW91IGNhbid0IGNvbWUgYWxvbmcgYW5kIHNheSB0aGF0DQpjb3B5LWNvbmZp
ZyBmcm9tIGEgcGFydGljdWxhciBzb3VyY2Ugc3RvcHMgdGhpcy4NCg0KQWdyZWVkLiBJIGhhdmUg
YmVlbiBvYmplY3RpbmcgdG8gdGhlIGNsaWVudC1jb250cm9sbGVkIGRhdGFzdG9yZS1zcGVjaWZp
YyBmYWN0b3J5IHJlc2V0Lg0KSSBkbyBub3Qga25vdyBvZiBhbnkgZGV2aWNlcyB3aGljaCBzdXBw
b3J0IHN1Y2ggYSB0aGluZy4gIEkgd291bGQgbGlrZSB0bw0KdW5kZXJzdGFuZCB0aGUgdXNlLWNh
c2VzIHRoYXQgbWFrZSB0aGlzIHNvIHVzZWZ1bCBhbmQgY29tbW9uIHByYWN0aWNlIHRoYXQgaXQN
CnNob3VsZCBiZSBzdGFuZGFyZGl6ZWQuDQpbUWluXTpUaGVyZSBpcyBtaXN1bmRlcnN0YW5kaW5n
IG9uIHRoZSBsYXN0IHNlbnRlbmNlIG9mIHRoZSBxdW90ZWQgdGV4dC4gSSB3aWxsIGZpeCB0aGlz
Lg0KDQpJcyBpdCByZWFsbHkgdXNlZnVsIHRvIGV4cG9zZSBmYWN0b3J5IGRlZmF1bHQgdG8gY29w
eSBjb25maWc/IE9yIHNhaWQNCmRpZmZlcmVubHR5LCB3b3VsZCBpdCBub3QgbWFrZSBzZW5zZSB0
byBmaXggY29weS1jb25maWcgKGF0IHNvbWUgb3RoZXINCnBsYWNlKSBzbyB0aGF0IGl0IGNhbiBn
ZW5lcmljYWxseSB3b3JrIHdpdGggbmV3IGRhdGFzdG9yZXM/DQoNCiAgIFRoZSBjb250ZW50IG9m
IHRoZSBmYWN0b3J5LWRlZmF1bHQgZGF0YXN0b3JlIGlzIHVzdWFsbHkgbm90IHNlY3VyaXR5DQog
ICBzZW5zaXRpdmUgYXMgaXQgaXMgdGhlIHNhbWUgb24gYW55IGRldmljZSBvZiBhIGNlcnRhaW4g
dHlwZS4NCg0KSSBhbSBub3Qgc3VyZSB0aGlzIGlzIHRydWUuDQoNCkZvciBub24tdHJpdmlhbCBk
ZXZpY2VzLCB0aGUgZGVmYXVsdCBpcyBsaWtlbHkgbm90IHN0YXRpYyBidXQNCnNvbWV0aGluZyB0
aGF0IHRha2VzIGludG8gYWNjb3VudCBkZXZpY2UgZmVhdHVyZXMgYXZhaWxhYmxlIGFuZCB0aGUN
CnNwZWNpZmljIGhhcmR3YXJlIGNvbmZpZ3VyYXRpb24gcHJlc2VudC4gSXQgaXMgYWN0dWFsbHkg
c29tZXdoYXQNCnVuY2xlYXIgd2hhdCB0aGUgZmFjdG9yeS1kZWZhdWx0IGRhdGFzdG9yZSBjb250
YWluczsgdGhlIHN0dWZmIEkgY2FuDQpleHBlY3QgdG8gc2VlIGluIDxydW5uaW5nPiBhZnRlciB0
aGUgcmVzZXQgb3Igc29tZSBzdGF0aWMgc3R1ZmYgdGhhdA0KbWF5IGJlIHR3ZWFrZWQgZHVyaW5n
IHRoZSBib290IHByb2Nlc3MgdG8geWllbGQgdGhlIGluaXRpYWwgPHJ1bm5pbmc+Lg0KT3IgYXJl
IHdlIHByZXRlbmRpbmcgdGhlc2UgdHdvIGFyZSBhbHdheXMgdGhlIHNhbWU/DQoNClRoZSBzdGFy
dHVwIHByb2NlZHVyZSB3aXRoaW4gYSBzZXJ2ZXIgaXMgdmVyeSBwcm9wcmlldGFyeSBhbmQgY2Fu
IGJlDQp2ZXJ5IGRpZmZlcmVudCwgZXZlbiBmb3IgdmVuZG9ycyB1c2luZyB0aGUgc2FtZSBzZXJ2
ZXIgY29kZS4NCg0KVGhlcmUgYXJlIG5vIHN0YW5kYXJkIHByb2NlZHVyZXMgdG9kYXkgdGhhdCBh
bGxvdyBhIGNsaWVudCB0byBpbmplY3QgY29uZmlndXJhdGlvbg0KaW50byB0aGlzIHByb2Nlc3Mu
IFRoZSBjbGllbnQgaXMgYWxsb3dlZCB0byBhbHRlciBjb25maWd1cmF0aW9uIG9ubHkgYWZ0ZXIN
CnRoZSBzYXZlZCBvciBmYWN0b3J5IGNvbmZpZ3VyYXRpb24gaXMgbG9hZGVkLiAgSU1PIGl0IHNo
b3VsZCBzdGF5IHRoaXMgd2F5Lg0KDQplLmcsIDogZG8gbm90IHdhbnQgdG8gc3RhbmRhcmRpemU6
DQoNCiAgIGNvcHktY29uZmlnIHNvdXJjZT1mYWN0b3J5IHRhcmdldD1jYW5kaWRhdGUNCiAgIGVk
aXQtY29uZmlnIHRhcmdldD1jYW5kaWRhdGUgLi4uDQogICBjb21taXQNCg0KVGhpcyBpcyB0aGUg
b25seSB1c2UtY2FzZSBJIGNhbiBpbWFnaW5lIGZvciBjb3B5LWNvbmZpZyBmcm9tIGZhY3Rvcnks
DQpidXQgSU1PIGl0IGlzIG5vdCB2ZXJ5IGltcG9ydGFudC4gKGdldC1jb25maWcoZmFjdG9yeSkg
KyBlZGl0LWNvbmZpZw0KYWxyZWFkeSBzdXBwb3J0cyBpdC4pDQoNCltRaW5dOk5vdCBzdXJlIEkg
dW5kZXJzdGFuZCB0aGUgPHN0YXJ0dXA+IGNhbiBub3QgYmUgaW50ZXJ2ZW5lZC4NCkZvciB3cml0
YWJsZSBydW5uaW5nLCB3ZSBzaG91bGQgYWxsb3cgY29weS1jb25maWcgb3BlcmF0aW9uIGNvcHkg
dGhlIGNvbnRlbnQgdG8gPHJ1bm5pbmc+DQpXZSBzaG91bGQgYWxzbyBhbGxvdyBjb3B5IGNvbmZp
ZyBvcGVyYXRpb24gY29weSB0aGUgY29udGVudCBmcm9tIDxydW5uaW5nPiB0byA8c3RhcnR1cD4N
ClNlZSB0aGUgc2Vjb25kIGZpZ3VyZSBpbiB0aGUgZm9sbG93aW5nIGxpbms6DQpodHRwOi8vd3d3
Lm5ldGNvbmZjZW50cmFsLm9yZy9uZXRjb25mX2RvY3MNCg0KVGhlIGNvcHlyaWdodCB5ZWFyIG5l
ZWRzIGFkanVzdG1lbnQuIEluZGVudGF0aW9uIG9mIHRoZSBZQU5HDQpzdGF0ZW1lbnRzIHNob3Vs
ZCBiZSBmaXhlZC4NCg0KL2pzDQoNCkFuZHkNCg0KLS0NCkp1ZXJnZW4gU2Nob2Vud2FlbGRlciAg
ICAgICAgICAgSmFjb2JzIFVuaXZlcnNpdHkgQnJlbWVuIGdHbWJIDQpQaG9uZTogKzQ5IDQyMSAy
MDAgMzU4NyAgICAgICAgIENhbXB1cyBSaW5nIDEgfCAyODc1OSBCcmVtZW4gfCBHZXJtYW55DQpG
YXg6ICAgKzQ5IDQyMSAyMDAgMzEwMyAgICAgICAgIDxodHRwczovL3d3dy5qYWNvYnMtdW5pdmVy
c2l0eS5kZS8+DQoNCl9fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fDQpuZXRtb2QgbWFpbGluZyBsaXN0DQpuZXRtb2RAaWV0Zi5vcmc8bWFpbHRvOm5ldG1vZEBp
ZXRmLm9yZz4NCmh0dHBzOi8vd3d3LmlldGYub3JnL21haWxtYW4vbGlzdGluZm8vbmV0bW9kDQo=

--_000_B8F9A780D330094D99AF023C5877DABAA4938FC5nkgeml513mbxchi_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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==

--_000_B8F9A780D330094D99AF023C5877DABAA4938FC5nkgeml513mbxchi_--


From nobody Sun May 19 23:44:36 2019
Return-Path: <bill.wu@huawei.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D7657120041 for <netmod@ietfa.amsl.com>; Sun, 19 May 2019 23:44:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QO0U-ijmX1S5 for <netmod@ietfa.amsl.com>; Sun, 19 May 2019 23:44:32 -0700 (PDT)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 87452120020 for <netmod@ietf.org>; Sun, 19 May 2019 23:44:32 -0700 (PDT)
Received: from lhreml705-cah.china.huawei.com (unknown [172.18.7.108]) by Forcepoint Email with ESMTP id 6D06D1BEF5534FD42D94; Mon, 20 May 2019 07:44:30 +0100 (IST)
Received: from NKGEML412-HUB.china.huawei.com (10.98.56.73) by lhreml705-cah.china.huawei.com (10.201.108.46) with Microsoft SMTP Server (TLS) id 14.3.408.0; Mon, 20 May 2019 07:44:29 +0100
Received: from NKGEML513-MBX.china.huawei.com ([169.254.1.182]) by nkgeml412-hub.china.huawei.com ([10.98.56.73]) with mapi id 14.03.0415.000; Mon, 20 May 2019 14:44:26 +0800
From: Qin Wu <bill.wu@huawei.com>
To: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
CC: "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] I-D Action: draft-ietf-netmod-factory-default-01.txt
Thread-Index: AdUO1m1y3TVv72FuR0yyiV8mMqnL4Q==
Date: Mon, 20 May 2019 06:44:26 +0000
Message-ID: <B8F9A780D330094D99AF023C5877DABAA4938FE9@nkgeml513-mbx.china.huawei.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.134.31.203]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/FmR9BylPt0d3PGff9_XiLjJQ-0Q>
Subject: Re: [netmod] I-D Action: draft-ietf-netmod-factory-default-01.txt
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 20 May 2019 06:44:35 -0000
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From nobody Sun May 19 23:57:50 2019
Return-Path: <j.schoenwaelder@jacobs-university.de>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BBD2212006E for <netmod@ietfa.amsl.com>; Sun, 19 May 2019 23:57:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level: 
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ST4TNkoRLqiS for <netmod@ietfa.amsl.com>; Sun, 19 May 2019 23:57:47 -0700 (PDT)
Received: from atlas5.jacobs-university.de (atlas5.jacobs-university.de [212.201.44.20]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 56868120041 for <netmod@ietf.org>; Sun, 19 May 2019 23:57:47 -0700 (PDT)
Received: from localhost (demetrius5.irc-it.jacobs-university.de [10.70.0.222]) by atlas5.jacobs-university.de (Postfix) with ESMTP id CB740677; Mon, 20 May 2019 08:57:45 +0200 (CEST)
X-Virus-Scanned: amavisd-new at jacobs-university.de
Received: from atlas5.jacobs-university.de ([10.70.0.217]) by localhost (demetrius5.jacobs-university.de [10.70.0.222]) (amavisd-new, port 10032) with ESMTP id 4Gqb3XgIesTB; Mon, 20 May 2019 08:57:45 +0200 (CEST)
Received: from hermes.jacobs-university.de (hermes.jacobs-university.de [212.201.44.23]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "hermes.jacobs-university.de", Issuer "DFN-Verein Global Issuing CA" (verified OK)) by atlas5.jacobs-university.de (Postfix) with ESMTPS; Mon, 20 May 2019 08:57:45 +0200 (CEST)
Received: from localhost (demetrius5.irc-it.jacobs-university.de [10.70.0.222]) by hermes.jacobs-university.de (Postfix) with ESMTP id B61D12011D; Mon, 20 May 2019 08:57:45 +0200 (CEST)
X-Virus-Scanned: amavisd-new at jacobs-university.de
Received: from hermes.jacobs-university.de ([212.201.44.23]) by localhost (demetrius5.jacobs-university.de [10.70.0.222]) (amavisd-new, port 10028) with ESMTP id vdKUYWK4C5hU; Mon, 20 May 2019 08:57:45 +0200 (CEST)
Received: from exchange.jacobs-university.de (sxchmb03.jacobs.jacobs-university.de [10.70.0.155]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "exchange.jacobs-university.de", Issuer "DFN-Verein Global Issuing CA" (verified OK)) by hermes.jacobs-university.de (Postfix) with ESMTPS id 7AE2D2011B; Mon, 20 May 2019 08:57:45 +0200 (CEST)
Received: from anna.localdomain (10.50.218.117) by sxchmb03.jacobs.jacobs-university.de (10.70.0.155) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.1713.5; Mon, 20 May 2019 08:57:44 +0200
Received: by anna.localdomain (Postfix, from userid 501) id 9F248300927BF5; Mon, 20 May 2019 08:57:44 +0200 (CEST)
Date: Mon, 20 May 2019 08:57:44 +0200
From: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
To: Qin Wu <bill.wu@huawei.com>
CC: "netmod@ietf.org" <netmod@ietf.org>
Message-ID: <20190520065744.xqoyurd4o6weoxzk@anna.jacobs.jacobs-university.de>
Reply-To: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
Mail-Followup-To: Qin Wu <bill.wu@huawei.com>, "netmod@ietf.org" <netmod@ietf.org>
References: <B8F9A780D330094D99AF023C5877DABAA4938FE9@nkgeml513-mbx.china.huawei.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <B8F9A780D330094D99AF023C5877DABAA4938FE9@nkgeml513-mbx.china.huawei.com>
User-Agent: NeoMutt/20180716
X-ClientProxiedBy: SXCHMB04.jacobs.jacobs-university.de (10.70.0.156) To sxchmb03.jacobs.jacobs-university.de (10.70.0.155)
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/FpO253yUgN71ZGKDUass8ZO9OTw>
Subject: Re: [netmod] I-D Action: draft-ietf-netmod-factory-default-01.txt
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 20 May 2019 06:57:49 -0000

On Mon, May 20, 2019 at 06:44:26AM +0000, Qin Wu wrote:
> > "
> > When its contents are considered sensitive, It is RECOMMENDED that the 
> > factory default Data is encrypted."
> 
> You propose to invent another layer of encryption???
> [Qin]: Not my intention, I think factory default data may have be encrypted already.
> We could reuse it.
>

You can reuse something you dream up. Security considerations need to
be factual not handwaving.

/js

-- 
Juergen Schoenwaelder           Jacobs University Bremen gGmbH
Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
Fax:   +49 421 200 3103         <https://www.jacobs-university.de/>


From nobody Mon May 20 02:53:45 2019
Return-Path: <rwilton@cisco.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5BE6412012B for <netmod@ietfa.amsl.com>; Mon, 20 May 2019 02:53:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.5
X-Spam-Level: 
X-Spam-Status: No, score=-14.5 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=kvWXbDNj; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=aDo7Jsny
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id D0mlLkuRDyao for <netmod@ietfa.amsl.com>; Mon, 20 May 2019 02:53:41 -0700 (PDT)
Received: from alln-iport-2.cisco.com (alln-iport-2.cisco.com [173.37.142.89]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EA6B6120086 for <netmod@ietf.org>; Mon, 20 May 2019 02:53:40 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=6878; q=dns/txt; s=iport; t=1558346021; x=1559555621; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=Md0WWlLzA1e10ENI1+6qonLE1TOOsSRcRI13QOyeJNQ=; b=kvWXbDNjLVGS1OobfstW4/Sukyz3NAHntY75F9jQ9s+7r8OKu9iL605i dGeqZci+SQ+rd0y6z2v9mQb6zIXxJAK5g/xqOca3NraiLfXKwdHDdd6Mw dCKfHh1HgW5Nn8oWdxcAf/QkUi3IRiB1AaJNkmGioA2N45PeKfwSoCY29 Q=;
IronPort-PHdr: =?us-ascii?q?9a23=3Agf0zxxPHVkwSanvFSMUl6mtXPHoupqn0MwgJ65?= =?us-ascii?q?Eul7NJdOG58o//OFDEu60/l0fHCIPc7f8My/HbtaztQyQh2d6AqzhDFf4ETB?= =?us-ascii?q?oZkYMTlg0kDtSCDBjhM//ucys8NM9DT1RiuXq8NBsdFQ=3D=3D?=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AGAAANeOJc/5hdJa1iAxkBAQEBAQE?= =?us-ascii?q?BAQEBAQEHAQEBAQEBgVEEAQEBAQELAYE9JCwDaVUgBAsoCoQJg0cDhFKKJYJ?= =?us-ascii?q?XlyeBLhSBEANUCQEBAQwBARgLCgIBAYN6RgIXgiEjNAkOAQMBAQQBAQIBBG0?= =?us-ascii?q?cDIVKAQEBBAEBEBERDAEBLAsBCwICAgEGAg4CAQQBAQECAhESAwICAhkMCxQ?= =?us-ascii?q?BCAgBAQQBDQUIGoMBgWoDHQECDIkpkGACgTWIX3GBL4J5AQEFhH0Ygg8DBgW?= =?us-ascii?q?BBygBihyBFx0XgUA/gVeCFzU+gmEBAYEcLhkVCh4IgkMygiaNdpomCQKCDYY?= =?us-ascii?q?ujGmCHYpPiTOMUoElhUiOTgIEAgQFAg4BAQWBTziBV3AVO4Jsgg8MF4NMM4R?= =?us-ascii?q?hhT9ygSmMYAGBIAEB?=
X-IronPort-AV: E=Sophos;i="5.60,491,1549929600"; d="scan'208";a="276236441"
Received: from rcdn-core-1.cisco.com ([173.37.93.152]) by alln-iport-2.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 20 May 2019 09:53:38 +0000
Received: from XCH-ALN-020.cisco.com (xch-aln-020.cisco.com [173.36.7.30]) by rcdn-core-1.cisco.com (8.15.2/8.15.2) with ESMTPS id x4K9rctS003962 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Mon, 20 May 2019 09:53:38 GMT
Received: from xhs-rcd-001.cisco.com (173.37.227.246) by XCH-ALN-020.cisco.com (173.36.7.30) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Mon, 20 May 2019 04:53:37 -0500
Received: from xhs-rtp-001.cisco.com (64.101.210.228) by xhs-rcd-001.cisco.com (173.37.227.246) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Mon, 20 May 2019 04:53:36 -0500
Received: from NAM02-CY1-obe.outbound.protection.outlook.com (64.101.32.56) by xhs-rtp-001.cisco.com (64.101.210.228) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Mon, 20 May 2019 05:53:36 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com;  s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Md0WWlLzA1e10ENI1+6qonLE1TOOsSRcRI13QOyeJNQ=; b=aDo7JsnyfBI/j24sST2Ja3li7n1Dp0T3hAmDZdBsH6kBbwT7+dUyS6Yw6E380CqipdbvAt4/vQg+luxsds/k5fKzC30VIyQb0Q0pk6X2iRxUbxZcM53g3W8glnM5b7HWUHWsuYzdmdAE3VhwNTTvnx1TBhWiEB7Q58dMuqsrWOI=
Received: from BYAPR11MB2631.namprd11.prod.outlook.com (52.135.227.28) by BYAPR11MB3750.namprd11.prod.outlook.com (20.178.238.143) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1900.16; Mon, 20 May 2019 09:53:35 +0000
Received: from BYAPR11MB2631.namprd11.prod.outlook.com ([fe80::d837:c1dd:cdb1:bb78]) by BYAPR11MB2631.namprd11.prod.outlook.com ([fe80::d837:c1dd:cdb1:bb78%7]) with mapi id 15.20.1900.019; Mon, 20 May 2019 09:53:35 +0000
From: "Rob Wilton (rwilton)" <rwilton@cisco.com>
To: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>, Qin Wu <bill.wu@huawei.com>
CC: "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] I-D Action: draft-ietf-netmod-factory-default-01.txt
Thread-Index: AdUOwKSkoNULWGbCSDC9QJu82XvZFwAE2qqAAAX4u5A=
Date: Mon, 20 May 2019 09:53:35 +0000
Message-ID: <BYAPR11MB26318B9124B97731713B5618B5060@BYAPR11MB2631.namprd11.prod.outlook.com>
References: <B8F9A780D330094D99AF023C5877DABAA4935F8C@nkgeml513-mbx.china.huawei.com> <20190520062003.i4wl2f7ekx34lctn@anna.jacobs.jacobs-university.de>
In-Reply-To: <20190520062003.i4wl2f7ekx34lctn@anna.jacobs.jacobs-university.de>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=rwilton@cisco.com; 
x-originating-ip: [173.38.220.42]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: bf723c3a-61ed-492d-b09a-08d6dd0906a4
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600141)(711020)(4605104)(2017052603328)(7193020); SRVR:BYAPR11MB3750; 
x-ms-traffictypediagnostic: BYAPR11MB3750:
x-ms-exchange-purlcount: 3
x-microsoft-antispam-prvs: <BYAPR11MB3750BC15A5BB5602E71349D6B5060@BYAPR11MB3750.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-forefront-prvs: 004395A01C
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(136003)(39860400002)(366004)(346002)(396003)(376002)(189003)(199004)(13464003)(51444003)(25786009)(966005)(9686003)(6306002)(6246003)(53936002)(11346002)(476003)(14454004)(52536014)(76176011)(6116002)(86362001)(4326008)(76116006)(6506007)(66476007)(53546011)(102836004)(73956011)(66946007)(64756008)(66446008)(66556008)(3846002)(2906002)(71200400001)(71190400001)(74316002)(7696005)(99286004)(33656002)(7736002)(305945005)(14444005)(256004)(8676002)(8936002)(81166006)(229853002)(81156014)(68736007)(186003)(26005)(6436002)(55016002)(66066001)(446003)(5660300002)(478600001)(486006)(110136005)(316002); DIR:OUT; SFP:1101; SCL:1; SRVR:BYAPR11MB3750; H:BYAPR11MB2631.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: +93y8/at6izV/BtjmAqkeTHjclYxWPmEAUE4jsM9nbYfuQvEhO+lqhweLtD4kV0eaIxFi7RZSqfcvPrdSZF0TO6CIcpedQaxq1K+HJ3zr37rhP7GrrxNKRi5uc2eoItEK9Vmh2F/gKVP2pLeI5nxDKGkVQAiLqBIpDrQqgT+U4Vb7ADnvj5rAQFECbP/IjqDP3t283QNhwWaGq5sHLdAQ+rigSmr1246guIcybnO8FB9dL0oTSMhRzqx52kMsGr29Dnze/tYwnnH5HrUNjqeWgGT1NjG7837kjvJPSIDzTw9B+ZTU1j5bGGMhuXmdO2hmhjC+fuX6YyNBSWubE/AGMELAz/x0pUEcqevtB/hISH/TdSjyLLmt2Wo/nZJQYRhwCPrUAL+57QchoPyEaUXvTHqpfyqUNhMxq8ER7cfQGk=
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: bf723c3a-61ed-492d-b09a-08d6dd0906a4
X-MS-Exchange-CrossTenant-originalarrivaltime: 20 May 2019 09:53:35.3815 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR11MB3750
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.30, xch-aln-020.cisco.com
X-Outbound-Node: rcdn-core-1.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/YPdDoeM0xuqw7vTrUKCOMmYPFRY>
Subject: Re: [netmod] I-D Action: draft-ietf-netmod-factory-default-01.txt
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 20 May 2019 09:53:43 -0000
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From nobody Mon May 20 03:31:32 2019
Return-Path: <j.schoenwaelder@jacobs-university.de>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 11ED912016F for <netmod@ietfa.amsl.com>; Mon, 20 May 2019 03:31:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level: 
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Q3yV1Ast3Svr for <netmod@ietfa.amsl.com>; Mon, 20 May 2019 03:31:28 -0700 (PDT)
Received: from atlas5.jacobs-university.de (atlas5.jacobs-university.de [212.201.44.20]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E51D9120086 for <netmod@ietf.org>; Mon, 20 May 2019 03:31:27 -0700 (PDT)
Received: from localhost (demetrius5.irc-it.jacobs-university.de [10.70.0.222]) by atlas5.jacobs-university.de (Postfix) with ESMTP id 9DA78669; Mon, 20 May 2019 12:31:26 +0200 (CEST)
X-Virus-Scanned: amavisd-new at jacobs-university.de
Received: from atlas5.jacobs-university.de ([10.70.0.217]) by localhost (demetrius5.jacobs-university.de [10.70.0.222]) (amavisd-new, port 10032) with ESMTP id auB921_HJ_qk; Mon, 20 May 2019 12:31:26 +0200 (CEST)
Received: from hermes.jacobs-university.de (hermes.jacobs-university.de [212.201.44.23]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "hermes.jacobs-university.de", Issuer "DFN-Verein Global Issuing CA" (verified OK)) by atlas5.jacobs-university.de (Postfix) with ESMTPS; Mon, 20 May 2019 12:31:26 +0200 (CEST)
Received: from localhost (demetrius5.irc-it.jacobs-university.de [10.70.0.222]) by hermes.jacobs-university.de (Postfix) with ESMTP id 866992011D; Mon, 20 May 2019 12:31:26 +0200 (CEST)
X-Virus-Scanned: amavisd-new at jacobs-university.de
Received: from hermes.jacobs-university.de ([212.201.44.23]) by localhost (demetrius5.jacobs-university.de [10.70.0.222]) (amavisd-new, port 10028) with ESMTP id csRbgFjRb1zb; Mon, 20 May 2019 12:31:26 +0200 (CEST)
Received: from exchange.jacobs-university.de (SXCHMB02.jacobs.jacobs-university.de [10.70.0.121]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "exchange.jacobs-university.de", Issuer "DFN-Verein Global Issuing CA" (verified OK)) by hermes.jacobs-university.de (Postfix) with ESMTPS id 0001E2011B; Mon, 20 May 2019 12:31:25 +0200 (CEST)
Received: from anna.localdomain (10.50.218.117) by sxchmb03.jacobs.jacobs-university.de (10.70.0.155) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.1713.5; Mon, 20 May 2019 12:31:25 +0200
Received: by anna.localdomain (Postfix, from userid 501) id 04DB13009289AE; Mon, 20 May 2019 12:31:24 +0200 (CEST)
Date: Mon, 20 May 2019 12:31:24 +0200
From: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
To: "Rob Wilton (rwilton)" <rwilton@cisco.com>
CC: Qin Wu <bill.wu@huawei.com>, "netmod@ietf.org" <netmod@ietf.org>
Message-ID: <20190520103124.xhtndcug2lz6guka@anna.jacobs.jacobs-university.de>
Reply-To: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
Mail-Followup-To: "Rob Wilton (rwilton)" <rwilton@cisco.com>, Qin Wu <bill.wu@huawei.com>, "netmod@ietf.org" <netmod@ietf.org>
References: <B8F9A780D330094D99AF023C5877DABAA4935F8C@nkgeml513-mbx.china.huawei.com> <20190520062003.i4wl2f7ekx34lctn@anna.jacobs.jacobs-university.de> <BYAPR11MB26318B9124B97731713B5618B5060@BYAPR11MB2631.namprd11.prod.outlook.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
In-Reply-To: <BYAPR11MB26318B9124B97731713B5618B5060@BYAPR11MB2631.namprd11.prod.outlook.com>
User-Agent: NeoMutt/20180716
X-ClientProxiedBy: SXCHMB03.jacobs.jacobs-university.de (10.70.0.155) To sxchmb03.jacobs.jacobs-university.de (10.70.0.155)
X-Clacks-Overhead: GNU Terry Pratchett
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/DMgPvDSZtGtXnMrVyho1sZXCZdw>
Subject: Re: [netmod] I-D Action: draft-ietf-netmod-factory-default-01.txt
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 20 May 2019 10:31:31 -0000

+1

/js

On Mon, May 20, 2019 at 09:53:35AM +0000, Rob Wilton (rwilton) wrote:
> If the purpose of the extending the copy-config operation to the factor=
y-default datastore is just another generic way to do the factory-reset R=
PC then I would suggest that we don't modify copy-config as part of this =
draft.  Instead, I think that it would be good to fix this generically (f=
or any datastore) in a future update of NETCONF - I see that you have alr=
eady raised https://github.com/netconf-wg/netconf-next/issues/2 to track =
this.
>=20
> In theory, a client could use copy-config in a slightly different way t=
o the factory-reset RPC, i.e., to copy from the factory-default to candid=
ate, then have the client modify the configuration until they are happy w=
ith it, before committing it.  But I'm not sure that this in the best app=
roach.  If I was writing a client, I would choose to code the client to r=
ead from the factory-default datastore (if needed), then construct whatev=
er the desired configuration of the device is, before pushing it to devic=
e.
>=20
> For me, I think that the most important parts of this draft are being a=
ble to read from the factory-default datastore, and having an RPC to rese=
t the device back to the factory-default state.  I would probably defer u=
pdating copy-config until it can be fixed properly in NETCONF.
>=20
> Thanks,
> Rob
>=20
>=20
> > -----Original Message-----
> > From: netmod <netmod-bounces@ietf.org> On Behalf Of Juergen Schoenwae=
lder
> > Sent: 20 May 2019 07:20
> > To: Qin Wu <bill.wu@huawei.com>
> > Cc: netmod@ietf.org
> > Subject: Re: [netmod] I-D Action: draft-ietf-netmod-factory-default-0=
1.txt
> >=20
> > On Mon, May 20, 2019 at 05:57:02AM +0000, Qin Wu wrote:
> > > -----=E9=82=AE=E4=BB=B6=E5=8E=9F=E4=BB=B6-----
> > > =E5=8F=91=E4=BB=B6=E4=BA=BA: Juergen Schoenwaelder
> > > [mailto:j.schoenwaelder@jacobs-university.de]
> > > =E5=8F=91=E9=80=81=E6=97=B6=E9=97=B4: 2019=E5=B9=B45=E6=9C=8817=E6=97=
=A5 19:15
> > > =E6=94=B6=E4=BB=B6=E4=BA=BA: Qin Wu <bill.wu@huawei.com>
> > > =E6=8A=84=E9=80=81: netmod@ietf.org
> > > =E4=B8=BB=E9=A2=98: Re: [netmod] I-D Action: draft-ietf-netmod-fact=
ory-default-01.txt
> > >
> > > I think this does not work:
> > >
> > >       [...]  For <copy-config> operation,it can be used to copy
> > >       the factory default content to another datastore, however the
> > >       content of the datastore is not propagated automatically to a=
ny
> > >       other datastores.
> > >
> > > You can't change the way things work. If something is committed to =
lets
> > say <running>, then this triggers the propagation to <intended> and
> > eventually <operational>. You can't come along and say that copy-conf=
ig
> > from a particular source stops this.
> > > [Qin]:Automatic propagation we were referred to is that when we hav=
e
> > > three datastores, let's say datastore A, datastore B, datastore C, =
one
> > time <copy-config> operation can not copy content of datastore A to
> > datstore B and datastore C at the same time, But you are right, conte=
nt of
> > <running> will be automatically propagated to <intended> and <operati=
onal>,
> > we will see how to tweak the text.
> >=20
> > This is not what the text says. And given the parameters of copy-conf=
ig, it
> > is obvious that you can't copy to multiple datastores.
> >=20
> > > Is it really useful to expose factory default to copy config? Or sa=
id
> > > differenlty, would it not make sense to fix copy-config (at some ot=
her
> > > place) so that it can generically work with new datastores?
> > > [Qin]: Note that this is just an option feature to <copy-config> to
> > assign one single target datastore with factory default content, I am
> > wondering why it can not be defined in this draft in a more generic w=
ay?
> > > Even in RFC6241bis or a separate draft, if you add this feature sup=
port
> > to <copy-config>, you will augment <copy-config> in the same way, if =
my
> > understanding is correct.
> >=20
> > No. You would allow any datastore, not a specific one.
> >=20
> > >    The content of the factory-default datastore is usually not secu=
rity
> > >    sensitive as it is the same on any device of a certain type.
> > >
> > > I am not sure this is true.
> > >
> > > For non-trivial devices, the default is likely not static but somet=
hing
> > that takes into account device features available and the specific ha=
rdware
> > configuration present. It is actually somewhat unclear what the facto=
ry-
> > default datastore contains; the stuff I can expect to see in <running=
>
> > after the reset or some static stuff that may be tweaked during the b=
oot
> > process to yield the initial <running>.
> > > Or are we pretending these two are always the same?
> > > [Qin]: We emphasize "usually not", to address your comments, we cou=
ld
> > add:
> > > "
> > > When its contents are considered sensitive, It is RECOMMENDED that =
the
> > > factory default Data is encrypted."
> >=20
> > You propose to invent another layer of encryption???
> >=20
> > /js
> >=20
> > --
> > Juergen Schoenwaelder           Jacobs University Bremen gGmbH
> > Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | German=
y
> > Fax:   +49 421 200 3103         <https://www.jacobs-university.de/>
> >=20
> > _______________________________________________
> > netmod mailing list
> > netmod@ietf.org
> > https://www.ietf.org/mailman/listinfo/netmod

--=20
Juergen Schoenwaelder           Jacobs University Bremen gGmbH
Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
Fax:   +49 421 200 3103         <https://www.jacobs-university.de/>


From nobody Mon May 20 06:57:32 2019
Return-Path: <0100016ad5886a16-9c766034-ee10-4a60-a0ba-ee2fd5d7ff47-000000@amazonses.watsen.net>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4144412017E for <netmod@ietfa.amsl.com>; Mon, 20 May 2019 06:57:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level: 
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=amazonses.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hsGzuKAIYPt1 for <netmod@ietfa.amsl.com>; Mon, 20 May 2019 06:57:30 -0700 (PDT)
Received: from a8-31.smtp-out.amazonses.com (a8-31.smtp-out.amazonses.com [54.240.8.31]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D549612012C for <netmod@ietf.org>; Mon, 20 May 2019 06:57:29 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=6gbrjpgwjskckoa6a5zn6fwqkn67xbtw; d=amazonses.com; t=1558360648; h=From:Message-Id:Content-Type:Mime-Version:Subject:Date:In-Reply-To:Cc:To:References:Feedback-ID; bh=6PqxepbhTubTn1SK2jGBdjdTtbgwtmnMlsuiuLxn3HM=; b=esIJMHzSEl1TFh73jFG6dWg8L/u5NvoM18wfBLeqxp1JGvDkm7BLPhE4ptXPsPfJ euHdiPPexFZdOu27A4vQnBCAsq5MRP7tTqArQd/t3uYUJVEHwkV85enQHvhJ7pHPZOq AVfMFwbkOyhbjlg7kXVQLmLlDSNBEtWBdki8pZyg=
From: Kent Watsen <kent+ietf@watsen.net>
Message-ID: <0100016ad5886a16-9c766034-ee10-4a60-a0ba-ee2fd5d7ff47-000000@email.amazonses.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_275793E0-75A3-4814-9085-E878E05A49D0"
Mime-Version: 1.0 (Mac OS X Mail 12.2 \(3445.102.3\))
Date: Mon, 20 May 2019 13:57:28 +0000
In-Reply-To: <20190520103124.xhtndcug2lz6guka@anna.jacobs.jacobs-university.de>
Cc: "Rob Wilton (rwilton)" <rwilton@cisco.com>, "netmod@ietf.org" <netmod@ietf.org>
To: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
References: <B8F9A780D330094D99AF023C5877DABAA4935F8C@nkgeml513-mbx.china.huawei.com> <20190520062003.i4wl2f7ekx34lctn@anna.jacobs.jacobs-university.de> <BYAPR11MB26318B9124B97731713B5618B5060@BYAPR11MB2631.namprd11.prod.outlook.com> <20190520103124.xhtndcug2lz6guka@anna.jacobs.jacobs-university.de>
X-Mailer: Apple Mail (2.3445.102.3)
X-SES-Outgoing: 2019.05.20-54.240.8.31
Feedback-ID: 1.us-east-1.DKmIRZFhhsBhtmFMNikgwZUWVrODEw9qVcPhqJEI2DA=:AmazonSES
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/89sqMNlpIXtOJ6mDyboo3egsQjQ>
Subject: Re: [netmod] I-D Action: draft-ietf-netmod-factory-default-01.txt
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 20 May 2019 13:57:32 -0000

--Apple-Mail=_275793E0-75A3-4814-9085-E878E05A49D0
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

The <copy-config> value-proposition is limited and not worth special =
effort to make happen.
  - RFC 6241: augment statements are needed to add to the existing RPCs, =
so just support
                       <get-config>.
  - RFC 8040: datastore aren't supported,  there's no way to access the =
"factory-default" datastore.
  - RFC 8342: Appendix A needs to be observed, which this draft does in =
its Section 3 (note, a
                       reference to Appendix A should be added here).
  - RFC 8526's <get-data> and <edit-data> come along for free (though =
edits would fail due to this
          new datastore being read-only.  Note that RFC 8526 does not =
define a <copy-data> RFC...
  - RFC 8527's datastore resource (i.e., =
/ds/ietf-datastores:operational:factory-default) and all the
          standard HTTP operations (OPTIONS, HEAD, GET, etc.)  come for =
free but, again, there is
          no "COPY" operation

Just supporting <get-config> (and not <copy-config>) is the most =
consistent option.

PS: the "WG Chair" lines should be removed from he YANG module.  We =
don't do that anymore.

Kent // contributor


> On May 20, 2019, at 6:31 AM, Juergen Schoenwaelder =
<j.schoenwaelder@jacobs-university.de> wrote:
>=20
> +1
>=20
> /js
>=20
> On Mon, May 20, 2019 at 09:53:35AM +0000, Rob Wilton (rwilton) wrote:
>> If the purpose of the extending the copy-config operation to the =
factory-default datastore is just another generic way to do the =
factory-reset RPC then I would suggest that we don't modify copy-config =
as part of this draft.  Instead, I think that it would be good to fix =
this generically (for any datastore) in a future update of NETCONF - I =
see that you have already raised =
https://github.com/netconf-wg/netconf-next/issues/2 to track this.
>>=20
>> In theory, a client could use copy-config in a slightly different way =
to the factory-reset RPC, i.e., to copy from the factory-default to =
candidate, then have the client modify the configuration until they are =
happy with it, before committing it.  But I'm not sure that this in the =
best approach.  If I was writing a client, I would choose to code the =
client to read from the factory-default datastore (if needed), then =
construct whatever the desired configuration of the device is, before =
pushing it to device.
>>=20
>> For me, I think that the most important parts of this draft are being =
able to read from the factory-default datastore, and having an RPC to =
reset the device back to the factory-default state.  I would probably =
defer updating copy-config until it can be fixed properly in NETCONF.
>>=20
>> Thanks,
>> Rob
>>=20
>>=20
>>> -----Original Message-----
>>> From: netmod <netmod-bounces@ietf.org> On Behalf Of Juergen =
Schoenwaelder
>>> Sent: 20 May 2019 07:20
>>> To: Qin Wu <bill.wu@huawei.com>
>>> Cc: netmod@ietf.org
>>> Subject: Re: [netmod] I-D Action: =
draft-ietf-netmod-factory-default-01.txt
>>>=20
>>> On Mon, May 20, 2019 at 05:57:02AM +0000, Qin Wu wrote:
>>>> -----=E9=82=AE=E4=BB=B6=E5=8E=9F=E4=BB=B6-----
>>>> =E5=8F=91=E4=BB=B6=E4=BA=BA: Juergen Schoenwaelder
>>>> [mailto:j.schoenwaelder@jacobs-university.de]
>>>> =E5=8F=91=E9=80=81=E6=97=B6=E9=97=B4: 2019=E5=B9=B45=E6=9C=8817=E6=97=
=A5 19:15
>>>> =E6=94=B6=E4=BB=B6=E4=BA=BA: Qin Wu <bill.wu@huawei.com>
>>>> =E6=8A=84=E9=80=81: netmod@ietf.org
>>>> =E4=B8=BB=E9=A2=98: Re: [netmod] I-D Action: =
draft-ietf-netmod-factory-default-01.txt
>>>>=20
>>>> I think this does not work:
>>>>=20
>>>>      [...]  For <copy-config> operation,it can be used to copy
>>>>      the factory default content to another datastore, however the
>>>>      content of the datastore is not propagated automatically to =
any
>>>>      other datastores.
>>>>=20
>>>> You can't change the way things work. If something is committed to =
lets
>>> say <running>, then this triggers the propagation to <intended> and
>>> eventually <operational>. You can't come along and say that =
copy-config
>>> from a particular source stops this.
>>>> [Qin]:Automatic propagation we were referred to is that when we =
have
>>>> three datastores, let's say datastore A, datastore B, datastore C, =
one
>>> time <copy-config> operation can not copy content of datastore A to
>>> datstore B and datastore C at the same time, But you are right, =
content of
>>> <running> will be automatically propagated to <intended> and =
<operational>,
>>> we will see how to tweak the text.
>>>=20
>>> This is not what the text says. And given the parameters of =
copy-config, it
>>> is obvious that you can't copy to multiple datastores.
>>>=20
>>>> Is it really useful to expose factory default to copy config? Or =
said
>>>> differenlty, would it not make sense to fix copy-config (at some =
other
>>>> place) so that it can generically work with new datastores?
>>>> [Qin]: Note that this is just an option feature to <copy-config> to
>>> assign one single target datastore with factory default content, I =
am
>>> wondering why it can not be defined in this draft in a more generic =
way?
>>>> Even in RFC6241bis or a separate draft, if you add this feature =
support
>>> to <copy-config>, you will augment <copy-config> in the same way, if =
my
>>> understanding is correct.
>>>=20
>>> No. You would allow any datastore, not a specific one.
>>>=20
>>>>   The content of the factory-default datastore is usually not =
security
>>>>   sensitive as it is the same on any device of a certain type.
>>>>=20
>>>> I am not sure this is true.
>>>>=20
>>>> For non-trivial devices, the default is likely not static but =
something
>>> that takes into account device features available and the specific =
hardware
>>> configuration present. It is actually somewhat unclear what the =
factory-
>>> default datastore contains; the stuff I can expect to see in =
<running>
>>> after the reset or some static stuff that may be tweaked during the =
boot
>>> process to yield the initial <running>.
>>>> Or are we pretending these two are always the same?
>>>> [Qin]: We emphasize "usually not", to address your comments, we =
could
>>> add:
>>>> "
>>>> When its contents are considered sensitive, It is RECOMMENDED that =
the
>>>> factory default Data is encrypted."
>>>=20
>>> You propose to invent another layer of encryption???
>>>=20
>>> /js
>>>=20
>>> --
>>> Juergen Schoenwaelder           Jacobs University Bremen gGmbH
>>> Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | =
Germany
>>> Fax:   +49 421 200 3103         <https://www.jacobs-university.de/>
>>>=20
>>> _______________________________________________
>>> netmod mailing list
>>> netmod@ietf.org
>>> https://www.ietf.org/mailman/listinfo/netmod
>=20
> --=20
> Juergen Schoenwaelder           Jacobs University Bremen gGmbH
> Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
> Fax:   +49 421 200 3103         <https://www.jacobs-university.de/>
>=20
> _______________________________________________
> netmod mailing list
> netmod@ietf.org
> https://www.ietf.org/mailman/listinfo/netmod


--Apple-Mail=_275793E0-75A3-4814-9085-E878E05A49D0
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=utf-8

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Dutf-8"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" class=3D"">The =
&lt;copy-config&gt; value-proposition is limited and not worth special =
effort to make happen.<div class=3D"">&nbsp; - RFC 6241: augment =
statements are needed to add to the existing RPCs, so just =
support</div><div class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&lt;get-config&gt;.</div><div =
class=3D"">&nbsp; - RFC 8040: datastore aren't supported, &nbsp;there's =
no way to access the "factory-default" datastore.</div><div =
class=3D"">&nbsp; - RFC 8342: Appendix A needs to be observed, which =
this draft does in its Section 3 (note, a</div><div class=3D"">&nbsp; =
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =
&nbsp;reference to Appendix A should be added here).</div><div =
class=3D"">&nbsp; - RFC 8526's &lt;get-data&gt; and &lt;edit-data&gt; =
come along for free (though edits would fail due to this</div><div =
class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; new datastore being =
read-only. &nbsp;Note that&nbsp;RFC 8526 does not define a =
&lt;copy-data&gt; RFC...</div><div class=3D""><div class=3D"">&nbsp; - =
RFC 8527's datastore resource (i.e., =
/ds/ietf-datastores:operational:factory-default) and all the</div><div =
class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; standard HTTP operations =
(OPTIONS, HEAD, GET, etc.) &nbsp;come for free but, again, there =
is</div><div class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; no "COPY" =
operation</div><div class=3D""><br class=3D""></div><div class=3D"">Just =
supporting &lt;get-config&gt; (and not &lt;copy-config&gt;) is the most =
consistent option.</div><div class=3D""><br class=3D""></div><div =
class=3D"">PS: the "WG Chair" lines should be removed from he YANG =
module. &nbsp;We don't do that anymore.</div><div class=3D""><br =
class=3D""></div><div class=3D"">Kent // contributor</div><div =
class=3D""><br class=3D""><div><br class=3D""><blockquote type=3D"cite" =
class=3D""><div class=3D"">On May 20, 2019, at 6:31 AM, Juergen =
Schoenwaelder &lt;<a href=3D"mailto:j.schoenwaelder@jacobs-university.de" =
class=3D"">j.schoenwaelder@jacobs-university.de</a>&gt; wrote:</div><br =
class=3D"Apple-interchange-newline"><div class=3D""><div class=3D"">+1<br =
class=3D""><br class=3D"">/js<br class=3D""><br class=3D"">On Mon, May =
20, 2019 at 09:53:35AM +0000, Rob Wilton (rwilton) wrote:<br =
class=3D""><blockquote type=3D"cite" class=3D"">If the purpose of the =
extending the copy-config operation to the factory-default datastore is =
just another generic way to do the factory-reset RPC then I would =
suggest that we don't modify copy-config as part of this draft. =
&nbsp;Instead, I think that it would be good to fix this generically =
(for any datastore) in a future update of NETCONF - I see that you have =
already raised <a =
href=3D"https://github.com/netconf-wg/netconf-next/issues/2" =
class=3D"">https://github.com/netconf-wg/netconf-next/issues/2</a> to =
track this.<br class=3D""><br class=3D"">In theory, a client could use =
copy-config in a slightly different way to the factory-reset RPC, i.e., =
to copy from the factory-default to candidate, then have the client =
modify the configuration until they are happy with it, before committing =
it. &nbsp;But I'm not sure that this in the best approach. &nbsp;If I =
was writing a client, I would choose to code the client to read from the =
factory-default datastore (if needed), then construct whatever the =
desired configuration of the device is, before pushing it to device.<br =
class=3D""><br class=3D"">For me, I think that the most important parts =
of this draft are being able to read from the factory-default datastore, =
and having an RPC to reset the device back to the factory-default state. =
&nbsp;I would probably defer updating copy-config until it can be fixed =
properly in NETCONF.<br class=3D""><br class=3D"">Thanks,<br =
class=3D"">Rob<br class=3D""><br class=3D""><br class=3D""><blockquote =
type=3D"cite" class=3D"">-----Original Message-----<br class=3D"">From: =
netmod &lt;<a href=3D"mailto:netmod-bounces@ietf.org" =
class=3D"">netmod-bounces@ietf.org</a>&gt; On Behalf Of Juergen =
Schoenwaelder<br class=3D"">Sent: 20 May 2019 07:20<br class=3D"">To: =
Qin Wu &lt;<a href=3D"mailto:bill.wu@huawei.com" =
class=3D"">bill.wu@huawei.com</a>&gt;<br class=3D"">Cc: <a =
href=3D"mailto:netmod@ietf.org" class=3D"">netmod@ietf.org</a><br =
class=3D"">Subject: Re: [netmod] I-D Action: =
draft-ietf-netmod-factory-default-01.txt<br class=3D""><br class=3D"">On =
Mon, May 20, 2019 at 05:57:02AM +0000, Qin Wu wrote:<br =
class=3D""><blockquote type=3D"cite" class=3D"">-----=E9=82=AE=E4=BB=B6=E5=
=8E=9F=E4=BB=B6-----<br class=3D"">=E5=8F=91=E4=BB=B6=E4=BA=BA: Juergen =
Schoenwaelder<br class=3D"">[<a =
href=3D"mailto:j.schoenwaelder@jacobs-university.de" =
class=3D"">mailto:j.schoenwaelder@jacobs-university.de</a>]<br =
class=3D"">=E5=8F=91=E9=80=81=E6=97=B6=E9=97=B4: 2019=E5=B9=B45=E6=9C=8817=
=E6=97=A5 19:15<br class=3D"">=E6=94=B6=E4=BB=B6=E4=BA=BA: Qin Wu &lt;<a =
href=3D"mailto:bill.wu@huawei.com" =
class=3D"">bill.wu@huawei.com</a>&gt;<br class=3D"">=E6=8A=84=E9=80=81: =
<a href=3D"mailto:netmod@ietf.org" class=3D"">netmod@ietf.org</a><br =
class=3D"">=E4=B8=BB=E9=A2=98: Re: [netmod] I-D Action: =
draft-ietf-netmod-factory-default-01.txt<br class=3D""><br class=3D"">I =
think this does not work:<br class=3D""><br class=3D""> =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[...] &nbsp;For &lt;copy-config&gt; =
operation,it can be used to copy<br class=3D""> =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;the factory default content to another =
datastore, however the<br class=3D""> =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;content of the datastore is not propagated =
automatically to any<br class=3D""> &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;other =
datastores.<br class=3D""><br class=3D"">You can't change the way things =
work. If something is committed to lets<br class=3D""></blockquote>say =
&lt;running&gt;, then this triggers the propagation to &lt;intended&gt; =
and<br class=3D"">eventually &lt;operational&gt;. You can't come along =
and say that copy-config<br class=3D"">from a particular source stops =
this.<br class=3D""><blockquote type=3D"cite" class=3D"">[Qin]:Automatic =
propagation we were referred to is that when we have<br class=3D"">three =
datastores, let's say datastore A, datastore B, datastore C, one<br =
class=3D""></blockquote>time &lt;copy-config&gt; operation can not copy =
content of datastore A to<br class=3D"">datstore B and datastore C at =
the same time, But you are right, content of<br class=3D"">&lt;running&gt;=
 will be automatically propagated to &lt;intended&gt; and =
&lt;operational&gt;,<br class=3D"">we will see how to tweak the text.<br =
class=3D""><br class=3D"">This is not what the text says. And given the =
parameters of copy-config, it<br class=3D"">is obvious that you can't =
copy to multiple datastores.<br class=3D""><br class=3D""><blockquote =
type=3D"cite" class=3D"">Is it really useful to expose factory default =
to copy config? Or said<br class=3D"">differenlty, would it not make =
sense to fix copy-config (at some other<br class=3D"">place) so that it =
can generically work with new datastores?<br class=3D"">[Qin]: Note that =
this is just an option feature to &lt;copy-config&gt; to<br =
class=3D""></blockquote>assign one single target datastore with factory =
default content, I am<br class=3D"">wondering why it can not be defined =
in this draft in a more generic way?<br class=3D""><blockquote =
type=3D"cite" class=3D"">Even in RFC6241bis or a separate draft, if you =
add this feature support<br class=3D""></blockquote>to =
&lt;copy-config&gt;, you will augment &lt;copy-config&gt; in the same =
way, if my<br class=3D"">understanding is correct.<br class=3D""><br =
class=3D"">No. You would allow any datastore, not a specific one.<br =
class=3D""><br class=3D""><blockquote type=3D"cite" class=3D""> =
&nbsp;&nbsp;The content of the factory-default datastore is usually not =
security<br class=3D""> &nbsp;&nbsp;sensitive as it is the same on any =
device of a certain type.<br class=3D""><br class=3D"">I am not sure =
this is true.<br class=3D""><br class=3D"">For non-trivial devices, the =
default is likely not static but something<br class=3D""></blockquote>that=
 takes into account device features available and the specific =
hardware<br class=3D"">configuration present. It is actually somewhat =
unclear what the factory-<br class=3D"">default datastore contains; the =
stuff I can expect to see in &lt;running&gt;<br class=3D"">after the =
reset or some static stuff that may be tweaked during the boot<br =
class=3D"">process to yield the initial &lt;running&gt;.<br =
class=3D""><blockquote type=3D"cite" class=3D"">Or are we pretending =
these two are always the same?<br class=3D"">[Qin]: We emphasize =
"usually not", to address your comments, we could<br =
class=3D""></blockquote>add:<br class=3D""><blockquote type=3D"cite" =
class=3D"">"<br class=3D"">When its contents are considered sensitive, =
It is RECOMMENDED that the<br class=3D"">factory default Data is =
encrypted."<br class=3D""></blockquote><br class=3D"">You propose to =
invent another layer of encryption???<br class=3D""><br class=3D"">/js<br =
class=3D""><br class=3D"">--<br class=3D"">Juergen Schoenwaelder =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Jacobs =
University Bremen gGmbH<br class=3D"">Phone: +49 421 200 3587 =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Campus Ring 1 | 28759 =
Bremen | Germany<br class=3D"">Fax: &nbsp;&nbsp;+49 421 200 3103 =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&lt;<a =
href=3D"https://www.jacobs-university.de/" =
class=3D"">https://www.jacobs-university.de/</a>&gt;<br class=3D""><br =
class=3D"">_______________________________________________<br =
class=3D"">netmod mailing list<br class=3D""><a =
href=3D"mailto:netmod@ietf.org" class=3D"">netmod@ietf.org</a><br =
class=3D"">https://www.ietf.org/mailman/listinfo/netmod<br =
class=3D""></blockquote></blockquote><br class=3D"">-- <br =
class=3D"">Juergen Schoenwaelder =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Jacobs =
University Bremen gGmbH<br class=3D"">Phone: +49 421 200 3587 =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Campus Ring 1 | 28759 =
Bremen | Germany<br class=3D"">Fax: &nbsp;&nbsp;+49 421 200 3103 =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&lt;<a =
href=3D"https://www.jacobs-university.de/" =
class=3D"">https://www.jacobs-university.de/</a>&gt;<br class=3D""><br =
class=3D"">_______________________________________________<br =
class=3D"">netmod mailing list<br class=3D""><a =
href=3D"mailto:netmod@ietf.org" class=3D"">netmod@ietf.org</a><br =
class=3D"">https://www.ietf.org/mailman/listinfo/netmod<br =
class=3D""></div></div></blockquote></div><br =
class=3D""></div></div></body></html>=

--Apple-Mail=_275793E0-75A3-4814-9085-E878E05A49D0--


From nobody Mon May 20 18:27:50 2019
Return-Path: <bill.wu@huawei.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 09DB5120021 for <netmod@ietfa.amsl.com>; Mon, 20 May 2019 18:27:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.19
X-Spam-Level: 
X-Spam-Status: No, score=-4.19 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_FILL_THIS_FORM_SHORT=0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DDGU0kFlnm8L for <netmod@ietfa.amsl.com>; Mon, 20 May 2019 18:27:46 -0700 (PDT)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 746F812001B for <netmod@ietf.org>; Mon, 20 May 2019 18:27:46 -0700 (PDT)
Received: from lhreml706-cah.china.huawei.com (unknown [172.18.7.107]) by Forcepoint Email with ESMTP id 88500FF21A28ECBD1F1B; Tue, 21 May 2019 02:27:44 +0100 (IST)
Received: from lhreml705-chm.china.huawei.com (10.201.108.54) by lhreml706-cah.china.huawei.com (10.201.108.47) with Microsoft SMTP Server (TLS) id 14.3.408.0; Tue, 21 May 2019 02:27:44 +0100
Received: from lhreml705-chm.china.huawei.com (10.201.108.54) by lhreml705-chm.china.huawei.com (10.201.108.54) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1713.5; Tue, 21 May 2019 02:27:44 +0100
Received: from NKGEML412-HUB.china.huawei.com (10.98.56.73) by lhreml705-chm.china.huawei.com (10.201.108.54) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA_P256) id 15.1.1713.5 via Frontend Transport; Tue, 21 May 2019 02:27:43 +0100
Received: from NKGEML513-MBX.china.huawei.com ([169.254.1.182]) by nkgeml412-hub.china.huawei.com ([10.98.56.73]) with mapi id 14.03.0415.000; Tue, 21 May 2019 09:27:41 +0800
From: Qin Wu <bill.wu@huawei.com>
To: Kent Watsen <kent+ietf@watsen.net>, Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
CC: "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] I-D Action: draft-ietf-netmod-factory-default-01.txt
Thread-Index: AdUPc2PXvXy28ei0TDipRGM8M6juqA==
Date: Tue, 21 May 2019 01:27:41 +0000
Message-ID: <B8F9A780D330094D99AF023C5877DABAA493EB8F@nkgeml513-mbx.china.huawei.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.134.31.203]
Content-Type: multipart/alternative; boundary="_000_B8F9A780D330094D99AF023C5877DABAA493EB8Fnkgeml513mbxchi_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/---vBqt3u1LUo0G7nanzYTYOAa4>
Subject: Re: [netmod] I-D Action: draft-ietf-netmod-factory-default-01.txt
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 21 May 2019 01:27:49 -0000

--_000_B8F9A780D330094D99AF023C5877DABAA493EB8Fnkgeml513mbxchi_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_B8F9A780D330094D99AF023C5877DABAA493EB8Fnkgeml513mbxchi_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_B8F9A780D330094D99AF023C5877DABAA493EB8Fnkgeml513mbxchi_--


From nobody Tue May 21 01:55:46 2019
Return-Path: <wangzitao@huawei.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BA49E12003E; Tue, 21 May 2019 01:55:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level: 
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WI64UVh4iIki; Tue, 21 May 2019 01:55:35 -0700 (PDT)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F030D1200FC; Tue, 21 May 2019 01:55:34 -0700 (PDT)
Received: from lhreml702-cah.china.huawei.com (unknown [172.18.7.108]) by Forcepoint Email with ESMTP id 61C25A647CC9AB4AD310; Tue, 21 May 2019 09:55:32 +0100 (IST)
Received: from lhreml711-chm.china.huawei.com (10.201.108.62) by lhreml702-cah.china.huawei.com (10.201.108.43) with Microsoft SMTP Server (TLS) id 14.3.408.0; Tue, 21 May 2019 09:55:32 +0100
Received: from lhreml711-chm.china.huawei.com (10.201.108.62) by lhreml711-chm.china.huawei.com (10.201.108.62) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1713.5; Tue, 21 May 2019 09:55:32 +0100
Received: from DGGEMM404-HUB.china.huawei.com (10.3.20.212) by lhreml711-chm.china.huawei.com (10.201.108.62) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA) id 15.1.1713.5 via Frontend Transport; Tue, 21 May 2019 09:55:31 +0100
Received: from DGGEMM527-MBX.china.huawei.com ([169.254.6.89]) by DGGEMM404-HUB.china.huawei.com ([10.3.20.212]) with mapi id 14.03.0439.000; Tue, 21 May 2019 16:54:55 +0800
From: wangzitao <wangzitao@huawei.com>
To: Lou Berger <lberger@labn.net>, NetMod WG <netmod@ietf.org>
CC: NetMod WG Chairs <netmod-chairs@ietf.org>
Thread-Topic: [netmod] WG Last Call: draft-ietf-netmod-artwork-folding-02
Thread-Index: AdUPsr3mT5D2U1RJSu6Xrf1xNvOXLg==
Date: Tue, 21 May 2019 08:54:55 +0000
Message-ID: <E6BC9BBCBCACC246846FC685F9FF41EA2D9DABC3@DGGEMM527-MBX.china.huawei.com>
Accept-Language: en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.134.142.117]
Content-Type: text/plain; charset="gb2312"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/o_YAy9xKBzJybR9z23ynWiMAMRE>
Subject: Re: [netmod] WG Last Call: draft-ietf-netmod-artwork-folding-02
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 21 May 2019 08:55:38 -0000
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From nobody Tue May 21 16:47:52 2019
Return-Path: <0100016adccb395c-f363cce5-a39c-439c-bd64-61ab7da7bd44-000000@amazonses.watsen.net>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6183B120047; Tue, 21 May 2019 16:47:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=amazonses.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZpHKj9UwnkcW; Tue, 21 May 2019 16:47:49 -0700 (PDT)
Received: from a8-31.smtp-out.amazonses.com (a8-31.smtp-out.amazonses.com [54.240.8.31]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A8D67120058; Tue, 21 May 2019 16:47:48 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=6gbrjpgwjskckoa6a5zn6fwqkn67xbtw; d=amazonses.com; t=1558482467; h=From:Message-Id:Content-Type:Mime-Version:Subject:Date:In-Reply-To:Cc:To:References:Feedback-ID; bh=/HOE8r2PxiZoYdRDe/kkGcka7QKBCgS9SAqgmSMinmk=; b=WSZP1jKbzqV8bWOC/cut+8Y+5eSVCuah2hZAHCl3i+LVlBbQ4Os2jtgXczESO0W3 I+BrEh9F6Sgf4MbleASPWYSIqxEQqVsVYDDYsr0LZB1d01+6nPBgUQ8iHrkIEkFqLSy G2DdmCbNUHU5FqBSk83VJfk2Jstahe2AU1HUk5uo=
From: Kent Watsen <kent+ietf@watsen.net>
Message-ID: <0100016adccb395c-f363cce5-a39c-439c-bd64-61ab7da7bd44-000000@email.amazonses.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_EF09BE39-EBFD-47EF-BAB4-F82A6C2DFDAD"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
Date: Tue, 21 May 2019 23:47:47 +0000
In-Reply-To: <e6fc4541-891a-60cb-e956-86f238d09f14@labn.net>
Cc: "netmod@ietf.org" <netmod@ietf.org>, "netmod-chairs@ietf.org" <netmod-chairs@ietf.org>
To: Lou Berger <lberger@labn.net>
References: <e6fc4541-891a-60cb-e956-86f238d09f14@labn.net>
X-Mailer: Apple Mail (2.3445.104.11)
X-SES-Outgoing: 2019.05.21-54.240.8.31
Feedback-ID: 1.us-east-1.DKmIRZFhhsBhtmFMNikgwZUWVrODEw9qVcPhqJEI2DA=:AmazonSES
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/Rbv1gwzlUzpA_A7b0LSAjYysfsI>
Subject: Re: [netmod] WG Last Call: draft-ietf-netmod-artwork-folding-02
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 21 May 2019 23:47:50 -0000

--Apple-Mail=_EF09BE39-EBFD-47EF-BAB4-F82A6C2DFDAD
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

Since the response is tepid so far, and the request says "even from =
authors"...

    I've reviewed this document and believe it is ready for publication.

Kent // co-author


> On May 12, 2019, at 5:19 PM, Lou Berger <lberger@labn.net> wrote:
>=20
>=20
> All,
>=20
> This starts a two-week working group last call for
> draft-ietf-netmod-artwork-folding-02
>=20
> The working group last call ends on May 27.
> Please send your comments to the working group mailing list.
>=20
> Positive comments, e.g., "I've reviewed this document
> and believe it is ready for publication", are welcome!
> This is useful and important, even from authors.
>=20
> Thank you,
> NetMod Chairs



--Apple-Mail=_EF09BE39-EBFD-47EF-BAB4-F82A6C2DFDAD
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=us-ascii

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Dus-ascii"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" class=3D""><div =
class=3D"">Since the response is tepid so far, and the request says =
"even from authors"...</div><div class=3D""><br class=3D""></div>&nbsp; =
&nbsp; I've reviewed this document&nbsp;and believe it is ready for =
publication.<div class=3D""><br class=3D""></div><div class=3D"">Kent // =
co-author</div><div class=3D""><div><br class=3D""></div><div><br =
class=3D""><blockquote type=3D"cite" class=3D""><div class=3D"">On May =
12, 2019, at 5:19 PM, Lou Berger &lt;<a href=3D"mailto:lberger@labn.net" =
class=3D"">lberger@labn.net</a>&gt; wrote:</div><br =
class=3D"Apple-interchange-newline"><div class=3D""><div class=3D""><br =
class=3D"">All,<br class=3D""><br class=3D"">This starts a two-week =
working group last call for<br =
class=3D"">draft-ietf-netmod-artwork-folding-02<br class=3D""><br =
class=3D"">The working group last call ends on May 27.<br =
class=3D"">Please send your comments to the working group mailing =
list.<br class=3D""><br class=3D"">Positive comments, e.g., "I've =
reviewed this document<br class=3D"">and believe it is ready for =
publication", are welcome!<br class=3D"">This is useful and important, =
even from authors.</div></div></blockquote><blockquote type=3D"cite" =
class=3D""><div class=3D""><div class=3D""><br class=3D"">Thank you,<br =
class=3D"">NetMod Chairs<br class=3D""></div></div></blockquote><br =
class=3D""></div></div><div><br class=3D""></div></body></html>=

--Apple-Mail=_EF09BE39-EBFD-47EF-BAB4-F82A6C2DFDAD--


From nobody Tue May 21 21:16:00 2019
Return-Path: <internet-drafts@ietf.org>
X-Original-To: netmod@ietf.org
Delivered-To: netmod@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 8B37112008D; Tue, 21 May 2019 21:15:58 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: netmod@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.96.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: netmod@ietf.org
Message-ID: <155849855840.2695.15292504849784403514@ietfa.amsl.com>
Date: Tue, 21 May 2019 21:15:58 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/i5YBU0JpzqmQ0QPSUmBIkUtMSMI>
Subject: [netmod] I-D Action: draft-ietf-netmod-nmda-diff-01.txt
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 22 May 2019 04:15:59 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Network Modeling WG of the IETF.

        Title           : Comparison of NMDA datastores
        Authors         : Alexander Clemm
                          Yingzhen Qu
                          Jeff Tantsura
                          Andy Bierman
	Filename        : draft-ietf-netmod-nmda-diff-01.txt
	Pages           : 15
	Date            : 2019-05-21

Abstract:
   This document defines an RPC operation to compare management
   datastores that comply with the NMDA architecture.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-netmod-nmda-diff/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-netmod-nmda-diff-01
https://datatracker.ietf.org/doc/html/draft-ietf-netmod-nmda-diff-01

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-netmod-nmda-diff-01


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Tue May 21 21:24:11 2019
Return-Path: <ludwig@clemm.org>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F1A5312008D for <netmod@ietfa.amsl.com>; Tue, 21 May 2019 21:24:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level: 
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3txkyr2rsQqs for <netmod@ietfa.amsl.com>; Tue, 21 May 2019 21:24:07 -0700 (PDT)
Received: from mout.perfora.net (mout.perfora.net [74.208.4.196]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 11BBC12004D for <netmod@ietf.org>; Tue, 21 May 2019 21:24:06 -0700 (PDT)
Received: from [172.16.0.44] ([73.189.160.186]) by mrelay.perfora.net (mreueus004 [74.208.5.2]) with ESMTPSA (Nemesis) id 1MFc70-1hQaZG2uUg-00H6mQ for <netmod@ietf.org>; Wed, 22 May 2019 06:24:04 +0200
References: <155849855872.2695.12584993937973905094.idtracker@ietfa.amsl.com>
To: netmod@ietf.org
From: Alexander Clemm <ludwig@clemm.org>
X-Forwarded-Message-Id: <155849855872.2695.12584993937973905094.idtracker@ietfa.amsl.com>
Message-ID: <12a902a5-996e-d4c6-e631-0ca6a267b9c9@clemm.org>
Date: Tue, 21 May 2019 21:24:01 -0700
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.3.0
MIME-Version: 1.0
In-Reply-To: <155849855872.2695.12584993937973905094.idtracker@ietfa.amsl.com>
Content-Type: multipart/alternative; boundary="------------B768052C2A50D67A325B6CF3"
Content-Language: en-US
X-Provags-ID: V03:K1:BoqW/V1yRxOWnySY352irsSSQT9KEK82cyCQc4O4DCOEMofgmz9 nwB5ve19twIUKlka9kVhs9q0PBMLtV+Quq1ZQmxOEjYII9HHcHOnO16lHEdh8fkAU70HlRf 3QPl3vtP9sBYP/bdeLVXJDBu6df6l/NEZsRsaMqASIQrsCTP7V7IgPQQta/kTisI5q5/+KT hT2zadWdNr8VUxxOkwL+Q==
X-UI-Out-Filterresults: notjunk:1;V03:K0:okJAgossCrQ=:bHMl3ZOnWm3tgRYjc7hHrm GGqB4DDs617Dtm2JIcEm/ApsIl7LNKid6yruFr7KjfXLpSsaXXhxadeTvaPoodZWUpB9R7M7d 7WYq9947vqMqIDL41mXG2dsP+2sWRXbWXfum4MiuxFtmd8NNF1VZ4lzWAuhUEwXZKF0JPJIll NSRKYrExuyB46TKcPLpvtC+9W9IMIIEUGeaJUc60sp/KdjNPanHcuo6m8B2PMPmwKJxUSEIpH LcjCU/y+SL3mb4j1zmyhAyCeDRAVMqRZvG8VvYIVQAHRS3xzZzecCHJGv8OMoQLuQy7hctoEn F2T37Z9fqIxXkhpd0TS3ugShqCUboYtgHMwI8OHW5gwoKxpDEipwlZT8wTctR11f0lh8HuPqJ Y8tca/76MK3XHZp1oUNnQSxCapiX6MMrsaCTtmjwhqq293LRPYZDIjCyZE3IdlMuR8GnHUIDG t79zKfNiB5UIubTeyv+tDgC0KcQYnoxm62aJKAV4j/OaP2LE/wWQPCjOFDGPlPAfjNC3EmBT1 SCPIRg5IV8GuN+SkbtTuNOl8Id0vvZYehy8CkBCKOkKhHWjWNxjaAJWey0OuCMclqUQO5wj2C qqygpzlHnN7w6GNp9ilOBwHdyIg4CraUNyInOC88gVXUXFESrkle3UXyqdPuyS7LUGMsjwQfV csu9KwkQ+xZeHn3QOsBmxM8vVmlR/S3RWe5qWhN4A8QieotgkOo/e+EOkDhVUfrVnFWDgS4N3 8f9azBmCNHHWzkqBp1L9Q0cvz1fjKt20XrT+RUqVZ3xwadBMY4tXWcHzHwg=
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/hJ_jILiCwTnhvwKES169bgfQDHk>
Subject: [netmod] Fwd: New Version Notification for draft-ietf-netmod-nmda-diff-01.txt
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 22 May 2019 04:24:10 -0000

This is a multi-part message in MIME format.
--------------B768052C2A50D67A325B6CF3
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit

Hello Netmod WG,

we have just posted a new revision of draft-ietf-netmod-nmda-diff.Â  The 
new revision adds the inclusion of the both the source and target values 
to the result of the comparison; for this purpose, the YANG-Patch 
grouping was augmented accordingly.

--- Alex


-------- Forwarded Message --------
Subject: 	New Version Notification for draft-ietf-netmod-nmda-diff-01.txt
Date: 	Tue, 21 May 2019 21:15:58 -0700
From: 	internet-drafts@ietf.org
To: 	Andy Bierman <andy@yumaworks.com>, Yingzhen Qu <yqu@futurewei.com>, 
Alexander Clemm <ludwig@clemm.org>, Jeff Tantsura <jefftant.ietf@gmail.com>



A new version of I-D, draft-ietf-netmod-nmda-diff-01.txt
has been successfully submitted by Alexander Clemm and posted to the
IETF repository.

Name:		draft-ietf-netmod-nmda-diff
Revision:	01
Title:		Comparison of NMDA datastores
Document date:	2019-05-23
Group:		netmod
Pages:		15
URL:            https://www.ietf.org/internet-drafts/draft-ietf-netmod-nmda-diff-01.txt
Status:         https://datatracker.ietf.org/doc/draft-ietf-netmod-nmda-diff/
Htmlized:       https://tools.ietf.org/html/draft-ietf-netmod-nmda-diff-01
Htmlized:       https://datatracker.ietf.org/doc/html/draft-ietf-netmod-nmda-diff
Diff:           https://www.ietf.org/rfcdiff?url2=draft-ietf-netmod-nmda-diff-01

Abstract:
    This document defines an RPC operation to compare management
    datastores that comply with the NMDA architecture.

                                                                                   


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

The IETF Secretariat


--------------B768052C2A50D67A325B6CF3
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: 8bit

<html>
  <head>

    <meta http-equiv="content-type" content="text/html; charset=utf-8">
  </head>
  <body text="#000000" bgcolor="#FFFFFF">
    <p>Hello Netmod WG,<br>
    </p>
    <p>we have just posted a new revision of
      draft-ietf-netmod-nmda-diff.Â  The new revision adds the inclusion
      of the both the source and target values to the result of the
      comparison; for this purpose, the YANG-Patch grouping was
      augmented accordingly.Â  <br>
    </p>
    <div class="moz-forward-container">--- Alex</div>
    <div class="moz-forward-container"><br>
      <br>
      -------- Forwarded Message --------
      <table class="moz-email-headers-table" cellspacing="0"
        cellpadding="0" border="0">
        <tbody>
          <tr>
            <th nowrap="nowrap" valign="BASELINE" align="RIGHT">Subject:
            </th>
            <td>New Version Notification for
              draft-ietf-netmod-nmda-diff-01.txt</td>
          </tr>
          <tr>
            <th nowrap="nowrap" valign="BASELINE" align="RIGHT">Date: </th>
            <td>Tue, 21 May 2019 21:15:58 -0700</td>
          </tr>
          <tr>
            <th nowrap="nowrap" valign="BASELINE" align="RIGHT">From: </th>
            <td><a class="moz-txt-link-abbreviated" href="mailto:internet-drafts@ietf.org">internet-drafts@ietf.org</a></td>
          </tr>
          <tr>
            <th nowrap="nowrap" valign="BASELINE" align="RIGHT">To: </th>
            <td>Andy Bierman <a class="moz-txt-link-rfc2396E" href="mailto:andy@yumaworks.com">&lt;andy@yumaworks.com&gt;</a>, Yingzhen Qu
              <a class="moz-txt-link-rfc2396E" href="mailto:yqu@futurewei.com">&lt;yqu@futurewei.com&gt;</a>, Alexander Clemm
              <a class="moz-txt-link-rfc2396E" href="mailto:ludwig@clemm.org">&lt;ludwig@clemm.org&gt;</a>, Jeff Tantsura
              <a class="moz-txt-link-rfc2396E" href="mailto:jefftant.ietf@gmail.com">&lt;jefftant.ietf@gmail.com&gt;</a></td>
          </tr>
        </tbody>
      </table>
      <br>
      <br>
      <pre>A new version of I-D, draft-ietf-netmod-nmda-diff-01.txt
has been successfully submitted by Alexander Clemm and posted to the
IETF repository.

Name:		draft-ietf-netmod-nmda-diff
Revision:	01
Title:		Comparison of NMDA datastores
Document date:	2019-05-23
Group:		netmod
Pages:		15
URL:            <a class="moz-txt-link-freetext" href="https://www.ietf.org/internet-drafts/draft-ietf-netmod-nmda-diff-01.txt">https://www.ietf.org/internet-drafts/draft-ietf-netmod-nmda-diff-01.txt</a>
Status:         <a class="moz-txt-link-freetext" href="https://datatracker.ietf.org/doc/draft-ietf-netmod-nmda-diff/">https://datatracker.ietf.org/doc/draft-ietf-netmod-nmda-diff/</a>
Htmlized:       <a class="moz-txt-link-freetext" href="https://tools.ietf.org/html/draft-ietf-netmod-nmda-diff-01">https://tools.ietf.org/html/draft-ietf-netmod-nmda-diff-01</a>
Htmlized:       <a class="moz-txt-link-freetext" href="https://datatracker.ietf.org/doc/html/draft-ietf-netmod-nmda-diff">https://datatracker.ietf.org/doc/html/draft-ietf-netmod-nmda-diff</a>
Diff:           <a class="moz-txt-link-freetext" href="https://www.ietf.org/rfcdiff?url2=draft-ietf-netmod-nmda-diff-01">https://www.ietf.org/rfcdiff?url2=draft-ietf-netmod-nmda-diff-01</a>

Abstract:
   This document defines an RPC operation to compare management
   datastores that comply with the NMDA architecture.

                                                                                  


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

The IETF Secretariat

</pre>
    </div>
  </body>
</html>

--------------B768052C2A50D67A325B6CF3--


From nobody Wed May 22 20:11:38 2019
Return-Path: <0100016ae2ac1603-432b860b-ef14-4555-ab13-bec2b15ce3dd-000000@amazonses.watsen.net>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 67B8A1201A0 for <netmod@ietfa.amsl.com>; Wed, 22 May 2019 20:11:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level: 
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=amazonses.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2yGM5zImd2fi for <netmod@ietfa.amsl.com>; Wed, 22 May 2019 20:11:31 -0700 (PDT)
Received: from a8-32.smtp-out.amazonses.com (a8-32.smtp-out.amazonses.com [54.240.8.32]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7C12A1201EB for <netmod@ietf.org>; Wed, 22 May 2019 20:11:31 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=6gbrjpgwjskckoa6a5zn6fwqkn67xbtw; d=amazonses.com; t=1558581089; h=From:Message-Id:Content-Type:Mime-Version:Subject:Date:In-Reply-To:Cc:To:References:Feedback-ID; bh=1uXXZuPtz3yxS+K7dy+6HcGFqNCg6PQw6p5swIjhRM0=; b=XHrGKeK6kEIRbyJzj1hS31xo8wNIelTLMzNQokLhbzMRr3Mu+xZKjDeIzysbERcC Cub16FBJHMclaOclirql/hU8zx8MVqsWoh1UZwEj/Uu3y4NY03F2CE+3yTcetQzEGNU 8u5QjXZTSTMNIb4iT9LaXw2TSiyf+5rZ2fWYDA2U=
From: Kent Watsen <kent+ietf@watsen.net>
Message-ID: <0100016ae2ac1603-432b860b-ef14-4555-ab13-bec2b15ce3dd-000000@email.amazonses.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_8D25C612-AB21-40E8-8458-10C72E006009"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
Date: Thu, 23 May 2019 03:11:29 +0000
In-Reply-To: <12a902a5-996e-d4c6-e631-0ca6a267b9c9@clemm.org>
Cc: "netmod@ietf.org" <netmod@ietf.org>
To: Alexander Clemm <ludwig@clemm.org>
References: <155849855872.2695.12584993937973905094.idtracker@ietfa.amsl.com> <12a902a5-996e-d4c6-e631-0ca6a267b9c9@clemm.org>
X-Mailer: Apple Mail (2.3445.104.11)
X-SES-Outgoing: 2019.05.23-54.240.8.32
Feedback-ID: 1.us-east-1.DKmIRZFhhsBhtmFMNikgwZUWVrODEw9qVcPhqJEI2DA=:AmazonSES
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/tvh777sa2MiXMgdZIZQmCWNkvBs>
Subject: Re: [netmod] New Version Notification for draft-ietf-netmod-nmda-diff-01.txt
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 23 May 2019 03:11:37 -0000

--Apple-Mail=_8D25C612-AB21-40E8-8458-10C72E006009
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

It's great to see activity on this draft.   However, authors should =
close open items on list before posting updates.   Specifically, there =
are open items from the adoption-poll, the 103 meeting minutes, and the =
emails Andy and Juergen sent on Nov 6.

PS: as a contributor, the update seems incomplete without an example =
illustrating the new 'source-value' element.

Kent   // chair



> On May 22, 2019, at 12:24 AM, Alexander Clemm <ludwig@clemm.org> =
wrote:
>=20
> Hello Netmod WG,
>=20
> we have just posted a new revision of draft-ietf-netmod-nmda-diff.  =
The new revision adds the inclusion of the both the source and target =
values to the result of the comparison; for this purpose, the YANG-Patch =
grouping was augmented accordingly. =20
>=20
> --- Alex
>=20
>=20
> -------- Forwarded Message --------
> Subject:	New Version Notification for =
draft-ietf-netmod-nmda-diff-01.txt
> Date:	Tue, 21 May 2019 21:15:58 -0700
> From:	internet-drafts@ietf.org <mailto:internet-drafts@ietf.org>
> To:	Andy Bierman <andy@yumaworks.com> <mailto:andy@yumaworks.com>, =
Yingzhen Qu <yqu@futurewei.com> <mailto:yqu@futurewei.com>, Alexander =
Clemm<ludwig@clemm.org> <mailto:ludwig@clemm.org>, Jeff Tantsura =
<jefftant.ietf@gmail.com> <mailto:jefftant.ietf@gmail.com>
>=20
> A new version of I-D, draft-ietf-netmod-nmda-diff-01.txt
> has been successfully submitted by Alexander Clemm and posted to the
> IETF repository.
>=20
> Name:		draft-ietf-netmod-nmda-diff
> Revision:	01
> Title:		Comparison of NMDA datastores
> Document date:	2019-05-23
> Group:		netmod
> Pages:		15
> URL:            =
https://www.ietf.org/internet-drafts/draft-ietf-netmod-nmda-diff-01.txt =
<https://www.ietf.org/internet-drafts/draft-ietf-netmod-nmda-diff-01.txt>
> Status:         =
https://datatracker.ietf.org/doc/draft-ietf-netmod-nmda-diff/ =
<https://datatracker.ietf.org/doc/draft-ietf-netmod-nmda-diff/>
> Htmlized:       =
https://tools.ietf.org/html/draft-ietf-netmod-nmda-diff-01 =
<https://tools.ietf.org/html/draft-ietf-netmod-nmda-diff-01>
> Htmlized:       =
https://datatracker.ietf.org/doc/html/draft-ietf-netmod-nmda-diff =
<https://datatracker.ietf.org/doc/html/draft-ietf-netmod-nmda-diff>
> Diff:           =
https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-netmod-nmda-diff-01 =
<https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-netmod-nmda-diff-01>
>=20
> Abstract:
>    This document defines an RPC operation to compare management
>    datastores that comply with the NMDA architecture.
>=20
>                                                                        =
          =20
>=20
>=20
> Please note that it may take a couple of minutes from the time of =
submission
> until the htmlized version and diff are available at tools.ietf.org.
>=20
> The IETF Secretariat
>=20
> _______________________________________________
> netmod mailing list
> netmod@ietf.org
> https://www.ietf.org/mailman/listinfo/netmod


--Apple-Mail=_8D25C612-AB21-40E8-8458-10C72E006009
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=us-ascii

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Dus-ascii"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" class=3D""><div =
class=3D"">It's great to see activity on this draft. &nbsp; However, =
authors should close open items on list before posting updates. &nbsp; =
Specifically, there are open items from the adoption-poll, the 103 =
meeting minutes, and the emails Andy and Juergen sent on Nov =
6.</div><div class=3D""><br class=3D""></div><div class=3D"">PS: as a =
contributor, the update seems incomplete without an example illustrating =
the new 'source-value' element.</div><div class=3D""><br =
class=3D""></div><div class=3D"">Kent &nbsp; // chair</div><div =
class=3D""><br class=3D""></div><div class=3D""><br class=3D""><div><br =
class=3D""><blockquote type=3D"cite" class=3D""><div class=3D"">On May =
22, 2019, at 12:24 AM, Alexander Clemm &lt;<a =
href=3D"mailto:ludwig@clemm.org" class=3D"">ludwig@clemm.org</a>&gt; =
wrote:</div><br class=3D"Apple-interchange-newline"><div class=3D"">
 =20

    <meta http-equiv=3D"content-type" content=3D"text/html; =
charset=3Dutf-8" class=3D"">
 =20
  <div text=3D"#000000" bgcolor=3D"#FFFFFF" class=3D""><p class=3D"">Hello=
 Netmod WG,<br class=3D"">
    </p><p class=3D"">we have just posted a new revision of
      draft-ietf-netmod-nmda-diff.&nbsp; The new revision adds the =
inclusion
      of the both the source and target values to the result of the
      comparison; for this purpose, the YANG-Patch grouping was
      augmented accordingly.&nbsp; <br class=3D"">
    </p>
    <div class=3D"moz-forward-container">--- Alex</div>
    <div class=3D"moz-forward-container"><br class=3D"">
      <br class=3D"">
      -------- Forwarded Message --------
      <table class=3D"moz-email-headers-table" cellspacing=3D"0" =
cellpadding=3D"0" border=3D"0">
        <tbody class=3D"">
          <tr class=3D"">
            <th nowrap=3D"nowrap" valign=3D"BASELINE" align=3D"RIGHT" =
class=3D"">Subject:
            </th>
            <td class=3D"">New Version Notification for
              draft-ietf-netmod-nmda-diff-01.txt</td>
          </tr>
          <tr class=3D"">
            <th nowrap=3D"nowrap" valign=3D"BASELINE" align=3D"RIGHT" =
class=3D"">Date: </th>
            <td class=3D"">Tue, 21 May 2019 21:15:58 -0700</td>
          </tr>
          <tr class=3D"">
            <th nowrap=3D"nowrap" valign=3D"BASELINE" align=3D"RIGHT" =
class=3D"">From: </th>
            <td class=3D""><a class=3D"moz-txt-link-abbreviated" =
href=3D"mailto:internet-drafts@ietf.org">internet-drafts@ietf.org</a></td>=

          </tr>
          <tr class=3D"">
            <th nowrap=3D"nowrap" valign=3D"BASELINE" align=3D"RIGHT" =
class=3D"">To: </th>
            <td class=3D"">Andy Bierman <a class=3D"moz-txt-link-rfc2396E"=
 href=3D"mailto:andy@yumaworks.com">&lt;andy@yumaworks.com&gt;</a>, =
Yingzhen Qu
              <a class=3D"moz-txt-link-rfc2396E" =
href=3D"mailto:yqu@futurewei.com">&lt;yqu@futurewei.com&gt;</a>, =
Alexander Clemm
              <a class=3D"moz-txt-link-rfc2396E" =
href=3D"mailto:ludwig@clemm.org">&lt;ludwig@clemm.org&gt;</a>, Jeff =
Tantsura
              <a class=3D"moz-txt-link-rfc2396E" =
href=3D"mailto:jefftant.ietf@gmail.com">&lt;jefftant.ietf@gmail.com&gt;</a=
></td>
          </tr>
        </tbody>
      </table>
      <br class=3D"">
      <br class=3D"">
      <pre class=3D"">A new version of I-D, =
draft-ietf-netmod-nmda-diff-01.txt
has been successfully submitted by Alexander Clemm and posted to the
IETF repository.

Name:		draft-ietf-netmod-nmda-diff
Revision:	01
Title:		Comparison of NMDA datastores
Document date:	2019-05-23
Group:		netmod
Pages:		15
URL:            <a class=3D"moz-txt-link-freetext" =
href=3D"https://www.ietf.org/internet-drafts/draft-ietf-netmod-nmda-diff-0=
1.txt">https://www.ietf.org/internet-drafts/draft-ietf-netmod-nmda-diff-01=
.txt</a>
Status:         <a class=3D"moz-txt-link-freetext" =
href=3D"https://datatracker.ietf.org/doc/draft-ietf-netmod-nmda-diff/">htt=
ps://datatracker.ietf.org/doc/draft-ietf-netmod-nmda-diff/</a>
Htmlized:       <a class=3D"moz-txt-link-freetext" =
href=3D"https://tools.ietf.org/html/draft-ietf-netmod-nmda-diff-01">https:=
//tools.ietf.org/html/draft-ietf-netmod-nmda-diff-01</a>
Htmlized:       <a class=3D"moz-txt-link-freetext" =
href=3D"https://datatracker.ietf.org/doc/html/draft-ietf-netmod-nmda-diff"=
>https://datatracker.ietf.org/doc/html/draft-ietf-netmod-nmda-diff</a>
Diff:           <a class=3D"moz-txt-link-freetext" =
href=3D"https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-netmod-nmda-diff-01=
">https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-netmod-nmda-diff-01</a>

Abstract:
   This document defines an RPC operation to compare management
   datastores that comply with the NMDA architecture.

                                                                         =
        =20


Please note that it may take a couple of minutes from the time of =
submission
until the htmlized version and diff are available at <a =
href=3D"http://tools.ietf.org" class=3D"">tools.ietf.org</a>.

The IETF Secretariat

</pre>
    </div>
  </div>

_______________________________________________<br class=3D"">netmod =
mailing list<br class=3D""><a href=3D"mailto:netmod@ietf.org" =
class=3D"">netmod@ietf.org</a><br =
class=3D"">https://www.ietf.org/mailman/listinfo/netmod<br =
class=3D""></div></blockquote></div><br class=3D""></div></body></html>=

--Apple-Mail=_8D25C612-AB21-40E8-8458-10C72E006009--


From nobody Fri May 24 04:43:38 2019
Return-Path: <Italo.Busi@huawei.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9717C12011E; Fri, 24 May 2019 04:43:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ogpAjLzEu1cj; Fri, 24 May 2019 04:43:35 -0700 (PDT)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 05A681202BC; Fri, 24 May 2019 04:43:35 -0700 (PDT)
Received: from lhreml705-cah.china.huawei.com (unknown [172.18.7.108]) by Forcepoint Email with ESMTP id E523B1D067F5BC0CAB9B; Fri, 24 May 2019 12:43:32 +0100 (IST)
Received: from LHREML504-MBS.china.huawei.com ([10.201.109.59]) by lhreml705-cah.china.huawei.com ([10.201.108.46]) with mapi id 14.03.0415.000;  Fri, 24 May 2019 12:43:30 +0100
From: Italo Busi <Italo.Busi@huawei.com>
To: Lou Berger <lberger@labn.net>, NetMod WG <netmod@ietf.org>
CC: NetMod WG Chairs <netmod-chairs@ietf.org>
Thread-Topic: [netmod] WG Last Call: draft-ietf-netmod-artwork-folding-02
Thread-Index: AQHVCSaY+iCIbhU/PESy/n6QJGx4eqZ6EnSg
Date: Fri, 24 May 2019 11:43:30 +0000
Message-ID: <91E3A1BD737FDF4FA14118387FF6766B2774C768@lhreml504-mbs>
References: <e6fc4541-891a-60cb-e956-86f238d09f14@labn.net>
In-Reply-To: <e6fc4541-891a-60cb-e956-86f238d09f14@labn.net>
Accept-Language: it-IT, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.203.246.126]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/QNG_hyAD4QIG3nXWUTdO3ycHYW8>
Subject: Re: [netmod] WG Last Call: draft-ietf-netmod-artwork-folding-02
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 24 May 2019 11:43:37 -0000
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From nobody Sat May 25 18:52:34 2019
Return-Path: <xiechf.bri@chinatelecom.cn>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7D65212006A for <netmod@ietfa.amsl.com>; Sat, 25 May 2019 18:52:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.552
X-Spam-Level: 
X-Spam-Status: No, score=-0.552 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_BL_SPAMCOP_NET=1.347, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OrLw3yeFTclG for <netmod@ietfa.amsl.com>; Sat, 25 May 2019 18:52:29 -0700 (PDT)
Received: from chinatelecom.cn (prt-mail.chinatelecom.cn [42.123.76.223]) by ietfa.amsl.com (Postfix) with ESMTP id D2451120020 for <netmod@ietf.org>; Sat, 25 May 2019 18:52:27 -0700 (PDT)
HMM_SOURCE_IP: 172.18.0.92:12370.776271768
HMM_ATTACHE_NUM: 0000
HMM_SOURCE_TYPE: SMTP
Received: from clientip-106.121.64.242 (unknown [172.18.0.92]) by chinatelecom.cn (HERMES) with SMTP id 62BCE280097 for <netmod@ietf.org>; Sun, 26 May 2019 09:52:12 +0800 (CST)
X-189-SAVE-TO-SEND: xiechf.bri@chinatelecom.cn
Received: from EHLO ip<106.121.64.242> ([172.18.0.92]) by App0021 with ESMTP id cc0d46fa-e93c-43f1-8006-edeb82542adf for netmod@ietf.org; Sun May 26 09:52:13 2019
X-filter-score: filter<0>
X-Real-From: xiechf.bri@chinatelecom.cn
X-Receive-IP: 172.18.0.92
X-MEDUSA-Status: 0
Date: Sun, 26 May 2019 09:52:09 +0800
From: "Chongfeng Xie" <xiechf.bri@chinatelecom.cn>
To: netmod <netmod@ietf.org>
References: <e6fc4541-891a-60cb-e956-86f238d09f14@labn.net>,  <B8F9A780D330094D99AF023C5877DABAA4914AEF@nkgeml513-mbx.china.huawei.com>
X-Priority: 3
X-Has-Attach: no
X-Mailer: Foxmail 7, 2, 8, 379[cn]
Mime-Version: 1.0
Message-ID: <201905260952066807194@chinatelecom.cn>
Content-Type: multipart/alternative; boundary="----=_001_NextPart563172556521_=----"
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/QLTJasTHY3b3_YtxDb4xJ7bGsIA>
Subject: Re: [netmod] WG Last Call: draft-ietf-netmod-artwork-folding-02
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 26 May 2019 01:52:33 -0000

This is a multi-part message in MIME format.

------=_001_NextPart563172556521_=----
Content-Type: text/plain;
	charset="GB2312"
Content-Transfer-Encoding: base64
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------=_001_NextPart563172556521_=----
Content-Type: text/html;
	charset="GB2312"
Content-Transfer-Encoding: quoted-printable

<html><head><meta http-equiv=3D"content-type" content=3D"text/html; charse=
t=3DGB2312"><style>body { line-height: 1.5; }blockquote { margin-top: 0px;=
 margin-bottom: 0px; margin-left: 0.5em; }body { font-size: 10.5pt; font-f=
amily: 'Microsoft YaHei UI'; color: rgb(0, 0, 0); line-height: 1.5; }</sty=
le></head><body>=0A<div><span></span><br></div>=0A<div><br></div><div><spa=
n style=3D"font-family: 'Microsoft YaHei UI', Tahoma; line-height: normal;=
">&nbsp;I've reviewed this document&nbsp;and believe it is ready for&nbsp;=
</span>&nbsp;publication<span style=3D"font-family: 'Microsoft YaHei UI', =
Tahoma; line-height: normal;">.</span></div><div><span style=3D"font-famil=
y: 'Microsoft YaHei UI', Tahoma; line-height: normal;"><br></span></div><d=
iv><font face=3D"Microsoft YaHei UI, Tahoma"><span style=3D"line-height: n=
ormal;">Chongfeng</span></font></div><div><font face=3D"Microsoft YaHei UI=
, Tahoma"><span style=3D"line-height: normal;"><br></span></font></div><hr=
 style=3D"width: 210px; height: 1px; display: none;" color=3D"#b5c4df" siz=
e=3D"1" align=3D"left">=0A<div><span></span></div>=0A<blockquote style=3D"=
margin-top: 0px; margin-bottom: 0px; margin-left: 0.5em;"><div><br></div><=
div>=0A<div>=B7=A2=BC=FE=C8=CB: netmod [mailto:netmod-bounces@ietf.org] =
=B4=FA=B1=ED Lou Berger</div>=0A<div>=B7=A2=CB=CD=CA=B1=BC=E4: 2019=C4=EA5=
=D4=C213=C8=D5 5:20</div>=0A<div>=CA=D5=BC=FE=C8=CB: NetMod WG &lt;netmod@=
ietf.org&gt;</div>=0A<div>=B3=AD=CB=CD: NetMod WG Chairs &lt;netmod-chairs=
@ietf.org&gt;</div>=0A<div>=D6=F7=CC=E2: [netmod] WG Last Call: draft-ietf=
-netmod-artwork-folding-02</div>=0A<div>&nbsp;</div>=0A<div>&nbsp;</div>=
=0A<div>All,</div>=0A<div>&nbsp;</div>=0A<div>This starts a two-week worki=
ng group last call for</div>=0A<div>draft-ietf-netmod-artwork-folding-02</=
div>=0A<div>&nbsp;</div>=0A<div>The working group last call ends on May 27=
.</div>=0A<div>Please send your comments to the working group mailing list=
.</div>=0A<div>&nbsp;</div>=0A<div>Positive comments, e.g., "I've reviewed=
 this document and believe it is ready for publication", are welcome!</div=
>=0A<div>This is useful and important, even from authors.</div>=0A<div>&nb=
sp;</div>=0A<div>Thank you,</div>=0A<div>NetMod Chairs</div>=0A<div>&nbsp;=
</div>=0A<div>&nbsp;</div>=0A<div>&nbsp;</div>=0A<div>____________________=
___________________________</div>=0A<div>netmod mailing list</div>=0A<div>=
netmod@ietf.org</div>=0A<div>https://www.ietf.org/mailman/listinfo/netmod<=
/div>=0A</div></blockquote>=0A</body></html>
------=_001_NextPart563172556521_=------


From nobody Mon May 27 04:04:15 2019
Return-Path: <mbj@tail-f.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2CE571200B6; Mon, 27 May 2019 04:04:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vAmOLD2G9COb; Mon, 27 May 2019 04:04:11 -0700 (PDT)
Received: from mail.tail-f.com (mail.tail-f.com [46.21.102.45]) by ietfa.amsl.com (Postfix) with ESMTP id 869CA120046; Mon, 27 May 2019 04:04:11 -0700 (PDT)
Received: from localhost (unknown [173.38.220.61]) by mail.tail-f.com (Postfix) with ESMTPSA id 4B67B1AE08D8; Mon, 27 May 2019 13:04:08 +0200 (CEST)
Date: Mon, 27 May 2019 13:04:12 +0200 (CEST)
Message-Id: <20190527.130412.1876961670794351457.mbj@tail-f.com>
To: lberger@labn.net
Cc: netmod@ietf.org, netmod-chairs@ietf.org
From: Martin Bjorklund <mbj@tail-f.com>
In-Reply-To: <e6fc4541-891a-60cb-e956-86f238d09f14@labn.net>
References: <e6fc4541-891a-60cb-e956-86f238d09f14@labn.net>
X-Mailer: Mew version 6.7 on Emacs 25.2 / Mule 6.0 (HANACHIRUSATO)
Mime-Version: 1.0
Content-Type: Text/Plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/dbDQV7RW65s1j0Y_zJesnfJkQR8>
Subject: Re: [netmod] WG Last Call: draft-ietf-netmod-artwork-folding-02
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 27 May 2019 11:04:13 -0000

Hi,

I have reviewed draft-ietf-netmod-artwork-folding-02, and here are my
comments:


o  6

  Perhaps:

  OLD:

   begins at the first non-
   whitespace character on the following line.

  NEW:

   begins at the first character that is not a space character (' ')
   on the following line.


  The algorithm talks specifically about space (' ') rather than
  whitespace.


o  6.1

  s/is exists/exists/


o  6.1 / 6.2

  6.2 says (correctly!):

   It is RECOMMENDED for implementations to first attempt to fold
   content using the single backslash strategy and, only in the unlikely
   event that it cannot fold the input or the folding logic is unable to
   cope with a contingency occurring on the desired folding column, then
   fallback to the double backslash strategy.

  But 6.1 says about the Single Backslash Strategy:

   automation implementations are likely to encounter scenarios that
   will produce errors without special care


  So it 6.1 thinks it is likely that SBS won't work, but 6.2 says it
  is unlikely.  IMO 6.2 is correct - it is extremely unlikely that SBS
  won't work.


o  7.1.2 / 7.2

  I would prefer if the format is defined with descriptive text,
  rather than with an algorithm.  It is the end result that matters,
  not which algorithm an implementation uses to get to the result.

  I suggest the algorithm is moved to an appendix, and/or a sentence
  is added that explains that the algorithm is just an example.

  Also expand the descriptive text in 7.1.2; I think that the text in
  section 6 is probably enough.  However, there are some important
  details buried in the desciption of the algorithm; specifically the
  cases where SBS can't be used.


o  7.2.1

  I don't understand why there is a min limit of 46 characters for
  folding to work.  If the only reason is for the non-normative script
  to be able to center the header line, then I think this limitation
  should be removed.  (I would even prefer less flexibility in the
  header line syntax...)


o  7.2.1 / 7.2.2

  I don't think the text should assume that folding/unfolding is
  "automated".


o  7.2.1

  Perhaps add to bullet 1:

    If no such location can be found, then exit (this text content
    cannot be folded)


o  7.2.2

  s/maximum../maximum./


o  Appendix A

  Consider using the command "tempfile" instead of /tmp/wip*




/martin


From nobody Mon May 27 06:17:05 2019
Return-Path: <Italo.Busi@huawei.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8BB6F12015E; Mon, 27 May 2019 06:17:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oh8x2A2gn7cw; Mon, 27 May 2019 06:17:00 -0700 (PDT)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 03C2612013D; Mon, 27 May 2019 06:17:00 -0700 (PDT)
Received: from lhreml701-cah.china.huawei.com (unknown [172.18.7.108]) by Forcepoint Email with ESMTP id F11DE9D072F4F1327141; Mon, 27 May 2019 14:16:57 +0100 (IST)
Received: from LHREML504-MBS.china.huawei.com ([10.201.109.59]) by lhreml701-cah.china.huawei.com ([10.201.108.42]) with mapi id 14.03.0415.000;  Mon, 27 May 2019 14:16:54 +0100
From: Italo Busi <Italo.Busi@huawei.com>
To: "netmod@ietf.org" <netmod@ietf.org>
CC: "teas@ietf.org" <teas@ietf.org>
Thread-Topic: Key collision between configured and ephemeral list entries
Thread-Index: AdUUid+3lEIjrS8aR5K2w9jffR4mQA==
Date: Mon, 27 May 2019 13:16:54 +0000
Message-ID: <91E3A1BD737FDF4FA14118387FF6766B2774D314@lhreml504-mbs>
Accept-Language: it-IT, en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
x-originating-ip: [10.203.246.126]
Content-Type: multipart/related; boundary="_004_91E3A1BD737FDF4FA14118387FF6766B2774D314lhreml504mbs_"; type="multipart/alternative"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/mM68gNGQTdAl2xO9cgCkYgYlb38>
Subject: [netmod] Key collision between configured and ephemeral list entries
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 27 May 2019 13:17:02 -0000

--_004_91E3A1BD737FDF4FA14118387FF6766B2774D314lhreml504mbs_
Content-Type: multipart/alternative;
 boundary="_000_91E3A1BD737FDF4FA14118387FF6766B2774D314lhreml504mbs_"

--_000_91E3A1BD737FDF4FA14118387FF6766B2774D314lhreml504mbs_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

On Friday within the TEAS WG, we have discussed an issue which seems generi=
c and therefore agreed to ask for guidelines to the Netmod WG

In the TE YANG model we have defined a tunnel list with a name attribute us=
ed as a key:

     |  +--rw tunnel* [name]
     |  |  +--ro operational-state?                  identityref
     |  |  +--rw name                                string

See: https://tools.ietf.org/html/draft-ietf-teas-yang-te-21

The issue we are facing is how to avoid name collision between configured a=
nd ephemeral tunnels. In other words, the issue we are trying to address is=
 how to avoid the client to assign to a configured tunnel a name which have=
 been already assigned by the server to another ephemeral tunnel and vice-v=
ersa, in particular considering NMDA rules

We believe that the issue is generic and apply to any configured and epheme=
ral list entries

Has this issue been already discussed/resolved in Netmod WG?

If not, what is the Netmod WG opinion/suggestion? We are currently consider=
ing the following option:

   Use a special character for ephemeral names - e.g. such names always are=
 prepended by special character "#"
   Make the special character changeable by configuration - the default can=
 be "#" and user can change if they desire..

Thanks, Italo

Italo Busi
Principal Optical Transport Network Research Engineer
Huawei Technologies Co., Ltd.
Tel : +39 345 4721946
Email : italo.busi@huawei.com
[cid:image002.png@01D5149F.354EF420]

This e-mail and its attachments contain confidential information from HUAWE=
I, which is intended only for the person or entity whose address is listed =
above. Any use of the information contained herein in any way (including, b=
ut not limited to, total or partial disclosure, reproduction, or disseminat=
ion) by persons other than the intended recipient(s) is prohibited. If you =
receive this e-mail in error, please notify the sender by phone or email im=
mediately and delete it!

From: Tarek Saad [mailto:tsaad.net@gmail.com]
Sent: venerd=EC 24 maggio 2019 23:13
To: Igor Bryskin <Igor.Bryskin@huawei.com>; Rakesh Gandhi <rgandhi@cisco.co=
m>; Xufeng <xufeng.liu.ietf@gmail.com>; Vishnu Pavan Beeram <vbeeram@junipe=
r.net>; Italo Busi <Italo.Busi@huawei.com>
Cc: teas@ietf.org
Subject: Discussion on modelling container TE tunnels in YANG

The team on "to" list met to discuss this subject topic. Notes from today's=
 discussion (please add if I missed):

Name collision between configured and ephemeral tunnels:
  This is a generic problem in NMDA.
  How to handle collisions between configured and ephemeral (or auto-create=
d) objects of a list, if the list uses the object (string based) name as th=
e key?
  Both configured and ephemeral can have the same object name but they are =
different objects - how to avoid such collision.
 Proposed solution:
   Option 1:
   Use a special character for ephemeral names - e.g. such names always are=
 prepended by special character "#"
   Make the special character changeable by configuration - the default can=
 be "#" and user can change if they desire..
  Others?
AI (Italo): to send email to netmod group.

Container TE tunnels discussion:
-          Container tunnels are grouping of tunnels between same 2 endpoin=
ts to share incoming traffic towards the egress
-          Member tunnels of a container tunnel can be auto-created/deleted=
 on-demand and controlled by thresholds specified under the container
-          Some attributes may apply on the container tunnel and inherited =
down to member tunnels of the container
-          Q: Should model allow member tunnel to override inherited attrib=
utes from container tunnel?
-          Q: Should all auto-created member tunnels of a container have th=
e same prefix/suffix - i..e prefix/suffix can be configurable

Regards,
Tarek




--_000_91E3A1BD737FDF4FA14118387FF6766B2774D314lhreml504mbs_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<!--[if !mso]><style>v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]--><style><!--
/* Font Definitions */
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:SimSun;
	panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
	{font-family:PMingLiU;
	panose-1:2 1 6 1 0 1 1 1 1 1;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:"\@SimSun";
	panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
	{font-family:"Microsoft YaHei";
	panose-1:2 11 5 3 2 2 4 2 2 4;}
@font-face
	{font-family:"PingFang TC";}
@font-face
	{font-family:"\@PMingLiU";}
@font-face
	{font-family:"\@Microsoft YaHei";
	panose-1:2 11 5 3 2 2 4 2 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:#0563C1;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:#954F72;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML Preformatted Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0cm;
	margin-right:0cm;
	margin-bottom:0cm;
	margin-left:36.0pt;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Calibri",sans-serif;}
p.msonormal0, li.msonormal0, div.msonormal0
	{mso-style-name:msonormal;
	mso-margin-top-alt:auto;
	margin-right:0cm;
	mso-margin-bottom-alt:auto;
	margin-left:0cm;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
p.msochpdefault, li.msochpdefault, div.msochpdefault
	{mso-style-name:msochpdefault;
	mso-margin-top-alt:auto;
	margin-right:0cm;
	mso-margin-bottom-alt:auto;
	margin-left:0cm;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
span.emailstyle17
	{mso-style-name:emailstyle17;
	font-family:"Calibri",sans-serif;
	color:windowtext;
	font-weight:normal;
	font-style:normal;}
span.EmailStyle21
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
span.EmailStyle22
	{mso-style-type:personal-reply;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:"Courier New";}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:431442471;
	mso-list-type:hybrid;
	mso-list-template-ids:1005638472 1638298128 67698691 67698693 67698689 676=
98691 67698693 67698689 67698691 67698693;}
@list l0:level1
	{mso-level-start-at:2;
	mso-level-number-format:bullet;
	mso-level-text:-;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:"Calibri",sans-serif;
	mso-fareast-font-family:Calibri;}
@list l0:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:"Courier New";}
@list l0:level3
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:Wingdings;}
@list l0:level4
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:Symbol;}
@list l0:level5
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:"Courier New";}
@list l0:level6
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:Wingdings;}
@list l0:level7
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:Symbol;}
@list l0:level8
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:"Courier New";}
@list l0:level9
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:Wingdings;}
@list l1
	{mso-list-id:2120682495;
	mso-list-template-ids:-935821424;}
@list l1:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:36.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l1:level2
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:72.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l1:level3
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:108.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l1:level4
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:144.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l1:level5
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:180.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l1:level6
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:216.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l1:level7
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:252.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l1:level8
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:288.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l1:level9
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:324.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
ol
	{margin-bottom:0cm;}
ul
	{margin-bottom:0cm;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"#0563C1" vlink=3D"#954F72">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><a name=3D"_MailEndCompose"><span style=3D"font-size=
:11.0pt;color:#1F497D">On Friday within the TEAS WG, we have discussed an i=
ssue which seems generic and therefore agreed to ask for guidelines to the =
Netmod WG<o:p></o:p></span></a></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;color:#1F497D"><o:p>=
&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;color:#1F497D">In th=
e TE YANG model we have defined a tunnel list with a name attribute used as=
 a key:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;color:#1F497D"><o:p>=
&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;">&nbsp;&nbsp;&nbsp;&nbsp; |&nbsp; &#43;--rw tunnel* [name]<=
o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;">&nbsp;&nbsp;&nbsp;&nbsp; |&nbsp; |&nbsp; &#43;--ro operati=
onal-state?&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; identityref<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;">&nbsp;&nbsp;&nbsp;&nbsp; |&nbsp; |&nbsp; &#43;--rw name&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; string<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;color:#1F497D"><o:p>=
&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;color:#1F497D">See: =
</span><a href=3D"https://tools.ietf.org/html/draft-ietf-teas-yang-te-21"><=
span style=3D"font-size:11.0pt">https://tools.ietf.org/html/draft-ietf-teas=
-yang-te-21</span></a><span style=3D"font-size:11.0pt;color:#1F497D"><o:p><=
/o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;color:#1F497D"><o:p>=
&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;color:#1F497D">The i=
ssue we are facing is how to avoid name collision between configured and ep=
hemeral tunnels. In other words, the issue we are trying to address is how =
to avoid the client to assign to a configured
 tunnel a name which have been already assigned by the server to another ep=
hemeral tunnel and vice-versa, in particular considering NMDA rules<o:p></o=
:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;color:#1F497D"><o:p>=
&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;color:#1F497D">We be=
lieve that the issue is generic and apply to any configured and ephemeral l=
ist entries<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;color:#1F497D"><o:p>=
&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;color:#1F497D">Has t=
his issue been already discussed/resolved in Netmod WG?<o:p></o:p></span></=
p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;color:#1F497D"><o:p>=
&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;color:#1F497D">If no=
t, what is the Netmod WG opinion/suggestion? We are currently considering t=
he following option:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;color:#1F497D"><o:p>=
&nbsp;</o:p></span></p>
<p class=3D"MsoNormal">&nbsp;&nbsp; Use a special character for ephemeral n=
ames &#8211; e.g. such names always are prepended by special character &#82=
20;#&#8221;<o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp; Make the special character changeable b=
y configuration &#8211; the default can be &#8220;#&#8221; and user can cha=
nge if they desire..
<o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;color:#1F497D"><o:p>=
&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;color:#1F497D">Thank=
s, Italo<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;color:#1F497D"><o:p>=
&nbsp;</o:p></span></p>
<div>
<p class=3D"MsoNormal" style=3D"line-height:150%"><b><span style=3D"font-fa=
mily:&quot;Microsoft YaHei&quot;,sans-serif;color:#1F497D;mso-fareast-langu=
age:EN-US">Italo Busi</span></b><b><span style=3D"color:#1F497D;mso-fareast=
-language:EN-US">
<o:p></o:p></span></b></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Mi=
crosoft YaHei&quot;,sans-serif;color:#1F497D;mso-fareast-language:EN-US">Pr=
incipal&nbsp;Optical&nbsp;Transport&nbsp;Network&nbsp;Research&nbsp;Enginee=
r</span><span style=3D"color:#1F497D;mso-fareast-language:EN-US"><o:p></o:p=
></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Mi=
crosoft YaHei&quot;,sans-serif;color:#1F497D;mso-fareast-language:EN-US">Hu=
awei&nbsp;Technologies&nbsp;Co.,&nbsp;Ltd.</span><span style=3D"color:#1F49=
7D;mso-fareast-language:EN-US"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Mi=
crosoft YaHei&quot;,sans-serif;color:#1F497D;mso-fareast-language:EN-US">Te=
l&nbsp;:&nbsp;&#43;39&nbsp;345&nbsp;4721946</span><span style=3D"color:#1F4=
97D;mso-fareast-language:EN-US"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Mi=
crosoft YaHei&quot;,sans-serif;color:#1F497D;mso-fareast-language:EN-US">Em=
ail&nbsp;:&nbsp;italo.busi@huawei.com
</span><span style=3D"font-size:10.0pt;font-family:&quot;Microsoft YaHei&qu=
ot;,sans-serif;color:#1F497D;mso-fareast-language:ZH-TW"><o:p></o:p></span>=
</p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><img border=3D"0" widt=
h=3D"208" height=3D"163" id=3D"M_x003c_F_x002c__x0020_7" src=3D"cid:image00=
2.png@01D5149F.354EF420"></span><span style=3D"font-size:7.5pt;font-family:=
&quot;Arial&quot;,sans-serif;color:#BFBFBF;mso-fareast-language:ZH-TW"><o:p=
></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:7.5pt;font-family:&quot;Ari=
al&quot;,sans-serif;color:#BFBFBF;mso-fareast-language:ZH-TW"><o:p>&nbsp;</=
o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:7.5pt;font-family:&quot;Ari=
al&quot;,sans-serif;color:#BFBFBF;mso-fareast-language:ZH-TW">This e-mail a=
nd its attachments contain confidential information from HUAWEI, which is i=
ntended only for the person or entity whose address
 is listed above. Any use of the information contained herein in any way (i=
ncluding, but not limited to, total or partial disclosure, reproduction, or=
 dissemination) by persons other than the intended recipient(s) is prohibit=
ed. If you receive this e-mail in
 error, please notify the sender by phone or email immediately and delete i=
t!</span><span style=3D"color:#1F497D"><o:p></o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;color:#1F497D"><o:p>=
&nbsp;</o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span style=3D"font-size:11.0pt">From:</span></b>=
<span style=3D"font-size:11.0pt"> Tarek Saad [mailto:tsaad.net@gmail.com]
<br>
<b>Sent:</b> venerd=EC 24 maggio 2019 23:13<br>
<b>To:</b> Igor Bryskin &lt;Igor.Bryskin@huawei.com&gt;; Rakesh Gandhi &lt;=
rgandhi@cisco.com&gt;; Xufeng &lt;xufeng.liu.ietf@gmail.com&gt;; Vishnu Pav=
an Beeram &lt;vbeeram@juniper.net&gt;; Italo Busi &lt;Italo.Busi@huawei.com=
&gt;<br>
<b>Cc:</b> teas@ietf.org<br>
<b>Subject:</b> Discussion on modelling container TE tunnels in YANG<o:p></=
o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">The team on &#8220;to&#8221; list met to discuss thi=
s subject topic. Notes from today&#8217;s discussion (please add if I misse=
d):<o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
<p class=3D"MsoNormal"><u>Name collision between configured and ephemeral t=
unnels:</u><o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp; This is a generic problem in NMDA.<o:p></o:p>=
</p>
<p class=3D"MsoNormal">&nbsp; How to handle collisions between configured a=
nd ephemeral (or auto-created) objects of a list, if the list uses the obje=
ct (string based) name as the key?<o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp; Both configured and ephemeral can have the sa=
me object name but they are different objects &#8211; how to avoid such col=
lision.<o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp;<b><u>Proposed solution:<o:p></o:p></u></b></p=
>
<p class=3D"MsoNormal">&nbsp;&nbsp; Option 1:<o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp; Use a special character for ephemeral n=
ames &#8211; e.g. such names always are prepended by special character &#82=
20;#&#8221;<o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp; Make the special character changeable b=
y configuration &#8211; the default can be &#8220;#&#8221; and user can cha=
nge if they desire..
<o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;Others?<o:p></o:p></p>
<p class=3D"MsoNormal">AI (Italo): to send email to netmod group.<o:p></o:p=
></p>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
<p class=3D"MsoNormal"><u>Container TE tunnels discussion:</u><o:p></o:p></=
p>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt;text-indent:-18.0pt;mso-=
list:l0 level1 lfo3">
<![if !supportLists]><span style=3D"mso-list:Ignore">-<span style=3D"font:7=
.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;
</span></span><![endif]>Container tunnels are grouping of tunnels between s=
ame 2 endpoints to share incoming traffic towards the egress<o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt;text-indent:-18.0pt;mso-=
list:l0 level1 lfo3">
<![if !supportLists]><span style=3D"mso-list:Ignore">-<span style=3D"font:7=
.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;
</span></span><![endif]>Member tunnels of a container tunnel can be auto-cr=
eated/deleted on-demand and controlled by thresholds specified under the co=
ntainer<o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt;text-indent:-18.0pt;mso-=
list:l0 level1 lfo3">
<![if !supportLists]><span style=3D"mso-list:Ignore">-<span style=3D"font:7=
.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;
</span></span><![endif]>Some attributes may apply on the container tunnel a=
nd inherited down to member tunnels of the container<o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt;text-indent:-18.0pt;mso-=
list:l0 level1 lfo3">
<![if !supportLists]><span style=3D"mso-list:Ignore">-<span style=3D"font:7=
.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;
</span></span><![endif]>Q: Should model allow member tunnel to override inh=
erited attributes from container tunnel?<o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt;text-indent:-18.0pt;mso-=
list:l0 level1 lfo3">
<![if !supportLists]><span style=3D"mso-list:Ignore">-<span style=3D"font:7=
.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;
</span></span><![endif]>Q: Should all auto-created member tunnels of a cont=
ainer have the same prefix/suffix &#8211; i..e prefix/suffix can be configu=
rable<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Regards,<o:p></o:p></p>
<p class=3D"MsoNormal">Tarek<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt"><o:p>&nbsp;</o:p></=
span></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</div>
</body>
</html>

--_000_91E3A1BD737FDF4FA14118387FF6766B2774D314lhreml504mbs_--

--_004_91E3A1BD737FDF4FA14118387FF6766B2774D314lhreml504mbs_
Content-Type: image/png; name="image002.png"
Content-Description: image002.png
Content-Disposition: inline; filename="image002.png"; size=38827;
 creation-date="Mon, 27 May 2019 13:16:53 GMT";
 modification-date="Mon, 27 May 2019 13:16:53 GMT"
Content-ID: <image002.png@01D5149F.354EF420>
Content-Transfer-Encoding: base64

iVBORw0KGgoAAAANSUhEUgAAAaAAAAFGCAYAAAAsK0vGAAAAAXNSR0IArs4c6QAAAAlwSFlzAAAd
hwAAHYcBj+XxZQAAABl0RVh0U29mdHdhcmUATWljcm9zb2Z0IE9mZmljZX/tNXEAAJcrSURBVHhe
7Z0HgCRF9cZ7Zmf3MndHkKAg2UAQsyj+wQQoiGBCydFIOEFymJsDRDyBIyggGQFBEREUMcERBEWR
IwiKCEeOx+3F3dsw8/9+3VVzvb09aW/udvf2FdRtT3d1ha+q31fv1evqXKFQCCwYAoaAIWAIGAIr
GoHcii7QyjMEDAFDwBAwBEDACMjGgSFgCBgChsCgIGAENCiwW6GGgCFgCBgCRkA2BgwBQ8AQMAQG
BQEjoEGB3Qo1BAwBQ8AQMAKyMWAIGAKGgCEwKAgYAQ0K7FaoIWAIGAKGgBGQjQFDwBAwBAyBQUHA
CGhQYLdCDQFDwBAwBIyAbAwYAoaAIWAIDAoCRkCDArsVaggYAoaAIWAEZGPAEDAEDAFDYFAQMAIa
FNitUEPAEDAEDAEjIBsDhoAhYAgYAoOCgBHQoMBuhRoChoAhYAgYAdkYMAQMAUPAEBgUBIyABgV2
K9QQMAQMAUPACMjGgCFgCBgChsCgIGAENCiwW6GGgCFgCBgCRkA2BgwBQ8AQMAQGBQEjoEGB3Qo1
BAwBQ8AQMAKyMWAIGAKGgCEwKAgYAQ0K7FaoIWAIGAKGgBGQjQFDwBAwBAyBQUHACGhQYLdCDQFD
wBAwBIyAbAwYAoaAIWAIDAoCRkCDArsVaggYAoaAIWAEZGPAEDAEDAFDYFAQMAIaFNitUEPAEDAE
DAEjIBsDhoAhYAgYAoOCgBHQoMBuhRoChoAhYAgYAdkYMAQMAUPAEBgUBIyABgV2K9QQMAQMAUPA
CMjGgCFgCBgChsCgIGAENCiwW6GGgCFgCBgCRkA2BgwBQ8AQMAQGBQEjoEGB3Qo1BAwBQ8AQWCkJ
6ODbr3lP0BJsv+aEsau+0t3z2MUf/NIVA+3qI8a9sOv4ieM+PGfeooXZ1tyfJt/z2t+mbb5570Dz
s/sMAUPAEDAEIgRWCgLa/5LzN2oZM/qbo8e3rdc9ujQuaMttOKq15e3ZXDYY39LWefCsmxddvNUu
v2i00w8d9cKHejKZHwejR609qRgEi3qK+87/2Jv/e2zbwvldvaWXuoPST857eZV/NZqvpTcEDAFD
wBAYxgR0cj6ffW38Glv1jMmdnRszau1sS2aTCblM0NvaEnS1ZoOuTCZ4ZUl38KbxY0Yv7u7d7eST
8zdMm1YoNdTpbcH2kyaOX3v+/I4g29ISjB0zZsOcyC3QcWZJT5At9u58xJs7Xs1lWo6eufBN993f
3t7TUP6W2BAwBAyBEYzAsNSA9srPmPRq2xoXt2VbthvTklm92JoJOrOZ4I2i1BQoppQNMiIgYntP
b5Ab1bLLa/tsvXOwcXBLvX19xLg57yvm2vbrUpaZllxQEul06DjoUgHZYtCSbZFiNGpDFbthsVi8
6aPZVx7ZNFj4lavbV3u53jIsnSFgCBgCIxmBYUdA38yfvkUpGH/BuCDzkSWS/guzrvt0nOEY4tEx
fwP9RSVZY0zruFc6i1vosG4CKo4qvnOVCeM3WNDZHaDxBCKhTFYFiHjIu6i4uDdSqEa1tKw6btzY
bdfJZv84ZfTiKat87YzbG9a2RvIotLYbAobAiERgWBHQgfkzP5kJxl0wJhNsvCBbCkqZUqjlBBAP
sSUinZB89H8YdX5hTzEYNSq728Ev3H7DxW/++BO1evrktV6YOHfJqJ2KEAyEo5iBhDjG/Bbmr4xD
/ikFS0rFoKurNxg7avTmOvWzuZccc8TJJ598zbRp0xoz+dWqmF03BAwBQ2AlQmDYENDB+RlvbQta
Z7QFmY0XhOTiNJ5Q63EE5ImHDnIaEH87RSSrjm1935IlvW/TlZoENLdz9Nva2rJf6OiVzQ3NRzH6
G2lCAZpQqG4pyOyXEQEFSruop1skNGqNbCbz/YUXHv98EIyeuRKNFWuKIWAIGAJNRWBYEJDWfCao
1T8eHWQ2mx+qHV7r8aY2rfmE5rGQecpakCiq/Dtcugmyb/vAfff97v6tt67qLKD1ndVGt7W1dBSl
YZEvWk+o/Tgy8qY4R0BBSV7ZGRaISsHi7u5gfFvrm4vF3rMPnbR4h/Pax77a1B6zzAwBQ8AQWEkQ
GPIE9IF8PtcWrHryKkH2Mwsim9dS81raMSY4iMdpSaFJTmEJDgq57D7vWm/Bz+8Pgmcr9d/Jk+ZM
XpDJfKtHZZVENBBQRG762wIZeRJiLSjSgEo98JnWiooQVW+wsKsnGD961FY9SxZ8/+S1Rh0y7eUl
i1eS8WLNMAQMAUOgaQgMeQJ6VzB6soxcB3ZCCPFmR7ySICR/MkZUoV4SWsiCtrYcjgirKlYkoIUd
waTS+Mz28FXozODNbZjfMtEaUJDDDBc5I5AxpZa0zpSRdxzechnd3CE37Uwmu3dn92vnBcEqDzat
xywjQ8AQMARWEgSGPAEFwdjpo4JgcqrNzDsaJDsjTk4xkmqBUIq5dXRqVpX+k6pTai2JXIiRw4GP
uHc7bSjXGjJbqaSaFZ1TAukI+ttbKgVtrbnckt6eae949NFdH7fdE1aSR8aaYQgYAs1CYBgQULC1
HA+CRX31n6XtT/MzSznHqaJIQQSy88lz7vvztNW2XpIEUZ5rmfnnfnu7TKZN7OMy8XmFv6WFyeFA
zneh6S0K5QR9siM5fKQyP/zZbdZe9fH24LVmdZrlYwgYAobAyoDAkCagg/PT3yYH6gmpG69FfFAh
OE0kdr0EIyjKovbJzs4cTg39CGjuGV8enRm9+jdHK1EPBCNX75CIyi+4uuNerRB5guJaUTUM00Tp
fVk9vb3yDM+M7wiKe6i8c1aGAWNtMAQMAUOgWQgMaQKSEeuY0UGwdleSaZLkU/4dZ5wERHBDxFnr
dYzurNDuyblsqbS21J9IWwoJBWJxJNMb2fxCPzyt94T6T+iCLTOcyKYEEcXu6RUptWUzbXKm28EI
qFlD1vIxBAyBlQWBIU1AUkE2HSuk2yupOpLsATyAJ5rWYTLagicyjRGxoslcFmoonPdkkim29vRM
VIKULXPmFkvF1bTvjktLviKWyKsutrAE6cjbLSIgpSUN5INmJKeE8B79liu2HO8yUqSKb1pZBoy1
wxAwBAyBZiGwQgjowPy5+0lU7zg2KB10XmHKwvorX9JWbCkeBSHxYOoSL4RkEak2IckQ3PXy+chb
QCQlrSYotS1pyW2tVP/pV4/O0RMzuWI2Ip1sqNFkRF6ljP5K+wk1nzB/HeMdFx5DcCKdspaEU4Iz
yZGPnBZ6i71+w6C6mv6OR/MtH+3e6jyR57MXvfcL36/rJktkCBgChsAwQ2C5E9DB+XMxP52+RtCy
1mtBT5eO92kKRl7Rif9l65zofdC+RBRqPzKriSi0q3WLuOSj2h37yn77tWWDr4o8JvbyXg/ebiHb
hE7WEfn49Z1wFwYRkye/cP0nMtOF7wQV0YTQiPDljjNjfS3fruf93xjV0vtNkVrvwX/72ZKLP/jV
s+u701IZAoaAITB8EFiuBKQdDNaXqD5xTJBdCzOajFFf2Cc/4xdXFabUvSloRSi9ltPnL1zhNCNH
Ot4xwGtALapHb09ps9s+vWNLsHW4V2k5tLSUvji6JdPa2a3T4d5vIhklCXUf/te6T7jtDi7acc1M
50pOE4pIyJnkOMZFm991hm/+++YP6l3XoyHSbLHU0toTTPv6HVe+ctHH9r22ziwsmSFgCBgCwwKB
5UZAX8nn2yYEqxW0fc42fgeDsUFmbC7Inr5/fvqjlxeOenqZEArNbk7jQb6XNSHOoZFI8DuNJTTT
YbLTedEKBLLWjps+lblfDBQPPcXSmIwnDXbXRpsRQmQVKkNaYwpNbf69IK9phY4KrAV5jzhVSPeW
cE6QJqW/aW8m9Wv+oU/evGYmyE0fkyuuN2+xlMWeUjAukx3fFbQcttfNV9519S77an85C4aAIWAI
rBwILBcC2iufH50JVj1lTJDZB/LxayeLdTRJ+7n1Bm3XSDva4+rClNnVYcy0VVw8gXDixIP5TQJb
b4AuXe/x2lG4q/VSEgrp5KV3FYPVEqX3SF2BvJzCUtIH7jLhehAWNrcvXLgzQsIpwblgR1qQd0hg
3agoXtR/3cVFtYbL0U9eP3lB7/iLJ7dmPzp3ocgnrHsxWNjdG0wMMh8stQQnHnrzjCPO22WKbetT
C0y7bggYAsMCgeVCQGOCyTtqx7TvsnGoVxI8GvNCEspu3RUUT9JXTb81rVDo9z7OUuR6n+0Msh+J
VmESAQEtYikpIugDXKRDLcTF8js8nniULrwn1GCycyc/JQe7zRfEc80Wpan0SkeKW8y8GzaajN+W
x++QENYrIrzy+0KhBkV9cGDoDbrZqqfU/XyaL4Uvm6+7vrTnBw8emw0+O1/fH8KTLvLai9oyT596
mNyb+frrC8fNP3TGjMJ5U6bUJLRhMfqskoaAITCiEWg6AUn7Gd8dTD4ZzSVOGl4L4i9ucBOCzK4v
BauxFnRTpR7IBB0zOoNxHx8VZNZckuaKHWo9jnyk/ZQU5bAWEUiLc832Ltrub1HEUMxmxxSLE/g0
wz/iZYcOBD1aJQpf8YkRS+hu57bgcdoP2/SUd0sgdeiEANkt9YCT+3XQ1aPtsXuLf8OUVym8tve2
W6yS7T60qLWnJeH6kfOs867j3cVg3hKZD3uCIzonj75M+fx7RI9aa7whYAisFAg0nYBagkkFrfW8
G8JgoT5t8YMXS7W9zqra4+2s/fMznry8MOXRNDQvLhx3v7zo2qWTrJmKtjO7sR1bhmMJ6qBbJcp0
phdwIm0oNL1BUqzqS8EJNw0tjc3kAjYmLRPQ0YvvflNHadyYokxeeLeF60a8bBoSi1v3wSkhvjdc
yFOOZstakNOAwvUmHB5655WyHb+sNFoOfeHmdXuC1sukMb5lnnbR9i7kXosKzYqKvd2lYLQ2Vli8
ODhHWtCu0oI6VooRaI0wBAyBEYtAUwlIW+dsKmG6r4xPWvlAMKdTEKS0UNe0trFBR5A97+D86V8W
2aTulbZ0BSmljygiXAty6z+hFiSCYc0f/zYRTui5Fr5EGhFQEY0plx1d7OndOJ5jR1fuw6Vsz2o9
3ZH7dUhC8oQLXa0hsXC/0fj6j6dWR0DOZBZpQlEM94Lr6e15bVHPq/3Wm1T4yS/cPfr1ztbvT2jJ
vmcBTgehKdG5b4fHEami2aHpQUK57tL2nYtyH9Ptt47YUWsNNwQMgZUCgaYSkLy1TpXX22paxUgF
x5vhuOhJSFrQdkuCcQfo1BnpiJb+JI1pEwxgoWUsGZxwLknzybQgsBVzihwTscnx9Wx2SuBlUu1g
kM1qI51SsHo8q2JX7weyudIknK5D5nDkE30LKNKAojWghAMCmXjtp89aUFFV0btHPT3/CDYSIO39
q/5K16JP5YrBlztkeoM4/fpVuAbkSZX2uNgtMpIWFMgL4TQjoJXi+bNGGAIjGoGmEdBe+ekby7vt
g/pgQaj91ON37AlFYv0kaU/3Xlw46u5kb4wJOk7VOtA+bVo24i3WfgHNw5OOM1eV9DskI60DhVoQ
jgp8qwcCEoG06nyn3PTieclVerPxbaMzC8J3gCLfO975CUmHj9GFL6ays0EKAXkSCndniEx+zvym
4nsvua5dPheJcPC/b39nS2vxQpkic50y+0Uu3Gg7+utIlXZF2k8UOdY7TEGup7TBgfkZn720Ge9T
jejhb403BAyBwUSgaQRUCloPk1vZenw4ro9gR5BXaaG+Ixpow9FxHUHu0oPzM7a7uDDlxb7Jx3RI
j5CnXJYdrPsHivMCOzS9eWHtTHGQUEga0a0kb9H6kExlfQhIaz6jMuxggCMDe8rxDhHvArnPb5f4
5DZ5pGpAZKyc4xqQSpL5bVFmVPffk5U++b772l5ZtfOScUF2nUVLeN8n2kMufGHVv9BKO1jTCgnJ
k1JJTg3FYJViMHF+EBypfJf9hd7BHH1WtiFgCIxoBJpCQHrpdFQ2WPXtMr8FuFl7D7h6tCAIAT/s
0UHLxouD4vE6PCTeI5ODNTq6gtfOlQieRr6pZji83hDWaC5dXvNxprPwq6ZoMnBHpAFlI21jTLwc
mcpKJdZ/JOBL4aam0Xs/JdZ//DpS+XPfyZZ58lnqDUfSTHfvTcELgmTzvmPshcmvHbBKtnWLJUu6
ozWp0OSGhhYjHO2CV6It+ktEq4ucLHizKNyJYaLWziZr7WzuiB7B1nhDwBAYtgg0hYCywSrbSjRu
0eG0n/haj9c64kv2SfEdkUomMy7I7Ll//sw7Li8cWfYam1bYs0ua0ZXSR0RAlSgN4Szhj7bDl7Jh
KhwJ+BtqMe539EfCXp/NTi5T6V0b/JxDExg3hsQDeUUmuD5fR42q6zod8olaGTrEsd+cyKtNWlZH
b881F2y+bZ93dr7+xG07T8jmpkrbGc9nu0PygfS8poM5Ti7XJcWQcCAhTz6QkX6iZcp0t0l3MGZP
lXj+sB19VnFDwBAY0Qg0hYAkE7cZH5TW6kwQRCTj+3vCJQmKVJDXxCA7KRe0nCnX7Ofkmn2/75nJ
QcfCucGY32sbnx3k5JzeYbAYApq9dpzWE6pioSec5wv3YixCPhlYYymvxaBF6Tckw/qPWxMqxTco
7fMe0FISgoXkUh0s7Ox+JDcq91i8mIOfvHn1bHfmu2Nas2u+Kr0u/FRE+DKt03wc4cQ1Hwgo/A0h
uWrj4LdakBk3J8h+YESPXmu8IWAIDGsEmkJAMmpN0MuiIpFIw0gjmFoocR/b9kwOcm9tD3q/pJ9l
AvpB4bg39D7QRXJE2KHKtgnR+g/mKrSekDyokFv/CddvIiNe+MJpksfYqLu7NdxyJzS58Q2h8OVT
XmiNnBJCYuP/cHM411LX2PLO2HJcGNvaErzR3XvRzDfWeD7ufp1bHOw5oaW09ZyFS6ItfiAf1n0g
oJB8MLvxV+f4iybkzG5h22LB/arAxrXQtuuGgCFgCAw+Ak0hIMc5ZZnuSciJ7bCV9ZASaeaLIGSK
O0TfEHrszcGcn2qrnnDH6p6g+J9FQfa/ctvepCoJ4dUg81lYHmY0Vo0wxzlyDBeRMNUlQgmhj7kt
JKDY2k94LsrDOyCkSn33aQZRmLbO6XlDrPXg45tvXla1Dn7gps+Ma82e3rmkp61XmhbaT9nshvkN
8kHL6fTkozYscZqPM73Fq0wL+LbR4A8hq4EhYAgYAgNDoFkElGoY80I/bU+ESoQEf7TKJ0FmrO8/
F4zHLftJmiaT3GMH5s8/a9WgdEHqtjy+/RAIAhvx7J3fvLKiS7wLFL7XE2dH7u3tzZR62Lk6ctmO
1n4w30FIS8kn3NshJDbvVucMjVjhFCeOagle7Vhy3Zuuf+C+oPCZsFba7WBsb6bnW0FvdswS1n3C
L6065wPWdyAeH0MNCPKJrQGlWAzJV3cKKguGgCFgCAxPBJpKQJU334nAqUcLQqx3Ksql+009Qds+
2qhzqrSgUGUpBh1/fy1o++/YoGWTjnR/uKggXuLkzRu5TkfOA9HifUhKLKS0OPNcvM8wcbU4s5hb
Q4p2PnAEFJrf+My3454+n+iGfcQGStPRWXy1JSj+UXUOS8zn85mv7/jOw8a15XZaFDodRGWUzW4w
rrSvpes+jkAxvXXqOGF681WO6C9TVRkcnkPSam0IGAIjBYGmEFDcoJU0T1XyW6sGMHng6aUNS096
KZj8hIT4NQUJdH1D6AG9gPlzkdMJNTdCQ8hjwgpJR44EkYua/ue3iIndEmJBazHRxnWhCQ6CctqP
yCvj1n6idR/XonjDIv4JJkv7eWVR118ues/nb/JZv7jjlu+Vr/X3unC5hlQw5/l3fJyHW6jteEeD
0OXaaUQVyIe8nQIHfVkwBAwBQ2BYItAUApJUfWOhBHNk6Yq83rx49wrD0g8zLN2gtJpGBKl1R+Rx
otL9fFqk00Ahv3wjKH5JG55uyveFqgZMV0v0DwTBMk74eQO3o0H4ZbqlISPtBEeC0Jkg3IonckCA
fMobkJI89lJr/P5ROr9gce9Lud7eq+Lnsz1dU7VQk+kOPezQaNw7PaHDhNN2kmY3CKkK+ZB/RKfe
O2JYjj2rtCFgCIxwBJpFQDM7gpZnxweZ9aJdsMt6Qghvrd9pfcA9ooRAH7V720vBqj/Sz4NJp7Wg
Bw/Kn313Lsht6p0d6iMhyEXkh4ZDwAwXDx0QhKst19jKRxwU7f9GgyKdw/2JvQdEA7VTtfaOm9vV
/fhPtvnqTT7br99+5XFtmdxORV4yDb3Zos1SeWcp3N0g1IDcmo974TQ8B1FVCXoHSM4apTm687YR
Pn6t+YaAITCMEWgKAT0VLPzrhsHkRzTT11Y8kRD3WlB/8un7XlAtLSgU+kHmq3oZ9afapucufvcG
PWctDLIfGxNkN6ypBXED6hRaBeY3loPwToBgYqGkDX9KrM9ANnzOwe0jFzksOMcFWua94WL3jpb2
s7Crd45yONWfPvjmK9+eact8LafaLsasFprdIg0o+usirtbOfTx0nojbMysMLG1dpO0Vgmc6grk3
DOOxZ1U3BAyBEY5AUwjofrlKb5ifcYdm5Z9WhtpvurbWU414fJ+QhhdUpVmNE+FMPTQ/43PnFaYs
0FrQYwfkz7lDLmAboJ/UIbOjCoXaRSTk+dx2n4AGhBccHm6hBsTu2tFaUPhya/m9or63kUs2m9U7
rMVHL95hnzu4evI114x6cXTvSeNKufUXstN1aHrTBb+3W0hAqoMnHk9MNSyK5I0eJgWKbU8fvq5Q
SN2fdYSPaWu+IWAIDBMEmkJAUVvnntsTTPqqtJL3YjqLVoGWrgV5c5lfJ4pvq1OLjHBI0LtBH5sf
ZI5WpidRmj7RkBddfEZrQWv7LYDqwhwywLssoQEFi0RAvFWDxhNqQO7zC+HOCpjenEec14Acf7Hr
weLermJLS/EwX/5LuSVfausufb5TjgcR+cRjbA3Ia0LeLFhHA3jhtzMovrwkWHxsHcktiSFgCBgC
QxaBphGQZuPdX8xPP78jaL2cTMPvwYUUlB4aWRciL72Ailfc576Zn3H9BfqC6tWFKS8cILOcvu5z
dLS/QQMh/HR2X3WjqBdAQ7LA7doRUNkMJxIKd8MuN8g5QatIHBT0Ts+Nc5947vFgFy1UXXjh2q2j
Ww4am8mOns+nHVAHISDKC7f7cSY4ztdY60m2yHEhq2xXXF047pUGWmxJDQFDwBAYcgg0jYBo2Q2F
o674Qv6sbcYELQf6L6L6LwMh7pHfnnhqvTOURIovqK4ZZLd4OSgeJ1PcNzDFrR50fP+NYOxXpRWs
u6y2qFKncxKgkt785t8X4q/XfGIvsPpDkcrRELBMb60vBcG3JywpbTuXrX0cybDuVNaCnAmwlgNf
sv0Uz27ji4LSL9cO5oZaoAVDwBAwBIYzAk0lIICQCe67i4LiW7Vu88n4uzrhKzb9SCiCzmtJXidJ
05o4N0c5jA+yn1W+uDr/fnTQOS8TjDtVZrCL+AprHUsoFfsqs0Q04V86xfzmNzX1JBTfU4466zeu
1yKE00f3dIafE3/utblvn1DKHrCAnQ7QeNBwaLT/24CpLVlRyEcOF/9Rht/1L+YO54FndTcEDAFD
oG4C+kD+9GOU+MV7C8f9tBpsMo21fyU//bDFQevFWp/5SOSW3f/dn4gslnrLVTLVxcvCFCe3bH2Y
rniqvOIelyB+di+Z5HTvXvqe0EcbWgtKawSVCncpwBTnmNE7IYRb8LibdJgT+XQEmTd6FhUvkza2
6Iv501drzY3/XmtLae3F0nLCd468XXAZmNFrPlrzel4v0H5HnoCzaw3br+fP3V3rcB8U9lPVH/Nr
pbfrhoAhYAgMBgJ1EdAW+VPeoa/cHNAWZNfeJv/9w/W56a+vHXQ+KrNT6lYw1xWOelwktE9nkPvh
2CC7G+YxrFHeEYGGls1XfegpgqCSUwL3S+OQQ0L2fQuCXq24BOdLwM7T5xtmjA1KW8MLyyDr++JP
RsRw7cbVyrEkf9B+3ggyp7w1mPwsVycHY96hT2XvvFC7W9dDpvV0NkoYmo+2HXq4J8gcqU9w/6nS
ffooYNvkYPLb9ZGHC1uC7DvVsRNFQg8qfdUJQz31sDSGgCFgCCwPBOoiIEnhbSQIN5ZAy2q95b3Z
IPvn14Oxf90pf8q3Xwt6npMbdr8lGJHQUx/O5/ffMJg0VyR0AO9ehhtVu1bESca/ulqP4OY+tCrV
4bS98uf/8erCIf/R+zC3tAWrXaVv5BzwWkhoyymocMqfpBIWlIp3twWl6/lgntakJupbSJc4F+mm
FE7HQD4Lg6JeNi1999LC4f9Ky/gD+Xxus2D8eq3BxDNEPJ+Ut+AkyF7aJ1tHvKUplbFMDAFDwBBY
DgjURUASZHJQLmUxcUW7EwQTW/VxuM5g1OOrBaPO3SE//fLfF47qJyDvLRTm3RsEB+6RP7N9YtB6
BIXhUh0PcbLoS0qVPehQSLQbwCq9Qe+ROvwaDgDaI+6mrqDls/KWW2NZHRKq4Yynttab3lgS9Fyg
L7fK5yDQ2kx2d72TtGmoKDUhsNMBL5u2B8XLHw/e+JZwjN7vTQRpfpu1BZP3lM51ZGuQaeNT3R5f
rZWpr/Adt2AIGAKGwNBEoC4CUtWLEA//hZsKKPJlUmlDrTLLHSmNZPfP5s84e1RQ/MUNheOeSzb1
2sKRR+6Rn9Gt9ZtvyJV6Ih+eI/Qln/q+nMp93jqmlaU9D85Pv+ziwlF/lXnqFq0LXTIxaDmuToeE
ASlKqn/wetD7G5HPz6jLN/PTN+4K2k4TIWeS5DqQLpfzBhpez9wguPCywuGHpuWxV/70N7cG476o
D4sfOTrIrotGCOkumxvGQGpr9xgChoAhMHAE6iIgZvZRZI4dvUIamZtCExGeb28ZF+TO1EL5zjvl
p/9CW/Nc9Lj7hIKv2rWFKcd+JX/mA71y0Z4ctOwwjx2p3cWlXnCRw0J82l5pPQiSkZlp7OKgTfuU
BtuTlep4nbSGr+jT3hvMq2KKiwisVOErO5XBxKzVHpReVv0u96k6g7ZjpW2srrYPvBfcnZPVcuH5
T3n5XXh54bCL0zKUprf/qGDsHjLPfRK1iDWxtMBZU3+WuUssA0PAEFiOCNRJQEWRDSYdyEHuCPrL
UnvkKBbO2EOCWkX7s8mB+WPvCiZ+8m35M264qXBMqCX4cF3hyF9o9n5nRzDmFGlDX/PE1peI+q8I
JYmK/EKHNf0r09PWEsp7SAO6VhuVPqxPdx8jMrhA2tlqaaQQuYOH2tyivriWP1+XCjcOAWyqIw3w
EnmizSSRTGC7qpxdqU1DL8ImSqAT0KwWB8Ub5HBwstrxeLISauPntJb2ZX3Mew8RvvaCq0w8y3G8
WNaGgCFgCDQNgboIKHQGcwIfoe+Jh412ICC/4c4CpRIhsHfb53uC1k98MX/27hLb39MLqvf7GusN
/lf3yucPl9/YvSKy45V2Uwgsvn9cGuF40onbzTA7TQwy49uDzDflBfZLvPIuLhz2iwPy5x49OQhE
QOkhKqs4L0FA4sPKVjm2wNH7Tf8VTczw96n+e0jbWk3f3x5Qh3gvN2kxryh+/5Vg0VUyYb4Rz0xm
xXeJ8k/OBdmPysFgDRw5pIWl1jReC99nA6qY3WQIGAKGwApAoC4Cityn0XLQgCLhF2lC+vZnOPt3
33LTeUxjvDCqWfpELaR/rito/cCX8mf/QXflbyhMeYY2XR0tql/5xfyMmVq8P1P5yXkg08a9EN1S
k1yEQLXFGnZIkAns/cVgMnuxTY+Iask+C4JRdyjPNZOf7yavaJuglj4EpPY9y87aadv6OOeJjpag
55CLCsfNoYwD8+fuL41vR23A2nA3UQccDVTTXmk8f5NmdZC0qj5aj95vWksazwkinl2V9i3U2Xv4
JfFovAYNV9luMAQMAUOg6QjURUDIa2+68nu8YYbzZBRpQpGWBBXxVxtmhmY7ecytLaG+r4TsZyRU
z+gMOq7VLD/0HoOQ5MK898Ig2E3kU5BZbmNyikjDOyr4bU2jtifXhNBmpEmMkjPE5w/On37dxXKC
0G7Zj2ufuCtHaZ+4iDz7BmcuWxA/q9b8R9rFEgEyKm5O82SxOOi9ce1g/kzuUZ3H6n2bHURwE8ik
Xm8G6sGedmiJ0nheUFk/0N/L9S5TuS5qwxrZYNxuIvuThNtb5GgQrvNUWgtLGxGR9hO22rip6Y+M
ZWgIGALNQqAuApKQf1kL46yZjIOAIsJB7+FYb+Q4zcVrLxEZRVTUoasUIk1nDf35YS5o218ecdpJ
s+OePxeOm6tdBNix51oJ3js6g9Gna1udnSZpUR9POfKLf2G1kmZE2lWC4ENvBGP2PTmfP007JJTm
Bx0/yAajPzEqaHlv3BTniJK9CvqYulTW4xL48yXw18DjzwfVmy1wntef45Vv6LiwOAi+qHeBdsf0
Vi/5kG4VpZbGtmhJUPyL3tI57ILCUdpaJwoyS44bFazykZZgbF51+HC05hR9jqJaSF71RNUVTQdq
frm8WQPJ8jEEDAFDoFEE6iIgCeGZ0g5mSpvZCYGIAwJrQRCPj35daGkFvFt1ZLqLvLJw3W7ZTAL2
5rWCMdfr/aBL5KIdvt0vzQWtaD8W9uXmPUVlbsvsH7NYGglxjxe2kWs478607PFSsMbP9fMJaVlz
lNfhqudd0tbCbxQRHGFo69Hi7DhY2WDRg+LXdgl+iLKcls8tyJnhRJnIwh0PRJSr5bQBKhjU6/bM
C6UQmdr1D5HhRZcXDr8kXrbWeT6aC1bdR7U7COLBeaIep4Y08iFfvSAbiJSfFJHqNSwLhoAhYAgM
TQTqIqCnC4U5b80XnkawMaWGfPx6UF8CWrr3deSuHVEEf9GI+AWBOa+v3RcGLTvtlT/7UuV1+XWF
KQ8BkTzAbvpiPn/3hGC1/SSMvylNYyM0HMqM8uobvBDmHRxpTu+YGxS/LIeEH/CxtvFB8Ii0lUsm
y+OOhXtPQDrqVB2ejuckAnzta/lzO+Nalu7Tdju9N0szu9Wn7QkmbL9qEOz4Rh0UwXoS3m2yr70u
Ij2vGCy5WubBp3xe2q5oo3HBqAOF1YFa73kTThw4GdQKacQTnYv+xV1cDhN3X134zt9q5WXXDQFD
wBAYLATqIqBItBXv1+ab7bphUuQ+7b3hvCluqVt25KIQ3/s6al7kvBBpTyzea3F9/IQge7hI6ZNf
yZ91yxrBvGnnFQodN4jwlPTMvfLT75Kj9W7K6Thcj1kb8utMPj8PHKKXd5KkaXx7TDD+Ov18Uua9
+VqvOUlrKFvIg2xr1lKit5hKnR1Bx/+qgY4QV70eV+rjri58I9ztWtrP6plg7LELaxjeonWjKIgI
LhNWV8tN/I54efvnzz15bDBqZ2lH78cjg/eiqoVKhrhotWzpVcqO7G6ZV6tmaBcNAUPAEBhkBOom
oHFBcKMWgfaWVvEpCGipW3a0JhR9q82TUmSmi0xnnipKchaIzkUrSJiaAmkYJbSEzaQBbLYgmLyt
zHJXySx3IXddXTjq7/rz933y594pp4bvyBy2AxWGwLxGFdeIqJeIY60lwaj9v5K/Zup1hT27RUKv
6v6LVOoHdC8WLkLPhkFn6M0WD9GaU/QCJ+XM1Yut0sgeW5pmwg7a9HTLSusy/j7aKY3sn6Wg+3SZ
BW/VB/SkiEVB3nO76/q3VJH/w7W70vs88XqlkY8/FycfzoloIfeH5ezwo2T77LchYAgYAkMJgboJ
SDsbLHprPv9bbbr5Cd2U9S+R+o1xojWgpWIxamSk7URH0XFESUvXh9BIMLHBDHonaGuJ/q32zM/Y
eWzQfbK22Pkn915VOOz3eoH1gUww5tMiiWlyTX6r1qPCrW/6Uly0UalKOGRC8NpFujVct5kYFH++
QJ+GWDXIHhzbr62fXJfnmM7pC0P6mIKcBW4ZHxRn+M6SJjWhI2gJd11NbqFAi+TBF7qga53nNdXq
VOmAN1xcOPJFf/838+dvop0kTpBr+q7S0ibi0VFttwbuq6b1RNfjhreION360e1as+q3JdJQGnhW
F0PAEDAE6iYgoFozCC7Qd6B31Ox6ewnhLOIv/OJ0+E4QOyV4svG0sHTrHv/Sqicf1o4iTSgyi5GP
M8uNkYDeSQa6j+6TP/MUeXPdyM7aeoH1dSX5qcxgv1kSjJ2i+/eUO/NGNAD1Iu6QwEalWldiH7Wj
qDeednIB/57MYR/QNkDvkiku4stEEEn2YnrTus+LIpMTfxL7lo42HP2qytwwaSgjfbQTQmm2CPH3
uWDx8ZfEXiaVg8Fb5Ae4s3RGefgFk0DEvztUyYOuXuKJV597eLdIbXt4blA6wYa2IWAIGAJDHYGG
CIjPLmygXQzkcfaA1jjGRxtgRnvCRdpPRCeRE3a0E5nXipbumODTRuI3Su3XZqIZfHRnaZVckJuu
XE/cJz9jv8VBx994f0jOArKMBflD8/kz5gWTLtDa0PvlLPAOSIi1FGpBo1SDfY/OX3jGDwrfgLhk
zpsye//8mT/S+s1PRH0oXP3kvOqao77dQe/PLi8c8YjvPDk1iHNXO0paTibyyuN9nkzoYDA/KMrb
rPfhyUHn18+PSDIMIrxVWoLe92eC3MW5oLQB96B9oSVVCpWvLK1s0uQWIqVIg9AIVf8Zv42Z/CoW
ZhcMAUPAEBhkBBoiIOoqj7gn1snnL5MwPsy/5Nl3l4SIQNBwCH5dCA3HOQCEdBV/pTRJQn59iDxU
wYma2f+qLRj7h6/kZ5wmb7m7yFfOCnDOvvvLk2x+0JpX/tutFeTWZRcGhLwIcvKcoPMIpTneY6wd
rC/W4v82ynerJ1L36iwFrwS9t1xWOCLUnHwYE0w+WPmtDeEi6GXKY0fsuYuC7B+0NvW9ywvfeTie
XnV634Rg1GGdQXZv3K/9Dg/V+rpRrSeZnl201faLNwrmXjnIY8qKNwQMAUOgLgQaJiByfbFQODyb
L+RWCUrf8uYv1nciF+KlDglxAoquRGeW7m2w9NVVT0Jc5dib9yAuBLhcrLfXDP/dB+XPvbwzWPQj
meTC9R25NePNto80jm07gt5dpWUcJIIYr7rktF61u0x2053WFJaeCxYd0RWM+fCmwY59rGl6gTXz
UrBaXkasv8aR0/lRLwSr7qd1oXHUaZ6its+5QhrWTecXDv11PK3WiSbJVKcvxrbtI++2DdFIUj8Z
626qpfF4s2LyfSN/n28A7uJzgtIve4M1Dp1WmFLPK0R1DQ5LZAgYAobA8kRgQAREheTyfLiIokUz
76/j9ovUixb4/c5wHKMveJKJVn2ipRe/+tH3Zc74xqY+jdu5QOsy7C+XWUNeeEcXg7FaH5px/VWF
Ked4cGRiu1PHd0rD+b281HZSXQ7RRqXrzwvGoM2UtSCREd5vtyRBZfcEnftV8vxzweT9tdfcZhCh
NKBf6O91VwRzbm4vFPp8f067Ve8rjWcvfZX1k4vVvtdDc1j9IU5GSTNb32tRnh5JtVF9EfxSZw6Q
1181vqu/MpbSEDAEDIEVgMCACQgBPDqf1z46pQ65R4fT7sghIRKPS9/l91+lKYZu2PGAEPVmucgv
zrtqR+tC8ddOuRONgqgdqLfW9ffrJdZP9AQ9x8pJoewqre/o3KbPVN/+jmDyjfKWO1x5bC/N5HQ5
IvTZ+61ebHX/x6WBPSTN5pR5wYL7krtVK+9VtC50vvai201az3jcyj051CojqQFV0nQ84cT/0nF4
3snp4Lp5weJvq17za5Vn1w0BQ8AQGEoIDJiAaMTL2tV6Uj5/7GRt+yK953it1K8DES19m99/dM65
FcRaDr20lBfkozUhyCi6w7/UGpGQN8lFL7LiLRd+9iEnD7TP6muk7943P+Nikd+Z0oLCb/zgLKHv
P9yxU37Gg28KuledHCwc8J5oquMRrweLuyXg5QC4NOyVv3L0qGDe10RMh8glfJO4d1u1Dq5FOnGS
8fnEbWpsZEqnyaNvgfA45+WgNP23Rj5D6ZmyuhgChkCdCCwTAVGGNKEl7Xrp8S35/O+15jJDi/Uf
lkCezGyel1EjkxzBuyV4r62lOyUglJNmpmi37Ugcx3c/8AY9vOXQtuSN9hYRlpwQSp/aN3/m1CsL
R/7Zt13eYKqaPp+zDEHv07ARaZ/AN3pEl+zeLXfxIBft0NB/RSdtjafa/nHVTG143eHQICZdKI3r
kZ6g+4gHgoX3J788uwxNtVsNAUPAEFihCCwzAfnaPl8oPKnjnfWy6k5yy5bpK1i/NShtgpnI754N
FfU4Wonui0RuRECRFsTfpVTlNSHvTbf0c93ejw6THC/GSkBv0xVk/6S1oeNFUtdIGwqdFJoZ+FRC
TzBud7Xje3qhdALOEX4hKG29x7coXodq60KegCJNLyIc924Pn7d4Sgs8zyrNZT8tTPlpM9tleRkC
hoAhMBgINI2AfOWfKRR+q+PfrpXPbylhufd8OQ7IsLaB1oneprjmBAlt7YgdfhNHBBWuC1EJSKdF
/+K2EGk/S01v5O1/L3Xhjkpc6tJQ0g4GfH8o8z19uO1z2jlhZ/fyalNw1ecSRvcGk3+0WhB8CXse
L93692/qKcCTS/xvXONBs4s+FR5ux9Clds3Re01PsmmqNKw3skH3tdqa6B/1lGVpDAFDwBAYDgg0
nYB8o7U+xLsx4fs0enn1TdKC3iOz1braBWCSTGtto7QbgXZPaGHTTojHuyr4CnHGHYdKBtf9Rm46
LrpY8vfpso5beucHPUrWktPeddW8nBvum8nB5Ky8ze55LSjyiYOyB1ys/Kp5Jn2jIZqQc1zQgd6O
7e0V8RTlrtEp3eqVzqDlkRsKh/dZe2q44naDIWAIGAJDFIHlRkDx9urlVXZmvm2IYlBXteRFxytP
59aV2BIZAoaAIWAI1ERghRBQzVoMIME78vmWyfrQqjST1jFBR6vWZFrnBmPaJgS5sT3Bgvn/Cjpf
afYC/U75/MQ3BeNXXRC0dkwOOro7gjHdGwZzu7WrQo++P1TPp3wG0FK7xRAwBAyBlROBphKQ1n3G
CiZxQSBSCHKSyK1aSOdvTjarNhWW47xe6Jyg41X1ns7qiqtpoX1VrQWt1hK0KAar61jXMy3R+k60
FsRakV+cj0xxEzP6rVjMFoPR2hk7yI4Nisq+e55Wgi6cEHSep0RN3RVAZPcJOUmcKvPeqtoQtUPr
Vr1Py+FP9S/ukz+HtZuKIXK0KMmPoPSG6v268pmjus9Vtdk/bo42EHpDzuVv5ILujp6gtVd49cjT
rVtgdutdpx6tO0Fw7ksYY7rl4Wfv/aycz6S1yhAYMQg0lYD0HtA24oRrIBpJy4zbByH8qxjyiVMT
+JxD5G8QFEU0Wg4KHRDwkcvKOSFaE1pKOpGzQvT11aUOCvQSmbKOhJuy3JPn9wZFvQzUcqveBeqz
U0EzelQa1236hALrT5foZdj18epj6wHv2Rb3YqO8pT5+Sz39/Au70d9wBalX6fQaU2uRv91Ba8m5
mpdag1wpYpxcSdiG613yvBulvcOn6PAnzWiT5WEIGAKGwGAh0FQCkjC+S5/t/pt2BNjJu0nHG5bU
EPD6it4VinZO8C+x8l4NRBM5J3gNKHqfiG+txj3iok9eF3v0vZ/fSDCfcVPhqD57uTUTWLcOdNNX
8uc/3hX0nCjNR7sfBOP4nlFaiHu8pZGUO4emFyp1nrD8i7f+nN8nD5d2YfPXxUHXL5rZLsvLEDAE
DIHBQKCpBMTOCKPy+b0kUO+WVrJ5PYsiEQlF2/hAQC3M9507NqTkNR7Aid4oWvoq58RII3ixM+j9
we8Lx5yzogC8rnDIf1TW3tqd+wCZGE9cJchsAAklP1Tn6xN/0Tbpjh0nHp+u79+l7t7tQfG1rqBr
jz9Hn6SwYAgYAobAsEagqQQEEksKhfZA2/Pog3DXa1o/rpJQjqMWfQp7qaCNtKHodVT/fpDfqgfd
iPeH0AYkkC+TXnTNnwvH3D4YvaBPQ1y2a376v8cEuS9L6zvc7VTQpyp9CWcpecZ1pqVpohdx3XqR
0wsjPWm8fulzC2fqu0P9dmYYjLZbmYaAIWAILCsCTScgKjQvCP4ggXmG9mqb1udllyq1JV203hFR
ERXzn7WLjvmUQkZrPeF2NE/pHZlzHg4W/Ti5K/WyAtLo/TL58V7QvdKGHtLf74gYt9AGrf6l0nJ2
lTWfvlu3+k19lmpBRT5VLrItXZ4LWi80b7tGe8jSGwKGwFBFYLkQkEihWztlT9d6xep8uM67b9UD
gl8H4vtCbFYaVdDvjJ3VJpy9V0o/+sH9hWPLO2DXk+/yTiNt6PKd8tPvUY2/pbKm+HUcSLWWFrRU
4/HOCkt31JZbHzteX9Ue5A67tzBF78JaMAQMAUNg5UBguRAQ0Lidso/Wyk2XTGaHak1oFERUz/YE
pIGA+IvWI62oZ3FQnCVj1HGLgp779H5PuOv1UAu/LRz1X30K4tj1gvH6blCO/eK2llmujY1TvSnS
k01Eq1HwvuLeDMl5zIxqb0nfXbry2WDxoWqzkc9Q63CrjyFgCCwTAsuNgKgVO2XfI4G8UxA8IgeC
4yWQ3+Y+7Fa10qx68DIRn8CWa/V/tQ70E/2+4B+Fk4Yk8cQbI/fvJfoUxL36FMRn5JW3p0gXbeid
WiOS6TAioviaT5yAMD/SIbiVq93agqd0yT+CxQU0ymXqZbvZEDAEDIEhiMByJSDau3mh0PtMEFy1
ej5/j1yuf8jnGiYEwZqYppCqXiBDOlSGNR6IR9dmacPPu/XS51TN/t8YgthVrZJeFGXrnotFRNf1
6qN50nK2l4bzPtZzZFIL2x7/WlLU9hJrPYv0RdX7RFXT7iocd/dwa7fV1xAwBAyBehFY7gTkK/J6
ofCUjj/P5xoWBtnPa3a/kTSB90qzGU8leKFTQvklnfu7iOoxebidr5n/C/U2ZKimExHxJdYTdsqf
flZnkDtEpLOVCHZrre2siZkNItbLrT0i4IfkXPEvfXbhznsLx102VNtj9TIEDAFDoFkIrDAC8hWO
fa5hTXZOkDBeV4J3tAQwgvrfMl/dtVph6kpnctJXS+eofQXtYZddKxj7Ke2js7l+6xMPKIHFF7QL
xF9vL5z032Z1rOVjCBgChsBQR2CFE5AHRE4KfGbgl0mA9L2dlTqwQerjQfB7NZJowRAwBAyBEYvA
oBHQiEXcGm4IGAKGgCEQImAEZAPBEDAEDAFDYFAQMAIaFNitUEPAEDAEDAEjIBsDhoAhYAgYAoOC
gBHQoMBuhRoChoAhYAgYAdkYMAQMAUPAEBgUBIyABgV2K9QQMAQMAUPACMjGgCFgCBgChsCgIFA3
AeXz+XVUwzUV2byZHWT0TmXBb+Tcp/JKy9ZupF1L0e+9+YTSa9ODpUHp1tMv3j0lH33LrvDvSigo
LV84eLNL7z+X82/dw9ZxFYPuY1/TTRX9V7Gf1D39NjV1+W+idKQnrTYrCGZXbuMMbVM3d12l4YsJ
7NzwWBU8WnO53Po9PT1jXUXZbxT8FqpcjsmH79k1Ehbr/mcTeG6k3+PdObbZe05p9HkmC4aAIWAI
DD0E6iagltbW43u7u/d3TWAXg3cpsn1Ov7Dpppu2PfXUU0dK4PJtHB8+qINHE4nz+v0Vd+5JCeOt
JDBTv9iw9tprT3799TnTu7u7Pkv6TCbTWyqVqMPTlWCFVBQ+XywWL/Zp1I5L8/fdd0Rh660h0XKA
PJT+5zqxcZR/9oVRo9q+qcM/p+Wfyy06sFjMfk95Q1YdbW1th+jvdelpc5uorvfpWoi36jRP8ZM6
fEzEtKHyuE1x9UrtSDuv9rNR6afj13K51iuF+bvDr8dms72q0zd0/dpG8rW0hoAhYAisKATqJiBV
iJm+n8GvgoyuVkkJ3Hh6kuoL3f0C+fk8tUl21ZApZQJpHVF6CeBAZaAVVQyjR49eSwL5GAl3X0ZQ
7Ok5aPRtt50ZbL21NunuG1paWl7q7e3dMjpb2qSrq2tbHaQSUE9P19q6Rn2oy9hiqXSUDlMJSHVA
GwQzH87acMMN/b5v4DLR51UDA3cZ6LPx/KLzmQybbY8NdU7ho4B2ZcEQMAQMgSGJQCME5L+pRkNq
bhaKhpJocZpmE0/TRyOpgFY8TfzTOqnJJfjfoegIJUoi0hrd09Z2oA5PTt7U2jrm5N7ehR/W+QlK
B7GshwlP2lFnPO3pp89YvyWX2663J6oOaXu6u8cr7Vil5TMM5cD9ra2tB3Z3R5BBnLI3PrDnnnwq
KLo9iSdpqoesNJxMGl5JfFJNpENyJFqlDAFDYMQh0AgBDStwJPjHSaNBK0mGjEyJe+n6NJFFHyHe
2blwViabXVwqFp02ltlBWtRHlEEfLahYXLRNqVj6UDxjkcY6IhpMjj9MFDhBWtWu/pxMYw9kxoyp
+DlxXX9R8Rylf70K4KNk/uunwQ2rDrLKGgKGwIhHYKUlIPXsGhL82/sedhqZlJVSTirLOtlc7iBd
uzAxAooiret6isXDQ9WkVFxLZjgcE/oQkM5hfusTlO94lbdDkoByudGb9/R0lk1hSnND4aijnqg0
8kQ+b0yYMOEnU6ZMaR/xo9MAMAQMgZUagYESEGYjviGXGmReWnLKKackTXArFMhcru2HWqcJyxT5
vNI6atSl3UuWfEY/t1LlRwW9vXsnCQiN6JT8KTgsOAIKF/O3njFjxs9ECKE3mdq1qRwHDpBpr197
tNY0+fTTT1/nuOOOe9FfFDHhnBB6uEm70jJWUL5WAZBsR0cHa1ZGQCt0xFhhhoAhsKIRGCgBaQkk
t66EbaoX3JgxY9okeGs5FSy3tqpeq/X2duNAEC6miID+1LXeeoXsk09urHpt5Qre8pRTTt/npJOO
uypekdzo3JxiV/EpkcmG7vzuCxYs+JGO9a08+Z/39Kyr/N7u78m1tT2qtaD1ZbYbr/Nb6jqa1TSu
Ry7WmffHyOh3pUmTfl2j4TnlsZFzZecL5T7QltdEkriHWzAEDAFDYNgjMFACWkNaxCwJylSXaQls
FubjwnOFAlUMsmepwPDbdnKnXiyy/NsJe+7ZddppZ1zd3d3xKdVtcmQy695Vgv7q+Ps7nZ2dr0jr
OVW3hp/FlslslNQg3meCUJRV7sNe+xHhFINi8UiRz3Rd3lKk1aq4gW9s29ixO3Z3dEySj0IYspmW
J/NOk6oEiPLGDZyP1aU5EHxX55NmwxWKrRVmCBgChkCzEBgoAWU06w9dkIdakLlsYlfn4vfCPdRN
6ziz3vKWt4TvAZ1wwjG3TJ06lZddt47qXXyfnAy208Htvh28h5Q/5ZR/60ZuDk+3trTsIfK5TWkn
yZuNd2ui862tN2Sz42aVSgu6e3sjk5xI6T3Tp0/f7KijjvpXd1fXvsoh1AR1/g1R0F114IVrOS7s
acHcqusA0JIYAobA8EBgoAQ0GK3zux9ULXvBgkXfkLDfANdohUXZbHDLvvvuW3aj1rWznRlujP6u
K43nU3EC4qbRudwzS0ql20q9vTvy23mxTZJ2ItNeLztChEHOCDcWCie8Ks3q0mKxd0vlx1rPlosX
L/6Y/v6r1NNT1oZ07e9Tp57Q7xPkqY2RG3aaI7byMAIajJFnZRoChsByQWCgBLRQtWFdBEeE5Aum
RZmwWiUsP674gRq1jjsqlCrtgkAeIoqWbCYT364m9WUZOR4g/N3Lqtk5EydOfGjGjPPReEhfmrja
ai/NmzNnvkxloZYhQvqMHAuuP+mkk2b5uuJEII2Hl0pDAlLaUdpVAHdspzmp0S0tr0kDejUiosWs
I52uOBHiK2Uya51xxhm78B6Re59IVrzcC/X0oLB7RYkvU6Fzk+mV15/qycPSGAKGgCEwHBAYKAGx
EH58pb3PaLiEurzQeuonIO0mIOeBDSX8n0oDTqavVWUSC7fJccRRlEmsT1KVuTcmMKf9sA61htaj
zoytR4ValP6Z7G/UDxwHeKenTEBc01rPSyKehYrsraZlnuKRiu+MFXiDnC3+xu/JkycHCxcvfkhe
dv/H72xLy2dV38+r3HAdSmU8n8m08G5PzSACelVu2N+X1505G9REyxIYAobAcEZgoATEOgVrQKle
cNdccw2aSs28JWwR7B6/tbqKxQP048Q0QKUBraO0vJPjQvgiZtm0hteY8sPBYI2laUpj2A2hegeV
IJtvibxmSgsqb4YqEvjLvLlzb9S9+yhmlA87JHivOsjt3yKJcNeDuXPnLpY33Gk6DAlIprct407a
LS3Zl+Rt93CdAyUnN+xVldYIqE7ALJkhYAgMTwRqkkSVZlXbLwaCqrWfDO/YPC1Brm3UtKebXhAt
dXd/TkTwMxHBv+LlSjNaX7+niIDK5r5MS+aX6623Xnm3gGxb2y4S/J+P3Qc5wQNp9YD1IMlQhdK6
zhbSnNgxu0xAIpdF0vD+FRTLS0/lfJT2XzLtlR0KQseFfP6/eNypOWO9BkbeeMq1tLT+oYHhQd36
bOfTwL2W1BAwBAyBYYPAshDQMjcyl5twdW9v+57KKHyvRoJ7c5HMH0VCP5DGMdMVsLbWW04RSeDZ
5kKmo0cOAHrhNXzTVBpXm17Q2VrqVNkzT+R2vFQbNvxMa+MSrbFsKSeD74drNooiiW+J6O6RCVDe
alHQus+9S5Z0QZJlZwLOq47/EEHNigMwefKGcxYufP467daNFlcOure9q6vzvHrBYm1Kzg0fFKE9
V6HuPis+bcEnLmruy1dv2ZbOEDAEDIEVicCgEtBxx03hezuXqsHTvdYgAby24tlxEEQ+S6lHHmIt
LbkLJkwY/4g/qU8/sDbDzgZhEPk8ozyuKpxwwpxKYIpsHuwulT6tvHlhVfzVpW10cnxvqExAIqN7
VL97xU9lApJG05lpaelDPtw/Zcq+853jQh8CknnvGZFpOc9anetegL25VjrV47FRo0Z9QulerpXW
rhsChoAhMBQRaISA4qasmuY1EUrNNAAiof1DCXl9WiBzksxXVTFil2h5k12fy7Wc7ddf3Dd/PizB
XXaPzmbbTu3t7Xhj2rRwQ4LUIHJ5WeVeoTy3jTktHKb8Do3vfq094x6XabBHaUKsWPsZNWFC6jd2
xo8f/9LixR3PyiWbD+15MmRz0lo7fVf9rESFJgBWEuN4PnWZQYfioLQ6GQKGwMhAoG4Ckgt0S0kv
1big3ZgrkwU7bbbiYeC3ANBvfLMrQSqhf3KhcIrMZZldJOK/oNhHsEI8in9Ufj9fZZXxN8Q36pQn
3HrSYo72slifKVggjeNukU/qLg3xOqhK9+p7cv/UMs17ovMZttFhF4TyTtO5bPaqYiazl99+R3+f
PG7KlND9OhnWWWedJ2bPnn2NNog4zl2TNa3rj9XcyymUr+bVsWTWpzi1Ezz7dILWoASzlsmEuy7T
fvscw8h4jq2VhsCwRKBuAtL6ygyZk25VK3sl1RYX9fJLxRY/8UR3KZe7QOnZYSDaI6CrK9W92ueR
z5/0U+1icIvcpvVSZ8/4OL9lWluXtI4b908J/n7v0sg7jq+LHq2yWBORMG+b19PTyvpJzSBnhye0
3rSHhPZmSswOO6yn9DHbSVN6Tmn2Uxl8NlufEmp7slLGrEmdfnr+fG2E+k+l6VYbOorFrlRPQZ+H
Cn1Wee4uCuK9pHoJA36fo7b3eVeoJRscJh2RL6v6bwzV63lXEytLYAgYAoZAsxGom4AkrBFmdQk0
934Qnmx9vNlqVd5pNrfVShe/rrIQwnxKe0BB7fqPbiRWDErD+z7hOz+1wnHHFdjt+oZa6fx11R+C
+mO96aulE1ne24x8LA9DwBAwBFYEAnUT0IqojJVhCBgChoAhMHIQMAIaOX1tLTUEDAFDYEghYAQ0
pLrDKmMIGAKGwMhBwAho5PS1tdQQMAQMgSGFgBHQkOoOq4whYAgYAiMHASOgkdPX1lJDwBAwBIYU
AkZAQ6o7rDKGgCFgCIwcBIyARk5fW0sNAUPAEBhSCBgBDanusMoYAoaAITByEDACGjl9bS01BAwB
Q2BIIWAENKS6wypjCBgChsDIQcAIaOT0tbXUEDAEDIEhhYAR0JDqDquMIWAIGAIjBwEjoJHT19ZS
Q8AQMASGFAJGQEOqO6wyhoAhYAiMHASMgEZOX1tLDQFDwBAYUggYAQ2p7rDKGAKGgCEwchAwAho5
fW0tNQQMAUNgSCFgBDSkusMqYwgYAobAyEHACGjk9LW11BAwBAyBIYWAEdCQ6g6rjCFgCBgCIwcB
I6CR09fWUkPAEDAEhhQCRkBDqjusMoaAIWAIjBwEjIBGTl9bSw0BQ8AQGFIIGAENqe6wyhgChoAh
MHIQMAIaOX1tLTUEDAFDYEghYAQ0pLrDKmMIGAKGwMhBwAho5PS1tdQQMAQMgSGFgBHQkOoOq4wh
YAgYAiMHASOgkdPX1lJDwBAwBIYUAkZAQ6o7rDKGgCFgCIwcBIyARk5fW0sNAUPAEBhSCBgBDanu
sMoYAoaAITByEDACGjl9bS01BAwBQ2BIIWAENKS6wypjCBgChsDIQcAIaOT0tbXUEDAEDIEhhYAR
0JDqDquMIWAIGAIjBwEjoJHT19ZSQ8AQMASGFAJGQEOqO6wyhoAhYAiMHASMgEZOX1tLDQFDwBAY
UggYAQ2p7rDKGAKGgCEwchBomIDy+fz7Bc9Fis8UCoXdklDp+lo6d6PibYoXKs2ryxNOlXee8t9W
8RyVdenyLGtZ81Zd91Aex4KL4gWqb8nnqWvv1vFUxccVT9O1Bcta3mDdr7ZkVPbbFT+q+HO1pT1e
F13fUr8Pob269mKteir9tUozWfESpf9lWnqH30907ceK1yrdklr5xrD/LJgrkvcpurdY772NplM9
R+ue7yvuqPhtlfXnZB5KwxhhrMxSPDjZFl3P1qqj64MgMcYo+wLF9RRv0jWenXLQPW/Sjx8qjlM8
X9fvqNQ+pW3RNfLLNopBSvpOldXdhHwsi2GGQMMEpPatooiwnFShrQidrRVbGcSN4KFBPUbp165w
z0KdJ0JwPvCgQIhbKL5H9ycfGAb1ixrcvfE8lY528xA2OyD0Xk6WFyuEulPXdVMKfp/O7eLOg11D
QW3aXDcgpJslPCGRB9WWRVTECZxNdLiGK4PrRAJESuT3y4qvKP5A8TOK79e93/ICxuVzgs5/WRGS
PbJaQxG25KG4seLMtLSxNGD4KcWr6wXP3ctEin6BgDbUuSSGjB/aRV3oQ9/utGLeSBJuItGB+n24
ImNlboV6buDq06O/CPowqF5j3fkv6JgJzNMV8OAZBdfnle4apVvs0pEXZLuaYhrx8zyBxXjFX1eo
mz+9lQ6YiPIcTaiAyXydBzPySwbGC88zOEC4dfdZjXrZ5WGEwEAIiIcRwe4HdbK5R7vrt2rgv9Eg
Ftso/R8S93jh9iud/5niDRXy/JbOE31AiPxL8WOKcxL3vEW//1elbrSx/OA30IZZSvvJeHmOGN6h
c7cq+ll5VzxPJ1je6c6dNwDcuPVyRQRwvP0cL8sM9QO6/+8uw1H6O03xS4pgm8zXn/uFrjF7/44i
ZADR/E4RrZjABIU8OhRnxnGocPxxnV9d8XXF6RXSQLxHuHr9s8HZ9AG6b3+X71T9JSb7n7pSD2b8
tIPy0gL9mldEw+kX1M876eRZivMUwWiRzn1Ff/+nOnucuc+PkwWQh9K06dwHFSGvfV3GYJpKQDo/
UfFkxX8o8tzEn1VIjdBnUubO8axxnb6sNZFhPDCRYkLyQEp+kDQTB/KhHslAm7ZyJ9MIKuUWO7Wy
ITAQAvKqctl85EHRg8JDykySB6io33vWAOxvesCejKVhVnZ97DcPzlcVefD/rTg7cZ36f1gRrelR
RQiHgHD8vCIaVVpAUJAeTcO3g7/cBzkxE6TsZxSrzXbjeUNY/1VMPrhgQLxLMe2hJw9MUl4Ibivc
1qxQb04jIP4k3JKkerPOeyzBA7Mk4a+Ks6vkV+0SQt8HykXoQXLM0H8fy/dtOt7OlYXpFSyfUjxb
kdntt9WmP6vOCF6EMxidqt+3pBWutBAOWjbj6DDFSYovKH5M16gH/Y728Jjy6HT1oQ7MuEtKQ9vj
/Yawe1ZpGUNhUBr6fm9XR7Ck3vQ/4xdtknN/csmp92uKaIAISzQ3JhTxgLaHJpD6TKk88gUPxgCm
t1t1jjHKpGqujnfWuXsTeU5yzxDkc6i79hf9vU8RoV8rpI3d+HhPu99P+GrlTR+SFiw+mKb1q+5g
+JKuUf8+QdcgSczNjNVKz0WtOtj1YY5AXQSkwYIgZ8BAPsx4GNg5nUeVJ495ThBgWmFmRJxaBzY8
VGUznfKAQJgRhkH576o/X1REcPxA1xEw5esuDTNu0rDe9KPYvZiBqGeaFoYwYQaKwPEPJA8UQolZ
/s6KCG6EH2nqISHSeTOhrz/3vVfxNdXtFbUHYUlY7G3zOgdWrAeAL+FE34Yqf8mzDwEpv1NibeeB
p/4E1pN+U0eeVZMoD0j7ctV3K/0FlzN0LjR5un7aTofn6hwCNQw6D5YIbyYW8/V7L/19D3VTuu9V
KRCSQ9NlErCqS8dYo6/pL8bcnYoHK4Ip2g8BLNHAuR43DzJ+L1Nk3ckH3zdMbg5Rfa7kgup4qv5A
QNQxOdaYKDBGHk25xiyffumnOSjPjXSetRfWWA70GOnvjbqGVnOh4i8gG52bGasjmrM3TUF4EA+m
t+TkI3ZLeOjHGWSN9uYDx368pwl97vPX+2jpyQLc7xDjNPKJpe83UXXX4nWpkL2dXtkRqIuABML2
itiUGdCTFJnto34jEMjjFD082J0RHAziY9zAT65l8HAyaBHwzBgrLhS7md+lSoNQQdCsrnN+BukH
Nfn72dV+uo6AIFA/BDqC56c6z+z5Uj0oT3BRfyHSR1zaPn+UFu2HwFqO16jSktZzjnpsqLia8r1Y
f72ZbXf93lS/n1VEYH9bEaHyN0XWOrjndkXq8hFFtAlmvJj3WAeIC5W0eqBBENBgIO1mBvqDgOD2
wZ8LNU61jYkI7WC8MEOmPjgHoAnSZ29Wmkv0F9KmT34irOMTBfKm7b4vfHnxMtFE0LLRbhifBOqB
kE8LnuDDaxCq7v2uDm/U8Z9jN0CQhGpOIGnm2VSTrcpgogNBQk7timhxmIX9xMaTxTo6dxmakP4y
kSHwrJyhiLb+O088SnOSa+d3dS58hhwOjC+eQyaJBNr8cV3z2IKn76t1dJ5nB/wIEBLaP/1DuVvq
+nP6y/P9D5WTNuYgqclKd7n+esuIyy5sH+W9RddxDkkGxgqmTNN+UsAZKafqJSBMLtju44HBxYNE
wKbvBz8z7nOrAagBiakCAkoNuk5+LHDysOyt/P6hc6Q/oEq+kB8xHrgfocfD80fFkICqlEubEASE
WjbwalnFr/FAT1I8KHYS8xIRAb2VIgL6CkWIG9KFnL6hiMkHU9dvFfOKaDKYHGtpZF4A3a20s+qt
aIPpNlafMENHADI+CH5igKbz9ir5ra9rzPwJ1O86xTgBeeyf13k0ktmxvLbRMVoiAg/8CoqTFOlb
NLNkoB4zYnULr6vuEBga83gdYyZEYJLfh1wGH9V51iM9sfxQx3ENIaWo1FOYmTw+1JPJVKVAOtrg
SQHiOVHjn3rFw776gVZ1nKKfxNEetGCeAV9n0kD0XsjTRupA2E6RCZtP6y0A5MP4Qlvcz10H8/+l
VJp6Mb5JVyn4CWSl60niqpKVXVrZEKiXgK5SwxHgCBiOmc2hHWD6YgBjSmOmzozpbD24b9ZfHrRr
FWc7802Ina4xi31rJSB1/V26xoPEwP6K7vVrQsxSEXjMurwARhs4TxGb/znumKy5F3s6JpzdFdEE
EGb1hLjppp701dIwGwUf6s6slTWHbyqCCzgyA0WAguU0tfVVtZ+6L9Hx0zFtbJ5+z9VvPwutpjlS
nsf34zp+QPfVIiz61ed5scoCy0rBk8PJSoAGgXCjnQQEHGEnxfj6G7N6TG7M7L+g+FIsc/oIDTUt
oL39XvWZ7S+qLb4M6sE4Y42QNmOihaz7BKX3ZSUxoM3Uh3qifdL+9WL1RuOkbow3JkwcM94IaZOT
1AmL6vSg6vAd3cOzQTngRZ7x9NRlM0U0CerrzY6LXPpym5QXfUtbkiYscKEfVosBwPONlhEPHodK
2qK/DhH59qZqd7pOHuDyacV5it7iATGBK/1Bm3dTpH6+78Caid41sbYmqmk/RwICdRGQM4+EM1Q9
AN5k0K3z4aKumyliHsLddo5+/5+OEbhoMmgtmJZ8YDDHTSnlC7qPhwct4G2KmKz+rnOYchi4rKP8
W7+Z3fsZIQ+yn0HxQPpZtJ9BUtcHdJ+vc60+5eHzD9F6KusT+h03AyXvJz3C406VwQOYDBAAGF+m
6/c5ciXNvxCW+o2WQ/iNI5ytdQzJoukQfNleWHlBUMmuzj0IL6+tggMCqFo/+zUVBA5hrZR2xE95
AQXBMyumL7ZQZB0rvKa2YDIsB7UTLYRySDtL15kQ1BNoL8I/HjwmCDG0BfJ9SHmiOaaFSWknlR4P
tCnUmQmSjjFXoXXT/xATZj2IeIauv0weSoMgpbwxOkY7jYc44SaLvFon6BfwoS/JI96HnP+nIv2P
WfZIl8FW+ou5FjIkUMfvK3oTbVwzYux/TpG+hphnuQhBQwIEsLtfETPlzxWZOMYDBMxkCcy59gt3
cW4inf9J//QKn7vSrqvePJ948lGXPkHXmHTRh7UmRxWKttMrAwJ1EZBvqAbNx3TMICVsot9oKmdr
gLGYOhOi0l/yRH2HNG7TuTj5+KwqCVDs7zwwBDQob65g1nis8n5Gf3lwmBmSB2V4mzZ2dtZSGNCc
Z/bGAEew1ktAlOsxQasi1goIlHcrPpyS8LM6h+C5zV3zeXuCRNAgcDApEUgPvl9zvzHFEWhvPFQz
D0Livt4sbp+pmBTi8bwgcGz/aLgIX2a01YIXGKzbYBpEMLPOAQFVCgMVMp604vl6oUv/Yp47XXEt
1YE+eC6F3CpOIJQ2nLzoXgQ25iy0ZcgTrRQBzGToXbrOZOoxRT+2mCBVMuemERFj9HeK9G1afZg8
McZx4vieymPNBDJCc/xZCqgQ/5FKW9aEdcyYaHft8RMVCID34Ba481ynHMKiJFYql3Hpn03eZ6o1
USAvnJHQgJLjhrFEfqvoetpzxDhlIlptMpXSdDu1MiHQEAGp4ZiP1nUA8CAhON/OTFKD1ZtRmMGj
+WBy+KUbnLyb8UoMuEqDjpnmTYo8TDzs1O9T7i+CGvMED6QXaFzH9Le24n8UmVURvOCiTo2QD/d6
TJ7UMbPFSoF1GzQNBI5/qJNpEepoRv7h7COInaZwODcJJ0gAjald8XH9RmjtpYgQ+Eci42p2c48b
tzwT65eKDVFZoYByAbNXPSFOiv4YpwDqjXaAAKIfwcZrC2D7XqV5UX+9OQZhSb/jrpscF6SZ4PLk
XgSqF+C0kzfoMVuigWG+ukLRaw9V26B7uP9d1EfxIEXWflivwUsNbfVOHaMRQaxE1iC5DjnQ50mz
lG9r2pih7miBYHFLSsU21zkiYwAN8nWVv58OmVR5k5u/jbGEJ9ysKg30Exw/QfP9S9/4MZhmVvP3
kbW3BFQqhutM7sDi1ip1YfIzs8p1LqVaRGrcY5dXAgTqJiA9ECx+M8tEGGKvZtYGybAOhFcTW4ZA
AMwWCcy+MQv8iQGo6zgTYApg5ppq5tH1R3QNM0c56D6IgNnSk7qOmeKexHXMBNThIl3/0TL2CQKQ
hxRh8iPlN6NSfqoXAutXijyAlez/mF6IPvgZa0n3Y+JBMCNMuB8tgjUhZvQIaNpMGh5ub+LwwqOa
BuQFByRVyXSSbBbCiLGAoILo6wk7qQ30I3XB5EqgTLQ2zGGY/riGxjJJEWEIefxYESLxBES5mFt/
6NLGyyb/qYqQMO1iMhE3ffk8MCmhae6lOt0hPL0Jk7wqTXYo97uKe7oCqTNbAz3Pb/1F295R+ZGG
CQ67QkCUX49XsIFjxhXvvXkNv3yryviWfjB2w7rqN5YACIvtcv7eQBkrMulsYFKcFCuU/oFEwRTi
4fcsRZ4VyPenimiOfm2JWzl/34qsuJU1dBCom4BU5f0VN1Y8QXF9RciHmSMEwIDq0IPzSf312s8l
OmZGBWmgomPmgICY7SAs+gXdj3bFoP6tHrxfugTeLPSorm+jcwfGbqT+DG7Cgbr+vpRs0b7OSysv
5Rx1g1AQNLfXuGcjXYckCHFbfOptTlhjViFg6sFcOBHS1DWENmY3BC17p/W4WT1p2/mdyLSaBrSG
S/tv/a33wfYzYwgL8qsWPPkhmJMBATpJEZLgL4H0cW1nA/1OmuSoc5qZbhWdZ+xUCj7fy5SAfI9X
PFfYoU094G6qtDaD4MOECMkxSaIvj9G9kKSvC7h7rWCq08SSdfFrOkyAqpEFpLum8sCMndQ+0MII
niwR4GjG9yj9jsq3rMXr93Y6/xVFvE15Bgca0iYxNcexL8yVjXm3HFQ3TJPTFHmOZiserfigIs8f
WiSTEl6iHqqkOlAs7b4BIlAXAWlg7aL8icyO0Wq4rwWNRNcwEyEkn9IxMxzC9zCNcKBzaAloT+fr
+BP6yyBPU/9JDsFBdLxbwFY+aFmUVdQxC8Vb6ni/Cm1FOyMmAyaMegkI8uPhwdT3aIVy/GkEltc2
UmfZjhAPUDoIBkHnZ++YKREACEvWBcANQkP7wfwGPjzIpImb37xgrGY3RxAT2hU3cEKhWlMQxAgO
AgRYSwPydbhAaZlc0Ef0K/2GsH5IcQdFb4KjDUxUiNQbbRV8faB/EaRpwg9t5BTFp2PpMXt6LTs8
jQapdp7t6oEWCanvwZh09YjdHh26e67XIaY26gAJxbWrfvfUOIGWWk2wYjqjb9CIwZAIHvz1ZkXf
r4xBxgATgxAXNyFBoGOSXlPxrTq3q9pRXgdqsMI4UpC/L5tJzeqxetWdnZs4soa2kyLj+SZFNnVl
fFB3xsZURbTHD+o355ERf6m7EEu4UiJQFwGp5QhHzBzM0mcpovGEJKJBhL28VfE0/WSGj7C4Wb8n
OsTQZDAvITggA0Jo61ZIznpZ6MV8wqx3G+WBcKRcBAkBUw2zVh94eDBdbKeIADonds0fLkw5V+kU
Ghx1mufMYtVu9dpPNXMYpM26GYG2+LUihDd1ZVaMqfIDindwDoGidoMjES2GNtcVnEBhhk1AW0Q7
rWXLj5MZa2Zof9WC77ObVdfbSKhyEZIImZLOsYbUZx1E13d2GYbCljFTV4Mik+AflH62T6+8Uses
0rBu8gOlY40QjYLJDOPGa0n9inR9/KLuw6TstQy0C6891VNNyHAfxVpEAKmgXX5PkTaAhdcOGXef
c+co048TrvPiKtrm+xXRIMAaEmNSVU0TrlR3b/76shLwTPrJIGUxgZjkbqwqG1Qn8llHEYsI2o03
q6OFsmv5a74COn5Z6VnP+p8icoL1NN6zQlawdvdzRdYRcYyoWwur1EA7P3wQqJeAeCCYHd/rBmmS
OPbW+WMUOc8sjwffD2weEm8GuUrHmBZ8uX0eIA0+tqu51g1QZlMIZvI5yw14Bnn8QWewegHq1xuS
6DPTG6+8qxIRs0ndyAMFKZxVRxdWFGyxe1kTe0Txr4peUCEkn1F9/qMyWd+BbDF94U1I+8Fqhsvj
zkS9q2k+3ALZkIYZJnjUIh9fVUgegdKj8mqV4e+Jp/N9MtbNhl932ivkhNaKUEezov9O1LnrdL0e
4Rk6IST6ws/Y07oIbZtJEmRyp8phPK6flrDKOZxlEIz19C8YQ5L1BIQ7pkEcG/oEN7bjBOSxxbz8
B5cYLRGN7UzlwbroQAL1ZTyi6fAMljUsHYMV2ixrNPQnlo5+QXXl3u0UIRRIkXyYtHAfGuTBin9U
LBOQy4T+3lyR55nJFiZ5xgYTR0iJicvnFeudnKRVz84NMwTqJSDsuLwU+i8NQAZfMmDGmKWIhsOD
wkCOBwbftorMShnAPIyQGmtCyfBnncAcAlERSIPnEaaH36ek96eO1AExGXiYEYDMslKD2oRgZCaH
sLtP7YxrWZVuqymolQ8CgxgGleNJsE3HYADZMfM7SWlvccloN8TLA5yP3YuwYBZdsVzISvni7FGz
bvFG6R7afqpiPePBk82quu9duof1PAQRgYnIiYq7Kf7VaStf0DH9zgRlO0UIl3hzvA7NOHbtvjKG
GSQy3v32WkWlojxmaKbezFyrWvQf5tR6ArjhrDNFf70GRJkIfq+1JvuN/Hn2GI/T1T5+e3PcC/qd
ShKVKuMmBWjGyxJwkEArn6T4uOLDivTt2xXRiJkgpE18GO+MFfrkO+4+iOcjiowjCIiJmIURhEA9
Agcz293VMNH1/+nBKrjBdY9+9yMWXZ/qriNwKZeBmNSkKAu32jN0jXWT9RVRy0tOXcf0EA8MdMwI
aC48CMRkQOij+qcGN0tGAL/PJeChqCd4UwHtqGe2TJ4e7xzCRGWz2PxFHYdCU79pizfZ8U4Is3Ef
sK1D3lUFaaPk4zKfWKvBqhsmx+0UERaEbysidLwpknOsv6DphOt/CpiWmCkzHrD3EyGfi+lP1ZXZ
eLVAW5NCCUFVb2C27c299Whc5AvxJ2fv1coj/7XrqBDksYbiNxT9ePEEhGmNkCQgXlhm/TQZWDNk
rZDJxgo1Wam8P6hcxijrfMfrd7iep3Pru0pi/ahkxvVjl/Vj2oq5jnsx0bJBLyZnCyMIgboIqB48
YjP41OS6PtUNNha8MTOhJYUzupQASbFoS2AjTxY4MT0ww+4TdO13OgEB/UzXv19PXRNpdtfvL7lz
5+tvuK5RR/BCZ7bSUt+GAsSn+nKfJx8I8FJFiAYvQDSSePg//WDxmdCPuBsqvH9iryVUW8dgZkud
IB0CM9d2xRmK6yqi6aDtQZw4pKAZ4EBA3miff3ekS3v3VbxWafbXubiTRbJmtPd4pYPQvLCuV+MI
N511Whr51tIKPabfqYMYy/VU/phUj6oDf/DDdPZFxfi6C+Vitpqi6InJ14XdGtrALZE/ZIpWz33V
TMsI/HpNhHU0IUqi+lynP8QwqI60B0Ii/E3x+RqZ9ZmwKb/f1F24JVypEGgaAdWDigYqZiQ0Jcp9
SPG/yfuUZjudu1xxfUXMIWgJLNyyGMtsi9k0Zrr7NXCZqXLMQ8Z6S0NB+SEIyRtB9wvFw5VnNacC
HrZJSoeZCXs14XTFuKbSUB1IrDwRSmhe2NAxa6A1lIOuMws+WRFhjjbax8Sp6xCoX+ivJWjT6ufN
MlsrrytcAoQg/XOWMGEy8IIis/eNFCmD+Iyu3aF7WK+DgHhv5V79/pyO6We0JQiGfdq8EKUdtIf1
gGuYTeva7WmV0jm0K68RVkhS+bTyPkRXWWcgpJl70272btf1lufJpFZ60rEtTb9ZPtqgu9kLZp/n
m5Pko7RMVN5KXq4PKpXLOEY7O1L3kHYgkxbqA8HxakA1zZOJIaZjxiUWkHq1zVqY2fWVHIHlRkAa
9NsLO0xb8YHPQvd7HaaYY/yDhxCmLgcqIrggBBwBsC37GTMD3Ae8jvBe4sFaRRFiY3fmSjNR1pT4
AFpILkqHyQNtB0HJzBShztb2fchH6bDNo32x9uID5iov1DB/MLNv2Ayie0rKHzx+qMgDDLnMUvyW
qyOanV9wZw3Fa1xoFV479HVCOwKTZQ0sDEPKPkCGP3bl4QrPWh8xGSa5Exm1iT4jgjGTjN3RiPwN
On5WaQ7Sb9YRMLNep98/0l+Izs/W/ZhhwoHW9R9F+hgNDbPesYp+HcVPCtB+0Y7i421r/UaIYpql
HdWC7/tLVZ95NdLGL9M39YYyWamM7+omzJH05RYuA69J40SCMN9I6XD8iY+vDfQbU949ifPxOoAB
7YaA6jUpV2oDffBHxX4EpLpB1jyneykylq9QrLZOm9Tw6sXN0q2kCAyEgHiIWHvBjFYtIIAQjPHA
rJmH+w5FyZtCfD3De9qxznGe4nFOsD+ogY52c6EiRMDM+TOKWymy+E2e3EtbKrUHQZjUDDB1IeBv
UmQrIdYukoHZH7NNBKUPlMXD+HfaoIiQrjf4xVmcEBASCNQbFBGqeBEdqno8rWsQMEQNFgS0B+zq
7P+FMEgGzECsCzQ70P5Q8ECYVTL3uCNg0OLoe/pslzRcde4up/WhPX5KERNbXKsDY4Tu64p8Byc+
UWH8QdLUy5MGQpz7k+ON8/TPl5XHc1XqT70RoAQmNORbz7oedcRxhVDrWeJ6XFt6p35/3N1LPhA7
a58E7wn6CR1DovHAWEAzZQ2ukgkb/NDKIW3KHIj248uM41yuh/qPdkPqkA9jg0nECbFJRKLa4U/f
XwPR0tPys3PDHIFaD01a85ilPqI4u0bbWUtBiCIYvEqOeyy/WXDsY0ZyGgGaCuaZh+OmB3fsTRez
NPhZU2D2hUCv5+HqSAjQdt13qOJ2irzB3qcusXZhPsI85TUg2uEfevYhS2oitYYDgpZ2vEhCR8C3
qz0QKbsKh/Z8/cUdGy2L8vzDyjs2yQX5sDwnXKsJ2Fr1WtbreGPRLnBEU31MEbNNxbUAXXtEbUTb
QpCxiWh8MoLGMkURvJLaCBoBeIF96CzA+FBeTAbQlj1eCDvu5SXpWo4L1Buiog5oZ7MaAASte3dF
MKgUIBgmGmUi1TGmX0zN1JeJyP9UzzAPxqPa47ViSCQeGBOM52paGlpLUhtsoEl9koJjGn5oa2id
mEkvUuTF8WqmN65h5sYhiPpZMARqztr6QaRBdr9OehNURQjdA4Ipoe7g7iH/qsERUqXZX63b/Wx+
lhISq7UB4dCIR1Stel+tBMQ+IU2Y6FwlT6Ka7VvRCVTXW1Qm0QfMMjWD7mNdpt/ajM6jjTKj7hcc
SaMtJjFs14lZNQtNzxPnAMyxAwlTdROxYnATHEiqHHSOMompwU1uGp3ghHnpXkgjdbIykAam3ePK
QMvFGlEzuGf2GiUkWjAEQgQGogEZdIaAIWAIGAKGwDIjYAS0zBBaBoaAIWAIGAIDQcAIaCCo2T2G
gCFgCBgCy4yAEdAyQ2gZGAKGgCFgCAwEASOggaBm9xgChoAhYAgsMwJGQMsMoWVgCBgChoAhMBAE
jIAGgprdYwgYAoaAIbDMCBgBLTOEloEhYAgYAobAQBAwAhoIanaPIWAIGAKGwDIj0BABaXsQtllh
e520vZzYEoftNviUwI3LXLMaGagubKXDh9vaFfmaaHnDS27V9R31h5202WLl++7N7YaqpTzYeJRy
3qZ4gfJgG5hy0HV2gWZbfAJbz8R3A2iorJUpsXBh+6L9FdkqqZ59vxg75wi/B5qFg+rAPnp5Rfb7
I2/2A4z3HXsZnqzIhp136Tqbo67w4LZcOkwFs+UOOIAXkc1ZZ63wClmBg4KA25iYXfCRNXyGfnns
7TgobatWaEMEpIzYroQdoquFLwvMKUrANjx86dPvcNzsxu+iDNnEk21HfqbYh4D0+92KbJSIUPOb
PDZaBzao5FMHbD00U7EPAen3B10Z5PuMohFQhDAbbR7QINjsHdg0AlJe7DHH7uoQzc2KfQhIv9lL
kAkK3zLieIUSkJvcsJcau8ZvmILVNkrzIG3QM9TeIJaWvAEE3MbAtTbcbSDHASVlAuJlDXsDGgGl
wOjJhH3YKm3wyAP/URffqc79th4gdu9tdmC/MPYRY9fftM1E2fiUUGsjymr18htakibtY23sE+f3
MmvannHNBmoQ8gMrtGF2lAb/+EajlaqzLP2UlqffDw2tIm3fQLSMdkUIKNwEdkUFPRPs6H6Oot8N
m33b2FwUbZ36rKXIZxeIfPqcr+b22zNvRdV3ZS3HEQ+bz2LZmanI96MGK/gvBVC+/yzHYNVlhZXb
qAbkd55m1+p9FNN2v2Ur/mmK7ObLVvtfVUfzQTJPCM1q3JHK6ERFhNty3XixSoUv0zV2+CUsL02v
WXit6Hwwv6EV7qH4aB2FV9qRvI5bh08Sp/lg+oN8IEm0ZkxwjGGeJz6fgEZ2tiK7hW+nyDeKIKGG
vzs1fJAZlJqC8wmKb1WcPSg1GOGFNkpAHq6uKjOy+W6tiAcJEwfb1d+ueE8zsXZmifZm5tloXqoD
M5UhMVsR5nwqmwfpMdVrMD/NEIcxnByoPs3WbhrtqqGU/vOqDKYWwqWKR7gdvuN1ZEztpz5Fk2SG
jkUBk/NyX1sdSkCtoLr4b3RV+xz9CqrKyCtmoASU1cPRqgcn9fsfkIOu8/0TCIgvffqPdg1ZhFVf
Fqv5hgrfj/Hb5CNA6/neUEPtUll8Q2VjxVdU1uxGbta9kAwfrONeNAwcLrbTHz5fwNoLMzq+NdNQ
UB5v0g3kTZv/rbwH9CmARKFg5x/whuqzMiYWxlgHPuvaxreBsAxUM//xNV6cOVZVZP21IgEpb9YQ
tlAE8/K3hRrFUflg/sMMyPhK+0hjzSyVBwvpPPNPNDr50L3r6T6+/vus7m3ou0G6F3nGxyNZu/1P
rfVnXV+ie7wMa4iA3POyvsp5tdFnGAB1/7v4G3OOqfYtpZqYD9cEAyWgetob937qI8Sd58+XXSZX
pq0RKc3/6ToLtAyMM5MCUdcxYRAZAOfWU6G0NMqHL3hiLoR8cFx4wy3+8l2iPypWNB0q3Rq6jplk
FcXzVQ8+oFYOztyCfRlSO9fZ/jFJMfggi+d17j79/bOuV/uUMQOWcvgQ21aKPKR82nqW/vLdIBb8
WS/4nSIL13UH5cFs/H0uXwQHZp4HdR4Svlz16vftnbozH2BChyvfz0EY/kx14Lsz/YLDhP7D8xIc
mxIcUUxRZmjxf1Xev6mUsdLyWe2PKGKCZQxU04gRjju4vH6iv3ycrVpg7QoTL/09qwIGTBxYu2BC
g1coz9pjqhdOQL9SfSrdB1mBMYLvPEVI56uKeLniFMHYJI9blAcWjH5B17+gkzwzCPuf6jceoTgp
kQcepHx0EMcS+jDpJNQnP6XjucCph/xo73/dczhT996aVr4/p3QQFkTNM0y7mPQ+pPP/0V/kC3/L
Qed30w+eJfqXSQHhPTofn7j9TecYV33MnkqDTKKN71HkeQEnPqD4d8UrlL6i16fSUS/kwUaKH1Lk
E/Y4NrH2hyPVgL9xFm/fcDoeKAEBckV7tEBlNvYJB8Rf9De5BkDnMVMn0NFpTgrc79PwxcXkjBw3
a8x7zJIGRECqJ4OQT31THx8YHJz/muLlimgrlQKaCPZ8ZnsIij4EpN+TFAuKz6ksvLD4hDHE48P6
OsBleS9dP1yD168nlRPoPOSGe+bxil6bwPECoUf0gdnyFYp8xrquoLxZezhFkTIIOFJQxhfd708o
zT6ql/8abV35JhKxztFoQKjStwgiyCeVgHSePuILugj/phGQ8vIu2tSbDwimEpCwgSBPUtxakbFS
y9mCfJmdE16sJqxcGshsiiKCq986p8pH2DKmGEPxAIHsrPglpTlR5aRpTlvpun++cEVH8EMcPpAH
k8AvKo+9lMediTL4CWFBQi8pDX0FFjz7PkCKCPv3MdaURz/TsJtsMHa/qei/PMz9aON4ue6vNMfq
L5OhfmNJ16gjz9h2ifrxHBM+7Z6tu2LX8Y7FFBoPkAn18OF6HTApLMs55fMN/Z6qyHNPoD7Uk+eQ
sbitKwuHkj7BtROih/TjAdM5gYkJmu6ICgMlILyb2gRqmtrIw8KAwXZNuFoDJ6nKx9XdSqzvCYfO
TBNifqb5xkB6THVfX/dhg+chZo3iu4oIWuoG6dAGZlXVZiUIHLyTeHDShA/1hiwYWNcqrqN4jOJf
XZ156Jl1MYP7hurEbC/pTQfR4mzBbI0HhNkoZhtIg69R8tAT7te9dX9FVWUhPH6oCOHMUMRk2q5I
3zJ7xUWYB+sipf1Eciboyqznz0BMmN6xBKFWzTTiH/RmOzDQZ1McLp9S+3dR+29OaSwauJ+88Gn3
Wo428XFMf1YNjqAYD/08LJ1AY0zhUcfzheOPn8jRf2cqohHQf28or5mJwuK48qwyqcSx5x8uHdoU
4w5ymqE8tknR7vzaHgJ5qiLPD+PRP5MIbMbZropoU0x2ykF5gsHXFb/jTkIkODhRN54pSPRoylfE
3My1+P1vduVtp79MQpi0oE0QqBP5baX4Y5W1rerPs0r4gSLjHSeEsxR5Pmn3aYpMEBizaP7lZx8S
dmmZRFyieJUi4448tlWkbVgpnlLaU1ImF/QH5INco5yZishPCBvZg4nVl1dRiwprvxKFRgnIA8PM
JM00468zMAh5RWaGQypogDDAmLVCPgyiYzVgLo5XUmkwj0BQydllo21hBsX6EvFolTM9lsFdKget
CUFCOZ9yxxF4+TxmEVR2HlRmq2fEB7auo/avrsjs8Sj9fljX69WAEDCQD3l8L0l8yguy+5UiZhGI
oKoJJQUUSAQT5cnKiwe/EhHxwJ+r8qnHkAiqS6/q/AdVhr5DkG2m2IeAdB2ixqSGAMFc+3yDlV9W
5xX6B/JBq/iG6oz5tRwgHf24ThEC2UW/76kyieC5/ZKu/zKWBWOTtkMOzNLpp0p1BgtMv5+PTzZ1
/5M6hybCWNsEzBJazJY6j2ZP4C9rYuWJnNIzUWOMUgdIhIlQXIuCFLCUQOxMEmYmMIC0GMP0H88P
lgTWXbC6EHnGIG4IaLbO3xS/3x8rDdoRJAH5nENecTLWdbRvrCCQJc8r5tXyZFDX0RK9VYHyaGeZ
ZHQdDf8axU+nlb8yn2uUgDwWdATCERDjgiV+/LCuofYORbsmdl9mXoSrNBguSHayzj2hgfFznYeo
as5WqwwSj8nNCfLxt4ATDx0zqaS5D8GPiYnwdHJW5QQlDzmBB3GSYr0ERN9Q3o1J8iEznbtb7Ueo
sl6FoBsIAaEN+wevCkTBn3VxyBCQqyiC7krFAxU/JCzeJEziJlYwYc2D8CPFF6s1MOVaLXNdxexU
F4SyNyHNSpKP67+/KN2pOsbEvLci5t1KZkomWmkaHuY9Zuass7FO2IfkYhVEY7kkTj6uDi+qDpio
b1PEHMd4ns01R+CYnZAlMxUvjZOPu79b6f6oYzQ06oDJMyQgnccCwLPJ80XbvFWhXC3ld78jB8x0
W8XqGx7qGs+cfz6raepouTwHTFavjZOPqydy8HjlhybE84omdEasPMyQtBNN9scpz/Fc3XuIrkFE
cTNkssor3e+BEtAsIYHQRoX0HUcn8GDQUdiSmTnfoni4wL0yObgGGUkGL4OSUM1sdYeuo+lhyhho
YHZIqCTAwQ9TBqSYNDXGVfFKarkneEiybnOX+oOZIZEHkfvQWiEM1l+Y7VIeOCEo+dtooN08sMyM
MRlWMyvMbjTz5Z1e+CwULr9VORDQLopXeLxc2RvqLzNj+u6ppFBZzvWjj7zZlwlMpfCCu4CW7Nct
0tKy2J5mTkdgejMbZuJKAVKABNKCN5MyvomzXSKOPYnShkXCm3PJgOmOhXrIChL0ExWsF8gYAs4f
lcyfmBExfft6xPOvNHkup3HPxgbuBGOZek7S3+SzBn4eQ9oVEpDS8lz652eWjivVc66uMeGDqOt+
jlPwGlanGiUgDwyzcdTM1CDQUWlR/zEpoVpjX632oKxo0BCGXnvDdlwpPKYLOFAsCwExACEWzAGN
hqd1A9oB2g3EDqbl4GaRkD0B+7i3cddVju5/txKyzoMwxfECc836iZvBpxp5VCqLsUWb99ZYaVR7
qqv+KyAR6wnMrD+kiJfUbWpLh/5iTt3OlU+fzBpAXZZlpgsZMEloV2SSVykgdOk/zENp66j+vqSD
jz/PJMI/89Xu7xQulcaetx74Z87njUaAVkOAXCAfziUDdUMoEzZCoLvJLBYYNCKCn+T1u1lpWZci
DjSAsy/frysxKYuXSdsw13o5ESfSia5tlH99BaLnGlokZkFf1kDrO6zua5SAfONaMANUAlPncWXO
KzEPLjbgtyo2SkADNlE02AMMnNSgdhTVjPYG80sm5wGmDBa2GwoqH++in+kmCOggZ3phfz2EILPa
0xW9iQst0y/+1ixH95MnJhbWMQgIGNYyHlGEdBFchykmzYI1844l4CFFWA/LgPASTleo8oxjFtRZ
q4OUMCUd4Bp1L9pSnQ2Mz2yXhYAQ1Dy7EEzcLJisBhooaSCgaqGiAB9Au+q8JTRre80ATZJYKzCW
PIZo6z4sT42BfoJECMgyYq0QJ1Lux9RHqNZXyIh6zee1yh821wdKQPU08CUlQphhE+WBbTT4e6rN
vBrNMy19LQz84FvWsga6jvRrFcwM8UuKRyoyE2egYjLz60N45dxabwV1PzO1sxUhH5wtMBegbWFu
XOiJTOkgNz/LrDf7ZLplFQ7VtK/lPTZoC/hgpgUHMIeAwA+hjknmLw0Ag7mUiRVjoda4w3yDIGOS
gcbDu2Le6oAzAAKL2Tn1ou/SAtcnNVC/FZmU+rcrYi1Bi7taMW2s0P/0M9f+6/CjnpgGvRVjeY4D
TGaYxwiY5C9XrLSu7TWjuLmPSYA3u1UzYzIelmWytyL7rmll1XwIlqEkZlWe+SvZPcm+koDxs6OB
mH8aqXbF9Q0JAOzMWzaSWTPTOvsznjGY3xA6rLF9LFbGLB2jaSKcGvGqwuOOtoEtnnk3JuutshGw
8VlmM5tWKy+EjRdGqf2v+r1TaeqZjdYqq9Z1nDUgdzSeo1Xuf/T3a+4mXlL1TiC18uE6jgoPKOIV
tofy+o3u9+s0afdDICxOQ1gIN09AECKmKbwMv6BYybmAse37cFknAvW0r5E01J8J6raKOFLg8NNI
YL0EHBDqFTU4Z6YOx5PKqGjtqFIw9cQUT0Ce/Vr5+HWxeuoLGXlCos95WTWNwMgbTXtEhYESULGK
LdMDyOwcwUlgMTMe4gOh36Bwg2YgC9/xMvyg7HU24/g1BhCzGcxQayPolSZN0HHdm6gGY2CwRnOh
IkIKLYjF3vjDtkj1TmJbTz0RbARIi1l8Wpiqkyy+MoNb3pOAZPntOoFwgfwhmptSKvhV1zeV6hYn
sbQFdrKsub6BsND4QOtBaHzUlclfTJSMoUYC/XeZIgSEEwwRE2ul8B1dgHyoP2uBPtDnCEbGwtur
3M+aHgHzLxaJoRTaVZkbFCGg3YQx6yN4gfUJOs/aJFogbdlNaegLAuTF+txuilOU7m+YplMaCN7g
zDrQZ6oAkKpFIReU97O6j3GG1x2Tt37WBtamdP5iRUjkNN2HWzXepHEzPp6TmOTSCIjJhO+vfmNa
+SOrvSmVcbugDhlcpblD49JACWi0AGFBLvlg80BgskJwzFBkxo65KLn+wW9mBaT9P+V1pycJBzSe
KwwswkCFn9e6VlGeY5V/eaFVx3N1jtkkBLOfIoMak1Q5uBk2Qm5Z7ePL0tOQMGTB2g4DjgehGcE/
ANjUEWB9TDhqO6amjyvSf/TxilqP822DfJh1bq/Im/B8oAtHljDoN04TaIL0TSXzCxMb6s3DWsm0
4c2io2qAeq6uf1KRSUBBkT65W/GXjXSGE0aY7NCiWPO4RG2hLxCezOh9+8B/R0W0H8LvFa/w1xE8
ug/iwsFnMx3voHOkKQedo//QjgkIwzJ+jdR5eaV1gn2m8se8hWDeU3WepvNla4mTBXvqGs8pz295
sqp0C3T9Hp3bRfFzihDZbQkM0PIZJ5jzKSst+LU4xnqlwNoo/Qb5HK5y2eOurPkygdV5zOP7uwyS
Tg8QLSZ0xiEvnE+PT3j1GzMq8qjauiDPKWuQyEPSHaTIGBzWoVEC8mTAzBy29w+4B4FO3Ezxre5E
O50isPHuiAfMEKxt7KPIQ5JTJ+BqSaCTj1N8SnES1waIMGUQmG2eofx/p78PqC6eDKkTs3/a8j03
iB7SMQKBAXGUIrZ+CJQF/8EILFqi/eBu+nPVkQGItxGYIDx5eGlP6ECgtkFU9QTaztoGJqxTIWj9
RejTf9jkpyoiBHngGexsZ/Jf5f/PejJf1jROOFFHyA+vIPbRO1N/meG+SZEJCvUCH2aOaYF+QzBA
LkfofrRe2sA6AoF+hgjo4w/r+sHu9z/ikxUSOi2I8UjAa5B6PQShVCi74mnd86jKgjjQbKk7wukB
nWMCRH+C/6GKjFsCRMyMOjkJ+KHOQ4jvVWS3A9bxEIrUyTuoMI4ZH7zr1XBdG21bo+ljWFyge3nm
x6kdECl9g0kqFPgu3ymxvvNFsW7ExAAz9S91L4SNmdNjcIKOIR8IgeNkIB3jgX7Y0o0BbxJlfOH1
uJiJn+sfJtZMipg40F84n/DM0FfHusyZlPTR5HT/zUp/pc5/XXGq4hj9htAYz0wCj1bcTrGarOEZ
hVB9YPI+7EOjwt03Gu3nszVaz0Bi/6bfJNPpHL70MP77FDGxJAcHs7UjFBmYEFqaFuK9q3hg0wJa
DWo6ncbAJO6hGJo8VIdnVId9dXipImo+Ai4eGJz7KWJjZ4aVNjuBBCifQZjmZEC9mfUgCCvNbuiD
ya5gFp3LQXVkU8lvuzoyY2b2XSnwADKzSpJ9v/QQidKC7yWK71FECPrFcdIj2BHItJ9+Bqf1Fber
Un78km8r2DQ6xnw+TBjOUfyuIqYP6ugDghoHCYQWAsibFMsJmEmrjUxyvqVI//5WEU0mFGjuOuNr
V0WImPGIWQ2y92aeeJsYJ5hwmFyhrZwVv9jIscq+UXWD3BmTn1KERBCmycCz80Olx9TUJ+jcXOXB
eKYPMQn+OOX+h3XueKVF2CVDXOvza7XJNIxbPzbTxq83CVV6BsnPaxaVxgLPI8/IMYqHuRivB2bi
8xTj/R9eV7teFQan6pCJMX2DuS0ZZunEUUrbzwSpc2iSTDQZJ5ibGQM+MMYwv4eWE9dnPJ+nKaJt
EZPhVzrxdcZWyjXaN14RjW6qu069vRmY/qesrymmLT8k5cuQm1CktLnmqUaFAw8wgqFWoPN+ro5o
r5SQh0Kdv5euM3DoaEgNGzkz8xt0/UkEqo6Z8SIYkoFBgzbArKFf0P3zdP8BurCTIguV5OG1ojC9
0rBbLw/xlxUhQsiOuvPg3qfr1+s6A/c+F5PlcM0PrH4DXNfQSBB4POzkkRYQZlMUecBvjydQ2Tz8
CCceYswLM1My4BqaJET5Nt2zneoNLlWDm5Vx33aKkBAYgf8sRUxeM5XXEzpmhsiM+g+18oxdR+Ax
I2x3eTZwa5TU9R+ECxmgpUISzIyZzd6u67erfjyof1KMr4/Ey0K4oBWsr8iDfnOiInfq936KaEEI
U/JGE+wXVB5aCviEBKTfTzfcqNgNDn9wwsyLlocZah1FNBZMPszkmcChuaUGXWO3DsYvQg0TzbsU
mfSgNaHN38oYr3D733Xez9orpUGQ0gdoUmkkhsBnspj6DLpyGT+UQ5p+JmT6WedPUzse1d8PKaJl
oH2DNe3APHljFQzu1b2MY3AAQ55jJiT0O/f/QvfzNzXoGvfvp4tMhiEhxgnPMvVGwykHpb1GaZ/R
iY+5skiPXJmlyNi5UmkYo/2CG89MhugX+op6QirIJOp3kSLyB027j5xymc3WX2QNxIfMXClCQwRU
bSAMBA3lhwnsQXUqwneS4us6x8wwDDpGbU0NEJgupD0U5fRKw8PxD+Wf3IMqnoaBigmOQbuuIm7I
Xg2nDgg4Yr/gBD2mlEp1ZHAye6sYlAcPJjP9tMBDcZIi5LO/0qYKR9WdmTLmOR7AbygyS6sZlB/5
3qb7EXxot3N0Du0nDDpGKByp62N0jLmgruDu495lCsoHARDOalUHJig9DnNfv5uqFaC0zCgxlaQG
XV+iCxXHWPwmlY+ZhoimiLBY5uDacr5rH0IXLYFPdyB86wpKywQGEzOTnPUVIaDnHHYV89B1BCax
Wpqq+CgPJqNVJ6TuWcI8WDUoHRPKX6sdTDjRiJAFr9W6j+sOx/N0LwKdZxiN7mWdr0je8XyVDu34
t04OhdpxpXJ17R5du8dNfqgrL+HSBzWDq8903Uv93qII2cV30QjlYVpGuhdS/IHubddfCCjNKlSz
DkMtQUMEtLwq7zo8Vbg2o0zlX1NddcKKNYEhETTQ6BvWGwh/qUQ+XNS1WW52zkyeGVJdBOQbqvuZ
bRNTQyPks7zAUx382t3yKqJWvpiHNlREQ8bU0tTgBHV54tNo5o5Mh8z4bbT+sbHIBKg8CWokH2HA
5GB2I/fE01YjnmSejkzqIriUe9GS/Jpi3dXVM84EhfUuxmCaxaXuvIZKwiFBQEMFjCFWD+zDvn/e
xOzOPWD9qum0N283HvADOMTaP6jVEaaYNsGfyQu2+/9T5BwmnXBdwIIhsKIQ0HjEDM4aFQSEVQRT
3rAPRkBDtAshGw06b2JksZrNMX+uv3hgYSJABcdsiBp/vCL2c9acfjhEmzTcqgWe31RklotWid2+
XbGiSW+4NdDqO6wQYPKDmRVHI9bGV4pgBDS0u5E1rMsV91fE44uIXR5zFHZkFod94Bzk492Mh3bL
hn7tWIfAQcAHFtCnKrJmaMEQWKEIuDUgHKpWqmAENIS7k0VYaT14zsxSxJ38w4p4z/BuAwFb8h2K
eA6yrUs9HopDuMVDqmq8y8FME3d/1hYwvd09pGpolTEEhjkCRkBDvAPdwiju73iC4aKKyzSqOKY3
POj+qDS4slpoIgLCFE2SFwQtGAKGwHJCwAhoOQG7PLKVUOT9JKIFQ8AQMASGPQJGQMO+C60BhoAh
YAgMTwRGHAHJjIXpCg+yUqX3g9wLbanXY/fT4+wKjru0hZUIAV5cpjn1vD+W1mw3RngpkrFhY2Ql
GhvWlOYiUDcBuYeS7VDYsoRPcvMy1HAMrKGwvxlvL7OPVp/gXvaaopNP6fi6lJfTcMf13lG4RS/z
G//DEcR4nYUTWwaxnQyL9Wz4mbZ1EmtYvDnO+wx8RoItTfoF95b4JrrAvlvPKt2AXkocKKYqn+1V
2NaF8Z22v1o9WbOlCmOElw3ZnLK9npssjSEw0hCom4AEDNvlsCEjGx9+RfH65QkWs8jlpF2wc21e
cZZiPwLSOdxvedGLd3DYgyq5LQfb3XCdwF5pI56AhAGkfJMiBLOj4u8rjI1pbuyw19n2FdKw2wD7
5jHR2VfxquU5zlLyhkhPVcSzcKAEtJXu5d0svOb+oNi+gttgxRkCwwKBRgiIBvktbZaL2Umkw8wX
AYYHEvuvlfeFayKavu7M1tNCrevx+yrl0cTqrpisnOb3RZXGy613iPwbedP6n7qH/ejY/DU1OLMU
m2Wy59w79Hs9ldFvc0pdw8PPbww6a8W0vk8p9D/jblnGnn9OGB/L5VkZBFysSEOg6QgMKQJS67ZT
xOWYvbZSNwBtAgJeINQSDJWus4swL4ayTlBph+smVHOFZ4HpyW+yebiO6yYg9iEToXgy4bsqfCI8
KcD5zAGbnhJ4gfbrimnfaMH0RmBTRnbCHoxA39caH/XUqxl51FOOpTEEhiUCjRLQ8m6k38p8fooA
W95l15W/6sVOxVfUlbhKIglpTE2snTw40MXuZa1D4v64sFyWvc7YNgjzbFK74ZMX7ADMjg3sbM0n
FvoEt/6zszv5hnBh2yELhoAhsJIi0DQCciaWMD8vONyGjvFtw7vS1nWUjvvwTvMfr2rROWbCfhaN
R1qqScR5rMXbQdrUb3I0ow9dO6knAru3GnkoLeakeECg4h3FfmIIWha62XOM7XXShDGY+EBZFc1C
HsMY9uDu8SQPvLH6CfQY9mzt40Or6zt++3bWms17pxR2afAfC4y3CfKhTmg9fMJidZUxXnVaGEvE
fTiIEKp+/iGJLVpYEkP/O+aVRvl80iE0kcXGJ+caNqc67OIfCvN9VHP39Up1tfOGwEhCoGkEJNDw
kDsLQae4qx5OPtrE3mSc5+FGoNyk81P1sPMGfxj0G6+oixXfqjjJnd5Bf2cqIvRwfuC7JTg+lIMT
KmxPw6cH2KLGCwK+ksieaWxNU1EoxfNq8BgvOkxVkBwLzdSzT1D5rKOwHsIH0VjzIIDBre54L/3l
S494gvUR7I54t9X57yn6D2SB6UO0S236a4X68k2hdykN5aLBsOC/qyIkhiMFnxU+RPdjQowHdtil
TfGxQL35yBekhBca5rK09Zp4PnxTZW/F97kyy9dU7qb6gaMCbaV8Fvi3UjxQMf4tJMpjHRAvumQ9
w/yUF0T2HVeWJ01MgFfoHBs1lsdWrHKMMRxHPqH4LaVlzYp9tfh2EuMTDE6JN6bWsfJ4v9JMVcSp
xRM9fYR51oIhYAjUgUAzCQiNZWvFrB5C9i/7kSKC8GnFSYp8cOvbiu/T9c9IULBzM4GH922KCFuv
LWGaYgt8BBbEkjY7RdCyVxdpEeR+Js1eaTcozlBEUDU7rKoM3+sy5QNlfYLaNkknaDuuvAh+XHFp
BwvrEA9hviIE/WhcW9O95H2m4n4uHd93QesB2+0U+XrjAbrnipRGYdICf4gDF2BMfAh6sIMAWHfh
s9376/4/x+5HAIN/XNuir2gb4wPhzSSgalCe/1PefNkRAlpbkWMfEPxMFu5R5LtDFyjOcPWK50td
aessxTvjF9yEYzudwxOTsQKG/sNtTF7YNufjDp9HEpWlHZTP2AAjxsXnYmk4X3dQGZgTr1Zk7DKO
ceknQEbU+291Z2YJDYERjEAzCQghCwmsr4gARvidKMF0nR5YhCGmF0iDxehDFQsO93b9PVYRAc03
V76myOI+s1KEL7PcOfE+Un676Pf3FSEftBG0qvCDdo78ztfht3X8iM6HX9RsYoibV/qYWlQeBEr9
IZ/ZiseofN4Vol4IdYQn2h2aGe/CJE2FLP7vpwhxY6ajXT2O1MDom4o/0W/ew+ojoF2eFMUaDBrY
6S5CgpzLK66reILuvzNmzkODhGQQ6rgfE36qyMam5IOmVu/HAv1E4Qsq466YyY9yCVehoeia/8zE
mjoeq3N+zQkiJLymc6wVxQPkzJignkw4DlaaP5JAeWDOZHxhzjxHv/fWtfjH3Rib3vyIZgnZUgd2
tqbPbk+UVfGn0+aoB+SDo8ShKitsj65B/miPX3AZ1DJb1luspTMEVkoEmklAcYAQHl/Wg4mpgzUh
tIAD9YBupb+Ye97lE+saprmb3QPMHwT4kzrPDLNfUB6sE0xRRGherXSYUcpBv3/sZsuYA0/UMWmW
25pQooLMxHFlJvzAk4/D4AXVBSL4hSI4UH80nDDoGjP03d1P3Vr4gb+m43YdH6s0COhdFRGiH0mU
7YUdAvVw3YOW4cPZuheNAVMnazSYwx519eI9FV++J6B7dP8vE/nX89MTENoF5sl2lcu7QZirCF4r
oj1eC4SQf+X6jL4n9Fnrctcw722syFjaxwt914bfKA1kguaBZrmbIpOQtAD50Af7Kw/Ite7gJhhM
njCr8g7YV5VHuQ91fJXSUD/bNbtuVC3hSEag2QTkzTisv4Tk44MTIsysIaD44ng8mbfp44SQi83S
42k+rh+YmwheYPbpQ933I93POhDeVgh1yl0RgfUJT66snSTr9aTqdYdObqWIWcxrAqTDTAXBoG2k
kq/OQ0rbcK/ymax2+oX/eDnPJ8jHX7tOB5ASprh3KIYEFAtxh4m4Q0IjuN2mxJ9X5GVePxY+qmMi
GrFfn8EMd4XiYa4uv9JfxqInqqT7NeMF8ibcGSefWOUwx6ENo4F8yE082lMqj3nusEbJx+VDHb3p
jl3Iy+QTK4f8L1E8KIZBIxhaWkNgxCDQbAIiP0wdCJQ+QQ9rSUIBIUSIe8Y1CjZrDJMUMX+lzmAh
L13DrIPZa1fFFUVAaFrUqZoA9+spaADx4Pvifp1M9QAThvepbQhxTJrgEJqgXPAC/6UKgPo1NcpJ
euc12geV0qPJHqmIKWwVRQiSv5R3pSLaARrxYrUDzQsC8h5zaE9oFuCS1L5oG/UnpPY5hKI8vYMG
JI3Zrz2lolfpXNK8V2/70TJpC3WIY1++X/WYp3rcohMQkAVDwBCogkCzCQhiQQj/t0KZA51Zx7Pz
2hNC6XY97KynxAkNYsJxAW8qQppL8PIaFMx+f6aIE8ZHVLffIWx9YfrN2hAL2ITZiUp4hwa0hb8o
LQI53i5vYsN8xjVMeGmhn+aVSEQ+y8VNWG3tVr0hT/pmCx2zdudNhU9xPVYXbxY9SOluRavRX4Q7
i/oPJeoMMYEFdcf0VSl4YkXzhfjSAutLA12bwWEDJwlIstIYp8xmjPMqzbRLhsDKgUCzCQhUeLgH
+oA3iirmpDRhSvksQnPNe0o1mnfD6d3M/kbdiMs4JqP1JVRZC2HGjIPFFYpgzhrE7EQBvi8QcHiR
xb3S4klp1zwX0+q4orCvhI8nll2V4HlF1sQgxWR7IevfKOJAwDtBO+ovTiWvp5jHmFB4POIkVqkO
kFUl/JZF+2by4+8fbJwrtd3OGwLDBoHlQUA0vtLD3wxg/EI3goi1IIRcvyAhFr4D5NaemlFuvXkg
WO9RxFOPxXCiD2hDmJ5UvUIfzz6d82YhvM/wdmtPKbD8wqRbEE+r0/LEvh4MWBfBsWArRdaC0F4w
ez0Qv1ntf1ltwPsMAoJ4tldEuKMBJQOmPBwTaBuOCJVC2OcKrykurKeyDaZB+6IP0arXUUyuVfns
Kr4w3GB5ltwQWKkRWF4ENFDQvPCEZCqZiWY54cKaQIsnmmSBEm68k4EpBM+rNKE20DpWvE9lYkbD
7RtXc972x40Z4Upgxny96ntthQy80OIdI3Yt8MK0nBwTlSLrK6RNfVGz6Y1qPMMf6xbeQ8IhA3Ih
YH7DHTwZPEl8XRfwzmNScX1KOrDzYwNC6xeEC9rJ+u4CJry4G3bjrUi/gzEJ9vQzTiN/TiZzZsSt
mlWg5WMIrMwIDDUC8kIY+z0CpZ8Qdg89Aoa1BRa8EV59goQAi9C/Vlyg+EnFOAFhziHUmqVyvbx+
U+cgwItrJ8XfSuCixTQS7lTi2YrrK2K2irtR+3ww6xUUWYMgXTPdy+OaUxrudbVF7X5C+IM3a1Vg
gLkQF+m0cK9OzlKEVAlohb9PSUhfYLak/R9Q/huqnNChIRZYE8NFmnCfrqMFDSR4853XtON5QEA4
OqDVfkL1mIjTQaIQiPTbAynY7jEERhoCQ42APFGwEL+7HnBe4kSwTFJ8XA87e23xbgkvdG6l+DUd
Y4L7oc6HnmP6DTFdociLiw/pfFL44UWGQNtQaXEImKm4MO4s4AYBrspfVRq8neZW0rQSA8YLLXaE
5l0dXNEhCYQaEWH1jxShhU3uAd2D9xekepqOOVcmIf3eS+ePUcT8c66uNZN8aAbaB7gwJj7pzGO4
hG+gyEuzjWgUvm44BfBOzG8TOIU/lee/VA6Es5W7Tvn9vPjod6U7S9cOVtxS8SL9PlDnn+U+HfP+
1emK6ytiJmNtaaABcmcsraN899Vf+p/NcRkj1GO6fkNA1Pks/eZl49C9XMeb6Q+u8t5BxNaJBtoL
dt+IQKBRAvLp0xZymUGjtRBrLQBXKvdp3fuMIgLlbEVeTMTUxgP+GUUv4K/WMYLxRMVpijvo4W93
PYZgwP0aYkKYJwMCESHDC5KXK2KiO0ExfCFTAaGBMMbG/yNFCIyXXXGPJsTblsQBsximN9LzHhIm
JurMPUQ0qtmqK+s9Z0twzXR5+j/n6YAXUlkPOVfpdnV1AdNtFRHotyqekriPnx5Tr+GlJAn7hll8
Wv/RznMUwQyyQ9BDmOCPcEcDqTeEAtmFF5k01HkjbajkZIAzyeGKkDJa7S3CxzuYoHWAG84OJ6i8
WSnlVRu78eT/0g/GB2PoYkV+Q36hK7/yxhX+aB1CNAcoMtnw63d4XhK5BzKizMFek6sTektmCKx4
BBolILy5EKJpQgJBy4Nbzc2X+7g/9V0OnWf2yiyXWSYCBW2GwMJ+eU1IQgB3X4TiLEW25PHpPIIQ
C1oR5NIn6NxLuhdBdqYii+TvU5wUS4RQY+Z7riLrNzg6xF1646a5Pjgo7zeU90ylh4DQAmYr0l4E
PviwdsD6EOG9Srun7sH0FgYdP6Nze+sQwQaBQUQ+QGZTFS/z2l7sGoe+b1LfIdJ1+oX+Acd+/ccM
X2WfrGsTFGk/BOTzTVu/SRTf5+c1+sUaHMIXLbBauEMX0URxnWZNJZWAVD9wR/PB9JZXpM99Hcmf
e9EQH0wpjLZ7fKpqjipngcqg/1jLwhtxK0UmK+WgNNMd6aDlMn58QIP/rCLaNxMR+r7SWmZKNe2U
ITCyEGiEgBBszIyZheOVlAyQx4cVEbaV7O+8Kc8MMVWgQSy69kc93B/XX//CJuV0OwEUFwLU50al
vcvVCbJASCFk+ZZMRaGpa1c705rXFsrtcaatn+k6gtFrCnGPtftcG6hLH+cG3cNaBoILLHgXCGHo
NSCEIHjjGDFDEaF7oe7ZKm7e0zG7eZ+ha1co4sSAMANP1mVe0fVKZp09HQ6VCAitBLMiod397fNH
efOC6GE6yTqTDwjQtP5Oy8Kfw+sNbz5CrXsxcUHKaGcL3BiomLeuMz7QNMGGCQTEQl9jIqPv0wL4
7afI2G2vVnGuKR+29kHj9c9Hv3yVhm13GM+MUwiKsUAd6D/GFYRIn9Usr1Z97LohsLIiUDcBOcGX
dB0u4+IIouob5o4UXqwFJppErTT+utJ6c08jaxQImVp1Zf2jX3Bk0a8NEjqQ1eaKEMYZStfPQ8pn
prSQEw4LmI7QrvoQtsPal59cbE+FRvdU7BsnVCGSfusrycwqta/e/nBlpa7lVMCTelWasFRqK0Kd
WHMsxdpeFZ8UHDDnVQ2QjUsQrkX5oPNMOuqqW60y7LohsDIjUDcBrcwgNKltENC6Li+0nGqB9SVm
/AQz0TSpAywbQ8AQGF4IGAE1qb/QAKXZsPhM+KKOmQHz3k+f9S6d541/HCzeojhTsb1JVbBsDAFD
wBAYVggYATW3u3ivBVfqLyjiKr6bIyLvCcUaxC6Kkxzx8L2ktPdNmlsry80QMAQMgSGIgBFQEztF
ZPK8CAfXcRan8WLbOSV7nARw471X6f/SxOItK0PAEDAEhhUCRkBN7i7nQHGJiAgnBL9tDBqQ915b
ojSV9hBrcm0sO0PAEDAEhi4CRkDLqW9EMrxUa8EQMAQMAUOgAgJGQDY0DAFDwBAwBAYFASOgQYHd
CjUEDAFDwBAwArIxYAgYAoaAITAoCBgBDQrsVqghYAgYAoaAEZCNAUPAEDAEDIFBQcAIaFBgt0IN
AUPAEDAEjIBsDBgChoAhYAgMCgJGQIMCuxVqCBgChoAhYARkY8AQMAQMAUNgUBAwAhoU2K1QQ8AQ
MAQMASMgGwOGgCFgCBgCg4KAEdCgwG6FGgKGgCFgCBgB2RgwBAwBQ8AQGBQEjIAGBXYr1BAwBAwB
Q8AIyMaAIWAIGAKGwKAgUBcBnZzPr9UTBG9XDbvqumFQmjKyC1X/ZNQ3Wf4uAxJF5VGM3d+i48WK
D04rFOLnl6EIu9UQMAQMgQiBevlkB0miGUrfoc96LouAM9yXEwLqn4z6poW/Ay1CN/YqjzjRMD6e
0fkPM/kYaL52nyFgCBgCaQjUS0CrSghNUgZECysxAinsNWolbq41zRAwBAYRgXoJ6AbV8bFBrKcV
PXgIdKhoWfYsGAKGgCHQXATqIiDZ/59TsUQLhoAhYAgYAoZAUxCoi4CaUpJlYggYAoaAIWAIxBAw
ArLhYAgYAoaAITAoCBgBDQrsVqghYAgYAoaAEZCNAUPAEDAEDIFBQcAIaFBgt0INAUPAEDAEjIBs
DBgChoAhYAgMCgJGQIMCuxVqCBgChoAhYARkY8AQMAQMAUNgUBAwAhoU2K1QQ8AQMAQMASMgGwOG
gCFgCBgCg4KAEdCgwG6FGgKGgCFgCBgB2RgwBAwBQ8AQGBQEjIAGBXYr1BAwBAwBQ8AIyMaAIWAI
GAKGwKAgYAQ0KLBboYaAIWAIGAJGQDYGDAFDwBAwBAYFASOgQYHdCjUEDAFDwBAwArIxYAgYAoaA
ITAoCBgBDQrsVqghYAgYAoaAEZCNAUPAEDAEDIFBQcAIaFBgt0INAUPAEDAE/h9tkozzA5eUxwAA
AABJRU5ErkJggg==

--_004_91E3A1BD737FDF4FA14118387FF6766B2774D314lhreml504mbs_--


From nobody Mon May 27 10:57:24 2019
Return-Path: <0100016afa70796c-314cbf69-755f-4ae2-b83a-d53507714c69-000000@amazonses.watsen.net>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B1DE1120043; Mon, 27 May 2019 10:57:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level: 
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=amazonses.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bEwL4GXb7Jed; Mon, 27 May 2019 10:57:19 -0700 (PDT)
Received: from a8-64.smtp-out.amazonses.com (a8-64.smtp-out.amazonses.com [54.240.8.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E489D120020; Mon, 27 May 2019 10:57:17 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=6gbrjpgwjskckoa6a5zn6fwqkn67xbtw; d=amazonses.com; t=1558979836; h=From:Message-Id:Content-Type:Mime-Version:Subject:Date:In-Reply-To:Cc:To:References:Feedback-ID; bh=INa1j6kCqWq/zvemtOFchBzzfEHMJ8pw7XvPw6Os3J4=; b=D0RdzUDg4F+05KgUFQoIWgXYE1HkmtOko7VtpfYc4xAre9kpTRSSCB4hJUmn9pox OrsXMpwpBnqU3s4lATf6xiXgoqmzdWqKD3DINz9nKxLVvxg3GSGvVU85IavA2iNhj9z XpVmvEG+36jBDUmDs1FvhC46/ALL+e0jA+JiiQ2c=
From: Kent Watsen <kent@watsen.net>
Message-ID: <0100016afa70796c-314cbf69-755f-4ae2-b83a-d53507714c69-000000@email.amazonses.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_A72C3B18-4822-4388-B018-E962862A23A1"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
Date: Mon, 27 May 2019 17:57:16 +0000
In-Reply-To: <91E3A1BD737FDF4FA14118387FF6766B2774C768@lhreml504-mbs>
Cc: Lou Berger <lberger@labn.net>, "netmod@ietf.org" <netmod@ietf.org>, "netmod-chairs@ietf.org" <netmod-chairs@ietf.org>
To: Italo Busi <Italo.Busi@huawei.com>
References: <e6fc4541-891a-60cb-e956-86f238d09f14@labn.net> <91E3A1BD737FDF4FA14118387FF6766B2774C768@lhreml504-mbs>
X-Mailer: Apple Mail (2.3445.104.11)
X-SES-Outgoing: 2019.05.27-54.240.8.64
Feedback-ID: 1.us-east-1.DKmIRZFhhsBhtmFMNikgwZUWVrODEw9qVcPhqJEI2DA=:AmazonSES
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/CAo22_Zcjsh5WuoA2XALDm_KoUY>
Subject: Re: [netmod] WG Last Call: draft-ietf-netmod-artwork-folding-02
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 27 May 2019 17:57:23 -0000

--Apple-Mail=_A72C3B18-4822-4388-B018-E962862A23A1
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii


Hi Italo,


> 1) Section 7.2.1 (Folding for Single Backslash Strategy) says:
>=20
>   Ensure that the desired maximum line length is not less than the
>   minimum header, which is 46 characters.  If the desired maximum line
>   length is less than this minimum, exit (this text-based content
>   cannot be folded).
>=20
> However, the first line defined in section 7.1.1 is a "45-character =
string".
> I think that the paragraph be changed as:
>=20
>   Ensure that the desired maximum line length is not less than the
>   minimum header, which is 45 characters.  If the desired maximum line
>   length is less than this minimum, exit (this text-based content
>   cannot be folded).

Fixed in my local copy.


> 2) Section 8.2.1 (Folding for Double Backslash Strategy) says:
>=20
>=20
>   Ensure that the desired maximum line length is not less than the
>   minimum header, which is 45 characters.  If the desired maximum line
>   length is less than this minimum, exit (this text-based content
>   cannot be folded).
>=20
> However, the first line defined in section 8.1.1 is a "46-character =
string".
> I think that the paragraph be changed as:
>=20
>   Ensure that the desired maximum line length is not less than the
>   minimum header, which is 46 characters.  If the desired maximum line
>   length is less than this minimum, exit (this text-based content
>   cannot be folded).

Fixed in my local copy.


> A question for clarification. Reading the following code in Appendix =
A:
>=20
>     if [[ $strategy -eq 2 ]]; then
>       min_supported=3D`expr ${#hdr_txt_2} + 8`
>     else
>       min_supported=3D`expr ${#hdr_txt_1} + 8`
>     fi
>=20
> It seems to me that the minimum lengths applied by the code in =
Appendix A are be 53 and 54 (instead of 45 and 46 respectively)
>=20
> Is my understanding correct?

The script is not conflicting with the draft, as it does ensure that the =
length is not less than the raw header text.  Though, to your point, it =
adds an additional buffer to further ensure that the header will always =
have some '=3D' characters wrapping around the header, for readability, =
in the unlikely scenario that such a narrow-width is needed.   I could =
go either way on this, does anyone else have an opinion?



> Thanks, Italo

Kent // author



--Apple-Mail=_A72C3B18-4822-4388-B018-E962862A23A1
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=us-ascii

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Dus-ascii"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" class=3D""><div =
class=3D""><br class=3D""></div>Hi Italo,<div class=3D""><br =
class=3D""><div><br class=3D""><blockquote type=3D"cite" class=3D""><div =
class=3D""><div class=3D"">1) Section 7.2.1 (Folding for Single =
Backslash Strategy) says:<br class=3D""><br class=3D""> =
&nbsp;&nbsp;Ensure that the desired maximum line length is not less than =
the<br class=3D""> &nbsp;&nbsp;minimum header, which is 46 characters. =
&nbsp;If the desired maximum line<br class=3D""> &nbsp;&nbsp;length is =
less than this minimum, exit (this text-based content<br class=3D""> =
&nbsp;&nbsp;cannot be folded).<br class=3D""><br class=3D"">However, the =
first line defined in section 7.1.1 is a "45-character string".<br =
class=3D"">I think that the paragraph be changed as:<br class=3D""><br =
class=3D""> &nbsp;&nbsp;Ensure that the desired maximum line length is =
not less than the<br class=3D""> &nbsp;&nbsp;minimum header, which is 45 =
characters. &nbsp;If the desired maximum line<br class=3D""> =
&nbsp;&nbsp;length is less than this minimum, exit (this text-based =
content<br class=3D""> &nbsp;&nbsp;cannot be folded).<br =
class=3D""></div></div></blockquote><div><br class=3D""></div><div>Fixed =
in my local copy.</div><div><br class=3D""></div><br =
class=3D""><blockquote type=3D"cite" class=3D""><div class=3D""><div =
class=3D"">2) Section 8.2.1 (Folding for Double Backslash Strategy) =
says:<br class=3D""><br class=3D""><br class=3D""> &nbsp;&nbsp;Ensure =
that the desired maximum line length is not less than the<br class=3D""> =
&nbsp;&nbsp;minimum header, which is 45 characters. &nbsp;If the desired =
maximum line<br class=3D""> &nbsp;&nbsp;length is less than this =
minimum, exit (this text-based content<br class=3D""> &nbsp;&nbsp;cannot =
be folded).<br class=3D""><br class=3D"">However, the first line defined =
in section 8.1.1 is a "46-character string".<br class=3D"">I think that =
the paragraph be changed as:<br class=3D""><br class=3D""> =
&nbsp;&nbsp;Ensure that the desired maximum line length is not less than =
the<br class=3D""> &nbsp;&nbsp;minimum header, which is 46 characters. =
&nbsp;If the desired maximum line<br class=3D""> &nbsp;&nbsp;length is =
less than this minimum, exit (this text-based content<br class=3D""> =
&nbsp;&nbsp;cannot be folded).<br =
class=3D""></div></div></blockquote><div><br =
class=3D""></div><div><div>Fixed in my local copy.</div><div =
class=3D""><br class=3D""></div></div><br class=3D""><blockquote =
type=3D"cite" class=3D""><div class=3D""><div class=3D"">A question for =
clarification. Reading the following code in Appendix A:<br class=3D""><br=
 class=3D""> &nbsp;&nbsp;&nbsp;&nbsp;if [[ $strategy -eq 2 ]]; then<br =
class=3D""> &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;min_supported=3D`expr =
${#hdr_txt_2} + 8`<br class=3D""> &nbsp;&nbsp;&nbsp;&nbsp;else<br =
class=3D""> &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;min_supported=3D`expr =
${#hdr_txt_1} + 8`<br class=3D""> &nbsp;&nbsp;&nbsp;&nbsp;fi<br =
class=3D""><br class=3D"">It seems to me that the minimum lengths =
applied by the code in Appendix A are be 53 and 54 (instead of 45 and 46 =
respectively)<br class=3D""><br class=3D"">Is my understanding =
correct?<br class=3D""></div></div></blockquote><div><br =
class=3D""></div><div>The script is not conflicting with the draft, as =
it does ensure that the length is not less than the raw header text. =
&nbsp;Though, to your point, it adds an additional buffer to further =
ensure that the header will always have some '=3D' characters wrapping =
around the header, for readability, in the unlikely scenario that such a =
narrow-width is needed. &nbsp; I could go either way on this, does =
anyone else have an opinion?</div><div><br class=3D""></div><div><br =
class=3D""></div><br class=3D""><blockquote type=3D"cite" class=3D""><div =
class=3D""><div class=3D"">Thanks, Italo<br =
class=3D""></div></div></blockquote></div><br class=3D""></div><div =
class=3D"">Kent // author</div><div class=3D""><br class=3D""></div><div =
class=3D""><br class=3D""></div></body></html>=

--Apple-Mail=_A72C3B18-4822-4388-B018-E962862A23A1--


From nobody Mon May 27 12:28:26 2019
Return-Path: <0100016afac3dceb-3efc8938-6954-48c7-a362-e92c08400df0-000000@amazonses.watsen.net>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8641B120094; Mon, 27 May 2019 12:28:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level: 
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=amazonses.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sOnv80jIfR7F; Mon, 27 May 2019 12:28:22 -0700 (PDT)
Received: from a8-64.smtp-out.amazonses.com (a8-64.smtp-out.amazonses.com [54.240.8.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9A1C512003F; Mon, 27 May 2019 12:28:22 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=6gbrjpgwjskckoa6a5zn6fwqkn67xbtw; d=amazonses.com; t=1558985301; h=Content-Type:Mime-Version:Subject:From:In-Reply-To:Date:Cc:Content-Transfer-Encoding:Message-Id:References:To:Feedback-ID; bh=KGoH/bgOO0vNG9LFmJJONnRjGlOsMba2q+eREZDlj6k=; b=a8VX/0vUSccHi/YkjGUs04qQ6eQTr31eg/gOYKDjtN8875rO7cMyF6c9Z7kYg8St hbGHK9p5UUFJDUnU1nrk1BmAsiIvXPXQYdw9RJJwLcGF1LLSTEpxFp8cQmoLHq+KTUl YHuQmA0peaiy1dJSYR40v7OHMbxyDFt/NseHp6jc=
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
From: Kent Watsen <kent+ietf@watsen.net>
In-Reply-To: <20190527.130412.1876961670794351457.mbj@tail-f.com>
Date: Mon, 27 May 2019 19:28:21 +0000
Cc: Lou Berger <lberger@labn.net>, "netmod@ietf.org" <netmod@ietf.org>, "netmod-chairs@ietf.org" <netmod-chairs@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-ID: <0100016afac3dceb-3efc8938-6954-48c7-a362-e92c08400df0-000000@email.amazonses.com>
References: <e6fc4541-891a-60cb-e956-86f238d09f14@labn.net> <20190527.130412.1876961670794351457.mbj@tail-f.com>
To: Martin Bjorklund <mbj@tail-f.com>
X-Mailer: Apple Mail (2.3445.104.11)
X-SES-Outgoing: 2019.05.27-54.240.8.64
Feedback-ID: 1.us-east-1.DKmIRZFhhsBhtmFMNikgwZUWVrODEw9qVcPhqJEI2DA=:AmazonSES
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/PNftEXFRmqLXrc2fmqT7u-zG_4g>
Subject: Re: [netmod] WG Last Call: draft-ietf-netmod-artwork-folding-02
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 27 May 2019 19:28:25 -0000

Hi Martin,

Thanks for your review.


> I have reviewed draft-ietf-netmod-artwork-folding-02, and here are my
> comments:
>=20
>=20
> o  6
>=20
>  Perhaps:
>=20
>  OLD:
>=20
>   begins at the first non-
>   whitespace character on the following line.
>=20
>  NEW:
>=20
>   begins at the first character that is not a space character (' ')
>   on the following line.

Updated in my local copy.


>  The algorithm talks specifically about space (' ') rather than
>  whitespace.

True and, FWIW, this was the only instance of the word "whitespace" in =
the document.

However, I wonder if there might be an issue lurking here.  Already the =
algorithm eliminates the potential for TAB, and implicitly eliminates NL =
and CR through the use of the word "line", but I wonder if there are =
other characters that we wish to skip over... e.g. vertical tab?


> o  6.1
>=20
>  s/is exists/exists/

Fixed.



> o  6.1 / 6.2
>=20
>  6.2 says (correctly!):
>=20
>   It is RECOMMENDED for implementations to first attempt to fold
>   content using the single backslash strategy and, only in the =
unlikely
>   event that it cannot fold the input or the folding logic is unable =
to
>   cope with a contingency occurring on the desired folding column, =
then
>   fallback to the double backslash strategy.
>=20
>  But 6.1 says about the Single Backslash Strategy:
>=20
>   automation implementations are likely to encounter scenarios that
>   will produce errors without special care
>=20
>=20
>  So it 6.1 thinks it is likely that SBS won't work, but 6.2 says it
>  is unlikely.  IMO 6.2 is correct - it is extremely unlikely that SBS
>  won't work.

s/are likely to/may/



> o  7.1.2 / 7.2
>=20
>  I would prefer if the format is defined with descriptive text,
>  rather than with an algorithm.  It is the end result that matters,
>  not which algorithm an implementation uses to get to the result.
>=20
>  I suggest the algorithm is moved to an appendix, and/or a sentence
>  is added that explains that the algorithm is just an example.

OLD:

   This section describes the process for folding and unfolding long
   lines when they are encountered in a single instance of text content.
   It is assumed that another process inserts/extracts the individual
   text content instances to/from an Internet-Draft or RFC.  For
   example, the `xiax` utility [xiax] does this.


NEW:

   This section describes a process for folding and unfolding long lines
   when they are encountered in text content.

   The steps are complete, but implementations MAY achieve the same
   result in other ways.

   When a larger document contains multiple instances of text content
   that may need to be folded or unfolded, it is assumed that another
   process inserts/extracts the individual text content instances to/
   from the larger document prior to utilizing the algorithms described
   in this section.  For example, the `xiax` utility [xiax] does this.




>  Also expand the descriptive text in 7.1.2; I think that the text in
>  section 6 is probably enough.  However, there are some important
>  details buried in the desciption of the algorithm; specifically the
>  cases where SBS can't be used.

I looked at this for a little while, but didn't see how it could be =
improved.  Can you provide some text?


> o  7.2.1
>=20
>  I don't understand why there is a min limit of 46 characters for
>  folding to work.  If the only reason is for the non-normative script
>  to be able to center the header line, then I think this limitation
>  should be removed.  (I would even prefer less flexibility in the
>  header line syntax...)

This is because we never defined how to handle folding the header =
itself.  I wrote about this a while back and no-one seemed bothered by =
the limitation.   The effort/value ration isn't there.  The need to fold =
less than 69-characters is unlikely, and less than 46-characters seems =
even more so.


> o  7.2.1 / 7.2.2
>=20
>  I don't think the text should assume that folding/unfolding is
>  "automated".

Both sections clearly state that authors may do the equivalent manually, =
or do you mean that the word "automated" in these sections isn't adding =
much value and could/should be removed?



> o  7.2.1
>=20
>  Perhaps add to bullet 1:
>=20
>    If no such location can be found, then exit (this text content
>    cannot be folded)

Added in my local copy.


>=20
>=20
> o  7.2.2
>=20
>  s/maximum../maximum./

Fixed (in both locations)


> o  Appendix A
>=20
>  Consider using the command "tempfile" instead of /tmp/wip*

Used `mktemp -d` instead.


Kent // author




From nobody Mon May 27 23:55:46 2019
Return-Path: <ludwig@clemm.org>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 18C57120112 for <netmod@ietfa.amsl.com>; Mon, 27 May 2019 23:55:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level: 
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KP9Z7AT7O1PH for <netmod@ietfa.amsl.com>; Mon, 27 May 2019 23:55:42 -0700 (PDT)
Received: from mout.perfora.net (mout.perfora.net [74.208.4.196]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1683D120119 for <netmod@ietf.org>; Mon, 27 May 2019 23:55:41 -0700 (PDT)
Received: from [10.8.1.12] ([198.8.81.52]) by mrelay.perfora.net (mreueus004 [74.208.5.2]) with ESMTPSA (Nemesis) id 1MILw8-1hQ2N51eho-00EPNZ; Tue, 28 May 2019 08:55:39 +0200
To: Kent Watsen <kent+ietf@watsen.net>
Cc: "netmod@ietf.org" <netmod@ietf.org>
References: <155849855872.2695.12584993937973905094.idtracker@ietfa.amsl.com> <12a902a5-996e-d4c6-e631-0ca6a267b9c9@clemm.org> <0100016ae2ac1603-432b860b-ef14-4555-ab13-bec2b15ce3dd-000000@email.amazonses.com>
From: Alexander Clemm <ludwig@clemm.org>
Message-ID: <40e18e04-fdc5-974c-06c3-87af0da885cf@clemm.org>
Date: Mon, 27 May 2019 23:55:34 -0700
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.3.0
MIME-Version: 1.0
In-Reply-To: <0100016ae2ac1603-432b860b-ef14-4555-ab13-bec2b15ce3dd-000000@email.amazonses.com>
Content-Type: multipart/alternative; boundary="------------2730AA14AB435DE06F5D4CE2"
Content-Language: en-US
X-Provags-ID: V03:K1:Mbs9lzsj8sGBvl5eq9NGIw1kUDbDv8Fg4DhIKTCdT/Vv04F4EI+ 7d8tWCqGeD5Ea5heDIq5bhuf/B/cKdSmi8GSRT35gklMyAE5MmSCrbiODnJZjOHhCA5rxLX 2JVGtf2MP9Ly1MlTunt58zXurj3OVDEA0bfAJ7CbdIjv+LfUDo6CQ8Q5fGVw8u9lssHHHsm /I5aaYTAJO0pf/qG1TOVA==
X-UI-Out-Filterresults: notjunk:1;V03:K0:SwtZyWrKTUU=:Frw26LZpURT9te2+vYTlaS U7ASLF4cWRm319QtfbClGUufIKhTJmoBrOCvEE21ko8iOOBcMa7csa+eeAo0CqAVEcic6FKfL 9aPp4GBQxR0uMtMTNbhsrSPV4obO07am1mS1KYjLUOPfdq4tbvRVt4dY1xUVnSi6roniEWZjX MUC/Xipt+o+/zIVIcr8/ozDzm+byBD30xR2hq07nYzA0o/HT6vIDcOMSMoTN1ZkF5+odE/ZgF vVnn/g5irDp49aHUHQea3GifQw7z+Chw/kLW4AIE+9UPFgrhY8ZuWPr4wEvVvA6soE7+8sINw uXtS+n1lGgf8vrqF4xOK5NWLzF1Oj0S9Uq8tMI5Q2dyynZfXaR8RIJJ5Pq3Qe3mdKx9Y/xLkp 2g30pNfBJIZIngZJ3gKxuX2rtdOkmsAOB7lV5I17dNz/G+VJEn81WVCPA1F6ngKMLRUM3lVoQ QjiC1oDgYR52szLnQt5+/ihoTmFNn4K8BtII7+fKQxdOt4m11jQYADpzynzAI1UdHDnKv2ZQ9 5KFmnEOszy9/tWb7+6um9uMeVmAhKeaBqzSpr1ls1jxs7JmNwAH85yqT6r5DYpcC9bsT2qRMW 0Dj+1X04a6BZd5rtrxXWvPvWl2BQ9JzxbtekP+dzWP8Kn2VUx5g80VerxECciNxJZ9q7uyL8s vKNiXX1y2VrKjaN9WayOAKvaxabOmwh8PElmF5NPzXvpivH/TegG1nSTJJyu3Bny3uQZ4Qo9O 2QkSiFTwODYGIShNhbaNjrFDqzBtid2eHXlfeURgO1gx8P5/+hWn2Pj1olY=
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/83ZnGmrCPUfmLyXFZhT4XbijAqw>
Subject: Re: [netmod] New Version Notification for draft-ietf-netmod-nmda-diff-01.txt
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 28 May 2019 06:55:45 -0000

This is a multi-part message in MIME format.
--------------2730AA14AB435DE06F5D4CE2
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 8bit

Hi Kent,

thank you for your comments!

Regarding example, yes, I agree, we need to add examples and will do so 
in the next revision.

Per your suggestion, I looked again at the 103 minutes. They do state 
that we should come up with a single format, hence the option to select 
from different formats has been removed.    Now, which specific format 
to select is the topic of the discussion items in the Juergen's and 
Andy's emails from Nov 6.  This concerned the question whether the diff 
was to be computed against the tree, vs a textual representation of the 
tree, and if the latter, what the serialization would be. If I interpret 
the sentiment in those emails correctly, the sentiment is that the diff 
should be computed against the tree.  This is what is reflected in the 
current revision; the representation of differences leverages YANG-Patch 
(RFC 8072) and the "source-value" element extrapolates this to include 
the source values.  Of course, we can consider alternatives; this is one 
proposal.

The other item that was raised concerns whether to include diff'ing on 
metadata.  Whether this is needed probably requires further discussion.  
Personally, I think this is a useful feature but it has not been 
included in this revision.

--- Alex


On 5/22/2019 8:11 PM, Kent Watsen wrote:
> It's great to see activity on this draft.   However, authors should 
> close open items on list before posting updates.   Specifically, there 
> are open items from the adoption-poll, the 103 meeting minutes, and 
> the emails Andy and Juergen sent on Nov 6.
>
> PS: as a contributor, the update seems incomplete without an example 
> illustrating the new 'source-value' element.
>
> Kent   // chair
>
>
>
>> On May 22, 2019, at 12:24 AM, Alexander Clemm <ludwig@clemm.org 
>> <mailto:ludwig@clemm.org>> wrote:
>>
>> Hello Netmod WG,
>>
>> we have just posted a new revision of draft-ietf-netmod-nmda-diff.  
>> The new revision adds the inclusion of the both the source and target 
>> values to the result of the comparison; for this purpose, the 
>> YANG-Patch grouping was augmented accordingly.
>>
>> --- Alex
>>
>>
>> -------- Forwarded Message --------
>> Subject: 	New Version Notification for 
>> draft-ietf-netmod-nmda-diff-01.txt
>> Date: 	Tue, 21 May 2019 21:15:58 -0700
>> From: 	internet-drafts@ietf.org
>> To: 	Andy Bierman <andy@yumaworks.com>, Yingzhen Qu 
>> <yqu@futurewei.com>, Alexander Clemm <ludwig@clemm.org>, Jeff 
>> Tantsura <jefftant.ietf@gmail.com>
>>
>>
>>
>> A new version of I-D, draft-ietf-netmod-nmda-diff-01.txt
>> has been successfully submitted by Alexander Clemm and posted to the
>> IETF repository.
>>
>> Name:		draft-ietf-netmod-nmda-diff
>> Revision:	01
>> Title:		Comparison of NMDA datastores
>> Document date:	2019-05-23
>> Group:		netmod
>> Pages:		15
>> URL:https://www.ietf.org/internet-drafts/draft-ietf-netmod-nmda-diff-01.txt
>> Status:https://datatracker.ietf.org/doc/draft-ietf-netmod-nmda-diff/
>> Htmlized:https://tools.ietf.org/html/draft-ietf-netmod-nmda-diff-01
>> Htmlized:https://datatracker.ietf.org/doc/html/draft-ietf-netmod-nmda-diff
>> Diff:https://www.ietf.org/rfcdiff?url2=draft-ietf-netmod-nmda-diff-01
>>
>> Abstract:
>>     This document defines an RPC operation to compare management
>>     datastores that comply with the NMDA architecture.
>>
>>                                                                                    
>>
>>
>> Please note that it may take a couple of minutes from the time of submission
>> until the htmlized version and diff are available attools.ietf.org <http://tools.ietf.org>.
>>
>> The IETF Secretariat
>>
>> _______________________________________________
>> netmod mailing list
>> netmod@ietf.org <mailto:netmod@ietf.org>
>> https://www.ietf.org/mailman/listinfo/netmod
>


--------------2730AA14AB435DE06F5D4CE2
Content-Type: text/html; charset=windows-1252
Content-Transfer-Encoding: 8bit

<html>
  <head>
    <meta http-equiv="Content-Type" content="text/html;
      charset=windows-1252">
  </head>
  <body text="#000000" bgcolor="#FFFFFF">
    <p>Hi Kent,</p>
    <p>thank you for your comments!  <br>
    </p>
    <p>Regarding example, yes, I agree, we need to add examples and will
      do so in the next revision.</p>
    <p>Per your suggestion, I looked again at the 103 minutes. They do
      state that we should come up with a single format, hence the
      option to select from different formats has been removed.    Now,
      which specific format to select is the topic of the discussion
      items in the Juergen's and Andy's emails from Nov 6.  This
      concerned the question whether the diff was to be computed against
      the tree, vs a textual representation of the tree, and if the
      latter, what the serialization would be. If I interpret the
      sentiment in those emails correctly, the sentiment is that the
      diff should be computed against the tree.  This is what is
      reflected in the current revision; the representation of
      differences leverages YANG-Patch (RFC 8072) and the "source-value"
      element extrapolates this to include the source values.  Of
      course, we can consider alternatives; this is one proposal.  <br>
    </p>
    <p>The other item that was raised concerns whether to include
      diff'ing on metadata.  Whether this is needed probably requires
      further discussion.  Personally, I think this is a useful feature
      but it has not been included in this revision.  <br>
    </p>
    <p>--- Alex<br>
    </p>
    <br>
    <div class="moz-cite-prefix">On 5/22/2019 8:11 PM, Kent Watsen
      wrote:<br>
    </div>
    <blockquote type="cite"
cite="mid:0100016ae2ac1603-432b860b-ef14-4555-ab13-bec2b15ce3dd-000000@email.amazonses.com">
      <meta http-equiv="Content-Type" content="text/html;
        charset=windows-1252">
      <div class="">It's great to see activity on this draft.   However,
        authors should close open items on list before posting updates.
          Specifically, there are open items from the adoption-poll, the
        103 meeting minutes, and the emails Andy and Juergen sent on Nov
        6.</div>
      <div class=""><br class="">
      </div>
      <div class="">PS: as a contributor, the update seems incomplete
        without an example illustrating the new 'source-value' element.</div>
      <div class=""><br class="">
      </div>
      <div class="">Kent   // chair</div>
      <div class=""><br class="">
      </div>
      <div class=""><br class="">
        <div><br class="">
          <blockquote type="cite" class="">
            <div class="">On May 22, 2019, at 12:24 AM, Alexander Clemm
              &lt;<a href="mailto:ludwig@clemm.org" class=""
                moz-do-not-send="true">ludwig@clemm.org</a>&gt; wrote:</div>
            <br class="Apple-interchange-newline">
            <div class="">
              <meta http-equiv="content-type" content="text/html;
                charset=windows-1252" class="">
              <div text="#000000" bgcolor="#FFFFFF" class="">
                <p class="">Hello Netmod WG,<br class="">
                </p>
                <p class="">we have just posted a new revision of
                  draft-ietf-netmod-nmda-diff.  The new revision adds
                  the inclusion of the both the source and target values
                  to the result of the comparison; for this purpose, the
                  YANG-Patch grouping was augmented accordingly.  <br
                    class="">
                </p>
                <div class="moz-forward-container">--- Alex</div>
                <div class="moz-forward-container"><br class="">
                  <br class="">
                  -------- Forwarded Message --------
                  <table class="moz-email-headers-table" cellspacing="0"
                    cellpadding="0" border="0">
                    <tbody class="">
                      <tr class="">
                        <th class="" nowrap="nowrap" valign="BASELINE"
                          align="RIGHT">Subject: </th>
                        <td class="">New Version Notification for
                          draft-ietf-netmod-nmda-diff-01.txt</td>
                      </tr>
                      <tr class="">
                        <th class="" nowrap="nowrap" valign="BASELINE"
                          align="RIGHT">Date: </th>
                        <td class="">Tue, 21 May 2019 21:15:58 -0700</td>
                      </tr>
                      <tr class="">
                        <th class="" nowrap="nowrap" valign="BASELINE"
                          align="RIGHT">From: </th>
                        <td class=""><a class="moz-txt-link-abbreviated"
                            href="mailto:internet-drafts@ietf.org"
                            moz-do-not-send="true">internet-drafts@ietf.org</a></td>
                      </tr>
                      <tr class="">
                        <th class="" nowrap="nowrap" valign="BASELINE"
                          align="RIGHT">To: </th>
                        <td class="">Andy Bierman <a
                            class="moz-txt-link-rfc2396E"
                            href="mailto:andy@yumaworks.com"
                            moz-do-not-send="true">&lt;andy@yumaworks.com&gt;</a>,
                          Yingzhen Qu <a class="moz-txt-link-rfc2396E"
                            href="mailto:yqu@futurewei.com"
                            moz-do-not-send="true">&lt;yqu@futurewei.com&gt;</a>,
                          Alexander Clemm <a
                            class="moz-txt-link-rfc2396E"
                            href="mailto:ludwig@clemm.org"
                            moz-do-not-send="true">&lt;ludwig@clemm.org&gt;</a>,
                          Jeff Tantsura <a
                            class="moz-txt-link-rfc2396E"
                            href="mailto:jefftant.ietf@gmail.com"
                            moz-do-not-send="true">&lt;jefftant.ietf@gmail.com&gt;</a></td>
                      </tr>
                    </tbody>
                  </table>
                  <br class="">
                  <br class="">
                  <pre class="">A new version of I-D, draft-ietf-netmod-nmda-diff-01.txt
has been successfully submitted by Alexander Clemm and posted to the
IETF repository.

Name:		draft-ietf-netmod-nmda-diff
Revision:	01
Title:		Comparison of NMDA datastores
Document date:	2019-05-23
Group:		netmod
Pages:		15
URL:            <a class="moz-txt-link-freetext" href="https://www.ietf.org/internet-drafts/draft-ietf-netmod-nmda-diff-01.txt" moz-do-not-send="true">https://www.ietf.org/internet-drafts/draft-ietf-netmod-nmda-diff-01.txt</a>
Status:         <a class="moz-txt-link-freetext" href="https://datatracker.ietf.org/doc/draft-ietf-netmod-nmda-diff/" moz-do-not-send="true">https://datatracker.ietf.org/doc/draft-ietf-netmod-nmda-diff/</a>
Htmlized:       <a class="moz-txt-link-freetext" href="https://tools.ietf.org/html/draft-ietf-netmod-nmda-diff-01" moz-do-not-send="true">https://tools.ietf.org/html/draft-ietf-netmod-nmda-diff-01</a>
Htmlized:       <a class="moz-txt-link-freetext" href="https://datatracker.ietf.org/doc/html/draft-ietf-netmod-nmda-diff" moz-do-not-send="true">https://datatracker.ietf.org/doc/html/draft-ietf-netmod-nmda-diff</a>
Diff:           <a class="moz-txt-link-freetext" href="https://www.ietf.org/rfcdiff?url2=draft-ietf-netmod-nmda-diff-01" moz-do-not-send="true">https://www.ietf.org/rfcdiff?url2=draft-ietf-netmod-nmda-diff-01</a>

Abstract:
   This document defines an RPC operation to compare management
   datastores that comply with the NMDA architecture.

                                                                                  


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at <a href="http://tools.ietf.org" class="" moz-do-not-send="true">tools.ietf.org</a>.

The IETF Secretariat

</pre>
                </div>
              </div>
              _______________________________________________<br
                class="">
              netmod mailing list<br class="">
              <a href="mailto:netmod@ietf.org" class=""
                moz-do-not-send="true">netmod@ietf.org</a><br class="">
              <a class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/netmod">https://www.ietf.org/mailman/listinfo/netmod</a><br class="">
            </div>
          </blockquote>
        </div>
        <br class="">
      </div>
    </blockquote>
    <br>
  </body>
</html>

--------------2730AA14AB435DE06F5D4CE2--


From nobody Tue May 28 06:33:46 2019
Return-Path: <Italo.Busi@huawei.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B229D120234; Tue, 28 May 2019 06:33:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.199
X-Spam-Level: 
X-Spam-Status: No, score=-4.199 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id H3ALGBHz37r4; Tue, 28 May 2019 06:33:34 -0700 (PDT)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2AF6512023D; Tue, 28 May 2019 06:33:34 -0700 (PDT)
Received: from lhreml702-cah.china.huawei.com (unknown [172.18.7.108]) by Forcepoint Email with ESMTP id 0F584EF22169C0C19441; Tue, 28 May 2019 14:33:32 +0100 (IST)
Received: from LHREML504-MBS.china.huawei.com ([10.201.109.59]) by lhreml702-cah.china.huawei.com ([10.201.108.43]) with mapi id 14.03.0415.000;  Tue, 28 May 2019 14:33:31 +0100
From: Italo Busi <Italo.Busi@huawei.com>
To: Kent Watsen <kent@watsen.net>
CC: Lou Berger <lberger@labn.net>, "netmod@ietf.org" <netmod@ietf.org>, "netmod-chairs@ietf.org" <netmod-chairs@ietf.org>
Thread-Topic: [netmod] WG Last Call: draft-ietf-netmod-artwork-folding-02
Thread-Index: AQHVCSaY+iCIbhU/PESy/n6QJGx4eqZ6EnSggAU1uACAAVcTMA==
Date: Tue, 28 May 2019 13:33:31 +0000
Message-ID: <91E3A1BD737FDF4FA14118387FF6766B2774DA44@lhreml504-mbs>
References: <e6fc4541-891a-60cb-e956-86f238d09f14@labn.net> <91E3A1BD737FDF4FA14118387FF6766B2774C768@lhreml504-mbs> <0100016afa70796c-314cbf69-755f-4ae2-b83a-d53507714c69-000000@email.amazonses.com>
In-Reply-To: <0100016afa70796c-314cbf69-755f-4ae2-b83a-d53507714c69-000000@email.amazonses.com>
Accept-Language: it-IT, en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
x-originating-ip: [10.203.246.126]
Content-Type: multipart/related; boundary="_004_91E3A1BD737FDF4FA14118387FF6766B2774DA44lhreml504mbs_"; type="multipart/alternative"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/MZ2GmZjVRqydRPEjM2ry3wb1TTU>
Subject: Re: [netmod] WG Last Call: draft-ietf-netmod-artwork-folding-02
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 28 May 2019 13:33:45 -0000

--_004_91E3A1BD737FDF4FA14118387FF6766B2774DA44lhreml504mbs_
Content-Type: multipart/alternative;
 boundary="_000_91E3A1BD737FDF4FA14118387FF6766B2774DA44lhreml504mbs_"

--_000_91E3A1BD737FDF4FA14118387FF6766B2774DA44lhreml504mbs_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Hi Kent,

Thanks for your reply

For what I am concerned, the clarification you have provided is sufficient =
to me (no need to change the code)

You might also consider adding similar text at the beginning of Appendix A,=
 if you think this helps. Something along the line:

The script forces the desired maximum line length to be a bit longer than t=
he raw header text defined in sections 7 and 8, to further ensure that the =
header will always have some '=3D' characters wrapping around the header, f=
or readability, in the unlikely scenario that such a narrow-width is needed=
.

Italo

Italo Busi
Principal Optical Transport Network Research Engineer
Huawei Technologies Co., Ltd.
Tel : +39 345 4721946
Email : italo.busi@huawei.com
[cid:image003.png@01D5156A.B2C94830]

This e-mail and its attachments contain confidential information from HUAWE=
I, which is intended only for the person or entity whose address is listed =
above. Any use of the information contained herein in any way (including, b=
ut not limited to, total or partial disclosure, reproduction, or disseminat=
ion) by persons other than the intended recipient(s) is prohibited. If you =
receive this e-mail in error, please notify the sender by phone or email im=
mediately and delete it!

From: Kent Watsen [mailto:kent@watsen.net]
Sent: luned=EC 27 maggio 2019 19:57
To: Italo Busi <Italo.Busi@huawei.com>
Cc: Lou Berger <lberger@labn.net>; netmod@ietf.org; netmod-chairs@ietf.org
Subject: Re: [netmod] WG Last Call: draft-ietf-netmod-artwork-folding-02


Hi Italo,



1) Section 7.2.1 (Folding for Single Backslash Strategy) says:

  Ensure that the desired maximum line length is not less than the
  minimum header, which is 46 characters.  If the desired maximum line
  length is less than this minimum, exit (this text-based content
  cannot be folded).

However, the first line defined in section 7.1.1 is a "45-character string"=
.
I think that the paragraph be changed as:

  Ensure that the desired maximum line length is not less than the
  minimum header, which is 45 characters.  If the desired maximum line
  length is less than this minimum, exit (this text-based content
  cannot be folded).

Fixed in my local copy.



2) Section 8.2.1 (Folding for Double Backslash Strategy) says:


  Ensure that the desired maximum line length is not less than the
  minimum header, which is 45 characters.  If the desired maximum line
  length is less than this minimum, exit (this text-based content
  cannot be folded).

However, the first line defined in section 8.1.1 is a "46-character string"=
.
I think that the paragraph be changed as:

  Ensure that the desired maximum line length is not less than the
  minimum header, which is 46 characters.  If the desired maximum line
  length is less than this minimum, exit (this text-based content
  cannot be folded).

Fixed in my local copy.



A question for clarification. Reading the following code in Appendix A:

    if [[ $strategy -eq 2 ]]; then
      min_supported=3D`expr ${#hdr_txt_2} + 8`
    else
      min_supported=3D`expr ${#hdr_txt_1} + 8`
    fi

It seems to me that the minimum lengths applied by the code in Appendix A a=
re be 53 and 54 (instead of 45 and 46 respectively)

Is my understanding correct?

The script is not conflicting with the draft, as it does ensure that the le=
ngth is not less than the raw header text.  Though, to your point, it adds =
an additional buffer to further ensure that the header will always have som=
e '=3D' characters wrapping around the header, for readability, in the unli=
kely scenario that such a narrow-width is needed.   I could go either way o=
n this, does anyone else have an opinion?




Thanks, Italo

Kent // author



--_000_91E3A1BD737FDF4FA14118387FF6766B2774DA44lhreml504mbs_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<!--[if !mso]><style>v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]--><style><!--
/* Font Definitions */
@font-face
	{font-family:SimSun;
	panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
	{font-family:PMingLiU;
	panose-1:2 1 6 1 0 1 1 1 1 1;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:"Microsoft YaHei";
	panose-1:2 11 5 3 2 2 4 2 2 4;}
@font-face
	{font-family:"\@SimSun";
	panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
	{font-family:"\@Microsoft YaHei";
	panose-1:2 11 5 3 2 2 4 2 2 4;}
@font-face
	{font-family:"PingFang TC";}
@font-face
	{font-family:"\@PMingLiU";}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman",serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:#0563C1;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:#954F72;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-reply;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"#0563C1" vlink=3D"#954F72">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><a name=3D"_MailEndCompose"><span style=3D"font-size=
:11.0pt;font-family:&quot;Calibri&quot;,sans-serif;color:#1F497D">Hi Kent,<=
o:p></o:p></span></a></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D">Thanks for your reply<o:p></o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D">For what I am concerned, the clarific=
ation you have provided is sufficient to me (no need to change the code)<o:=
p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D">You might also consider adding simila=
r text at the beginning of Appendix A, if you think this helps. Something a=
long the line:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt">The script forces the d=
esired maximum line length to be a bit longer than the raw header text defi=
ned in sections 7 and 8, to further ensure that the header will always have=
 some '=3D' characters wrapping around
 the header, for readability, in the unlikely scenario that such a narrow-w=
idth is needed.<o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D">Italo<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
<div>
<p class=3D"MsoNormal" style=3D"line-height:150%"><b><span style=3D"font-fa=
mily:&quot;Microsoft YaHei&quot;,sans-serif;color:#1F497D;mso-fareast-langu=
age:EN-US">Italo Busi</span></b><b><span style=3D"font-family:&quot;Calibri=
&quot;,sans-serif;color:#1F497D;mso-fareast-language:EN-US">
<o:p></o:p></span></b></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Mi=
crosoft YaHei&quot;,sans-serif;color:#1F497D;mso-fareast-language:EN-US">Pr=
incipal&nbsp;Optical&nbsp;Transport&nbsp;Network&nbsp;Research&nbsp;Enginee=
r</span><span style=3D"font-family:&quot;Calibri&quot;,sans-serif;color:#1F=
497D;mso-fareast-language:EN-US"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Mi=
crosoft YaHei&quot;,sans-serif;color:#1F497D;mso-fareast-language:EN-US">Hu=
awei&nbsp;Technologies&nbsp;Co.,&nbsp;Ltd.</span><span style=3D"font-family=
:&quot;Calibri&quot;,sans-serif;color:#1F497D;mso-fareast-language:EN-US"><=
o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Mi=
crosoft YaHei&quot;,sans-serif;color:#1F497D;mso-fareast-language:EN-US">Te=
l&nbsp;:&nbsp;&#43;39&nbsp;345&nbsp;4721946</span><span style=3D"font-famil=
y:&quot;Calibri&quot;,sans-serif;color:#1F497D;mso-fareast-language:EN-US">=
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Mi=
crosoft YaHei&quot;,sans-serif;color:#1F497D;mso-fareast-language:EN-US">Em=
ail&nbsp;:&nbsp;italo.busi@huawei.com
</span><span style=3D"font-size:10.0pt;font-family:&quot;Microsoft YaHei&qu=
ot;,sans-serif;color:#1F497D;mso-fareast-language:ZH-TW"><o:p></o:p></span>=
</p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Calibri&quot;,sans-=
serif;color:#1F497D"><img width=3D"208" height=3D"163" id=3D"M_x003c_F_x002=
c__x0020_7" src=3D"cid:image003.png@01D5156A.B2C94830"></span><span style=
=3D"font-size:7.5pt;font-family:&quot;Arial&quot;,sans-serif;color:#BFBFBF;=
mso-fareast-language:ZH-TW"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:7.5pt;font-family:&quot;Ari=
al&quot;,sans-serif;color:#BFBFBF;mso-fareast-language:ZH-TW"><o:p>&nbsp;</=
o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:7.5pt;font-family:&quot;Ari=
al&quot;,sans-serif;color:#BFBFBF;mso-fareast-language:ZH-TW">This e-mail a=
nd its attachments contain confidential information from HUAWEI, which is i=
ntended only for the person or entity whose address
 is listed above. Any use of the information contained herein in any way (i=
ncluding, but not limited to, total or partial disclosure, reproduction, or=
 dissemination) by persons other than the intended recipient(s) is prohibit=
ed. If you receive this e-mail in
 error, please notify the sender by phone or email immediately and delete i=
t!</span><span style=3D"font-family:&quot;Calibri&quot;,sans-serif;color:#1=
F497D"><o:p></o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span style=3D"font-size:11.0pt;font-family:&quot=
;Calibri&quot;,sans-serif">From:</span></b><span style=3D"font-size:11.0pt;=
font-family:&quot;Calibri&quot;,sans-serif"> Kent Watsen [mailto:kent@watse=
n.net]
<br>
<b>Sent:</b> luned=EC 27 maggio 2019 19:57<br>
<b>To:</b> Italo Busi &lt;Italo.Busi@huawei.com&gt;<br>
<b>Cc:</b> Lou Berger &lt;lberger@labn.net&gt;; netmod@ietf.org; netmod-cha=
irs@ietf.org<br>
<b>Subject:</b> Re: [netmod] WG Last Call: draft-ietf-netmod-artwork-foldin=
g-02<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<p class=3D"MsoNormal">Hi Italo,<o:p></o:p></p>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal"><br>
<br>
<o:p></o:p></p>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<div>
<div>
<p class=3D"MsoNormal">1) Section 7.2.1 (Folding for Single Backslash Strat=
egy) says:<br>
<br>
&nbsp;&nbsp;Ensure that the desired maximum line length is not less than th=
e<br>
&nbsp;&nbsp;minimum header, which is 46 characters. &nbsp;If the desired ma=
ximum line<br>
&nbsp;&nbsp;length is less than this minimum, exit (this text-based content=
<br>
&nbsp;&nbsp;cannot be folded).<br>
<br>
However, the first line defined in section 7.1.1 is a &quot;45-character st=
ring&quot;.<br>
I think that the paragraph be changed as:<br>
<br>
&nbsp;&nbsp;Ensure that the desired maximum line length is not less than th=
e<br>
&nbsp;&nbsp;minimum header, which is 45 characters. &nbsp;If the desired ma=
ximum line<br>
&nbsp;&nbsp;length is less than this minimum, exit (this text-based content=
<br>
&nbsp;&nbsp;cannot be folded).<o:p></o:p></p>
</div>
</div>
</blockquote>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Fixed in my local copy.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<p class=3D"MsoNormal"><br>
<br>
<o:p></o:p></p>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<div>
<div>
<p class=3D"MsoNormal">2) Section 8.2.1 (Folding for Double Backslash Strat=
egy) says:<br>
<br>
<br>
&nbsp;&nbsp;Ensure that the desired maximum line length is not less than th=
e<br>
&nbsp;&nbsp;minimum header, which is 45 characters. &nbsp;If the desired ma=
ximum line<br>
&nbsp;&nbsp;length is less than this minimum, exit (this text-based content=
<br>
&nbsp;&nbsp;cannot be folded).<br>
<br>
However, the first line defined in section 8.1.1 is a &quot;46-character st=
ring&quot;.<br>
I think that the paragraph be changed as:<br>
<br>
&nbsp;&nbsp;Ensure that the desired maximum line length is not less than th=
e<br>
&nbsp;&nbsp;minimum header, which is 46 characters. &nbsp;If the desired ma=
ximum line<br>
&nbsp;&nbsp;length is less than this minimum, exit (this text-based content=
<br>
&nbsp;&nbsp;cannot be folded).<o:p></o:p></p>
</div>
</div>
</blockquote>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<div>
<p class=3D"MsoNormal">Fixed in my local copy.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</div>
<p class=3D"MsoNormal"><br>
<br>
<o:p></o:p></p>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<div>
<div>
<p class=3D"MsoNormal">A question for clarification. Reading the following =
code in Appendix A:<br>
<br>
&nbsp;&nbsp;&nbsp;&nbsp;if [[ $strategy -eq 2 ]]; then<br>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;min_supported=3D`expr ${#hdr_txt_2} &#4=
3; 8`<br>
&nbsp;&nbsp;&nbsp;&nbsp;else<br>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;min_supported=3D`expr ${#hdr_txt_1} &#4=
3; 8`<br>
&nbsp;&nbsp;&nbsp;&nbsp;fi<br>
<br>
It seems to me that the minimum lengths applied by the code in Appendix A a=
re be 53 and 54 (instead of 45 and 46 respectively)<br>
<br>
Is my understanding correct?<o:p></o:p></p>
</div>
</div>
</blockquote>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">The script is not conflicting with the draft, as it =
does ensure that the length is not less than the raw header text. &nbsp;Tho=
ugh, to your point, it adds an additional buffer to further ensure that the=
 header will always have some '=3D' characters
 wrapping around the header, for readability, in the unlikely scenario that=
 such a narrow-width is needed. &nbsp; I could go either way on this, does =
anyone else have an opinion?<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<p class=3D"MsoNormal"><br>
<br>
<o:p></o:p></p>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<div>
<div>
<p class=3D"MsoNormal">Thanks, Italo<o:p></o:p></p>
</div>
</div>
</blockquote>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Kent // author<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</div>
</body>
</html>

--_000_91E3A1BD737FDF4FA14118387FF6766B2774DA44lhreml504mbs_--

--_004_91E3A1BD737FDF4FA14118387FF6766B2774DA44lhreml504mbs_
Content-Type: image/png; name="image003.png"
Content-Description: image003.png
Content-Disposition: inline; filename="image003.png"; size=38861;
 creation-date="Tue, 28 May 2019 13:33:31 GMT";
 modification-date="Tue, 28 May 2019 13:33:31 GMT"
Content-ID: <image003.png@01D5156A.B2C94830>
Content-Transfer-Encoding: base64

iVBORw0KGgoAAAANSUhEUgAAAaAAAAFGCAYAAAAsK0vGAAAAAXNSR0IArs4c6QAAAAlwSFlzAAAd
hwAAHYcBj+XxZQAAABl0RVh0U29mdHdhcmUATWljcm9zb2Z0IE9mZmljZX/tNXEAAJdNSURBVHhe
7Z0HgCRF9cZ7Zmf3MndHkCAgyYyIWRAFRAUFEREEAcmoiMAJAh5pGBCQfAQFJCMICihiAgOcoKAI
ciKIIH84UDLH7XFh9zbM/L9fd9VcT29P2tu9Ta+gbnu6qyt8Xf2+eq9eV+UKhUJgwRAwBAwBQ8AQ
WNEI5FZ0gVaeIWAIGAKGgCEAAkZA1g8MAUPAEDAEhgQBI6Ahgd0KNQQMAUPAEDACsj5gCBgChoAh
MCQIGAENCexWqCFgCBgChoARkPUBQ8AQMAQMgSFBwAhoSGC3Qg0BQ8AQMASMgKwPGAKGgCFgCAwJ
AkZAQwK7FWoIGAKGgCFgBGR9wBAwBAwBQ2BIEDACGhLYrVBDwBAwBAwBIyDrA4aAIWAIGAJDgoAR
0JDAboUaAoaAIWAIGAFZHzAEDAFDwBAYEgSMgIYEdivUEDAEDAFDwAjI+oAhYAgYAobAkCBgBDQk
sFuhhoAhYAgYAkZA1gcMAUPAEDAEhgQBI6Ahgd0KNQQMAUPAEDACsj5gCBgChoAhMCQIGAENCexW
qCFgCBgChoARkPUBQ8AQMAQMgSFBwAhoSGC3Qg0BQ8AQMASMgKwPGAKGgCFgCAwJAkZAQwK7FWoI
GAKGgCFgBGR9wBAwBAwBQ2BIEDACGhLYrVBDwBAwBAwBIyDrA4aAIWAIGAJDgoAR0JDAboUaAoaA
IWAIGAFZHzAEDAFDwBAYEgSMgIYEdivUEDAEDAFDwAjI+oAhYAgYAobAkCBgBDQksFuhhoAhYAgY
AkZA1gcMAUPAEDAEhgQBI6Ahgd0KNQQMAUPAEDACsj5gCBgChoAhMCQIGAENCexWqCFgCBgChsCo
JKCD7rz+vUFL8KnVp0xc+aXunn9d9qFdr+7voz5i0nM7TZ46afN5CxYvyrbmfj/9T6/89eSNN+7t
b352nyFgCBgChkCEwKggoIMvv2iD7gnjvz5+ctu63eNLk4K23AbjWlvels1lg8ktbZ0HP/zLRRdv
ssPNzT70I8Y996GeTOb7wfhxa04rBsHinuI+r2/9xv98u23R6129pReCoHTpuS+u9K9m87X0hoAh
YAgYAiOYgE7M57MvTF5t0+KE3LmZiePWGNeSeetKuUzQ09oSdLVmg65MJnhpaXfwhskTxi/p7t35
xBPzt5x8cqHUzEPvbgu2nT518pqvv94RZFtagokTxm+Qa2vdINBxZmlP0F0sbv/NN3a83JppOWb2
ojfcd397e08z+VtaQ8AQMATGMgIjUgPaKz9r2sttq102IduyVa4ls2pRxNOZzQTzilJToJhSNsiI
gIjtPb1BblzLjq/svdkOwUbBLxp92EdMmvf+Uq5t3y5lmWnJBSWRTkcxEwRdKiBbDFqyLVKMxm2Y
zWQ2LBZ7b/1o9qV/viVYtPt17au82GgZls4QMAQMgbGMwIgjoIPzp7+rFEy+eFKQ+chSkc6irHt8
Os5wDPHomL+B/qKSrDahddJLncV36bBhAiqOK75jpSmT11/Y2R2g8QQioUxWBYh4yLuouKQ3ZLtg
XEvLypMmTdxyrWz2dzPGL5mx0lfOuLNZbWssd0JruyFgCIxNBEYUAR2QP+cTmWDSxRMywUYLs6Wg
lCmFWk4A8RBbItIJyUf/h1HnF/UUg3Hjsp8/6Lk7b77sjR9/ot6jPnGN56bOXzpu+yIEA+EoZiAh
jjG/hfkr49CgVwqWlopBV1dvMHHc+I116ob5lx9zxIknnnj9ySef3JTJr1697LohYAgYAqMJgRFD
QAflZ72pLWid1RZkNloYkovTeEKtxxGQJx6ekNOA+NspIll5Yuv7ly7tfauu1CWg+Z3j39rWlv1C
R6/sb2g+itHfSBMK0IRCdUtBZr+MCChQ2sU93SKhcavJLPfdRZcc+78gGD97NHUWa4shYAgYAgOJ
wIggIM35TFGjvz8+yLzz9VDt8FqPN7Vpzic0j4XMU9aCRFHl3+HUTZB96wfvu+8392+2WU1nAc3v
rDK+ra2loygNi3zRekLtx5GRN8U5AgpK8srOiIRUtyXd3cHkttY3al7ovEOnLdn2wvaJLw/kA7O8
DAFDwBAYLQgMewL6YD6fawtWPnGlIPuZhZHNa5l5Le0YExzE47Sk0CSnsBQHhVx273evu/An9wfB
s9Ue4InT5k1fmM0e3KOySiIaCCgiN/1tgYw8CTEXFGlApR74THNFRYiqN1jU1RNMHj9u056lC797
6BrPfePCF9+4ZLR0GGuHIWAIGAIDhcCwJ6B3B+Ony8h1QCeEEG91xCsJQvInY0QV6iWhhSxoa8vh
iLCyYlUCWtQRTCtOCraFr0JnBm9uw/yWieaAghxmuMgZgYwptaR5poy84/CWy+jmDrlp68SXg+4p
F+ryQwP1wCwfQ8AQMARGCwLDnoCCYOJZ44JgeqrNzDsaJJ9GnJxiJNUCoRRza+nUnBoPMJvJllpL
Ihdi5HDgI+7dThvKtYbMViqpZrhnc550BP3tLck7rlVM1dtz8tsfeWSnx2z1hNHyzlg7DAFDYIAQ
GAEEFGwmx4NgcaX+s6z5aX5mKec4VRQpiEB2OHHefX84eZXNliYxlOda5vULDtkqk2kT+7hMfF7h
b2lhcjiQ811oeotCOUFFdiSHj1Tm5p/dYs2VH2sPXhmgZ2bZGAKGgCEwKhAY1gR0UP6st8qBekrq
wmsRH1QJThOJXS/BCIqyqH2iszOHU0MfApp/xhfHZ8avevB4JeqBYOTqHRJR+QNXd9yrGSJPUFwr
qoZhmii9L6unt1ee4ZnJHUFxD5V3/qjoMdYIQ8AQMAQGCIFhTUCloO2Y8UGwZleSaZLkU/4dZ5wE
QnBDxFnrdozvrNLu6blsqbSm1J9IWwoJBWJxJNMb2fxCPzzN94T6T+iCLTOcyKYEEcXu6RUptWUz
bXKm29YIaIB6rGVjCBgCowaBYU1AUkHeMlFQt1dTdSTZA3gATzTNw2S0BE9kGiNiRZO5LNRQOO/J
JFPs6emZqgQpS+bML5aKq2jdHZeWfEUskVddbGIJ0pG3W0RASksayAfNSE4J4T36LVdsOd5lpEgV
3zBqeow1xBAwBAyBAUJghRDQAfkL9pFOse3aQXDQyYUZixuve0lLsaV4FITEg6lLvBCSRaTahCRD
cNfL5yNvAZFUmLAt25LbTAePJ+sxoXP8Sl25YjYinWyo0WREXqWM/kr7CTWfMH8d4x0XHkNwIp2y
loRTgjPJ4XqHQ0Kx1y8Y1FDTT3x7PvvyDZte0Nvd89/LPrDrGQ3dZIkMAUPAEBhhCAw6AYl8PiWh
/d3Vg9waLwRaKiAI9hkQjLyiE//L0jnR96CVRBRqP6JAEUWLQjGb2UKrY19zcmJ17I5ssEdLsXdq
L9/1hF5tZBM6WUfk4+d3wlUYREye/ML5n8hMF34TVEQTQiPiA9XwY6GYbbB+61+44X0HT8qWDtGK
pz0H3XdD12Wbfem8+ndZCkPAEDAERhYCg0pAWsFgPX0Vc8LEILsGZjQZo3bZOz/r5msLMxpeFLQq
nF7LqfgLVzjNyJGOdwzwGlCL6tHb3bvx7Z/eriXYLFyrtBxaWku7jG/JtHZ263S49ptIRklC3Yf/
Ne8TLruDi3ZcM9O5ktOEIhJyJjmOcdHmd4Ph4H/f9qGWXOZoOCtTLOVyxeCUr951zUuXbr3PjxrM
wpIZAoaAITAiEBg0Ato9n2+bEqxS0PI5W/gVDCYGmYm5IHv6fvmzHrmqcNTTy4VQaE1zGg/yvawJ
cQ6NRILfaSyhmQ6THRpQqNRk1tjuLU9l7hcDxUNPT2lCJudIg9W10WaEEFmFypDmmEJTm/8uyOs1
oaMCc0HeI04V0r0lnBOkSelv2pdJfZp/6JO3rZ4JcmdNyBXXXbCEPErBpEx2UlfQcthet11z93U7
7qP15SwYAoaAITA6EBgUAtornx+fCVY+ZUKQ2Rvy8XMnS3Q0Teu59QZt10s72uO6woy5tWHMtFWd
PIFw4sSD+U0CW1+Alud7pEFE1q9wVetlJBTSyQvvLgarJErvkboCeTmFpaR9hjLhfBAWNrcuXLgy
QsIpwblgR1qQd0hg3qgoXtR/3cW6815HP/nj6Qt7J182vTX70fmLutw8VjFY1N0bTA0yHyq1BMcf
etusIy7ccYYt6zM63j1rhSEw5hEYFAKaEEzfTiumfYuFQ5OTHwtCEspu1hUUT9Cupl8/uVDo8z3O
sqfS+2xnkP1INAuTCI5YSiIXBH2Ai3SohcQIx2k+kfYTmrQiLUVfo86f/pQc7DZeGM81W5Sm0isd
KW4x827YaDJ+WR6/QkJYr4jwyt8LhWY36oMDQ2/QrfJagp7/1uppOB288MSHDpqYDT77uvYfwpMu
8tqL2rJAWz1M78189dVFk17fa9ask6+bMWPRmO+5BoAhYAiMeAQGnICk/UzuDqafiOYSJw2vBfEX
6TklyOz0XDD9Nh3+vBqKmaBjVmcw6ePjgszqS9NcsUOtx5GPtJ+SohzWIgJpca7Z3kXb/S2KGIrZ
7IRicQpbMzwQLzt0IOjRLFH4iU+MWEJ3O7cEj9N+WKanvFoCqUMnBLQs7wHXi/t10NXT3a05ofsx
5VULr/xiy3etlOs+tKi5p6Xh/JHzrPOu493FYMFSEVlPcMSU6eOvUD59PPhGfE+0BhgChsCYQ2DA
CaglmHaS5nreA2EwUZ82+cGHpVpeZ2WZ6M7VPj9PXlaY8Wga8pcVZt5/UP6Cdukkq6c+GWd2Yzm2
DMcS1EG3SpTpTB/gxExvkBTf7kjBCRcNLU0s5QIWJi0T0NHz7nlDx/hJE4oigFBbgnT42DQkFjfv
g1NCfG24kKcczZa1IKcBhfNNcnjo6V1Q6ur4aTUCOui529ZRZa/Q3NjaC7SKtnchj7QoRcyKir3d
pWC8FlZYsiQ4/9BZsz5/4YwZHWOut1qDDQFDYFQhMKAEpKVz3tIdtO4n45NmPhDM6RQEKS3StalB
doOOoHTRQfnTvyiySV0rbdkMUgruFBHOBbn5HwnpkkgoExKQzotwQs+1yBU6/F1EY8plx8szbaN4
jh0tuc3lLLBKT1fkfo2LNRvQha7WEJFzvV42/+OpFU3JEVHo9OAIi43qWAuup7fnlY6elwK+qE2E
E5+7Z/yrna3fndKSfd/CJZr3CU2JuG878uGv2lNSu/jbq02Nct2lbTsX57ZWVr8eVT3RGmMIGAJj
DoEBJSB5a31HXm8raxYjFUhvhuOiJyGtdL3V0mDS/jpV5YPL0u+lMb0ZA1hoGUuGUENASEvbanFE
xDmENr+xybF7Nisl8DGpVjDIar1rKTmrxrMqdvV+MJsrTcPpOmQORz5+L6DQ9TrNAYFMvPZTMRdU
VBX07VFPzwPBhgKkvW/VX+pa/Em5WX9xiUxvbOfg56/COaAYqXotqFtppAUF8kI41QhozL2r1mBD
YNQhMGAEtFf+rI3k3fYhbVgQaj+N+B17QhE/nCDt6d7LCkfdk0R4QtDxHc0D7d2maSPpCH0D8ySQ
TW4Z+aAxhGSkeaBQC8JRgb16ICARSavOd8pNL56ZtJ93Tm4bn1kYfgMU+d7xzU9IOmxGF36Y6j4s
jS/L4zPxrt7h37L5TcX3Xn5ju3wuEuGgf9/5jpbW4iUyReY65ekWuXCzuZ03u6H9RPNanoA47lXM
9ZTWPyA/67NXDMT3VKOuS1uDDAFDYKQgMGAEVApaD5OVaV02jqsQ7AjyGmiwNIIWHJ3UoXkQzQdt
pfmg5yuTT+iQHiFPueyU1GwozmlBAZ/bOIEdbhDHb0gonLeJ7iZ5i+aHZCqrICDN+YzTKnGRIwNr
ymFO41sgt/12iS23ySPpgu0zjWtB4Xp0aD+9izPjuv+WrPeJ993X9tLKnZdPCrJrLV4qbgq/GYJ4
ljkghO1gTiskpGVzQV06XqkYTH09CI5Uvsv/Qe9I6alWT0PAEBh1CAwIAemj03HZYOW3yfwW4Gbt
PeAa0YIgBPywxwctGy0Jisfq8BtxlKcHq3V0Ba9cIBF8MvmmmuHwekNYo7loniTSfJzRLtzVFE0G
7og0oGykbUyIlyNTWanUrUSY88JFTaPvfkp8P+TnkcrbfSdbxjxQNBfkveFImunuvTV4TpBsXNlv
npv+yv4rZVvftXRpdzQn5eZ8IhJyUavglWiL/hL9PBDtZH081W6q5s6ma+5s/qjrldYgQ8AQGBMI
DAgBtQUrfUwc8C45FJS1jLiIjs/9xI89whGpZDKTgsye++XPueuqwpG3+GsnF/bsOjQ/6xp51YmA
qlEa2oKEP8TDTtkwFY4E/A21GPc7+iOBrwWCktNU+tYGP+fQBMaNIfFAXpEJrmJ31Ki6rooR8YRf
BPFX2g8TTG3Ssjp6e66/eOMtKz5C/eoTv95hSjZ3krSdyeG23Y50ItMbZjfVA8KR23VIqpCQc0II
yUg/0TJluntzdzBhT5V40ZjoqdZIQ8AQGHUIDAgBSYxuMTkordGZIAhPR0ln7DQSgrzkFTctF7Sc
I1PcszLFlU1XnUHH4lIw4bdtQfZTcnJOfwiwGAKatXac1hOqYqEn3DK+CO9GyCcDH6uW52LQovQb
kmH+x80JleILlFZ8B7SMhGAhfYQbLOrsfkSfFD0WL+agJ29bVW7i35rQml39Zel14VYRmp8qaz6O
cEpLl2k+EFBZE3LVZgG7VYLMpHlB8MFR1yOtQYaAITBmEBgQApKUXkkfiwZ8mIJekEYw9RDlPpbt
mR7k3tQe9H5RP8sEJDPTPH0PpAn74FM1lk2I5n/QHtB6QvJwmko4d+Mi9eOD0z4akOZiMq3Rlg2Y
3NhDKPz4lA9aI6eEkNj4P1wczrXUNba8MrYcFya2tgSvdfdesuY2hz4bPLaMg3JLgj2ntJQ2m7do
abTED+TDvI9ztw7rHprcIi0okBaEW3n0fVNlhaNfqGkWDAFDwBAYmQgMEAF5I1QEgichJ7bDc42Q
Emle1wyHTHHf0DYO/3pjMO+HWqonXLG6Jyg+vjjI/kdu22+uSUJ4NUguh+WF8jlyHiiXj6aEqS4R
Sgh9zG0hAcXmfsJzUR7eASFV6rs5IFGYls7peU2s9dDJjz1WLuigB2/9zKTW7OmdS3vatBp3qP2U
zW6Y3rzZrdOTj9qAJoQpzpne4lUmY+l24mQLhoAhYAiMTAQGioBSDWNe6KetiVCNkOCPVvkkyIz1
3f8Gk3HLfhJoryrM+NcB+YvOXTkoXZy6LI/HHwJBYCOevfObV1Z0iW+Bwi+K4uzIvb29mVIPK1dH
LtvR3A/mOwhpGfmE5sSQ2LxbnTM0YoVTnDquJXi5Y+mNb/jxg/cFhc+EtTr0udsm9mZ6vh70Zics
Zd4n3GnVOR+g2UAyPoYaEOQTmwNKsRiSr+4UVBYMAUPAEBiZCAwoAVVffCcCpxEtCLHeqSiX7jf0
BG17a8HSk6QFhZpEMej42ytB238mBi1v7kj3h4sK4iNOvryR63TkPBBN3oekxEJxLc48F39mmO9a
nFnMzSGFLth4K7i5pPBjVN+Iii26YR+xge7r6Cy+3BIUf6c6hyXm8/nMV7d7x2GT2nLbLw6dDqIy
ymY3GFfa1zKPN0egmN06dUy9UkJEf5mayuDI7JJWa0PAEBgrCAwIAcUNWklx2YgrdhJs8sDTSwuW
nvBCMP0JkdD1CHTtIfSgPsD8icjpuLoLoSHkMWGFpCNHgshFTf/zW8TEh6uxoLmYyFciNMFBUE77
EXll3NxPNO/jWpRw8yO36dJ+Xlrc9edL37vzrT7r57fb5H3ytT6tC5drSAVznv/Gx3m4hdoOx87c
Fs77cFyFfMjbKXDQlwVDwBAwBEYkAgNCQJKqry2SYI4sXdH6b168e4Vh2cYMy3ziamlEkFp3RB7H
PxEEP9HPcDUBnb/ltaC4qxY8fQv7C9UMmK6W6h8UFKZxwu0N3IoGiZZnpJ3gSBA6E4RL8UQOCJBP
eQFSCot91Bove5zOL1zS+0Kut/fa+PlsT9dJmqjJdONsUF42yGk2se98KsxudciH/CM69d4RI7Lv
WaUNAUNgjCMwIAQkB4E/aqHm/0pjWSdaBbusJ4Tw1vud9gy4R5QQaMXst2rVHL51+QrpNBf00IH5
8+7JBbm3eGeHxkgIchH5eXWNBUvjoQPTmKstJjqW8mFBhNAMR4MincP9iX0HRAO1UrXWjpvf1f3Y
D7b40q0+26/eec232zK57Yua74m82fB64y+N86a26G9kgsMBAZKsTaz6BkjOGqV5yun2Md5/rfmG
gCEwghEYEAJ6R7Do3ieC6Q9rpL8O8zdQjteC+pJP5QrZ9bSgUOgHmT30bdB1+jbobn73Bj3nLgqy
W0/Qatp1tSBugHTQKjC/MR1EoRBMLJS04E+J+RnIBnJy68hFDgvOcYGWeW+42L3jpf0s6uqdpxy+
408fdNs1b8u0Zb6aU22XQDB+gdSQgJwGxF9/za14UGtqy+etpYu0vELwzDrB/JtGcN+zqhsChsAY
R2BACEjzM72752fdpVH5p5Wh1puur/XUIh7/TEjDB6qT9dGlCOckrYjwuQsLMxZqLuhf++fPv0su
YOujn8TnoKo+TzILtQuISPVL04DwgsPDLdSAWF07mgsKP24tf1dUWQJ8lM1m9Q1r8ZHLtt37Lq6e
eP31454f33vCpFJuvUWsdB2ubK0Lfm23kID4HimmBYUrMNTvjehhUqD4bPZh4W5zQPUhsxSGgCEw
TBEYEAKK2jb/gp5g2peklbwP01k0C7RsLsiby/w8UXxZnXpkhEOCvg3a+vUgc7QyPYHStEVDXnTx
Gc0FremXAGoIY8gA77KEBhQsFm3yVQ0aT6gBue0XwpUVML05jzivATkLHqseLOntKra0FA/z5b+Q
W7prW3dp5045HkTkE49uXbeyRqRrOD40GPjgtzMovrg0WPLtBm+xZIaAIWAIDEsEBoyAbtRofJf8
WRd1BK1XkSkDfrcEW2rDm5kXIi99gIpX3OcOzs/68cWFGY9cV5jx3P75WT/U7j5HU05DWpCvSbh1
dqXQL+oD0JAscLt2BFQ2w4mEwtWwyw1yTtDKDwcFfdPz0/lP/PexYMcgOOiSS9ZsHd9y4MRMdvzr
bO2AOgjZUB7bhvtVDThfZ64nCZzjQmbZrr6uMPOlYdmjrFKGgCFgCDSIwIAREOXdXDjq6i/kz91i
QtBygN8R1e8MhLhHfnviqffNULL+7KC6epB914tBcaZMcV/DFLdq0PHd14KJX5JWsE7qXkENgkCy
UqdzEqCS3vzmvxfir9d8Yh+w+kORytEQsExvrS8EwSFTlpa2nN/DDqcRyTDvVNaCnAmwEXNbvPoU
z2rji4PSLWsG80Mt0IIhYAgYAiMZgQElIIDIBEuPWhyMX0/zNtvEv9UJP7HpQ0IRdN4fzeskad8O
cW6ecpgSZHdYFASb6edvxwedCzLBhFNzQfYSdmFt3JDV95Flloom/EenmN/8oqaehLz7tf8MSHND
mMOWZItnjO9aGm4n/sor8986oZTdfyErHaDxoOHQaP+3CVNbsoaQjxwunsgJX/9h7kjueFZ3Q8AQ
MAQaJqAP5k8/WlMkz/+pMPO6WrDdrP1pZIo7TKa4H8iF+iORW3bfb38isljmLZdGOslyMMUpp5Wy
QfE78or7twTxs9KGbtQ+Qntp7mmLpuaC0hpBpcJVCjDFOWb0TgjhEjzuJh3mREha/fu17sXFy39Q
mLFYe/Os3JubfNrEltKaS6TlhN8cebvgcjCj13w05/WcPmX95g8KRz1dr9tq4dYvigI/yBYWMlW+
Xi+9XTcEDAFDYCgQaIiA3pU/5e2aazmwNciusUX+uzNagtJX1ww6H5HZKXUpGJni/rV7/qy9O4Pc
2ROD7Ocxj2GNin+3UzZfVdBTBEE1pwTulwlKDgnZDywMejXjElwkU9yC/fKzzpNDwofhheWQ9ZX4
kxExnLtxtfLaj37y4elrQeaUNwXTn41unPAObZX92UX64LQRMm3kYaOEoflo2aGHe4LMkfoG6vfV
7tOmgG3Tg+lv0yYPl+g5vUN1mCpnkH8o/Q8bKcvSGAKGgCGwohFoiIAkhTWvk9lQZq6szE7vywbZ
P7waTPzL9vlTDnkl6Pnv/YVCnymYGwtHPbV5Pr/fBsG0+SKh/fEXDheqdi2Mk4z/dLURwc19aFWq
w6l75S/63XWFbzzeEcz/RVuwyrXaI2f/V0JCG6Sgwil/mkpYWCre0xaUfuw2zJsqbehy5yI9IIXz
YCCfRUFRH5uWvnVF4fBH0zL+YD6fe2cwed3WYOoZLUH2E/IWnAbZyzuQpSPWHpDKWCaGgCFgCAwC
Ag0RkASZrG+lLCauaHWCYKpG2dt2BuMeWyUYd8G2+bOuuqNwVB8BeW+hsODeIDhgj/w57VOD1iMo
DJfqeIiTRSUpVa6mEL8HhUSrAazUG/QeqcOv4ACgNeJu7QpaPitvudWW1yGhFs54aouIX1sa9Fys
nVvlcxBobia7m75JekuoKA1AYKUDPjZtD4pXPRa89nXhGH3fmwjS/N7ZFkzfUzrXka1Bpo2tuj2+
k0XRPeGS3hYMAUPAEBieCDREQKp6EeLhv3BRAUV2JpU21KpdSo+URrLbZ/NnnDcuKN6kOaD/Jpv6
o8KRR+6Rn9UtLeprcqWeysZzhEryqVwhgevVTHHeOqb5oD0Pyp915WWFo/5yRWHGLzQvdPnUoGVm
gw4J/VKUVP/g1aD3lyKfG6jjwfmzNuoK2k4VIWeS5NqfRy7nDTS8nvlBcMmVhcMPTctjr/zpb2wN
Ju2ijcWPHB9kw+WPIN3lc8PoT23tHkPAEDAE+o9AQwTEyD6KjLGjT0gjc1NoIpJGlF17UpA7RxPl
O2yfP+ump4JFlz7mtlDwVftRYca3d8+f86DWjDtgetCy7QJWpHYXl3nBRQ4L8WF7NRKCZGRmmrgk
aDtZ2XyKrFTHG6U17K6tvddfUMMUFxFYqcouO9XBxKw1Pyi9pPpd5VN1Bm3flraxqtre/6fg7pyu
li8Mig9J3ZF2ddhlaRlK09tvXDBxD5nnPoFaxJxYWuCsqT/L/UgsA0PAEBhEBBokoKLIBpMO5FAM
KYip9shRLByxhwQlwb+1HJi33iSYss1b82fdfGvhqBvjdb+xcORNu+RPvzsXjP+OSOtAT2yVRNR3
RihJVOQZ+gfoX5mePiyh/CVpQDdokv5h7aSKBvQ9aWerpJFC5A4eanOLK3Etb1+XCjcOAe5T1cu1
Jt1sEqncHbUSwk7UpqkPYRMlsKscmo+8+W7RKgcnsvleshIyt+0oottVm3nj8ae14KoTzyD2F8va
EDAEDIEBQ6AhAoqEfWR2I3riYaEdCMgvuMN22iIECdOWL8hkt83O+fN2awt6TpNDwt98jWWie2n7
fP4weWz9WUQ2U4L3LRBYfP24NMLxpBO3m2EKnBpkprQHma/LC+yneOVdUTjsx/vnL/jW9CAQAaUH
V9aCBAGJD6tb5fjmR9rek9lgyXnL7svsNS3IrqL9t/v1QLyXm7SYlxTP6AoWX3NVYeZr8cxEPJvI
4eJEfev0MTkYrIYjR3sV7S5eC//M+lUxu8kQMAQMgRWAQEMEFLlPo+WgAUUEFGlC2vszHP27vdx0
HtMYH4xqlD5NE+k7dQWtH9o1f95vdVf+5sKMZ2jTrwoFvlG9ehctYKrR/znKT84DmTbuheiWmeQi
BGpN1rBCgjSDDxSD6azFdlZEVEv3XhiMu0t5rp7cvpu8omWCMhUEpPY9y8raacv6OOeJjlzQc8il
hZnzKEOa1n4rBdnttABr04+JOuBooJr2ysX6ryLrA6VVPRbPaK/8rDXkPXiciGcnpV2bOnsPvyQe
zdeg6SrbDYaAIWAIDDgCDREQ8tqbrvwab5jhPBlFmlCkJUFF/JUpKTTbyWNuTQn1fSRkPyOhekZn
0PEjaUGh9xiEpA9Jv6yVDT4v8inISWEjcopIwzsq+GVNo7Yn54TQZqRJjJMzxM76GPTGy+QEodWy
H9M6cdeM0zpxEXlWBmcuWxg/q9Y8Lu1iqQAZFzenebJYEvT+dM3g9dncozpP1Pc224rgppBJo94M
1IM17dASpfE8p7LO1N+r9LFouS5qw2rZYNLnRfYnCLe15WgQzvNUmwtL6xHePJnS9AHvQJahIWAI
GAL9RaAhApKQf1EqC3Mmk6LVCKAJ9B6OZSBymovXXiIyiqioQ1cpRJrOavpzdi5o208ecVpJs+NP
f9CqCfqQFG3oRxK8d3UG40/XnMr2Mmutiqcc+cV3WK2mGZF2pSD48GvBhH20ffepbN/9etBxZjYY
v824oOV9cVOcI0rWKqgwdamsxyTwX5fAXw2PPx+Yn5Fm9D/9OZZtJzi/JAh20bdAu2F6a5R8SLdS
aMYrLV4aFP+sr3QOu7hw1OO+nL3y+UnjgpU+0hJMzKsOm2OeA+t6qzskydUTVVc0HKi7c3l/O47d
ZwgYAobA8iLQEAFJCM+WdjBb2sz2CEQcEJgLgnh89PNCyyrk3aoj013klYXrdss7JWBvWyOY8GN9
H3S5XLTDr/uluaAV7as5j500tzNDZW7J6B+zWBoJcY8XtpFrON/OtOzxQrAa23c/IS1rnvI6XPW8
W9pauEcRwRGGlh4tzo2Dlw0WPyR+bZfghyjLadluQc4Mx8tEFq54IKJcJacFUMGgUbdnPiiFyNSu
B0SGl15VOPzyeNlyH/9oLlh5b9XuQIgH54lGnBrSyId89YGsvOlKT4pI9RmWBUPAEDAEhicCDRHQ
04XCvDflC08j2BhSQz5+PqiSgJatfR25a0cUwV80In5BYBSq72l2WxS0bL9X/rwrlNdVNxZm/AOI
5AF26y75/D1TglX2lTA+WJrGhmg4lBnlVRm8EOYbHGlOb58fFL8oh4Qz5ZDQNTkI/ilt5fLpQeYr
TNx7AtJRp+rwdDwnEeArX8lf0BnXsnSfltvpvU2a2a99Wi2H+klpW9u91gBFMJ/Ed0MyMb4qIr2w
GCy9TubBp3xeWq5ow0nBuAOE1QGa73mDXLDD1SLqhTTiic5F/+Iuvjgo3nNd4Zt/rZeXXTcEDAFD
YKgQaIiAosoV/9ahiXvdoDXGMA9FE/bLTHHL3LIjF4X42tdRDpHzQqQ9MXmvyfXJWt36cJHSNrvn
z71ttWDBdy6Ug8LNIjwlPWev/Fn3yK9uZ4nVY3A9Zm7IzzP5/DxwiF6+SVL9DpkQTOYj0f+Tee91
zdecqDmUTeRB9mHmUqKvmEqdHUHH/9UCHSGu8h5T6mOvK3wtXO1a2s+qEu/fXlTH8BbNG0VBRHCV
cLv+msJhf4iXt0/+ghMmB+N2kHb0Qb7n4buoWqGao0E0W7bsKmVHdrdMWGcLhoAhYAgMVwQaJqCJ
QXCLJoH2klbxSQgo3OKmTEKejLyLdmSmi0xnoTAMxSQmNW9Q437mZphHkZawsTSAjRcG07eWWe5a
meUu4a7rCkfdrz/3752/QPNDxW/KHLYtFYbAvEYV14iol4hjja5g3P67568/6cbCnt0ioZd0/yUq
9wO6FwsXoWeDoDP0ZouHaM4p+oCTcubrw1ZpZLElhqZsOykovbvavIy/j3ZKI/t7Keg+XWbBX19T
OFyKWBTkPbebrn9dFfkYrt3VvueJ1yuNfPy5OPlwTkQLuT8sZ4eLku2z34aAIWAIDCcEGiYgrWyw
+E35/K+06OY2uinrPyKNRPYy4oka58VjpO0Q0I84jlIumx9CI8HEBjPomyDt85PbdM/8rB0mBt0n
aomdv3PvtYXD7tDyMw9q759PiyROlmvymzQfFS59U0lx0UKlKuEbU4JXLtWt4bzN1KD4k4XaGmLl
IHtQbL22PnJdLuU6l0GIl+Qs8IvJQXGWf1jSpKZ0BC3hqqvJJRRokTz4Qhd0zfO8olp9RzrgzZcV
jnze339w/qI3ayWJ43BN13zQVDw6aq3WEEcx2WGS5ON/Q4Bu/uhOzVn1WRJpOHU8q4shYAgYAg0T
EFCtriVitA/0dhpdf0pCOIvgC3ecDr8JYqUETzaeFpYt3eM/WvXkw9xR5EsXmcXIx5nlJkhAby8D
3Uf3zp9ziry59IHpUU9pC+pXleSHMoP9cmkwcYbu31PuzBvSANSLuEMCC5VqXol11I6i3njayQX8
NJnDPqhlgN4tU1zkM5EIIsleTG+a93leZHK89vkp76WjBUe/pDI3SBrKSB+thFCaK0K8IxcsOfby
2MekcjBYW36AO0hnlIdfMA1E/LdD1TzoapnbImLqm4IzfFuktj2s5YKOs65tCBgChsBwR6ApAmLb
hfXz+cPlcfag5jgmRwtgRmvCRS4GEZ1ETtjRSmR+lYRlKyb4tJH4jVL7uZloBB/dWVopF+TOUq7H
752fte+SoOOvfD8kZwFZxoL8ofn8GQuCaRdrbugDchZ4OyTEXAq1oFGqwT5H5y8548zC1yAumfNm
zN0vf873NH/zAwlwFK4+Ulx1zVHf7qBXy/oc8U//8OTUIM5d5ShpOZnIK4/veTKhg4FWf5C3We/D
04POr14UkWQYRHgrtQS9H8gEuctyQWl97kH7QkuqFqpfWVbZpMktREqRBqERqv6zflWYUTb5VS3M
LhgChoAhMMQINEVA1FUecU+slc9fKWF8mP/Is3KVhIhA0HAI/iNVNBznABDSVfyT0iQJ+fkh8sDp
QSP7n7UFE3+7e37WqfKWu5t85ayAkN1nP3mSvR605pX/VmsELevMCwkEB4dg+ryg8wilOdZjrBWs
L9svf8EWynfTJ1LX6iwFLwW9v7iycESoOfkwIZh+kPJbE8JF0MuUx4rY8xcH2d9qbuq0qwrffDie
XnV6/5Rg3GGdQfbLuF/7FR5qPetmtZ5ketaS0woUl20YzL9miPuUFW8IGAKGQEMINE1A5Pp8oXB4
Nl9oWykofc2bv5jfQROCWCLvuKQ5Lm1tg2WfrnoSgpw49uY9iAsBLhfrT2l+ZVOtcHCVPjL9vrSh
cH5Hbs14s+0tLWkrLWujFRWCA1YJspP0N6f5qt1ksjvLaU0hIN3BYu2dM2HztwTbVVjT9AFr5oVg
lZNkxLovjpzOj3s+WHkfzQtNok7Y5ORldq1aeOtFhUN/Fk8rrWeaVl84tCUYt4+82zZEI0ndMtbd
VE/j8WbFpMnN3+cbgLu4iPenGwarHXpyYUYjnxA11DkskSFgCBgCg4lAvwiICq0VFA/VfFBWgvkr
uP16r7hlDgakQl/wJBPN+kRTL372o/JjzvjCpj6NW7lA8zKsL5d5g9ZfO0a+bh+VsP+xzGoXeHCu
jVaonq2PT2+Xl9r2MncdopUH1lsQTPiWzpfnRNxc0m1JUFk9Qed+mjz/TDB9X63y/U6IUIRyi/7c
cHXwys/bC4WK/ee0Mvbeco7YU2V+CjxeDc1hjYc4GSXNbJXXojw9klqMle+MVO/S/tqdtRbfNV4Z
S2kIGAKGwApAoN8EpPmgnjU0HyRaWSL36HDYHTkkROJx2bf8fleaYuiGHQ8IUW+Wi/zivKt2NC8U
/+yUO9EoiCKEzXX9g/qI9RM9Qc+35aRQ3r5AbtO/0TbVf3hnMP1mEYKcFTLbyoPtu3JEqFj7rVFs
1bZtNC/1sNa1O2VBsOg+aV4VS/go75U0L3SR1qL7vLSeyXIAKJNDvTKSGlA1TccTTvwvDw7POzkd
3LggWHKI6rWgXnl23RAwBAyB4YRAvwmIRryoraKn5fPfnq5lXzTpf6xm6teCiJZ9ze83nXNuBbGW
Qy8t5Ql5b7qLvOL8igfec86b5KIPWTGDhds+5OSB9lntRvqeffKzLhP5nSONKNzjB2cJfUA0e/v8
rDlvCLpXnh4s6veaaCLYI14NlnSzjUT8we2Vv2b8uGDBV+Qd9w25hL857t1W6wHXI504yfh84jY1
FjLlocmjb6HwOP/FoHTWrwozy956w6lzWV0MAUPAEKiFwHIREBnLFLW0PQi+t3Y+f4fmXGZpsn5z
CeTpjOb5GDXyiCN4twTvtbVspQSEctLMFK22HYnj+OoH3qCHtxzalrzR1hZhyQmh9Ml98uecdE3h
yPKKA/IGU9W0fc5yBH1P87/k7XKtfrdmuli9W+7iQS5aoaHvjE7aHE+t9eNqmdrwusOhQUy6SBrX
P3uC7iMeDBbdn9x5djmaarcaAoaAIbBCEVhuAvK1/V+h8KSOd9DHqtvLGeFwkc56rUHpzZiJ/OrZ
UFGPo5XovkjkRgQUaUHRltxeFPvlfbw33bLtur0fHSY5PoyVgN6iK8j+Xs4Ix4qkrpc2FDopDGRg
q4SeYNJuasdp+qB0Cs4RfiIobb7Htyheh1rzQstaHZkmIRz3bQ/bWzylCZ5nlebKHxZm/HAg22V5
GQKGgCEwFAgMGAH5yj9TKPxKx7/S/NAmEpZffl3bG8iwtr7mUt6quPoUCW2tiB3uiSOCCueFqASk
06J/cVuItJ9l3nDk7X8vc+GOSlzm0lDSCgbsP5Q5TRu3fU4rJ+zgHA4GBFdtlzC+N5j+vVWCYFfs
eXx067+/aaQATy7xv3GNB80u2io8XI6hS+2ap++anhQ2T0vDei0bdP9ISxM90EhZlsYQMAQMgZGA
wIATkG+05of4Nib8nkZktLrWUHuvKGWd9qA0XYW2jgtKWTkJKPLhqI7C1RSij0gjwon2EZIw7hUp
laJvi6IgYV3StfKKOO58eE6TIUre0jIp5UPT5Xkg2kI8+3qQvfeVoPiXkH+WM0A0IplizKW6mA20
TZHOaXZM3NPzoij5YW3dUDH3tJzF2u2GgCFgCAwbBAaNgOItFBkhRH8zbFrdj4rIi45Pnmb141a7
xRAwBAwBQyAFgRVCQIOB/Nvz+Zbp0qSkmbROCDpaNSfTOj+Y0DYlyE3sCRa+/mjQ+dJAT9Bvn89P
fUMweeWFQWvH9KCjuyOY0L1BML9bqyr0aP+hRrbyGQwoLE9DwBAwBEYkAgNKQDK1adcGbUwqMpAn
XE4SuVUT6fzNyWbVpsJynNeSNlN0vLIMb6sqrqKJ9pU1F7RKS9CiGKyqY13PtETzO9FcEHNFkRs2
7tuEqRn9Vixmi8F4rYwdZCcGRWXfvUAzQZdMCTovVKIBXRVAZLeNnCS+I/PeyloQtUPzVr1Py+FP
9S/unT+fuZuqIXK0KMmPoPSa6v2q8pmnus9XtVk/bp62ontNzuWv5YLujp6gtVd49cjTrVtgdutb
px7NO0FwbieMCd3y8DPX6xH5ylmlDQFDwCMwoASk74C2ECdcD9FIWmbcOgjhX8WQT5yawHYOkb9B
UBTRZPQXBwR85LJyTuDfOOlEzgrR7qvLHBRoBJmy+RtuynJPfr03KOpjoJZf86HsQD9maVy3awsF
zdUEl+tj2PXw6mPpAe/ZFvdio+xlPn7LPP38B7vR33D2qpd5LnE180G93UFrybmal1qDXClinFxJ
2IbzYPK8G6e1w2fo8AcD3T7LzxAwBAyBFYnAgBKQhPHd2rb7r1oRYHvvJh1vTFJDwOsr+lYoWjnB
f8TKdzWRpgMReQ0o+p4oclaIzqETsSK1trLu0X4/v5RgPuPWwlE4CQxKcPNAt+6ev+ixrqDneGk+
Wv0gmMR+Rmkh7vGWRlLuHJpeqNR5wvIf3vpzfp08XNqFzV+WBF03DUoDLVNDwBAwBFYgAgNKQKyM
MC6f30sC9R5pJRs3MikSkVDk0gYBtTDed+7YkJLXeMAk+qJo2aecU3VOGsHznUHvmXcUjjl/ReF2
Y+Ebj6usL2t17v1lYjxe67+tDwklN6rz9YnMb1FI/o0Tj09X+XeZu3d7UHylK+ja4w/RlhQWDAFD
wBAY0QgMKAGBxNJCoT3I52dqQ7gbNayfVE0ox1GLtsJeJmgjbSj6HNV/HxStsg0BYaIrheugzQ+K
V2sFhOvvKhzz+6F4Ctoa4spd8mc93hq07iZN6FC3UkFFVSoJZ9kOrhHxxI10HoNoHfEIj2jrccJk
HWu7hXO171CflRmGou1WpiFgCBgCy4vAgBMQFVoQBHdoq4YzZYoLl5huxBOAdNF8RyR4qZjf1i46
5huhjOZ6wo3nntayPxc8HCy5KLkq9fIC0uz9NxeO+rPu+fPu+XP+IaPhDBHjxlqN239UWs5uGREt
M9fFz3mM/KI+y7SgIluVs3331fK+u+QO87Zr9hFZekPAEBimCAwKAYkUusfn82dqLL8KG9d5961G
MPDzQOwvxGKlUQX9ythZLcLZe430ozPvL5xQXgG7kXwHO82NhSOvkDb0RxkQD1FZM/w8DqTaVwuK
ahM/7zXAZdpP5Nwgtz5WvL52fpA79N7CjEWD3Q7L3xAwBAyBFYXAoBAQlXcrZR8tMdolk9mhmhMa
BxHVclX2jSYNBMRftB5pRT1LguIcCeSZi4Oe+/R9T7jq9XAL0oae1FYQ3143mHxTb5BjvbjNZJZr
Y+FUb4r0BBMnoGXaT9RmImZGtbe0KChe82yw5FC12chnuD1wq48hYAgsFwKDRkDUipWy/ySBvH0Q
/FMOBMdKIL8VQczW1rUCI38+JiKdXKv/o3mgH+j3xQ8UThiWxBNvi9y/l2oriHu1FcRn5JW3p0gX
begdMkdqJeuIiJLmOE9AmB95ILiVq91aPaJ0+QPBkgIa5XI9ZbvZEDAEDIFhiMCgEhDt3bhQ6H1G
W1ivms//SS7XZ7Ndw5QgWB3TFFLVC2RIh8owxwPx6NocLfh5jz76PEmj/4pN4IYhjn2qpA9FWbrn
MhHRjb3aNE8k8ynpN+9nPkcmtbDt8d2SoraXtHdEafGSIHOfqOrkuwsz7xkJbbU6GgKGgCHQHwQG
nYB8pV4tFJ7S8c5s17AoyO6s0f2G0gTeJ81mMpXgg04J5Rd07m8iqn/J5RgHg+f606jhdI+IiJ1Y
j9s+f/q5nUHuGyKdTUWwm2luZ3XMbBCxHAx6RMD/0GoHj2rbhT/eW5h55XBqg9XFEDAEDIHBQGCF
EZCvfGy7htWl7XxUHm3rinSwuCGo/z1PO5m2F04adSYn7VqqpgWFR7SG3aHBxE9qHZ13yTQ3Xg2V
Elh8Lqu5rdmFE7SsnAVDwBAwBMYGAiucgDysboXsm8cGzMtaiUnyLi3pozNEC4aAIWAIjFkEhoyA
xizi1nBDwBAwBAyBEAEjIOsIhoAhYAgYAkOCgBHQkMBuhRoChoAhYAgYAVkfMAQMAUPAEBgSBIyA
hgR2K9QQMAQMAUPACMj6gCFgCBgChsCQIGAENCSwW6GGgCFgCBgCRkDWBwwBQ8AQMASGBIGGCSif
z6+lGq6uyNqZrCCjJdoKqVv9KC1Lu5F2DUW/9uYTSq/VZpYFpVtXv1ZxeWovu8K/q6GgtOxw8EaX
3i8a/W/dU3NtU93HKgtvUfS7Yj+pe/osauryf7PSkZ60WqwgmFu9jbO0TN38dZSGHRNYueFfNfBo
zeVy6/X09Ex07WO9UfBbpHI5Jh/2s2smLNH9zybw3FC/J7tzLLP3X6XR9kwWDAFDwBAYfgg0TEAt
ra3H9nZ37+eaoJWag3crsnxOn/CWt7yl7amnnjpSAvfrsYsf0vEjicR5/d7dnXtSwnhTCczUHRvW
XHPN6a++Ou+s7u6uz5I+k8n0lkol6vB0NVghFYWdi8XiZT6N2nFF/r77jihsthkkWg6Qh9L/RCc2
ivLPPjduXNvBOvxDWv653OIDisXsacobsupoa2v7hv7emJ4292bV9T5dC/FWnRYofkKH/xIxbaA8
bldctVo70s6r/SxU+un4tVyu9Rph/p5w99hstld1+pqu/6iZfC2tIWAIGAIrCoGGCUgVYqTvR/Ar
IaNrVVICN56epNqhu08gP5+nFsmuGTKlTCCtI0ovARyoDLSiqmH8+PFrSCAfI+HuywiKPT0Hjr/9
9nOCzTbTIt2VoaWl5YXe3t5NorOlN3d1dW2pg1QC6unpWlPXqA91mVgslY7SYSoBqQ5og2Dmw7kb
bLDBf9wPcJnq86qDgbsM9Nl4ftH5TIbFtieGOqfwUUC7smAIGAKGwLBEoBkC8nuq0ZC6i4WioSRa
nKbZxNNUaCRV0IqniW+tk5pcgv/tio5QoiQirfE9bW376xDtqyK0tk7I9/Yu2lwnpygdxLIOJjxp
R1ozdVk4/fRZ67Xkclv29kTVIW1Pd/dkpZ2otGzDUA7c39raekB3dwQZxCm75YN77slWQdHtSTxJ
UztkpeH0wZdbkvg0sht6nbLssiFgCBgCg4NAMwQ0ODUYpFwl+CdJo/lWSvYZmRK/rOuniCwqSK+z
c9FDmWx2SalYdNpYZjtpURDSnfF8isXFW5SKpc3i50Qaa4loMNmdkyhzirSqnfw5pft7y8SJVbcT
l+nsecULlJ7Vs6uFcTL/zR0k6CxbQ8AQMARWCAKjloCE3moS/NvGBH+oMSnk9O9a2VzuQP2+JIFy
UaR1Y0+xeDjnS6XiGjLD4cBQQUA6h/mtIijfySpvuyQB5XLjN+7p6SybwmQOvCl/1FFVt10Q+bw2
ZcqUS2fMmNG+QnqAFWIIGAKGwBAh0F8CwmzEHnKpQealpaecckrSBLdCm5jLtZ2teZqwTGkdL7WO
G3dF99Kln9HPTVX5cUFv75eTBIRGdEr+FBwWHAGFk/mbzZo16wYRQuhNpna9RY4D+8u016c9Ipfp
p59++lozZ8583l8UMeGcEHq4SbvSNFZQvlYFkGxHRwdzVkZAK7THWGGGgCGwohHoLwFpCiS3joRt
qhfchAkT2iR46zkVDFpbVa9Venu7cSAIJ1NEQL/vWnfdQvbJJzdSvTZ1BW9yyimn733CCTOvjVck
Nz43r9hVfEpksoE7v9vChQu/p+P7+S3iWUf5vc3fk2tre0RzQevJbDdZ5zfRdTSrk7keuVhnPhAj
o9+Upk37eZ2G55THhs6VnR3KfaAtr4gkcQ+3YAgYAobAiEegvwS0mrSIORKUqS7TEtjYuuLCc4UC
VQyy56pAvi/CnXqJyPKvx+25Z9epp55xXXd3xydVt+mRyax7Jwn66+Lf73R2dr4krec7ujXcFltm
tXFSg/ieCUJRVrnNvfYjwikGxeKRIp+zdHkTkVar4vq+sW0TJ27X3dExTT4KYchmWp7MO02qGiDK
GzfwOxTTHAiY00qaDVcotlaYIWAIGAIDhUB/CSijUX/ogjzcgsxlU7s6l7wP7qFumseZs/baa4ff
AR133DG/OOmkk/jY1TkQFN8vJ4Ot9Ls8x8N3SPlTTvm3buTmsHmtLS17iHxuV9pp8mbj25rofGvr
zdnspDml0sLu3t7IJCdSeu9ZZ531zqOOOurR7q6ufZRDqAnq/GuioLsbwAvXclzY04K5VTcAoCUx
BAyBkYFAfwloKFrnVz+oWfbChYu/KmG/Pq7RCouz2eAX++yzT9mNWtdmOTPcBP1dRxrPJ+MExE3j
c7lnlpZKd5ScE4PzYpsm7USmvV5WhAiDnBF+Wigc9/Kpp551pTzjNlF+zPVssmTJkq3199FST09Z
G9K1v5100nG3NARcmht21B4joIYAtESGgCEwEhDoLwEtUuO+jwxWTH5gWpQJq1UCd2vF8vxHFTDi
jgqlaqsgcK+IokVqRHy5mtSPZeR48HEldx+rZudNnTr1H7NmXfRhnSN9aeoqqzy/YN6812UqC7UM
EdJn5Fhw4wknnPAPX0ecCKTx3KDfoRed0o7TqgK4Y5ddr+Ut94o0oJcjIlp0jf6cpjgV4itlMmuc
ccYZn+U7Ivc9kax4ueca6RDC7iUlvlqFzq9Iz/dDxWLqR7GN5GtpDAFDwBAYbgj0l4CYCJ9Zbe0z
GimhLi+0nsYJSKsJyHlgAwn/p9JAkulr5WypFC6T44ijKJNYRVKV+WVMYE77YR5qNc1HnRObjwq1
KP0z3d+oHzgOQCxlAuKa5npekMBfpMjaaprmKX5L8R2xAm+Ws8Vf+T19+vRg0ZIl/5CX3cf4nW1p
+azqu7PKDZfXURn/y2Razm/k4YuAXpYb9mnyujNng0YAszSGgCEwYhHoLwExT8EcUKoX3PXXX4+m
UjdvCVsEuwdvja5ikRUKjk9DUxrQWkrLYqEuZFlKp2xaw2tM+eFgsNqyNKUJrIZQ++mUIJuvi7xm
SwsqL4YqEvjzgvnzf6p791bMKB80IO9VB7n9WyQRrnowf/78JfKGO1WHIQHJ9LZJ3Em7pSX7grzt
Hm6wl+Tkhr2y0hoBNQiYJTMEDIGRiUBdkqjRrFrrxUBQ9daT4RubpyXItYya1nTTB6Kl7u7PiQhu
EBE8Gi9XmtF6+j1DBFQ292VaMresu+66r5bpqK1tRwn+nWP3QU7wQFo9YD1IMlShNK/zLmlOfHBa
JiCRy2JpeI8GxfLUUzkfpX1Upr2yQ0HouJDP/wePOzVnotfAyBtPuZaW1t820T2oW8VyPk3ca0kN
AUPAEBgxCCwPAS13I3O5Kdf19rbvqYzC72okuDcWyfxOJHSmNI7ZroA1Nd9yikgCzzYXMh09cgDQ
B6/hl6bSuNr0gc5mUqfKnnkit2Ol2rDgZ1obl2pCZRM5GXw3nLNRFEl8XUT3J5kA5a0WBc373Lt0
aRckWXYm4Lzq+IAIak4cgOnTN5i3aNH/btRq3Whx5aB727u6Oi9sFCzmpuTc8CER2n+r1N1nxdYW
bHFRd12+Rsu2dIaAIWAIrEgEhpSAZs6cwX47V6jBZ3mtQQJ4TcXz4iCIfJZRjybjW1pyF0+ZMvmf
/qS2fmBuhpUNwiDyeUZ5XFs47riq66mJbB7qLpU+rbz5YFX81SWHgxz7DZUJSGT0J9XvXvFTmYCk
0XRmWloqyIf7Z8zY53WRBqthVxCQzHvPiEzLedZ7uO4D2NvqpVM9/jVu3LhtlO7FemntuiFgCBgC
wxGBZggobsqqa14TodRNAyAS2mdLyGs7gszxMl/VxIhVouVN9pNcrmWWn39xcz+bSXCX3aOz2bZT
e3s7Xjv55HBBgtQgcnlR5V6tPLeMOS18Q/kdHl/9WmvG/VumwR6lCbFi7mfclCmpe+zIKeJFaS//
VV3YYM6TIYuT1lvpu+a2ElWaAFhJjOP5NGQGHY6d0upkCBgCYwOBhgkoKzeukj6qcUGrMVcnC1ba
bM1mW+JzIfhmV4NUQv+EQuGUJyVPtdlcSfM4leQF8bCcjvK7qbW15SaRR9lFWUL/TdJijvayWNsU
LJTGcbfIJ3WVhngdVKV7tZ/cQ5qmeU90PvMV/YM7NQ4OYchls9cUM5k9/fI7+vt/M2fMCN2vk0Fz
Uo/PnTv3OpU/010TH3X9rpZ7OYWqHprbaoivy0WqneBZ8RA0ByWYlZVUNl2m/bYdw9h4j62VhsCI
RKBhAtL8yiyZk36tVvZKqi0pdnVVnyh/4onuUi73faXnu5VojYCurlT3ao+aOOgarWLwc7lNX14s
9kyO81umtXVp66RJf5fg7/Mtjbzj2F30GJXFnIiEeduCnp5W5k/qBjk7PKH5pi9JaL9TiVlhh/mU
CrOdyO6/SrOvykCr0VZCbSLK9MCc1Omn5y/SQqh/V4putaGjWOyq6c2mQp9Vnl8UPfNdUqOEIX7P
zlPbK74VaskGh0lHxPXb7zHUqOddXawsgSFgCBgCA41AwwQkYY0wa0igue+D8GSr8GarV3m3BcHt
9dLFr6sshDBbafcrqF2P60Zi1aA0fO8TfvNTL8ycWWC165vrpfPXVX9c2X/XaPpa6USW9w5EPpaH
IWAIGAIrAoGGCWhFVMbKMAQMAUPAEBg7CBgBjZ1nbS01BAwBQ2BYIWAENKweh1XGEDAEDIGxg4AR
0Nh51tZSQ8AQMASGFQJGQMPqcVhlDAFDwBAYOwgYAY2dZ20tNQQMAUNgWCFgBDSsHodVxhAwBAyB
sYOAEdDYedbWUkPAEDAEhhUCRkDD6nFYZQwBQ8AQGDsIGAGNnWdtLTUEDAFDYFghYAQ0rB6HVcYQ
MAQMgbGDgBHQ2HnW1lJDwBAwBIYVAkZAw+pxWGUMAUPAEBg7CBgBjZ1nbS01BAwBQ2BYIWAENKwe
h1XGEDAEDIGxg4AR0Nh51tZSQ8AQMASGFQJGQMPqcVhlDAFDwBAYOwgYAY2dZ20tNQQMAUNgWCFg
BDSsHodVxhAwBAyBsYOAEdDYedbWUkPAEDAEhhUCRkDD6nFYZQwBQ8AQGDsIGAGNnWdtLTUEDAFD
YFghYAQ0rB6HVcYQMAQMgbGDgBHQ2HnW1lJDwBAwBIYVAkZAw+pxWGUMAUPAEBg7CBgBjZ1nbS01
BAwBQ2BYIWAENKweh1XGEDAEDIGxg4AR0Nh51tZSQ8AQMASGFQJGQMPqcVhlDAFDwBAYOwgYAY2d
Z20tNQQMAUNgWCFgBDSsHodVxhAwBAyBsYOAEdDYedbWUkPAEDAEhhUCRkDD6nFYZQwBQ8AQGDsI
GAGNnWdtLTUEDAFDYFghYAQ0rB6HVcYQMAQMgbGDgBHQ2HnW1lJDwBAwBIYVAkZAw+pxWGUMAUPA
EBg7CBgBjZ1nbS01BAwBQ2BYIWAENKweh1XGEDAEDIGxg4AR0Nh51tZSQ8AQMASGFQJGQMPqcVhl
DAFDwBAYOwg0TUD5fP4DgudSxWcKhcLnk1Dp+ho691PF2xUvUZqXBxNOlXeh8t9S8XyVdcVglrW8
eauueyiPb4OL4sWqb8nnqWvv0fFJio8pnqprC5e3vKG6X23JqOy3KX5U8SdqS3u8Lrq+iX5/g/bq
2vP16qn0P1Ka6YqXK/0taekdfj/Qte8r/kjpltbLN4b9Z8FckbxP0b3FRu9tNp3qOV73fFdxO8VD
VNYfknkoDX2EvjJH8aBkW3Q9W6+O7hkEiT5G2Rcrrqt4q67x7pSD7nmDfpytOEnxIl2/q1r7lLZF
18gv2ywGKek7VVb3AORjWYwwBJomILVvJUWE5bQqbUXobKbYSiduBg916glKv2aVexbpPBGC84EX
BUJ8l+J7dX/yhaFTP6/O3RvPU+loNy/hQAeE3ovJ8mKFUHfquk5Kwe/XuR3debBrKqhNG+sGhPRA
CU9I5CG1ZTEVcQLnzTpczZXBdSIBIiXy+0XFlxTPVPyM4gd079e9gHH5HKfzX1R8XfFbtRqKsCUP
xY0UZ6eljaUBw08qXtcoeK4+DKR4LhDQBjqXxJD+Q7uoC8/QtzutmNeShJtIdIB+H65IX5lfpZ7r
u/r06C+CPgyq10R3/gs6ZgDzdBU8eEePVPyf0l2vdEtcOvKCbFdRTCN+3iewmKz48yp186c31QED
Ud6jKVUw4fmCGfklA/2F9xkcINyGn1mdetnlEYRAfwiIlxHB7jt1srlHu+u/Ucd/rUkstlD63ybu
8cLtZzp/g+LNVfL8us4TfUCIPKq4teK8xD1r6/f/1agbbSy/+E20YY7SfiJeniMGtIHfKPpReVc8
T0e873DnLuwHbtx6lSICON5+jpdnhPpB3f83l+E4/T1ZcVdFsE3m68/dpGuM3r+pCBlANL9W5PkR
eMbk0aH4xzgOVY55fqsqvqp4VpU0EO8Rrl5/b3I0va/u28/le5L+EpPPn7p+XJERP9o95aUFnmte
EQ2nT9Bz3l4nz1VEMIPRIp0Dn6dU5wdiN/h+shDyUBoGJB9ShLyoL4H+lEpAOj9V8URF8gT3+LsK
qREqBmXuHO8a13mW9QYy9AcGUgxIHkrJD5J+n8vn77G2+UPa9G73I42gUm6xU6MNgf4QkFeVy+Yj
D4peFIQFI0leoB79/lIdwO7XCxYnAkZlCDAfeHF2V6SzP674TOI69UfbYlQK2fzL3Yhw3EkRjSot
IChIz0sQbwcvDeTESJOyn1WsNdqN5w1hPamYfHERNHsp3qOY9tKTBy/ivi6zjwo3XupqAQHxhxSS
+oXOP+VuAo+PueO/6i+49Scg9H2gXMyqkBwj9N8pzlUEv7cqYgalrDvcDdRlluIxioeoTXeqzgt0
fIYiGGFmpM59gtIyQkfLph8dpjhN8TnK0DVPDu36/Zjy6NTf9VwdEOxFpfFt93nTf55VWvpQGJxQ
57lQRwZK1Jt+gyb5TnfOm8co6xVFNECEJSN3CCAeMKmhCaS+U24gAvlQf0xvv9K5nXX8Y8rS8Q46
d18iz2nuHfqwzoMD4V7Fvyg+mEib9jOt7/r+3uf9dRn4AV+97HmGXov5QJrWr7oz8HtB19BgK4Ku
TdMJ3lcsHtXei3p1sOsjHIGGCEidhZEfoyrIh9EoHTun8yvrL0J8gRMEmFZ42YmFBrA5VGnKZjrl
ASkwIgyD8sckxUv6b8UzdB0BU77u0kBYuyhikvhe7F7MQNQzTQtDsEIMCBz/IvJC0RbqvYMiLzmm
EtI0QkIQEPM2CCdff+5DYL+iur2k9iAsCUu8bV7n2vR7W8Vp7hoj13qBkWVFu5Qf2okvl9Ey9SdU
FfT1ColfV/6Q9pWqL2SJMDxd50KTp87tpD8Q0AU6x3yNrwd1gnQYWLyudHvq73sV/6p0zLlUCwgs
niuaB32MACmh/fK86Ld3Kx6kCKZoPwT6HYTHs4g/M/ovGiLzTj540x7XDlV9ruaC6vgd/YGA7tO5
ZF/bROfpI4+kXEPb8CP+WDFhnhvoBHMvqyse6DHS35/q2oHu2k3go3NxrfDtuubxhPwhqO8rTXxg
UFGW++H7GYMGMPSBY9/f04Q+9/nrFVp6WiE6B8alNPKJpa9GdAzwql2rUpydHm0INERAajQCEpsy
HXqaIi846jcCgTxO0cuD3RnBQSdGCNDZk3MZCHk6LQKe+YGqE8VOWF2hNAgVXtJVde48/eXF8R3X
myZ4LvvqOgKCQP0gTDSgH+o8o+cr9KI8wUUnTB92aSv+KC12cAJzOY+kpWniHPVA+KyifC/TX29m
202/36LfaFiYFRGMjBbRIJjr4B6EO5rYRxTRJhjxYt7jXFyopFWHQQIBQQUBDGTgeRAQ3D5UnFPb
GIjQDvoLpAx54BwAAfHM1lKay/UXEuCZ/CCh0ZE3mkbcNMO5eJlcQ9vxBE5dqAcT6WmB/lAOKm+p
7qVP36Jjr+lwHYIk1HICSTPPpppsVQYDHQgScmpX3ErntnJt513wZPFGHV+FJqS/fhDDdTRG+iEm
7dCUrDQnuHZ+i3a4c+BA/+I99Bo0bf640vvBCn3bPyueAQMV7iPwXqH983wodxNd/6/+8n4/oHLS
+hwkNV3pIPekEwHPlvLW1nWcQ5KBdxNTpmk/KeCMlVONEhAml48mQKFzYXIjYNP3nZ8R9wW1AFSH
xFQBAaUGXSc/Jjh5Wb6s/B7QOdLvXyNfNI34HAhJuR+hx8uDySgkoBrl0qa13PV6NvBaWcWv8UJP
U4REfcC8RERAb6oIYVytCHFDupDTVxUx+WAa+pViXvGXipsr1tPIvADC7Den0Yo2mW4jPRNG6AhA
+gfBDwwwbTHvVS2spwvMZxCo342KcY3OY/8/nUcjmRvLaAsdH6+IwAM/NNZpijxbb6aKl0s9ZsXq
Fl5T3SEwNObJOmYSHIFJfpi7CJhCmY/0xHK2juMaQryMWseP6aLHh3qitVULpKMNnhQgnuPV/6lX
POyjHxsqzlT0gzjac4oi74CvM2kgei/kaSN1IGylyIDNp/UWAPKhfzEo2tddB/O0OVPqRf8mXbXA
O1irzUniqpGVXRptCDRKQNeq4QhwBAzHjOYwl2H6ogNjSmOkzojpPL24jObodJgP5jqNI8RO1xjF
vqkakLqOiYcXiY69u+7FRk64UxGBx6jLC2C0gQsVMf+c745Jy73YylHzd1NEE0CYNRJ83gNhHmA0
Cj6MsBm1flnxYEVwAUdGoAhQsDxZbX1Z7afuS3X8dEwbW6Df8/Xbj0JraY6U5/H9uI4f1H31CIu2
+jwvU1lgWS14csBUiAaBcPPaBQKOwGR7fP6NUf1piozsv6D4QixznhEaalrA5HqH6jPXX1RbfBnU
g37GHCFtPlPp/PxTOS+l92UlMfDzF9QTzYL2rxurNxondUNAIpQ5pr8R0gYnqQMW1ekh1eGbuof+
Rz8kHWUl02P2u1KR+nqz4+JkOuXFs6UtcXMadQIX+hvapg+832gZ8eBxqKYt+uu02bc3VbvTdfIA
l08roml7iwfEBK48D7D9vKuff3a0n4He9bG2JqppP8cCAg0RkDOPhCNUvQDeZNCt88zNcA5y+qTi
wZgJ9BttCYGLJoPWgmnJBzpz3JRSvqD7ePHQAt6qiMnqfp3DHEXHnUd5+s0L5kd0dGQ/guJFCE0U
Cn4ESV0f1H2+zvWeKS+ff4nWVVloeHEzUPJ+0iPI7lYZvIDJwP1gfJWu3+fIlTSPIiz1GzIi/MoR
DqNvRuxoPARvDvTCyguCWuSIwGHESkBAgFc1AUIaP6fiy1ojpR3xU15A3aeTjIrBn5E0ZtrwmtqC
ybAc1E7aRDkIpjm6jiBuJFBvtOV48PXk2R+uSN94WHmiOaaFaWknlX6x6jWDOjNA0jHCG1MRzx+i
pD9DxLN0nflE+jmClHaM1zEmxniIE26yyOt0whMB9/sYT/eAfmymiFn2W+7Cpvq7q8qCDAkQPSY5
b6KNa0a8n59TpL9BzHNc/JL++vcC7O5XxEz5E0UGjvEAATNYAnOu3eQuzk+k8z95Pr3C5+6066o3
g0U8+ahLRdA1Bl08w3qDoypF2+nRgEBDBOQbqk6zlY7Xcb8xwTB65wW9RcezHfmQJ+o7goHRa5x8
fFbVBCiaFS8MAQ3Kq+68aDNVxjP6y4uDgCAPOq9/8RmNf92Vy3mIgw7O30YJiHI9JmhVaF31AuTw
HsW0OaXP6jyk+huXic/bEyR1RuBgUiLsqMgI92vuN6Y4AiPheKhlHsSct5VLfIn+nqOYFOLxvCCQ
tRUxNyF8IfJawQsM5m0wCSKYmeeAgKqF/goZT1rxfL3QZXSOee50xTUcuf+PPpiohCesPnVT2nDw
onsZjWOGQ1t+WpF+jSmMc+/WdQZTmNJoB/0aQv1PlcamEREDAfoAAp56J/FAm2FQhQv+aSrvUh1D
RmiSmCeTgToeqbRlTVjH9Il21x4/4IAA+A5uoTvPdT94W5wcCKhc+qV/N/meqd5AgbxwRuLZxzUy
2kdfJ7+VdP1jrgE+b67zXjAQHQhLQ5VHYaeHOwJNEZAaw4idl4iAYMcM8zZMDOqseDoRMJPhPYTJ
AWLaTn/5NuPlGBjVOh0jzdsU6di86LxIn1CkngjqFxV/rOhfYM7zoq6pyBzAv1wZXnBh2mmGfLjd
Y8Lo/m+xOicP0SzQNBA4/qVOpmE0CVl6oV4heIQJZSDoEIKQABoTmtRj+u3nrxCojI7joZbd3L/8
pMf8Wdf0qLIwdfkQP67R/GXefkrkCRKnAOqNdgCZIRTBxmsLYMsHw/QVb47hGfNccfpI9gvSMEdD
nqRDoHqzEO3soF/p+sY6/oXiVYpee6hVd/DmfjS39yoy0KEfodEfoDzv1fU/6hiNCPMSkTlIrjOn
wjNPapW+rWl9hnbzXoCFH4zE64f5jUgfQIN8VeXv49rCgMRjBT70JTzhHqrRQD/A4T6wCwnIHfs+
mKYV+/tI6y0B1YrhOjIALG6vURcGP2BZK6RaROrcY5dHAQINE5BeCCa/eVkRhrwsjHiY84Fs8HT5
il4K1GpGi4SLFRGemOdm6zrOBPxGgKSaeXQdLQIzQjnovif1A2H/pK7/XX/vSVzHTLCLIsv+MKm8
PIEXnBcWYcJSJLOqZaZ6YS77mSIvYDX7/w91jeiDH7GWdP+ndPLNiriPcz9aBHkyooc4aTMjy18r
ehOHFx61NCAvOCCpaqaTZLMQRvQFBBVE30jYXm3gOVIXP8KlTLQ2zGGYnLiGxjJNEWGINkK/AAcv
APmLUD/bpY2XTf5oI4zEaReDCTDzwQtmTEqMqL/sNPFQM3Oh2mCH9h6luKdLR51ZGigkbP2dqz+f
Un4QGgMcVoWAKL1WHq9nI8f0K9zP0bIqgspAc6fvhnXVb94ztKyfKn2tQVAj5Q5WGvDh2UxTpF9S
d54PJAqmEA+/5yjSryFf3gUGin4QQd04jznXwhhEoGECEjb7KTKSPU5xPUXI50BFCADB0qEXB22F
eR+uIVQYUUEajCCxS0NAjHYQFn2C7se8R6dmTuQWl8CbhR7RdTSOA2I3Un86N+EAXX9/SrZoXxem
lZdyjrpBKAiaeua3DZUGkiDEbfGpRTlhzSibgBA6RHEqpKlrCO2vKCJoWTuNj3jf5dK28zuRaS0N
aDWXltF6oy82whEhAmF5TbYaZJ780jQNhNA0RUiCvwTSx7Wd9V1Z8fypc5qZjnkZ+k614PO9UgnI
91jFC4QdHz8+6G5KM4lxCcHHXBsk93tFnuUxupe+7OsC7l4rOMlpYsm60D7afWkdskB7W115oOUm
tQ9MzwRPlgjwwxX/pPTbKd+yFq/fW+n87op4m/Ke9TekDWLq9mNfmCsb8245qG7M3Z6syHs0V/Fo
RTQ13j8sIQxKfj+MSbW/WNp9/USgIQJSx2Jugsjo+DVF7mtBI9G1vXSMkHxKx360fxqmEeqkc2gJ
aE8X6Xgb/aWTp6n/JIfgIDq+Lfi18kDLoqyijpkoxmSyb5W2vkfnicmACaNRAoL8eHleUHykDqYI
LK9tpI6yHSHur3QQDILOj94xxyAAEJaYNMENQkP7wfwGPrzIpImb37xgrGU3RxAT2hXXd0KhVlMQ
xAgOAgRYTwPydUCTYXDBM+K58twQ1v9QRHPzJjjawECFSL3RVsHXB54vgjRN+KGNnKLInIcPH9WB
17LDc2iQaud5rh4f0l9IfQ/6pKtH7Pbo0N2DORfzEHWAhOLaVZ976pxAS62lrWA649lcpwiGXmvg
r5+n8s+VPkgfYGAQ4uIGJAh0nCNWV3yTzu2kdpTngZqs8ARHqL5sBjWrxurVcHZu4DhTNzBnRX++
VZFFXekf1J2+cZLiVxU/pN+cR0b8ueFCLOGoRKAhAlLLEY6YORilz1FEhQ5JRJ0I765WxVP1kxE+
wuI2/Z7qEEOTwbyE4IAMCKGtWyE56mUOB/MJo94tlAfCi3IRJAS0KkatPvDyYLrYShEBdH7smj9c
lHKu2ik0OOq0wJnFat3qtZ9a5jBIm3kzAoLezxUhvKkrL/0lih9UvItzCBS1Gxz9nMRljdbfCRSw
IKAtop3We8YIPf8cMP2h/dUKPu1tqmto+1e5CEmEDF/FM4eEp1U56PoO7kcobOkzDbYJk+BvlX6u
T6+8UtujNMybnKl0NyiiUTCYod94LalPke4ZP6/7MCl7LQPtwmtPjVQTMtxbsR4RQCpol6cp0gaw
8Noh/Q7Ts8fW9xOub636oW1+QBENAqwhMQZVtTThanX35i9M5/QRjydlMYCY5m6s2W9UJ/LBeQOL
CNqNN6ujhbJq+Su+Ajp+UemP0G/mPJETzKfxfs/V36sUf6K4mJii7Vdrh50fBQjUE06+ibwQjI7v
dZ00SRxf1vljFDnPKI8X32s5vCTeDHKtjjEt+HIrRr3qfCxX8yNdZyRFJ0Uwk895rsMz8ou/6OTt
CYA6pr2QuMxOVt41iUhpEAC8UJhKILN6oapgi90IoaJJ/UXxeEUEFULyGdXncZUJmUK2mL5Cd1+d
AytfPu7d8XrX0nwoFq2DemH2IG2jzxeSR6D0qLx6ZfjmxdP5ZzJR9Wdw8aryCQW6fqO1ItTRcnh+
x+ncjbreiPCkLcwlxIMfsSdOhz/RthkkUZ8/qhz643ouYaPtgoAZRCX7eFp59D1IspGAcMc0eGky
sevbcQLydcW8/FuXnsEBgvps5cG8aH8C9aU/YvKkb/j5Tp8XuP1HkXeAPtknqK4MvLZSPFIRUiQf
rB3cB+kzR/Y7xTIBuUx43hsr8j7PVqSf0Dfo65ASA5edFRsdnKRVz86NMAQaFVBz1K4vqeM/qg5I
50sGzA+YXlC/eVEwN8RfYDr0x1wHRc3nZfSklszrDzqBOWSGu8C8Ed5IjBLvqIEvo0RiMvDSfUmR
lzc1qE2hYFRE2P1F7UQLqxfqCjTlc6Py/rEX6jr2ZNKmYzCAgBn5nag0t7kCD9NfzEi8wHlfCafd
MIquWi5kpXSYROvWLdE4Rq3fUWykP3iyWdmRC/N573f5UTY4Ikj+4rQVjhFM31bcSpHRMia6RjCu
9wwqrjucr4lhBoFNdr9raaok8ZihmdLnvHm1Vh3AAu2pkUDaNwoTnm/cdMt7Ai7xOvj8eG94rxio
8KFtiL3yQJDjXv1aIwX7NErPPC1aT91QYyCCdoklYpoi84z/VMQ0iBkXjZgBQhp29Hf6Cs9khrsP
4qE+zHdC5O11K2YJRhUCjQgczGwQTNXAiEwdu+A6158whyQTx64jcCmXjthnlKl7cas9Q9eYN8Fk
h1qOjX+ujtGO4oGO/hFFNBdeBGIyIPS9Ca9aGxCajOYICOJGgtfeaEctM0+cDDzeObWJOS0mm3fR
8dUU6IQDHlEEvgmJm8Nw0IC8vXkmtY5g1Ujl42lUrjeXVr3VjXy3VAJGrQTq+TZXJ38fI3Y0nXD+
T4G5IUbKCErs/UQI6HLl9wnVldF4rUBbkyNxRsqNBkbb3tzbiMZFvpBPn/5bo8CamnXsPsgEzeMQ
Rd9fvPkT0xohOXD4lzAC02S4TicYDO6j62lzZ1Wr24SGm5qH7v+tyuXZ8xy/rd/hfJ7O8a4S0B5f
qlIB33eZP6afMm/EvZ/VHxbofawGznZpFCLQEAE10u7YCL5axw1H8+psjJQwMzF5zUuZFnipISoC
C3nSUc9RGQjsiqBrv9EJCOgGXWcSv6mg+zEPYQ8nXKQYzms0ENZ0aebG6trAbVESzENoLDq82v1G
i7hSES0SL0Am3+MB4Y+mRmjEPNRwXZTQawm15jEY2TJihXQIjFzbFWcpQo5fUGRSnxWxcUjB0QIy
J2/axdYbkC4ayj6KN+h4P517oEZFae+xSgeheWFNvg0F5d2te9/tEtfTCj2mM3Rf2kAmtUzlj0n1
qAYqBH6YznZR9OZpPwd0oM7NUPTE5OuCRtsGbon8IdM9FJnUr0WACPxGTYQNNCFKovowz0YMg+pI
e9BqCZibGYTUChUDNuX3i4YLt4SjCoEBI6BGUFFHxeaMpkS5mBawG1cEpdlKJ65SXE8Rcwikw8Qt
k7GMthihYqZDoGGm4piXrN5ouk8VGUG6vBF0NykeXk+D0D3TlI75HExLBEiv2oivT5lpJ5QnQgnh
/mZFRoFM2JaDrm+uHycqIszvUYS849d31Q8/0V9P0KZVwZtlNlNZV7sECEGez7nCBJMqptWvKW6o
SBnEZ3TtLt3DnB0ExDbPfMTJfAbPGeEPwbCVhheitIP2YEa6XmlZvunOtErpHPMN3omjSpLqp5X3
N3TVa2z0m0aCd7tuJC1pPJnUS086lqXBbFURVE+0BoIXzD7PNybJR2kZqKBt0OdrPWvIDe3vSN1D
2v4MWqgPBMenAbU0T+aAD1ekX2IBaVTbrIeZXR/lCAwaAanTf0rYYdqKd3wmurEhEzDH+BePURR1
OUARwQUhnKuIY4MfMdPBfWAyH+8lXqyVFCE2lgaqNhJlTuk7nlyUDpMH2g6CkpEpQp2l7SvMV0q3
tc6jfTH34gPmKi/UMH/8Tfc1ZQYhI91TUv7gcbYiLzDkMkcxNMHpGpqdn3BnDsVrXGhGEEI8ML8G
Jssb3qgMIGUfIMPvu/Jwhf+jjonJMM2dyKjePDMiGDPI2A2NyN+g42eVhhH/ZYqYWZkn+57+QnR+
tO77DAMOtKjHFXnGaGifUGQ+if4SpnODgu/qEO0o3t8202+E6MOuHSlVL5/yz/4K5begVsLENZ5N
o6FMVirjW7oJBxSeJXMgBK/1/13HCPMNlQ7Hn3j/Wl+/MeX9KXE+XgcwoN0QEAOb5Qk8A5wK+hCQ
6gZZ854y90dfvlqx1jxtUsNbnnrZvaMAgf4QEC8Rcy+Y0WoFBBCCMR4YsfFy36UoeVOIz2d4pwTm
OS5UnOkE+0Pq6I/q9yWKEAEj588obqrIvA15ci9tqdYeBGFytIipCwF/qyJml2dTGsPoj9EmgtIH
yuJl/BttUGzGbu0nZ3FCQEggUG9WRKg+ocjGaE/rGgQMUYMFAe2B+SDW/0IYJANmoB+mnF/eU7Q/
FDwQZo3MPO4IGLQ4nj3PbMc0XHXubrURrQ/t8ZOKmNjiWh0YI3TRcNkHJz5Qof9B0tTLkwZCnPuT
/Y3zPJ8vKo9aZiHqjQAlMKDxprF6+FFH76VX713ielxbeod+f9wVQD4QO3OfBOY66ePbKEKi8UBf
QDNlLqmaCRv80Mohbcrsj/bjy4zjXK6Hnh/tZnAC+dA3GEQcFxtEJKod/vTPqz9aelp+dm6EI1Dv
pUlrHqNUhMvcOm1nLgVzAUIAlZyXACFBZMKxwozkNAI0FcwzrG5cfrncsTddzFHn/4nSMPpCoDfy
crFmWLzTt+u+QxXRcFjCp6IusXZhPsI8BdlyP+3w9erUfUlNpF53QNAymn+ehI6A71R7IFJWFQ7t
+fqLOzZaFuX5evONzfy0ApxwrWd3r1e35bmOkwHtAkc0VdzPMdv8r1qmuvZPtRFtC0H238RgBI3l
m4oI0aQ2gkYAXmAPQYUbDCovBgNoyx4vhB338pF0PccF6k3/4h608DlNgIEH2G6Kqc/G5QPB3KJY
JlIdY1a+2pXJQOT/VE9wpD14q3mtGBLxgb5O/6M/19LS0FqS2mATTapICiZp+KGtQZgMkhgc8uF4
LdMb1xhsoQ1TPwuGQENutxUwqZPdrxNoITWDe0EerJcuft3dQ/718uYlrDb6q3e7H83PUUJi1eBI
KxRyAxGU33XKh5jEtI8wUdq4B9xAFD9oeaiuTCLHJ5Ixy9QNuo95mT5zMzqPNoqJtE9wJI22mMSw
XSfm1C00PU+cA3bsz726J+9i1dvdAMc7uoTpdI4yianBDW6aHeD4vCGNWoTYz6Yuu031o4xHFDEj
1g1uEJna/+vebAlGLQL90YBGLRjWMEPAEDAEDIEVh4AR0IrD2koyBAwBQ8AQiCFgBGTdwRAwBAwB
Q2BIEDACGhLYrVBDwBAwBAwBIyDrA4aAIWAIGAJDgoAR0JDAboUaAoaAIWAIGAFZHzAEDAFDwBAY
EgSMgIYEdivUEDAEDAFDwAjI+oAhYAgYAobAkCDQFAFpeRCWWWGNsrS1nFgmhOU22Ergp4PdGtWF
pXQ+qNiueJ7KLC94Sdm6zn4lrKTNWmDfdV9uN1Ut5cHCo5TzVsWLlQfLwJSDrrMKNNs5EFh6Jr4a
QFNljabEwoXli/ZTZKmkRtb9ou+cL/yaWjmjFmaqA0vEsEoB6/2RN+sBxp8dyyudqMiCnew8y+Ko
Kzy4JZcOU8EsuQMO4EVkcdY5K7xCVuCQIOAWJmYVfGQN29APxtqOQ9K2WoU2RUDKiNWjWT+tVvii
wJyhBKzoe4KA9CscD3TjWTqFRTxZEuQGxQoC0u/3KLJQIkLNL/LYbB1YoJKtDliXbbZiBQHp94dc
GeT7jKIRUIQwC23u3yTYrB04YASkvFhjjnXdIJrbFCsISL9ZS5ABCnsZcbxCCcgNbljBm1XjN0jB
aguleYg26B1qbxJLS94EAm5h4HoL7jaRY7+SMgDxsoa1AY2AUmD0ZMI6bNWIhRf+oy6+Qw/3EL1A
rN470IHFN1nvijXT0hYT7XQF1luIsla9/IKWpEnbrO1VnQ8XkFTg2EKEAFihDbMSM/jHVz2vhtHy
PKe0PP16aH4Bz2QatIx2RQgoXAR2RQW9E6yleL6iXw2berAeINo69VlDcX0X2fr8C3qHfD9bUdUc
9eU44mGQMkNxtiL7Rw1V8DsFUL7flmOo6rLCym1WA/IrT7MJ3N6KaavfshQ/e9YwumSp/d31oM/S
C+QJYaAah7p6vCLCbVAXXqxR4St17SZ3fbA0vYHCa0Xng/kNrZB+wKKV9UK/Ft6sl+lwu653ge0e
6LeQD0IHrRkTHH2YgR3vJBrZeYq8Y1spskfRrnqHmt53ari1f5jVB5zZs2w9xbnDrG5jojrNEpAH
Zalehmoj/gV6WXih2GNlD0WWq79TkQ3oBiw4s0T7gGXYj4zcyswrdPRcrZrCHNvxuoqPqV5Vt0Ho
RzOX5xYGB6+pPrW2Dlie/EfivV9Qpdm+gXCF4jddP0q2ZR89UwiJEfrHFDE5D/rc6kgEdDnrDAkR
0iwcy5m13V4Pgf4SUFYvR6tenNT9P3R+vq6jGUBA7PTJqG9YB9WXyeq3KbJ/zP+5yiJAG9lvqKm2
qayVdcNGii+pLLSEhoPuhWTYsO5lf6/OIaDYHOydiozo2GumqaA83qAbMP9gunpceQ+ERgJ2fhO+
puozGhMLY6wDO7i2zdVftiqvNYBh51f2TKK/MP9alYCUN4L0XYpgzt5C/bIKKB/Mfzhm0Df7tceU
8mADR+bgnmh2Dtj1b+rwrO5taksS3YvJl7KZu6UP1xwc6vpS3eNlWFME5N6XN6mc8nvYTJ/V/cwr
M+/E3leEWnspNZP1iErbXwJqpJFx76cKIe7A9/ujXJM2R+SEKhO0dIxzkgJR1zFhEOkAFzRSobQ0
yocdPNn8iw28cFx4TeeY/GVfInYfrWo6VDq2RkZAQLAXqR5sOFcOuo4XHZ6DkNoF+o3tH1J+tyvv
OZ27T8d/0PVaWxnj1Uc5bMS2qSIkxNbWc/SXl5QJf+YMfqPIuYaD8mDi8/0uX7QozDwP6Tx71Vyl
evXZe6fhzPuZ0OGKloAgukF1YAPEPsFhwvPD8xIcByQ4opihzBBof1Hev6yWsdKyH85HFDHB0gdq
2e8RjnhnEn6g6Ac61bKn7zOQ43nPqYIBAwfmLhjQ4BXKu/Yv1QsnoJ+pPtXug6zAGMF3oSKDjy8p
4uWKU8T/XB6/UB5YMPoEXUeb451B2P9Qv/EIxUmJPOj7bDqIYwnPMOkkVJGf0vFeUP/3KtLe/7j3
cLbu/XVa+f6c0q2pY7wuGUAi2Bn0/kPn2SQR+cLfctD5z+sH7xLPl0EB4b06Hx+4/VXn6FcVZk+l
QSbRRurJ+wJOkMjfFK9W+qpen0pHvZAHGyp+WJEt7LEMsRkijlT93uMs3r6RdNxfAgLkqvZogYpH
xzYOCABOzgHw8BipE3jQaU4K3O/TXKrj5IicF/koRXZX7BcBqZ50QnZzpD4+0Dk4/xXFqxRXqfFA
0UROVGS0h6CoICD9nqZYUPyvysILCy0FDzEfIA1clvfS9cPVef18UjmBzkNuzHcdq+i1CXYKRegR
fZipg6sVG3aGUN6YSpmv8xrqK66MXVym2yjN3qqX3402VlzDh2hUzQaEKs8WQQT5pBKQzvOM2EEX
4T9gBKS8vIs29WYTtVQCEjYQ5AmKmynSV+o5W5Avo3PCc7WElUsDmc1QRHD10WhUPiRCn6IPxQME
gqa1q9Icr3LSNKdNdd2/X2g8EAnE4QN5oFnvojz2Uh5/TJTBTwgLEnpBaXhWYBHfwRVSRNi/n76W
plG5wQZ992DF8bEy0C7wct1PadAEGQz16Uu6Rh15x7ZK1I/3mPBp927dHbuOd+zOifSQCfXw4cc6
YFBYlnPK52v6fZIi7z2B+lBP3kP64paurD4mZ9dOiN6bX305kCZhW0U03TEV+ktAzO+0CdQ0tZGX
hQ5zoEPyOnWcZxOoxtXdaqzvCYeHmSbE/Ejztf48MdV9Pd2HDZ6XGA+sbykiaKkbpEMbGFXVGpUg
cOYp8uKkCR/qDVnQsX6kuJbiMYp/cXXmpWfUxQjua6oToz1IIB4gWiatGa3xgjAaxbQAaXxGkZee
cL/ubdhkobIQHmcrQmqzFG9WbFfk2TJ6/a4iL9alSrtNciSYqGOtn/0xYXrHEoRaLdOIf9HTvCCb
qGKfpDyzGQ6XT6r9O6r9t6VkiAbuBy+XKk09R5t4P+Z51gyOoOgPyT6BRoz2TZ9Cq8aMy0DCD+R4
fucootXz/JiHm50oLI4r7yqDyiMVH3Dp0Ebod5DTLOWxRYp2x3tDQCCfpMj7Q3/07yQCm362kyIa
GXUsB+UJBl9V/KY7CZH8XpG68U5Boswhz1KkjVyL3/9GV95W+ssghEELnoQE6kR+myp+X2Vtqfrz
rhLOVKS/Y7Y8V5H3k3afqsgAgT6L5l9+9yFhl5ZBxOWK1yrS78hjS0XahpXiKaU9JWVwwfOAfJBr
lDNbEfkJYSN7MLH68qpqUWHtR1FoloA8MIxM0kwz/jodg4d4kiIjw2EV1EGoG6NWyAehMVMd5rJ4
JZUG8wgElRxdNtsWRlDMLxGPUTl0fh/uVjloTQgSysFrkOMw6BpmEVR2XlRGq8wZlDunrqP2r6rI
6PEo/X5Y1xvVgBAwkA8v3um6L2k+RONi5PwhRYigpgklBRRIBCF5oupFnSC2tMALfaHKpy3DIqgu
varzb1UZ2oAge6diBQHpOu3BpIYAoe7NOn4sr6stgxHIh3mag1VnzK/loPqhMd2oyLu4o37fQ7uq
AEyfwsvulth1+iZtR/tmlI5grlZnsMBsvXN8sOneIbQgLApvBrOEFoO5jH5G8P27XEelZ6BGH4Wg
IBEGQvF5KUgBSwnEziBhdgIDSOtnijw/8qctzLtgdSHyjp2sPxDQXJ2/NX6/P1YatCNIgr6KteXY
OBnrOto3VhDIkvcV82p5MKjraFveqkB5ZybeYzT86xU/nVb+aD7XLAF5LHgQCKUkU8dHuw/r+mzF
4WjXxO6Lyky4Rp0BM0ZF0Lkn1HEwiUFUdUerNTqJxwQBdlZKOnDipWMklTT3gTEmJsLTyVGVE5RP
uuu8iNMUGyWge5QWgrglST7kp3MIIIQq81UIuv4QENqwf/FqQBT8QReHDQG5iiLorlHcX/HDwuIN
CZwQat6c8j0dP1+rgSnX6pnrqmanuiCUMW0R5iTJxz2/Pyndd3R8sSKCmr5czUx5pa79IqVA7mVk
DokwT1hBcrH0aCxXxMnH1YE5TjSi210e9Oe5XHMEznwKsmS2u78CE+XXrXRoPQcpMteHyTMkIJ3H
AsC7yfuFNhMSSjzo/vsdiWGm2zR5Xdd45/z7WUtTx1LBe8Bg9Udx8iFP914eq/zQhHhf91aMDzQh
INrJu/n9lPd4vu49VNcgorgJM1nlUfe7vwTEfAadExUy/uB4MXhQ2JIZ9dCpDxe419YYfQ0FqHRe
OiWhltkKcxeaHqaM/gY/8n8q2fFchuCHKQNSTJoa4wRfTS33BA9JVtMy+tRddUG7IfIyUwdGymhp
zL8w2qUu4IRQ4G+zgbpgoqCvYB6pFZ5tNvPBTi98FgkX5n4goB0V0eRvjZW7gY7RDHh2eJ2tSLMJ
AwcEGs/mnzWw8FoZ6f28RVpyJtvTBopoxbSP/oGZuFqgHAguLXgzKf2bONcl4pj5IwKDsIXCe1pK
Bg/q3J8VmSNBrviBCoMitHMCGnQ1MyxmREzfvh7xIuKyK5WA3LuxvrsJMyL9AhNnMj2y0E9JQDgh
ASkt76V/f+bouJqZFrMl5ArZ1yLDFIhG7qlmCcgDgzC9tFqzBToq7Y8VMdWhYtOJ6GTDJcSFRS3h
+C9VGAeK5SEgOiDCHHNAs+Fp3YB2gHYDsWNSKQc3iuSlJDBSbFT7CW/Q/YzsmOdBmDLCxeS3XqKS
zDf1R7jSt2gzE9iYM0diYD4BM9CHFd8nvO5A0OkvRL21axDPZE4/GhefcG/2dsiAQUK7YoVpMJER
Qpf+jXkoObiJJ61lWvPvfK37O4RLtb7nrQf0oXg/gkDRagiQC4SUhgnEglAmbIRAd4NZtCk0IkLV
gZfS8gz9vFCzOJMenH09/bwSZvVkmZzzcgL55wNkRdsIN6LVVakEWiRanG9rf+o64u5ploB8A1sw
A1QDU+dxZT5RiRmhAOibFJsloH6bKJp8CnSc1KB2FNWO9ibzSybnBaYMJrabCiof76IbdBMEdKAz
vbC+HkKQuZ/TFb2J6xpwb7QA3U+emB6ZxyAgYO5XZEQN6SK4DlNMmgUbLYJ0vKS8wCMyCM9/C6er
VXkIiAl15ucQZgg/NCPCvWhLDTYwPrJdHgICU95dCKZi7i5RD4Q3aSCgWqFhzblKJv0Zscc1A+ZY
iPUCxO/LwrzrQ3/Kr1eWv85zgkQIG7pY717INX4/pj5CrWeFjGhqAFmvEiPhen8JqJG2vaBECDNs
orywzQZ/T62RV7N5pqWvh4HvfMtbVn/nkX6ughkh7qp4pCLfK9BRMZn5+SG8cn7daAV1PyO18xQh
H7STMxTRtjA3LvJEpnSQmx9lNpp9Mt3yCoda2tdg9w3aAj6YacEBzCEg8EOoM/GOeajRgJmLgRV9
oV6/Q0NFkDHIQOPhWzEmtwloLAgsiIh68ezSAtenNVq5FZyO+rcroi1gqr9OMa2v8Px5zlz7j8OP
qmIa5BrnB7MfYDKb77C5S38xxVab1+bZQuZxcx+DAG92q2XGpD8sz2BvBT++gSmu7kuwHMXwIDzz
13JPrSZgvODvj/mnmWpXnd+QAMBLbpNmMhvItM7+jGcM5jeEDnNs3vRDUXMU84oIp2a8qvC4o21g
e7SbD6qouspGwMZHmQPZtHp5IVS8MEp9/qrfO5SGEelgh7tVAOSOxnO0yn1cf70DCx+peieQRuqB
owLmaDwQ92COSfc/V+NGCOQbihAWws0TEISIOy9zO8yjVHMuoG/7Z7i8A4FG2tdMGurPAHVLRRwp
ftLMzUrLvBM4INSranDOTB32J5VR1dpRo2zqiSmegDz7ufKB/BoNkJEnJJ45H6umERh5o2mPqdBf
AirWsGV6ABmdIzgJryRQjXeEPp3CdZp6ZoN6D8p3yl5nM46npwPNVvy44hoIeqVJE3SYqbyJql55
g3GdOZpLFBFS2ykyWR9/2Rar3klsG6mHN4tBWozi08JJOrm+IiO4wR4EJMtv1wmEC+QP0dyaUsEv
uWdTrW5xEqtmd687v4GwUP/4t8pCaHzUlclfTJSMiJsJTDJfqQgB4QRDPhXzeonMZug35MM7gkOM
DzxzBCN9AUeIagGNjYD5F4vEcArtqgzeaxDQ54Xxj4U1XmAVQedxZkILXJt0bk6HNJAX83OfV5yh
dH/FNJ3SQPAGa57hZ2oAkKpFIReUN+8d/QyvO+ZM+3gDOpmFJQISOVX34VaNh1zcjI/jBCa9NALC
pE4bCX36NHNfOu9lIv0WS0W1fl2jmcPrUn8JaLwAwVsqCQAvBKMuiAcTDyP2eYrJ+Q9soYwK0HI+
qrz+6EnCAY3nCh0r9WE0CKHXulZSnhOVPy9sGHQ8X+cYTUJA+yliVpkVz9eZqXbXueW1jzdY3dRk
YAlZMLezQPXmRRiI4F8AbOrY3itMOGr7Wg4bnh/PeEXNx/m2QT48E9x091V9mPxHcwiDfkOMaII8
m2rmF4Q29eZljU8Kx/HzZtFxdUA9X9cZjGAKPUmRZ3KP4i3NPAwnjDDZYepkYHO52sLkMx8RlzUh
hz8DDrQfwu2KmH7CgOBRGohrpuI7dfxJnftdvC46Bz5oxwSE4QPN1HWw0zrBPlvltCsimL+kOvMB
J3iEwcmCPXQI9pBLebCqdHjN/UnndnQRMv9tAgPyBQfM+X+s0iY/F0dfrxbwvOO5YTk4XOWyxl3Z
sYYBrM5jHkeWENCS44F+ggkdE9tXlf7s+IBXv3FuQB7VmhdkoMEcJOREugMVaf+IDs0SkGfmTdXq
yxT9Cw4IXEON5PuI9RwqkMz+Ajvpo8/LgPfOlxVPUszpIXhbOh3pWEWE4jSu9RNhL7DCEZTyZ9Ty
d9XFTwRSpzmKtIXrdCJ+I3Cxq3/LtQUCHSrbLHXFbIMzx09URwQJ9eFlQXhim0ZYI4T/BrE2iBVt
f0pxA8VTlS9zDeTD85uuWFBkNMYLT2ffTmlY7wt8Bj044UQdKR8PJNbRO1t/EUIMfE5QhATQBBg5
pgXmyXimkMsRup+++KTy9iYznjNEwHzO5rp+gPv9YHywQsZOCwIvAkKIevHRb9NzD7rnEZVF/0az
pe4/VXxA587VX54ffe1QRZ45ASI+zQ/QYg0FDwjxvYo/0P3fpX2KvIfeQQXzFIM/1oRruq6xsgbl
MIYFzjDHKU5WOyBbng19HFkwwxU+Q+mZA4oH3odPKkLWP9W9EDbvC3IJDBjIQj4QApgnA5iAGabM
TVwf8AMB3onbVSYefs/o2iz9ZmAN5gwceF5YEJBPaLQ+/5/pGCeectD9P1f6H+rEQYq8WxOcvKM/
04+PUYQoa8kaBovx6YBpKe0ZcaeaFe5+XgYBzcijVrhDF1m/CaKpCDq3WA/gUp18nyImFjpKPEBQ
RyherAihpWkhPBBCtdEtLy5qOnMdh7nIaOoGblId5qoOe+vwCkVIig4VD3TOfRWxsX9OMW10AglQ
vieERBZhvREoCMJqoxueAUKfEPeeoY4sKvl1V0dGQKckC4j9vkVp2XcpSfZ9blGavyvtN3UBkwEC
DCGIUPX9AaHFy0L7P+v+onVsVaP8+CXfVrBpto/5fBgwzFJkIIA5lzr6gKDGQQIN4BOK3qRYTqA2
dqqNP9cJ8ENAkN8FioeTCMGi6wg+ni1zSWCBaRYTCn0nGegnmHDepIgp7ZyUNA2dUtk8K/A+RBEB
+n5FRrfJ8EudYLTcZ45H5/A0pT8zEERQQ2jJ8LBOHKe0aSPluNbn52qT99Nvfd9M67/eJFTtHSQ/
r1lU6wu0m2sIYZ5N+HxiASF/oeJNycqpXS8JA94J3lWeTVlLjKWdo2PmOfuYIHUOTfIoXb9Vkf5N
H/CBPoaWGpr13DMDg1MVt3IxWSXI5yD6XvKCflMO/XRPsnPXqbeXbThhYKVhfhHLRzJ4bd2fH3YD
ipQ61z3VrHDgBe5j/0wphYf3Ez2I9mo10LU/6+Hvpet0HB40aigvNqrtzYxUEag6ZsSLvT0ZEC6M
GBjp9gm6n32J9teF7RUZCZJH2YzDDUrDar28xF9UhAghO+rOi3ufrv9Y1+m4CIA+QkDnuMaLM9kd
J+uB6YwXipc97X7SM5k6Q5HOfWc8A5XNyw9J8xIzMpydLMBdg0ghyrfqnq1Ub3CpGRgYOALeSgkh
ITAC/zmK7Ek/W9fREBh1MpqsMG/UyR5t9tuK7S7PetXpc52+o/J5USGD9yhCEpgO/614p67fqeu8
qL9X/EOVAnjpGeGup8iLnhwMYZbZVxEtCGFK3miCafV5UOWBDwT0P5VfYbZstoFuVAwxMJe1kSLm
IkyfkP/9iozkGcBBiqlB1x53/RehxgCFETrtBLM5ir+mj1e5HbMSz4hQLQ2ClGfAgNNbKOLZXakf
DBZT30GXkP5DOaTpY0LmPdV5tHC0BsifUT5zV2DN5D9zO/HBR0VzdO1e1495j8GQ9xhBz3Pn/puU
xjsR9IHCyaF9dYFBACQE6fJeU+9F8RuU9nqV9YzOoa1QFumRK3MU6TvXKA19NK0c5BGDoX8o8qyo
J6SCTKJ+DMiRP2jaFXLKZTZXf5E1WyoiM0dFaIqAanWE/qCh/B7SfQ/pwSB8pym+qnOMDMOg42uq
5UvH0bW0l6J8i9LwcmDeSK5BFU9DRz1Naei06ygyuVe2x+sYAUfsE5ygTxt5+vrTORm9VQ3Kgxfz
/CoJeCkwN0E++yltqnBU3RkpM5LkpfiaIqO0ukH5ke/tuh/Bh3Y7T+de9jfqGKFwpK5P0HE4Emwk
uPsqzBCN3JdMo3wQAAg55gMYoPQ4zMOkOr61Vr66zojyvGppdJ35hqp9LH6fysdMQ8S8g7BY7uDa
cpFrH0IXTYCtOxC+DQWlZQBzhurHIGc9RQjovw67qnnoOgKTWCtNTXyUB4PRmgNS9y6dUa8xSseA
ElMVA06sBsgCTKx1g8PxQt2LQOcdRqN7Ueerknc8U6X7lX7/yskh+lWaBhPeomsMGljmiMEPde10
z6CRelKfs3Qv9VtbEbKLr5ASysO0jFQGpHim7m3XXwgozSpUtw7DLUFTBDRYlXcPPFW4DkSZyr+u
uuqEVXLycCCK71ce6mg8m4+4m/9cjXzcSzHHjc4ZyTNCaoiAfMWUN6NtYmpohnz61dgGblId0AyG
MmDGZc4MAYCpZUCDE9TlgU+zmTsyHTb9t9n6x/oiA6DyIKiZfIQBg4O5zdwTT1uLeJJ5OnJriOBS
7kVL8nOKDVdX7zgDlO1cH+xjUmw4o2GUcFgQ0DDCYzhVhclk/3zewOjOvWB96ui0N2837vcLOJwa
P9R1cQMATJ8INUyszLPwm7mIhrXBoW6HlT86EFB/xAyO5o32c6IiprwRH4yAhukjhGzU6byJkcnq
1/Ub4cfoCdMIKjhOC/w9VhH7OXNOZw/TJo20aoHnweCu+DFFbPbtiufp2TA4sGAIrEgEGPzwvvN+
42w0KvqgEdCK7ELNl8Vk5NWK+yripkrEPo05CjsyjgM+YLagcyZdVZsv1e4AAUacTGz7wLzMSYav
dY6hQMDNAY0a5wOPoRHQUPSmBstUp3vZec4wMYk7+eaKjMTxxCKgDd2liOcgy7o04qHYYOljPtmj
QgAvTNz9McPhTXXPmEfFADAEBhABI6ABBHMwsnIOALi/4wmGiyou03g84UGDB93vlAZXVgsDiIAw
RZM8egCztKwMAUMggYAR0AjqEhKKfJ9EtGAIGAKGwIhHwAhoxD9Ca4AhYAgYAiMTgTFHQDJjYboi
lqp5kvDhKo8z7fuh2P3kwargo8IbZWR238GptXv+VftHvVJdH6EP0Tf6nU+9cuy6ITDSEWiYgNxL
yYd4fBMxV4K3fYQ2nmVdWN+ML8hZ36siuI+9+OjwaR2zRHzyq+i36trujsRwi17uL/5HKI7lagsn
lgyibzBZ/3/CLG3pJOawWEkA7zK2keizLAsZuq/EWZqG1TH4or+hr+EHCkOVz/IqLI/DkkwX9zNf
llShj+Acwker7f3Mx24zBEY1Ag0TkBMILIvCB3m8XD8eTGQYRQ6SdvEh1fskxTmKfQhI51gGJK/I
NzgIjyQB4Y3GdQIT1WOegIQBa1vdqsjSJNsqVls37mTXd1iH7FNV+g9Exrp5fFi7j+K1g9nPUvKG
/FhJgiWa+ktAm+peXObxmmMZp/YV3AYrzhAYEQg0Q0A0yC9pMyhmJ5HOm1UGS00g2Hlxy+vCDSCa
vu6M1tNCvevx+6rlMYDVXTFZOc1vF5XGmnh3ifyb+dL677qH9ej2V8Q02Sc4sxSCeZri2/V73Spa
EB5+kA/rlM1ZMa2vKIXnT79bnmcb70OD8q4MAS5WpCEw4AgMKwJS67ZSxOUYzSN1AdABQMALhHqC
odp1Ru/7KWLjr7bC9QBUc4VngenJL7J5uI4bJiDWIROheJMa+6qwRXhy8IDmyaKnBFZX/qoiWkIy
+C0p+PaJVZ2HIoRzN8tRcKN9bDmKsFsNgZGPQLMENNgt9kuZv54iwAa77IbyV734Iv7qhhLXSCQh
jamJuZOH0pwdljf/ftwfF7isIt1s8Pd/Qzdink3O8bDlBSsAs4oDK1szF1cR3PzPDu7ka8Klu9lK
WHpDwBAYOQgMGAE5E0u4aZInD7egY3zZ8O60eR0W2tRtmG58fbI6xyQ0o2jvbZZqEnH3xjdrwuto
0ASXayf1ROD21pqncgI13htoD3jMUkTQMtHNmmOs7ZYUxqz9FDdn4XFX1STpMYxhz71+MzDyTr0/
hn08LTvUxvtGzXa6ire7v+vqL6sHJAPkQ9vRetjCYlWVMVn1XRRLyH04iBBqLviZxFb5pO7DQkYx
rzTKpy2hKTnWPznXtMktpe/5fOquvp6Cj50yBMYcAgNGQEKODcPOQdApfl4v51b6y1ImnOflZjL/
Zzqvd33Zhmn67Vd5XU/Xp7knwDzQbJcXJhnmA/BMqgi6l/1vTlNkiRpPdK/o/Lf1m824+gj2AXjC
rETA5DQkxyKgf0ypF/Mo+yryJb1fpRpcfq0IcbGBHFoG2lSFqccRL4tfnq64nmJIwIoP69pMtemv
VdrAnkJ+W2HyLih+3qUFh2d1/zd0P3skxQNmN9oU7wts5PZlReZjWGOOPYZSvdZiGdE22sUGehXz
QCqXDQfxHqStmDDxDttUkTmjcJUHF1jfjnlAvOhI1ycoL/bNmeHK8qSJCZB9fVikcV7KbTiWsK/S
NoqHKC1r7G2viBkQp4MfKH4nrbxq55TH+3XtJMUPKPp6/EPnaZMFQ8AQaACBgSQgiCIkAr2ErCL8
fUVGsXMVpyoyAj6UF1bXPyNBweifwMvL+mbMQXgSWVnHUxQRWGg3fezx7kWH4EiLIPcjafbEYQfF
cxWPbACDZpNQHkKHgNdXRVC9aOtFinspIvifdvWnPQh1wuuKH1d8JD5y172Y5CBx5pgIOGOg9YDt
1ors/rif7knzDINENlOEBCBriJ89RyB/hDoLl7IVNPff6fLnD9fAPx7W0Q/MZPQPTGZoozWD8mQH
W9ZPg4AoK74LJW1lGaE/KbKPCRrQeYqQUjxQV9o6R/Hu+AWnxWypc3guYr6EpHClJ7xJ8RjFj9Mv
VJekZyJ9jPJxj0bjnKG4Uyx/zjccVMauSnydIoTZruj3ZiHv2Yr3N5yZJTQExjACA0lAkMRiJwwg
H4Tf8RIGN+iFRRhiekGw8pLynQ0jdALrmKGxIKBx8f6K4r2KlysifBEeFaNa5YeZ5gxFyOAyRdSq
UAgwytcfRtWH6hgBf9UAP9+4eaXC1KLyIFDqD/k8o3iMyg/d1XUNAkZ44n4MMbHzalJDY/IfjCDu
WYonYlJzxDRTv9FELtdvvsOqENAuT4qC5DFlfVcRLQrNE0zYQwTz2PG6/+6YOQ8Nku9z1lM8hQwU
ILg7FCEDnmmjmwV6M9bOrgxvCqVcwg9VLhoqRERYXccTdc7POaEpEV7RuWSZPGs0FcgHbewgpQnd
vV1/oH/h6HC+fu+ta/HN3bxnG8lpL8+JPoYmhrYWJ2RXhfQ/yhvCph6QzxzFQ1VW2B5d20d/0B7x
JiQsjyNDzXrYRUNgNCAwkAQUf+EYNe+qFxP3XOaEeNH31wv6bv1lpM7fMDjh83P3AvPCIsCfrDLK
5yVHuM5QxHR3ndKRvhz0+yKlIR80oBN0fH1cyxjkh8ZInNEx4QxPPq6d/1NdDtExH69u6ur/uK+P
rr1Lx3xfRThJ957przlt8Wgn/HbSeYjlI4m2eGGHcD1M98S/YTlX90L0kDVkwHc7oZagdBANuFK+
J6A/6Tz1bDZ4AqKOEEK78kVL9BojGhKhXREtEK2O74Z+5jQcTGKEirkudw3tEeHPwAaC4TutMOj4
F0rDdzt/UUTbovzv+evubxwf2raf7oNcGw5ugMHgaZriE4q7K4/yM9TxNUpDX7dVsxtG1RKOZQQG
moC87Z+tAULy8cEJkR/qNwQUn/COJ2NUSWhR+lxslB5Pg4AhD0Kq3V73fU/3ozFgRtpNkXJXREDL
8eTaZ1th1Qsz1V1Ks6kio/2yENUx8xOYpBj5Y95JC5DSFtyLVuSIKZnufwny8ddv1AGkhAs0Zsqk
mYr5Hh/8c2gWs9t1w86KzLn4voBWS0Qws3o34XnFqxUR5tTlZ4r0RU9USfdr+gtaHOGPcfKJVRCt
iPksNJDN3MCjPaUB/6TcZsnH5UMdP+eOWYW8TD6xcsgf7f1AxYq5sJS62ClDYEwjMNAERH6YXRAo
FUEva8mNDjnv53r6Az6Tv9MUMX+ljmAhL13DrMOE9U6KK4qA8MSiTrUEuJ9PQQOIB/8smD9I9QAT
hvepbQhxzFDg8LtYBl7Y+fmIJLaTdQItgHLiZNOfZ1Dtntt0gXk3zKw4XzDPx1/Kw0kA7SXUetUO
zGcQkPeY43kyfwYutyQKoG3Un5D6zCEU5YkGRICkmcdqT6ko5kU09P4E8KMt1CGOfTkv1WOB6vEL
nYCALBgChkANBAaagCAWhDCT52mhvyPreF5eewpt93rZmeOIE5p3XMBcQ8AjbUUFRr83KH5dcXPV
7TcIW1+4fuMc8EX3e26iUszDENAW/qy0mLPiI2jaxW/MZ1zDBJkW+mheiUTkUzF3NVDgqK3dqjfk
ST3fpWPm7ryp8Cmux8rybtMHKh0ei7QZ4f6a4j8SdYKYeMbUHdNXteCJFc0X4ksLzC/1d26GuUzm
xSDJan2cMgeinw/UY7F8DIFhi8BAExAN5eXu7wveLFB4W1UTpmgCXItPRjebf1Pp3cj+p7oJosFk
tJ6EKq7aeOjhwXW1IgTKCB8nhXjwzwIBh+ZWLdCudkXmdNLCisK+Wv08seykBHgnfkHxlZT2Qta/
UsQdmm+CcL3HC/DVFPMYnpB+kBEnsWp1IG0189fyaN8Qi79/qHGu0UXskiEwMhAYDAKi5YNp+/YT
3Qii9yh6V9wKxCXE0IyYXF8egdOfp4hgZRJ6R0XmQ4g+oB38QREnAz8f4q95s9BvdAINqj2l8B4/
L1ajXYOJfSN4MC+CY8Gmimhp0xQxgT4Yv1nteFFtAAsIiDR4B/Ks0ICSAVMez5u2bVSjEt6rEMKD
9Ac6oH2h0WI2ZFmh5FyVL68Rkhzoull+hsCIQ2CwCKi/QHjhCclU02zmOOHCnEDWE02yQAm3D+oc
2gbfoyDABj2oTMxouFrjDsy3Lpj/GNUTGDGzvcOPqlTEe37xHQ1f1IcEGg/Kv00RkxZp/zboDepf
AbjgowHikMFqDwS2aEib1/IkgXs53nkI7tBtPRG8+ZHTmOP6BOHCs17PXcCENxiaL/0S7HnOOMNA
oBXBmRE3TaujnTMEDIFKBIYbAXkhjP0egZL8Toba89IjYBDETHh7191yyyQEmITGtZuPFT+hGCcg
zDmEClfflI7B9fL8TYMdBy8uhO6vJHAPbvAen+yPOpiruJ7iLopxN2qfhm98CorMQZCu6vIzTZZN
8rjmlIZ7Q1mq3U8If7QY5qrAAFMhLtJpgW9x5ijitEBgzih0C08EngWu05g1P6j8N1A5oUNDLKBt
gQ/hPl1HC+pP8OY7r2nH82BQhKPD5xU/oXqcidNBohCI1Hvs9ad8u8cQGDMIDDcC8uYXJuJ30wv+
E/31ZpzH9LKjGfBtCVrGpopf0TEmuLP9CNtpCFfr3MqK/9D5pPDD9MVIewOlxSFgtiIfhSbJBvfg
LykN3k7zdb0RoeyFFkvi8MEjruiQBEKNiLB6IEVo4Rn2oO5hbghSPVXHnCuTkH7vpfPHKGL+uUDX
BpJ86PBggqCnTyBc+TgTl/D1FdlArhmNwtcNpwDMkcz19AnK81GVA+Fs6i5Sfh8vPp670vFd10GK
myheqt8H6Dyu15hZ+f7qdMX1FDGT/TKtvAbPQe5oa2sp3330l+fP4rj0Eepxln5DQNSZ76v42Dg0
p+r4nfpzhqJ3ELF5ogZBt2RjE4FmCcinT5tXYQTNdTSXehPAXgtJov60TiBUGEWep4jAmaLIC/4Z
RS/gr9MxgvEExZMVt9XL3+4y4zsczD8ITIR5MiAQMf3wgeSVitjxcRTwbrUIDQQhNn4+ZsTbiZG8
X14l3rYkDpjFML1hUuI7JMrx3mzcB8nNVV2Z7zlXggutJx4u1I93KTIfcoHS7aS/CHMw3UoRgc4c
kf9gNH6vfzbVsCUt+TCKT3t+EPUFikcoQnbUA8LE1MmqCmggjYb4/NYLDBoavJE2VJs/waHhcEVI
Ga2Wj085R6C/UF+0HlbfmJNSXq2+G0/+qH5AQjiCXKbIb8gvdOVX3rjCH61DvsnaX5HBBkTN88Xz
ku+7uAcyosyhnpNLgcJOGQLDA4FmCQgBytxEmpBAsCFweeGqzd9wH/enfuei84xeIR1GmQgUTGmE
R+J5Sgjg7suIF1McwhFzXDxcQx6MsJMw69wLuneGzp+tyAeT71f08zQkR6jtq3i+O/9e/Y279EIo
fn6mAgfl/ZryvkvXISCI4xlFMEPgcx9zB8wPEd6rtHvqnrt9HXX8jM7trd8INggMIvKBb08g2yu8
the7xqF/NtWwhVgxSfJs+jw/Rvgq+0Rdg/AZ+UPkPt9GtL94dZjnop30BbTAWmG2Lu6myAeyaF2p
BKT6MShA85mrv9Rzc0W0IR+4Fw0xrTzaXqvvljNROQtVBk4gDD7wstxUEbfueKDv4O6Olkv/8aFd
Bzif0J/4KJZnUe1dSGRpPw2BsYdAMwTEy8TImFF4mqcS5IFQQNhW+xYFcwteTH0m2IEeYtGf30oA
4DHlP9jkEts4VMzZOCHM4poIcOrES08aRq/sJVNNEFPOtc605jWBcnucaet6Z4Ly1+MjeuYtvCdW
BQ66h7kMJuHRmhBiDyl6DQghCN7UFe1uV0UE6qZx856OX9I5SPVqRcxtmBIZ2YPZi7pezayzp8u7
WrtpwzsUub8dUJNBefMx52E6zzyTDwjQtOedloU/xwCAVREI9e79rdJAVmhnC10fqJq3rt+hOqKN
4uCBqQtips2YyJLzMT4f2r6vItjXdUhRPrepjL8qrX8/KvJ1z4Bld2gj/RRtmnZSB54fWihzlRB3
3fJqAWnXDIHRjEDDBOReurggrsDFCQ5MEbWEB4Ki7lyC8mIyuqGgtH6ymbmghgOaUJ26pl53ZNGn
DRI6kNXGimhVTE7/vlr+boTNyJm5C7Sriglzh3XN+iXz1j1Vnw1pdR0iaQR7iK5uujrYMRBoKA9X
r2oDltRidA9CndhoGQwCauKTgmfd1RIgG3cfmm456DzlNVS3hjusJTQERiECDRPQKGz7QDcJAlrH
ZVrvS3hMO4z40UbMRDPQT8LyMwQMgRGBgBHQAD0mTITSbPyc0y46fl5Z890PJqJy0Hm++McEh6PE
bMX2AaqCZWMIGAKGwIhCwAhoYB8X80O4UrP8DK7i7AwLEXlPKOYgmKSe5ogHj620700GtlaWmyFg
CBgCwxABI6ABfCgiE/b8+YqyZHIa1+4dUrJnHgw33nuV/s8DWLxlZQgYAobAiELACGiAH5dIBW8o
di3FLRhNh4AG5L3XOpWG5YEsGAKGgCEwphEwAhqkxy+SeWqQsrZsDQFDwBAYFQgYAY2Kx2iNMAQM
AUNg5CFgBDTynpnV2BAwBAyBUYGAEdCoeIzWCEPAEDAERh4CRkAj75lZjQ0BQ8AQGBUIGAGNisdo
jTAEDAFDYOQhYAQ08p6Z1dgQMAQMgVGBgBHQqHiM1ghDwBAwBEYeAkZAI++ZWY0NAUPAEBgVCBgB
jYrHaI0wBAwBQ2DkIWAENPKemdXYEDAEDIFRgYAR0Kh4jNYIQ8AQMARGHgJGQCPvmVmNDQFDwBAY
FQgYAY2Kx2iNMAQMAUNg5CFgBDTynpnV2BAwBAyBUYGAEdCoeIzWCEPAEDAERh4CDRHQifn8Gj1B
8DY1r6uhG0YeDiO+xno+GT2bLH+XozFF5VGM3d+i4yWKD51cKMTPL0cRdqshYAgYAhECjfLJtpJE
s7SlZ4fi8gg4w32QENDzyejZtPC3v0Xoxl7lESca+sczOr85g4/+5mv3GQKGgCGQhkCjBLSyhNA0
osE4uhFIYa/xo7vF1jpDwBAYKgQaJaBbVMHHFJFPGiRbGEMIdKqtsuxZMAQMAUNgYBFoiIBk/39W
xRItGAKGgCFgCBgCA4JAQwQ0ICVZJoaAIWAIGAKGQAwBIyDrDoaAIWAIGAJDgoAR0JDAboUaAoaA
IWAIGAFZHzAEDAFDwBAYEgSMgIYEdivUEDAEDAFDwAjI+oAhYAgYAobAkCBgBDQksFuhhoAhYAgY
AkZA1gcMAUPAEDAEhgQBI6Ahgd0KNQQMAUPAEDACsj5gCBgChoAhMCQIGAENCexWqCFgCBgChoAR
kPUBQ8AQMAQMgSFBwAhoSGC3Qg0BQ8AQMASMgKwPGAKGgCFgCAwJAkZAQwK7FWoIGAKGgCFgBGR9
wBAwBAwBQ2BIEDACGhLYrVBDwBAwBAwBIyDrA4aAIWAIGAJDgoAR0JDAboUaAoaAIWAIGAFZHzAE
DAFDwBAYEgSMgIYEdivUEDAEDAFD4P8Br/CZMXnRHHgAAAAASUVORK5CYII=

--_004_91E3A1BD737FDF4FA14118387FF6766B2774DA44lhreml504mbs_--


From nobody Tue May 28 06:54:21 2019
Return-Path: <rwilton@cisco.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 372301201C9; Tue, 28 May 2019 06:54:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.5
X-Spam-Level: 
X-Spam-Status: No, score=-14.5 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=Mh9+V/zY; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=GNjqN/6j
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5rKT8SkBbaNq; Tue, 28 May 2019 06:54:17 -0700 (PDT)
Received: from alln-iport-6.cisco.com (alln-iport-6.cisco.com [173.37.142.93]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B76F0120158; Tue, 28 May 2019 06:54:16 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=4183; q=dns/txt; s=iport; t=1559051656; x=1560261256; h=from:to:subject:date:message-id:references:in-reply-to: content-transfer-encoding:mime-version; bh=1gltsDoYYZB5VEr/OP2fXigIXDbc0MhYz9kiVJIG13w=; b=Mh9+V/zYEGTc9ryDWxiCJLPFXXAi/O8iQY4AqNjkwYw1Xf3SBCcZWftA ppoXWfz9toGv2IS/ijAyxb57JoTMTQKhodVMx0a7CW+27DcIbnWWhuazq 8KnANAQQHUdOLFm8f83G/RFxt6LN9eohLi88XXe5bNIxT09+qAHd5Qlg+ g=;
IronPort-PHdr: =?us-ascii?q?9a23=3A0kXVVxbRJQXGuWFRXdA2sEz/LSx94ef9IxIV55?= =?us-ascii?q?w7irlHbqWk+dH4MVfC4el20gebRp3VvvRDjeee87vtX2AN+96giDgDa9QNMn?= =?us-ascii?q?1NksAKh0olCc+BB1f8KavwcC0+AMNEfFRk5Hq8d0NSHZW2ag=3D=3D?=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0BHAABLPO1c/5JdJa1lHAEBAQQBAQc?= =?us-ascii?q?EAQGBUQcBAQsBgT0pJwNpVSAECygKh1ADhFKKKoJXlyuBLoEkA1QJAQEBDAE?= =?us-ascii?q?BGAsKAgEBg3pGAoJjIzQJDgEDAQEEAQECAQRtHAyFSgEBAQEDAQEQCwoTBgE?= =?us-ascii?q?BLAwLBAIBCBEEAQEfECcLHQgCBAESCBqDAYFqAx0BAgydfwKBOIhfgW0zgnk?= =?us-ascii?q?BAQWEeRiCDwMGgTQBi1IXgUA/gVeCTD6CYQEBgWODOoImiyQhnRIJAoINkzC?= =?us-ascii?q?CH4ZmhACJRIxulXgCBAIEBQIOAQEFgU84KYEucBU7gmyCD4ElAQiCQoUUhT9?= =?us-ascii?q?ygSmMTAGBIAEB?=
X-IronPort-AV: E=Sophos;i="5.60,523,1549929600"; d="scan'208";a="282384893"
Received: from rcdn-core-10.cisco.com ([173.37.93.146]) by alln-iport-6.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 28 May 2019 13:54:15 +0000
Received: from XCH-ALN-007.cisco.com (xch-aln-007.cisco.com [173.36.7.17]) by rcdn-core-10.cisco.com (8.15.2/8.15.2) with ESMTPS id x4SDsFda018872 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Tue, 28 May 2019 13:54:15 GMT
Received: from xhs-aln-002.cisco.com (173.37.135.119) by XCH-ALN-007.cisco.com (173.36.7.17) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Tue, 28 May 2019 08:54:14 -0500
Received: from xhs-rtp-002.cisco.com (64.101.210.229) by xhs-aln-002.cisco.com (173.37.135.119) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Tue, 28 May 2019 08:54:13 -0500
Received: from NAM01-BY2-obe.outbound.protection.outlook.com (64.101.32.56) by xhs-rtp-002.cisco.com (64.101.210.229) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Tue, 28 May 2019 09:54:13 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com;  s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=tif1o4/dLDSEho4NN27L0Dv8XSz2LGofIAal0UxWK7Q=; b=GNjqN/6jXMTfAyTS2pFWeQ0CfvLcqmd//9MVunxDX8QHDfuUcC+avL0oEUvIe5YdtJW9XkCBTwZVMZ53mSkQChpmXPPnIdZlEUbf1hVArtrPxMSqRd2PvIvAsLMiwki9qmXBxHlWkwLVnf71Z5eZUByMCuVOtDXQVqVelzy8d/4=
Received: from BYAPR11MB2631.namprd11.prod.outlook.com (52.135.227.28) by BYAPR11MB2598.namprd11.prod.outlook.com (52.135.227.19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1922.15; Tue, 28 May 2019 13:54:11 +0000
Received: from BYAPR11MB2631.namprd11.prod.outlook.com ([fe80::d837:c1dd:cdb1:bb78]) by BYAPR11MB2631.namprd11.prod.outlook.com ([fe80::d837:c1dd:cdb1:bb78%7]) with mapi id 15.20.1922.021; Tue, 28 May 2019 13:54:11 +0000
From: "Rob Wilton (rwilton)" <rwilton@cisco.com>
To: NetMod WG <netmod@ietf.org>, "draft-ietf-netmod-artwork-folding@ietf.org" <draft-ietf-netmod-artwork-folding@ietf.org>
Thread-Topic: [netmod] WG Last Call: draft-ietf-netmod-artwork-folding-02
Thread-Index: AQHVCQh/oSnqrubDN0ieHZJH/cPGUKaAcPjQ
Date: Tue, 28 May 2019 13:54:11 +0000
Message-ID: <BYAPR11MB263112EA231A41491AC4DF89B51E0@BYAPR11MB2631.namprd11.prod.outlook.com>
References: <e6fc4541-891a-60cb-e956-86f238d09f14@labn.net>
In-Reply-To: <e6fc4541-891a-60cb-e956-86f238d09f14@labn.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=rwilton@cisco.com; 
x-originating-ip: [173.38.220.56]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 601a9d3d-ecc9-42d4-9ceb-08d6e373f69f
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(2017052603328)(7193020); SRVR:BYAPR11MB2598; 
x-ms-traffictypediagnostic: BYAPR11MB2598:
x-ms-exchange-purlcount: 1
x-microsoft-antispam-prvs: <BYAPR11MB2598C0CBA954583304F62A3AB51E0@BYAPR11MB2598.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 00514A2FE6
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(376002)(346002)(396003)(366004)(39860400002)(136003)(51444003)(199004)(189003)(13464003)(86362001)(229853002)(2501003)(316002)(52536014)(53936002)(74316002)(81166006)(8676002)(81156014)(5660300002)(33656002)(55016002)(486006)(6436002)(11346002)(476003)(446003)(6306002)(3846002)(14454004)(9686003)(478600001)(186003)(8936002)(26005)(6116002)(76176011)(66946007)(305945005)(7736002)(2906002)(66446008)(76116006)(71190400001)(64756008)(73956011)(71200400001)(7696005)(450100002)(99286004)(66556008)(66476007)(6506007)(68736007)(53546011)(6246003)(102836004)(110136005)(66066001)(25786009)(14444005)(256004)(966005); DIR:OUT; SFP:1101; SCL:1; SRVR:BYAPR11MB2598; H:BYAPR11MB2631.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: V0pGEoW5eg7Ps+kpraD1AgcvBx6LxNbNvY6TRTpyY6MjhYiomGxNK4uQUeDE+rG1gVeIL+fQiETg9j5D7v0kBKSIPN7dW3WC0bEXZFzV6c4bfiwoy0jhrUB9s3o6i3mx0Fq88B7b8L+I0FujA8hAKv/8M8kJURdMiv2aThUvJFo2Vk+/B54CNgoxh9zbeEnVitlhtXWW6HZP6as+yOmLpHiKppjTIzkhjzX01QcCx9cCno8824xo0YYn2qexcB3hSHQHvOKs6NmYdrWssH7qrwyVYzoKQ4XIpGc2DCQ8TgmCdhIcFFK3QtT8WNdHEx33ZSURVIVn06mHkfkxPZeGQX0fwDc67l+5amge88sAxPwDg5Q6Wj48jQpuY3sddtTDVotxdHODwZuM2s0y1r0t6eL6+NJinTpYopOvZjH1290=
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 601a9d3d-ecc9-42d4-9ceb-08d6e373f69f
X-MS-Exchange-CrossTenant-originalarrivaltime: 28 May 2019 13:54:11.6744 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: rwilton@cisco.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR11MB2598
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.17, xch-aln-007.cisco.com
X-Outbound-Node: rcdn-core-10.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/eRvWOHlcKqFaSgUlw1AIFggqOlY>
Subject: Re: [netmod] WG Last Call: draft-ietf-netmod-artwork-folding-02
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 28 May 2019 13:54:19 -0000

Hi,

I've read this document and have some minor comments on it.=20

1) Abstract:
I wasn't sure whether the abstract is still entirely accurate, given that t=
he document describes two strategies rather than one, only one of those str=
ategies is time proven ('\'), and only one of those strategies works on *an=
y* text-based content ('\\').

2) Section 4. Goals:
Is one of the goals to *exactly* reproduce the input text to the folding al=
gorithm?  If so, this might be worth explicitly stating (e.g. because of th=
e whitespace handling when using the single backslash strategy).

3) Section 5.1
Nit: will work -> works.

4) Section 5.2, 4th paragraph about functions.
I'm not sure this paragraph really adds anything to the document, so I woul=
d suggest removing it.  E.g. does this means that we should use YANG groupi=
ngs to avoid line length indentation issues, if so, I would question whethe=
r that makes the resulting YANG model more readable.

5) Section 5.2, last paragraph.
I think that the RECOMMENDED is perhaps a bit strong, hence I would prefer =
"suggested" or "encouraged" over "RECOMMENDED".  I think that some/many of =
the input formats do have ways that the input can be modified such that fol=
ding isn't required, but I'm not sure that we necessarily advocate that sho=
uld always be done.

6) 7.2.1. '\' folding algorithm:
It should also check if the line contains more than "max line length space"=
 characters and if so it cannot be folded using this strategy.

7) 8.2.1. '\\' folding algorithm, 6th paragraph:
Does this have to abort if it finds a '\' character at the end of the line,=
 and start at next?  I think that this could still be handled by folding ag=
ain at that same point, which when unfolded should go back to the same inpu=
t again.  Of course, such a tool might also warn that the input might alrea=
dy be folded input.  One of the advantages of the '\\' method is that it sh=
ould be able to deterministically work on any input.

---

Final comment, and it is probably a bit late for this, but rather than havi=
ng two separate schemes, I have one quick idea for merging the two.

The idea is this:  The principle difference between the two schemes is how =
they treat whitespace.  So, the suggestion is to make the '\' on the follow=
ing line optional, so it is *only* used to separate insignificant whitespac=
e from significant whitespace.  When unfolding, rather that only consuming =
leading whitespace following a fold, it would also optionally consume the '=
\' if it immediately followed the leading whitespace AND it also followed b=
y a whitespace character.

Perhaps best illustrated with a short contrived example:

  "This is some example  text that I want to fold whilst preserving whitesp=
ace"


If I want to (approximately) fold this text around column 21, then I could =
fold it to this (using the existing '\' scheme):

"This is some \
 example  test that \
 I want to fold whilst \
 preserving whitespace"


Alternatively, I could fold the first line to this instead, separating sign=
ificant whitespace from the insignificant whitespace:

"This is some example \
 \ text that I want to \
 fold, whilst preserving \
 whitespace"

Thanks,
Rob


> -----Original Message-----
> From: netmod <netmod-bounces@ietf.org> On Behalf Of Lou Berger
> Sent: 12 May 2019 22:20
> To: NetMod WG <netmod@ietf.org>
> Cc: NetMod WG Chairs <netmod-chairs@ietf.org>
> Subject: [netmod] WG Last Call: draft-ietf-netmod-artwork-folding-02
>=20
>=20
> All,
>=20
> This starts a two-week working group last call for
> draft-ietf-netmod-artwork-folding-02
>=20
> The working group last call ends on May 27.
> Please send your comments to the working group mailing list.
>=20
> Positive comments, e.g., "I've reviewed this document and believe it is
> ready for publication", are welcome!
> This is useful and important, even from authors.
>=20
> Thank you,
> NetMod Chairs
>=20
>=20
>=20
> _______________________________________________
> netmod mailing list
> netmod@ietf.org
> https://www.ietf.org/mailman/listinfo/netmod


From nobody Tue May 28 08:36:56 2019
Return-Path: <0100016aff1640f0-a301a70e-ecae-4754-84d1-12170d5b73fd-000000@amazonses.watsen.net>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 399AF120234; Tue, 28 May 2019 08:36:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level: 
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=amazonses.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id z8EPpbA-w7SZ; Tue, 28 May 2019 08:36:51 -0700 (PDT)
Received: from a8-64.smtp-out.amazonses.com (a8-64.smtp-out.amazonses.com [54.240.8.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8192912022E; Tue, 28 May 2019 08:36:51 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=6gbrjpgwjskckoa6a5zn6fwqkn67xbtw; d=amazonses.com; t=1559057809; h=From:Message-Id:Content-Type:Mime-Version:Subject:Date:In-Reply-To:Cc:To:References:Feedback-ID; bh=aAYVrwhrn/cXGrQdbd1z2ZUHPwlvz57nb/kNClM2u/4=; b=hjRlM6sOQuNBup+8CIxwGWP6wR/b/ceOIbeiw13x4OzkLcBo3Er4tqcYuakev92w uY+c32+Q3WtTuEeOutM6QLZsOdlPB+5H2jQYLok5OYxpqqtWNEnHnqcwxyzVlYZRmiS Vi6IdDTLl58WWLfxHKo7yCELhVbeQnnuCgMWBOoA=
From: Kent Watsen <kent@watsen.net>
Message-ID: <0100016aff1640f0-a301a70e-ecae-4754-84d1-12170d5b73fd-000000@email.amazonses.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_A6C48A9A-2A5B-4522-B0AE-1AD748B6312A"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
Date: Tue, 28 May 2019 15:36:49 +0000
In-Reply-To: <BYAPR11MB263112EA231A41491AC4DF89B51E0@BYAPR11MB2631.namprd11.prod.outlook.com>
Cc: "netmod@ietf.org" <netmod@ietf.org>, "draft-ietf-netmod-artwork-folding@ietf.org" <draft-ietf-netmod-artwork-folding@ietf.org>
To: "Rob Wilton (rwilton)" <rwilton@cisco.com>
References: <e6fc4541-891a-60cb-e956-86f238d09f14@labn.net> <BYAPR11MB263112EA231A41491AC4DF89B51E0@BYAPR11MB2631.namprd11.prod.outlook.com>
X-Mailer: Apple Mail (2.3445.104.11)
X-SES-Outgoing: 2019.05.28-54.240.8.64
Feedback-ID: 1.us-east-1.DKmIRZFhhsBhtmFMNikgwZUWVrODEw9qVcPhqJEI2DA=:AmazonSES
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/D0vGWLaM_8_wHt3zA3sFGsl9iBQ>
Subject: Re: [netmod] WG Last Call: draft-ietf-netmod-artwork-folding-02
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 28 May 2019 15:36:54 -0000

--Apple-Mail=_A6C48A9A-2A5B-4522-B0AE-1AD748B6312A
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

Hi Rob,

Thanks for your review.  Comments below.



> 1) Abstract:
> I wasn't sure whether the abstract is still entirely accurate, given =
that the document describes two strategies rather than one, only one of =
those strategies is time proven ('\'), and only one of those strategies =
works on *any* text-based content ('\\').

True, how about this (with a similar change in the Introduction)?

   This document defines two strategies for handling long lines in
   width-bounded text content.  One strategy is based on the time-proven
   use of a single backslash ('\') character to indicate where line-
   folding has occurred, with the continuation occurring with the first
   non-space (' ') character on the next line.  The second strategy
   extends the first strategy by adding a second backslash character to
   identify where the continuation begins and thereby able to handle
   cases not supported by the first strategy.  Both strategies use a
   self-describing header enabling automated reconstitution of the
   original content.




> 2) Section 4. Goals:
> Is one of the goals to *exactly* reproduce the input text to the =
folding algorithm?  If so, this might be worth explicitly stating (e.g. =
because of the whitespace handling when using the single backslash =
strategy).

This is what the second goal (4.2.) means by "reconstitution of the =
original text content".   The below is slightly modified, is it okay?

  4.2.  Automated Reconstitution of the Original Text Content

     Automated reconstitution of the original text content is needed to
     support validation of text-based content extracted from documents.

     For instance, already YANG [RFC7950] modules are extracted from
     Internet-Drafts and validated as part of the draft-submission
     process.  Additionally, the desire to validate instance examples
     (i.e., XML/JSON documents) contained within Internet-Drafts has
     been discussed ([yang-doctors-thread]).



> 3) Section 5.1
> Nit: will work -> works.

Fixed.


> 4) Section 5.2, 4th paragraph about functions.
> I'm not sure this paragraph really adds anything to the document, so I =
would suggest removing it.  E.g. does this means that we should use YANG =
groupings to avoid line length indentation issues, if so, I would =
question whether that makes the resulting YANG model more readable.

Removed.  I agree that the (unfolded) YANG module's readability is more =
important and, besides, these are just examples and don't preclude =
anything.


> 5) Section 5.2, last paragraph.
> I think that the RECOMMENDED is perhaps a bit strong, hence I would =
prefer "suggested" or "encouraged" over "RECOMMENDED".  I think that =
some/many of the input formats do have ways that the input can be =
modified such that folding isn't required, but I'm not sure that we =
necessarily advocate that should always be done.

Disagree.  We do want to advocate authors do what they can.  It was a =
SHOULD before, but downgraded to a RECOMMENDED to be less overt.


> 6) 7.2.1. '\' folding algorithm:
> It should also check if the line contains more than "max line length =
space" characters and if so it cannot be folded using this strategy.

You're correct that this is a problem case, but isn't it covered already =
by the following sentence?

   1.  Determine where the fold will occur.  This location MUST be
       before or at the desired maximum column, and MUST NOT be on top
       of a space (' ') character.  If no such location can be found,
       then exit (this text content cannot be folded)



> 7) 8.2.1. '\\' folding algorithm, 6th paragraph:
> Does this have to abort if it finds a '\' character at the end of the =
line, and start at next?  I think that this could still be handled by =
folding again at that same point, which when unfolded should go back to =
the same input again.  Of course, such a tool might also warn that the =
input might already be folded input.  One of the advantages of the '\\' =
method is that it should be able to deterministically work on any input.

Good point, how about this?

   Scan the text content to ensure no existing lines already end with a
   backslash ('\') character while the subsequent line starts with a
   backslash ('\') character as the first non-space (' ') character, as
   this could lead to an ambiguous result.  If such a line is found, and
   its width is less than the desired maximum, then it SHOULD be flagged
   for forced folding (folding even though unnecessary).  If the folding
   implementation doesn't support forced foldings, it MUST exit.

   <snip>

   For each line in the text content, from top-to-bottom, if the line
   exceeds the desired maximum, or requires a forced folding, then fold
   the line by:



> Final comment, and it is probably a bit late for this, but rather than =
having two separate schemes, I have one quick idea for merging the two.
>=20
<snip>

Yes, too late for that kind of change I think, at least I'm not =
interested in investing the time to see if its viable.


Kent // author


--Apple-Mail=_A6C48A9A-2A5B-4522-B0AE-1AD748B6312A
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=us-ascii

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Dus-ascii"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" class=3D"">Hi =
Rob,<div class=3D""><br class=3D""></div><div class=3D"">Thanks for your =
review. &nbsp;Comments below.</div><div class=3D""><br =
class=3D""></div><div class=3D""><br class=3D""><div><br =
class=3D""><blockquote type=3D"cite" class=3D""><div class=3D"">1) =
Abstract:</div><div class=3D""><div class=3D"">I wasn't sure whether the =
abstract is still entirely accurate, given that the document describes =
two strategies rather than one, only one of those strategies is time =
proven ('\'), and only one of those strategies works on *any* text-based =
content ('\\').<br class=3D""></div></div></blockquote><div><br =
class=3D""></div><div>True, how about this (with a similar change in the =
Introduction)?</div><div><br class=3D""></div><div><div>&nbsp; =
&nbsp;This document defines two strategies for handling long lines in<br =
class=3D"">&nbsp; &nbsp;width-bounded text content. &nbsp;One strategy =
is based on the time-proven<br class=3D"">&nbsp; &nbsp;use of a single =
backslash ('\') character to indicate where line-<br class=3D"">&nbsp; =
&nbsp;folding has occurred, with the continuation occurring with the =
first<br class=3D"">&nbsp; &nbsp;non-space (' ') character on the next =
line. &nbsp;The second strategy<br class=3D"">&nbsp; &nbsp;extends the =
first strategy by adding a second backslash character to<br =
class=3D"">&nbsp; &nbsp;identify where the continuation begins and =
thereby able to handle<br class=3D"">&nbsp; &nbsp;cases not supported by =
the first strategy. &nbsp;Both strategies use a<br class=3D"">&nbsp; =
&nbsp;self-describing header enabling automated reconstitution of the<br =
class=3D"">&nbsp; &nbsp;original content.<br class=3D""><br =
class=3D""></div></div><div><br class=3D""></div><div><br =
class=3D""></div><br class=3D""><blockquote type=3D"cite" class=3D""><div =
class=3D""><div class=3D"">2) Section 4. Goals:<br class=3D"">Is one of =
the goals to *exactly* reproduce the input text to the folding =
algorithm? &nbsp;If so, this might be worth explicitly stating (e.g. =
because of the whitespace handling when using the single backslash =
strategy).<br class=3D""></div></div></blockquote><div><br =
class=3D""></div><div>This is what the second goal (4.2.) means by =
"reconstitution of the original text content". &nbsp; The below is =
slightly modified, is it okay?</div><div><br class=3D""></div><div>&nbsp; =
4.2. &nbsp;Automated Reconstitution of the Original Text Content<br =
class=3D""><br class=3D""></div><div>&nbsp; &nbsp; &nbsp;Automated =
reconstitution of the original text content is needed to<br =
class=3D"">&nbsp; &nbsp; &nbsp;support validation of text-based content =
extracted from documents.<br class=3D""><br class=3D"">&nbsp; &nbsp; =
&nbsp;For instance, already YANG [RFC7950] modules are extracted from<br =
class=3D"">&nbsp; &nbsp; &nbsp;Internet-Drafts and validated as part of =
the draft-submission<br class=3D"">&nbsp; &nbsp; &nbsp;process. =
&nbsp;Additionally, the desire to validate instance examples<br =
class=3D"">&nbsp; &nbsp; &nbsp;(i.e., XML/JSON documents) contained =
within Internet-Drafts has<br class=3D"">&nbsp; &nbsp; &nbsp;been =
discussed ([yang-doctors-thread]).<br class=3D""><br =
class=3D""></div><div><br class=3D""></div><br class=3D""><blockquote =
type=3D"cite" class=3D""><div class=3D""><div class=3D"">3) Section =
5.1<br class=3D"">Nit: will work -&gt; works.<br =
class=3D""></div></div></blockquote><div><br =
class=3D""></div>Fixed.</div><div><br class=3D""></div><div><br =
class=3D""><blockquote type=3D"cite" class=3D""><div class=3D""><div =
class=3D"">4) Section 5.2, 4th paragraph about functions.<br =
class=3D"">I'm not sure this paragraph really adds anything to the =
document, so I would suggest removing it. &nbsp;E.g. does this means =
that we should use YANG groupings to avoid line length indentation =
issues, if so, I would question whether that makes the resulting YANG =
model more readable.<br class=3D""></div></div></blockquote><div><br =
class=3D""></div><div>Removed. &nbsp;I agree that the (unfolded) YANG =
module's readability is more important and, besides, these are just =
examples and don't preclude anything.</div><div><br class=3D""></div><br =
class=3D""><blockquote type=3D"cite" class=3D""><div class=3D""><div =
class=3D"">5) Section 5.2, last paragraph.<br class=3D"">I think that =
the RECOMMENDED is perhaps a bit strong, hence I would prefer =
"suggested" or "encouraged" over "RECOMMENDED". &nbsp;I think that =
some/many of the input formats do have ways that the input can be =
modified such that folding isn't required, but I'm not sure that we =
necessarily advocate that should always be done.<br =
class=3D""></div></div></blockquote><div><br =
class=3D""></div><div>Disagree. &nbsp;We do want to advocate authors do =
what they can. &nbsp;It was a SHOULD before, but downgraded to a =
RECOMMENDED to be less overt.</div><div><br class=3D""></div><br =
class=3D""><blockquote type=3D"cite" class=3D""><div class=3D""><div =
class=3D"">6) 7.2.1. '\' folding algorithm:<br class=3D"">It should also =
check if the line contains more than "max line length space" characters =
and if so it cannot be folded using this strategy.<br =
class=3D""></div></div></blockquote><div><br class=3D""></div><div>You're =
correct that this is a problem case, but isn't it covered already by the =
following sentence?</div><div><br class=3D""></div><div>&nbsp; &nbsp;1. =
&nbsp;Determine where the fold will occur. &nbsp;This location MUST =
be<br class=3D"">&nbsp; &nbsp; &nbsp; &nbsp;before or at the desired =
maximum column, and MUST NOT be on top<br class=3D"">&nbsp; &nbsp; =
&nbsp; &nbsp;of a space (' ') character. &nbsp;If no such location can =
be found,<br class=3D"">&nbsp; &nbsp; &nbsp; &nbsp;then exit (this text =
content cannot be folded)<br class=3D""><br class=3D""></div><div><br =
class=3D""></div><br class=3D""><blockquote type=3D"cite" class=3D""><div =
class=3D""><div class=3D"">7) 8.2.1. '\\' folding algorithm, 6th =
paragraph:<br class=3D"">Does this have to abort if it finds a '\' =
character at the end of the line, and start at next? &nbsp;I think that =
this could still be handled by folding again at that same point, which =
when unfolded should go back to the same input again. &nbsp;Of course, =
such a tool might also warn that the input might already be folded =
input. &nbsp;One of the advantages of the '\\' method is that it should =
be able to deterministically work on any input.<br =
class=3D""></div></div></blockquote><div><br class=3D""></div><div>Good =
point, how about this?</div><div><br class=3D""></div><div><div>&nbsp; =
&nbsp;Scan the text content to ensure no existing lines already end with =
a</div><div>&nbsp; &nbsp;backslash ('\') character while the subsequent =
line starts with a</div><div>&nbsp; &nbsp;backslash ('\') character as =
the first non-space (' ') character, as</div><div>&nbsp; &nbsp;this =
could lead to an ambiguous result. &nbsp;If such a line is found, =
and</div><div>&nbsp; &nbsp;its width is less than the desired maximum, =
then it SHOULD be flagged</div><div>&nbsp; &nbsp;for forced folding =
(folding even though unnecessary). &nbsp;If the folding</div><div>&nbsp; =
&nbsp;implementation doesn't support forced foldings, it MUST =
exit.</div><div><br class=3D""></div><div>&nbsp; =
&nbsp;&lt;snip&gt;</div><div><br class=3D""></div><div>&nbsp; &nbsp;For =
each line in the text content, from top-to-bottom, if the =
line</div><div>&nbsp; &nbsp;exceeds the desired maximum, or requires a =
forced folding, then fold</div><div>&nbsp; &nbsp;the line by:</div><div =
class=3D""><br class=3D""></div><div class=3D""><br class=3D""></div><div =
class=3D""><br class=3D""></div></div><blockquote type=3D"cite" =
class=3D""><div class=3D""><div class=3D"">Final comment, and it is =
probably a bit late for this, but rather than having two separate =
schemes, I have one quick idea for merging the two.<br class=3D""><br =
class=3D""></div></div></blockquote>&lt;snip&gt;</div><div><br =
class=3D""></div></div><div>Yes, too late for that kind of change I =
think, at least I'm not interested in investing the time to see if its =
viable.</div><div><br class=3D""></div><div><br class=3D""></div><div>Kent=
 // author</div><div><br class=3D""></div></body></html>=

--Apple-Mail=_A6C48A9A-2A5B-4522-B0AE-1AD748B6312A--


From nobody Tue May 28 09:03:10 2019
Return-Path: <rwilton@cisco.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A3D47120168; Tue, 28 May 2019 09:03:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.499
X-Spam-Level: 
X-Spam-Status: No, score=-14.499 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=NT8yVXyV; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=XbtPts7N
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mFG1NaBJAxbz; Tue, 28 May 2019 09:03:05 -0700 (PDT)
Received: from alln-iport-7.cisco.com (alln-iport-7.cisco.com [173.37.142.94]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 55156120155; Tue, 28 May 2019 09:03:05 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=26067; q=dns/txt; s=iport; t=1559059385; x=1560268985; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=LgAayIxc5Awebgo6eFiXdfEFypK2VG1VfssLTOT01xY=; b=NT8yVXyVaviYxUORb8NY9Phvm4AkRjV0uNn+u/Unm4rxYLu/gR+l3T4W koR4ts9JqMSmH7bXxr/PomfDsLnJ2HU3s2rjzhFirT0MeW1EGO9hxtKdm SfYIGat+yqL191JhTFPUpFj60B+1vojeYsgVZXcnG9w3VBdOidMAsC9yT Y=;
IronPort-PHdr: =?us-ascii?q?9a23=3Af9lXJRLtSXxvcRshKNmcpTVXNCE6p7X5OBIU4Z?= =?us-ascii?q?M7irVIN76u5InmIFeBvad2lFGcW4Ld5roEkOfQv636EU04qZea+DFnEtRXUg?= =?us-ascii?q?Mdz8AfngguGsmAXFfkLfr2aCoSF8VZX1gj9Ha+YgBY?=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0BHAADWWu1c/5ldJa1bChwBAQEEAQE?= =?us-ascii?q?HBAEBgVEHAQELAYEOLyQFJwNpVSAECygKh1ADhFKKK4JXfpYtgS4UgRADVAk?= =?us-ascii?q?BAQEMAQEtAgEBhEACgmMjNAkOAQMBAQQBAQIBBG0cDIVKAQEBAQMSFQYTAQE?= =?us-ascii?q?3AQ8CAQgRBAEBIQ4yHQgCBA4FCBqDAYEdTQMdAQKeXwKBOIhfgW0zgnkBAQW?= =?us-ascii?q?EfRiCDwmBNAGLUheBQD+BEUaCFzU+hBkTGoM6giaLJCABhyqIJYxgYwkCgg2?= =?us-ascii?q?TMIIfhmaNRKJmAgQCBAUCDgEBBYFPOIFXcBWDJ4IPgSUBCIJCilNygSmLFyu?= =?us-ascii?q?BBAGBIAEB?=
X-IronPort-AV: E=Sophos;i="5.60,523,1549929600";  d="scan'208,217";a="276690392"
Received: from rcdn-core-2.cisco.com ([173.37.93.153]) by alln-iport-7.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 28 May 2019 16:03:04 +0000
Received: from xch-rcd-011.cisco.com (xch-rcd-011.cisco.com [173.37.102.21]) by rcdn-core-2.cisco.com (8.15.2/8.15.2) with ESMTPS id x4SG33hA018158 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Tue, 28 May 2019 16:03:04 GMT
Received: from xhs-rtp-002.cisco.com (64.101.210.229) by XCH-RCD-011.cisco.com (173.37.102.21) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Tue, 28 May 2019 11:03:02 -0500
Received: from xhs-aln-001.cisco.com (173.37.135.118) by xhs-rtp-002.cisco.com (64.101.210.229) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Tue, 28 May 2019 12:02:57 -0400
Received: from NAM03-CO1-obe.outbound.protection.outlook.com (173.37.151.57) by xhs-aln-001.cisco.com (173.37.135.118) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Tue, 28 May 2019 11:02:56 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com;  s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=JixwDLCIbjcanNKpxSoEAsQJrFjOENGIDRmZshcljUU=; b=XbtPts7Nfz1T99DOzqvcX97L4EOwUBtZtxuTqsYPHT1RlZzQ/tXC3yn41w8mXeO9xetbegdxwRQnXZ6Zv6pdH0/Iw+TBWkFmPCDAsw1NZiuugSiVMznpIZcKeYlELlEIZMkaWeTFyrdQ6OE5KfIlT803AcVyjthp30MnU2zuV5U=
Received: from BYAPR11MB2631.namprd11.prod.outlook.com (52.135.227.28) by BYAPR11MB3175.namprd11.prod.outlook.com (20.177.127.28) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1922.16; Tue, 28 May 2019 16:02:55 +0000
Received: from BYAPR11MB2631.namprd11.prod.outlook.com ([fe80::d837:c1dd:cdb1:bb78]) by BYAPR11MB2631.namprd11.prod.outlook.com ([fe80::d837:c1dd:cdb1:bb78%7]) with mapi id 15.20.1922.021; Tue, 28 May 2019 16:02:55 +0000
From: "Rob Wilton (rwilton)" <rwilton@cisco.com>
To: Kent Watsen <kent@watsen.net>
CC: "netmod@ietf.org" <netmod@ietf.org>, "draft-ietf-netmod-artwork-folding@ietf.org" <draft-ietf-netmod-artwork-folding@ietf.org>
Thread-Topic: [netmod] WG Last Call: draft-ietf-netmod-artwork-folding-02
Thread-Index: AQHVCQh/oSnqrubDN0ieHZJH/cPGUKaAcPjQgABTS4CAAAF6YA==
Date: Tue, 28 May 2019 16:02:55 +0000
Message-ID: <BYAPR11MB263191E71A0E09CE1667AB45B51E0@BYAPR11MB2631.namprd11.prod.outlook.com>
References: <e6fc4541-891a-60cb-e956-86f238d09f14@labn.net> <BYAPR11MB263112EA231A41491AC4DF89B51E0@BYAPR11MB2631.namprd11.prod.outlook.com> <0100016aff1640f0-a301a70e-ecae-4754-84d1-12170d5b73fd-000000@email.amazonses.com>
In-Reply-To: <0100016aff1640f0-a301a70e-ecae-4754-84d1-12170d5b73fd-000000@email.amazonses.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=rwilton@cisco.com; 
x-originating-ip: [173.38.220.56]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: d17fae40-d948-4a7e-2b78-08d6e385f264
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(2017052603328)(7193020); SRVR:BYAPR11MB3175; 
x-ms-traffictypediagnostic: BYAPR11MB3175:
x-ms-exchange-purlcount: 2
x-microsoft-antispam-prvs: <BYAPR11MB31756622D357142381FB755CB51E0@BYAPR11MB3175.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 00514A2FE6
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(396003)(346002)(39860400002)(136003)(366004)(376002)(199004)(189003)(51444003)(51914003)(7696005)(99286004)(76176011)(54906003)(53546011)(6506007)(102836004)(68736007)(4326008)(14454004)(86362001)(478600001)(81156014)(81166006)(8676002)(6246003)(53936002)(25786009)(74316002)(6916009)(229853002)(8936002)(9326002)(71200400001)(71190400001)(55016002)(52536014)(6306002)(7736002)(54896002)(5660300002)(3846002)(9686003)(6116002)(790700001)(66066001)(64756008)(66946007)(66446008)(2906002)(66556008)(66476007)(73956011)(6436002)(26005)(76116006)(186003)(446003)(11346002)(486006)(476003)(316002)(33656002)(66574012)(14444005)(256004); DIR:OUT; SFP:1101; SCL:1; SRVR:BYAPR11MB3175; H:BYAPR11MB2631.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: QiReeKvgTs26utC8XpqdqNHqyuNxwEVR5/eY67TT7QNHEF/ZW8IwC0ww6zmFKIhXZfo4q+BFpIDIx6lEJ7tslytfVkgjUirBiOeNauvzx2FpzayzUp+P0QJAwZrE29LCs4ahp3mGhzsRDjJT5d3fTjOwZDyVKIAGAxzcDL2FMY1+4mHem6Lm7g8c/+b8ZnXlP02+pjNr/wkU4w0GSM4XrvL2rw6yqjkMxSkeRBtdC+HFLZThkzOBQt4xrv34DlYdLk5nWsypa5CrJGpCIBwTnyYQD7aOEcMa8l1iPOaYN70c19IngAdUDL84fpgA7amQbt98foGcjTMVGmMp39sUVNWwWR4tEeUsD0EptMnfOb4QWz0Jq+Jd6xurorm87KwqLDZMpFcnS4EV6SQesrm3+Djy1e7PWRUvlhVHPUWaYqM=
Content-Type: multipart/alternative; boundary="_000_BYAPR11MB263191E71A0E09CE1667AB45B51E0BYAPR11MB2631namp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: d17fae40-d948-4a7e-2b78-08d6e385f264
X-MS-Exchange-CrossTenant-originalarrivaltime: 28 May 2019 16:02:55.4141 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: rwilton@cisco.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR11MB3175
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.21, xch-rcd-011.cisco.com
X-Outbound-Node: rcdn-core-2.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/cobER5fm4CQW0Ag_rKHCe9uNHWM>
Subject: Re: [netmod] WG Last Call: draft-ietf-netmod-artwork-folding-02
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 28 May 2019 16:03:09 -0000

--_000_BYAPR11MB263191E71A0E09CE1667AB45B51E0BYAPR11MB2631namp_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Hi Kent,

Please see inline ...

From: Kent Watsen <kent@watsen.net>
Sent: 28 May 2019 16:37
To: Rob Wilton (rwilton) <rwilton@cisco.com>
Cc: netmod@ietf.org; draft-ietf-netmod-artwork-folding@ietf.org
Subject: Re: [netmod] WG Last Call: draft-ietf-netmod-artwork-folding-02

Hi Rob,

Thanks for your review.  Comments below.




1) Abstract:
I wasn't sure whether the abstract is still entirely accurate, given that t=
he document describes two strategies rather than one, only one of those str=
ategies is time proven ('\'), and only one of those strategies works on *an=
y* text-based content ('\\').

True, how about this (with a similar change in the Introduction)?

   This document defines two strategies for handling long lines in
   width-bounded text content.  One strategy is based on the time-proven
   use of a single backslash ('\') character to indicate where line-
   folding has occurred, with the continuation occurring with the first
   non-space (' ') character on the next line.  The second strategy
   extends the first strategy by adding a second backslash character to
   identify where the continuation begins and thereby able to handle
   cases not supported by the first strategy.  Both strategies use a
   self-describing header enabling automated reconstitution of the
   original content.

[RW]
Yes, I think that is better, and probably OK.

I still slightly question "One strategy is based on the time-proven use of =
a single backslash ('\') character to indicate where line-folding has occur=
red, with the continuation occurring with the first non-space (' ') charact=
er on the next line."  Because I don't think that is how '\' character work=
s, at least in languages such as C.  Specifically, it doesn't ignore leadin=
g whitespace on the following line, instead it is often used where that whi=
tespace is not significant to the compiler.




2) Section 4. Goals:
Is one of the goals to *exactly* reproduce the input text to the folding al=
gorithm?  If so, this might be worth explicitly stating (e.g. because of th=
e whitespace handling when using the single backslash strategy).

This is what the second goal (4.2.) means by "reconstitution of the origina=
l text content".   The below is slightly modified, is it okay?

  4.2.  Automated Reconstitution of the Original Text Content
     Automated reconstitution of the original text content is needed to
     support validation of text-based content extracted from documents.

     For instance, already YANG [RFC7950] modules are extracted from
     Internet-Drafts and validated as part of the draft-submission
     process.  Additionally, the desire to validate instance examples
     (i.e., XML/JSON documents) contained within Internet-Drafts has
     been discussed ([yang-doctors-thread]).

[RW]
Perhaps "original text content" -> "exact original text content"?  But I'm =
also OK with your suggested text.


3) Section 5.1
Nit: will work -> works.

Fixed.



4) Section 5.2, 4th paragraph about functions.
I'm not sure this paragraph really adds anything to the document, so I woul=
d suggest removing it.  E.g. does this means that we should use YANG groupi=
ngs to avoid line length indentation issues, if so, I would question whethe=
r that makes the resulting YANG model more readable.

Removed.  I agree that the (unfolded) YANG module's readability is more imp=
ortant and, besides, these are just examples and don't preclude anything.



5) Section 5.2, last paragraph.
I think that the RECOMMENDED is perhaps a bit strong, hence I would prefer =
"suggested" or "encouraged" over "RECOMMENDED".  I think that some/many of =
the input formats do have ways that the input can be modified such that fol=
ding isn't required, but I'm not sure that we necessarily advocate that sho=
uld always be done.

Disagree.  We do want to advocate authors do what they can.  It was a SHOUL=
D before, but downgraded to a RECOMMENDED to be less overt.
[RW]
According to RFC2119, RECOMMENDED is interpreted exactly the same way as SH=
OULD.

3. SHOULD   This word, or the adjective "RECOMMENDED", mean that there
   may exist valid reasons in particular circumstances to ignore a
   particular item, but the full implications must be understood and
   carefully weighed before choosing a different course.

I still think that SHOULD/RECOMMENDED is too strong.


6) 7.2.1. '\' folding algorithm:
It should also check if the line contains more than "max line length space"=
 characters and if so it cannot be folded using this strategy.

You're correct that this is a problem case, but isn't it covered already by=
 the following sentence?

   1.  Determine where the fold will occur.  This location MUST be
       before or at the desired maximum column, and MUST NOT be on top
       of a space (' ') character.  If no such location can be found,
       then exit (this text content cannot be folded)
[RW]
Yes, thanks for the clarification.


7) 8.2.1. '\\' folding algorithm, 6th paragraph:
Does this have to abort if it finds a '\' character at the end of the line,=
 and start at next?  I think that this could still be handled by folding ag=
ain at that same point, which when unfolded should go back to the same inpu=
t again.  Of course, such a tool might also warn that the input might alrea=
dy be folded input.  One of the advantages of the '\\' method is that it sh=
ould be able to deterministically work on any input.

Good point, how about this?

   Scan the text content to ensure no existing lines already end with a
   backslash ('\') character while the subsequent line starts with a
   backslash ('\') character as the first non-space (' ') character, as
   this could lead to an ambiguous result.  If such a line is found, and
   its width is less than the desired maximum, then it SHOULD be flagged
   for forced folding (folding even though unnecessary).  If the folding
   implementation doesn't support forced foldings, it MUST exit.

   <snip>

   For each line in the text content, from top-to-bottom, if the line
   exceeds the desired maximum, or requires a forced folding, then fold
   the line by:


[RW]
OK.


Final comment, and it is probably a bit late for this, but rather than havi=
ng two separate schemes, I have one quick idea for merging the two.
<snip>

Yes, too late for that kind of change I think, at least I'm not interested =
in investing the time to see if its viable.
[RW]
OK.

Thanks,
Rob


Kent // author


--_000_BYAPR11MB263191E71A0E09CE1667AB45B51E0BYAPR11MB2631namp_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:#0563C1;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:#954F72;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML Preformatted Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:"Courier New";}
p.msonormal0, li.msonormal0, div.msonormal0
	{mso-style-name:msonormal;
	mso-margin-top-alt:auto;
	margin-right:0cm;
	mso-margin-bottom-alt:auto;
	margin-left:0cm;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
span.EmailStyle20
	{mso-style-type:personal-reply;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-GB" link=3D"#0563C1" vlink=3D"#954F72">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"mso-fareast-language:EN-US">Hi Kent,<=
o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"mso-fareast-language:EN-US"><o:p>&nbs=
p;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"mso-fareast-language:EN-US">Please se=
e inline &#8230;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"mso-fareast-language:EN-US"><o:p>&nbs=
p;</o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt"><b><span lang=3D"EN-US"=
>From:</span></b><span lang=3D"EN-US"> Kent Watsen &lt;kent@watsen.net&gt;
<br>
<b>Sent:</b> 28 May 2019 16:37<br>
<b>To:</b> Rob Wilton (rwilton) &lt;rwilton@cisco.com&gt;<br>
<b>Cc:</b> netmod@ietf.org; draft-ietf-netmod-artwork-folding@ietf.org<br>
<b>Subject:</b> Re: [netmod] WG Last Call: draft-ietf-netmod-artwork-foldin=
g-02<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt">Hi Rob,<o:p></o:p></p>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt">Thanks for your review.=
 &nbsp;Comments below.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt"><br>
<br>
<o:p></o:p></p>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt">1) Abstract:<o:p></o:p>=
</p>
</div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt">I wasn't sure whether t=
he abstract is still entirely accurate, given that the document describes t=
wo strategies rather than one, only one of those strategies is time proven =
('\'), and only one of those strategies
 works on *any* text-based content ('\\').<o:p></o:p></p>
</div>
</div>
</blockquote>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt">True, how about this (w=
ith a similar change in the Introduction)?<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt"><o:p>&nbsp;</o:p></p>
</div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:0cm;margin-right:0cm;mar=
gin-bottom:12.0pt;margin-left:36.0pt">
&nbsp; &nbsp;This document defines two strategies for handling long lines i=
n<br>
&nbsp; &nbsp;width-bounded text content. &nbsp;One strategy is based on the=
 time-proven<br>
&nbsp; &nbsp;use of a single backslash ('\') character to indicate where li=
ne-<br>
&nbsp; &nbsp;folding has occurred, with the continuation occurring with the=
 first<br>
&nbsp; &nbsp;non-space (' ') character on the next line. &nbsp;The second s=
trategy<br>
&nbsp; &nbsp;extends the first strategy by adding a second backslash charac=
ter to<br>
&nbsp; &nbsp;identify where the continuation begins and thereby able to han=
dle<br>
&nbsp; &nbsp;cases not supported by the first strategy. &nbsp;Both strategi=
es use a<br>
&nbsp; &nbsp;self-describing header enabling automated reconstitution of th=
e<br>
&nbsp; &nbsp;original content.<o:p></o:p></p>
</div>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><b><i>[RW] <o:p></o:p></i></b></p>
<p class=3D"MsoNormal">Yes, I think that is better, and probably OK.<o:p></=
o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">I still slightly question &#8220;One strategy is bas=
ed on the time-proven use of a single backslash ('\') character to indicate=
 where line-folding has occurred, with the continuation occurring with the =
first&nbsp;non-space (' ') character on the next
 line.&#8221;&nbsp; Because I don&#8217;t think that is how &#8216;\&#8217;=
 character works, at least in languages such as C.&nbsp; Specifically, it d=
oesn&#8217;t ignore leading whitespace on the following line, instead it is=
 often used where that whitespace is not significant to the compiler.<o:p><=
/o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt"><br>
<br>
<o:p></o:p></p>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<div>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt">2) Section 4. Goals:<br=
>
Is one of the goals to *exactly* reproduce the input text to the folding al=
gorithm? &nbsp;If so, this might be worth explicitly stating (e.g. because =
of the whitespace handling when using the single backslash strategy).<o:p><=
/o:p></p>
</div>
</div>
</blockquote>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt">This is what the second=
 goal (4.2.) means by &quot;reconstitution of the original text content&quo=
t;. &nbsp; The below is slightly modified, is it okay?<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:0cm;margin-right:0cm;mar=
gin-bottom:12.0pt;margin-left:36.0pt">
&nbsp; 4.2. &nbsp;Automated Reconstitution of the Original Text Content<o:p=
></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:0cm;margin-right:0cm;mar=
gin-bottom:12.0pt;margin-left:36.0pt">
&nbsp; &nbsp; &nbsp;Automated reconstitution of the original text content i=
s needed to<br>
&nbsp; &nbsp; &nbsp;support validation of text-based content extracted from=
 documents.<br>
<br>
&nbsp; &nbsp; &nbsp;For instance, already YANG [RFC7950] modules are extrac=
ted from<br>
&nbsp; &nbsp; &nbsp;Internet-Drafts and validated as part of the draft-subm=
ission<br>
&nbsp; &nbsp; &nbsp;process. &nbsp;Additionally, the desire to validate ins=
tance examples<br>
&nbsp; &nbsp; &nbsp;(i.e., XML/JSON documents) contained within Internet-Dr=
afts has<br>
&nbsp; &nbsp; &nbsp;been discussed ([yang-doctors-thread]).<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><b><i>[RW] <o:p></o:p></i></b></p>
<p class=3D"MsoNormal">Perhaps &#8220;original text content&#8221; -&gt; &#=
8220;exact original text content&#8221;?&nbsp; But I&#8217;m also OK with y=
our suggested text.<o:p></o:p></p>
</div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt"><br>
<br>
<o:p></o:p></p>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<div>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt">3) Section 5.1<br>
Nit: will work -&gt; works.<o:p></o:p></p>
</div>
</div>
</blockquote>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt"><o:p>&nbsp;</o:p></p>
</div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt">Fixed.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt"><br>
<br>
<o:p></o:p></p>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<div>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt">4) Section 5.2, 4th par=
agraph about functions.<br>
I'm not sure this paragraph really adds anything to the document, so I woul=
d suggest removing it. &nbsp;E.g. does this means that we should use YANG g=
roupings to avoid line length indentation issues, if so, I would question w=
hether that makes the resulting YANG
 model more readable.<o:p></o:p></p>
</div>
</div>
</blockquote>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt">Removed. &nbsp;I agree =
that the (unfolded) YANG module's readability is more important and, beside=
s, these are just examples and don't preclude anything.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt"><o:p>&nbsp;</o:p></p>
</div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt"><br>
<br>
<o:p></o:p></p>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<div>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt">5) Section 5.2, last pa=
ragraph.<br>
I think that the RECOMMENDED is perhaps a bit strong, hence I would prefer =
&quot;suggested&quot; or &quot;encouraged&quot; over &quot;RECOMMENDED&quot=
;. &nbsp;I think that some/many of the input formats do have ways that the =
input can be modified such that folding isn't required, but I'm not
 sure that we necessarily advocate that should always be done.<o:p></o:p></=
p>
</div>
</div>
</blockquote>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt">Disagree. &nbsp;We do w=
ant to advocate authors do what they can. &nbsp;It was a SHOULD before, but=
 downgraded to a RECOMMENDED to be less overt.<o:p></o:p></p>
<p class=3D"MsoNormal"><b><i>[RW] <o:p></o:p></i></b></p>
<p class=3D"MsoNormal">According to RFC2119, RECOMMENDED is interpreted exa=
ctly the same way as SHOULD.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">3. SHOULD&nbsp;&nbsp; This word, or the adject=
ive &quot;RECOMMENDED&quot;, mean that there<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">&nbsp;&nbsp; may exist valid reasons in partic=
ular circumstances to ignore a<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">&nbsp;&nbsp; particular item, but the full imp=
lications must be understood and<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">&nbsp;&nbsp; carefully weighed before choosing=
 a different course.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">I still think that SHOULD/RECOMMENDED is too strong.=
<o:p></o:p></p>
</div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt"><br>
<br>
<o:p></o:p></p>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<div>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt">6) 7.2.1. '\' folding a=
lgorithm:<br>
It should also check if the line contains more than &quot;max line length s=
pace&quot; characters and if so it cannot be folded using this strategy.<o:=
p></o:p></p>
</div>
</div>
</blockquote>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt">You're correct that thi=
s is a problem case, but isn't it covered already by the following sentence=
?<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:0cm;margin-right:0cm;mar=
gin-bottom:12.0pt;margin-left:36.0pt">
&nbsp; &nbsp;1. &nbsp;Determine where the fold will occur. &nbsp;This locat=
ion MUST be<br>
&nbsp; &nbsp; &nbsp; &nbsp;before or at the desired maximum column, and MUS=
T NOT be on top<br>
&nbsp; &nbsp; &nbsp; &nbsp;of a space (' ') character. &nbsp;If no such loc=
ation can be found,<br>
&nbsp; &nbsp; &nbsp; &nbsp;then exit (this text content cannot be folded)<o=
:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><b><i>[RW] <o:p></o:p></i></b></p>
<p class=3D"MsoNormal">Yes, thanks for the clarification.<o:p></o:p></p>
</div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt"><br>
<br>
<o:p></o:p></p>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<div>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt">7) 8.2.1. '\\' folding =
algorithm, 6th paragraph:<br>
Does this have to abort if it finds a '\' character at the end of the line,=
 and start at next? &nbsp;I think that this could still be handled by foldi=
ng again at that same point, which when unfolded should go back to the same=
 input again. &nbsp;Of course, such a tool
 might also warn that the input might already be folded input. &nbsp;One of=
 the advantages of the '\\' method is that it should be able to determinist=
ically work on any input.<o:p></o:p></p>
</div>
</div>
</blockquote>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt">Good point, how about t=
his?<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt"><o:p>&nbsp;</o:p></p>
</div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt">&nbsp; &nbsp;Scan the t=
ext content to ensure no existing lines already end with a<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt">&nbsp; &nbsp;backslash =
('\') character while the subsequent line starts with a<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt">&nbsp; &nbsp;backslash =
('\') character as the first non-space (' ') character, as<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt">&nbsp; &nbsp;this could=
 lead to an ambiguous result. &nbsp;If such a line is found, and<o:p></o:p>=
</p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt">&nbsp; &nbsp;its width =
is less than the desired maximum, then it SHOULD be flagged<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt">&nbsp; &nbsp;for forced=
 folding (folding even though unnecessary). &nbsp;If the folding<o:p></o:p>=
</p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt">&nbsp; &nbsp;implementa=
tion doesn't support forced foldings, it MUST exit.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt">&nbsp; &nbsp;&lt;snip&g=
t;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt">&nbsp; &nbsp;For each l=
ine in the text content, from top-to-bottom, if the line<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt">&nbsp; &nbsp;exceeds th=
e desired maximum, or requires a forced folding, then fold<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt">&nbsp; &nbsp;the line b=
y:<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><b><i>[RW] <o:p></o:p></i></b></p>
<p class=3D"MsoNormal">OK.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt"><o:p>&nbsp;</o:p></p>
</div>
</div>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:0cm;margin-right:0cm;mar=
gin-bottom:12.0pt;margin-left:36.0pt">
Final comment, and it is probably a bit late for this, but rather than havi=
ng two separate schemes, I have one quick idea for merging the two.<o:p></o=
:p></p>
</div>
</div>
</blockquote>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt">&lt;snip&gt;<o:p></o:p>=
</p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt"><o:p>&nbsp;</o:p></p>
</div>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt">Yes, too late for that =
kind of change I think, at least I'm not interested in investing the time t=
o see if its viable.<o:p></o:p></p>
<p class=3D"MsoNormal"><b><i>[RW] <o:p></o:p></i></b></p>
<p class=3D"MsoNormal">OK.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Thanks,<o:p></o:p></p>
<p class=3D"MsoNormal">Rob<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt">Kent // author<o:p></o:=
p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt"><o:p>&nbsp;</o:p></p>
</div>
</div>
</body>
</html>

--_000_BYAPR11MB263191E71A0E09CE1667AB45B51E0BYAPR11MB2631namp_--


From nobody Tue May 28 09:36:58 2019
Return-Path: <0100016aff4d355e-f638b0c7-02de-481c-9153-f79023bcaa7d-000000@amazonses.watsen.net>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C4234120198; Tue, 28 May 2019 09:36:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.311
X-Spam-Level: 
X-Spam-Status: No, score=-2.311 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.415, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=amazonses.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WakTjSOQQUNx; Tue, 28 May 2019 09:36:53 -0700 (PDT)
Received: from a8-31.smtp-out.amazonses.com (a8-31.smtp-out.amazonses.com [54.240.8.31]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B44D3120127; Tue, 28 May 2019 09:36:52 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=6gbrjpgwjskckoa6a5zn6fwqkn67xbtw; d=amazonses.com; t=1559061411; h=From:Message-Id:Content-Type:Mime-Version:Subject:Date:In-Reply-To:Cc:To:References:Feedback-ID; bh=eHQcVKzIrJs1GVvvBe81U9BCnltCv7Q/YauK47sQHHU=; b=TW8canvu3+GAAa9hjAbq2fSvXatH6kOEsQbOH+9RX6olJaYXJ6EJYdGaicspIopt zHPall5fQ9i0mBapUDz1d0vCpBad2NH9ExaaZKEwoou1nZ7SdwSkNTPqTq88Rk//p1H fJ/u6ighycqttH5DuzEI3ZN55Mnf6zTSJuz7MDf0=
From: Kent Watsen <kent@watsen.net>
Message-ID: <0100016aff4d355e-f638b0c7-02de-481c-9153-f79023bcaa7d-000000@email.amazonses.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_8B066B60-B039-4014-9AB8-4AFC8DD0A688"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
Date: Tue, 28 May 2019 16:36:51 +0000
In-Reply-To: <91E3A1BD737FDF4FA14118387FF6766B2774DA44@lhreml504-mbs>
Cc: Lou Berger <lberger@labn.net>, "netmod@ietf.org" <netmod@ietf.org>, "netmod-chairs@ietf.org" <netmod-chairs@ietf.org>
To: Italo Busi <Italo.Busi@huawei.com>
References: <e6fc4541-891a-60cb-e956-86f238d09f14@labn.net> <91E3A1BD737FDF4FA14118387FF6766B2774C768@lhreml504-mbs> <0100016afa70796c-314cbf69-755f-4ae2-b83a-d53507714c69-000000@email.amazonses.com> <91E3A1BD737FDF4FA14118387FF6766B2774DA44@lhreml504-mbs>
X-Mailer: Apple Mail (2.3445.104.11)
X-SES-Outgoing: 2019.05.28-54.240.8.31
Feedback-ID: 1.us-east-1.DKmIRZFhhsBhtmFMNikgwZUWVrODEw9qVcPhqJEI2DA=:AmazonSES
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/pve87w9B_Di4hxQXfzkZrtc5a7Q>
Subject: Re: [netmod] WG Last Call: draft-ietf-netmod-artwork-folding-02
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 28 May 2019 16:36:56 -0000

--Apple-Mail=_8B066B60-B039-4014-9AB8-4AFC8DD0A688
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

Hi Italo,

Thank you for the text suggestion, I landed on the following text:

   For readability purposes, this script forces the minimally supported
   line length to be eight characters longer than the raw header text
   defined in Section 7.1.1 and Section 8.1.1 so as to ensure that the
   header can be wrapped by a space (' ') character and three equal
   ('=3D') characters on each side of the raw header text.

Kent // author




> On May 28, 2019, at 9:33 AM, Italo Busi <Italo.Busi@huawei.com> wrote:
>=20
> Hi Kent, <>
> =20
> Thanks for your reply
> =20
> For what I am concerned, the clarification you have provided is =
sufficient to me (no need to change the code)
> =20
> You might also consider adding similar text at the beginning of =
Appendix A, if you think this helps. Something along the line:
> =20
> The script forces the desired maximum line length to be a bit longer =
than the raw header text defined in sections 7 and 8, to further ensure =
that the header will always have some '=3D' characters wrapping around =
the header, for readability, in the unlikely scenario that such a =
narrow-width is needed.
> =20
> Italo
> =20
> Italo Busi
> Principal Optical Transport Network Research Engineer
> Huawei Technologies Co., Ltd.
> Tel : +39 345 4721946
> Email : italo.busi@huawei.com <mailto:italo.busi@huawei.com>
> <image003.png>
> =20
> This e-mail and its attachments contain confidential information from =
HUAWEI, which is intended only for the person or entity whose address is =
listed above. Any use of the information contained herein in any way =
(including, but not limited to, total or partial disclosure, =
reproduction, or dissemination) by persons other than the intended =
recipient(s) is prohibited. If you receive this e-mail in error, please =
notify the sender by phone or email immediately and delete it!
> =20
> From: Kent Watsen [mailto:kent@watsen.net <mailto:kent@watsen.net>]=20
> Sent: luned=C3=AC 27 maggio 2019 19:57
> To: Italo Busi <Italo.Busi@huawei.com <mailto:Italo.Busi@huawei.com>>
> Cc: Lou Berger <lberger@labn.net <mailto:lberger@labn.net>>; =
netmod@ietf.org <mailto:netmod@ietf.org>; netmod-chairs@ietf.org =
<mailto:netmod-chairs@ietf.org>
> Subject: Re: [netmod] WG Last Call: =
draft-ietf-netmod-artwork-folding-02
> =20
> =20
> Hi Italo,
> =20
>=20
>=20
> 1) Section 7.2.1 (Folding for Single Backslash Strategy) says:
>=20
>   Ensure that the desired maximum line length is not less than the
>   minimum header, which is 46 characters.  If the desired maximum line
>   length is less than this minimum, exit (this text-based content
>   cannot be folded).
>=20
> However, the first line defined in section 7.1.1 is a "45-character =
string".
> I think that the paragraph be changed as:
>=20
>   Ensure that the desired maximum line length is not less than the
>   minimum header, which is 45 characters.  If the desired maximum line
>   length is less than this minimum, exit (this text-based content
>   cannot be folded).
> =20
> Fixed in my local copy.
> =20
>=20
>=20
> 2) Section 8.2.1 (Folding for Double Backslash Strategy) says:
>=20
>=20
>   Ensure that the desired maximum line length is not less than the
>   minimum header, which is 45 characters.  If the desired maximum line
>   length is less than this minimum, exit (this text-based content
>   cannot be folded).
>=20
> However, the first line defined in section 8.1.1 is a "46-character =
string".
> I think that the paragraph be changed as:
>=20
>   Ensure that the desired maximum line length is not less than the
>   minimum header, which is 46 characters.  If the desired maximum line
>   length is less than this minimum, exit (this text-based content
>   cannot be folded).
> =20
> Fixed in my local copy.
> =20
>=20
>=20
> A question for clarification. Reading the following code in Appendix =
A:
>=20
>     if [[ $strategy -eq 2 ]]; then
>       min_supported=3D`expr ${#hdr_txt_2} + 8`
>     else
>       min_supported=3D`expr ${#hdr_txt_1} + 8`
>     fi
>=20
> It seems to me that the minimum lengths applied by the code in =
Appendix A are be 53 and 54 (instead of 45 and 46 respectively)
>=20
> Is my understanding correct?
> =20
> The script is not conflicting with the draft, as it does ensure that =
the length is not less than the raw header text.  Though, to your point, =
it adds an additional buffer to further ensure that the header will =
always have some '=3D' characters wrapping around the header, for =
readability, in the unlikely scenario that such a narrow-width is =
needed.   I could go either way on this, does anyone else have an =
opinion?
> =20
> =20
>=20
>=20
> Thanks, Italo
> =20
> Kent // author


--Apple-Mail=_8B066B60-B039-4014-9AB8-4AFC8DD0A688
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=utf-8

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Dutf-8"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" class=3D"">Hi =
Italo,<div class=3D""><br class=3D""></div><div class=3D"">Thank you for =
the text suggestion, I landed on the following text:</div><div =
class=3D""><br class=3D""></div><div class=3D""><div class=3D"">&nbsp; =
&nbsp;For readability purposes, this script forces the minimally =
supported</div><div class=3D"">&nbsp; &nbsp;line length to be eight =
characters longer than the raw header text</div><div class=3D"">&nbsp; =
&nbsp;defined in Section 7.1.1 and Section 8.1.1 so as to ensure that =
the</div><div class=3D"">&nbsp; &nbsp;header can be wrapped by a space =
(' ') character and three equal</div><div class=3D"">&nbsp; &nbsp;('=3D') =
characters on each side of the raw header text.</div></div><div =
class=3D""><br class=3D""></div><div class=3D"">Kent // author</div><div =
class=3D""><br class=3D""></div><div class=3D""><br class=3D""></div><div =
class=3D""><br class=3D""><div><br class=3D""><blockquote type=3D"cite" =
class=3D""><div class=3D"">On May 28, 2019, at 9:33 AM, Italo Busi =
&lt;<a href=3D"mailto:Italo.Busi@huawei.com" =
class=3D"">Italo.Busi@huawei.com</a>&gt; wrote:</div><br =
class=3D"Apple-interchange-newline"><div class=3D""><div =
class=3D"WordSection1" style=3D"page: WordSection1; caret-color: rgb(0, =
0, 0); font-family: Helvetica-Light; font-size: 14px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; =
text-decoration: none;"><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 12pt; font-family: &quot;Times New Roman&quot;, serif;" =
class=3D""><a name=3D"_MailEndCompose" class=3D""><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);" class=3D"">Hi Kent,<o:p =
class=3D""></o:p></span></a></div><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 12pt; font-family: &quot;Times New Roman&quot;, =
serif;" class=3D""><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125);" class=3D""><o:p =
class=3D"">&nbsp;</o:p></span></div><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 12pt; font-family: &quot;Times New Roman&quot;, =
serif;" class=3D""><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125);" class=3D"">Thanks for your =
reply<o:p class=3D""></o:p></span></div><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 12pt; font-family: &quot;Times New Roman&quot;, =
serif;" class=3D""><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125);" class=3D""><o:p =
class=3D"">&nbsp;</o:p></span></div><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 12pt; font-family: &quot;Times New Roman&quot;, =
serif;" class=3D""><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125);" class=3D"">For what I am =
concerned, the clarification you have provided is sufficient to me (no =
need to change the code)<o:p class=3D""></o:p></span></div><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: =
&quot;Times New Roman&quot;, serif;" class=3D""><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125);" =
class=3D""><o:p class=3D"">&nbsp;</o:p></span></div><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 12pt; font-family: &quot;Times New =
Roman&quot;, serif;" class=3D""><span style=3D"font-size: 11pt; =
font-family: Calibri, sans-serif; color: rgb(31, 73, 125);" class=3D"">You=
 might also consider adding similar text at the beginning of Appendix A, =
if you think this helps. Something along the line:<o:p =
class=3D""></o:p></span></div><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 12pt; font-family: &quot;Times New Roman&quot;, serif;" =
class=3D""><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125);" class=3D""><o:p =
class=3D"">&nbsp;</o:p></span></div><div style=3D"margin: 0cm 0cm =
0.0001pt 36pt; font-size: 12pt; font-family: &quot;Times New =
Roman&quot;, serif;" class=3D"">The script forces the desired maximum =
line length to be a bit longer than the raw header text defined in =
sections 7 and 8, to further ensure that the header will always have =
some '=3D' characters wrapping around the header, for readability, in =
the unlikely scenario that such a narrow-width is needed.<o:p =
class=3D""></o:p></div><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 12pt; font-family: &quot;Times New Roman&quot;, serif;" =
class=3D""><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125);" class=3D""><o:p =
class=3D"">&nbsp;</o:p></span></div><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 12pt; font-family: &quot;Times New Roman&quot;, =
serif;" class=3D""><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125);" class=3D"">Italo<o:p =
class=3D""></o:p></span></div><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 12pt; font-family: &quot;Times New Roman&quot;, serif;" =
class=3D""><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125);" class=3D""><o:p =
class=3D"">&nbsp;</o:p></span></div><div class=3D""><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 12pt; font-family: &quot;Times New =
Roman&quot;, serif; line-height: 24px;" class=3D""><b class=3D""><span =
style=3D"font-family: &quot;Microsoft YaHei&quot;, sans-serif; color: =
rgb(31, 73, 125);" class=3D"">Italo Busi</span></b><b class=3D""><span =
style=3D"font-family: Calibri, sans-serif; color: rgb(31, 73, 125);" =
class=3D""><o:p class=3D""></o:p></span></b></div><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 12pt; font-family: &quot;Times New =
Roman&quot;, serif;" class=3D""><span style=3D"font-size: 10pt; =
font-family: &quot;Microsoft YaHei&quot;, sans-serif; color: rgb(31, 73, =
125);" =
class=3D"">Principal&nbsp;Optical&nbsp;Transport&nbsp;Network&nbsp;Researc=
h&nbsp;Engineer</span><span style=3D"font-family: Calibri, sans-serif; =
color: rgb(31, 73, 125);" class=3D""><o:p =
class=3D""></o:p></span></div><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 12pt; font-family: &quot;Times New Roman&quot;, serif;" =
class=3D""><span style=3D"font-size: 10pt; font-family: &quot;Microsoft =
YaHei&quot;, sans-serif; color: rgb(31, 73, 125);" =
class=3D"">Huawei&nbsp;Technologies&nbsp;Co.,&nbsp;Ltd.</span><span =
style=3D"font-family: Calibri, sans-serif; color: rgb(31, 73, 125);" =
class=3D""><o:p class=3D""></o:p></span></div><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 12pt; font-family: &quot;Times New Roman&quot;, =
serif;" class=3D""><span style=3D"font-size: 10pt; font-family: =
&quot;Microsoft YaHei&quot;, sans-serif; color: rgb(31, 73, 125);" =
class=3D"">Tel&nbsp;:&nbsp;+39&nbsp;345&nbsp;4721946</span><span =
style=3D"font-family: Calibri, sans-serif; color: rgb(31, 73, 125);" =
class=3D""><o:p class=3D""></o:p></span></div><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 12pt; font-family: &quot;Times New Roman&quot;, =
serif;" class=3D""><span style=3D"font-size: 10pt; font-family: =
&quot;Microsoft YaHei&quot;, sans-serif; color: rgb(31, 73, 125);" =
class=3D"">Email&nbsp;:&nbsp;<a href=3D"mailto:italo.busi@huawei.com" =
style=3D"color: rgb(149, 79, 114); text-decoration: underline;" =
class=3D"">italo.busi@huawei.com</a></span><span style=3D"font-size: =
10pt; font-family: &quot;Microsoft YaHei&quot;, sans-serif; color: =
rgb(31, 73, 125);" class=3D""><o:p class=3D""></o:p></span></div><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: =
&quot;Times New Roman&quot;, serif;" class=3D""><span =
style=3D"font-family: Calibri, sans-serif; color: rgb(31, 73, 125);" =
class=3D""><span =
id=3D"cid:image003.png@01D5156A.B2C94830">&lt;image003.png&gt;</span></spa=
n><span style=3D"font-size: 7.5pt; font-family: Arial, sans-serif; =
color: rgb(191, 191, 191);" class=3D""><o:p =
class=3D""></o:p></span></div><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 12pt; font-family: &quot;Times New Roman&quot;, serif;" =
class=3D""><span style=3D"font-size: 7.5pt; font-family: Arial, =
sans-serif; color: rgb(191, 191, 191);" class=3D""><o:p =
class=3D"">&nbsp;</o:p></span></div><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 12pt; font-family: &quot;Times New Roman&quot;, =
serif;" class=3D""><span style=3D"font-size: 7.5pt; font-family: Arial, =
sans-serif; color: rgb(191, 191, 191);" class=3D"">This e-mail and its =
attachments contain confidential information from HUAWEI, which is =
intended only for the person or entity whose address is listed above. =
Any use of the information contained herein in any way (including, but =
not limited to, total or partial disclosure, reproduction, or =
dissemination) by persons other than the intended recipient(s) is =
prohibited. If you receive this e-mail in error, please notify the =
sender by phone or email immediately and delete it!</span><span =
style=3D"font-family: Calibri, sans-serif; color: rgb(31, 73, 125);" =
class=3D""><o:p class=3D""></o:p></span></div></div><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 12pt; font-family: &quot;Times New =
Roman&quot;, serif;" class=3D""><span style=3D"font-size: 11pt; =
font-family: Calibri, sans-serif; color: rgb(31, 73, 125);" =
class=3D""><o:p class=3D"">&nbsp;</o:p></span></div><div class=3D""><div =
style=3D"border-style: solid none none; border-top-width: 1pt; =
border-top-color: rgb(225, 225, 225); padding: 3pt 0cm 0cm;" =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; =
font-family: &quot;Times New Roman&quot;, serif;" class=3D""><b =
class=3D""><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;" class=3D"">From:</span></b><span style=3D"font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D""><span =
class=3D"Apple-converted-space">&nbsp;</span>Kent Watsen [<a =
href=3D"mailto:kent@watsen.net" style=3D"color: rgb(149, 79, 114); =
text-decoration: underline;" class=3D"">mailto:kent@watsen.net</a>]<span =
class=3D"Apple-converted-space">&nbsp;</span><br class=3D""><b =
class=3D"">Sent:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>luned=C3=AC 27 maggio 2019 =
19:57<br class=3D""><b class=3D"">To:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Italo Busi &lt;<a =
href=3D"mailto:Italo.Busi@huawei.com" style=3D"color: rgb(149, 79, 114); =
text-decoration: underline;" class=3D"">Italo.Busi@huawei.com</a>&gt;<br =
class=3D""><b class=3D"">Cc:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Lou Berger &lt;<a =
href=3D"mailto:lberger@labn.net" style=3D"color: rgb(149, 79, 114); =
text-decoration: underline;" class=3D"">lberger@labn.net</a>&gt;;<span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:netmod@ietf.org" style=3D"color: rgb(149, 79, 114); =
text-decoration: underline;" class=3D"">netmod@ietf.org</a>;<span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:netmod-chairs@ietf.org" style=3D"color: rgb(149, 79, =
114); text-decoration: underline;" =
class=3D"">netmod-chairs@ietf.org</a><br class=3D""><b =
class=3D"">Subject:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Re: [netmod] WG Last Call: =
draft-ietf-netmod-artwork-folding-02<o:p =
class=3D""></o:p></span></div></div></div><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 12pt; font-family: &quot;Times New Roman&quot;, =
serif;" class=3D""><o:p class=3D"">&nbsp;</o:p></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: =
&quot;Times New Roman&quot;, serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></div></div><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 12pt; font-family: &quot;Times New Roman&quot;, =
serif;" class=3D"">Hi Italo,<o:p class=3D""></o:p></div><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; =
font-family: &quot;Times New Roman&quot;, serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 12pt; font-family: &quot;Times New Roman&quot;, =
serif;" class=3D""><br class=3D""><br class=3D""><o:p =
class=3D""></o:p></div><blockquote style=3D"margin-top: 5pt; =
margin-bottom: 5pt;" class=3D""><div class=3D""><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: =
&quot;Times New Roman&quot;, serif;" class=3D"">1) Section 7.2.1 =
(Folding for Single Backslash Strategy) says:<br class=3D""><br =
class=3D"">&nbsp;&nbsp;Ensure that the desired maximum line length is =
not less than the<br class=3D"">&nbsp;&nbsp;minimum header, which is 46 =
characters. &nbsp;If the desired maximum line<br =
class=3D"">&nbsp;&nbsp;length is less than this minimum, exit (this =
text-based content<br class=3D"">&nbsp;&nbsp;cannot be folded).<br =
class=3D""><br class=3D"">However, the first line defined in section =
7.1.1 is a "45-character string".<br class=3D"">I think that the =
paragraph be changed as:<br class=3D""><br class=3D"">&nbsp;&nbsp;Ensure =
that the desired maximum line length is not less than the<br =
class=3D"">&nbsp;&nbsp;minimum header, which is 45 characters. &nbsp;If =
the desired maximum line<br class=3D"">&nbsp;&nbsp;length is less than =
this minimum, exit (this text-based content<br =
class=3D"">&nbsp;&nbsp;cannot be folded).<o:p =
class=3D""></o:p></div></div></div></blockquote><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: =
&quot;Times New Roman&quot;, serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></div></div><div class=3D""><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 12pt; font-family: &quot;Times New =
Roman&quot;, serif;" class=3D"">Fixed in my local copy.<o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 12pt; font-family: &quot;Times New Roman&quot;, =
serif;" class=3D""><o:p class=3D"">&nbsp;</o:p></div></div><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: =
&quot;Times New Roman&quot;, serif;" class=3D""><br class=3D""><br =
class=3D""><o:p class=3D""></o:p></div><blockquote style=3D"margin-top: =
5pt; margin-bottom: 5pt;" class=3D""><div class=3D""><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: =
&quot;Times New Roman&quot;, serif;" class=3D"">2) Section 8.2.1 =
(Folding for Double Backslash Strategy) says:<br class=3D""><br =
class=3D""><br class=3D"">&nbsp;&nbsp;Ensure that the desired maximum =
line length is not less than the<br class=3D"">&nbsp;&nbsp;minimum =
header, which is 45 characters. &nbsp;If the desired maximum line<br =
class=3D"">&nbsp;&nbsp;length is less than this minimum, exit (this =
text-based content<br class=3D"">&nbsp;&nbsp;cannot be folded).<br =
class=3D""><br class=3D"">However, the first line defined in section =
8.1.1 is a "46-character string".<br class=3D"">I think that the =
paragraph be changed as:<br class=3D""><br class=3D"">&nbsp;&nbsp;Ensure =
that the desired maximum line length is not less than the<br =
class=3D"">&nbsp;&nbsp;minimum header, which is 46 characters. &nbsp;If =
the desired maximum line<br class=3D"">&nbsp;&nbsp;length is less than =
this minimum, exit (this text-based content<br =
class=3D"">&nbsp;&nbsp;cannot be folded).<o:p =
class=3D""></o:p></div></div></div></blockquote><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: =
&quot;Times New Roman&quot;, serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></div></div><div class=3D""><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: =
&quot;Times New Roman&quot;, serif;" class=3D"">Fixed in my local =
copy.<o:p class=3D""></o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: =
&quot;Times New Roman&quot;, serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></div></div></div><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 12pt; font-family: &quot;Times New Roman&quot;, =
serif;" class=3D""><br class=3D""><br class=3D""><o:p =
class=3D""></o:p></div><blockquote style=3D"margin-top: 5pt; =
margin-bottom: 5pt;" class=3D""><div class=3D""><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: =
&quot;Times New Roman&quot;, serif;" class=3D"">A question for =
clarification. Reading the following code in Appendix A:<br class=3D""><br=
 class=3D"">&nbsp;&nbsp;&nbsp;&nbsp;if [[ $strategy -eq 2 ]]; then<br =
class=3D"">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;min_supported=3D`expr =
${#hdr_txt_2} + 8`<br class=3D"">&nbsp;&nbsp;&nbsp;&nbsp;else<br =
class=3D"">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;min_supported=3D`expr =
${#hdr_txt_1} + 8`<br class=3D"">&nbsp;&nbsp;&nbsp;&nbsp;fi<br =
class=3D""><br class=3D"">It seems to me that the minimum lengths =
applied by the code in Appendix A are be 53 and 54 (instead of 45 and 46 =
respectively)<br class=3D""><br class=3D"">Is my understanding =
correct?<o:p class=3D""></o:p></div></div></div></blockquote><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; =
font-family: &quot;Times New Roman&quot;, serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></div></div><div class=3D""><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 12pt; font-family: &quot;Times New =
Roman&quot;, serif;" class=3D"">The script is not conflicting with the =
draft, as it does ensure that the length is not less than the raw header =
text. &nbsp;Though, to your point, it adds an additional buffer to =
further ensure that the header will always have some '=3D' characters =
wrapping around the header, for readability, in the unlikely scenario =
that such a narrow-width is needed. &nbsp; I could go either way on =
this, does anyone else have an opinion?<o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 12pt; font-family: &quot;Times New Roman&quot;, =
serif;" class=3D""><o:p class=3D"">&nbsp;</o:p></div></div><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; =
font-family: &quot;Times New Roman&quot;, serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></div></div><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 12pt; font-family: &quot;Times New Roman&quot;, =
serif;" class=3D""><br class=3D""><br class=3D""><o:p =
class=3D""></o:p></div><blockquote style=3D"margin-top: 5pt; =
margin-bottom: 5pt;" class=3D""><div class=3D""><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: =
&quot;Times New Roman&quot;, serif;" class=3D"">Thanks, Italo<o:p =
class=3D""></o:p></div></div></div></blockquote></div><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: =
&quot;Times New Roman&quot;, serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></div></div><div class=3D""><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 12pt; font-family: &quot;Times New =
Roman&quot;, serif;" class=3D"">Kent // =
author</div></div></div></div></blockquote></div><br =
class=3D""></div></body></html>=

--Apple-Mail=_8B066B60-B039-4014-9AB8-4AFC8DD0A688--


From nobody Tue May 28 09:53:13 2019
Return-Path: <0100016aff5c1a19-32fa804b-b9d4-4411-a350-0a5571256e10-000000@amazonses.watsen.net>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C4861120198; Tue, 28 May 2019 09:53:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level: 
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=amazonses.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cHU_pBQP6g-d; Tue, 28 May 2019 09:53:08 -0700 (PDT)
Received: from a8-64.smtp-out.amazonses.com (a8-64.smtp-out.amazonses.com [54.240.8.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9220E120167; Tue, 28 May 2019 09:53:08 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=6gbrjpgwjskckoa6a5zn6fwqkn67xbtw; d=amazonses.com; t=1559062387; h=From:Message-Id:Content-Type:Mime-Version:Subject:Date:In-Reply-To:Cc:To:References:Feedback-ID; bh=GR8gAPMYwfn/4q14b7OkVkmuPSE43LtWkn+7dHchDjk=; b=XTlPd0c5yS2NgMWjO/t+1ep3GSvbSMtC0/Yq3t2OfqGFQJaXBNZxaC4l2tze0RRJ KgG3h3Z0ZTjRvhCM6Mh5YWc4TjRYHloRxJRy27qqiGsD2QUDjNqd7sPxHY/exOl1Lik dOcwHZmtNY6WUcY/pqYwAebgj7ToMSkLQhwlQ0tA=
From: Kent Watsen <kent@watsen.net>
Message-ID: <0100016aff5c1a19-32fa804b-b9d4-4411-a350-0a5571256e10-000000@email.amazonses.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_2AFD125B-9A20-44BE-B55C-940090CA244F"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
Date: Tue, 28 May 2019 16:53:07 +0000
In-Reply-To: <BYAPR11MB263191E71A0E09CE1667AB45B51E0@BYAPR11MB2631.namprd11.prod.outlook.com>
Cc: "netmod@ietf.org" <netmod@ietf.org>, "draft-ietf-netmod-artwork-folding@ietf.org" <draft-ietf-netmod-artwork-folding@ietf.org>
To: "Rob Wilton (rwilton)" <rwilton@cisco.com>
References: <e6fc4541-891a-60cb-e956-86f238d09f14@labn.net> <BYAPR11MB263112EA231A41491AC4DF89B51E0@BYAPR11MB2631.namprd11.prod.outlook.com> <0100016aff1640f0-a301a70e-ecae-4754-84d1-12170d5b73fd-000000@email.amazonses.com> <BYAPR11MB263191E71A0E09CE1667AB45B51E0@BYAPR11MB2631.namprd11.prod.outlook.com>
X-Mailer: Apple Mail (2.3445.104.11)
X-SES-Outgoing: 2019.05.28-54.240.8.64
Feedback-ID: 1.us-east-1.DKmIRZFhhsBhtmFMNikgwZUWVrODEw9qVcPhqJEI2DA=:AmazonSES
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/5p4ANBWj7pBTo2hK3jw1jRboEVk>
Subject: Re: [netmod] WG Last Call: draft-ietf-netmod-artwork-folding-02
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 28 May 2019 16:53:11 -0000

--Apple-Mail=_2AFD125B-9A20-44BE-B55C-940090CA244F
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8



> [RW]=20
> Yes, I think that is better, and probably OK.
> =20
> I still slightly question =E2=80=9COne strategy is based on the =
time-proven use of a single backslash ('\') character to indicate where =
line-folding has occurred, with the continuation occurring with the =
first non-space (' ') character on the next line.=E2=80=9D  Because I =
don=E2=80=99t think that is how =E2=80=98\=E2=80=99 character works, at =
least in languages such as C.  Specifically, it doesn=E2=80=99t ignore =
leading whitespace on the following line, instead it is often used where =
that whitespace is not significant to the compiler.

Would s/time-proven/POSIX/ be better?

BTW, I also added this to Appendix A:

   Shell-level end-of-line backslash ('\') characters have been
   purposely added to the script so as to ensure that the script is
   itself not folded in this document, thus simplify the ability to
   copy/paste the script for local use.  As should be evident by the
   lack of the mandatory header described in Section 7.1.1, these
   backslashes do not designate a folded line, such as described in
   Section 7.




> [RW]=20
> Perhaps =E2=80=9Coriginal text content=E2=80=9D -> =E2=80=9Cexact =
original text content=E2=80=9D?  But I=E2=80=99m also OK with your =
suggested text.

I'm hesitant, because it seems redundant, but it doesn't cause harm, so =
I added it.



> [RW]=20
> According to RFC2119, RECOMMENDED is interpreted exactly the same way =
as SHOULD.

Yes, when composing my response before I was going to say that it's a =
downgrade "(in IMO)", but figured it would require more explanation, =
which I was hoping to avoid.  But here we are now  ;)   While I'm aware =
that they carry the same RFC 2119 weight, RECOMMENDED reads softer to =
me, less commanding, hence my comment.



>  I still think that SHOULD/RECOMMENDED is too strong.

I still disagree.    Any tie-breakers out there?



> Good point, how about this?
> =20
>    Scan the text content to ensure no existing lines already end with =
a
>    backslash ('\') character while the subsequent line starts with a
>    backslash ('\') character as the first non-space (' ') character, =
as
>    this could lead to an ambiguous result.  If such a line is found, =
and
>    its width is less than the desired maximum, then it SHOULD be =
flagged
>    for forced folding (folding even though unnecessary).  If the =
folding
>    implementation doesn't support forced foldings, it MUST exit.
> =20
>    <snip>
> =20
>    For each line in the text content, from top-to-bottom, if the line
>    exceeds the desired maximum, or requires a forced folding, then =
fold
>    the line by:
> =20
> =20
> [RW]=20
> OK.

Great.  BTW, I also added this to Appendix A:

   This script does not implement the "forced folding" logic described
   in Section 8.2.1.  In such cases the script will exit with the
   message:

         Error: infile has a line ending with a '\\' character
         followed by a '\\' character as the first non-space
         character on the next line.  This file cannot be folded.




Kent // author





--Apple-Mail=_2AFD125B-9A20-44BE-B55C-940090CA244F
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=utf-8

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Dutf-8"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" class=3D""><br =
class=3D""><div><br class=3D""><blockquote type=3D"cite" class=3D""><div =
class=3D""><b class=3D"" style=3D"font-family: Calibri, sans-serif; =
font-size: 11pt; caret-color: rgb(0, 0, 0);"><i =
class=3D"">[RW]&nbsp;</i></b></div><div class=3D""><div =
class=3D"WordSection1" style=3D"page: WordSection1; caret-color: rgb(0, =
0, 0); font-family: Helvetica-Light; font-size: 14px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; =
text-decoration: none;"><div class=3D""><div class=3D""><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D"">Yes, I think that is =
better, and probably OK.<o:p class=3D""></o:p></div><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><o:p class=3D"">&nbsp;</o:p></div><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">I still slightly question =E2=80=9COne strategy is based on =
the time-proven use of a single backslash ('\') character to indicate =
where line-folding has occurred, with the continuation occurring with =
the first&nbsp;non-space (' ') character on the next line.=E2=80=9D&nbsp; =
Because I don=E2=80=99t think that is how =E2=80=98\=E2=80=99 character =
works, at least in languages such as C.&nbsp; Specifically, it doesn=E2=80=
=99t ignore leading whitespace on the following line, instead it is =
often used where that whitespace is not significant to the =
compiler.</div></div></div></div></div></div></blockquote><div><br =
class=3D""></div><div>Would s/time-proven/POSIX/ be =
better?</div><div><br class=3D""></div><div>BTW, I also added this to =
Appendix A:</div><div><br class=3D""></div><div><div>&nbsp; =
&nbsp;Shell-level end-of-line backslash ('\') characters have =
been</div><div>&nbsp; &nbsp;purposely added to the script so as to =
ensure that the script is</div><div>&nbsp; &nbsp;itself not folded in =
this document, thus simplify the ability to</div><div>&nbsp; =
&nbsp;copy/paste the script for local use. &nbsp;As should be evident by =
the</div><div>&nbsp; &nbsp;lack of the mandatory header described in =
Section 7.1.1, these</div><div>&nbsp; &nbsp;backslashes do not designate =
a folded line, such as described in</div><div>&nbsp; &nbsp;Section =
7.</div><div class=3D""><br class=3D""></div></div><div><br =
class=3D""></div><div><br class=3D""></div><br class=3D""><blockquote =
type=3D"cite" class=3D""><div class=3D"WordSection1" style=3D"page: =
WordSection1; caret-color: rgb(0, 0, 0); font-family: Helvetica-Light; =
font-size: 14px; font-style: normal; font-variant-caps: normal; =
font-weight: normal; letter-spacing: normal; text-align: start; =
text-indent: 0px; text-transform: none; white-space: normal; =
word-spacing: 0px; -webkit-text-stroke-width: 0px; text-decoration: =
none;"><div class=3D""><div class=3D""><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><o:p class=3D""></o:p></div><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><b class=3D"" style=3D"font-size: =
11pt;"><i class=3D"">[RW]&nbsp;</i></b></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D"">Perhaps =E2=80=9Coriginal text =
content=E2=80=9D -&gt; =E2=80=9Cexact original text content=E2=80=9D?&nbsp=
; But I=E2=80=99m also OK with your suggested =
text.</div></div></div></div></div></blockquote><div><br =
class=3D""></div><div>I'm hesitant, because it seems redundant, but it =
doesn't cause harm, so I added it.</div><div><br class=3D""></div><div><br=
 class=3D""></div><div><br class=3D""></div><blockquote type=3D"cite" =
class=3D""><div class=3D"WordSection1" style=3D"page: WordSection1; =
caret-color: rgb(0, 0, 0); font-family: Helvetica-Light; font-size: =
14px; font-style: normal; font-variant-caps: normal; font-weight: =
normal; letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; text-decoration: none;"><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt 36pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><b =
class=3D"" style=3D"font-size: 11pt;"><i =
class=3D"">[RW]&nbsp;</i></b></div></div><div class=3D""><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D"">According to RFC2119, =
RECOMMENDED is interpreted exactly the same way as SHOULD.<o:p =
class=3D""></o:p></div><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""></div></div></div></div></div></blockquote><div><br =
class=3D""></div>Yes, when composing my response before I was going to =
say that it's a downgrade "(in IMO)", but figured it would require more =
explanation, which I was hoping to avoid. &nbsp;But here we are now =
&nbsp;;) &nbsp; While I'm aware that they carry the same RFC 2119 =
weight, RECOMMENDED reads softer to me, less commanding, hence my =
comment.</div><div><br class=3D""></div><div><br class=3D""></div><div><br=
 class=3D""><blockquote type=3D"cite" class=3D""><div =
class=3D"WordSection1" style=3D"page: WordSection1; caret-color: rgb(0, =
0, 0); font-family: Helvetica-Light; font-size: 14px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; =
text-decoration: none;"><div class=3D""><div class=3D""><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p><span style=3D"font-size: 11pt;" class=3D"">I =
still think that SHOULD/RECOMMENDED is too =
strong.</span></div></div></div></div></div></blockquote><div><br =
class=3D""></div><div>I still disagree. &nbsp; &nbsp;Any tie-breakers =
out there?</div><div><br class=3D""></div><div><br class=3D""></div><br =
class=3D""><blockquote type=3D"cite" class=3D""><div =
class=3D"WordSection1" style=3D"page: WordSection1; caret-color: rgb(0, =
0, 0); font-family: Helvetica-Light; font-size: 14px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; =
text-decoration: none;"><div class=3D""><div class=3D""><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D""><o:p =
class=3D""></o:p></div></div><div style=3D"margin: 0cm 0cm 0.0001pt =
36pt; font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><span=
 style=3D"font-size: 11pt;" class=3D"">Good point, how about =
this?</span></div><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt =
36pt; font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt 36pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><o:p class=3D"">&nbsp;</o:p></div></div><div class=3D""><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt 36pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D"">&nbsp; &nbsp;Scan the text =
content to ensure no existing lines already end with a<o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt 36pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">&nbsp; &nbsp;backslash ('\') character while the subsequent =
line starts with a<o:p class=3D""></o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt 36pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D"">&nbsp; &nbsp;backslash ('\') character =
as the first non-space (' ') character, as<o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt 36pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">&nbsp; &nbsp;this could lead to an ambiguous result. &nbsp;If =
such a line is found, and<o:p class=3D""></o:p></div></div><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt 36pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D"">&nbsp; &nbsp;its width is =
less than the desired maximum, then it SHOULD be flagged<o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt 36pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">&nbsp; &nbsp;for forced folding (folding even though =
unnecessary). &nbsp;If the folding<o:p class=3D""></o:p></div></div><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt 36pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D"">&nbsp; =
&nbsp;implementation doesn't support forced foldings, it MUST exit.<o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt 36pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><o:p class=3D"">&nbsp;</o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt 36pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D"">&nbsp; &nbsp;&lt;snip&gt;<o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt 36pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><o:p class=3D"">&nbsp;</o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt 36pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D"">&nbsp; &nbsp;For each line in the text =
content, from top-to-bottom, if the line<o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt 36pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">&nbsp; &nbsp;exceeds the desired maximum, or requires a =
forced folding, then fold<o:p class=3D""></o:p></div></div><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt 36pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D"">&nbsp; &nbsp;the line =
by:<o:p class=3D""></o:p></div></div><div class=3D""><div style=3D"margin:=
 0cm 0cm 0.0001pt 36pt; font-size: 11pt; font-family: Calibri, =
sans-serif;" class=3D""><o:p class=3D"">&nbsp;</o:p></div></div><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt 36pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></div><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><b =
class=3D""><i class=3D"">[RW]<span =
class=3D"Apple-converted-space">&nbsp;</span><o:p =
class=3D""></o:p></i></b></div><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">OK.</div></div></div></div></div></div></blockquote><div><br =
class=3D""></div><div>Great. &nbsp;BTW, I also added this to Appendix =
A:</div><div><br class=3D""></div><div><div>&nbsp; &nbsp;This script =
does not implement the "forced folding" logic described</div><div>&nbsp; =
&nbsp;in Section 8.2.1. &nbsp;In such cases the script will exit with =
the</div><div>&nbsp; &nbsp;message:</div><div><br =
class=3D""></div><div>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Error: infile =
has a line ending with a '\\' character</div><div>&nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp;followed by a '\\' character as the first =
non-space</div><div>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;character on the =
next line. &nbsp;This file cannot be folded.</div><div class=3D""><br =
class=3D""></div></div><div><br class=3D""></div><div><br =
class=3D""></div><div><br class=3D""></div><blockquote type=3D"cite" =
class=3D""><div class=3D"WordSection1" style=3D"page: WordSection1; =
caret-color: rgb(0, 0, 0); font-family: Helvetica-Light; font-size: =
14px; font-style: normal; font-variant-caps: normal; font-weight: =
normal; letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; text-decoration: none;"><div =
class=3D""><div class=3D""><div class=3D""><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><o:p =
class=3D""></o:p></div></div></div></div></div></div></blockquote></div><f=
ont face=3D"Calibri, sans-serif" class=3D""><span style=3D"font-size: =
14.666666984558105px;" class=3D"">Kent // author</span></font><div =
class=3D""><font face=3D"Calibri, sans-serif" class=3D""><span =
style=3D"font-size: 14.666666984558105px;" class=3D""><br =
class=3D""></span></font></div><div class=3D""><font face=3D"Calibri, =
sans-serif" class=3D""><span style=3D"font-size: 14.666666984558105px;" =
class=3D""><br class=3D""></span></font></div><div class=3D""><font =
face=3D"Calibri, sans-serif" class=3D""><span style=3D"font-size: =
14.666666984558105px;" class=3D""><br class=3D""></span></font></div><div =
class=3D""><font face=3D"Calibri, sans-serif" class=3D""><span =
style=3D"font-size: 14.666666984558105px;" class=3D""><br =
class=3D""></span></font></div></body></html>=

--Apple-Mail=_2AFD125B-9A20-44BE-B55C-940090CA244F--


From nobody Tue May 28 10:31:48 2019
Return-Path: <rwilton@cisco.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B755D120198; Tue, 28 May 2019 10:31:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.499
X-Spam-Level: 
X-Spam-Status: No, score=-14.499 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=E3yLM51z; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=BiCBW57o
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fiSGI8iuqvIc; Tue, 28 May 2019 10:31:44 -0700 (PDT)
Received: from rcdn-iport-1.cisco.com (rcdn-iport-1.cisco.com [173.37.86.72]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 16F22120048; Tue, 28 May 2019 10:31:43 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=27198; q=dns/txt; s=iport; t=1559064704; x=1560274304; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=lHXnxajclDC/Vv5PoUIZj3yS7giq/XJHipVORw4WZws=; b=E3yLM51zU6wHHOaV/BiY2FDu86ovKD6M118fk4PqfBxRp6pr90X+g2In Zy7fMtZDMxr4m8dF7VlMP08gubPzo86PXjZNaOJW02uXkuKy+OqoMzQ1S ds/gc9Chk+Qh7Q6yBj27w28o7GdGxtN8u8LJoP4lEb0RINLQveQFgowIZ M=;
IronPort-PHdr: =?us-ascii?q?9a23=3A8QHojR9GQCRWTf9uRHGN82YQeigqvan1NQcJ65?= =?us-ascii?q?0hzqhDabmn44+8ZB7E/fs4iljPUM2b8P9Ch+fM+4HYEW0bqdfk0jgZdYBUER?= =?us-ascii?q?oMiMEYhQslVdSaCEnnK/jCZC0hF8MEX1hgrDm2?=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0BxAAASb+1c/5FdJa1lHAEBAQQBAQc?= =?us-ascii?q?EAQGBUgYBAQsBgQ4vUANpVSAECygKhAmDRwOOfYJXlyuBLoEkA1QJAQEBDAE?= =?us-ascii?q?BLQIBAYRAAheCTCM1CA4BAwEBBAEBAgEEbRwMhUoBAQEBAxIRBAYTAQE3AQ8?= =?us-ascii?q?CAQYCEQQBASEKAgICMB0IAgQOBQgagwGBHU0DHQECjgOQYAKBOIhfcXwzgnk?= =?us-ascii?q?BAQWEfxiCDwmBNAGLUheBQD+BEUaBTn4+hEaDCDKCJoskIYJHhGOIJYxaaQk?= =?us-ascii?q?Cgg2TMJZJomYCBAIEBQIOAQEFgVEBNYFXcBWDJ4IPg3CKU3KBKYxGAYEgAQE?=
X-IronPort-AV: E=Sophos;i="5.60,523,1549929600";  d="scan'208,217";a="564332119"
Received: from rcdn-core-9.cisco.com ([173.37.93.145]) by rcdn-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 28 May 2019 17:31:38 +0000
Received: from XCH-ALN-007.cisco.com (xch-aln-007.cisco.com [173.36.7.17]) by rcdn-core-9.cisco.com (8.15.2/8.15.2) with ESMTPS id x4SHVcRd013363 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Tue, 28 May 2019 17:31:38 GMT
Received: from xhs-rcd-002.cisco.com (173.37.227.247) by XCH-ALN-007.cisco.com (173.36.7.17) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Tue, 28 May 2019 12:31:37 -0500
Received: from xhs-rcd-002.cisco.com (173.37.227.247) by xhs-rcd-002.cisco.com (173.37.227.247) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Tue, 28 May 2019 12:31:37 -0500
Received: from NAM03-DM3-obe.outbound.protection.outlook.com (72.163.14.9) by xhs-rcd-002.cisco.com (173.37.227.247) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Tue, 28 May 2019 12:31:37 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com;  s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=lHXnxajclDC/Vv5PoUIZj3yS7giq/XJHipVORw4WZws=; b=BiCBW57ok3i5AnRzMvt0GzBvSWB0K7fG2as+1VqJ3vF3K3Rn4P3qESNSidJ+B+o7MN6s364Z9fOPlZ81Vtw1RzgjWBKCb/NXlTf6uP7n9MBDrvuuMAk71YHCbnqHPN63m4D8lIfnkDRlstv4jwKWbbvJmcw3ouOvhW5vOc3rHpA=
Received: from BYAPR11MB2631.namprd11.prod.outlook.com (52.135.227.28) by BYAPR11MB2934.namprd11.prod.outlook.com (20.177.228.19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1922.18; Tue, 28 May 2019 17:31:35 +0000
Received: from BYAPR11MB2631.namprd11.prod.outlook.com ([fe80::d837:c1dd:cdb1:bb78]) by BYAPR11MB2631.namprd11.prod.outlook.com ([fe80::d837:c1dd:cdb1:bb78%7]) with mapi id 15.20.1922.021; Tue, 28 May 2019 17:31:35 +0000
From: "Rob Wilton (rwilton)" <rwilton@cisco.com>
To: Kent Watsen <kent@watsen.net>
CC: "netmod@ietf.org" <netmod@ietf.org>, "draft-ietf-netmod-artwork-folding@ietf.org" <draft-ietf-netmod-artwork-folding@ietf.org>
Thread-Topic: [netmod] WG Last Call: draft-ietf-netmod-artwork-folding-02
Thread-Index: AQHVCQh/oSnqrubDN0ieHZJH/cPGUKaAcPjQgABTS4CAAAF6YIAAE9eAgAAFKaA=
Date: Tue, 28 May 2019 17:31:35 +0000
Message-ID: <BYAPR11MB263188D9E6EAD9B54D915409B51E0@BYAPR11MB2631.namprd11.prod.outlook.com>
References: <e6fc4541-891a-60cb-e956-86f238d09f14@labn.net> <BYAPR11MB263112EA231A41491AC4DF89B51E0@BYAPR11MB2631.namprd11.prod.outlook.com> <0100016aff1640f0-a301a70e-ecae-4754-84d1-12170d5b73fd-000000@email.amazonses.com> <BYAPR11MB263191E71A0E09CE1667AB45B51E0@BYAPR11MB2631.namprd11.prod.outlook.com> <0100016aff5c1a19-32fa804b-b9d4-4411-a350-0a5571256e10-000000@email.amazonses.com>
In-Reply-To: <0100016aff5c1a19-32fa804b-b9d4-4411-a350-0a5571256e10-000000@email.amazonses.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=rwilton@cisco.com; 
x-originating-ip: [173.38.220.56]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: ecae56c6-9186-489e-8258-08d6e3925526
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(2017052603328)(7193020); SRVR:BYAPR11MB2934; 
x-ms-traffictypediagnostic: BYAPR11MB2934:
x-ms-exchange-purlcount: 2
x-microsoft-antispam-prvs: <BYAPR11MB293429F8E603EBF82A49B853B51E0@BYAPR11MB2934.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 00514A2FE6
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(366004)(39860400002)(376002)(136003)(346002)(396003)(189003)(199004)(51444003)(25786009)(7696005)(68736007)(81166006)(33656002)(8676002)(54906003)(74316002)(81156014)(99286004)(53546011)(8936002)(7736002)(66066001)(102836004)(6916009)(790700001)(76176011)(71200400001)(71190400001)(3846002)(6116002)(4326008)(6506007)(53936002)(2906002)(229853002)(55016002)(9686003)(6436002)(54896002)(6246003)(6306002)(256004)(446003)(476003)(76116006)(5660300002)(14454004)(11346002)(66946007)(66476007)(66446008)(64756008)(66556008)(73956011)(26005)(486006)(52536014)(86362001)(316002)(478600001)(186003); DIR:OUT; SFP:1101; SCL:1; SRVR:BYAPR11MB2934; H:BYAPR11MB2631.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: J0u1erg8nf27RG+oWky5u0RHGc9UJfOIKeKaDdVUFXazjDsvgTuaPSzSn+QZWSI+jD42ONh2nKVBNRHwg/FnGk/aynJeeyv02BkS+DQ0/fQpstzAZ6DTBOMeTgwGugpwhBoksh0fCJOybLs+ClE5Qdi1GDxjZGsTIDHfjh/AqoubhitGrYr2C/Y+uOWtiNs3HObY0F7mXZtN/zhHu2/mi95nMgMqqVOuqKFJ/a2F9FQ+3ObwztgtXPr0tLNfY853muzwdHqOddGk1McPBkxUSy8LWhObhh18cF4cznVkZhIE3v6J+cH2gUIc35Mq888xUU3mNtksom2Vm2MJNI3XUn2kseYHfuTYOzqrNuMbcIGvYrOD+VqTOgLBYcy/6CdMH3Om7P7WBvaG2ozzkC+Ol0l6e8TPL7oY28SVWwy3s90=
Content-Type: multipart/alternative; boundary="_000_BYAPR11MB263188D9E6EAD9B54D915409B51E0BYAPR11MB2631namp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: ecae56c6-9186-489e-8258-08d6e3925526
X-MS-Exchange-CrossTenant-originalarrivaltime: 28 May 2019 17:31:35.1082 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: rwilton@cisco.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR11MB2934
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.17, xch-aln-007.cisco.com
X-Outbound-Node: rcdn-core-9.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/DnMwM3B7pahQuBJ2g4IvaZqHBeY>
Subject: Re: [netmod] WG Last Call: draft-ietf-netmod-artwork-folding-02
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 28 May 2019 17:31:47 -0000

--_000_BYAPR11MB263188D9E6EAD9B54D915409B51E0BYAPR11MB2631namp_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_BYAPR11MB263188D9E6EAD9B54D915409B51E0BYAPR11MB2631namp_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64

PGh0bWwgeG1sbnM6dj0idXJuOnNjaGVtYXMtbWljcm9zb2Z0LWNvbTp2bWwiIHhtbG5zOm89InVy
bjpzY2hlbWFzLW1pY3Jvc29mdC1jb206b2ZmaWNlOm9mZmljZSIgeG1sbnM6dz0idXJuOnNjaGVt
YXMtbWljcm9zb2Z0LWNvbTpvZmZpY2U6d29yZCIgeG1sbnM6bT0iaHR0cDovL3NjaGVtYXMubWlj
cm9zb2Z0LmNvbS9vZmZpY2UvMjAwNC8xMi9vbW1sIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcv
VFIvUkVDLWh0bWw0MCI+DQo8aGVhZD4NCjxtZXRhIGh0dHAtZXF1aXY9IkNvbnRlbnQtVHlwZSIg
Y29udGVudD0idGV4dC9odG1sOyBjaGFyc2V0PXV0Zi04Ij4NCjxtZXRhIG5hbWU9IkdlbmVyYXRv
ciIgY29udGVudD0iTWljcm9zb2Z0IFdvcmQgMTUgKGZpbHRlcmVkIG1lZGl1bSkiPg0KPHN0eWxl
PjwhLS0NCi8qIEZvbnQgRGVmaW5pdGlvbnMgKi8NCkBmb250LWZhY2UNCgl7Zm9udC1mYW1pbHk6
IkNhbWJyaWEgTWF0aCI7DQoJcGFub3NlLTE6MiA0IDUgMyA1IDQgNiAzIDIgNDt9DQpAZm9udC1m
YWNlDQoJe2ZvbnQtZmFtaWx5OkNhbGlicmk7DQoJcGFub3NlLTE6MiAxNSA1IDIgMiAyIDQgMyAy
IDQ7fQ0KLyogU3R5bGUgRGVmaW5pdGlvbnMgKi8NCnAuTXNvTm9ybWFsLCBsaS5Nc29Ob3JtYWws
IGRpdi5Nc29Ob3JtYWwNCgl7bWFyZ2luOjBjbTsNCgltYXJnaW4tYm90dG9tOi4wMDAxcHQ7DQoJ
Zm9udC1zaXplOjExLjBwdDsNCglmb250LWZhbWlseToiQ2FsaWJyaSIsc2Fucy1zZXJpZjt9DQph
OmxpbmssIHNwYW4uTXNvSHlwZXJsaW5rDQoJe21zby1zdHlsZS1wcmlvcml0eTo5OTsNCgljb2xv
cjojMDU2M0MxOw0KCXRleHQtZGVjb3JhdGlvbjp1bmRlcmxpbmU7fQ0KYTp2aXNpdGVkLCBzcGFu
Lk1zb0h5cGVybGlua0ZvbGxvd2VkDQoJe21zby1zdHlsZS1wcmlvcml0eTo5OTsNCgljb2xvcjoj
OTU0RjcyOw0KCXRleHQtZGVjb3JhdGlvbjp1bmRlcmxpbmU7fQ0KcC5tc29ub3JtYWwwLCBsaS5t
c29ub3JtYWwwLCBkaXYubXNvbm9ybWFsMA0KCXttc28tc3R5bGUtbmFtZTptc29ub3JtYWw7DQoJ
bXNvLW1hcmdpbi10b3AtYWx0OmF1dG87DQoJbWFyZ2luLXJpZ2h0OjBjbTsNCgltc28tbWFyZ2lu
LWJvdHRvbS1hbHQ6YXV0bzsNCgltYXJnaW4tbGVmdDowY207DQoJZm9udC1zaXplOjExLjBwdDsN
Cglmb250LWZhbWlseToiQ2FsaWJyaSIsc2Fucy1zZXJpZjt9DQpzcGFuLmFwcGxlLWNvbnZlcnRl
ZC1zcGFjZQ0KCXttc28tc3R5bGUtbmFtZTphcHBsZS1jb252ZXJ0ZWQtc3BhY2U7fQ0Kc3Bhbi5F
bWFpbFN0eWxlMTkNCgl7bXNvLXN0eWxlLXR5cGU6cGVyc29uYWwtcmVwbHk7DQoJZm9udC1mYW1p
bHk6IkNhbGlicmkiLHNhbnMtc2VyaWY7DQoJY29sb3I6d2luZG93dGV4dDt9DQouTXNvQ2hwRGVm
YXVsdA0KCXttc28tc3R5bGUtdHlwZTpleHBvcnQtb25seTsNCglmb250LXNpemU6MTAuMHB0O30N
CkBwYWdlIFdvcmRTZWN0aW9uMQ0KCXtzaXplOjYxMi4wcHQgNzkyLjBwdDsNCgltYXJnaW46NzIu
MHB0IDcyLjBwdCA3Mi4wcHQgNzIuMHB0O30NCmRpdi5Xb3JkU2VjdGlvbjENCgl7cGFnZTpXb3Jk
U2VjdGlvbjE7fQ0KLS0+PC9zdHlsZT48IS0tW2lmIGd0ZSBtc28gOV0+PHhtbD4NCjxvOnNoYXBl
ZGVmYXVsdHMgdjpleHQ9ImVkaXQiIHNwaWRtYXg9IjEwMjYiIC8+DQo8L3htbD48IVtlbmRpZl0t
LT48IS0tW2lmIGd0ZSBtc28gOV0+PHhtbD4NCjxvOnNoYXBlbGF5b3V0IHY6ZXh0PSJlZGl0Ij4N
CjxvOmlkbWFwIHY6ZXh0PSJlZGl0IiBkYXRhPSIxIiAvPg0KPC9vOnNoYXBlbGF5b3V0PjwveG1s
PjwhW2VuZGlmXS0tPg0KPC9oZWFkPg0KPGJvZHkgbGFuZz0iRU4tR0IiIGxpbms9IiMwNTYzQzEi
IHZsaW5rPSIjOTU0RjcyIj4NCjxkaXYgY2xhc3M9IldvcmRTZWN0aW9uMSI+DQo8cCBjbGFzcz0i
TXNvTm9ybWFsIj48c3BhbiBzdHlsZT0ibXNvLWZhcmVhc3QtbGFuZ3VhZ2U6RU4tVVMiPjxvOnA+
Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxl
PSJtc28tZmFyZWFzdC1sYW5ndWFnZTpFTi1VUyI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9w
Pg0KPGRpdj4NCjxkaXYgc3R5bGU9ImJvcmRlcjpub25lO2JvcmRlci10b3A6c29saWQgI0UxRTFF
MSAxLjBwdDtwYWRkaW5nOjMuMHB0IDBjbSAwY20gMGNtIj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwi
IHN0eWxlPSJtYXJnaW4tbGVmdDozNi4wcHQiPjxiPjxzcGFuIGxhbmc9IkVOLVVTIj5Gcm9tOjwv
c3Bhbj48L2I+PHNwYW4gbGFuZz0iRU4tVVMiPiBLZW50IFdhdHNlbiAmbHQ7a2VudEB3YXRzZW4u
bmV0Jmd0Ow0KPGJyPg0KPGI+U2VudDo8L2I+IDI4IE1heSAyMDE5IDE3OjUzPGJyPg0KPGI+VG86
PC9iPiBSb2IgV2lsdG9uIChyd2lsdG9uKSAmbHQ7cndpbHRvbkBjaXNjby5jb20mZ3Q7PGJyPg0K
PGI+Q2M6PC9iPiBuZXRtb2RAaWV0Zi5vcmc7IGRyYWZ0LWlldGYtbmV0bW9kLWFydHdvcmstZm9s
ZGluZ0BpZXRmLm9yZzxicj4NCjxiPlN1YmplY3Q6PC9iPiBSZTogW25ldG1vZF0gV0cgTGFzdCBD
YWxsOiBkcmFmdC1pZXRmLW5ldG1vZC1hcnR3b3JrLWZvbGRpbmctMDI8bzpwPjwvbzpwPjwvc3Bh
bj48L3A+DQo8L2Rpdj4NCjwvZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdp
bi1sZWZ0OjM2LjBwdCI+PG86cD4mbmJzcDs8L286cD48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFs
IiBzdHlsZT0ibWFyZ2luLWxlZnQ6MzYuMHB0Ij48bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjxkaXY+
DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6MzYuMHB0Ij48YnI+DQo8
YnI+DQo8bzpwPjwvbzpwPjwvcD4NCjxibG9ja3F1b3RlIHN0eWxlPSJtYXJnaW4tdG9wOjUuMHB0
O21hcmdpbi1ib3R0b206NS4wcHQiPg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxl
PSJtYXJnaW4tbGVmdDozNi4wcHQiPjxiPjxpPltSV10mbmJzcDs8L2k+PC9iPjxvOnA+PC9vOnA+
PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPGRpdj4NCjxkaXY+DQo8ZGl2Pg0KPGRpdj4NCjxwIGNsYXNz
PSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJnaW4tbGVmdDozNi4wcHQiPlllcywgSSB0aGluayB0aGF0
IGlzIGJldHRlciwgYW5kIHByb2JhYmx5IE9LLjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2
Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0OjM2LjBwdCI+Jm5ic3A7
PG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHls
ZT0ibWFyZ2luLWxlZnQ6MzYuMHB0Ij5JIHN0aWxsIHNsaWdodGx5IHF1ZXN0aW9uIOKAnE9uZSBz
dHJhdGVneSBpcyBiYXNlZCBvbiB0aGUgdGltZS1wcm92ZW4gdXNlIG9mIGEgc2luZ2xlIGJhY2tz
bGFzaCAoJ1wnKSBjaGFyYWN0ZXIgdG8gaW5kaWNhdGUgd2hlcmUgbGluZS1mb2xkaW5nIGhhcyBv
Y2N1cnJlZCwgd2l0aCB0aGUgY29udGludWF0aW9uIG9jY3VycmluZyB3aXRoIHRoZSBmaXJzdCZu
YnNwO25vbi1zcGFjZQ0KICgnICcpIGNoYXJhY3RlciBvbiB0aGUgbmV4dCBsaW5lLuKAnSZuYnNw
OyBCZWNhdXNlIEkgZG9u4oCZdCB0aGluayB0aGF0IGlzIGhvdyDigJhc4oCZIGNoYXJhY3RlciB3
b3JrcywgYXQgbGVhc3QgaW4gbGFuZ3VhZ2VzIHN1Y2ggYXMgQy4mbmJzcDsgU3BlY2lmaWNhbGx5
LCBpdCBkb2VzbuKAmXQgaWdub3JlIGxlYWRpbmcgd2hpdGVzcGFjZSBvbiB0aGUgZm9sbG93aW5n
IGxpbmUsIGluc3RlYWQgaXQgaXMgb2Z0ZW4gdXNlZCB3aGVyZSB0aGF0IHdoaXRlc3BhY2UgaXMg
bm90IHNpZ25pZmljYW50DQogdG8gdGhlIGNvbXBpbGVyLjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+
DQo8L2Rpdj4NCjwvZGl2Pg0KPC9kaXY+DQo8L2Rpdj4NCjwvYmxvY2txdW90ZT4NCjxkaXY+DQo8
cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6MzYuMHB0Ij48bzpwPiZuYnNw
OzwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJt
YXJnaW4tbGVmdDozNi4wcHQiPldvdWxkIHMvdGltZS1wcm92ZW4vUE9TSVgvIGJlIGJldHRlcj88
bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxiPjxpPltSV10gPG86cD48L286
cD48L2k+PC9iPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPlBlcmhhcHMsIGxlc3MgaXMgbW9y
ZSwgZS5nLiwgPG86cD48L286cD48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48bzpwPiZuYnNw
OzwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPuKAnE9uZSBzdHJhdGVneSBpcyBiYXNl
ZCBvbiB0aGUgaGlzdG9yaWNhbCB1c2Ugb2YgYSBzaW5nbGUgYmFja3NsYXNoICgnXCcpIGNoYXJh
Y3RlciB0byBpbmRpY2F0ZSB3aGVyZSBsaW5lLWZvbGRpbmcgaGFzIG9jY3VycmVkLuKAnT8NCjxv
OnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9
Im1hcmdpbi1sZWZ0OjM2LjBwdCI+PG86cD4mbmJzcDs8L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+
DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6MzYuMHB0Ij5CVFcsIEkg
YWxzbyBhZGRlZCB0aGlzIHRvIEFwcGVuZGl4IEE6PG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxk
aXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6MzYuMHB0Ij48bzpw
PiZuYnNwOzwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9y
bWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6MzYuMHB0Ij4mbmJzcDsgJm5ic3A7U2hlbGwtbGV2ZWwg
ZW5kLW9mLWxpbmUgYmFja3NsYXNoICgnXCcpIGNoYXJhY3RlcnMgaGF2ZSBiZWVuPG86cD48L286
cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2lu
LWxlZnQ6MzYuMHB0Ij4mbmJzcDsgJm5ic3A7cHVycG9zZWx5IGFkZGVkIHRvIHRoZSBzY3JpcHQg
c28gYXMgdG8gZW5zdXJlIHRoYXQgdGhlIHNjcmlwdCBpczxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+
DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0OjM2LjBwdCI+
Jm5ic3A7ICZuYnNwO2l0c2VsZiBub3QgZm9sZGVkIGluIHRoaXMgZG9jdW1lbnQsIHRodXMgc2lt
cGxpZnkgdGhlIGFiaWxpdHkgdG88bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNs
YXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJnaW4tbGVmdDozNi4wcHQiPiZuYnNwOyAmbmJzcDtj
b3B5L3Bhc3RlIHRoZSBzY3JpcHQgZm9yIGxvY2FsIHVzZS4gJm5ic3A7QXMgc2hvdWxkIGJlIGV2
aWRlbnQgYnkgdGhlPG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNv
Tm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6MzYuMHB0Ij4mbmJzcDsgJm5ic3A7bGFjayBvZiB0
aGUgbWFuZGF0b3J5IGhlYWRlciBkZXNjcmliZWQgaW4gU2VjdGlvbiA3LjEuMSwgdGhlc2U8bzpw
PjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJt
YXJnaW4tbGVmdDozNi4wcHQiPiZuYnNwOyAmbmJzcDtiYWNrc2xhc2hlcyBkbyBub3QgZGVzaWdu
YXRlIGEgZm9sZGVkIGxpbmUsIHN1Y2ggYXMgZGVzY3JpYmVkIGluPG86cD48L286cD48L3A+DQo8
L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6MzYu
MHB0Ij4mbmJzcDsgJm5ic3A7U2VjdGlvbiA3LjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2
Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0OjM2LjBwdCI+PG86cD4m
bmJzcDs8L286cD48L3A+DQo8L2Rpdj4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3Jt
YWwiIHN0eWxlPSJtYXJnaW4tbGVmdDozNi4wcHQiPjxvOnA+Jm5ic3A7PC9vOnA+PC9wPg0KPHAg
Y2xhc3M9Ik1zb05vcm1hbCI+PGI+PGk+W1JXXSA8bzpwPjwvbzpwPjwvaT48L2I+PC9wPg0KPHAg
Y2xhc3M9Ik1zb05vcm1hbCI+T0suPG86cD48L286cD48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFs
Ij48bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3Jt
YWwiIHN0eWxlPSJtYXJnaW4tbGVmdDozNi4wcHQiPjxvOnA+Jm5ic3A7PC9vOnA+PC9wPg0KPC9k
aXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6MzYuMHB0Ij48YnI+
DQo8YnI+DQo8bzpwPjwvbzpwPjwvcD4NCjxibG9ja3F1b3RlIHN0eWxlPSJtYXJnaW4tdG9wOjUu
MHB0O21hcmdpbi1ib3R0b206NS4wcHQiPg0KPGRpdj4NCjxkaXY+DQo8ZGl2Pg0KPGRpdj4NCjxw
IGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJnaW4tbGVmdDozNi4wcHQiPjxiPjxpPltSV10m
bmJzcDs8L2k+PC9iPjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8L2Rpdj4NCjxkaXY+DQo8ZGl2
Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0OjM2LjBwdCI+UGVyaGFw
cyDigJxvcmlnaW5hbCB0ZXh0IGNvbnRlbnTigJ0gLSZndDsg4oCcZXhhY3Qgb3JpZ2luYWwgdGV4
dCBjb250ZW504oCdPyZuYnNwOyBCdXQgSeKAmW0gYWxzbyBPSyB3aXRoIHlvdXIgc3VnZ2VzdGVk
IHRleHQuPG86cD48L286cD48L3A+DQo8L2Rpdj4NCjwvZGl2Pg0KPC9kaXY+DQo8L2Rpdj4NCjwv
YmxvY2txdW90ZT4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxl
ZnQ6MzYuMHB0Ij48bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNz
PSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJnaW4tbGVmdDozNi4wcHQiPkknbSBoZXNpdGFudCwgYmVj
YXVzZSBpdCBzZWVtcyByZWR1bmRhbnQsIGJ1dCBpdCBkb2Vzbid0IGNhdXNlIGhhcm0sIHNvIEkg
YWRkZWQgaXQuPG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9y
bWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6MzYuMHB0Ij48bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjwv
ZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJnaW4tbGVmdDozNi4w
cHQiPjxvOnA+Jm5ic3A7PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05v
cm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0OjM2LjBwdCI+PG86cD4mbmJzcDs8L286cD48L3A+DQo8
L2Rpdj4NCjxibG9ja3F1b3RlIHN0eWxlPSJtYXJnaW4tdG9wOjUuMHB0O21hcmdpbi1ib3R0b206
NS4wcHQiPg0KPGRpdj4NCjxkaXY+DQo8ZGl2IHN0eWxlPSJtYXJnaW4tbGVmdDozNi4wcHQiPg0K
PHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0OjM2LjBwdCI+PGI+PGk+W1JX
XSZuYnNwOzwvaT48L2I+PG86cD48L286cD48L3A+DQo8L2Rpdj4NCjwvZGl2Pg0KPGRpdj4NCjxk
aXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0OjM2LjBw
dCI+QWNjb3JkaW5nIHRvIFJGQzIxMTksIFJFQ09NTUVOREVEIGlzIGludGVycHJldGVkIGV4YWN0
bHkgdGhlIHNhbWUgd2F5IGFzIFNIT1VMRC48bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPC9kaXY+
DQo8L2Rpdj4NCjwvZGl2Pg0KPC9ibG9ja3F1b3RlPg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3Jt
YWwiIHN0eWxlPSJtYXJnaW4tbGVmdDozNi4wcHQiPjxvOnA+Jm5ic3A7PC9vOnA+PC9wPg0KPC9k
aXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6MzYuMHB0Ij5ZZXMs
IHdoZW4gY29tcG9zaW5nIG15IHJlc3BvbnNlIGJlZm9yZSBJIHdhcyBnb2luZyB0byBzYXkgdGhh
dCBpdCdzIGEgZG93bmdyYWRlICZxdW90OyhpbiBJTU8pJnF1b3Q7LCBidXQgZmlndXJlZCBpdCB3
b3VsZCByZXF1aXJlIG1vcmUgZXhwbGFuYXRpb24sIHdoaWNoIEkgd2FzIGhvcGluZyB0byBhdm9p
ZC4gJm5ic3A7QnV0IGhlcmUgd2UgYXJlIG5vdyAmbmJzcDs7KSAmbmJzcDsgV2hpbGUgSSdtIGF3
YXJlDQogdGhhdCB0aGV5IGNhcnJ5IHRoZSBzYW1lIFJGQyAyMTE5IHdlaWdodCwgUkVDT01NRU5E
RUQgcmVhZHMgc29mdGVyIHRvIG1lLCBsZXNzIGNvbW1hbmRpbmcsIGhlbmNlIG15IGNvbW1lbnQu
PG86cD48L286cD48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48Yj48aT5bUlddIDxvOnA+PC9v
OnA+PC9pPjwvYj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj5FciwgSSBzdHJvbmdseSBkaXNh
Z3JlZSB0aGF0IFJFQ09NTUVOREVEIGhhcyBhbnkgZGlmZmVyZW50IHNlbWFudGljIG1lYW5pbmcg
dG8gU0hPVUxELiZuYnNwOyBSRkMgMjExOSBpcyBleHBsaWNpdCB0aGF0IHRoZXkgbWVhbiBleGFj
dGx5IHRoZSBzYW1lIHRoaW5nLiZuYnNwOyBJZiB5b3Ugd2FudCBpdCB0byBiZSBzb2Z0ZXIsIHRo
ZW4gcGVyaGFwcyBjaGFuZ2UgaXQgdG8g4oCccmVjb21tZW5kZWTigJ0gd2hpY2ggSSBkbyB0aGlu
ayBpcw0KIHNvZnRlciB0aGFuIOKAnHNob3VsZOKAnS4gPHNwYW4gc3R5bGU9ImZvbnQtZmFtaWx5
OiZxdW90O1NlZ29lIFVJIEVtb2ppJnF1b3Q7LHNhbnMtc2VyaWYiPiYjMTI4NTIyOzwvc3Bhbj48
YnI+DQo8YnI+DQo8bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxibG9ja3F1b3RlIHN0
eWxlPSJtYXJnaW4tdG9wOjUuMHB0O21hcmdpbi1ib3R0b206NS4wcHQiPg0KPGRpdj4NCjxkaXY+
DQo8ZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJnaW4tbGVmdDoz
Ni4wcHQiPiZuYnNwO0kgc3RpbGwgdGhpbmsgdGhhdCBTSE9VTEQvUkVDT01NRU5ERUQgaXMgdG9v
IHN0cm9uZy48bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPC9kaXY+DQo8L2Rpdj4NCjwvZGl2Pg0K
PC9ibG9ja3F1b3RlPg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJnaW4t
bGVmdDozNi4wcHQiPjxvOnA+Jm5ic3A7PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xh
c3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0OjM2LjBwdCI+SSBzdGlsbCBkaXNhZ3Jl
ZS4gJm5ic3A7ICZuYnNwO0FueSB0aWUtYnJlYWtlcnMgb3V0IHRoZXJlPzxvOnA+PC9vOnA+PC9w
Pg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0
OjM2LjBwdCI+PG86cD4mbmJzcDs8L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0i
TXNvTm9ybWFsIj48Yj48aT5bUlddPG86cD48L286cD48L2k+PC9iPjwvcD4NCjxwIGNsYXNzPSJN
c29Ob3JtYWwiPlNvLCBmb3IgZXhhbXBsZSBjb25zaWRlcmluZyB0aGUgY3VycmVudCB0ZXh0LCBp
ZiBpdCB3YXMgYSBKU09OIGlucHV0IGZpbGUsIGl0IHdvdWxkIGJlIG1vcmUgYXBwcm9wcmlhdGUg
dG8gY2hhbmdlIHRoZSBpbmRlbnRhdGlvbiBsZXZlbCB0byAyIHNwYWNlcyByYXRoZXIgdGhhbiA0
IHNwYWNlcyB0byBlbnN1cmUgdGhhdCB0aGVyZSBhcmUgbm90IHVubmVjZXNzYXJ5IGxpbmUgd3Jh
cHM/Jm5ic3A7IEluIHRoZW9yeSwgdGhlDQogb25seSBwbGFjZSBpbiBhIEpTT04gZmlsZSB0aGF0
IHdlIHdvdWxkIGV4cGVjdCB0aGVyZSB0byBiZSBhIGxpbmUgYnJlYWtzIHdvdWxkIGJlIHdpdGhp
biBhIHN0cmluZyBiZWNhdXNlIHRoYXQgaXMgdGhlIG9ubHkgY2FzZSB0aGF0IGNhbuKAmXQgYmUg
aGFuZGxlZCB3aXRoaW4gSlNPTiBpdHNlbGYuPG86cD48L286cD48L3A+DQo8cCBjbGFzcz0iTXNv
Tm9ybWFsIj48bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPklzIHRo
aXMgeW91ciBpbnRlbmRlZCBtZWFuaW5nPzxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8cCBjbGFz
cz0iTXNvTm9ybWFsIj48bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjxibG9ja3F1b3RlIHN0eWxlPSJt
YXJnaW4tdG9wOjUuMHB0O21hcmdpbi1ib3R0b206NS4wcHQiPg0KPGRpdj4NCjxkaXY+DQo8ZGl2
IHN0eWxlPSJtYXJnaW4tbGVmdDozNi4wcHQiPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9
Im1hcmdpbi1sZWZ0OjM2LjBwdCI+R29vZCBwb2ludCwgaG93IGFib3V0IHRoaXM/PG86cD48L286
cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8ZGl2IHN0eWxlPSJtYXJnaW4tbGVmdDozNi4wcHQiPg0K
PHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0OjM2LjBwdCI+Jm5ic3A7PG86
cD48L286cD48L3A+DQo8L2Rpdj4NCjwvZGl2Pg0KPGRpdj4NCjxkaXY+DQo8ZGl2IHN0eWxlPSJt
YXJnaW4tbGVmdDozNi4wcHQiPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdpbi1s
ZWZ0OjM2LjBwdCI+Jm5ic3A7ICZuYnNwO1NjYW4gdGhlIHRleHQgY29udGVudCB0byBlbnN1cmUg
bm8gZXhpc3RpbmcgbGluZXMgYWxyZWFkeSBlbmQgd2l0aCBhPG86cD48L286cD48L3A+DQo8L2Rp
dj4NCjwvZGl2Pg0KPGRpdj4NCjxkaXYgc3R5bGU9Im1hcmdpbi1sZWZ0OjM2LjBwdCI+DQo8cCBj
bGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6MzYuMHB0Ij4mbmJzcDsgJm5ic3A7
YmFja3NsYXNoICgnXCcpIGNoYXJhY3RlciB3aGlsZSB0aGUgc3Vic2VxdWVudCBsaW5lIHN0YXJ0
cyB3aXRoIGE8bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPC9kaXY+DQo8ZGl2Pg0KPGRpdiBzdHls
ZT0ibWFyZ2luLWxlZnQ6MzYuMHB0Ij4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJn
aW4tbGVmdDozNi4wcHQiPiZuYnNwOyAmbmJzcDtiYWNrc2xhc2ggKCdcJykgY2hhcmFjdGVyIGFz
IHRoZSBmaXJzdCBub24tc3BhY2UgKCcgJykgY2hhcmFjdGVyLCBhczxvOnA+PC9vOnA+PC9wPg0K
PC9kaXY+DQo8L2Rpdj4NCjxkaXY+DQo8ZGl2IHN0eWxlPSJtYXJnaW4tbGVmdDozNi4wcHQiPg0K
PHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0OjM2LjBwdCI+Jm5ic3A7ICZu
YnNwO3RoaXMgY291bGQgbGVhZCB0byBhbiBhbWJpZ3VvdXMgcmVzdWx0LiAmbmJzcDtJZiBzdWNo
IGEgbGluZSBpcyBmb3VuZCwgYW5kPG86cD48L286cD48L3A+DQo8L2Rpdj4NCjwvZGl2Pg0KPGRp
dj4NCjxkaXYgc3R5bGU9Im1hcmdpbi1sZWZ0OjM2LjBwdCI+DQo8cCBjbGFzcz0iTXNvTm9ybWFs
IiBzdHlsZT0ibWFyZ2luLWxlZnQ6MzYuMHB0Ij4mbmJzcDsgJm5ic3A7aXRzIHdpZHRoIGlzIGxl
c3MgdGhhbiB0aGUgZGVzaXJlZCBtYXhpbXVtLCB0aGVuIGl0IFNIT1VMRCBiZSBmbGFnZ2VkPG86
cD48L286cD48L3A+DQo8L2Rpdj4NCjwvZGl2Pg0KPGRpdj4NCjxkaXYgc3R5bGU9Im1hcmdpbi1s
ZWZ0OjM2LjBwdCI+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6MzYu
MHB0Ij4mbmJzcDsgJm5ic3A7Zm9yIGZvcmNlZCBmb2xkaW5nIChmb2xkaW5nIGV2ZW4gdGhvdWdo
IHVubmVjZXNzYXJ5KS4gJm5ic3A7SWYgdGhlIGZvbGRpbmc8bzpwPjwvbzpwPjwvcD4NCjwvZGl2
Pg0KPC9kaXY+DQo8ZGl2Pg0KPGRpdiBzdHlsZT0ibWFyZ2luLWxlZnQ6MzYuMHB0Ij4NCjxwIGNs
YXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJnaW4tbGVmdDozNi4wcHQiPiZuYnNwOyAmbmJzcDtp
bXBsZW1lbnRhdGlvbiBkb2Vzbid0IHN1cHBvcnQgZm9yY2VkIGZvbGRpbmdzLCBpdCBNVVNUIGV4
aXQuPG86cD48L286cD48L3A+DQo8L2Rpdj4NCjwvZGl2Pg0KPGRpdj4NCjxkaXYgc3R5bGU9Im1h
cmdpbi1sZWZ0OjM2LjBwdCI+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxl
ZnQ6MzYuMHB0Ij4mbmJzcDs8bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPC9kaXY+DQo8ZGl2Pg0K
PGRpdiBzdHlsZT0ibWFyZ2luLWxlZnQ6MzYuMHB0Ij4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0
eWxlPSJtYXJnaW4tbGVmdDozNi4wcHQiPiZuYnNwOyAmbmJzcDsmbHQ7c25pcCZndDs8bzpwPjwv
bzpwPjwvcD4NCjwvZGl2Pg0KPC9kaXY+DQo8ZGl2Pg0KPGRpdiBzdHlsZT0ibWFyZ2luLWxlZnQ6
MzYuMHB0Ij4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJnaW4tbGVmdDozNi4wcHQi
PiZuYnNwOzxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8L2Rpdj4NCjxkaXY+DQo8ZGl2IHN0eWxl
PSJtYXJnaW4tbGVmdDozNi4wcHQiPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdp
bi1sZWZ0OjM2LjBwdCI+Jm5ic3A7ICZuYnNwO0ZvciBlYWNoIGxpbmUgaW4gdGhlIHRleHQgY29u
dGVudCwgZnJvbSB0b3AtdG8tYm90dG9tLCBpZiB0aGUgbGluZTxvOnA+PC9vOnA+PC9wPg0KPC9k
aXY+DQo8L2Rpdj4NCjxkaXY+DQo8ZGl2IHN0eWxlPSJtYXJnaW4tbGVmdDozNi4wcHQiPg0KPHAg
Y2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0OjM2LjBwdCI+Jm5ic3A7ICZuYnNw
O2V4Y2VlZHMgdGhlIGRlc2lyZWQgbWF4aW11bSwgb3IgcmVxdWlyZXMgYSBmb3JjZWQgZm9sZGlu
ZywgdGhlbiBmb2xkPG86cD48L286cD48L3A+DQo8L2Rpdj4NCjwvZGl2Pg0KPGRpdj4NCjxkaXYg
c3R5bGU9Im1hcmdpbi1sZWZ0OjM2LjBwdCI+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0i
bWFyZ2luLWxlZnQ6MzYuMHB0Ij4mbmJzcDsgJm5ic3A7dGhlIGxpbmUgYnk6PG86cD48L286cD48
L3A+DQo8L2Rpdj4NCjwvZGl2Pg0KPGRpdj4NCjxkaXYgc3R5bGU9Im1hcmdpbi1sZWZ0OjM2LjBw
dCI+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6MzYuMHB0Ij4mbmJz
cDs8bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPC9kaXY+DQo8ZGl2Pg0KPGRpdiBzdHlsZT0ibWFy
Z2luLWxlZnQ6MzYuMHB0Ij4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJnaW4tbGVm
dDozNi4wcHQiPiZuYnNwOzxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9
Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0OjM2LjBwdCI+PGI+PGk+W1JXXTxzcGFuIGNs
YXNzPSJhcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj48L2k+PC9iPjxvOnA+PC9v
OnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdp
bi1sZWZ0OjM2LjBwdCI+T0suPG86cD48L286cD48L3A+DQo8L2Rpdj4NCjwvZGl2Pg0KPC9kaXY+
DQo8L2Rpdj4NCjwvZGl2Pg0KPC9ibG9ja3F1b3RlPg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3Jt
YWwiIHN0eWxlPSJtYXJnaW4tbGVmdDozNi4wcHQiPjxvOnA+Jm5ic3A7PC9vOnA+PC9wPg0KPC9k
aXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0OjM2LjBw
dCI+R3JlYXQuICZuYnNwO0JUVywgSSBhbHNvIGFkZGVkIHRoaXMgdG8gQXBwZW5kaXggQTo8bzpw
PjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJt
YXJnaW4tbGVmdDozNi4wcHQiPjxvOnA+Jm5ic3A7PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0K
PGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJnaW4tbGVmdDozNi4wcHQiPiZu
YnNwOyAmbmJzcDtUaGlzIHNjcmlwdCBkb2VzIG5vdCBpbXBsZW1lbnQgdGhlICZxdW90O2ZvcmNl
ZCBmb2xkaW5nJnF1b3Q7IGxvZ2ljIGRlc2NyaWJlZDxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8
ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0OjM2LjBwdCI+Jm5i
c3A7ICZuYnNwO2luIFNlY3Rpb24gOC4yLjEuICZuYnNwO0luIHN1Y2ggY2FzZXMgdGhlIHNjcmlw
dCB3aWxsIGV4aXQgd2l0aCB0aGU8bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNs
YXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJnaW4tbGVmdDozNi4wcHQiPiZuYnNwOyAmbmJzcDtt
ZXNzYWdlOjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1h
bCIgc3R5bGU9Im1hcmdpbi1sZWZ0OjM2LjBwdCI+PG86cD4mbmJzcDs8L286cD48L3A+DQo8L2Rp
dj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6MzYuMHB0
Ij4mbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7RXJyb3I6IGluZmlsZSBoYXMgYSBs
aW5lIGVuZGluZyB3aXRoIGEgJ1xcJyBjaGFyYWN0ZXI8bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0K
PGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJnaW4tbGVmdDozNi4wcHQiPiZu
YnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDtmb2xsb3dlZCBieSBhICdcXCcgY2hhcmFj
dGVyIGFzIHRoZSBmaXJzdCBub24tc3BhY2U8bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4N
CjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJnaW4tbGVmdDozNi4wcHQiPiZuYnNwOyAm
bmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDtjaGFyYWN0ZXIgb24gdGhlIG5leHQgbGluZS4gJm5i
c3A7VGhpcyBmaWxlIGNhbm5vdCBiZSBmb2xkZWQuPG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxk
aXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6MzYuMHB0Ij48bzpw
PiZuYnNwOzwvbzpwPjwvcD4NCjwvZGl2Pg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05v
cm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0OjM2LjBwdCI+PG86cD4mbmJzcDs8L286cD48L3A+DQo8
cCBjbGFzcz0iTXNvTm9ybWFsIj48Yj48aT5bUlddIDxvOnA+PC9vOnA+PC9pPjwvYj48L3A+DQo8
cCBjbGFzcz0iTXNvTm9ybWFsIj5TdXJlLjxvOnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb05v
cm1hbCI+PG86cD4mbmJzcDs8L286cD48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj5UaGFua3Ms
PGJyPg0KUm9iPG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9y
bWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6MzYuMHB0Ij48bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjwv
ZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJnaW4tbGVmdDozNi4w
cHQiPjxvOnA+Jm5ic3A7PC9vOnA+PC9wPg0KPC9kaXY+DQo8L2Rpdj4NCjxwIGNsYXNzPSJNc29O
b3JtYWwiIHN0eWxlPSJtYXJnaW4tbGVmdDozNi4wcHQiPktlbnQgLy8gYXV0aG9yPG86cD48L286
cD48L3A+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0OjM2
LjBwdCI+PG86cD4mbmJzcDs8L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNv
Tm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6MzYuMHB0Ij48bzpwPiZuYnNwOzwvbzpwPjwvcD4N
CjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJnaW4tbGVmdDoz
Ni4wcHQiPjxvOnA+Jm5ic3A7PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1z
b05vcm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0OjM2LjBwdCI+PG86cD4mbmJzcDs8L286cD48L3A+
DQo8L2Rpdj4NCjwvZGl2Pg0KPC9ib2R5Pg0KPC9odG1sPg0K

--_000_BYAPR11MB263188D9E6EAD9B54D915409B51E0BYAPR11MB2631namp_--


From nobody Tue May 28 12:20:11 2019
Return-Path: <0100016affe2af95-70f3b07d-93c4-4ee8-a72d-664900a10959-000000@amazonses.watsen.net>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 85E881200BA; Tue, 28 May 2019 12:20:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level: 
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=amazonses.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8xbNbZrSaPpp; Tue, 28 May 2019 12:20:09 -0700 (PDT)
Received: from a8-64.smtp-out.amazonses.com (a8-64.smtp-out.amazonses.com [54.240.8.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A7429120047; Tue, 28 May 2019 12:20:08 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=6gbrjpgwjskckoa6a5zn6fwqkn67xbtw; d=amazonses.com; t=1559071207; h=From:Message-Id:Content-Type:Mime-Version:Subject:Date:In-Reply-To:Cc:To:References:Feedback-ID; bh=NxKRSf67j/LYBnREP6maOT6634yp2TAip4OM1q3iA9s=; b=jAIPwUJDw3JIBGXp4mMkGD9SZQ+mGOhOff/vW1pScRKCeLQ0Zati4UgcNycagwZT XMyAlBcJqgYEO5i6a+/B8lfJ+rYGhoHR22w4E5KQ3vo/KIutF1E/SYuYShgZxM3rVG5 IthrbNJBo6iPSMzr+IIE69YQPOY+uRtmCTUdmGNg=
From: Kent Watsen <kent@watsen.net>
Message-ID: <0100016affe2af95-70f3b07d-93c4-4ee8-a72d-664900a10959-000000@email.amazonses.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_156816C9-C46F-40B1-B59C-AF4332598476"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
Date: Tue, 28 May 2019 19:20:07 +0000
In-Reply-To: <BYAPR11MB263188D9E6EAD9B54D915409B51E0@BYAPR11MB2631.namprd11.prod.outlook.com>
Cc: "netmod@ietf.org" <netmod@ietf.org>, "draft-ietf-netmod-artwork-folding@ietf.org" <draft-ietf-netmod-artwork-folding@ietf.org>
To: "Rob Wilton (rwilton)" <rwilton@cisco.com>
References: <e6fc4541-891a-60cb-e956-86f238d09f14@labn.net> <BYAPR11MB263112EA231A41491AC4DF89B51E0@BYAPR11MB2631.namprd11.prod.outlook.com> <0100016aff1640f0-a301a70e-ecae-4754-84d1-12170d5b73fd-000000@email.amazonses.com> <BYAPR11MB263191E71A0E09CE1667AB45B51E0@BYAPR11MB2631.namprd11.prod.outlook.com> <0100016aff5c1a19-32fa804b-b9d4-4411-a350-0a5571256e10-000000@email.amazonses.com> <BYAPR11MB263188D9E6EAD9B54D915409B51E0@BYAPR11MB2631.namprd11.prod.outlook.com>
X-Mailer: Apple Mail (2.3445.104.11)
X-SES-Outgoing: 2019.05.28-54.240.8.64
Feedback-ID: 1.us-east-1.DKmIRZFhhsBhtmFMNikgwZUWVrODEw9qVcPhqJEI2DA=:AmazonSES
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/TAfmwTkDIgCQAEa3nJ0oDkP5qPs>
Subject: Re: [netmod] WG Last Call: draft-ietf-netmod-artwork-folding-02
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 28 May 2019 19:20:10 -0000

--Apple-Mail=_156816C9-C46F-40B1-B59C-AF4332598476
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8



> [RW]=20
> Perhaps, less is more, e.g.,=20
> =20
> =E2=80=9COne strategy is based on the historical use of a single =
backslash ('\') character to indicate where line-folding has =
occurred.=E2=80=9D?

Replaced.



> [RW]
> So, for example considering the current text, if it was a JSON input =
file, it would be more appropriate to change the indentation level to 2 =
spaces rather than 4 spaces to ensure that there are not unnecessary =
line wraps?  In theory, the only place in a JSON file that we would =
expect there to be a line breaks would be within a string because that =
is the only case that can=E2=80=99t be handled within JSON itself.
> =20
> Is this your intended meaning?

Certainly one example, yes.



Kent // author



--Apple-Mail=_156816C9-C46F-40B1-B59C-AF4332598476
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=utf-8

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Dutf-8"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" class=3D""><div =
class=3D""><br class=3D""></div><br class=3D""><div><blockquote =
type=3D"cite" class=3D""><div class=3D"WordSection1" style=3D"page: =
WordSection1; caret-color: rgb(0, 0, 0); font-family: Helvetica-Light; =
font-size: 14px; font-style: normal; font-variant-caps: normal; =
font-weight: normal; letter-spacing: normal; text-align: start; =
text-indent: 0px; text-transform: none; white-space: normal; =
word-spacing: 0px; -webkit-text-stroke-width: 0px; text-decoration: =
none;"><div class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><b class=3D"" style=3D"font-size: 11pt;"><i =
class=3D"">[RW]&nbsp;</i></b></div><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">Perhaps, less is more, e.g.,<span =
class=3D"Apple-converted-space">&nbsp;</span><o:p =
class=3D""></o:p></div><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></div><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D"">=E2=80=9COn=
e strategy is based on the historical use of a single backslash ('\') =
character to indicate where line-folding has =
occurred.=E2=80=9D?</div></div></div></div></blockquote><div><br =
class=3D""></div><div>Replaced.</div><div><br class=3D""></div><div><br =
class=3D""></div><div><br class=3D""></div><blockquote type=3D"cite" =
class=3D""><div class=3D"WordSection1" style=3D"page: WordSection1; =
caret-color: rgb(0, 0, 0); font-family: Helvetica-Light; font-size: =
14px; font-style: normal; font-variant-caps: normal; font-weight: =
normal; letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; text-decoration: none;"><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D""><b class=3D"" =
style=3D"font-size: 11pt;"><i class=3D"">[RW]</i></b></div></div><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D"">So, for =
example considering the current text, if it was a JSON input file, it =
would be more appropriate to change the indentation level to 2 spaces =
rather than 4 spaces to ensure that there are not unnecessary line =
wraps?&nbsp; In theory, the only place in a JSON file that we would =
expect there to be a line breaks would be within a string because that =
is the only case that can=E2=80=99t be handled within JSON itself.<o:p =
class=3D""></o:p></div><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></div><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D"">Is this =
your intended meaning?</div></div></div></div></blockquote><div><br =
class=3D""></div><div>Certainly one example, yes.</div><div><br =
class=3D""></div><div><br class=3D""></div><div><br =
class=3D""></div></div><font face=3D"Calibri, sans-serif" class=3D""><span=
 style=3D"font-size: 14.666666984558105px;" class=3D"">Kent // =
author</span></font><div class=3D""><font face=3D"Calibri, sans-serif" =
class=3D""><span style=3D"font-size: 14.666666984558105px;" class=3D""><br=
 class=3D""></span></font></div><div class=3D""><font face=3D"Calibri, =
sans-serif" class=3D""><span style=3D"font-size: 14.666666984558105px;" =
class=3D""><br class=3D""></span></font></div></body></html>=

--Apple-Mail=_156816C9-C46F-40B1-B59C-AF4332598476--


From nobody Wed May 29 01:42:11 2019
Return-Path: <ietfc@btconnect.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CA106120144; Wed, 29 May 2019 01:42:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.257
X-Spam-Level: 
X-Spam-Status: No, score=0.257 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RATWARE_MS_HASH=2.148, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_FILL_THIS_FORM_SHORT=0.01] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=btconnect.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pficEWKyNgVE; Wed, 29 May 2019 01:42:07 -0700 (PDT)
Received: from EUR03-VE1-obe.outbound.protection.outlook.com (mail-eopbgr50100.outbound.protection.outlook.com [40.107.5.100]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 859B8120100; Wed, 29 May 2019 01:42:04 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=btconnect.onmicrosoft.com; s=selector1-btconnect-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=e/vb6byYj6Dfz23XTCrsiU6FokSAGNhRZYdk18oscl4=; b=axwPNMl4nAwwcZJFQmF4FKodwNdkbXY+rWirU9AhrUpNq+xl7b4e9JtycWCJJeAOcbKesKjR5jR7wSjIi5zmQIcFrkxUxeTxItiqe3pUrcM8Ep79O8SNq2Pbq3J16nHzC8yBwM2nft1ipo6D7eSpvMhaP3YK0PeZBx77vXyx+IU=
Received: from VI1PR07MB3118.eurprd07.prod.outlook.com (10.175.242.156) by VI1PR07MB4046.eurprd07.prod.outlook.com (52.134.20.153) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1943.13; Wed, 29 May 2019 08:42:01 +0000
Received: from VI1PR07MB3118.eurprd07.prod.outlook.com ([fe80::7537:44ee:88c1:dd6d]) by VI1PR07MB3118.eurprd07.prod.outlook.com ([fe80::7537:44ee:88c1:dd6d%7]) with mapi id 15.20.1943.016; Wed, 29 May 2019 08:42:00 +0000
From: tom petch <ietfc@btconnect.com>
To: Italo Busi <Italo.Busi@huawei.com>, "netmod@ietf.org" <netmod@ietf.org>
CC: "teas@ietf.org" <teas@ietf.org>
Thread-Topic: [netmod] Key collision between configured and ephemeral list entries
Thread-Index: AQHVFfphMHsTseJ1T0S+porZBJo1ZA==
Date: Wed, 29 May 2019 08:42:00 +0000
Message-ID: <017f01d515f9$d0c662c0$4001a8c0@gateway.2wire.net>
References: <91E3A1BD737FDF4FA14118387FF6766B2774D314@lhreml504-mbs>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-clientproxiedby: LO2P265CA0478.GBRP265.PROD.OUTLOOK.COM (2603:10a6:600:a2::34) To VI1PR07MB3118.eurprd07.prod.outlook.com (2603:10a6:802:20::28)
authentication-results: spf=none (sender IP is ) smtp.mailfrom=ietfc@btconnect.com; 
x-ms-exchange-messagesentrepresentingtype: 1
x-mailer: Microsoft Outlook Express 6.00.2800.1106
x-originating-ip: [86.139.215.234]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: f39565ee-672e-4bb0-ac9b-08d6e4118419
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(2017052603328)(7193020); SRVR:VI1PR07MB4046; 
x-ms-traffictypediagnostic: VI1PR07MB4046:
x-ms-exchange-purlcount: 2
x-microsoft-antispam-prvs: <VI1PR07MB404651279A38B20BB6CFCC6BA01F0@VI1PR07MB4046.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:1728;
x-forefront-prvs: 0052308DC6
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(39860400002)(346002)(396003)(366004)(136003)(376002)(13464003)(199004)(189003)(305945005)(73956011)(81156014)(66946007)(50226002)(1556002)(2501003)(4720700003)(8676002)(8936002)(53546011)(81166006)(386003)(6506007)(81686011)(966005)(478600001)(66446008)(66556008)(14454004)(316002)(26005)(110136005)(66476007)(64756008)(81816011)(102836004)(14496001)(52116002)(68736007)(76176011)(186003)(86362001)(4326008)(71200400001)(71190400001)(99286004)(7736002)(66066001)(2906002)(61296003)(5660300002)(5024004)(44716002)(256004)(84392002)(14444005)(62236002)(6246003)(476003)(486006)(229853002)(446003)(6116002)(53936002)(25786009)(3846002)(6306002)(6436002)(44736005)(6486002)(9686003)(6512007)(74416001)(7726001); DIR:OUT; SFP:1102; SCL:1; SRVR:VI1PR07MB4046; H:VI1PR07MB3118.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:0; MX:1; 
received-spf: None (protection.outlook.com: btconnect.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: RmIQIw1ogOSbTeUEORNQlcVoRibpn2wqfDXNPnvbq6bHzDTSyP2uLpKubk3Jxl+mtREQKkVSXdOJh4i03h7XlEB2TQ1Q2ADlVmSi1rlMKhmTCIPU9sWGLe6KcAL1vv7TeMDwXIWg0uneNbuKjFltz2/Lbn65/6S5gB5RI8b1xjtoP2Nygntu77OarW26CDEPHziBWXIEwj27dAkPTWSve3hqgk1KqgGpDESsH4c3XvWUneQNRdhVlwXCa30hi8ZRIGj0GAMxiK6rfiCj9urATBF7mvfdBQ7FJEkiOzo72cIfyH4wcW9jte/TGyea2cJqEqwwUps/kczrj6M9aPPshDpo53Tzr/CuI8tE/BGLCPxd9a0HxYtNHMc0yQKqo1vZBGGCg8R+wZGRemYO4n1e9kHnP0p9t6dPgg2oRNvGOHg=
Content-Type: text/plain; charset="iso-8859-1"
Content-ID: <E0359CDFC28DFB45A6042944B506AA40@eurprd07.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: btconnect.com
X-MS-Exchange-CrossTenant-Network-Message-Id: f39565ee-672e-4bb0-ac9b-08d6e4118419
X-MS-Exchange-CrossTenant-originalarrivaltime: 29 May 2019 08:42:00.8571 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: cf8853ed-96e5-465b-9185-806bfe185e30
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: ietfc@btconnect.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR07MB4046
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/EsVB54EkeKAx2q9tvO45-X4rz5I>
Subject: Re: [netmod] Key collision between configured and ephemeral list entries
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 29 May 2019 08:42:10 -0000

<inline>

Tom Petch

----- Original Message -----
From: "Italo Busi" <Italo.Busi@huawei.com>
To: <netmod@ietf.org>
Cc: <teas@ietf.org>
Sent: Monday, May 27, 2019 2:16 PM
Subject: [netmod] Key collision between configured and ephemeral list
entries


On Friday within the TEAS WG, we have discussed an issue which seems
generic and therefore agreed to ask for guidelines to the Netmod WG

In the TE YANG model we have defined a tunnel list with a name attribute
used as a key:

     |  +--rw tunnel* [name]
     |  |  +--ro operational-state?                  identityref
     |  |  +--rw name                                string

See: https://tools.ietf.org/html/draft-ietf-teas-yang-te-21

The issue we are facing is how to avoid name collision between
configured and ephemeral tunnels. In other words, the issue we are
trying to address is how to avoid the client to assign to a configured
tunnel a name which have been already assigned by the server to another
ephemeral tunnel and vice-versa, in particular considering NMDA rules

We believe that the issue is generic and apply to any configured and
ephemeral list entries

Has this issue been already discussed/resolved in Netmod WG?

If not, what is the Netmod WG opinion/suggestion? We are currently
considering the following option:

   Use a special character for ephemeral names - e.g. such names always
are prepended by special character "#"
   Make the special character changeable by configuration - the default
can be "#" and user can change if they desire..

<tp>

If this is to conform with YANG 1.1, RFC7950, then the constraint is

   Identifiers are used to identify different kinds of YANG items by
   name.  Each identifier starts with an uppercase or lowercase ASCII
   letter or an underscore character, followed by zero or more ASCII
   letters, digits, underscore characters, hyphens, and dots.


No # (hash) anywhere so I suspect that a lot of tooling will fail in an
unpredictable way if it encounters an illegal character in an
identifier.

Tom Petch


Thanks, Italo

Italo Busi
Principal Optical Transport Network Research Engineer
Huawei Technologies Co., Ltd.
Tel : +39 345 4721946
Email : italo.busi@huawei.com
[cid:image002.png@01D5149F.354EF420]

This e-mail and its attachments contain confidential information from
HUAWEI, which is intended only for the person or entity whose address is
listed above. Any use of the information contained herein in any way
(including, but not limited to, total or partial disclosure,
reproduction, or dissemination) by persons other than the intended
recipient(s) is prohibited. If you receive this e-mail in error, please
notify the sender by phone or email immediately and delete it!

From: Tarek Saad [mailto:tsaad.net@gmail.com]
Sent: venerd=EC 24 maggio 2019 23:13
To: Igor Bryskin <Igor.Bryskin@huawei.com>; Rakesh Gandhi
<rgandhi@cisco.com>; Xufeng <xufeng.liu.ietf@gmail.com>; Vishnu Pavan
Beeram <vbeeram@juniper.net>; Italo Busi <Italo.Busi@huawei.com>
Cc: teas@ietf.org
Subject: Discussion on modelling container TE tunnels in YANG

The team on "to" list met to discuss this subject topic. Notes from
today's discussion (please add if I missed):

Name collision between configured and ephemeral tunnels:
  This is a generic problem in NMDA.
  How to handle collisions between configured and ephemeral (or
auto-created) objects of a list, if the list uses the object (string
based) name as the key?
  Both configured and ephemeral can have the same object name but they
are different objects - how to avoid such collision.
 Proposed solution:
   Option 1:
   Use a special character for ephemeral names - e.g. such names always
are prepended by special character "#"
   Make the special character changeable by configuration - the default
can be "#" and user can change if they desire..
  Others?
AI (Italo): to send email to netmod group.

Container TE tunnels discussion:
-          Container tunnels are grouping of tunnels between same 2
endpoints to share incoming traffic towards the egress
-          Member tunnels of a container tunnel can be
auto-created/deleted on-demand and controlled by thresholds specified
under the container
-          Some attributes may apply on the container tunnel and
inherited down to member tunnels of the container
-          Q: Should model allow member tunnel to override inherited
attributes from container tunnel?
-          Q: Should all auto-created member tunnels of a container have
the same prefix/suffix - i..e prefix/suffix can be configurable

Regards,
Tarek






------------------------------------------------------------------------
--------


> _______________________________________________
> netmod mailing list
> netmod@ietf.org
> https://www.ietf.org/mailman/listinfo/netmod
>


From nobody Wed May 29 03:02:35 2019
Return-Path: <Italo.Busi@huawei.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 816CB1200B1; Wed, 29 May 2019 03:02:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.191
X-Spam-Level: 
X-Spam-Status: No, score=-4.191 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_FILL_THIS_FORM_SHORT=0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zDDkXomYIWtH; Wed, 29 May 2019 03:02:25 -0700 (PDT)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AF9E812002E; Wed, 29 May 2019 03:02:25 -0700 (PDT)
Received: from lhreml702-cah.china.huawei.com (unknown [172.18.7.108]) by Forcepoint Email with ESMTP id 5400CC6617639E4CEF93; Wed, 29 May 2019 11:02:23 +0100 (IST)
Received: from LHREML504-MBS.china.huawei.com ([10.201.109.59]) by lhreml702-cah.china.huawei.com ([10.201.108.43]) with mapi id 14.03.0415.000;  Wed, 29 May 2019 11:02:20 +0100
From: Italo Busi <Italo.Busi@huawei.com>
To: tom petch <ietfc@btconnect.com>, "netmod@ietf.org" <netmod@ietf.org>
CC: "teas@ietf.org" <teas@ietf.org>
Thread-Topic: [netmod] Key collision between configured and ephemeral list entries
Thread-Index: AQHVFfphMHsTseJ1T0S+porZBJo1ZKaB3nKA
Date: Wed, 29 May 2019 10:02:19 +0000
Message-ID: <91E3A1BD737FDF4FA14118387FF6766B2774DF6C@lhreml504-mbs>
References: <91E3A1BD737FDF4FA14118387FF6766B2774D314@lhreml504-mbs> <017f01d515f9$d0c662c0$4001a8c0@gateway.2wire.net>
In-Reply-To: <017f01d515f9$d0c662c0$4001a8c0@gateway.2wire.net>
Accept-Language: it-IT, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.203.246.126]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/fdnxBN0CMPIv4M-j0mzieN1HmNs>
Subject: Re: [netmod] Key collision between configured and ephemeral list entries
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 29 May 2019 10:02:29 -0000

Hi Tom,

Thanks for your reply

It seems to me that the text you have quoted is from: https://tools.ietf.or=
g/html/rfc7950#section-6.2

If I can understand correctly, especially for section 6.2.1, this constrain=
ts does not apply to name attributes whose syntax is defined as a string an=
d used as key of a list, such as the tunnel list defined in the TE YANG mod=
el:

     |  +--rw tunnel* [name]
     |  |  +--ro operational-state?                  identityref
     |  |  +--rw name                                string

My understanding is that a tunnel list entry with a name starting with '#' =
can exist in a YANG DS

Thanks, Italo

-----Original Message-----
From: tom petch [mailto:ietfc@btconnect.com]=20
Sent: mercoled=EC 29 maggio 2019 10:42
To: Italo Busi <Italo.Busi@huawei.com>; netmod@ietf.org
Cc: teas@ietf.org
Subject: Re: [netmod] Key collision between configured and ephemeral list e=
ntries

<inline>

Tom Petch

----- Original Message -----
From: "Italo Busi" <Italo.Busi@huawei.com>
To: <netmod@ietf.org>
Cc: <teas@ietf.org>
Sent: Monday, May 27, 2019 2:16 PM
Subject: [netmod] Key collision between configured and ephemeral list entri=
es


On Friday within the TEAS WG, we have discussed an issue which seems generi=
c and therefore agreed to ask for guidelines to the Netmod WG

In the TE YANG model we have defined a tunnel list with a name attribute us=
ed as a key:

     |  +--rw tunnel* [name]
     |  |  +--ro operational-state?                  identityref
     |  |  +--rw name                                string

See: https://tools.ietf.org/html/draft-ietf-teas-yang-te-21

The issue we are facing is how to avoid name collision between configured a=
nd ephemeral tunnels. In other words, the issue we are trying to address is=
 how to avoid the client to assign to a configured tunnel a name which have=
 been already assigned by the server to another ephemeral tunnel and vice-v=
ersa, in particular considering NMDA rules

We believe that the issue is generic and apply to any configured and epheme=
ral list entries

Has this issue been already discussed/resolved in Netmod WG?

If not, what is the Netmod WG opinion/suggestion? We are currently consider=
ing the following option:

   Use a special character for ephemeral names - e.g. such names always are=
 prepended by special character "#"
   Make the special character changeable by configuration - the default can=
 be "#" and user can change if they desire..

<tp>

If this is to conform with YANG 1.1, RFC7950, then the constraint is

   Identifiers are used to identify different kinds of YANG items by
   name.  Each identifier starts with an uppercase or lowercase ASCII
   letter or an underscore character, followed by zero or more ASCII
   letters, digits, underscore characters, hyphens, and dots.


No # (hash) anywhere so I suspect that a lot of tooling will fail in an unp=
redictable way if it encounters an illegal character in an identifier.

Tom Petch


Thanks, Italo

Italo Busi
Principal Optical Transport Network Research Engineer Huawei Technologies C=
o., Ltd.
Tel : +39 345 4721946
Email : italo.busi@huawei.com
[cid:image002.png@01D5149F.354EF420]

This e-mail and its attachments contain confidential information from HUAWE=
I, which is intended only for the person or entity whose address is listed =
above. Any use of the information contained herein in any way (including, b=
ut not limited to, total or partial disclosure, reproduction, or disseminat=
ion) by persons other than the intended
recipient(s) is prohibited. If you receive this e-mail in error, please not=
ify the sender by phone or email immediately and delete it!

From: Tarek Saad [mailto:tsaad.net@gmail.com]
Sent: venerd=EC 24 maggio 2019 23:13
To: Igor Bryskin <Igor.Bryskin@huawei.com>; Rakesh Gandhi <rgandhi@cisco.co=
m>; Xufeng <xufeng.liu.ietf@gmail.com>; Vishnu Pavan Beeram <vbeeram@junipe=
r.net>; Italo Busi <Italo.Busi@huawei.com>
Cc: teas@ietf.org
Subject: Discussion on modelling container TE tunnels in YANG

The team on "to" list met to discuss this subject topic. Notes from today's=
 discussion (please add if I missed):

Name collision between configured and ephemeral tunnels:
  This is a generic problem in NMDA.
  How to handle collisions between configured and ephemeral (or
auto-created) objects of a list, if the list uses the object (string
based) name as the key?
  Both configured and ephemeral can have the same object name but they are =
different objects - how to avoid such collision.
 Proposed solution:
   Option 1:
   Use a special character for ephemeral names - e.g. such names always are=
 prepended by special character "#"
   Make the special character changeable by configuration - the default can=
 be "#" and user can change if they desire..
  Others?
AI (Italo): to send email to netmod group.

Container TE tunnels discussion:
-          Container tunnels are grouping of tunnels between same 2
endpoints to share incoming traffic towards the egress
-          Member tunnels of a container tunnel can be
auto-created/deleted on-demand and controlled by thresholds specified under=
 the container
-          Some attributes may apply on the container tunnel and
inherited down to member tunnels of the container
-          Q: Should model allow member tunnel to override inherited
attributes from container tunnel?
-          Q: Should all auto-created member tunnels of a container have
the same prefix/suffix - i..e prefix/suffix can be configurable

Regards,
Tarek






------------------------------------------------------------------------
--------


> _______________________________________________
> netmod mailing list
> netmod@ietf.org
> https://www.ietf.org/mailman/listinfo/netmod
>


From nobody Wed May 29 04:04:11 2019
Return-Path: <ietfc@btconnect.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1489312008D; Wed, 29 May 2019 04:04:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.257
X-Spam-Level: 
X-Spam-Status: No, score=0.257 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RATWARE_MS_HASH=2.148, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_FILL_THIS_FORM_SHORT=0.01] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=btconnect.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Sj9vwqsGhfNE; Wed, 29 May 2019 04:04:01 -0700 (PDT)
Received: from EUR02-AM5-obe.outbound.protection.outlook.com (mail-eopbgr00093.outbound.protection.outlook.com [40.107.0.93]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DB0CD120106; Wed, 29 May 2019 04:04:00 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=btconnect.onmicrosoft.com; s=selector1-btconnect-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Z97l5tKHNXTjvTjWxKfAfxxbR++12uLLq+0cJMayAYc=; b=fSw0l5CF0komnE1psmVHVFwsfFC2tjcFukG2y0JbCwDihp1ywww10BiRg+XXgErd5nKQU3fHXCHdEj0Q06Xs6GgFX87z3nIYWZAWijDwlWy/0/1WRgJLxssoGaAX+tTvDyV6W+lRTNTyYJmVTo92iWpGBC6IRWk/z8c+qQadXlc=
Received: from VI1PR07MB3118.eurprd07.prod.outlook.com (10.175.242.156) by VI1PR07MB3917.eurprd07.prod.outlook.com (52.134.27.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1943.12; Wed, 29 May 2019 11:03:58 +0000
Received: from VI1PR07MB3118.eurprd07.prod.outlook.com ([fe80::7537:44ee:88c1:dd6d]) by VI1PR07MB3118.eurprd07.prod.outlook.com ([fe80::7537:44ee:88c1:dd6d%7]) with mapi id 15.20.1943.016; Wed, 29 May 2019 11:03:58 +0000
From: tom petch <ietfc@btconnect.com>
To: Italo Busi <Italo.Busi@huawei.com>, "netmod@ietf.org" <netmod@ietf.org>
CC: "teas@ietf.org" <teas@ietf.org>
Thread-Topic: [netmod] Key collision between configured and ephemeral list entries
Thread-Index: AQHVFfphMHsTseJ1T0S+porZBJo1ZA==
Date: Wed, 29 May 2019 11:03:58 +0000
Message-ID: <062401d5160d$a568ea80$4001a8c0@gateway.2wire.net>
References: <91E3A1BD737FDF4FA14118387FF6766B2774D314@lhreml504-mbs> <017f01d515f9$d0c662c0$4001a8c0@gateway.2wire.net> <91E3A1BD737FDF4FA14118387FF6766B2774DF6C@lhreml504-mbs>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-clientproxiedby: LO2P265CA0465.GBRP265.PROD.OUTLOOK.COM (2603:10a6:600:a2::21) To VI1PR07MB3118.eurprd07.prod.outlook.com (2603:10a6:802:20::28)
authentication-results: spf=none (sender IP is ) smtp.mailfrom=ietfc@btconnect.com; 
x-ms-exchange-messagesentrepresentingtype: 1
x-mailer: Microsoft Outlook Express 6.00.2800.1106
x-originating-ip: [86.139.215.234]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: c005375c-2029-4188-a2fe-08d6e42558c5
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(2017052603328)(7193020); SRVR:VI1PR07MB3917; 
x-ms-traffictypediagnostic: VI1PR07MB3917:
x-ms-exchange-purlcount: 3
x-microsoft-antispam-prvs: <VI1PR07MB3917722A1F6BB32DEAA78D59A01F0@VI1PR07MB3917.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-forefront-prvs: 0052308DC6
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(346002)(39860400002)(396003)(376002)(366004)(136003)(189003)(199004)(13464003)(1556002)(81166006)(6512007)(25786009)(2501003)(9686003)(316002)(6436002)(6306002)(6486002)(8936002)(68736007)(66946007)(110136005)(7736002)(305945005)(8676002)(81686011)(14496001)(14444005)(76176011)(81156014)(44736005)(186003)(5024004)(52116002)(81816011)(446003)(73956011)(84392002)(4720700003)(2906002)(229853002)(64756008)(66446008)(66556008)(66476007)(61296003)(256004)(26005)(6506007)(53936002)(966005)(14454004)(478600001)(66066001)(4326008)(62236002)(99286004)(476003)(44716002)(486006)(3846002)(6116002)(102836004)(86362001)(50226002)(71200400001)(71190400001)(6246003)(386003)(5660300002)(53546011)(74416001)(7726001); DIR:OUT; SFP:1102; SCL:1; SRVR:VI1PR07MB3917; H:VI1PR07MB3118.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:0; 
received-spf: None (protection.outlook.com: btconnect.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: otyiYDy+aTZ8lmhXgJiflYIecMie+6cUknv2FKofadiMHrfsDeFnF+IbIhXc64P7UiJc6V4sV0blfH/pM7ifF6EOpmtaBpDVjn9f2bCnvLIXUuoAOKw48ovMm3xjfnnf6o7AyVHWY+wXHao7O4vRUBgjBMGvwnzGUBWPpnngstqqqgLRjVTXNX4yAqYq+4zYXYvP6tN8fGYu6Lt9qAZqDR8Ys+Dhqm7tS30O3fmj21CzWwBejzXzH7QIFua4TO4uO7+RLB+9LY7eSAdmtjcyfIopVDkf7jXqhB9MlptyEDgN+IGQC7zNS/vBsE2ZFjgqfW6PHbauxlkR6m99acKasoaE/Dv+ltXcLbq6MIrwwINJfA0c9nk6OOoIlQTv+1qpEhXmNQf8b4fL7JZ8jglK6fXSMJXp/Hzj1qDkEokAt+E=
Content-Type: text/plain; charset="iso-8859-1"
Content-ID: <13E561767C4BA6458AC81121AB1B6E76@eurprd07.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: btconnect.com
X-MS-Exchange-CrossTenant-Network-Message-Id: c005375c-2029-4188-a2fe-08d6e42558c5
X-MS-Exchange-CrossTenant-originalarrivaltime: 29 May 2019 11:03:58.3818 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: cf8853ed-96e5-465b-9185-806bfe185e30
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: ietfc@btconnect.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR07MB3917
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/XH-doLABxv6-Xu2FrMoh8WERhPM>
Subject: Re: [netmod] Key collision between configured and ephemeral list entries
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 29 May 2019 11:04:03 -0000

----- Original Message -----
From: "Italo Busi" <Italo.Busi@huawei.com>
Sent: Wednesday, May 29, 2019 11:02 AM

Hi Tom,

Thanks for your reply

It seems to me that the text you have quoted is from:
https://tools.ietf.org/html/rfc7950#section-6.2

If I can understand correctly, especially for section 6.2.1, this
constraints does not apply to name attributes whose syntax is defined as
a string and used as key of a list, such as the tunnel list defined in
the TE YANG model:

     |  +--rw tunnel* [name]
     |  |  +--ro operational-state?                  identityref
     |  |  +--rw name                                string

My understanding is that a tunnel list entry with a name starting with
'#' can exist in a YANG DS

<tp>

Italo

Ah yes, my misunderstanding.  'string' type is a bit more flexible i.e.

   The string built-in type represents human-readable strings in YANG.
   Legal characters are the Unicode and ISO/IEC 10646 [ISO.10646]
   characters, including tab, carriage return, and line feed but
   excluding the other C0 control characters, the surrogate blocks, and
   the noncharacters.

Plenty of scope there!


If this approach is taken, then I agree that hash is a good choice as it
stands out, unlike, say, underscore which vanishes in the line of text.

Tom Petch

Thanks, Italo

-----Original Message-----
From: tom petch [mailto:ietfc@btconnect.com]
Sent: mercoled=EC 29 maggio 2019 10:42
To: Italo Busi <Italo.Busi@huawei.com>; netmod@ietf.org
Cc: teas@ietf.org
Subject: Re: [netmod] Key collision between configured and ephemeral
list entries

<inline>

Tom Petch

----- Original Message -----
From: "Italo Busi" <Italo.Busi@huawei.com>
To: <netmod@ietf.org>
Cc: <teas@ietf.org>
Sent: Monday, May 27, 2019 2:16 PM
Subject: [netmod] Key collision between configured and ephemeral list
entries


On Friday within the TEAS WG, we have discussed an issue which seems
generic and therefore agreed to ask for guidelines to the Netmod WG

In the TE YANG model we have defined a tunnel list with a name attribute
used as a key:

     |  +--rw tunnel* [name]
     |  |  +--ro operational-state?                  identityref
     |  |  +--rw name                                string

See: https://tools.ietf.org/html/draft-ietf-teas-yang-te-21

The issue we are facing is how to avoid name collision between
configured and ephemeral tunnels. In other words, the issue we are
trying to address is how to avoid the client to assign to a configured
tunnel a name which have been already assigned by the server to another
ephemeral tunnel and vice-versa, in particular considering NMDA rules

We believe that the issue is generic and apply to any configured and
ephemeral list entries

Has this issue been already discussed/resolved in Netmod WG?

If not, what is the Netmod WG opinion/suggestion? We are currently
considering the following option:

   Use a special character for ephemeral names - e.g. such names always
are prepended by special character "#"
   Make the special character changeable by configuration - the default
can be "#" and user can change if they desire..

<tp>

If this is to conform with YANG 1.1, RFC7950, then the constraint is

   Identifiers are used to identify different kinds of YANG items by
   name.  Each identifier starts with an uppercase or lowercase ASCII
   letter or an underscore character, followed by zero or more ASCII
   letters, digits, underscore characters, hyphens, and dots.


No # (hash) anywhere so I suspect that a lot of tooling will fail in an
unpredictable way if it encounters an illegal character in an
identifier.

Tom Petch


Thanks, Italo

Italo Busi
Principal Optical Transport Network Research Engineer Huawei
Technologies Co., Ltd.
Tel : +39 345 4721946
Email : italo.busi@huawei.com
[cid:image002.png@01D5149F.354EF420]

This e-mail and its attachments contain confidential information from
HUAWEI, which is intended only for the person or entity whose address is
listed above. Any use of the information contained herein in any way
(including, but not limited to, total or partial disclosure,
reproduction, or dissemination) by persons other than the intended
recipient(s) is prohibited. If you receive this e-mail in error, please
notify the sender by phone or email immediately and delete it!

From: Tarek Saad [mailto:tsaad.net@gmail.com]
Sent: venerd=EC 24 maggio 2019 23:13
To: Igor Bryskin <Igor.Bryskin@huawei.com>; Rakesh Gandhi
<rgandhi@cisco.com>; Xufeng <xufeng.liu.ietf@gmail.com>; Vishnu Pavan
Beeram <vbeeram@juniper.net>; Italo Busi <Italo.Busi@huawei.com>
Cc: teas@ietf.org
Subject: Discussion on modelling container TE tunnels in YANG

The team on "to" list met to discuss this subject topic. Notes from
today's discussion (please add if I missed):

Name collision between configured and ephemeral tunnels:
  This is a generic problem in NMDA.
  How to handle collisions between configured and ephemeral (or
auto-created) objects of a list, if the list uses the object (string
based) name as the key?
  Both configured and ephemeral can have the same object name but they
are different objects - how to avoid such collision.
 Proposed solution:
   Option 1:
   Use a special character for ephemeral names - e.g. such names always
are prepended by special character "#"
   Make the special character changeable by configuration - the default
can be "#" and user can change if they desire..
  Others?
AI (Italo): to send email to netmod group.

Container TE tunnels discussion:
-          Container tunnels are grouping of tunnels between same 2
endpoints to share incoming traffic towards the egress
-          Member tunnels of a container tunnel can be
auto-created/deleted on-demand and controlled by thresholds specified
under the container
-          Some attributes may apply on the container tunnel and
inherited down to member tunnels of the container
-          Q: Should model allow member tunnel to override inherited
attributes from container tunnel?
-          Q: Should all auto-created member tunnels of a container have
the same prefix/suffix - i..e prefix/suffix can be configurable

Regards,
Tarek






------------------------------------------------------------------------
--------


> _______________________________________________
> netmod mailing list
> netmod@ietf.org
> https://www.ietf.org/mailman/listinfo/netmod
>


From nobody Wed May 29 06:02:23 2019
Return-Path: <Italo.Busi@huawei.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5335F120192; Wed, 29 May 2019 06:02:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.19
X-Spam-Level: 
X-Spam-Status: No, score=-4.19 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_FILL_THIS_FORM_SHORT=0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wZTabHAJcC9l; Wed, 29 May 2019 06:02:06 -0700 (PDT)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 04AAA120140; Wed, 29 May 2019 06:02:06 -0700 (PDT)
Received: from LHREML714-CAH.china.huawei.com (unknown [172.18.7.107]) by Forcepoint Email with ESMTP id 1CB52C755E9A04CE5706; Wed, 29 May 2019 14:02:04 +0100 (IST)
Received: from LHREML504-MBS.china.huawei.com ([10.201.109.59]) by LHREML714-CAH.china.huawei.com ([10.201.108.37]) with mapi id 14.03.0415.000;  Wed, 29 May 2019 14:02:03 +0100
From: Italo Busi <Italo.Busi@huawei.com>
To: Kent Watsen <kent@watsen.net>
CC: Lou Berger <lberger@labn.net>, "netmod@ietf.org" <netmod@ietf.org>, "netmod-chairs@ietf.org" <netmod-chairs@ietf.org>
Thread-Topic: [netmod] WG Last Call: draft-ietf-netmod-artwork-folding-02
Thread-Index: AQHVCSaY+iCIbhU/PESy/n6QJGx4eqZ6EnSggAU1uACAAVcTMIAAJMqAgAFnCNA=
Date: Wed, 29 May 2019 13:02:02 +0000
Message-ID: <91E3A1BD737FDF4FA14118387FF6766B2774E2B7@lhreml504-mbs>
References: <e6fc4541-891a-60cb-e956-86f238d09f14@labn.net> <91E3A1BD737FDF4FA14118387FF6766B2774C768@lhreml504-mbs> <0100016afa70796c-314cbf69-755f-4ae2-b83a-d53507714c69-000000@email.amazonses.com> <91E3A1BD737FDF4FA14118387FF6766B2774DA44@lhreml504-mbs> <0100016aff4d355e-f638b0c7-02de-481c-9153-f79023bcaa7d-000000@email.amazonses.com>
In-Reply-To: <0100016aff4d355e-f638b0c7-02de-481c-9153-f79023bcaa7d-000000@email.amazonses.com>
Accept-Language: it-IT, en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
x-originating-ip: [10.203.246.126]
Content-Type: multipart/related; boundary="_004_91E3A1BD737FDF4FA14118387FF6766B2774E2B7lhreml504mbs_"; type="multipart/alternative"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/PrzVblm3dt8Z-BcDOhip1bZZaZ4>
Subject: Re: [netmod] WG Last Call: draft-ietf-netmod-artwork-folding-02
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 29 May 2019 13:02:22 -0000

--_004_91E3A1BD737FDF4FA14118387FF6766B2774E2B7lhreml504mbs_
Content-Type: multipart/alternative;
 boundary="_000_91E3A1BD737FDF4FA14118387FF6766B2774E2B7lhreml504mbs_"

--_000_91E3A1BD737FDF4FA14118387FF6766B2774E2B7lhreml504mbs_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_91E3A1BD737FDF4FA14118387FF6766B2774E2B7lhreml504mbs_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64

PGh0bWwgeG1sbnM6dj0idXJuOnNjaGVtYXMtbWljcm9zb2Z0LWNvbTp2bWwiIHhtbG5zOm89InVy
bjpzY2hlbWFzLW1pY3Jvc29mdC1jb206b2ZmaWNlOm9mZmljZSIgeG1sbnM6dz0idXJuOnNjaGVt
YXMtbWljcm9zb2Z0LWNvbTpvZmZpY2U6d29yZCIgeG1sbnM6bT0iaHR0cDovL3NjaGVtYXMubWlj
cm9zb2Z0LmNvbS9vZmZpY2UvMjAwNC8xMi9vbW1sIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcv
VFIvUkVDLWh0bWw0MCI+DQo8aGVhZD4NCjxtZXRhIGh0dHAtZXF1aXY9IkNvbnRlbnQtVHlwZSIg
Y29udGVudD0idGV4dC9odG1sOyBjaGFyc2V0PXV0Zi04Ij4NCjxtZXRhIG5hbWU9IkdlbmVyYXRv
ciIgY29udGVudD0iTWljcm9zb2Z0IFdvcmQgMTUgKGZpbHRlcmVkIG1lZGl1bSkiPg0KPCEtLVtp
ZiAhbXNvXT48c3R5bGU+dlw6KiB7YmVoYXZpb3I6dXJsKCNkZWZhdWx0I1ZNTCk7fQ0Kb1w6KiB7
YmVoYXZpb3I6dXJsKCNkZWZhdWx0I1ZNTCk7fQ0Kd1w6KiB7YmVoYXZpb3I6dXJsKCNkZWZhdWx0
I1ZNTCk7fQ0KLnNoYXBlIHtiZWhhdmlvcjp1cmwoI2RlZmF1bHQjVk1MKTt9DQo8L3N0eWxlPjwh
W2VuZGlmXS0tPjxzdHlsZT48IS0tDQovKiBGb250IERlZmluaXRpb25zICovDQpAZm9udC1mYWNl
DQoJe2ZvbnQtZmFtaWx5OlNpbVN1bjsNCglwYW5vc2UtMToyIDEgNiAwIDMgMSAxIDEgMSAxO30N
CkBmb250LWZhY2UNCgl7Zm9udC1mYW1pbHk6UE1pbmdMaVU7DQoJcGFub3NlLTE6MiAxIDYgMSAw
IDEgMSAxIDEgMTt9DQpAZm9udC1mYWNlDQoJe2ZvbnQtZmFtaWx5OiJDYW1icmlhIE1hdGgiOw0K
CXBhbm9zZS0xOjIgNCA1IDMgNSA0IDYgMyAyIDQ7fQ0KQGZvbnQtZmFjZQ0KCXtmb250LWZhbWls
eTpDYWxpYnJpOw0KCXBhbm9zZS0xOjIgMTUgNSAyIDIgMiA0IDMgMiA0O30NCkBmb250LWZhY2UN
Cgl7Zm9udC1mYW1pbHk6IlxAU2ltU3VuIjsNCglwYW5vc2UtMToyIDEgNiAwIDMgMSAxIDEgMSAx
O30NCkBmb250LWZhY2UNCgl7Zm9udC1mYW1pbHk6IlBpbmdGYW5nIFRDIjt9DQpAZm9udC1mYWNl
DQoJe2ZvbnQtZmFtaWx5OiJcQFBNaW5nTGlVIjsNCglwYW5vc2UtMTowIDAgMCAwIDAgMCAwIDAg
MCAwO30NCkBmb250LWZhY2UNCgl7Zm9udC1mYW1pbHk6IlxAUGluZ0ZhbmcgVEMiO30NCkBmb250
LWZhY2UNCgl7Zm9udC1mYW1pbHk6Ik1pY3Jvc29mdCBZYUhlaSI7DQoJcGFub3NlLTE6MiAxMSA1
IDMgMiAyIDQgMiAyIDQ7fQ0KQGZvbnQtZmFjZQ0KCXtmb250LWZhbWlseToiXEBNaWNyb3NvZnQg
WWFIZWkiOw0KCXBhbm9zZS0xOjIgMTEgNSAzIDIgMiA0IDIgMiA0O30NCi8qIFN0eWxlIERlZmlu
aXRpb25zICovDQpwLk1zb05vcm1hbCwgbGkuTXNvTm9ybWFsLCBkaXYuTXNvTm9ybWFsDQoJe21h
cmdpbjowY207DQoJbWFyZ2luLWJvdHRvbTouMDAwMXB0Ow0KCWZvbnQtc2l6ZToxMi4wcHQ7DQoJ
Zm9udC1mYW1pbHk6IlRpbWVzIE5ldyBSb21hbiIsc2VyaWY7fQ0KYTpsaW5rLCBzcGFuLk1zb0h5
cGVybGluaw0KCXttc28tc3R5bGUtcHJpb3JpdHk6OTk7DQoJY29sb3I6Ymx1ZTsNCgl0ZXh0LWRl
Y29yYXRpb246dW5kZXJsaW5lO30NCmE6dmlzaXRlZCwgc3Bhbi5Nc29IeXBlcmxpbmtGb2xsb3dl
ZA0KCXttc28tc3R5bGUtcHJpb3JpdHk6OTk7DQoJY29sb3I6cHVycGxlOw0KCXRleHQtZGVjb3Jh
dGlvbjp1bmRlcmxpbmU7fQ0Kc3Bhbi5hcHBsZS1jb252ZXJ0ZWQtc3BhY2UNCgl7bXNvLXN0eWxl
LW5hbWU6YXBwbGUtY29udmVydGVkLXNwYWNlO30NCnNwYW4uRW1haWxTdHlsZTE4DQoJe21zby1z
dHlsZS10eXBlOnBlcnNvbmFsLXJlcGx5Ow0KCWZvbnQtZmFtaWx5OiJDYWxpYnJpIixzYW5zLXNl
cmlmOw0KCWNvbG9yOiMxRjQ5N0Q7fQ0KLk1zb0NocERlZmF1bHQNCgl7bXNvLXN0eWxlLXR5cGU6
ZXhwb3J0LW9ubHk7DQoJZm9udC1zaXplOjEwLjBwdDt9DQpAcGFnZSBXb3JkU2VjdGlvbjENCgl7
c2l6ZTo2MTIuMHB0IDc5Mi4wcHQ7DQoJbWFyZ2luOjcyLjBwdCA3Mi4wcHQgNzIuMHB0IDcyLjBw
dDt9DQpkaXYuV29yZFNlY3Rpb24xDQoJe3BhZ2U6V29yZFNlY3Rpb24xO30NCi0tPjwvc3R5bGU+
PCEtLVtpZiBndGUgbXNvIDldPjx4bWw+DQo8bzpzaGFwZWRlZmF1bHRzIHY6ZXh0PSJlZGl0IiBz
cGlkbWF4PSIxMDI2IiAvPg0KPC94bWw+PCFbZW5kaWZdLS0+PCEtLVtpZiBndGUgbXNvIDldPjx4
bWw+DQo8bzpzaGFwZWxheW91dCB2OmV4dD0iZWRpdCI+DQo8bzppZG1hcCB2OmV4dD0iZWRpdCIg
ZGF0YT0iMSIgLz4NCjwvbzpzaGFwZWxheW91dD48L3htbD48IVtlbmRpZl0tLT4NCjwvaGVhZD4N
Cjxib2R5IGxhbmc9IkVOLVVTIiBsaW5rPSJibHVlIiB2bGluaz0icHVycGxlIj4NCjxkaXYgY2xh
c3M9IldvcmRTZWN0aW9uMSI+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48YSBuYW1lPSJfTWFpbEVu
ZENvbXBvc2UiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90
O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0OTdEIj5JdCBsb29rcyB2ZXJ5IGdv
b2QgdG8gbWU8bzpwPjwvbzpwPjwvc3Bhbj48L2E+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+
PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZx
dW90OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5N0QiPjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwv
cD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2Zv
bnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0OTdEIj5U
aGFua3MsIEl0YWxvPG86cD48L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+
PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZx
dW90OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5N0QiPjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwv
cD4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibGluZS1oZWlnaHQ6MTUwJSI+
PGI+PHNwYW4gc3R5bGU9ImZvbnQtZmFtaWx5OiZxdW90O01pY3Jvc29mdCBZYUhlaSZxdW90Oyxz
YW5zLXNlcmlmO2NvbG9yOiMxRjQ5N0Q7bXNvLWZhcmVhc3QtbGFuZ3VhZ2U6RU4tVVMiPkl0YWxv
IEJ1c2k8L3NwYW4+PC9iPjxiPjxzcGFuIHN0eWxlPSJmb250LWZhbWlseTomcXVvdDtDYWxpYnJp
JnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3RDttc28tZmFyZWFzdC1sYW5ndWFnZTpFTi1V
UyI+DQo8bzpwPjwvbzpwPjwvc3Bhbj48L2I+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNw
YW4gc3R5bGU9ImZvbnQtc2l6ZToxMC4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7TWljcm9zb2Z0IFlh
SGVpJnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3RDttc28tZmFyZWFzdC1sYW5ndWFnZTpF
Ti1VUyI+UHJpbmNpcGFsJm5ic3A7T3B0aWNhbCZuYnNwO1RyYW5zcG9ydCZuYnNwO05ldHdvcmsm
bmJzcDtSZXNlYXJjaCZuYnNwO0VuZ2luZWVyPC9zcGFuPjxzcGFuIHN0eWxlPSJmb250LWZhbWls
eTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3RDttc28tZmFyZWFz
dC1sYW5ndWFnZTpFTi1VUyI+PG86cD48L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05v
cm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMC4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7TWlj
cm9zb2Z0IFlhSGVpJnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3RDttc28tZmFyZWFzdC1s
YW5ndWFnZTpFTi1VUyI+SHVhd2VpJm5ic3A7VGVjaG5vbG9naWVzJm5ic3A7Q28uLCZuYnNwO0x0
ZC48L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fu
cy1zZXJpZjtjb2xvcjojMUY0OTdEO21zby1mYXJlYXN0LWxhbmd1YWdlOkVOLVVTIj48bzpwPjwv
bzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1z
aXplOjEwLjBwdDtmb250LWZhbWlseTomcXVvdDtNaWNyb3NvZnQgWWFIZWkmcXVvdDssc2Fucy1z
ZXJpZjtjb2xvcjojMUY0OTdEO21zby1mYXJlYXN0LWxhbmd1YWdlOkVOLVVTIj5UZWwmbmJzcDs6
Jm5ic3A7JiM0MzszOSZuYnNwOzM0NSZuYnNwOzQ3MjE5NDY8L3NwYW4+PHNwYW4gc3R5bGU9ImZv
bnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0OTdEO21z
by1mYXJlYXN0LWxhbmd1YWdlOkVOLVVTIj48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFz
cz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjBwdDtmb250LWZhbWlseTom
cXVvdDtNaWNyb3NvZnQgWWFIZWkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0OTdEO21zby1m
YXJlYXN0LWxhbmd1YWdlOkVOLVVTIj5FbWFpbCZuYnNwOzombmJzcDtpdGFsby5idXNpQGh1YXdl
aS5jb20NCjwvc3Bhbj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjBwdDtmb250LWZhbWlseTom
cXVvdDtNaWNyb3NvZnQgWWFIZWkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0OTdEO21zby1m
YXJlYXN0LWxhbmd1YWdlOlpILVRXIj48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0i
TXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90Oyxz
YW5zLXNlcmlmO2NvbG9yOiMxRjQ5N0QiPjxpbWcgd2lkdGg9IjIwOCIgaGVpZ2h0PSIxNjMiIGlk
PSJNX3gwMDNjX0ZfeDAwMmNfX3gwMDIwXzciIHNyYz0iY2lkOmltYWdlMDAxLnBuZ0AwMUQ1MTYy
Ri43Nzk3RDFEMCI+PC9zcGFuPjxzcGFuIHN0eWxlPSJmb250LXNpemU6Ny41cHQ7Zm9udC1mYW1p
bHk6JnF1b3Q7QXJpYWwmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojQkZCRkJGO21zby1mYXJlYXN0
LWxhbmd1YWdlOlpILVRXIj48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9y
bWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjcuNXB0O2ZvbnQtZmFtaWx5OiZxdW90O0FyaWFs
JnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6I0JGQkZCRjttc28tZmFyZWFzdC1sYW5ndWFnZTpaSC1U
VyI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNw
YW4gc3R5bGU9ImZvbnQtc2l6ZTo3LjVwdDtmb250LWZhbWlseTomcXVvdDtBcmlhbCZxdW90Oyxz
YW5zLXNlcmlmO2NvbG9yOiNCRkJGQkY7bXNvLWZhcmVhc3QtbGFuZ3VhZ2U6WkgtVFciPlRoaXMg
ZS1tYWlsIGFuZCBpdHMgYXR0YWNobWVudHMgY29udGFpbiBjb25maWRlbnRpYWwgaW5mb3JtYXRp
b24gZnJvbSBIVUFXRUksIHdoaWNoIGlzIGludGVuZGVkIG9ubHkgZm9yIHRoZSBwZXJzb24gb3Ig
ZW50aXR5IHdob3NlIGFkZHJlc3MNCiBpcyBsaXN0ZWQgYWJvdmUuIEFueSB1c2Ugb2YgdGhlIGlu
Zm9ybWF0aW9uIGNvbnRhaW5lZCBoZXJlaW4gaW4gYW55IHdheSAoaW5jbHVkaW5nLCBidXQgbm90
IGxpbWl0ZWQgdG8sIHRvdGFsIG9yIHBhcnRpYWwgZGlzY2xvc3VyZSwgcmVwcm9kdWN0aW9uLCBv
ciBkaXNzZW1pbmF0aW9uKSBieSBwZXJzb25zIG90aGVyIHRoYW4gdGhlIGludGVuZGVkIHJlY2lw
aWVudChzKSBpcyBwcm9oaWJpdGVkLiBJZiB5b3UgcmVjZWl2ZSB0aGlzIGUtbWFpbCBpbg0KIGVy
cm9yLCBwbGVhc2Ugbm90aWZ5IHRoZSBzZW5kZXIgYnkgcGhvbmUgb3IgZW1haWwgaW1tZWRpYXRl
bHkgYW5kIGRlbGV0ZSBpdCE8L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQtZmFtaWx5OiZxdW90O0Nh
bGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0OTdEIj48bzpwPjwvbzpwPjwvc3Bhbj48
L3A+DQo8L2Rpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6
MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjoj
MUY0OTdEIj48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+DQo8ZGl2Pg0KPGRpdiBzdHlsZT0i
Ym9yZGVyOm5vbmU7Ym9yZGVyLXRvcDpzb2xpZCAjRTFFMUUxIDEuMHB0O3BhZGRpbmc6My4wcHQg
MGNtIDBjbSAwY20iPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PGI+PHNwYW4gc3R5bGU9ImZvbnQt
c2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj5G
cm9tOjwvc3Bhbj48L2I+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6
JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj4gS2VudCBXYXRzZW4gW21haWx0bzprZW50
QHdhdHNlbi5uZXRdDQo8YnI+DQo8Yj5TZW50OjwvYj4gbWFydGVkw6wgMjggbWFnZ2lvIDIwMTkg
MTg6Mzc8YnI+DQo8Yj5Ubzo8L2I+IEl0YWxvIEJ1c2kgJmx0O0l0YWxvLkJ1c2lAaHVhd2VpLmNv
bSZndDs8YnI+DQo8Yj5DYzo8L2I+IExvdSBCZXJnZXIgJmx0O2xiZXJnZXJAbGFibi5uZXQmZ3Q7
OyBuZXRtb2RAaWV0Zi5vcmc7IG5ldG1vZC1jaGFpcnNAaWV0Zi5vcmc8YnI+DQo8Yj5TdWJqZWN0
OjwvYj4gUmU6IFtuZXRtb2RdIFdHIExhc3QgQ2FsbDogZHJhZnQtaWV0Zi1uZXRtb2QtYXJ0d29y
ay1mb2xkaW5nLTAyPG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8L2Rpdj4NCjxwIGNs
YXNzPSJNc29Ob3JtYWwiPjxvOnA+Jm5ic3A7PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1h
bCI+SGkgSXRhbG8sPG86cD48L286cD48L3A+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+
PG86cD4mbmJzcDs8L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFs
Ij5UaGFuayB5b3UgZm9yIHRoZSB0ZXh0IHN1Z2dlc3Rpb24sIEkgbGFuZGVkIG9uIHRoZSBmb2xs
b3dpbmcgdGV4dDo8bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29O
b3JtYWwiPjxvOnA+Jm5ic3A7PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPGRpdj4NCjxwIGNs
YXNzPSJNc29Ob3JtYWwiPiZuYnNwOyAmbmJzcDtGb3IgcmVhZGFiaWxpdHkgcHVycG9zZXMsIHRo
aXMgc2NyaXB0IGZvcmNlcyB0aGUgbWluaW1hbGx5IHN1cHBvcnRlZDxvOnA+PC9vOnA+PC9wPg0K
PC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+Jm5ic3A7ICZuYnNwO2xpbmUgbGVu
Z3RoIHRvIGJlIGVpZ2h0IGNoYXJhY3RlcnMgbG9uZ2VyIHRoYW4gdGhlIHJhdyBoZWFkZXIgdGV4
dDxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+Jm5i
c3A7ICZuYnNwO2RlZmluZWQgaW4gU2VjdGlvbiA3LjEuMSBhbmQgU2VjdGlvbiA4LjEuMSBzbyBh
cyB0byBlbnN1cmUgdGhhdCB0aGU8bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNs
YXNzPSJNc29Ob3JtYWwiPiZuYnNwOyAmbmJzcDtoZWFkZXIgY2FuIGJlIHdyYXBwZWQgYnkgYSBz
cGFjZSAoJyAnKSBjaGFyYWN0ZXIgYW5kIHRocmVlIGVxdWFsPG86cD48L286cD48L3A+DQo8L2Rp
dj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj4mbmJzcDsgJm5ic3A7KCc9JykgY2hhcmFj
dGVycyBvbiBlYWNoIHNpZGUgb2YgdGhlIHJhdyBoZWFkZXIgdGV4dC48bzpwPjwvbzpwPjwvcD4N
CjwvZGl2Pg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PG86cD4mbmJzcDs8
L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj5LZW50IC8vIGF1
dGhvcjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+
PG86cD4mbmJzcDs8L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFs
Ij48bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3Jt
YWwiPjxvOnA+Jm5ic3A7PC9vOnA+PC9wPg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxi
cj4NCjxicj4NCjxvOnA+PC9vOnA+PC9wPg0KPGJsb2NrcXVvdGUgc3R5bGU9Im1hcmdpbi10b3A6
NS4wcHQ7bWFyZ2luLWJvdHRvbTo1LjBwdCI+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+
T24gTWF5IDI4LCAyMDE5LCBhdCA5OjMzIEFNLCBJdGFsbyBCdXNpICZsdDs8YSBocmVmPSJtYWls
dG86SXRhbG8uQnVzaUBodWF3ZWkuY29tIj5JdGFsby5CdXNpQGh1YXdlaS5jb208L2E+Jmd0OyB3
cm90ZTo8bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PG86cD4m
bmJzcDs8L286cD48L3A+DQo8ZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFu
IHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDss
c2Fucy1zZXJpZjtjb2xvcjojMUY0OTdEIj5IaSBLZW50LDwvc3Bhbj48bzpwPjwvbzpwPjwvcD4N
CjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNp
emU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xv
cjojMUY0OTdEIj4mbmJzcDs8L3NwYW4+PG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8
cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZh
bWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+VGhhbmtz
IGZvciB5b3VyIHJlcGx5PC9zcGFuPjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAg
Y2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1p
bHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5N0QiPiZuYnNwOzwv
c3Bhbj48bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwi
PjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkm
cXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0OTdEIj5Gb3Igd2hhdCBJIGFtIGNvbmNlcm5lZCwg
dGhlIGNsYXJpZmljYXRpb24geW91IGhhdmUgcHJvdmlkZWQgaXMgc3VmZmljaWVudCB0byBtZSAo
bm8gbmVlZCB0byBjaGFuZ2UgdGhlIGNvZGUpPC9zcGFuPjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+
DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4w
cHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5
N0QiPiZuYnNwOzwvc3Bhbj48bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNz
PSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZx
dW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0OTdEIj5Zb3UgbWlnaHQgYWxz
byBjb25zaWRlciBhZGRpbmcgc2ltaWxhciB0ZXh0IGF0IHRoZSBiZWdpbm5pbmcgb2YgQXBwZW5k
aXggQSwgaWYgeW91IHRoaW5rIHRoaXMgaGVscHMuIFNvbWV0aGluZyBhbG9uZyB0aGUgbGluZTo8
L3NwYW4+PG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFs
Ij48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJp
JnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+Jm5ic3A7PC9zcGFuPjxvOnA+PC9vOnA+
PC9wPg0KPC9kaXY+DQo8ZGl2IHN0eWxlPSJtYXJnaW4tbGVmdDozNi4wcHQiPg0KPHAgY2xhc3M9
Ik1zb05vcm1hbCI+VGhlIHNjcmlwdCBmb3JjZXMgdGhlIGRlc2lyZWQgbWF4aW11bSBsaW5lIGxl
bmd0aCB0byBiZSBhIGJpdCBsb25nZXIgdGhhbiB0aGUgcmF3IGhlYWRlciB0ZXh0IGRlZmluZWQg
aW4gc2VjdGlvbnMgNyBhbmQgOCwgdG8gZnVydGhlciBlbnN1cmUgdGhhdCB0aGUgaGVhZGVyIHdp
bGwgYWx3YXlzIGhhdmUgc29tZSAnPScgY2hhcmFjdGVycyB3cmFwcGluZyBhcm91bmQgdGhlIGhl
YWRlciwgZm9yIHJlYWRhYmlsaXR5LA0KIGluIHRoZSB1bmxpa2VseSBzY2VuYXJpbyB0aGF0IHN1
Y2ggYSBuYXJyb3ctd2lkdGggaXMgbmVlZGVkLjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2
Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9u
dC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5N0QiPiZu
YnNwOzwvc3Bhbj48bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29O
b3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0Nh
bGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0OTdEIj5JdGFsbzwvc3Bhbj48bzpwPjwv
bzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxl
PSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1z
ZXJpZjtjb2xvcjojMUY0OTdEIj4mbmJzcDs8L3NwYW4+PG86cD48L286cD48L3A+DQo8L2Rpdj4N
CjxkaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9ImxpbmUtaGVpZ2h0OjE4
LjBwdCI+PGI+PHNwYW4gc3R5bGU9ImZvbnQtZmFtaWx5OiZxdW90O01pY3Jvc29mdCBZYUhlaSZx
dW90OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5N0QiPkl0YWxvIEJ1c2k8L3NwYW4+PC9iPjxvOnA+
PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5
bGU9ImZvbnQtc2l6ZToxMC4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7TWljcm9zb2Z0IFlhSGVpJnF1
b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+UHJpbmNpcGFsJm5ic3A7T3B0aWNhbCZuYnNw
O1RyYW5zcG9ydCZuYnNwO05ldHdvcmsmbmJzcDtSZXNlYXJjaCZuYnNwO0VuZ2luZWVyPC9zcGFu
PjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNw
YW4gc3R5bGU9ImZvbnQtc2l6ZToxMC4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7TWljcm9zb2Z0IFlh
SGVpJnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+SHVhd2VpJm5ic3A7VGVjaG5vbG9n
aWVzJm5ic3A7Q28uLCZuYnNwO0x0ZC48L3NwYW4+PG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxk
aXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjBwdDtm
b250LWZhbWlseTomcXVvdDtNaWNyb3NvZnQgWWFIZWkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjoj
MUY0OTdEIj5UZWwmbmJzcDs6Jm5ic3A7JiM0MzszOSZuYnNwOzM0NSZuYnNwOzQ3MjE5NDY8L3Nw
YW4+PG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48
c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjBwdDtmb250LWZhbWlseTomcXVvdDtNaWNyb3NvZnQg
WWFIZWkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0OTdEIj5FbWFpbCZuYnNwOzombmJzcDs8
YSBocmVmPSJtYWlsdG86aXRhbG8uYnVzaUBodWF3ZWkuY29tIj48c3BhbiBzdHlsZT0iY29sb3I6
Izk1NEY3MiI+aXRhbG8uYnVzaUBodWF3ZWkuY29tPC9zcGFuPjwvYT48L3NwYW4+PG86cD48L286
cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0i
Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5N0Qi
PiZsdDtpbWFnZTAwMy5wbmcmZ3Q7PC9zcGFuPjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2
Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZTo3LjVwdDtmb250
LWZhbWlseTomcXVvdDtBcmlhbCZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiNCRkJGQkYiPiZuYnNw
Ozwvc3Bhbj48bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3Jt
YWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6Ny41cHQ7Zm9udC1mYW1pbHk6JnF1b3Q7QXJpYWwm
cXVvdDssc2Fucy1zZXJpZjtjb2xvcjojQkZCRkJGIj5UaGlzIGUtbWFpbCBhbmQgaXRzIGF0dGFj
aG1lbnRzIGNvbnRhaW4gY29uZmlkZW50aWFsIGluZm9ybWF0aW9uIGZyb20gSFVBV0VJLCB3aGlj
aCBpcyBpbnRlbmRlZCBvbmx5IGZvciB0aGUgcGVyc29uIG9yIGVudGl0eSB3aG9zZSBhZGRyZXNz
IGlzIGxpc3RlZCBhYm92ZS4gQW55DQogdXNlIG9mIHRoZSBpbmZvcm1hdGlvbiBjb250YWluZWQg
aGVyZWluIGluIGFueSB3YXkgKGluY2x1ZGluZywgYnV0IG5vdCBsaW1pdGVkIHRvLCB0b3RhbCBv
ciBwYXJ0aWFsIGRpc2Nsb3N1cmUsIHJlcHJvZHVjdGlvbiwgb3IgZGlzc2VtaW5hdGlvbikgYnkg
cGVyc29ucyBvdGhlciB0aGFuIHRoZSBpbnRlbmRlZCByZWNpcGllbnQocykgaXMgcHJvaGliaXRl
ZC4gSWYgeW91IHJlY2VpdmUgdGhpcyBlLW1haWwgaW4gZXJyb3IsIHBsZWFzZSBub3RpZnkNCiB0
aGUgc2VuZGVyIGJ5IHBob25lIG9yIGVtYWlsIGltbWVkaWF0ZWx5IGFuZCBkZWxldGUgaXQhPC9z
cGFuPjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNv
Tm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtD
YWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+Jm5ic3A7PC9zcGFuPjxvOnA+
PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPGRpdiBzdHlsZT0iYm9yZGVyOm5vbmU7Ym9yZGVy
LXRvcDpzb2xpZCAjRTFFMUUxIDEuMHB0O3BhZGRpbmc6My4wcHQgMGNtIDBjbSAwY20iPg0KPGRp
dj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0
O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+RnJvbTo8L3NwYW4+
PC9iPjxzcGFuIGNsYXNzPSJhcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPjxzcGFuIHN0eWxlPSJmb250
LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+
Jm5ic3A7PC9zcGFuPjwvc3Bhbj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZh
bWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPktlbnQNCiBXYXRzZW4gWzxhIGhy
ZWY9Im1haWx0bzprZW50QHdhdHNlbi5uZXQiPjxzcGFuIHN0eWxlPSJjb2xvcjojOTU0RjcyIj5t
YWlsdG86a2VudEB3YXRzZW4ubmV0PC9zcGFuPjwvYT5dPHNwYW4gY2xhc3M9ImFwcGxlLWNvbnZl
cnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPjxicj4NCjxiPlNlbnQ6PC9iPjxzcGFuIGNsYXNzPSJh
cHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj5sdW5lZMOsIDI3IG1hZ2dpbyAyMDE5
IDE5OjU3PGJyPg0KPGI+VG86PC9iPjxzcGFuIGNsYXNzPSJhcHBsZS1jb252ZXJ0ZWQtc3BhY2Ui
PiZuYnNwOzwvc3Bhbj5JdGFsbyBCdXNpICZsdDs8YSBocmVmPSJtYWlsdG86SXRhbG8uQnVzaUBo
dWF3ZWkuY29tIj48c3BhbiBzdHlsZT0iY29sb3I6Izk1NEY3MiI+SXRhbG8uQnVzaUBodWF3ZWku
Y29tPC9zcGFuPjwvYT4mZ3Q7PGJyPg0KPGI+Q2M6PC9iPjxzcGFuIGNsYXNzPSJhcHBsZS1jb252
ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj5Mb3UgQmVyZ2VyICZsdDs8YSBocmVmPSJtYWlsdG86
bGJlcmdlckBsYWJuLm5ldCI+PHNwYW4gc3R5bGU9ImNvbG9yOiM5NTRGNzIiPmxiZXJnZXJAbGFi
bi5uZXQ8L3NwYW4+PC9hPiZndDs7PHNwYW4gY2xhc3M9ImFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+
Jm5ic3A7PC9zcGFuPjxhIGhyZWY9Im1haWx0bzpuZXRtb2RAaWV0Zi5vcmciPjxzcGFuIHN0eWxl
PSJjb2xvcjojOTU0RjcyIj5uZXRtb2RAaWV0Zi5vcmc8L3NwYW4+PC9hPjs8c3BhbiBjbGFzcz0i
YXBwbGUtY29udmVydGVkLXNwYWNlIj4mbmJzcDs8L3NwYW4+PGEgaHJlZj0ibWFpbHRvOm5ldG1v
ZC1jaGFpcnNAaWV0Zi5vcmciPjxzcGFuIHN0eWxlPSJjb2xvcjojOTU0RjcyIj5uZXRtb2QtY2hh
aXJzQGlldGYub3JnPC9zcGFuPjwvYT48YnI+DQo8Yj5TdWJqZWN0OjwvYj48c3BhbiBjbGFzcz0i
YXBwbGUtY29udmVydGVkLXNwYWNlIj4mbmJzcDs8L3NwYW4+UmU6IFtuZXRtb2RdIFdHIExhc3Qg
Q2FsbDogZHJhZnQtaWV0Zi1uZXRtb2QtYXJ0d29yay1mb2xkaW5nLTAyPC9zcGFuPjxvOnA+PC9v
OnA+PC9wPg0KPC9kaXY+DQo8L2Rpdj4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3Jt
YWwiPiZuYnNwOzxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPGRpdj4NCjxwIGNsYXNz
PSJNc29Ob3JtYWwiPiZuYnNwOzxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8L2Rpdj4NCjxkaXY+
DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj5IaSBJdGFsbyw8bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0K
PGRpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj4mbmJzcDs8bzpwPjwvbzpwPjwvcD4N
CjwvZGl2Pg0KPGRpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48YnI+DQo8YnI+DQo8
YnI+DQo8bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGJsb2NrcXVvdGUgc3R5bGU9Im1hcmdpbi10
b3A6NS4wcHQ7bWFyZ2luLWJvdHRvbTo1LjBwdCI+DQo8ZGl2Pg0KPGRpdj4NCjxkaXY+DQo8cCBj
bGFzcz0iTXNvTm9ybWFsIj4xKSBTZWN0aW9uIDcuMi4xIChGb2xkaW5nIGZvciBTaW5nbGUgQmFj
a3NsYXNoIFN0cmF0ZWd5KSBzYXlzOjxicj4NCjxicj4NCiZuYnNwOyZuYnNwO0Vuc3VyZSB0aGF0
IHRoZSBkZXNpcmVkIG1heGltdW0gbGluZSBsZW5ndGggaXMgbm90IGxlc3MgdGhhbiB0aGU8YnI+
DQombmJzcDsmbmJzcDttaW5pbXVtIGhlYWRlciwgd2hpY2ggaXMgNDYgY2hhcmFjdGVycy4gJm5i
c3A7SWYgdGhlIGRlc2lyZWQgbWF4aW11bSBsaW5lPGJyPg0KJm5ic3A7Jm5ic3A7bGVuZ3RoIGlz
IGxlc3MgdGhhbiB0aGlzIG1pbmltdW0sIGV4aXQgKHRoaXMgdGV4dC1iYXNlZCBjb250ZW50PGJy
Pg0KJm5ic3A7Jm5ic3A7Y2Fubm90IGJlIGZvbGRlZCkuPGJyPg0KPGJyPg0KSG93ZXZlciwgdGhl
IGZpcnN0IGxpbmUgZGVmaW5lZCBpbiBzZWN0aW9uIDcuMS4xIGlzIGEgJnF1b3Q7NDUtY2hhcmFj
dGVyIHN0cmluZyZxdW90Oy48YnI+DQpJIHRoaW5rIHRoYXQgdGhlIHBhcmFncmFwaCBiZSBjaGFu
Z2VkIGFzOjxicj4NCjxicj4NCiZuYnNwOyZuYnNwO0Vuc3VyZSB0aGF0IHRoZSBkZXNpcmVkIG1h
eGltdW0gbGluZSBsZW5ndGggaXMgbm90IGxlc3MgdGhhbiB0aGU8YnI+DQombmJzcDsmbmJzcDtt
aW5pbXVtIGhlYWRlciwgd2hpY2ggaXMgNDUgY2hhcmFjdGVycy4gJm5ic3A7SWYgdGhlIGRlc2ly
ZWQgbWF4aW11bSBsaW5lPGJyPg0KJm5ic3A7Jm5ic3A7bGVuZ3RoIGlzIGxlc3MgdGhhbiB0aGlz
IG1pbmltdW0sIGV4aXQgKHRoaXMgdGV4dC1iYXNlZCBjb250ZW50PGJyPg0KJm5ic3A7Jm5ic3A7
Y2Fubm90IGJlIGZvbGRlZCkuPG86cD48L286cD48L3A+DQo8L2Rpdj4NCjwvZGl2Pg0KPC9kaXY+
DQo8L2Jsb2NrcXVvdGU+DQo8ZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPiZuYnNw
OzxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8L2Rpdj4NCjxkaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9
Ik1zb05vcm1hbCI+Rml4ZWQgaW4gbXkgbG9jYWwgY29weS48bzpwPjwvbzpwPjwvcD4NCjwvZGl2
Pg0KPC9kaXY+DQo8ZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPiZuYnNwOzxvOnA+
PC9vOnA+PC9wPg0KPC9kaXY+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48
YnI+DQo8YnI+DQo8YnI+DQo8bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGJsb2NrcXVvdGUgc3R5
bGU9Im1hcmdpbi10b3A6NS4wcHQ7bWFyZ2luLWJvdHRvbTo1LjBwdCI+DQo8ZGl2Pg0KPGRpdj4N
CjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj4yKSBTZWN0aW9uIDguMi4xIChGb2xkaW5nIGZv
ciBEb3VibGUgQmFja3NsYXNoIFN0cmF0ZWd5KSBzYXlzOjxicj4NCjxicj4NCjxicj4NCiZuYnNw
OyZuYnNwO0Vuc3VyZSB0aGF0IHRoZSBkZXNpcmVkIG1heGltdW0gbGluZSBsZW5ndGggaXMgbm90
IGxlc3MgdGhhbiB0aGU8YnI+DQombmJzcDsmbmJzcDttaW5pbXVtIGhlYWRlciwgd2hpY2ggaXMg
NDUgY2hhcmFjdGVycy4gJm5ic3A7SWYgdGhlIGRlc2lyZWQgbWF4aW11bSBsaW5lPGJyPg0KJm5i
c3A7Jm5ic3A7bGVuZ3RoIGlzIGxlc3MgdGhhbiB0aGlzIG1pbmltdW0sIGV4aXQgKHRoaXMgdGV4
dC1iYXNlZCBjb250ZW50PGJyPg0KJm5ic3A7Jm5ic3A7Y2Fubm90IGJlIGZvbGRlZCkuPGJyPg0K
PGJyPg0KSG93ZXZlciwgdGhlIGZpcnN0IGxpbmUgZGVmaW5lZCBpbiBzZWN0aW9uIDguMS4xIGlz
IGEgJnF1b3Q7NDYtY2hhcmFjdGVyIHN0cmluZyZxdW90Oy48YnI+DQpJIHRoaW5rIHRoYXQgdGhl
IHBhcmFncmFwaCBiZSBjaGFuZ2VkIGFzOjxicj4NCjxicj4NCiZuYnNwOyZuYnNwO0Vuc3VyZSB0
aGF0IHRoZSBkZXNpcmVkIG1heGltdW0gbGluZSBsZW5ndGggaXMgbm90IGxlc3MgdGhhbiB0aGU8
YnI+DQombmJzcDsmbmJzcDttaW5pbXVtIGhlYWRlciwgd2hpY2ggaXMgNDYgY2hhcmFjdGVycy4g
Jm5ic3A7SWYgdGhlIGRlc2lyZWQgbWF4aW11bSBsaW5lPGJyPg0KJm5ic3A7Jm5ic3A7bGVuZ3Ro
IGlzIGxlc3MgdGhhbiB0aGlzIG1pbmltdW0sIGV4aXQgKHRoaXMgdGV4dC1iYXNlZCBjb250ZW50
PGJyPg0KJm5ic3A7Jm5ic3A7Y2Fubm90IGJlIGZvbGRlZCkuPG86cD48L286cD48L3A+DQo8L2Rp
dj4NCjwvZGl2Pg0KPC9kaXY+DQo8L2Jsb2NrcXVvdGU+DQo8ZGl2Pg0KPGRpdj4NCjxwIGNsYXNz
PSJNc29Ob3JtYWwiPiZuYnNwOzxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8L2Rpdj4NCjxkaXY+
DQo8ZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPkZpeGVkIGluIG15IGxvY2FsIGNv
cHkuPG86cD48L286cD48L3A+DQo8L2Rpdj4NCjwvZGl2Pg0KPGRpdj4NCjxkaXY+DQo8cCBjbGFz
cz0iTXNvTm9ybWFsIj4mbmJzcDs8bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPC9kaXY+DQo8L2Rp
dj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48YnI+DQo8YnI+DQo8YnI+DQo8bzpwPjwv
bzpwPjwvcD4NCjwvZGl2Pg0KPGJsb2NrcXVvdGUgc3R5bGU9Im1hcmdpbi10b3A6NS4wcHQ7bWFy
Z2luLWJvdHRvbTo1LjBwdCI+DQo8ZGl2Pg0KPGRpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9y
bWFsIj5BIHF1ZXN0aW9uIGZvciBjbGFyaWZpY2F0aW9uLiBSZWFkaW5nIHRoZSBmb2xsb3dpbmcg
Y29kZSBpbiBBcHBlbmRpeCBBOjxicj4NCjxicj4NCiZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwO2lm
IFtbICRzdHJhdGVneSAtZXEgMiBdXTsgdGhlbjxicj4NCiZuYnNwOyZuYnNwOyZuYnNwOyZuYnNw
OyZuYnNwOyZuYnNwO21pbl9zdXBwb3J0ZWQ9YGV4cHIgJHsjaGRyX3R4dF8yfSAmIzQzOyA4YDxi
cj4NCiZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwO2Vsc2U8YnI+DQombmJzcDsmbmJzcDsmbmJzcDsm
bmJzcDsmbmJzcDsmbmJzcDttaW5fc3VwcG9ydGVkPWBleHByICR7I2hkcl90eHRfMX0gJiM0Mzsg
OGA8YnI+DQombmJzcDsmbmJzcDsmbmJzcDsmbmJzcDtmaTxicj4NCjxicj4NCkl0IHNlZW1zIHRv
IG1lIHRoYXQgdGhlIG1pbmltdW0gbGVuZ3RocyBhcHBsaWVkIGJ5IHRoZSBjb2RlIGluIEFwcGVu
ZGl4IEEgYXJlIGJlIDUzIGFuZCA1NCAoaW5zdGVhZCBvZiA0NSBhbmQgNDYgcmVzcGVjdGl2ZWx5
KTxicj4NCjxicj4NCklzIG15IHVuZGVyc3RhbmRpbmcgY29ycmVjdD88bzpwPjwvbzpwPjwvcD4N
CjwvZGl2Pg0KPC9kaXY+DQo8L2Rpdj4NCjwvYmxvY2txdW90ZT4NCjxkaXY+DQo8ZGl2Pg0KPHAg
Y2xhc3M9Ik1zb05vcm1hbCI+Jm5ic3A7PG86cD48L286cD48L3A+DQo8L2Rpdj4NCjwvZGl2Pg0K
PGRpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj5UaGUgc2NyaXB0IGlzIG5vdCBjb25m
bGljdGluZyB3aXRoIHRoZSBkcmFmdCwgYXMgaXQgZG9lcyBlbnN1cmUgdGhhdCB0aGUgbGVuZ3Ro
IGlzIG5vdCBsZXNzIHRoYW4gdGhlIHJhdyBoZWFkZXIgdGV4dC4gJm5ic3A7VGhvdWdoLCB0byB5
b3VyIHBvaW50LCBpdCBhZGRzIGFuIGFkZGl0aW9uYWwgYnVmZmVyIHRvIGZ1cnRoZXIgZW5zdXJl
IHRoYXQgdGhlIGhlYWRlciB3aWxsIGFsd2F5cyBoYXZlIHNvbWUgJz0nIGNoYXJhY3RlcnMNCiB3
cmFwcGluZyBhcm91bmQgdGhlIGhlYWRlciwgZm9yIHJlYWRhYmlsaXR5LCBpbiB0aGUgdW5saWtl
bHkgc2NlbmFyaW8gdGhhdCBzdWNoIGEgbmFycm93LXdpZHRoIGlzIG5lZWRlZC4gJm5ic3A7IEkg
Y291bGQgZ28gZWl0aGVyIHdheSBvbiB0aGlzLCBkb2VzIGFueW9uZSBlbHNlIGhhdmUgYW4gb3Bp
bmlvbj88bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPC9kaXY+DQo8ZGl2Pg0KPGRpdj4NCjxwIGNs
YXNzPSJNc29Ob3JtYWwiPiZuYnNwOzxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8L2Rpdj4NCjxk
aXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+Jm5ic3A7PG86cD48L286cD48L3A+DQo8
L2Rpdj4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxicj4NCjxicj4NCjxi
cj4NCjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8YmxvY2txdW90ZSBzdHlsZT0ibWFyZ2luLXRv
cDo1LjBwdDttYXJnaW4tYm90dG9tOjUuMHB0Ij4NCjxkaXY+DQo8ZGl2Pg0KPGRpdj4NCjxwIGNs
YXNzPSJNc29Ob3JtYWwiPlRoYW5rcywgSXRhbG88bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPC9k
aXY+DQo8L2Rpdj4NCjwvYmxvY2txdW90ZT4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29O
b3JtYWwiPiZuYnNwOzxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8L2Rpdj4NCjxkaXY+DQo8ZGl2
Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+S2VudCAvLyBhdXRob3I8bzpwPjwvbzpwPjwvcD4NCjwv
ZGl2Pg0KPC9kaXY+DQo8L2Rpdj4NCjwvYmxvY2txdW90ZT4NCjwvZGl2Pg0KPHAgY2xhc3M9Ik1z
b05vcm1hbCI+PG86cD4mbmJzcDs8L286cD48L3A+DQo8L2Rpdj4NCjwvZGl2Pg0KPC9ib2R5Pg0K
PC9odG1sPg0K

--_000_91E3A1BD737FDF4FA14118387FF6766B2774E2B7lhreml504mbs_--

--_004_91E3A1BD737FDF4FA14118387FF6766B2774E2B7lhreml504mbs_
Content-Type: image/png; name="image001.png"
Content-Description: image001.png
Content-Disposition: inline; filename="image001.png"; size=38861;
 creation-date="Wed, 29 May 2019 13:02:02 GMT";
 modification-date="Wed, 29 May 2019 13:02:02 GMT"
Content-ID: <image001.png@01D5162F.7797D1D0>
Content-Transfer-Encoding: base64
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--_004_91E3A1BD737FDF4FA14118387FF6766B2774E2B7lhreml504mbs_--


From nobody Wed May 29 06:04:43 2019
Return-Path: <rwilton@cisco.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A33EA12006D; Wed, 29 May 2019 06:04:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.491
X-Spam-Level: 
X-Spam-Status: No, score=-14.491 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_FILL_THIS_FORM_SHORT=0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=m5RmclSv; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=xm7bAlPO
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6ZVpgtbCTld3; Wed, 29 May 2019 06:04:38 -0700 (PDT)
Received: from alln-iport-2.cisco.com (alln-iport-2.cisco.com [173.37.142.89]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 056BE120046; Wed, 29 May 2019 06:04:37 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=7263; q=dns/txt; s=iport; t=1559135078; x=1560344678; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=FfamdiIThrSedPxodGjYes6ABux0HGw05oAuWR7KEd0=; b=m5RmclSvDvmCREYhKCzEx8z3V59i5FM2AV03yrnIp516ltNkgEhhnSUz viNKJ3075BPeM58uq0RAf8erPOBUhyqQEg8KeHiQRbxP8qamvylrneHVC +l+mjupFA9Kh1UpnMsZdUfd3RqJFB6oBvpReIgQ1LWVw7XU3+Kbzn2H+W w=;
IronPort-PHdr: =?us-ascii?q?9a23=3AkqptzRUBtTpw6ypNuXeXhfFQGBzV8LGuZFwc94?= =?us-ascii?q?YnhrRSc6+q45XlOgnF6O5wiEPSA92J8OpK3uzRta2oGXcN55qMqjgjSNRNTF?= =?us-ascii?q?dE7KdehAk8GIiAAEz/IuTtankgA8VGSFhj13q6KkNSXs35Yg6arw=3D=3D?=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AGAAAQg+5c/4YNJK1bChkBAQEBAQE?= =?us-ascii?q?BAQEBAQEHAQEBAQEBgVEEAQEBAQELAYE9JAUnA2lVIAQLKAqHUAOEUooegld?= =?us-ascii?q?+iESNa4EuFIEQA1QJAQEBDAEBGAsKAgEBg3pGAoJ1IzQJDgEDAQEEAQECAQR?= =?us-ascii?q?tHAyFSgEBAQEDAQEQLgEBJQcLAQQHBAIBCBEEAQEoByEGCxQJCAEBBAENBQg?= =?us-ascii?q?TB4MBgWoDHQECDJ4iAoE4iF+CIIJ5AQEFgTYCg08NC4IPAwaBNAGKNIEeF4F?= =?us-ascii?q?APyZrRoIXBy4+ghpHAQECAYErAQcEBwEJGAUlDIMEgiaLJggYBC0ChxlShzi?= =?us-ascii?q?NCj4JAoINhjiJAoQAgh+GaQWNRox1hwaBW40gAgQCBAUCDgEBBYFPOGZxcBU?= =?us-ascii?q?7gmyCDwsBF4ECAQKCSIUUhT9yAYEoikwPF4ELAYEgAQE?=
X-IronPort-AV: E=Sophos;i="5.60,527,1549929600"; d="scan'208";a="280028585"
Received: from alln-core-12.cisco.com ([173.36.13.134]) by alln-iport-2.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 29 May 2019 13:04:36 +0000
Received: from XCH-RCD-004.cisco.com (xch-rcd-004.cisco.com [173.37.102.14]) by alln-core-12.cisco.com (8.15.2/8.15.2) with ESMTPS id x4TD4atG026563 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 29 May 2019 13:04:36 GMT
Received: from xhs-rcd-001.cisco.com (173.37.227.246) by XCH-RCD-004.cisco.com (173.37.102.14) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Wed, 29 May 2019 08:04:35 -0500
Received: from xhs-rcd-003.cisco.com (173.37.227.248) by xhs-rcd-001.cisco.com (173.37.227.246) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Wed, 29 May 2019 08:04:35 -0500
Received: from NAM02-BL2-obe.outbound.protection.outlook.com (72.163.14.9) by xhs-rcd-003.cisco.com (173.37.227.248) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Wed, 29 May 2019 08:04:35 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com;  s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=NN4GVMAe53KfogyQ2+9CRw3zPyJPt72tR5uo4PKOLlg=; b=xm7bAlPObGTJMnQL3ZtAVlGpMhbg+Y7+tqqh9+tFlkZwNWHr3PQwUb05iwX5uQfQyZwGJHrZ/4ZSg1zSEdPS+r1b8H4BnEz86wp56nAUeiaTiHVXw7t8bNODTmwrCk5Bzc/YFrUPMSE/rXZbfbIdJmA/x60CuTfSLfYeX3iwxDA=
Received: from BYAPR11MB2631.namprd11.prod.outlook.com (52.135.227.28) by BYAPR11MB2837.namprd11.prod.outlook.com (52.135.228.31) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1922.18; Wed, 29 May 2019 13:04:33 +0000
Received: from BYAPR11MB2631.namprd11.prod.outlook.com ([fe80::d837:c1dd:cdb1:bb78]) by BYAPR11MB2631.namprd11.prod.outlook.com ([fe80::d837:c1dd:cdb1:bb78%7]) with mapi id 15.20.1922.021; Wed, 29 May 2019 13:04:33 +0000
From: "Rob Wilton (rwilton)" <rwilton@cisco.com>
To: tom petch <ietfc@btconnect.com>, Italo Busi <Italo.Busi@huawei.com>, "netmod@ietf.org" <netmod@ietf.org>
CC: "teas@ietf.org" <teas@ietf.org>
Thread-Topic: [netmod] Key collision between configured and ephemeral list entries
Thread-Index: AdUUid+3lEIjrS8aR5K2w9jffR4mQABlMm1Q
Date: Wed, 29 May 2019 13:04:33 +0000
Message-ID: <BYAPR11MB26314CD2365C6AEC39E696EDB51F0@BYAPR11MB2631.namprd11.prod.outlook.com>
References: <91E3A1BD737FDF4FA14118387FF6766B2774D314@lhreml504-mbs> <017f01d515f9$d0c662c0$4001a8c0@gateway.2wire.net> <91E3A1BD737FDF4FA14118387FF6766B2774DF6C@lhreml504-mbs> <062401d5160d$a568ea80$4001a8c0@gateway.2wire.net>
In-Reply-To: <062401d5160d$a568ea80$4001a8c0@gateway.2wire.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=rwilton@cisco.com; 
x-originating-ip: [173.38.220.56]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: f05a5b8f-6d46-4192-5c99-08d6e4363217
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(5600148)(711020)(4605104)(1401327)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(2017052603328)(7193020); SRVR:BYAPR11MB2837; 
x-ms-traffictypediagnostic: BYAPR11MB2837:
x-ms-exchange-purlcount: 4
x-microsoft-antispam-prvs: <BYAPR11MB28377C18324E8F33F6D3851EB51F0@BYAPR11MB2837.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-forefront-prvs: 0052308DC6
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(136003)(396003)(39860400002)(366004)(346002)(376002)(189003)(199004)(13464003)(81166006)(110136005)(8676002)(296002)(478600001)(81156014)(33656002)(486006)(53936002)(3846002)(6116002)(5024004)(14444005)(476003)(256004)(6436002)(7696005)(8936002)(71200400001)(71190400001)(229853002)(4326008)(99286004)(76176011)(6246003)(2906002)(305945005)(14454004)(316002)(25786009)(53546011)(64756008)(66476007)(966005)(73956011)(66446008)(66556008)(102836004)(7736002)(76116006)(66946007)(66066001)(446003)(52536014)(2501003)(68736007)(74316002)(9686003)(11346002)(55016002)(26005)(6306002)(86362001)(186003)(5660300002)(6506007); DIR:OUT; SFP:1101; SCL:1; SRVR:BYAPR11MB2837; H:BYAPR11MB2631.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: 0VINSvMg9hhedyUFKECXmUXGTdrKz1mvPwRt0w1+O1cwLIb/mduAQm0EE4Qj7U1SO0Oof0OjUrQsw9kHma/l78dSwTJ/pr9y34lg5/pH0gBk54rLkybWKYSme567tcd0FPiEs8+h4FSyYhwwFLG2SFCBA40nOv0UueQc2UZ9BJIdaKT7wrwVAhdKaf4EIUZgEl9I45O8Te4TkPT0/78skeDFmyfNz2AiHCemxQ0VS8VO26ArGiQqaJgV6CeSIM4IN76YIaC/Jc48645G8vYPNFAQ6LqSvMtiuyvSptUgyBcb6WlNFmJShRL4SuXHJBbvACZiv3cg8ZsUX6Co89E4Jz09h/b8YefnYNsFQppqch7lSljyuFMW0FeqEIh5nbFFxrQglI3VGMGNqFOsl+g/EbaJKMSQWwCI3fYS9V+ynYg=
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: f05a5b8f-6d46-4192-5c99-08d6e4363217
X-MS-Exchange-CrossTenant-originalarrivaltime: 29 May 2019 13:04:33.7603 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: rwilton@cisco.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR11MB2837
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.14, xch-rcd-004.cisco.com
X-Outbound-Node: alln-core-12.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/RQGz4jS8wtCWsjnYKNUHQDkmW0c>
Subject: Re: [netmod] Key collision between configured and ephemeral list entries
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 29 May 2019 13:04:41 -0000

Are these ephemeral tunnels created and named by the device itself?

Possibly using a human readable prefix (or suffix) might be better than usi=
ng a symbol.

E.g. perhaps a prefix of "sys-" as an abbreviation for system.

Thanks,
Rob

-----Original Message-----
From: Teas <teas-bounces@ietf.org> On Behalf Of tom petch
Sent: 29 May 2019 12:04
To: Italo Busi <Italo.Busi@huawei.com>; netmod@ietf.org
Cc: teas@ietf.org
Subject: Re: [Teas] [netmod] Key collision between configured and ephemeral=
 list entries


----- Original Message -----
From: "Italo Busi" <Italo.Busi@huawei.com>
Sent: Wednesday, May 29, 2019 11:02 AM

Hi Tom,

Thanks for your reply

It seems to me that the text you have quoted is from:
https://tools.ietf.org/html/rfc7950#section-6.2

If I can understand correctly, especially for section 6.2.1, this constrain=
ts does not apply to name attributes whose syntax is defined as a string an=
d used as key of a list, such as the tunnel list defined in the TE YANG mod=
el:

     |  +--rw tunnel* [name]
     |  |  +--ro operational-state?                  identityref
     |  |  +--rw name                                string

My understanding is that a tunnel list entry with a name starting with '#' =
can exist in a YANG DS

<tp>

Italo

Ah yes, my misunderstanding.  'string' type is a bit more flexible i.e.

   The string built-in type represents human-readable strings in YANG.
   Legal characters are the Unicode and ISO/IEC 10646 [ISO.10646]
   characters, including tab, carriage return, and line feed but
   excluding the other C0 control characters, the surrogate blocks, and
   the noncharacters.

Plenty of scope there!


If this approach is taken, then I agree that hash is a good choice as it st=
ands out, unlike, say, underscore which vanishes in the line of text.

Tom Petch

Thanks, Italo

-----Original Message-----
From: tom petch [mailto:ietfc@btconnect.com]
Sent: mercoled=EC 29 maggio 2019 10:42
To: Italo Busi <Italo.Busi@huawei.com>; netmod@ietf.org
Cc: teas@ietf.org
Subject: Re: [netmod] Key collision between configured and ephemeral list e=
ntries

<inline>

Tom Petch

----- Original Message -----
From: "Italo Busi" <Italo.Busi@huawei.com>
To: <netmod@ietf.org>
Cc: <teas@ietf.org>
Sent: Monday, May 27, 2019 2:16 PM
Subject: [netmod] Key collision between configured and ephemeral list entri=
es


On Friday within the TEAS WG, we have discussed an issue which seems generi=
c and therefore agreed to ask for guidelines to the Netmod WG

In the TE YANG model we have defined a tunnel list with a name attribute us=
ed as a key:

     |  +--rw tunnel* [name]
     |  |  +--ro operational-state?                  identityref
     |  |  +--rw name                                string

See: https://tools.ietf.org/html/draft-ietf-teas-yang-te-21

The issue we are facing is how to avoid name collision between configured a=
nd ephemeral tunnels. In other words, the issue we are trying to address is=
 how to avoid the client to assign to a configured tunnel a name which have=
 been already assigned by the server to another ephemeral tunnel and vice-v=
ersa, in particular considering NMDA rules

We believe that the issue is generic and apply to any configured and epheme=
ral list entries

Has this issue been already discussed/resolved in Netmod WG?

If not, what is the Netmod WG opinion/suggestion? We are currently consider=
ing the following option:

   Use a special character for ephemeral names - e.g. such names always are=
 prepended by special character "#"
   Make the special character changeable by configuration - the default can=
 be "#" and user can change if they desire..

<tp>

If this is to conform with YANG 1.1, RFC7950, then the constraint is

   Identifiers are used to identify different kinds of YANG items by
   name.  Each identifier starts with an uppercase or lowercase ASCII
   letter or an underscore character, followed by zero or more ASCII
   letters, digits, underscore characters, hyphens, and dots.


No # (hash) anywhere so I suspect that a lot of tooling will fail in an unp=
redictable way if it encounters an illegal character in an identifier.

Tom Petch


Thanks, Italo

Italo Busi
Principal Optical Transport Network Research Engineer Huawei Technologies C=
o., Ltd.
Tel : +39 345 4721946
Email : italo.busi@huawei.com
[cid:image002.png@01D5149F.354EF420]

This e-mail and its attachments contain confidential information from HUAWE=
I, which is intended only for the person or entity whose address is listed =
above. Any use of the information contained herein in any way (including, b=
ut not limited to, total or partial disclosure, reproduction, or disseminat=
ion) by persons other than the intended
recipient(s) is prohibited. If you receive this e-mail in error, please not=
ify the sender by phone or email immediately and delete it!

From: Tarek Saad [mailto:tsaad.net@gmail.com]
Sent: venerd=EC 24 maggio 2019 23:13
To: Igor Bryskin <Igor.Bryskin@huawei.com>; Rakesh Gandhi <rgandhi@cisco.co=
m>; Xufeng <xufeng.liu.ietf@gmail.com>; Vishnu Pavan Beeram <vbeeram@junipe=
r.net>; Italo Busi <Italo.Busi@huawei.com>
Cc: teas@ietf.org
Subject: Discussion on modelling container TE tunnels in YANG

The team on "to" list met to discuss this subject topic. Notes from today's=
 discussion (please add if I missed):

Name collision between configured and ephemeral tunnels:
  This is a generic problem in NMDA.
  How to handle collisions between configured and ephemeral (or
auto-created) objects of a list, if the list uses the object (string
based) name as the key?
  Both configured and ephemeral can have the same object name but they are =
different objects - how to avoid such collision.
 Proposed solution:
   Option 1:
   Use a special character for ephemeral names - e.g. such names always are=
 prepended by special character "#"
   Make the special character changeable by configuration - the default can=
 be "#" and user can change if they desire..
  Others?
AI (Italo): to send email to netmod group.

Container TE tunnels discussion:
-          Container tunnels are grouping of tunnels between same 2
endpoints to share incoming traffic towards the egress
-          Member tunnels of a container tunnel can be
auto-created/deleted on-demand and controlled by thresholds specified under=
 the container
-          Some attributes may apply on the container tunnel and
inherited down to member tunnels of the container
-          Q: Should model allow member tunnel to override inherited
attributes from container tunnel?
-          Q: Should all auto-created member tunnels of a container have
the same prefix/suffix - i..e prefix/suffix can be configurable

Regards,
Tarek






------------------------------------------------------------------------
--------


> _______________________________________________
> netmod mailing list
> netmod@ietf.org
> https://www.ietf.org/mailman/listinfo/netmod
>

_______________________________________________
Teas mailing list
Teas@ietf.org
https://www.ietf.org/mailman/listinfo/teas


From nobody Wed May 29 06:16:03 2019
Return-Path: <mbj@tail-f.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0515612011A; Wed, 29 May 2019 06:16:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ppfOZPX8WMlN; Wed, 29 May 2019 06:15:59 -0700 (PDT)
Received: from mail.tail-f.com (mail.tail-f.com [46.21.102.45]) by ietfa.amsl.com (Postfix) with ESMTP id 5160412006D; Wed, 29 May 2019 06:15:59 -0700 (PDT)
Received: from localhost (h-4-215.A165.priv.bahnhof.se [158.174.4.215]) by mail.tail-f.com (Postfix) with ESMTPSA id 0123E1AE0428; Wed, 29 May 2019 15:15:56 +0200 (CEST)
Date: Wed, 29 May 2019 15:15:56 +0200 (CEST)
Message-Id: <20190529.151556.308499982395016083.mbj@tail-f.com>
To: kent@watsen.net
Cc: rwilton@cisco.com, draft-ietf-netmod-artwork-folding@ietf.org, netmod@ietf.org
From: Martin Bjorklund <mbj@tail-f.com>
In-Reply-To: <0100016aff5c1a19-32fa804b-b9d4-4411-a350-0a5571256e10-000000@email.amazonses.com>
References: <0100016aff1640f0-a301a70e-ecae-4754-84d1-12170d5b73fd-000000@email.amazonses.com> <BYAPR11MB263191E71A0E09CE1667AB45B51E0@BYAPR11MB2631.namprd11.prod.outlook.com> <0100016aff5c1a19-32fa804b-b9d4-4411-a350-0a5571256e10-000000@email.amazonses.com>
X-Mailer: Mew version 6.7 on Emacs 25.2 / Mule 6.0 (HANACHIRUSATO)
Mime-Version: 1.0
Content-Type: Text/Plain; charset=utf-8
Content-Transfer-Encoding: base64
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/xlsXYYI-Ne5ySjJUDgwZH4NSmVI>
Subject: Re: [netmod] WG Last Call: draft-ietf-netmod-artwork-folding-02
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 29 May 2019 13:16:02 -0000
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From nobody Wed May 29 06:34:04 2019
Return-Path: <mbj@tail-f.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 84E30120130; Wed, 29 May 2019 06:34:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Qo1y_pSk7uFB; Wed, 29 May 2019 06:34:01 -0700 (PDT)
Received: from mail.tail-f.com (mail.tail-f.com [46.21.102.45]) by ietfa.amsl.com (Postfix) with ESMTP id D89E912011A; Wed, 29 May 2019 06:34:00 -0700 (PDT)
Received: from localhost (h-4-215.A165.priv.bahnhof.se [158.174.4.215]) by mail.tail-f.com (Postfix) with ESMTPSA id 23C1E1AE0428; Wed, 29 May 2019 15:33:59 +0200 (CEST)
Date: Wed, 29 May 2019 15:33:59 +0200 (CEST)
Message-Id: <20190529.153359.2174895235346852569.mbj@tail-f.com>
To: kent+ietf@watsen.net
Cc: lberger@labn.net, netmod@ietf.org, netmod-chairs@ietf.org
From: Martin Bjorklund <mbj@tail-f.com>
In-Reply-To: <0100016afac3dceb-3efc8938-6954-48c7-a362-e92c08400df0-000000@email.amazonses.com>
References: <e6fc4541-891a-60cb-e956-86f238d09f14@labn.net> <20190527.130412.1876961670794351457.mbj@tail-f.com> <0100016afac3dceb-3efc8938-6954-48c7-a362-e92c08400df0-000000@email.amazonses.com>
X-Mailer: Mew version 6.7 on Emacs 25.2 / Mule 6.0 (HANACHIRUSATO)
Mime-Version: 1.0
Content-Type: Text/Plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/mMGj8fgBbwtDOiurwTbT0ZVIs48>
Subject: Re: [netmod] WG Last Call: draft-ietf-netmod-artwork-folding-02
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 29 May 2019 13:34:03 -0000

Kent Watsen <kent+ietf@watsen.net> wrote:
> 
> 
> Hi Martin,
> 
> Thanks for your review.
> 
> 
> > I have reviewed draft-ietf-netmod-artwork-folding-02, and here are my
> > comments:

[...]

> >  The algorithm talks specifically about space (' ') rather than
> >  whitespace.
> 
> True and, FWIW, this was the only instance of the word "whitespace" in
> the document.
> 
> However, I wonder if there might be an issue lurking here.  Already
> the algorithm eliminates the potential for TAB, and implicitly
> eliminates NL and CR through the use of the word "line", but I wonder
> if there are other characters that we wish to skip
> over... e.g. vertical tab?

No.

[...]

> > o  7.1.2 / 7.2
> > 
> >  I would prefer if the format is defined with descriptive text,
> >  rather than with an algorithm.  It is the end result that matters,
> >  not which algorithm an implementation uses to get to the result.
> > 
> >  I suggest the algorithm is moved to an appendix, and/or a sentence
> >  is added that explains that the algorithm is just an example.
> 
> OLD:
> 
>    This section describes the process for folding and unfolding long
>    lines when they are encountered in a single instance of text content.
>    It is assumed that another process inserts/extracts the individual
>    text content instances to/from an Internet-Draft or RFC.  For
>    example, the `xiax` utility [xiax] does this.
> 
> 
> NEW:
> 
>    This section describes a process for folding and unfolding long lines
>    when they are encountered in text content.
> 
>    The steps are complete, but implementations MAY achieve the same
>    result in other ways.
> 
>    When a larger document contains multiple instances of text content
>    that may need to be folded or unfolded, it is assumed that another
>    process inserts/extracts the individual text content instances to/
>    from the larger document prior to utilizing the algorithms described
>    in this section.  For example, the `xiax` utility [xiax] does this.

Well, again I don't really understand why we need to assume _anything_
about how the author decides to implement this format.

I would just remove this paragraph.

> >  Also expand the descriptive text in 7.1.2; I think that the text in
> >  section 6 is probably enough.  However, there are some important
> >  details buried in the desciption of the algorithm; specifically the
> >  cases where SBS can't be used.
> 
> I looked at this for a little while, but didn't see how it could be
> improved.  Can you provide some text?


NEW:

   Lines that have a backslash ('\') occurring as the last character in
   a line are considered "folded", which means that the line continues
   at the first character that is not a space (' ') on the following line.

   Really long lines may be folded multiple times.


On second thought, this text doesn't have to mention when SBS can't be
used.


> > o  7.2.1
> > 
> >  I don't understand why there is a min limit of 46 characters for
> >  folding to work.  If the only reason is for the non-normative script
> >  to be able to center the header line, then I think this limitation
> >  should be removed.  (I would even prefer less flexibility in the
> >  header line syntax...)
> 
> This is because we never defined how to handle folding the header
> itself.  I wrote about this a while back and no-one seemed bothered by
> the limitation.  The effort/value ration isn't there.  The need to
> fold less than 69-characters is unlikely, and less than 46-characters
> seems even more so.

IMO we could remove this arbitrary limitaion and still leave the
header alone.

> > o  7.2.1 / 7.2.2
> > 
> >  I don't think the text should assume that folding/unfolding is
> >  "automated".
> 
> Both sections clearly state that authors may do the equivalent
> manually, or do you mean that the word "automated" in these sections
> isn't adding much value and could/should be removed?

Right:

OLD:

   Folding is assumed to be automated although authors may perform the
   folding steps manually.

   Determine the desired maximum line length from input to the automated
   line-wrapping process,

NEW:

   Determine the desired maximum line length from input to the
   line-wrapping process,




/martin


From nobody Wed May 29 08:22:42 2019
Return-Path: <tsaad.net@gmail.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C0DEE12015E; Wed, 29 May 2019 08:22:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.989
X-Spam-Level: 
X-Spam-Status: No, score=-1.989 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_FILL_THIS_FORM_SHORT=0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uJ4cz4dXcNbY; Wed, 29 May 2019 08:22:31 -0700 (PDT)
Received: from mail-it1-x12b.google.com (mail-it1-x12b.google.com [IPv6:2607:f8b0:4864:20::12b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1103B120154; Wed, 29 May 2019 08:22:31 -0700 (PDT)
Received: by mail-it1-x12b.google.com with SMTP id i63so4196394ita.3; Wed, 29 May 2019 08:22:31 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=from:to:cc:subject:thread-topic:thread-index:date:message-id :references:in-reply-to:accept-language:content-language :content-transfer-encoding:mime-version; bh=uR/aQpBM/1CuFxQWALAF6uFoVRTQJw+RLX/Ze4DhwiI=; b=uBDO7N4mTORA9BNayX/15wjGEH+ToDbgWtQtmy9OoEISAmYT7uv0oydprpBLgjG9em WxrZYIZ3UctrjMaz0QoS/wdVDZ8Gc/1NvQNuA55Of8jeskkVApVOmtNFRS4eS2VHksyS x0pVaE8oCm3k5S6l8lLrIdfFoe5+0c55l/8uJDjaEwlsFqWK9YP7bbhX+OtS3QNwFX3b /lcrtmVK1xeD7cd/EHpmaQLSByU4Iiy7QAjZWZUqn0g4KZ2FX+SNAvnFahAmZ/Tg38XL k1AS7yqWKYMdzNLGrLFr7x+UorrBeanqk6MZASwS1mlnhiwn1SXPtV1+C3NmeshKLUrN hRCA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:thread-topic:thread-index :date:message-id:references:in-reply-to:accept-language :content-language:content-transfer-encoding:mime-version; bh=uR/aQpBM/1CuFxQWALAF6uFoVRTQJw+RLX/Ze4DhwiI=; b=F9r1ciIhC1cjXSf+cZEtO3mNcbaKZQ1J1OzAIkzg0jftJ6TerFM8IrYr3dsXjmQYb+ MwqHF5Ps4YS29wm2/ch1iH8k/qxiclIs2S8jk6uuf1cdOhBgrz9aXUljDRNVu7ckeYRs YVFsOiUNuwwTKQXf9EduPYhjZRblf1SW0uUtiLywgD1yPZUAnXs9pTTVFcU+k3VdR+xk PP9tK0grszYH2FKM8CuFvF1mW9F8jGOyMMaM1TFqjVtSAOKfs9tANCT9AuQOqD93+wAh dF77QwwxFdLjxq+Fi2hge6aJmgrN9+kNs6ImQCYKdced4rY0TFtl1MXEzkxWooG/hDDy ZmsA==
X-Gm-Message-State: APjAAAWi4MjeE8z8POHnnVewd2SMQH6Rj4K9xFbZdYmO6Dv2EZl/1De4 mXhAMreUVT/pHVf8dEbVM3I=
X-Google-Smtp-Source: APXvYqz3zreqjULrEx7O8D/W9VIsHv7a7KSXoV76Bk1JL28a9fnlYyK3iDS7yEq7eUz68Nmtz2Y+0w==
X-Received: by 2002:a05:6638:24b:: with SMTP id w11mr2238899jaq.125.1559143349340;  Wed, 29 May 2019 08:22:29 -0700 (PDT)
Received: from BL0PR06MB4321.namprd06.prod.outlook.com ([52.96.9.149]) by smtp.gmail.com with ESMTPSA id x99sm1147820ita.28.2019.05.29.08.22.28 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 29 May 2019 08:22:28 -0700 (PDT)
From: Tarek Saad <tsaad.net@gmail.com>
To: "Rob Wilton (rwilton)" <rwilton@cisco.com>, tom petch <ietfc@btconnect.com>, Italo Busi <Italo.Busi@huawei.com>, "netmod@ietf.org" <netmod@ietf.org>
CC: "teas@ietf.org" <teas@ietf.org>
Thread-Topic: [Teas] [netmod] Key collision between configured and ephemeral list entries
Thread-Index: ATRCOEZEU+Y4lZVgfPjE1wAi8EmuvjAwNjkxQ0I4RkQwMGVkMTA2RTIyuwkrULg=
X-MS-Exchange-MessageSentRepresentingType: 1
Date: Wed, 29 May 2019 15:22:27 +0000
Message-ID: <BL0PR06MB4321DA01042ECAAD88E8420AFC1F0@BL0PR06MB4321.namprd06.prod.outlook.com>
References: <91E3A1BD737FDF4FA14118387FF6766B2774D314@lhreml504-mbs> <017f01d515f9$d0c662c0$4001a8c0@gateway.2wire.net> <91E3A1BD737FDF4FA14118387FF6766B2774DF6C@lhreml504-mbs> <062401d5160d$a568ea80$4001a8c0@gateway.2wire.net> <BYAPR11MB26314CD2365C6AEC39E696EDB51F0@BYAPR11MB2631.namprd11.prod.outlook.com>
In-Reply-To: <BYAPR11MB26314CD2365C6AEC39E696EDB51F0@BYAPR11MB2631.namprd11.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-Exchange-Organization-SCL: -1
X-MS-TNEF-Correlator: 
X-MS-Exchange-Organization-RecordReviewCfmType: 0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/-PUjZirE-Cd7OCjz__Om8CWD3C0>
Subject: Re: [netmod] [Teas] Key collision between configured and ephemeral list entries
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 29 May 2019 15:22:34 -0000
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From nobody Wed May 29 11:00:42 2019
Return-Path: <Italo.Busi@huawei.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9C16C12006E; Wed, 29 May 2019 11:00:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.191
X-Spam-Level: 
X-Spam-Status: No, score=-4.191 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_FILL_THIS_FORM_SHORT=0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pPfz0nQqIN8P; Wed, 29 May 2019 11:00:38 -0700 (PDT)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 06D3412002F; Wed, 29 May 2019 11:00:38 -0700 (PDT)
Received: from lhreml709-cah.china.huawei.com (unknown [172.18.7.107]) by Forcepoint Email with ESMTP id 15BBF85A2FEB58B18A2F; Wed, 29 May 2019 19:00:36 +0100 (IST)
Received: from LHREML504-MBS.china.huawei.com ([10.201.109.59]) by lhreml709-cah.china.huawei.com ([10.201.108.32]) with mapi id 14.03.0415.000;  Wed, 29 May 2019 19:00:35 +0100
From: Italo Busi <Italo.Busi@huawei.com>
To: Tarek Saad <tsaad.net@gmail.com>, "Rob Wilton (rwilton)" <rwilton@cisco.com>, tom petch <ietfc@btconnect.com>, "netmod@ietf.org" <netmod@ietf.org>
CC: "teas@ietf.org" <teas@ietf.org>
Thread-Topic: [Teas] [netmod] Key collision between configured and ephemeral list entries
Thread-Index: AQHVFfphMHsTseJ1T0S+porZBJo1ZKaCAWWAgAAmiICAADnusA==
Date: Wed, 29 May 2019 18:00:34 +0000
Message-ID: <91E3A1BD737FDF4FA14118387FF6766B2774E51F@lhreml504-mbs>
References: <91E3A1BD737FDF4FA14118387FF6766B2774D314@lhreml504-mbs> <017f01d515f9$d0c662c0$4001a8c0@gateway.2wire.net> <91E3A1BD737FDF4FA14118387FF6766B2774DF6C@lhreml504-mbs> <062401d5160d$a568ea80$4001a8c0@gateway.2wire.net> <BYAPR11MB26314CD2365C6AEC39E696EDB51F0@BYAPR11MB2631.namprd11.prod.outlook.com> <BL0PR06MB4321DA01042ECAAD88E8420AFC1F0@BL0PR06MB4321.namprd06.prod.outlook.com>
In-Reply-To: <BL0PR06MB4321DA01042ECAAD88E8420AFC1F0@BL0PR06MB4321.namprd06.prod.outlook.com>
Accept-Language: it-IT, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.203.246.126]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/HKHWMbSuNsKrHKoTXkwu9gJ1XQo>
Subject: Re: [netmod] [Teas] Key collision between configured and ephemeral list entries
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 29 May 2019 18:00:41 -0000
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From nobody Wed May 29 16:42:05 2019
Return-Path: <0100016b05f8ca08-cf27f315-6d0b-4d7c-925d-db42df4693ec-000000@amazonses.watsen.net>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2A27212007C; Wed, 29 May 2019 16:42:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level: 
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=amazonses.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cCF1P3ZbfVnQ; Wed, 29 May 2019 16:42:01 -0700 (PDT)
Received: from a8-33.smtp-out.amazonses.com (a8-33.smtp-out.amazonses.com [54.240.8.33]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C98751200D7; Wed, 29 May 2019 16:42:00 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=6gbrjpgwjskckoa6a5zn6fwqkn67xbtw; d=amazonses.com; t=1559173319; h=From:Message-Id:Content-Type:Mime-Version:Subject:Date:In-Reply-To:Cc:To:References:Feedback-ID; bh=DP7plKy3RR8HHSrW3Wa2v6cNmdLVckC2VKnKLT40zeQ=; b=geeXWrCs6ACOIhWQsvX6AQ+5GnNefLK5v+n2d6I25Mr7f4TmapCwn9TbRLG8693i Bng2VzC8WZXGEQsDUAFwj9j3zsFexLKkoWg3tXRwz0HUbVX5LxdA3jazdA6llCUjfC4 y8/CjPhYdeNHDsxYsOBRAdksBoUX4wpCTscFGKVE=
From: Kent Watsen <kent+ietf@watsen.net>
Message-ID: <0100016b05f8ca08-cf27f315-6d0b-4d7c-925d-db42df4693ec-000000@email.amazonses.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_ECE6E4B9-CE12-4694-A01F-EC73997E6F93"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
Date: Wed, 29 May 2019 23:41:59 +0000
In-Reply-To: <20190529.153359.2174895235346852569.mbj@tail-f.com>
Cc: "netmod@ietf.org" <netmod@ietf.org>, "netmod-chairs@ietf.org" <netmod-chairs@ietf.org>
To: Martin Bjorklund <mbj@tail-f.com>
References: <e6fc4541-891a-60cb-e956-86f238d09f14@labn.net> <20190527.130412.1876961670794351457.mbj@tail-f.com> <0100016afac3dceb-3efc8938-6954-48c7-a362-e92c08400df0-000000@email.amazonses.com> <20190529.153359.2174895235346852569.mbj@tail-f.com>
X-Mailer: Apple Mail (2.3445.104.11)
X-SES-Outgoing: 2019.05.29-54.240.8.33
Feedback-ID: 1.us-east-1.DKmIRZFhhsBhtmFMNikgwZUWVrODEw9qVcPhqJEI2DA=:AmazonSES
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/PCiVjkwCO7o6tWI8OOJ7_NZj59o>
Subject: Re: [netmod] WG Last Call: draft-ietf-netmod-artwork-folding-02
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 29 May 2019 23:42:04 -0000

--Apple-Mail=_ECE6E4B9-CE12-4694-A01F-EC73997E6F93
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii


Hi Martin,


>>   When a larger document contains multiple instances of text content
>>   that may need to be folded or unfolded, it is assumed that another
>>   process inserts/extracts the individual text content instances to/
>>   from the larger document prior to utilizing the algorithms =
described
>>   in this section.  For example, the `xiax` utility [xiax] does this.
>=20
> Well, again I don't really understand why we need to assume _anything_
> about how the author decides to implement this format.

removed the word "assumed", now text reads:

   When a larger document contains multiple instances of text content
   that may need to be folded or unfolded, another process must insert/
   extract the individual text content instances to/from the larger
   document prior to utilizing the algorithms described in this section.
   For example, the `xiax` utility [xiax] does this.



> I would just remove this paragraph.

This paragraph and others like it were added by others that thought that =
this algorithm was intended to process an entire I-D or RFC.



> On second thought, this text doesn't have to mention when SBS can't be
> used.

Okay, not changed.




>>> o  7.2.1
>>>=20
>>> I don't understand why there is a min limit of 46 characters for
>>> folding to work.  If the only reason is for the non-normative script
>>> to be able to center the header line, then I think this limitation
>>> should be removed.  (I would even prefer less flexibility in the
>>> header line syntax...)
>>=20
>> This is because we never defined how to handle folding the header
>> itself.  I wrote about this a while back and no-one seemed bothered =
by
>> the limitation.  The effort/value ration isn't there.  The need to
>> fold less than 69-characters is unlikely, and less than 46-characters
>> seems even more so.
>=20
> IMO we could remove this arbitrary limitaion and still leave the
> header alone.

Not arbitrary, as explained, leaving as is.




>>> o  7.2.1 / 7.2.2
>>>=20
>>> I don't think the text should assume that folding/unfolding is
>>> "automated".
>>=20
>> Both sections clearly state that authors may do the equivalent
>> manually, or do you mean that the word "automated" in these sections
>> isn't adding much value and could/should be removed?
>=20
> Right:
>=20
> OLD:
>=20
>   Folding is assumed to be automated although authors may perform the
>   folding steps manually.
>=20
>   Determine the desired maximum line length from input to the =
automated
>   line-wrapping process,
>=20
> NEW:
>=20
>   Determine the desired maximum line length from input to the
>   line-wrapping process,

Fixed (in 8.2.1 also)

You supplied text for 7.2.1, but also mentioned 7.2.2 (and ~ 8.2.2) =
originally.   For these sections, the appropriate change is to remove =
the first paragraph, which I did (in my local copy).   Specifically:

OLD:

   All unfolding is assumed to be automated although a reader will
   mentally perform the act of unfolding the text to understand the true
   nature of the original text content.

NEW:

    <deleted>



Kent // author







--Apple-Mail=_ECE6E4B9-CE12-4694-A01F-EC73997E6F93
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=us-ascii

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Dus-ascii"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" class=3D""><br =
class=3D""><div>Hi Martin,</div><div><br class=3D""></div><div><br =
class=3D""><blockquote type=3D"cite" class=3D""><div class=3D""><div =
class=3D""><blockquote type=3D"cite" class=3D"">&nbsp; When a larger =
document contains multiple instances of text =
content</blockquote></div></div></blockquote><blockquote type=3D"cite" =
class=3D""><div class=3D""><div class=3D""><blockquote type=3D"cite" =
class=3D""> &nbsp;&nbsp;that may need to be folded or unfolded, it is =
assumed that another<br class=3D""> &nbsp;&nbsp;process inserts/extracts =
the individual text content instances to/<br class=3D""> =
&nbsp;&nbsp;from the larger document prior to utilizing the algorithms =
described<br class=3D""> &nbsp;&nbsp;in this section. &nbsp;For example, =
the `xiax` utility [xiax] does this.<br class=3D""></blockquote><br =
class=3D"">Well, again I don't really understand why we need to assume =
_anything_<br class=3D"">about how the author decides to implement this =
format.<br class=3D""></div></div></blockquote><div><br =
class=3D""></div>removed the word "assumed", now text =
reads:</div><div><br class=3D""></div><div>&nbsp; &nbsp;When a larger =
document contains multiple instances of text content<br class=3D"">&nbsp; =
&nbsp;that may need to be folded or unfolded, another process must =
insert/<br class=3D"">&nbsp; &nbsp;extract the individual text content =
instances to/from the larger<br class=3D"">&nbsp; &nbsp;document prior =
to utilizing the algorithms described in this section.<br =
class=3D"">&nbsp; &nbsp;For example, the `xiax` utility [xiax] does =
this.<br class=3D""><br class=3D""><br class=3D""><br =
class=3D""><blockquote type=3D"cite" class=3D""><div class=3D""><div =
class=3D"">I would just remove this paragraph.<br =
class=3D""></div></div></blockquote><div><br class=3D""></div><div>This =
paragraph and others like it were added by others that thought that this =
algorithm was intended to process an entire I-D or RFC.</div><div><br =
class=3D""></div><div><br class=3D""></div><br class=3D""><blockquote =
type=3D"cite" class=3D""><div class=3D""><div class=3D"">On second =
thought, this text doesn't have to mention when SBS can't be<br =
class=3D"">used.<br class=3D""></div></div></blockquote><div><br =
class=3D""></div><div>Okay, not changed.</div><div><br =
class=3D""></div><div><br class=3D""></div><div><br =
class=3D""></div><div><br class=3D""></div><blockquote type=3D"cite" =
class=3D""><div class=3D""><div class=3D""><blockquote type=3D"cite" =
class=3D""><blockquote type=3D"cite" class=3D"">o &nbsp;7.2.1<br =
class=3D""><br class=3D""> I don't understand why there is a min limit =
of 46 characters for<br class=3D""> folding to work. &nbsp;If the only =
reason is for the non-normative script<br class=3D""> to be able to =
center the header line, then I think this limitation<br class=3D""> =
should be removed. &nbsp;(I would even prefer less flexibility in the<br =
class=3D""> header line syntax...)<br class=3D""></blockquote><br =
class=3D"">This is because we never defined how to handle folding the =
header<br class=3D"">itself. &nbsp;I wrote about this a while back and =
no-one seemed bothered by<br class=3D"">the limitation. &nbsp;The =
effort/value ration isn't there. &nbsp;The need to<br class=3D"">fold =
less than 69-characters is unlikely, and less than 46-characters<br =
class=3D"">seems even more so.<br class=3D""></blockquote><br =
class=3D"">IMO we could remove this arbitrary limitaion and still leave =
the<br class=3D"">header alone.<br =
class=3D""></div></div></blockquote><div><br class=3D""></div><div>Not =
arbitrary, as explained, leaving as is.</div><div><br =
class=3D""></div><div><br class=3D""></div><div><br class=3D""></div><br =
class=3D""><blockquote type=3D"cite" class=3D""><div class=3D""><div =
class=3D""><blockquote type=3D"cite" class=3D""><blockquote type=3D"cite" =
class=3D"">o &nbsp;7.2.1 / 7.2.2<br class=3D""><br class=3D""> I don't =
think the text should assume that folding/unfolding is<br class=3D""> =
"automated".<br class=3D""></blockquote><br class=3D"">Both sections =
clearly state that authors may do the equivalent<br class=3D"">manually, =
or do you mean that the word "automated" in these sections<br =
class=3D"">isn't adding much value and could/should be removed?<br =
class=3D""></blockquote><br class=3D"">Right:<br class=3D""><br =
class=3D"">OLD:<br class=3D""><br class=3D""> &nbsp;&nbsp;Folding is =
assumed to be automated although authors may perform the<br class=3D""> =
&nbsp;&nbsp;folding steps manually.<br class=3D""><br class=3D""> =
&nbsp;&nbsp;Determine the desired maximum line length from input to the =
automated<br class=3D""> &nbsp;&nbsp;line-wrapping process,<br =
class=3D""><br class=3D"">NEW:<br class=3D""><br class=3D""> =
&nbsp;&nbsp;Determine the desired maximum line length from input to =
the<br class=3D""> &nbsp;&nbsp;line-wrapping process,<br =
class=3D""></div></div></blockquote></div><br class=3D""><div =
class=3D"">Fixed (in 8.2.1 also)</div><div class=3D""><br =
class=3D""></div><div class=3D"">You supplied text for 7.2.1, but also =
mentioned 7.2.2 (and ~ 8.2.2) originally. &nbsp; For these sections, the =
appropriate change is to remove the first paragraph, which I did (in my =
local copy). &nbsp; Specifically:</div><div class=3D""><br =
class=3D""></div><div class=3D"">OLD:</div><div class=3D""><br =
class=3D""></div><div class=3D""><div class=3D"">&nbsp; &nbsp;All =
unfolding is assumed to be automated although a reader will</div><div =
class=3D"">&nbsp; &nbsp;mentally perform the act of unfolding the text =
to understand the true</div><div class=3D"">&nbsp; &nbsp;nature of the =
original text content.</div></div><div class=3D""><br =
class=3D""></div><div class=3D"">NEW:</div><div class=3D""><br =
class=3D""></div><div class=3D"">&nbsp; &nbsp; &lt;deleted&gt;</div><div =
class=3D""><br class=3D""></div><div class=3D""><br class=3D""></div><div =
class=3D""><br class=3D""></div><div class=3D"">Kent // author</div><div =
class=3D""><br class=3D""></div><div class=3D""><br class=3D""></div><div =
class=3D""><br class=3D""></div><div class=3D""><br class=3D""></div><div =
class=3D""><br class=3D""></div><div class=3D""><br =
class=3D""></div></body></html>=

--Apple-Mail=_ECE6E4B9-CE12-4694-A01F-EC73997E6F93--


From nobody Wed May 29 20:02:33 2019
Return-Path: <lberger@labn.net>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 72960120020 for <netmod@ietfa.amsl.com>; Wed, 29 May 2019 20:02:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.314
X-Spam-Level: 
X-Spam-Status: No, score=-2.314 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_MSPIKE_H2=-0.415, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (768-bit key) header.d=labn.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SW9gCozZC4d8 for <netmod@ietfa.amsl.com>; Wed, 29 May 2019 20:02:29 -0700 (PDT)
Received: from gproxy7-pub.mail.unifiedlayer.com (gproxy7-pub.mail.unifiedlayer.com [70.40.196.235]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 71F17120018 for <netmod@ietf.org>; Wed, 29 May 2019 20:02:29 -0700 (PDT)
Received: from cmgw14.unifiedlayer.com (unknown [10.9.0.14]) by gproxy7.mail.unifiedlayer.com (Postfix) with ESMTP id 7974B2169D5 for <netmod@ietf.org>; Wed, 29 May 2019 21:01:10 -0600 (MDT)
Received: from box313.bluehost.com ([69.89.31.113]) by cmsmtp with ESMTP id WBJWhf7weXFO5WBJWhBLSZ; Wed, 29 May 2019 21:01:10 -0600
X-Authority-Reason: nr=8
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=labn.net; s=default; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:MIME-Version :Date:Message-ID:References:Cc:To:From:Subject:Sender:Reply-To:Content-ID: Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc :Resent-Message-ID:List-Id:List-Help:List-Unsubscribe:List-Subscribe: List-Post:List-Owner:List-Archive; bh=tiiuNNBc5yBJ1FwR09FLG2jOhq2tvtgRoxCLDrNxveo=; b=zocvRQuQCCl0dmNXVqIiuq8W4F ucwrDI4a4TCpu2EfsZW/8X1GXnAjXy8xqmGFToJrS2gQDTL8F9Ufrhl+Ec5rqOUNOlEaywFZxQ1LZ SXyRng7iRlQwonjju+80b61Fk;
Received: from pool-72-66-11-201.washdc.fios.verizon.net ([72.66.11.201]:45214 helo=[IPv6:::1]) by box313.bluehost.com with esmtpsa (TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128) (Exim 4.91) (envelope-from <lberger@labn.net>) id 1hWBJW-00154B-4d; Wed, 29 May 2019 21:01:10 -0600
From: Lou Berger <lberger@labn.net>
To: NetMod WG <netmod@ietf.org>
Cc: NetMod WG Chairs <netmod-chairs@ietf.org>
References: <e6fc4541-891a-60cb-e956-86f238d09f14@labn.net>
Message-ID: <3361a263-4e2c-a61b-a0ca-8b1c4dd3c26e@labn.net>
Date: Wed, 29 May 2019 23:01:09 -0400
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.3.1
MIME-Version: 1.0
In-Reply-To: <e6fc4541-891a-60cb-e956-86f238d09f14@labn.net>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Content-Language: en-US
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - box313.bluehost.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - labn.net
X-BWhitelist: no
X-Source-IP: 72.66.11.201
X-Source-L: No
X-Exim-ID: 1hWBJW-00154B-4d
X-Source: 
X-Source-Args: 
X-Source-Dir: 
X-Source-Sender: pool-72-66-11-201.washdc.fios.verizon.net ([IPv6:::1]) [72.66.11.201]:45214
X-Source-Auth: lberger@labn.net
X-Email-Count: 1
X-Source-Cap: bGFibm1vYmk7bGFibm1vYmk7Ym94MzEzLmJsdWVob3N0LmNvbQ==
X-Local-Domain: yes
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/kwrR3l09hUkg14fZULWXITaknCI>
Subject: Re: [netmod] WG Last Call: draft-ietf-netmod-artwork-folding-02
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 30 May 2019 03:02:31 -0000

All,

 Â Â Â  The WG LC is closed.

Authors,

 Â Â Â  Please continue resolving the raised issues on the list, and let 
the WG know once a version that addresses all raised issues has been 
uploaded/published.Â  Also please also summarize any includes changes 
that were not otherwise discussed on-list.

Thank you!

Lou

On 5/12/2019 5:19 PM, Lou Berger wrote:
> All,
>
> This starts a two-week working group last call for
> draft-ietf-netmod-artwork-folding-02
>
> The working group last call ends on May 27.
> Please send your comments to the working group mailing list.
>
> Positive comments, e.g., "I've reviewed this document
> and believe it is ready for publication", are welcome!
> This is useful and important, even from authors.
>
> Thank you,
> NetMod Chairs
>
>
>
> _______________________________________________
> netmod mailing list
> netmod@ietf.org
> https://www.ietf.org/mailman/listinfo/netmod
>


From nobody Thu May 30 07:31:09 2019
Return-Path: <internet-drafts@ietf.org>
X-Original-To: netmod@ietf.org
Delivered-To: netmod@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id F1AE4120182; Thu, 30 May 2019 07:30:58 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: netmod@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.97.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: netmod@ietf.org
Message-ID: <155922665888.22158.34610875303939053@ietfa.amsl.com>
Date: Thu, 30 May 2019 07:30:58 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/S5PAoOkny0Xnw05HGYx226QD3To>
Subject: [netmod] I-D Action: draft-ietf-netmod-artwork-folding-03.txt
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 30 May 2019 14:30:59 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Network Modeling WG of the IETF.

        Title           : Handling Long Lines in Inclusions in Internet-Drafts and RFCs
        Authors         : Kent Watsen
                          Adrian Farrel
                          Qin Wu
	Filename        : draft-ietf-netmod-artwork-folding-03.txt
	Pages           : 25
	Date            : 2019-05-30

Abstract:
   This document defines two strategies for handling long lines in
   width-bounded text content.  One strategy is based on the historic
   use of a single backslash ('\') character to indicate where line-
   folding has occurred, with the continuation occurring with the first
   non-space (' ') character on the next line.  The second strategy
   extends the first strategy by adding a second backslash character to
   identify where the continuation begins and thereby able to handle
   cases not supported by the first strategy.  Both strategies use a
   self-describing header enabling automated reconstitution of the
   original content.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-netmod-artwork-folding/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-netmod-artwork-folding-03
https://datatracker.ietf.org/doc/html/draft-ietf-netmod-artwork-folding-03

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-netmod-artwork-folding-03


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Thu May 30 07:41:33 2019
Return-Path: <0100016b0930277d-e4cf4cc9-3be1-45c7-9ca1-505ccc8e59ea-000000@amazonses.watsen.net>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6A80A12028E; Thu, 30 May 2019 07:41:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.896
X-Spam-Level: 
X-Spam-Status: No, score=-1.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=amazonses.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id b3xmEqv0dENC; Thu, 30 May 2019 07:41:21 -0700 (PDT)
Received: from a8-32.smtp-out.amazonses.com (a8-32.smtp-out.amazonses.com [54.240.8.32]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DFA0B12023C; Thu, 30 May 2019 07:41:20 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=6gbrjpgwjskckoa6a5zn6fwqkn67xbtw; d=amazonses.com; t=1559227279; h=From:Message-Id:Content-Type:Mime-Version:Subject:Date:In-Reply-To:Cc:To:References:Feedback-ID; bh=9f7TR+yQES3dYhidUnjUAhURK4O1acH3ga21wEv8guw=; b=SQz6XTTsteMF5rJjNvIjX+E65eMwf1WFTGOR5K5Y16V3AYHiscBX/JU727W1zNoh eKV3t1ak4PfIeTIuHA5Y1IcTA07JyCQWEjYFAogPmrHG1Zb+u77jJe5zZMoG1bjboNH VlkgmErcPfRvaUjsGmgjP+G1x6u/sFNLRZmWGcEs=
From: Kent Watsen <kent@watsen.net>
Message-ID: <0100016b0930277d-e4cf4cc9-3be1-45c7-9ca1-505ccc8e59ea-000000@email.amazonses.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_BF4DAF78-2AFB-42B8-AD22-B0A3B66396AE"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
Date: Thu, 30 May 2019 14:41:19 +0000
In-Reply-To: <155922665888.22158.34610875303939053@ietfa.amsl.com>
Cc: i-d-announce@ietf.org
To: "netmod@ietf.org" <netmod@ietf.org>
References: <155922665888.22158.34610875303939053@ietfa.amsl.com>
X-Mailer: Apple Mail (2.3445.104.11)
X-SES-Outgoing: 2019.05.30-54.240.8.32
Feedback-ID: 1.us-east-1.DKmIRZFhhsBhtmFMNikgwZUWVrODEw9qVcPhqJEI2DA=:AmazonSES
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/t3VmztX-9GKm1wMvyvKTAlBA0IY>
Subject: Re: [netmod] I-D Action: draft-ietf-netmod-artwork-folding-03.txt
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 30 May 2019 14:41:31 -0000

--Apple-Mail=_BF4DAF78-2AFB-42B8-AD22-B0A3B66396AE
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii


This update reflects the changes discussed during the Last Call plus the =
following additional changes:

  1) s/see if any/ensure at least one/  (EDITORIAL: sounded too casual =
before)
  2) s/MUST NOT precede a space (' ') character/MUST NOT be on top of a =
space (' ') character/  (TECHNICAL: see below)
  3) wrapped the script with <CODE BEGINS> and <CODE ENDS> (EDITORIAL, =
per idnits)

Regarding #2, this change was made after I examined the algorithm more =
carefully.  It would be good for others to confirm this rather critical =
change.

Thanks,
Kent // contributor



> On May 30, 2019, at 10:30 AM, internet-drafts@ietf.org wrote:
>=20
>=20
> A New Internet-Draft is available from the on-line Internet-Drafts =
directories.
> This draft is a work item of the Network Modeling WG of the IETF.
>=20
>        Title           : Handling Long Lines in Inclusions in =
Internet-Drafts and RFCs
>        Authors         : Kent Watsen
>                          Adrian Farrel
>                          Qin Wu
> 	Filename        : draft-ietf-netmod-artwork-folding-03.txt
> 	Pages           : 25
> 	Date            : 2019-05-30
>=20
> Abstract:
>   This document defines two strategies for handling long lines in
>   width-bounded text content.  One strategy is based on the historic
>   use of a single backslash ('\') character to indicate where line-
>   folding has occurred, with the continuation occurring with the first
>   non-space (' ') character on the next line.  The second strategy
>   extends the first strategy by adding a second backslash character to
>   identify where the continuation begins and thereby able to handle
>   cases not supported by the first strategy.  Both strategies use a
>   self-describing header enabling automated reconstitution of the
>   original content.
>=20
>=20
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-netmod-artwork-folding/
>=20
> There are also htmlized versions available at:
> https://tools.ietf.org/html/draft-ietf-netmod-artwork-folding-03
> =
https://datatracker.ietf.org/doc/html/draft-ietf-netmod-artwork-folding-03=

>=20
> A diff from the previous version is available at:
> https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-netmod-artwork-folding-03=

>=20
>=20
> Please note that it may take a couple of minutes from the time of =
submission
> until the htmlized version and diff are available at tools.ietf.org.
>=20
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
>=20
> _______________________________________________
> netmod mailing list
> netmod@ietf.org
> https://www.ietf.org/mailman/listinfo/netmod


--Apple-Mail=_BF4DAF78-2AFB-42B8-AD22-B0A3B66396AE
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=us-ascii

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Dus-ascii"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" class=3D""><div =
class=3D""><br class=3D""></div><div class=3D"">This update reflects the =
changes discussed during the Last Call plus the following additional =
changes:</div><div class=3D""><br class=3D""></div><div class=3D"">&nbsp; =
1) s/see if any/ensure at least one/ &nbsp;(EDITORIAL: sounded too =
casual before)</div><div class=3D"">&nbsp; 2) s/MUST =
NOT&nbsp;precede&nbsp;a&nbsp;space (' ') character/MUST NOT&nbsp;be on =
top of&nbsp;a space (' ') character/ &nbsp;(TECHNICAL: see =
below)</div><div class=3D"">&nbsp; 3) wrapped the script with &lt;CODE =
BEGINS&gt; and&nbsp;&lt;CODE ENDS&gt; (EDITORIAL, per idnits)</div><div =
class=3D""><br class=3D""></div><div class=3D"">Regarding #2, this =
change was made after I examined the algorithm more carefully. &nbsp;It =
would be good for others to confirm this rather critical =
change.</div><div class=3D""><br class=3D""></div><div =
class=3D"">Thanks,</div><div class=3D"">Kent // contributor</div><div =
class=3D""><br class=3D""></div><br class=3D""><div><br =
class=3D""><blockquote type=3D"cite" class=3D""><div class=3D"">On May =
30, 2019, at 10:30 AM, <a href=3D"mailto:internet-drafts@ietf.org" =
class=3D"">internet-drafts@ietf.org</a> wrote:</div><br =
class=3D"Apple-interchange-newline"><div class=3D""><div class=3D""><br =
class=3D"">A New Internet-Draft is available from the on-line =
Internet-Drafts directories.<br class=3D"">This draft is a work item of =
the Network Modeling WG of the IETF.<br class=3D""><br class=3D""> =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Title =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;: Handling =
Long Lines in Inclusions in Internet-Drafts and RFCs<br class=3D""> =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Authors =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;: Kent Watsen<br =
class=3D""> =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;Adrian Farrel<br class=3D""> =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;Qin Wu<br class=3D""><span class=3D"Apple-tab-span" =
style=3D"white-space:pre">	</span>Filename =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;: =
draft-ietf-netmod-artwork-folding-03.txt<br class=3D""><span =
class=3D"Apple-tab-span" style=3D"white-space:pre">	</span>Pages =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;: 25<br =
class=3D""><span class=3D"Apple-tab-span" style=3D"white-space:pre">	=
</span>Date =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;: =
2019-05-30<br class=3D""><br class=3D"">Abstract:<br class=3D""> =
&nbsp;&nbsp;This document defines two strategies for handling long lines =
in<br class=3D""> &nbsp;&nbsp;width-bounded text content. &nbsp;One =
strategy is based on the historic<br class=3D""> &nbsp;&nbsp;use of a =
single backslash ('\') character to indicate where line-<br class=3D""> =
&nbsp;&nbsp;folding has occurred, with the continuation occurring with =
the first<br class=3D""> &nbsp;&nbsp;non-space (' ') character on the =
next line. &nbsp;The second strategy<br class=3D""> &nbsp;&nbsp;extends =
the first strategy by adding a second backslash character to<br =
class=3D""> &nbsp;&nbsp;identify where the continuation begins and =
thereby able to handle<br class=3D""> &nbsp;&nbsp;cases not supported by =
the first strategy. &nbsp;Both strategies use a<br class=3D""> =
&nbsp;&nbsp;self-describing header enabling automated reconstitution of =
the<br class=3D""> &nbsp;&nbsp;original content.<br class=3D""><br =
class=3D""><br class=3D"">The IETF datatracker status page for this =
draft is:<br class=3D""><a =
href=3D"https://datatracker.ietf.org/doc/draft-ietf-netmod-artwork-folding=
/" =
class=3D"">https://datatracker.ietf.org/doc/draft-ietf-netmod-artwork-fold=
ing/</a><br class=3D""><br class=3D"">There are also htmlized versions =
available at:<br =
class=3D"">https://tools.ietf.org/html/draft-ietf-netmod-artwork-folding-0=
3<br =
class=3D"">https://datatracker.ietf.org/doc/html/draft-ietf-netmod-artwork=
-folding-03<br class=3D""><br class=3D"">A diff from the previous =
version is available at:<br =
class=3D"">https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-netmod-artwork-f=
olding-03<br class=3D""><br class=3D""><br class=3D"">Please note that =
it may take a couple of minutes from the time of submission<br =
class=3D"">until the htmlized version and diff are available at =
tools.ietf.org.<br class=3D""><br class=3D"">Internet-Drafts are also =
available by anonymous FTP at:<br =
class=3D"">ftp://ftp.ietf.org/internet-drafts/<br class=3D""><br =
class=3D"">_______________________________________________<br =
class=3D"">netmod mailing list<br class=3D"">netmod@ietf.org<br =
class=3D"">https://www.ietf.org/mailman/listinfo/netmod<br =
class=3D""></div></div></blockquote></div><br class=3D""></body></html>=

--Apple-Mail=_BF4DAF78-2AFB-42B8-AD22-B0A3B66396AE--


From nobody Thu May 30 09:11:11 2019
Return-Path: <shares@ndzh.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9B435120120 for <netmod@ietfa.amsl.com>; Thu, 30 May 2019 09:11:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.949
X-Spam-Level: 
X-Spam-Status: No, score=0.949 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DOS_OUTLOOK_TO_MX=2.845, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nisTOSlYaHw9 for <netmod@ietfa.amsl.com>; Thu, 30 May 2019 09:11:09 -0700 (PDT)
Received: from hickoryhill-consulting.com (50-245-122-100-static.hfc.comcastbusiness.net [50.245.122.100]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4D585120141 for <netmod@ietf.org>; Thu, 30 May 2019 09:11:09 -0700 (PDT)
X-Default-Received-SPF: pass (skip=forwardok (res=PASS)) x-ip-name=174.124.223.16; 
From: "Susan Hares" <shares@ndzh.com>
To: "'Kent Watsen'" <kent+ietf@watsen.net>, <netmod@ietf.org>
References: <0100016a996e6b55-6274d956-7a6e-4d56-b88b-524723053cdb-000000@email.amazonses.com>
In-Reply-To: <0100016a996e6b55-6274d956-7a6e-4d56-b88b-524723053cdb-000000@email.amazonses.com>
Date: Thu, 30 May 2019 12:11:05 -0400
Message-ID: <00a701d51702$494c0570$dbe41050$@ndzh.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_00A8_01D516E0.C23BC500"
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQDdvtVLM/V8nXA8NQDGiSRNrF6kJ6hyhjnw
Content-Language: en-us
X-Antivirus: AVG (VPS 190530-2, 05/30/2019), Outbound message
X-Antivirus-Status: Not-Tested
X-Authenticated-User: skh@ndzh.com 
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/OrVLA2laK0fpCqz8cJG-IA0Rxgo>
Subject: Re: [netmod] Adoption poll for draft-wu-netmod-factory-default-03
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 30 May 2019 16:11:10 -0000

This is a multipart message in MIME format.

------=_NextPart_000_00A8_01D516E0.C23BC500
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit

I have not seen the announcement for this adoption - so I'm sending the
support for adoption. 

 

Sue 

 

From: netmod [mailto:netmod-bounces@ietf.org] On Behalf Of Kent Watsen
Sent: Wednesday, May 8, 2019 5:52 PM
To: netmod@ietf.org
Subject: [netmod] Adoption poll for draft-wu-netmod-factory-default-03

 

This email begins a 1-week adoption poll for:

 

    https://tools.ietf.org/html/draft-wu-netmod-factory-default-03

As we already have consensus from the previous poll to work on the problem,
this poll primarily seeks for objections for using -03 as a basis for WG
adoption (the document will be adopted if no objections are raised).  Of
course, a show of support is also always encouraged.   All, please voice
your support or objections before May 15.   

 

Authors, already there have been good comments for how to improve the
document.  However, please refrain from posting an update incorporating
these comments until after this adoption poll closes, at which time the
instruction will be to post a -00 with minimal changes, followed by a -01
incorporating the comments.

 

PS: the IPR poll conducted on Mar 25 is still considered valid.


Kent  // co-chair

 

 


------=_NextPart_000_00A8_01D516E0.C23BC500
Content-Type: text/html;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><META =
HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Dus-ascii"><meta name=3DGenerator content=3D"Microsoft Word 14 =
(filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Helvetica-Light;
	panose-1:0 0 0 0 0 0 0 0 0 0;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue =
vlink=3Dpurple style=3D'word-wrap: break-word;-webkit-nbsp-mode: =
space;line-break:after-white-space'><div class=3DWordSection1><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>I have not seen the announcement for this adoption &#8211; so =
I&#8217;m sending the support for adoption. <o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Sue <o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><div><div =
style=3D'border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in'><p class=3DMsoNormal><b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>From:</span>=
</b><span style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'> =
netmod [mailto:netmod-bounces@ietf.org] <b>On Behalf Of </b>Kent =
Watsen<br><b>Sent:</b> Wednesday, May 8, 2019 5:52 PM<br><b>To:</b> =
netmod@ietf.org<br><b>Subject:</b> [netmod] Adoption poll for =
draft-wu-netmod-factory-default-03<o:p></o:p></span></p></div></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><div><p class=3DMsoNormal><span =
style=3D'font-family:"Helvetica-Light","serif"'>This email begins a =
1-week adoption poll for:</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><p class=3DMsoNormal =
style=3D'margin-bottom:12.0pt'><span =
style=3D'font-family:"Helvetica-Light","serif"'>&nbsp; &nbsp;&nbsp;<a =
href=3D"https://tools.ietf.org/html/draft-wu-netmod-factory-default-03">h=
ttps://tools.ietf.org/html/draft-wu-netmod-factory-default-03</a></span><=
o:p></o:p></p><div><p class=3DMsoNormal><span =
style=3D'font-family:"Helvetica-Light","serif"'>As we&nbsp;already =
have&nbsp;consensus from the previous poll to work on the problem, this =
poll&nbsp;primarily seeks for objections for using -03 as a basis for WG =
adoption (the&nbsp;document will be adopted if no objections are =
raised). &nbsp;Of course, a show of support is also always encouraged. =
&nbsp; All, please voice your support or objections&nbsp;before&nbsp;May =
15.&nbsp; &nbsp;</span><o:p></o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-family:"Helvetica-Light","serif"'>Authors, already there =
have been good comments for how to improve the document. &nbsp;However, =
please refrain from posting an update&nbsp;incorporating&nbsp;these =
comments until after this adoption poll closes, at which time the =
instruction will be to post a -00 with minimal changes, followed by a =
-01&nbsp;incorporating the comments.</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-family:"Helvetica-Light","serif"'>PS: the IPR poll =
conducted on Mar 25 is still considered =
valid.</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-family:"Helvetica-Light","serif"'><br>Kent &nbsp;// =
co-chair</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div></div></div></body></html>
------=_NextPart_000_00A8_01D516E0.C23BC500--

